---
title: "Overview"
linkTitle: "Overview"
date: 2019-10-21
weight: 10
description: >
A bird's eye view of Ouroboros.
---
Ouroboros is a prototype **distributed system** for packetized network
communications. It is a redesign _ab initio_ of the current packet
networking model -- from the programming API almost to the wire --
without compromises. While the prototype not directly compatible with
IP or sockets, it has some interfaces to be interoperable with common
technologies: we run Ouroboros over Ethernet or UDP, or create
IP/Ethernet tunnels over Ouroboros by exposing tap or tun devices.
From an application perspective, an Ouroboros network is a "black box"
with a
[simple interface](https://ouroboros.rocks/man/man3/flow_alloc.3.html).
Either Ouroboros will provides a _flow_, a bidirectional channel that delivers
data within some requested operational parameters such as delay and
bandwidth and reliability and security; or it provides a broadcast
channel to a set of joined programmes.
From an administrative perspective, an Ouroboros network is a bunch of
_daemons_ that can be thought of as **software routers** (unicast) or
**software _hubs_** (broadcast) that can be connected to each other;
again through
[a simple API](https://ouroboros.rocks/man/man8/ouroboros.8.html).
Some of the main characteristics are:
* Ouroboros is minimalistic: it has only the essential protocol
fields. It will also try to use the lowest possible network layer
(i.e. on a single machine, Ouroboros communicates directly over
shared memory, over a LAN it will communicate over Ethernet, over IP
it will communicate over UDP), in a completely transparent way to
the application.
* Ouroboros enforces the _end-to-end_ principle. Packet headers are
immutable between the state machines that operate on their
state. Only two protocol fields change on a hop-by-hop (as viewed
within a network layer) basis: [TTL and
ECN](/docs/concepts/protocols/). This immutability can be enforced
through authentication (not yet implemented).
* Ouroboros has _external_ and _dynamic_ server application
binding. Socket applications leave it to the application developer
to manage binding from within the program (typically a bind() call
to either a specific IP address or to all addresses (0.0.0.0),
leaving all configuration application (or library-) specific. When
shopping for network libraries, typical questions are "can it bind
to multiple IP addresses for high availability?", "Can I run
multiple servers in parallel on the same port for scaling?".
Ouroboros makes all this management external to the program: server
applications only need to call flow_accept(). The _bind()_ primitive
allows a program (or running process) to be bound from the command
line to a certain (set of) service names and when a flow request
arrives for that service, Ouroboros acts as a broker that hands of
the flow to any program that is bound to that service. Binding is
N-to-M: multiple programs can be bound to the same service name, and
programs can be bound to multiple names. This binding is also
_dynamic_: it can be done while the program is running, and will not
disrupt existing flows. In addition, the _register()_ primitive
allows external and dynamic control over which network a service
name is available over. Again, while the service is running, and
without disrupting existing flows.
* The Ouroboros end-to-end protocol performs flow control, error
control and reliable transfer and is implemented as part of the
_application library_. This includes sequence numbering, ordering,
sending and handling acknowledgments, managing flow control windows,
...
* Ouroboros can establish an encrypted flow in a _single RTT_ (not
including name-to-address resolution). The flow allocation API is a
2-way handshake (request-response) that agrees on endpoint IDs and
performs an ECDHE key exchange. The end-to-end protocol is based on
Delta-t and
[doesn't need a handshake](/docs/concepts/protocols/#operation-of-frcp).
* Ouroboros allows encrypting everything before handing it to the next
layer for delivery. With this functionality in the library, it's
easy to force encryption on _every_ flow that is created from your
machine over Ouroboros regardless of what the application programmer
has implemented. Unlike TLS, the end-to-end header (sequence number
etc) can be fully encrypted.
* Ouroboros congestion control operates at the network level. It does
not (_can not!_) rely on acknowledgements. This means all network
flows are automatically congestion controlled.
* The flow allocation API works as an interface to the network. An
Ouroboros network layer is therefore "aware" of all traffic that it
is offered. This allows the layer to implement shaping and police
traffic, but only based on quantity and QoS, not on the contents of
the packets, to ensure _net neutrality_.
For a lot more depth, our article on the design of Ouroboros is
accessible on [arXiv](https://arxiv.org/pdf/2001.09707.pdf).
The best place to start understanding a bit what Ouroboros aims to do
and how it differs from other packet networks is to first watch this
presentation at [FOSDEM
2018](https://archive.fosdem.org/2018/schedule/event/ipc/) but note
that this presentation is over three years old, and very outdated in
terms of what has been implemented. The prototype implementation is
now capable of asynchronous flows handling, doing retransmission, flow
control, congestion control...
The next things to do are to have a quick read of the
[flow allocation](/docs/concepts/fa/)
and
[data path](/docs/concepts/datapath/)
sections.
{{< youtube 6fH23l45984 >}}