How OmniEdge works

  • Simple enough to use for both users and network administrators.
  • Based on the Zero-trust security model. Users can establish a strictly secure network through authentication services such as Okta, G Suite, etc.
  • Try using peer-to-peer communication instead of relaying nodes to increase the network speed and reduce risks of single-point failures.

Main Architecture

For the above design goals, we get inspired by an open-source VPN software: n2n and designed the main architecture of OmniEdge.

OmniEdge’s main architecture
  • Coordinate the traffic transferring between nodes.
  • Try to establish a direct peer-to-peer between nodes if possible; otherwise, relay traffic between nodes if there is any firewall.
  • Keep and manage virtual local information such as keys, network node public keys, etc.
  • Forward TCP and UDP traffic over the virtual network, either directly or indirectly.
  • Provide local DNS resolution for proxied requests.
  • Manage network node data, including device IDs, public keys, IP data, gateways, routing tables, and other information.
  • Verify nodes and return network data to nodes.
  • Coordinate changes to the virtual network such as joining and deleting nodes.
  • Maintain the life cycle of nodes.
  • Interact with the user authentication service and manages the ACL information of the nodes.
  • Communicate with nodes and configure and manage nodes.
  • Handle user registration and login procedure.

Blueprint to product

Based on this architecture, we can do what other solutions can’t do. Of course, we also did a huge amount of detailed design and optimization works, and we will keep updating our latest information here soon. If interested, feel free to join our waiting list.



Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store