Knowledge

Network virtualization

Source đź“ť

250:
providers, wireless network virtualization needs the physical wireless infrastructure and radio resources to be abstracted and isolated to a number of virtual resources, which then can be offered to different service providers. In other words, virtualization, regardless of wired or wireless networks, can be considered as a process splitting the entire network system. However, the distinctive properties of the wireless environment, in terms of time-various channels, attenuation, mobility, broadcast, etc., make the problem more complicated. Furthermore, wireless network virtualization depends on specific access technologies, and wireless network contains much more access technologies compared to wired network virtualization and each access technology has its particular characteristics, which makes convergence, sharing and abstraction difficult to achieve. Therefore, it may be inaccurate to consider wireless network virtualization as a subset of network virtualization.
59:, network virtualization enables developers to emulate connections between applications, services, dependencies, and end users in a test environment without having to physically test the software on all possible hardware or system software. The validity of the test depends on the accuracy of the network virtualization in emulating real hardware and 258:
Until 1 Gbit/s networks, network virtualization was not suffering from the overhead of the software layers or hypervisor layers providing the interconnects. With the rise of high bandwidth, 10 Gbit/s and beyond, the rates of packets exceed the capabilities of processing of the networking
249:
Wireless network virtualization can have a very broad scope ranging from spectrum sharing, infrastructure virtualization, to air interface virtualization. Similar to wired network virtualization, in which physical infrastructure owned by one or more providers can be shared among multiple service
399:
A. Galis, S. Clayman, A. Fischer, A. Paler, Y. Al-Hazmi, H. De Meer, A. Cheniour, O. Mornard, J. Patrick Gelas and L. Lefevre, et al. "Future Internet Management Platforms for Network Virtualisation and Service Clouds"- ServiceWave 2010, December 2010,
278:, network is provided by Neutron which leverages many features from the Linux kernel for networking: iptables, iproute2, L2 bridge, L3 routing or OVS. Since the Linux kernel cannot sustain the 10G packet rate, then some bypass technologies for a 259:
stacks. In order to keep offering high throughput processing, some combinations of software and hardware helpers are deployed in the so-called "network in a box" associated with either a hardware-dependent
55:, software developers use network virtualization to test software which are under development in a simulation of the network environments in which the software is intended to operate. As a component of 140:
External network virtualization is envisioned to be placed in the middle of the network stack and help integrating different architectures proposed for next generation networks.
327: 163: 166:, to emulate a physical network with software. This can improve a single system's efficiency by isolating applications to separate containers or pseudo-interfaces. 204: 133:
can configure systems physically attached to the same local network into separate virtual networks. Conversely, an administrator can combine systems on separate
382:
P. Martinez-Julia, A. F. Skarmeta, A. Galis. "Towards a Secure Network Virtualization Architecture for the Future Internet" Future Internet Assembly, 2013,
668: 25:
is the process of combining hardware and software network resources and network functionality into a single, software-based administrative entity, a
583:
Fischer, Andreas; Botero, Juan Felipe; Beck, Michael Till; de Meer, Hermann; Hesselbach, Xavier (2013). "Virtual Network Embedding: A Survey".
241:, network virtualization enables emulation of connections between applications, services, dependencies, and end users for software testing. 637: 404: 152: 237:
Network virtualization may be used in application development and testing to mimic real-world hardware and system software. In
125:(LANs) into virtual networks to improve a large network's or data center's efficiency. A virtual local area network (VLAN) and 307: 238: 56: 562:
Berl, Andreas; Fischer, Andreas; de Meer, Hermann (2009). "Using System Virtualization to Create Virtualized Networks".
322: 428:
Liang, C.; Yu, F. R. (2015). "Wireless Network Virtualization: A Survey, Some Research Issues and Challenges".
411:
and in "Towards A Service-Based Internet" Lecture Notes in Computer Science, 2010, Volume 6481/2010, 235-237,
260: 226: 362: 71:
Various equipment and software vendors offer network virtualization by combining any of the following:
501: 481: 210: 194: 642: 663: 357: 312: 30: 496: 347: 533:
Chowdhury, N.M. Mosharaf Kabir; Boutaba, Raouf (2010). "A survey of network virtualization".
282:
are used. The main bypass technologies are either based on a limited set of features such as
130: 401: 8: 608: 514: 445: 317: 134: 122: 45: 612: 600: 571: 550: 218: 190: 102:
Network mobile elements, such as laptop computers, tablet computers, and smartphones
449: 648: 632: 596: 592: 542: 518: 506: 437: 412: 383: 352: 60: 52: 293:
implementation or based on a full feature and offload of Linux processing such as
44:, providing network-like functionality to software containers on a single network 546: 416: 408: 387: 342: 332: 90: 76: 185:
combining Vyatta's routing, firewall, and VPN functions with Citrix's Netscaler
441: 182: 126: 271:
technology between the NIC and the payloads (virtual machines or containers).
657: 604: 575: 554: 186: 110: 510: 283: 200: 86: 290: 217:
systems. These containers can run different operating systems, such as
159: 99:
Network machine-to-machine elements, such as telecommunications devices
40:, combining many networks or parts of networks into a virtual unit, or 279: 275: 268: 203:
network virtualization provides a so-called "network in a box" (see
626: 121:
External network virtualization combines or subdivides one or more
106: 482:"Slice Embedding Solutions for Distributed Service Architectures" 137:(LANs) into a single VLAN spanning segments of a large network. 178: 174: 462: 294: 264: 222: 480:
Esposito, Flavio; Matta, Ibrahim; Ishakian, Vatche (2011).
287: 328:
Network Virtualization using Generic Routing Encapsulation
337: 214: 156: 582: 402:
http://servicewave.eu/2010/joint-demonstration-evening/
213:
uses virtual machines to make a "network in a box" for
205:
OpenSolaris Network Virtualization and Resource Control
225:, either associated with or independent of a specific 129:
comprise the key components. Using this technology, a
82:
Network elements, such as firewalls and load balancers
479: 561: 244: 162:control programs, or pseudo-interfaces, such as a 655: 532: 36:Network virtualization is categorized as either 267:extensions of the hypervisor or either using a 33:, often combined with resource virtualization. 649:Network functions Virtualization(NFV) Benefits 79:, also known as network interface cards (NICs) 585:IEEE Communications Surveys & Tutorials 143: 116: 500: 430:IEEE Communications Surveys and Tutorials 669:Internet Protocol based network software 16:Combining resources into a single entity 427: 75:Network hardware, such as switches and 656: 564:Electronic Communications of the EASST 463:Victor Moreno and Kumar Reddy (2006). 308:Application performance engineering 239:application performance engineering 57:application performance engineering 13: 643:VMware Virtual Networking Concepts 473: 29:. Network virtualization involves 14: 680: 620: 232: 627:NetworkVirtualization.com | News 151:configures a single system with 323:Network function virtualization 245:Wireless network virtualization 149:Internal network virtualization 89:(VLANs) and containers such as 597:10.1109/SURV.2013.013013.00155 421: 393: 376: 253: 1: 369: 181:have built a virtual network 66: 547:10.1016/j.comnet.2009.10.017 467:. Indianapolis: Cisco Press. 417:10.1007/978-3-642-17694-4_39 388:10.1007/978-3-642-38082-2_12 261:network interface controller 227:network interface controller 7: 363:Software-defined networking 300: 169: 10: 685: 442:10.1109/COMST.2014.2352118 645:retrieved 26 October 2008 274:For example, in case of 211:Microsoft Virtual Server 193:(WAN) optimization, and 511:10.1145/2522968.2522974 358:Virtual private network 313:Hardware virtualization 144:Internal virtualization 117:External virtualization 105:Network media, such as 96:Network storage devices 42:internal virtualization 38:external virtualization 31:platform virtualization 465:Network Virtualization 348:Virtual Extensible LAN 23:network virtualization 629:retrieved 3 June 2008 489:ACM Computing Surveys 297:virtual accelerator. 195:secure sockets layer 131:system administrator 153:software containers 135:local area networks 123:local area networks 407:2014-07-31 at the 318:I/O virtualization 189:, branch repeater 85:Networks, such as 633:RAD VPLS Tutorial 535:Computer Networks 219:Microsoft Windows 191:wide area network 61:operating systems 676: 616: 579: 558: 529: 527: 525: 504: 486: 468: 454: 453: 425: 419: 397: 391: 380: 353:Virtual firewall 91:virtual machines 77:network adapters 53:software testing 684: 683: 679: 678: 677: 675: 674: 673: 654: 653: 623: 523: 521: 502:10.1.1.300.4425 484: 476: 474:Further reading 471: 458: 457: 426: 422: 409:Wayback Machine 398: 394: 381: 377: 372: 367: 343:Virtual circuit 333:Overlay network 303: 286:(OVS) with its 256: 247: 235: 172: 146: 119: 69: 27:virtual network 17: 12: 11: 5: 682: 672: 671: 666: 664:Virtualization 652: 651: 646: 640: 635: 630: 622: 621:External links 619: 618: 617: 580: 559: 541:(5): 862–876. 530: 475: 472: 470: 469: 459: 456: 455: 436:(1): 358–380. 420: 392: 374: 373: 371: 368: 366: 365: 360: 355: 350: 345: 340: 335: 330: 325: 320: 315: 310: 304: 302: 299: 255: 252: 246: 243: 234: 233:Use in testing 231: 183:protocol stack 171: 168: 145: 142: 127:network switch 118: 115: 114: 113: 103: 100: 97: 94: 83: 80: 68: 65: 21:In computing, 15: 9: 6: 4: 3: 2: 681: 670: 667: 665: 662: 661: 659: 650: 647: 644: 641: 639: 638:Types of VPNs 636: 634: 631: 628: 625: 624: 614: 610: 606: 602: 598: 594: 590: 586: 581: 577: 573: 569: 565: 560: 556: 552: 548: 544: 540: 536: 531: 520: 516: 512: 508: 503: 498: 494: 490: 483: 478: 477: 466: 461: 460: 451: 447: 443: 439: 435: 431: 424: 418: 414: 410: 406: 403: 396: 389: 385: 379: 375: 364: 361: 359: 356: 354: 351: 349: 346: 344: 341: 339: 336: 334: 331: 329: 326: 324: 321: 319: 316: 314: 311: 309: 306: 305: 298: 296: 292: 289: 285: 281: 277: 272: 270: 266: 262: 251: 242: 240: 230: 228: 224: 220: 216: 212: 208: 206: 202: 198: 196: 192: 188: 187:load balancer 184: 180: 176: 167: 165: 161: 158: 154: 150: 141: 138: 136: 132: 128: 124: 112: 111:Fibre Channel 108: 104: 101: 98: 95: 92: 88: 84: 81: 78: 74: 73: 72: 64: 62: 58: 54: 49: 47: 43: 39: 34: 32: 28: 24: 19: 588: 584: 567: 563: 538: 534: 522:. Retrieved 492: 488: 464: 433: 429: 423: 395: 378: 284:Open vSwitch 273: 263:(NIC) using 257: 248: 236: 209: 199: 173: 148: 147: 139: 120: 87:virtual LANs 70: 50: 41: 37: 35: 26: 22: 20: 18: 591:(4): 1–19. 495:(1): 1–29. 254:Performance 201:OpenSolaris 155:, such as 658:Categories 524:5 December 370:References 291:user space 160:hypervisor 67:Components 613:206584013 605:1553-877X 576:1863-2122 555:1389-1286 497:CiteSeerX 280:fast path 276:Openstack 269:fast path 570:: 1–12. 450:14838118 405:Archived 301:See also 170:Examples 107:Ethernet 519:2307120 229:(NIC). 611:  603:  574:  553:  517:  499:  448:  179:Vyatta 175:Citrix 46:server 609:S2CID 515:S2CID 485:(PDF) 446:S2CID 295:6WIND 265:SRIOV 223:Linux 197:VPN. 93:(VMs) 601:ISSN 572:ISSN 551:ISSN 526:2017 288:DPDK 177:and 164:VNIC 109:and 593:doi 543:doi 507:doi 438:doi 413:doi 384:doi 338:OVN 221:or 215:x86 207:). 157:Xen 51:In 660:: 607:. 599:. 589:15 587:. 568:17 566:. 549:. 539:54 537:. 513:. 505:. 493:46 491:. 487:. 444:. 434:17 432:. 63:. 48:. 615:. 595:: 578:. 557:. 545:: 528:. 509:: 452:. 440:: 415:: 390:. 386::

Index

platform virtualization
server
software testing
application performance engineering
operating systems
network adapters
virtual LANs
virtual machines
Ethernet
Fibre Channel
local area networks
network switch
system administrator
local area networks
software containers
Xen
hypervisor
VNIC
Citrix
Vyatta
protocol stack
load balancer
wide area network
secure sockets layer
OpenSolaris
OpenSolaris Network Virtualization and Resource Control
Microsoft Virtual Server
x86
Microsoft Windows
Linux

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑