250:
providers, wireless network virtualization needs the physical wireless infrastructure and radio resources to be abstracted and isolated to a number of virtual resources, which then can be offered to different service providers. In other words, virtualization, regardless of wired or wireless networks, can be considered as a process splitting the entire network system. However, the distinctive properties of the wireless environment, in terms of time-various channels, attenuation, mobility, broadcast, etc., make the problem more complicated. Furthermore, wireless network virtualization depends on specific access technologies, and wireless network contains much more access technologies compared to wired network virtualization and each access technology has its particular characteristics, which makes convergence, sharing and abstraction difficult to achieve. Therefore, it may be inaccurate to consider wireless network virtualization as a subset of network virtualization.
59:, network virtualization enables developers to emulate connections between applications, services, dependencies, and end users in a test environment without having to physically test the software on all possible hardware or system software. The validity of the test depends on the accuracy of the network virtualization in emulating real hardware and
258:
Until 1 Gbit/s networks, network virtualization was not suffering from the overhead of the software layers or hypervisor layers providing the interconnects. With the rise of high bandwidth, 10 Gbit/s and beyond, the rates of packets exceed the capabilities of processing of the networking
249:
Wireless network virtualization can have a very broad scope ranging from spectrum sharing, infrastructure virtualization, to air interface virtualization. Similar to wired network virtualization, in which physical infrastructure owned by one or more providers can be shared among multiple service
399:
A. Galis, S. Clayman, A. Fischer, A. Paler, Y. Al-Hazmi, H. De Meer, A. Cheniour, O. Mornard, J. Patrick Gelas and L. Lefevre, et al. "Future
Internet Management Platforms for Network Virtualisation and Service Clouds"- ServiceWave 2010, December 2010,
278:, network is provided by Neutron which leverages many features from the Linux kernel for networking: iptables, iproute2, L2 bridge, L3 routing or OVS. Since the Linux kernel cannot sustain the 10G packet rate, then some bypass technologies for a
259:
stacks. In order to keep offering high throughput processing, some combinations of software and hardware helpers are deployed in the so-called "network in a box" associated with either a hardware-dependent
55:, software developers use network virtualization to test software which are under development in a simulation of the network environments in which the software is intended to operate. As a component of
140:
External network virtualization is envisioned to be placed in the middle of the network stack and help integrating different architectures proposed for next generation networks.
327:
163:
166:, to emulate a physical network with software. This can improve a single system's efficiency by isolating applications to separate containers or pseudo-interfaces.
204:
133:
can configure systems physically attached to the same local network into separate virtual networks. Conversely, an administrator can combine systems on separate
382:
P. Martinez-Julia, A. F. Skarmeta, A. Galis. "Towards a Secure
Network Virtualization Architecture for the Future Internet" Future Internet Assembly, 2013,
668:
25:
is the process of combining hardware and software network resources and network functionality into a single, software-based administrative entity, a
583:
Fischer, Andreas; Botero, Juan Felipe; Beck, Michael Till; de Meer, Hermann; Hesselbach, Xavier (2013). "Virtual
Network Embedding: A Survey".
241:, network virtualization enables emulation of connections between applications, services, dependencies, and end users for software testing.
637:
404:
152:
237:
Network virtualization may be used in application development and testing to mimic real-world hardware and system software. In
125:(LANs) into virtual networks to improve a large network's or data center's efficiency. A virtual local area network (VLAN) and
307:
238:
56:
562:
Berl, Andreas; Fischer, Andreas; de Meer, Hermann (2009). "Using System
Virtualization to Create Virtualized Networks".
322:
428:
Liang, C.; Yu, F. R. (2015). "Wireless
Network Virtualization: A Survey, Some Research Issues and Challenges".
411:
and in "Towards A Service-Based
Internet" Lecture Notes in Computer Science, 2010, Volume 6481/2010, 235-237,
260:
226:
362:
71:
Various equipment and software vendors offer network virtualization by combining any of the following:
501:
481:
210:
194:
642:
663:
357:
312:
30:
496:
347:
533:
Chowdhury, N.M. Mosharaf Kabir; Boutaba, Raouf (2010). "A survey of network virtualization".
282:
are used. The main bypass technologies are either based on a limited set of features such as
130:
401:
8:
608:
514:
445:
317:
134:
122:
45:
612:
600:
571:
550:
218:
190:
102:
Network mobile elements, such as laptop computers, tablet computers, and smartphones
449:
648:
632:
596:
592:
542:
518:
506:
437:
412:
383:
352:
60:
52:
293:
implementation or based on a full feature and offload of Linux processing such as
44:, providing network-like functionality to software containers on a single network
546:
416:
408:
387:
342:
332:
90:
76:
185:
combining Vyatta's routing, firewall, and VPN functions with Citrix's
Netscaler
441:
182:
126:
271:
technology between the NIC and the payloads (virtual machines or containers).
657:
604:
575:
554:
186:
110:
510:
283:
200:
86:
290:
217:
systems. These containers can run different operating systems, such as
159:
99:
Network machine-to-machine elements, such as telecommunications devices
40:, combining many networks or parts of networks into a virtual unit, or
279:
275:
268:
203:
network virtualization provides a so-called "network in a box" (see
626:
121:
External network virtualization combines or subdivides one or more
106:
482:"Slice Embedding Solutions for Distributed Service Architectures"
137:(LANs) into a single VLAN spanning segments of a large network.
178:
174:
462:
294:
264:
222:
480:
Esposito, Flavio; Matta, Ibrahim; Ishakian, Vatche (2011).
287:
328:
337:
214:
156:
582:
402:
http://servicewave.eu/2010/joint-demonstration-evening/
213:
uses virtual machines to make a "network in a box" for
205:
OpenSolaris
Network Virtualization and Resource Control
225:, either associated with or independent of a specific
129:
comprise the key components. Using this technology, a
82:
Network elements, such as firewalls and load balancers
479:
561:
244:
162:control programs, or pseudo-interfaces, such as a
655:
532:
36:Network virtualization is categorized as either
267:extensions of the hypervisor or either using a
33:, often combined with resource virtualization.
649:Network functions Virtualization(NFV) Benefits
79:, also known as network interface cards (NICs)
585:IEEE Communications Surveys & Tutorials
143:
116:
500:
430:IEEE Communications Surveys and Tutorials
669:Internet Protocol based network software
16:Combining resources into a single entity
427:
75:Network hardware, such as switches and
656:
564:Electronic Communications of the EASST
463:Victor Moreno and Kumar Reddy (2006).
308:Application performance engineering
239:application performance engineering
57:application performance engineering
13:
643:VMware Virtual Networking Concepts
473:
29:. Network virtualization involves
14:
680:
620:
232:
627:NetworkVirtualization.com | News
151:configures a single system with
323:Network function virtualization
245:Wireless network virtualization
149:Internal network virtualization
89:(VLANs) and containers such as
597:10.1109/SURV.2013.013013.00155
421:
393:
376:
253:
1:
369:
181:have built a virtual network
66:
547:10.1016/j.comnet.2009.10.017
467:. Indianapolis: Cisco Press.
417:10.1007/978-3-642-17694-4_39
388:10.1007/978-3-642-38082-2_12
261:network interface controller
227:network interface controller
7:
363:Software-defined networking
300:
169:
10:
685:
442:10.1109/COMST.2014.2352118
645:retrieved 26 October 2008
274:For example, in case of
211:Microsoft Virtual Server
193:(WAN) optimization, and
511:10.1145/2522968.2522974
358:Virtual private network
313:Hardware virtualization
144:Internal virtualization
117:External virtualization
105:Network media, such as
96:Network storage devices
42:internal virtualization
38:external virtualization
31:platform virtualization
465:Network Virtualization
348:Virtual Extensible LAN
23:network virtualization
629:retrieved 3 June 2008
489:ACM Computing Surveys
297:virtual accelerator.
195:secure sockets layer
131:system administrator
153:software containers
135:local area networks
123:local area networks
407:2014-07-31 at the
318:I/O virtualization
189:, branch repeater
85:Networks, such as
633:RAD VPLS Tutorial
535:Computer Networks
219:Microsoft Windows
191:wide area network
61:operating systems
676:
616:
579:
558:
529:
527:
525:
504:
486:
468:
454:
453:
425:
419:
397:
391:
380:
353:Virtual firewall
91:virtual machines
77:network adapters
53:software testing
684:
683:
679:
678:
677:
675:
674:
673:
654:
653:
623:
523:
521:
502:10.1.1.300.4425
484:
476:
474:Further reading
471:
458:
457:
426:
422:
409:Wayback Machine
398:
394:
381:
377:
372:
367:
343:Virtual circuit
333:Overlay network
303:
286:(OVS) with its
256:
247:
235:
172:
146:
119:
69:
27:virtual network
17:
12:
11:
5:
682:
672:
671:
666:
664:Virtualization
652:
651:
646:
640:
635:
630:
622:
621:External links
619:
618:
617:
580:
559:
541:(5): 862–876.
530:
475:
472:
470:
469:
459:
456:
455:
436:(1): 358–380.
420:
392:
374:
373:
371:
368:
366:
365:
360:
355:
350:
345:
340:
335:
330:
325:
320:
315:
310:
304:
302:
299:
255:
252:
246:
243:
234:
233:Use in testing
231:
183:protocol stack
171:
168:
145:
142:
127:network switch
118:
115:
114:
113:
103:
100:
97:
94:
83:
80:
68:
65:
21:In computing,
15:
9:
6:
4:
3:
2:
681:
670:
667:
665:
662:
661:
659:
650:
647:
644:
641:
639:
638:Types of VPNs
636:
634:
631:
628:
625:
624:
614:
610:
606:
602:
598:
594:
590:
586:
581:
577:
573:
569:
565:
560:
556:
552:
548:
544:
540:
536:
531:
520:
516:
512:
508:
503:
498:
494:
490:
483:
478:
477:
466:
461:
460:
451:
447:
443:
439:
435:
431:
424:
418:
414:
410:
406:
403:
396:
389:
385:
379:
375:
364:
361:
359:
356:
354:
351:
349:
346:
344:
341:
339:
336:
334:
331:
329:
326:
324:
321:
319:
316:
314:
311:
309:
306:
305:
298:
296:
292:
289:
285:
281:
277:
272:
270:
266:
262:
251:
242:
240:
230:
228:
224:
220:
216:
212:
208:
206:
202:
198:
196:
192:
188:
187:load balancer
184:
180:
176:
167:
165:
161:
158:
154:
150:
141:
138:
136:
132:
128:
124:
112:
111:Fibre Channel
108:
104:
101:
98:
95:
92:
88:
84:
81:
78:
74:
73:
72:
64:
62:
58:
54:
49:
47:
43:
39:
34:
32:
28:
24:
19:
588:
584:
567:
563:
538:
534:
522:. Retrieved
492:
488:
464:
433:
429:
423:
395:
378:
284:Open vSwitch
273:
263:(NIC) using
257:
248:
236:
209:
199:
173:
148:
147:
139:
120:
87:virtual LANs
70:
50:
41:
37:
35:
26:
22:
20:
18:
591:(4): 1–19.
495:(1): 1–29.
254:Performance
201:OpenSolaris
155:, such as
658:Categories
524:5 December
370:References
291:user space
160:hypervisor
67:Components
613:206584013
605:1553-877X
576:1863-2122
555:1389-1286
497:CiteSeerX
280:fast path
276:Openstack
269:fast path
570:: 1–12.
450:14838118
405:Archived
301:See also
170:Examples
107:Ethernet
519:2307120
229:(NIC).
611:
603:
574:
553:
517:
499:
448:
179:Vyatta
175:Citrix
46:server
609:S2CID
515:S2CID
485:(PDF)
446:S2CID
295:6WIND
265:SRIOV
223:Linux
197:VPN.
93:(VMs)
601:ISSN
572:ISSN
551:ISSN
526:2017
288:DPDK
177:and
164:VNIC
109:and
593:doi
543:doi
507:doi
438:doi
413:doi
384:doi
338:OVN
221:or
215:x86
207:).
157:Xen
51:In
660::
607:.
599:.
589:15
587:.
568:17
566:.
549:.
539:54
537:.
513:.
505:.
493:46
491:.
487:.
444:.
434:17
432:.
63:.
48:.
615:.
595::
578:.
557:.
545::
528:.
509::
452:.
440::
415::
390:.
386::
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.