Upload
ououououou
View
13
Download
3
Embed Size (px)
Citation preview
ISSN 2348-5426 International Journal of Advances in Science and Technology (IJAST)
www.sciencepublication.org
8
Network Virtualization and Application Areas Thiri The Wut Yee, Komwut Wipusitwarkun
Abstract— In the virtualization community, network
virtualization (NV) is the last step which will offer
symmetry in network and computing resource. On
account of its immediate benefits which can be offered
to the internetworking, it is appeared as the future
internet architecture. Accordingly, business
enterprises as well as academic both emphasize on that
trend and exploit NV as different application areas.
However, since it is new technology, the applicability
and advantages of NV over existing network are still
vague. Even many literatures did the survey about
NV; the application area is not covered thoroughly.
This article devotes to the better understanding of
network virtualization, the advantages and its
application areas.
Keywords application, ossification, network
virtualization.
I. INTRODUCTION
Network virtualization (NV) is a technology used to
combine computer network resources into a single
platform, known as a virtual network (VN). The
technology utilized is similar to the virtualization method
used to simulate virtual machines (VM) within physical
computers. Fundamentally, virtualization is an abstraction
concept that hides hardware details. In a correspondence
way, a VN treats all hardware and software in the network
as a single collection of resources, which can be accessed
regardless of physical boundaries i.e. geographical
locations.
The current internet is prone to the ossification
problems and the symptoms become clearer [1]. The
ossification has multiple causes. One of the issues is that
difficult to obtain consensus among multiple stakeholders.
Moreover, development of novel applications has taken
place at the edge of the network while the core network
remains almost untouched. For example, IPv4-IPv6
coexistence will postpone future network development
where global internet can be composed of IPv4-only,
IPv6-only, or dual-protocol stack sub networks which in
turn will stress current internet. In addition, existing
virtualized anything paradigm has moved data center
virtualization technique beyond to the servers and storage
systems and extended across the network. Thus, network
essentially requires as the same capacity, agility and
mobility characteristics as virtual machines (VM). The
typical solution is to create an abstract layer over existing
internet which can provide immediate as well as long-
term value-added services without affecting the existing
network architecture. The last and final concern is internet
connectivity, ubiquitous as well as pervasive computing
introduce infinite communication which is called Internet-
of-Things (IoT). Day by day, there are more objects and
devices which use internet and this immense
communication will become major issue for the future
internet.
As mentioned above, the fundamental purpose of NV is
to meet the changing demand of disruptive technologies
which become overburden to the current networking
architectures, protocols and devices. Specifically, VN
achieves the following network design principles.
Multiple virtual networks can coexist together on the
same physical infrastructure and diverse protocol suite i.e.
IPv4/IPv6 can be run seamlessly over existing network.
Responsibilities for operation and management of
network become simple via centralized administration
meanwhile VN improves scalability and workloads across
network.
The term VN has been coined since nearly two decades.
In the past, we have been witnessed the evolutionary trend
of network virtualization. Overlay network can be
considered as a virtual network. One example is IP-
network overlay is built on top of the telephony network
with the purpose to connect local area networks (LAN)
worldwide. Some overlay networks have also been
proposed as a way to improve internet routing, provide
better quality of service (QoS), security and multicasting
and mobility etc.
However, to become VN in reality, there are many new
research areas that are explicitly unexplored. Most of the
interests go for business perspective which means that
enterprise-level network virtualization such as Cisco,
IBM etc. becomes prominent. Hence, by examining the
existing as well as future applicable areas of VN, the
comprehensive feature of VN can be captured. Finally, we
intend to develop general, unified future network
architecture.
The rest of paper is organized as follows. Section 2 is
about the literature review of existing technologies of
network virtualization. Section 3 classifies the current
trends of network virtualization platform into three
categories: application areas, domain of networks and
network characteristics. Finally, conclusion remarks are
given in Section 4; along with some points of interests for
future work.
ISSN 2348-5426 International Journal of Advances in Science and Technology (IJAST)
www.sciencepublication.org
9
VII. LITERATURE REVIEW
This section examines the fundamental network
virtualization-related technologies that are already existed.
Those initiatives mainly try to develop the next generation
network based on the network virtualization concept.
VLAN is an incarnation of basic VN technology [2]. In
technical terms, the name VLAN or virtual LAN is a
broadcast domain created by switches i.e. which takes one
switch or one typical network and breaks it into multiple
networks. As the network grows, the number of
broadcasts naturally increases within the broadcast
domain. By putting VLAN, security boundary and
broadcast separation can be set logically even within the
campus network. Because VLANs are based on logical
instead of physical connections, it is very flexible for
user/host management, bandwidth allocation and resource
optimization. However, VLAN is a contained broadcast
domain which involves interoperability and scalability
issues.
Another type of VN is virtual private network or VPN.
VPN is a logical solution for remote access providing
secure communications over public telecommunication
network i.e. internet. VPN establishes logical channel to
transfer data across the internet reliably by tunnelling
mechanisms and cryptographic method. Generally,
tunnelling is process of placing the entire packet within
another packet and sending over the network via tunnel
interfaces. The IP security (IPSec) protocol is a suite of
protocols that secure data communications on the Internet
at the network layer, and it can be used to implement
VPN.VPN has important implications to underlying
internet such as packets can be sent using non-routable IP
address inside a packet that uses globally unique IP
address to extend the private network over the internet.
Moreover, a packet with unusual protocol which internet
does not support can be sent over the internet by VPN.
However, The IPsec access configuration is suffered from
non-standardization as the vendors have the liberty of
implementing the access requirements that are not
restrictive by a specific standard. Alternatively, the
general VPN is beyond QoS since adverse network
conditions that occur outside the private network cause
packet loss and other performance issues. In addition,
complex tunnel negotiation process brings high data
processing cost. [3]
The concepts of network programmability and software
defined networking (SDN) are pertinently related with
network virtualization. SDN means the programmability
in any part of the network. An active network has the
same concept in which the nodes are programmed to
perform custom operations on the packets that pass
through the node. SDN focuses on four key features such
as separation of the control plane from the data plane, a
centralized controller and view of the network, open
interfaces between the devices in the control plane
(controllers) and those in the data plane and
programmability of the network by external applications.
The main potential disadvantages of programmable
network are security, scalability, interoperability and
flexibility [4].
An overlay network is a layer of virtual network
topology on top of the physical network, which directly
interfaces to users. Overlay networks provide the
following advantages and opportunities to better utilize
the increasingly growing internet information and
resources such as overlay networks allow both
networking developers and application users to easily
design and implement their own communication
environment and protocols on top of the internet, such as
data routing and file sharing management. Additionally,
as long as the physical network connections exist; one
end-node can always communicate to another end-node
via overlay networks. Thus, scalability and robustness in
overlay networks are two attractive features [5].
Nonetheless, current overlay technologies are used for
application layer on top of IP layer and it is hard to isolate
overlay from the underlying internet which will in turn
prone to attack.
VIII. CLASSIFICATIONS OF
APPLICATION AREAS FOR
NETWORK VIRTUALIZATION
NV has been interested in business industries by means
of commercial products for years, while scientific
research became involved into this industry. At first,
research industry has treated NV as network testbed and
later the academic trend is changing from experiment to
the development of future internet. This section captures
the entire spectrum of NV into three main categories: VN
used for different application areas; VN applied in
different networks and VN deployed to achieve specific
network characteristics.
G. Network Virtualization in Different Application
Areas
In this section, the existing researches and projects
about applicability of NV are listed.
3) NV as Testbed
By enabling experimentation with new network
architecture, a virtual testbed provides immediate value to
the research community [1]. Besides, after experimenting
ISSN 2348-5426 International Journal of Advances in Science and Technology (IJAST)
www.sciencepublication.org
10
new services, VN testbeds can be immediately deployed
for the real services.
PlanetLab is an overlay testbed which provides new
service oriented; geographically distributed network
architecture. It was established in 2002 composed of 1090
dedicated PlanetLab nodes at 507 sites worldwide. Each
research project has a "slice", or virtual machine access to
a subset of the nodes [7]. Nonetheless, PlanetLab is just
an overlay because it is only a network of virtual
machines over a physical network even it has
management layer to control that overlay.
In [8], new virtualized network control plane oriented
architecture which allows infrastructure providers and
service providers to achieve service delivery
independently and transparently to end users is presented.
The objective is to provide current ISP infrastructures to
be able to support new services, such as heavy resource
consuming data center applications. Even though
distributed control plane architectures have been evolved,
re-creating of network for data centres is still
tremendously manual work. Meanwhile, IaaS architecture
can scale service delivery more flexible where complex
underlying services remain hidden inside the
infrastructure provider. Resources are allocated according
to user needs; hence the highest utilization and
optimization levels can be achieved. During the duration
of the service, the user owns and controls the
infrastructure as if he was the owner. Moreover, from the
ISP’s perspective, an IaaS solutions offers sliceability i.e.
different software versions can run on each slice without
disrupting the others, scalability of management and
service by decoupling services and the underlying
transport network.
Another experimental platform is VegaNet [2], which
serves as a testbed atop a production network, with an
emphasis on mirroring a consistent connectivity view of
the underlying physical production network in a timely
and accurate manner. Previously, experimental testbeds
could not mirror the connectivity view of the virtual
network with underlying physical network correctly. For
instance, if a physical link has failed, physical network
reacts to the link failure by rerouting and such topological
change of the physical network may not be immediately
exposed to the experimental testbed layered above. Thus,
the physical network and the experimental testbed will
have different connectivity views, leading to inaccurate
observations of network experiments. In VegaNet is a
network of software-based virtual routers which are
directly attached to a production router to seek to maintain
the same connectivity view as the production router. At a
high level, a VegaNet node allows different network
experiments to have their own routing protocols, network
services, and data/control planes since the resources of
VegaNet node are divided into slices. To achieve
connectivity consistency in an accurate and timely manner,
VegaNet proposed lightweight adaptive probing
algorithm in which each VegaNet node sends probes to its
neighbours, and determines immediately if there is any
connectivity failure or the failure is recovered.
VegaNet is only useful as a testbed for production
networks, the specialized deployment environments of
which may lead to unique characteristics as opposed to
NV; future internet architecture.
4) NV in Data Centers (SOA)
Data center applications are composed of both compute
and network resources. For the last decade, new
virtualization technology has become available for
powerful automation of that compute resources. That is,
server and storage virtualization technologies which offer
mobility, flexibility, higher overall throughput and lower
average power for mandating green data centers. Still,
there is one more step to virtualization which many
professionals overlooked i.e. the network. Network in
data centers probably does have a significant amount of
physical cabling which lead to server performance
bottleneck, unsaclablity, power exhaustion and lack of
mobility.
Network virtualization in the following literatures
introduces “do more with less” infrastructure to the data
center environment.
Accordingly, Md. Faizul Bari et al. [9] conducted a
comprehensive analysis of the advancement in data center
network virtualization and their future work. Since
virtualization of data center networks is still new and still
developing stage, most of the researches focus on the
basic functionalities of virtual network such as packet
forwarding, bandwidth allocation and multipath for load
balancing and fault-tolerance rather than management
concerns such as security, energy saving etc. Packet
forwarding is about making the decision to send packets
from one network segment to another by nodes in a
computer network based on unicast, broadcast or
multicast schemes. For the bandwidth management,
mechanism such as congestion control over IP-tunnel or
rate-limiting for all traffic traversing the link are deployed.
Moreover, load balancing can be achieved by using equal
cost multipath in layer 3 switches or creating VLAN to
distribute network traffic. According to those
functionalities, [9] surveyed a dozen of existing projects
regards to the data center networking technology. Then,
they evaluated the research works over performance
matric such as scalability, fault-tolerance, QoS support etc.
For the future research directions, they listed out some
proposals. Virtualized data centers at network edge can
bring efficiency improvements in communication.
ISSN 2348-5426 International Journal of Advances in Science and Technology (IJAST)
www.sciencepublication.org
11
Besides virtualizing the physical servers, several
resources such as router, switch and storage system can be
virtualized to meet the dynamic demands. Moreover,
decreasing the number of physical routers and switches
will create greener data center environment. Another
interesting area is software defined network (SDN)
concept. Providing network programmability with simple
API offers network isolation; allowing each virtual
network to be managed and evolved independently.
Furthermore, different level of security can be achieved
via virtualization of network and other computing
resources.
Among cloud service models, infrastructure-as-a-
service (IaaS) is gaining more and more customer interest
since it enables on-demand creation and deployment of
data centers with minimum operational cost and
complexity. However, IaaS solutions on the market do not
meet the QoS requirements for specific services such as
interactive multi-media applications. [10] presents
specific flow control concept to support QoS guaranteed
multiple, concurrently execution of services in IaaS
domain. In this paper, a virtualization overlay is
introduced to data center network for QoS management.
To manage network resource usage, services or
applications are run inside an isolated address space and
can be connected via tunnelling the virtual links. By using
ISONI eXchange Box (IXB) architecture, each virtual
link aggregates the transport connections of service
interactions with a certain QoS level. Virtual links are
mapped onto QoS classes of the partitioned
infrastructure’s transport network capabilities such as
maximum required bandwidth, maximum allowed delay,
and maximum allowed jitter etc. by the virtual network
manager. Meanwhile data center manager takes the intra-
network QoS control; for example best-effort network
traffic with each data center
5) NV and Disaster Recovery
An emergency management service for disaster
recovery can be constructed with heterogeneous networks
to address the crisis situation and adopt the network
according to real-time requirements. In this context, QoS
parameters as well as security are taken into consideration.
In [3], QoS aware heterogeneous network service
activation is proposed to maximize some QoS matrices
such as throughput, latency and bandwidth. In this case,
dedicated virtual links are used for different services. For
the security perspective in emergency service network,
each sub network is connected via VPN.
Another work [4] proposed wireless multihop access
network virtualization (WMANV) which provides
transparent Internet access during crisis as if they are
connected via conventional access points (APs) by using
commodity mobile devices or mobile nodes (MN). To
construct wireless multihop network during disaster,
network auto-configuration middleware (NAS) can be
deployed yet it is not always available in MNs which are
used as APs. In the proposed system, tree-structured
wireless access network is constructed within two steps.
Initially, any MN connects to the nearest software-defined
internet gateway which can forced that node to download
and install NAS. This middleware transforms the node
into programmable AP which bridges between internet
and nearby MNs. To realize this, every MN need dual
function such as station node to connect nearby AP and
programmable AP for other nodes and this can be
achieved by virtualized NIC. A single NIC in each MN is
virtualized into 2 NIC; one works as common station
mode and the other works in access mode. Nonetheless,
both approaches [3, 4] work within specific or constrained
environments. Moreover, the latter approach requires
appropriate storage space in MN for middleware
execution
6) NV and Cloud Computing
In simple terms, cloud computing gives the ability to
share computing resources using only the Internet access.
Fundamentally, it uses virtualization technology which
hides detailed physical infrastructure to users. Cloud
providers provide 3 main service models such as
Software-as-a-Service (SaaS), Platform-as-a-Service
(PaaS) and Infrastructure-as-a-Service (IaaS). However,
connectivity between these services has not received
much attention in the academic research. Thus, Network-
as-a-Service (NaaS) can be a solution to orchestrate with
multi-provider cloud services. One of the attempts is [11]
which proposed the network virtualization platform (NVP)
which is called network resource provisioning system as
the mediation layer able to provide NaaS to cloud
computing by exploiting the functionality provided by
control plane enabled networks. NVP is logically placed
at the same abstraction level of cloud virtualization
platform, and it accepts on-demand NaaS requests from
the user via a dedicated interface. The resulting NaaS
abstraction is a class of virtualized connectivity services
to end users at different levels of QoS criteria. To provide
these services, NVP uses decentralized signaling
approaches for the automatic collection of the network
information such as topology and QoS etc. at regular
intervals between the distributed entities (Des) that
directly control the control plane of the network APs.
Another approach [12] focuses on service provider
perspective. It classified the cloud computing IT resources
as three actors each of which plays a different role: the
Physical Infrastructure Provider (PIP), the Virtual
Infrastructure Provider (VIP) and the Virtual
ISSN 2348-5426 International Journal of Advances in Science and Technology (IJAST)
www.sciencepublication.org
12
Infrastructure Operator (VIO). From a bottom-up
perspective, the physical infrastructure is provided by the
PIP, which is virtualized by the VIP, and which is finally
operated by the VIO. From network infrastructure point
of view, different types of virtual elements are defined
such as virtual hosts (vhost) which is run as virtual
machine via VMware or Xen software, virtual nodes
(vnode) which comprises virtual ports (vports) and
forwarding tables and virtual links (vlink) which is
defined by the two vports that are directly connected at a
virtual level. Each physical resource from the PIP
(Physical Infrastructure Provider) is mapped to one or
more of these virtual elements at the VIP (Virtual
Infrastructure Provider) level. The paper also proposed
layer 2 virtual MAC addressing scheme for network
virtualization
7) NV for Critical Applications
Current large-scale communication network; Internet
cannot be deployed for critical applications because of
their particular requirements such as security,
management complexity, continuous communication,
dynamic interactive response etc. On the other hand, end-
users of such systems can be non-technician or they have
limited time to handle network configuration on their
devices. One technical solution is network virtualization.
By creating a small and secure logical overlay networks
over Internet, the underlying base network can be shielded
and become trusted environment for their participants.
Enhancing them with ad hoc protocols and techniques can
result in self-creating, self-organizing and self-
administering communities on top of existing network
infrastructures, drastically reducing complexity. This
integrated approach makes the existing platform
applicable in critical applications area such as healthcare,
personal networking and emergency applications and
tactical network.
In [6], a virtual private ad-hoc network is established
between members that have a common trust relationship
by establishing private-public key certificates and user
profiles. Despite of scalability, VPAN can fulfill the need
for secure communication between a variety of critical
services and applications.
Accordingly, [13] focused on the use of network
virtualization technique to address the restricts of military
communication in traditional network and proposes the
routing mechanism based on the multi-level of security
for tactical network
H. Network Virtualization in Different Networks
1) Sensor Network
Among NV literatures, the virtualization of wireless
sensor network is a brand new research approach. With
the advancement of the Internet of Things (IoT) and IPv6
communication over low-power and low-cost sensor
nodes, it is very difficult to build large-scale sensor
networks using different types of sensor nodes for
scalability, flexibility, management cost. In this case,
virtualized of wireless sensor network (VWSN) can
provide the separation of the function for the traditional
WSNs service provider into sensor infrastructure provider
(SInP) that manages the physical sensor infrastructure and
sensor virtualization network service provider (SVNSP)
that develops the VSN by aggregating resources from
multiple SInPs and offers services to the application level
users. Since most of the sensor nodes remain idle for the
maximum periods of its lifetime, VWSN is one of the best
ways to utilize the physical sensor node resources
efficiently [14]. Moreover, by allowing heterogeneous
sensor nodes in WSNs to coexist on a shared physical
sensor substrate, virtualization in sensor network may
provide flexibility, cost effective solutions, promote
diversity, ensure security and increase manageability.
In [14], it pointed out that the real world deployments
of WSNs have been tailor-made solutions where
applications are bundled with a WSN at the time of
deployment with no possibility for other applications to
re-use the deployed WSN. Only VWSN can provide a
platform independent WSN framework with dynamic
resource discovery, middleware independent overlay
protocol for signalling, resource reservation and
management.
However, several issues are needed to be pay
attentions including a publication and discovery
framework to allow different actors, including sensors, to
publish and discover on the fly. Another issue is the need
for middleware-independent overlay protocols. The final
issue is that energy-efficient signalling and signal
processing framework must be deployed.
2) Wireless Network
One of the challenging features for future networks
will be the handling of the predicted increase in mobile
traffic volume in terms of voice as well as data traffic.
This situation leads to focus on virtualizing mobile
communication systems so that multiple operators can
share the same physical resources while being able to stay
isolated from each other. Major application areas of NV
in wireless network are network sharing and combined
control.
For instance, to connect two enterprise networks of
different network types on one physical substrate, each of
the separate networks could be implemented as a virtual
network, which in this way could still be controlled
independently. In addition, virtual network slices are used
to create testing space in order to develop new network-
wide protocols; or to compartmentalize and isolate certain
ISSN 2348-5426 International Journal of Advances in Science and Technology (IJAST)
www.sciencepublication.org
13
types of user traffic. [15] Another research work [16] used
virtualized LTE based station in which the virtualized
hypervisor is also responsible for allocating the LTE
spectrum between the different virtual LTE enhanced
nodes.
NV can also bring benefits to radio access networks
(RAN). By using software-defined radio network,
wireless base-station could flexibly adapt radios to
different standards based on shifts and user demands
which is a solution to mitigate the mobile broadband
coverage gap [17].
I. Network Virtualization with Specific Network
Characteristics
1) Security
Current diversified network is dealing with appearance
of new services which have different network
requirements (such as bandwidth and latency) and traffic
behaviours (such as security, reliability, and mobility). In
this case, with the abstraction of the virtual network from
physical devices, NV will facilitate to set the dynamic
policies which can be enforced seamlessly to each virtual
environment. For example, VN can be created to support
services that require only occasional transmission of a few
bytes of data, services that require high bandwidth, or
services that require interactive delay, or services that
allow intermittent data transmission and result in very
large delay.
2) Energy Awareness
Network-level environmental awareness is another
characteristic of NV technology offered. Important issue
for the green network is how to provide customer demand
within minimum communication. Alternatively, existing
bandwidth spectrum can be shared among innovative
applications over the internet. With the efficient
scheduling VN, network can be shared fairly among
multiple services irrespective of QoS requirements.
Moreover, virtualized forwarding plane can reduce the
power-consumption devices and hence energy used per
bits can be decreased.
IX. CONCLUSIONS
Simply, network virtualization is a technique to create
an abstraction of networking resources which can make
network control and management problems easier for any
working environment. Many researchers pointed out that
virtualizing network elements (nodes and links) can
realize certain benefits. Furthermore, sharing and isolation
of network bandwidth makes the underlying network
more flexible, secure and scalable. However, since it is
relatively a new research topic, there is no general
architecture or framework that can guarantee these
benefits nor be adapted as future internet technology.
Meanwhile, some researchers emphasize on practical
application areas of VN. Some papers proposed that NV
can be useful as networking testbeds or value-added
overlays on top of the existing networks i.e. wired or
wireless networks. At the same time, some research
explored innovative applications areas such as disaster
recovery, critical and emergency applications. In this
paper, distinct application areas of network virtualization
are reviewed. The purpose as well as our future research
goal is from the big picture of how NV is implemented in
different application domains, general yet flexible future
internet architecture can be constructed through network
virtualization.
REFERENCES
[1] J. S. Turner and D. E. Taylor, “Diversifying the
Internet,” in IEEE Global Telecommunications
Conference, 2005. GLOBECOM ’05, 2005, vol. 2,
p. 6 pp.–760.
[2] M. Xu, Q. Li, P. P. C. Lee, Y. Peng, and J. Wu,
“VegaNet: a Virtualized Experimentation Platform
for Production Networks with Connectivity
Consistency,” IEEE Netw., vol. 26, no. 5, pp. 15–21,
2012.
[3] C. Subramaniam, J. Gokulakrishnan, D. Jitendra
Kumar Jain, and U. Mohan Bharathy, “Network
Virtualization for Emergency Management
Services,” in the proceeding of 2010 International
Conference on Multimedia Communications
(Mediacom), 2010, pp. 67–70.
[4] Q. T. Minh, K. Nguyen, and S. Yamada,
“Virtualized Multihop Access Networks for
Disaster Recovery,” in World of Wireless, Mobile
and Multimedia Networks (WoWMoM), 2013 IEEE
14th International Symposium and Workshops on a,
2013, pp. 1–6.
[5] G. Rosenbaum, W. Lau, and S. Jha, “Recent
Directions in Virtual Private Network Solutions,” in
the proceeding of 11th IEEE International
Conference on Networks, 2003. ICON2003, 2003,
pp. 217–223.
[6] P. Dedecker, J. Hoebeke, I. Moerman, J. Moreau,
and P. Demeester, “Network Virtualization as an
Integrated Solution for Emergency Communication,”
ISSN 2348-5426 International Journal of Advances in Science and Technology (IJAST)
www.sciencepublication.org
14
Telecommun. Syst., vol. 52, no. 4, pp. 1859–1876,
Apr. 2013.
[7] B. Chun, D. Culler, T. Roscoe, A. Bavier, L.
Peterson, M. Wawrzoniak, and M. Bowman,
“PlanetLab: an Overlay Testbed for Broad-
coverage Services,” SIGCOMM Comput Commun
Rev, vol. 33, no. 3, pp. 3–12, Jul. 2003.
[8] K.-K. Nguyen, M. Cheriet, and M. Lemay,
“Enabling Infrastructure as a Service (IaaS) on IP
Networks: from Distributed to Virtualized Control
Plane,” IEEE Commun. Mag., vol. 51, no. 1, pp.
136–144, 2013.
[9] M. F. Bari, R. Boutaba, R. Esteves, L. Z. Granville,
M. Podlesny, M. G. Rabbani, Q. Zhang, and M. F.
Zhani, “Data Center Network Virtualization: A
Survey,” IEEE Commun. Surv. Tutor., vol. 15, no. 2,
pp. 909–928, 2013.
[10] T. Voith, K. Oberle, and M. Stein, “Quality of
Service Provisioning for Distributed Data Center
Inter-connectivity Enabled by Network
Virtualization,” Future Gener. Comput. Syst., vol.
28, no. 3, pp. 554–562, Mar. 2012.
[11] F. Baroncelli, B. Martini, and P. Castoldi,
“Network Virtualization for Cloud Computing,”
Ann. Telecommun. - Ann. Télécommunications, vol.
65, no. 11–12, pp. 713–721, Dec. 2010.
[12] J. Matias, E. Jacob, D. Sanchez, and Y. Demchenko,
“An OpenFlow Based Network Virtualization
Framework for the Cloud,” in 2011 IEEE Third
International Conference on Cloud Computing
Technology and Science (CloudCom), 2011, pp.
672–678.
[13] J. Kerdsri and K. Wipusitwarkun, “Data-wise
Routing in Virtualization Environment (DRIVE)
with multiple level of security for tactical network,”
in 2012 IEEE/SICE International Symposium on
System Integration (SII), 2012, pp. 933–938.
[14] I. Khan, “Design and analysis of virtualization
framework for Wireless Sensor Networks,” in
World of Wireless, Mobile and Multimedia
Networks (WoWMoM), 2013 IEEE 14th
International Symposium and Workshops on a,
2013, pp. 1–2.
[15] M. Hoffmann and M. Staufer, “Network
Virtualization for Future Mobile Networks: General
Architecture and Applications,” in 2011 IEEE
International Conference on Communications
Workshops (ICC), 2011, pp. 1–5.
[16] Y. Zaki, L. Zhao, C. Goerg, and A. Timm-Giel,
“LTE mobile network virtualization,” Mob Netw
Appl, vol. 16, no. 4, pp. 424–432, Aug. 2011.
[17] X. Costa-Perez, J. Swetina, T. Guo, R. Mahindra,
and S. Rangarajan, “Radio Access Network
Virtualization for Future Mobile Carrier Networks,”
IEEE Commun. Mag., vol. 51, no. 7, pp. 27–35,
2013.
Thiri The Wut Yee
She got Bachelor of Computer
Science (B.C.Sc) and Master of
Computer Science (M.C.Sc) in
Computer Science major from the
University of Computer Studies,
Yangon (UCSY), Myanmar during
2004 and 2009 respectively. She
has been working as a government
employee from Ministry of
Science and Technology (MOST), Republic of the Union
of Myanmar since 2007. She has over six years teaching
experience in IT subjects by working as a tutor at UCSY.
She was also a member from Mobile and Web Computing
Lab (MWC Lab) at UCSY and did research about mobile
computing. She got a publication from 7th
International Networked Computing and Advanced
Information Management Conference (NCM2011) .
Currently, she attend PhD candidate at Sirindhorn
International Institute of Technology (SIIT), Thammasat
University. Her current field of interest is future
internetworking and network virtualization.
Assoc. Prof. Komwut Wipusitwarakun
He was graduated B.Eng. (Honors)
in Electrical Engineering, at
Chulalongkorn University,
Thailand, M.Eng. in
Communication Engineering, and
Ph.D. degree in Communication
Engineering, Osaka University,
Osaka, Japan respectively. His
faculty areas are mobile
computing, internet and computer
networking. He did supervise many students in different
network fields including wireless mesh networks,
heterogeneous internetworking, active networks, mobile
agents, overlay service networks, self-healing networks,
cross-layer protocol design and analysis. He got over 30
science citations high impact factor journal publications.
Now, he is working as System Manager of Computer
Center, at the School of Information, Computer, and
Communication Technology (ICT), Sirindhorn
International Institute of Technology (SIIT), Thammasat
University