How OmniEdge works

  • Simple enough to use for both users and network administrators.
  • Based on the Zero-trust security model. Users can establish a strictly secure network through authentication services such as Okta, G Suite, etc.
  • Try using peer-to-peer communication instead of relaying nodes to increase the network speed and reduce risks of single-point failures.

Main Architecture

For the above design goals, we get inspired by an open-source VPN software: n2n and designed the main architecture of OmniEdge.

OmniEdge’s main architecture
  • Coordinate the traffic transferring between nodes.
  • Try to establish a direct peer-to-peer between nodes if possible; otherwise, relay traffic between nodes if there is any firewall.
  • Keep and manage virtual local information such as keys, network node public keys, etc.
  • Forward TCP and UDP traffic over the virtual network, either directly or indirectly.
  • Provide local DNS resolution for proxied requests.
  • Manage network node data, including device IDs, public keys, IP data, gateways, routing tables, and other information.
  • Verify nodes and return network data to nodes.
  • Coordinate changes to the virtual network such as joining and deleting nodes.
  • Maintain the life cycle of nodes.
  • Interact with the user authentication service and manages the ACL information of the nodes.
  • Communicate with nodes and configure and manage nodes.
  • Handle user registration and login procedure.

Blueprint to product

Based on this architecture, we can do what other solutions can’t do. Of course, we also did a huge amount of detailed design and optimization works, and we will keep updating our latest information here soon. If interested, feel free to join our waiting list.

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store