7
ISSN 2348-5426 International Journal of Advances in Science and Technology (IJAST) www.sciencepublication.org 8 Network Virtualization and Application Areas Thiri The Wut Yee, Komwut Wipusitwarkun [email protected] AbstractIn the virtualization community, network virtualization (NV) is the last step which will offer symmetry in network and computing resource. On account of its immediate benefits which can be offered to the internetworking, it is appeared as the future internet architecture. Accordingly, business enterprises as well as academic both emphasize on that trend and exploit NV as different application areas. However, since it is new technology, the applicability and advantages of NV over existing network are still vague. Even many literatures did the survey about NV; the application area is not covered thoroughly. This article devotes to the better understanding of network virtualization, the advantages and its application areas. Keywords application, ossification, network virtualization. I. INTRODUCTION Network virtualization (NV) is a technology used to combine computer network resources into a single platform, known as a virtual network (VN). The technology utilized is similar to the virtualization method used to simulate virtual machines (VM) within physical computers. Fundamentally, virtualization is an abstraction concept that hides hardware details. In a correspondence way, a VN treats all hardware and software in the network as a single collection of resources, which can be accessed regardless of physical boundaries i.e. geographical locations. The current internet is prone to the ossification problems and the symptoms become clearer [1]. The ossification has multiple causes. One of the issues is that difficult to obtain consensus among multiple stakeholders. Moreover, development of novel applications has taken place at the edge of the network while the core network remains almost untouched. For example, IPv4-IPv6 coexistence will postpone future network development where global internet can be composed of IPv4-only, IPv6-only, or dual-protocol stack sub networks which in turn will stress current internet. In addition, existing virtualized anything paradigm has moved data center virtualization technique beyond to the servers and storage systems and extended across the network. Thus, network essentially requires as the same capacity, agility and mobility characteristics as virtual machines (VM). The typical solution is to create an abstract layer over existing internet which can provide immediate as well as long- term value-added services without affecting the existing network architecture. The last and final concern is internet connectivity, ubiquitous as well as pervasive computing introduce infinite communication which is called Internet- of-Things (IoT). Day by day, there are more objects and devices which use internet and this immense communication will become major issue for the future internet. As mentioned above, the fundamental purpose of NV is to meet the changing demand of disruptive technologies which become overburden to the current networking architectures, protocols and devices. Specifically, VN achieves the following network design principles. Multiple virtual networks can coexist together on the same physical infrastructure and diverse protocol suite i.e. IPv4/IPv6 can be run seamlessly over existing network. Responsibilities for operation and management of network become simple via centralized administration meanwhile VN improves scalability and workloads across network. The term VN has been coined since nearly two decades. In the past, we have been witnessed the evolutionary trend of network virtualization. Overlay network can be considered as a virtual network. One example is IP- network overlay is built on top of the telephony network with the purpose to connect local area networks (LAN) worldwide. Some overlay networks have also been proposed as a way to improve internet routing, provide better quality of service (QoS), security and multicasting and mobility etc. However, to become VN in reality, there are many new research areas that are explicitly unexplored. Most of the interests go for business perspective which means that enterprise-level network virtualization such as Cisco, IBM etc. becomes prominent. Hence, by examining the existing as well as future applicable areas of VN, the comprehensive feature of VN can be captured. Finally, we intend to develop general, unified future network architecture. The rest of paper is organized as follows. Section 2 is about the literature review of existing technologies of network virtualization. Section 3 classifies the current trends of network virtualization platform into three categories: application areas, domain of networks and network characteristics. Finally, conclusion remarks are given in Section 4; along with some points of interests for future work.

Network Virtualization and Application Areas.pdf

Embed Size (px)

Citation preview

Page 1: Network Virtualization and Application Areas.pdf

ISSN 2348-5426 International Journal of Advances in Science and Technology (IJAST)

www.sciencepublication.org

8

Network Virtualization and Application Areas Thiri The Wut Yee, Komwut Wipusitwarkun

[email protected]

Abstract— In the virtualization community, network

virtualization (NV) is the last step which will offer

symmetry in network and computing resource. On

account of its immediate benefits which can be offered

to the internetworking, it is appeared as the future

internet architecture. Accordingly, business

enterprises as well as academic both emphasize on that

trend and exploit NV as different application areas.

However, since it is new technology, the applicability

and advantages of NV over existing network are still

vague. Even many literatures did the survey about

NV; the application area is not covered thoroughly.

This article devotes to the better understanding of

network virtualization, the advantages and its

application areas.

Keywords application, ossification, network

virtualization.

I. INTRODUCTION

Network virtualization (NV) is a technology used to

combine computer network resources into a single

platform, known as a virtual network (VN). The

technology utilized is similar to the virtualization method

used to simulate virtual machines (VM) within physical

computers. Fundamentally, virtualization is an abstraction

concept that hides hardware details. In a correspondence

way, a VN treats all hardware and software in the network

as a single collection of resources, which can be accessed

regardless of physical boundaries i.e. geographical

locations.

The current internet is prone to the ossification

problems and the symptoms become clearer [1]. The

ossification has multiple causes. One of the issues is that

difficult to obtain consensus among multiple stakeholders.

Moreover, development of novel applications has taken

place at the edge of the network while the core network

remains almost untouched. For example, IPv4-IPv6

coexistence will postpone future network development

where global internet can be composed of IPv4-only,

IPv6-only, or dual-protocol stack sub networks which in

turn will stress current internet. In addition, existing

virtualized anything paradigm has moved data center

virtualization technique beyond to the servers and storage

systems and extended across the network. Thus, network

essentially requires as the same capacity, agility and

mobility characteristics as virtual machines (VM). The

typical solution is to create an abstract layer over existing

internet which can provide immediate as well as long-

term value-added services without affecting the existing

network architecture. The last and final concern is internet

connectivity, ubiquitous as well as pervasive computing

introduce infinite communication which is called Internet-

of-Things (IoT). Day by day, there are more objects and

devices which use internet and this immense

communication will become major issue for the future

internet.

As mentioned above, the fundamental purpose of NV is

to meet the changing demand of disruptive technologies

which become overburden to the current networking

architectures, protocols and devices. Specifically, VN

achieves the following network design principles.

Multiple virtual networks can coexist together on the

same physical infrastructure and diverse protocol suite i.e.

IPv4/IPv6 can be run seamlessly over existing network.

Responsibilities for operation and management of

network become simple via centralized administration

meanwhile VN improves scalability and workloads across

network.

The term VN has been coined since nearly two decades.

In the past, we have been witnessed the evolutionary trend

of network virtualization. Overlay network can be

considered as a virtual network. One example is IP-

network overlay is built on top of the telephony network

with the purpose to connect local area networks (LAN)

worldwide. Some overlay networks have also been

proposed as a way to improve internet routing, provide

better quality of service (QoS), security and multicasting

and mobility etc.

However, to become VN in reality, there are many new

research areas that are explicitly unexplored. Most of the

interests go for business perspective which means that

enterprise-level network virtualization such as Cisco,

IBM etc. becomes prominent. Hence, by examining the

existing as well as future applicable areas of VN, the

comprehensive feature of VN can be captured. Finally, we

intend to develop general, unified future network

architecture.

The rest of paper is organized as follows. Section 2 is

about the literature review of existing technologies of

network virtualization. Section 3 classifies the current

trends of network virtualization platform into three

categories: application areas, domain of networks and

network characteristics. Finally, conclusion remarks are

given in Section 4; along with some points of interests for

future work.

Page 2: Network Virtualization and Application Areas.pdf

ISSN 2348-5426 International Journal of Advances in Science and Technology (IJAST)

www.sciencepublication.org

9

VII. LITERATURE REVIEW

This section examines the fundamental network

virtualization-related technologies that are already existed.

Those initiatives mainly try to develop the next generation

network based on the network virtualization concept.

VLAN is an incarnation of basic VN technology [2]. In

technical terms, the name VLAN or virtual LAN is a

broadcast domain created by switches i.e. which takes one

switch or one typical network and breaks it into multiple

networks. As the network grows, the number of

broadcasts naturally increases within the broadcast

domain. By putting VLAN, security boundary and

broadcast separation can be set logically even within the

campus network. Because VLANs are based on logical

instead of physical connections, it is very flexible for

user/host management, bandwidth allocation and resource

optimization. However, VLAN is a contained broadcast

domain which involves interoperability and scalability

issues.

Another type of VN is virtual private network or VPN.

VPN is a logical solution for remote access providing

secure communications over public telecommunication

network i.e. internet. VPN establishes logical channel to

transfer data across the internet reliably by tunnelling

mechanisms and cryptographic method. Generally,

tunnelling is process of placing the entire packet within

another packet and sending over the network via tunnel

interfaces. The IP security (IPSec) protocol is a suite of

protocols that secure data communications on the Internet

at the network layer, and it can be used to implement

VPN.VPN has important implications to underlying

internet such as packets can be sent using non-routable IP

address inside a packet that uses globally unique IP

address to extend the private network over the internet.

Moreover, a packet with unusual protocol which internet

does not support can be sent over the internet by VPN.

However, The IPsec access configuration is suffered from

non-standardization as the vendors have the liberty of

implementing the access requirements that are not

restrictive by a specific standard. Alternatively, the

general VPN is beyond QoS since adverse network

conditions that occur outside the private network cause

packet loss and other performance issues. In addition,

complex tunnel negotiation process brings high data

processing cost. [3]

The concepts of network programmability and software

defined networking (SDN) are pertinently related with

network virtualization. SDN means the programmability

in any part of the network. An active network has the

same concept in which the nodes are programmed to

perform custom operations on the packets that pass

through the node. SDN focuses on four key features such

as separation of the control plane from the data plane, a

centralized controller and view of the network, open

interfaces between the devices in the control plane

(controllers) and those in the data plane and

programmability of the network by external applications.

The main potential disadvantages of programmable

network are security, scalability, interoperability and

flexibility [4].

An overlay network is a layer of virtual network

topology on top of the physical network, which directly

interfaces to users. Overlay networks provide the

following advantages and opportunities to better utilize

the increasingly growing internet information and

resources such as overlay networks allow both

networking developers and application users to easily

design and implement their own communication

environment and protocols on top of the internet, such as

data routing and file sharing management. Additionally,

as long as the physical network connections exist; one

end-node can always communicate to another end-node

via overlay networks. Thus, scalability and robustness in

overlay networks are two attractive features [5].

Nonetheless, current overlay technologies are used for

application layer on top of IP layer and it is hard to isolate

overlay from the underlying internet which will in turn

prone to attack.

VIII. CLASSIFICATIONS OF

APPLICATION AREAS FOR

NETWORK VIRTUALIZATION

NV has been interested in business industries by means

of commercial products for years, while scientific

research became involved into this industry. At first,

research industry has treated NV as network testbed and

later the academic trend is changing from experiment to

the development of future internet. This section captures

the entire spectrum of NV into three main categories: VN

used for different application areas; VN applied in

different networks and VN deployed to achieve specific

network characteristics.

G. Network Virtualization in Different Application

Areas

In this section, the existing researches and projects

about applicability of NV are listed.

3) NV as Testbed

By enabling experimentation with new network

architecture, a virtual testbed provides immediate value to

the research community [1]. Besides, after experimenting

Page 3: Network Virtualization and Application Areas.pdf

ISSN 2348-5426 International Journal of Advances in Science and Technology (IJAST)

www.sciencepublication.org

10

new services, VN testbeds can be immediately deployed

for the real services.

PlanetLab is an overlay testbed which provides new

service oriented; geographically distributed network

architecture. It was established in 2002 composed of 1090

dedicated PlanetLab nodes at 507 sites worldwide. Each

research project has a "slice", or virtual machine access to

a subset of the nodes [7]. Nonetheless, PlanetLab is just

an overlay because it is only a network of virtual

machines over a physical network even it has

management layer to control that overlay.

In [8], new virtualized network control plane oriented

architecture which allows infrastructure providers and

service providers to achieve service delivery

independently and transparently to end users is presented.

The objective is to provide current ISP infrastructures to

be able to support new services, such as heavy resource

consuming data center applications. Even though

distributed control plane architectures have been evolved,

re-creating of network for data centres is still

tremendously manual work. Meanwhile, IaaS architecture

can scale service delivery more flexible where complex

underlying services remain hidden inside the

infrastructure provider. Resources are allocated according

to user needs; hence the highest utilization and

optimization levels can be achieved. During the duration

of the service, the user owns and controls the

infrastructure as if he was the owner. Moreover, from the

ISP’s perspective, an IaaS solutions offers sliceability i.e.

different software versions can run on each slice without

disrupting the others, scalability of management and

service by decoupling services and the underlying

transport network.

Another experimental platform is VegaNet [2], which

serves as a testbed atop a production network, with an

emphasis on mirroring a consistent connectivity view of

the underlying physical production network in a timely

and accurate manner. Previously, experimental testbeds

could not mirror the connectivity view of the virtual

network with underlying physical network correctly. For

instance, if a physical link has failed, physical network

reacts to the link failure by rerouting and such topological

change of the physical network may not be immediately

exposed to the experimental testbed layered above. Thus,

the physical network and the experimental testbed will

have different connectivity views, leading to inaccurate

observations of network experiments. In VegaNet is a

network of software-based virtual routers which are

directly attached to a production router to seek to maintain

the same connectivity view as the production router. At a

high level, a VegaNet node allows different network

experiments to have their own routing protocols, network

services, and data/control planes since the resources of

VegaNet node are divided into slices. To achieve

connectivity consistency in an accurate and timely manner,

VegaNet proposed lightweight adaptive probing

algorithm in which each VegaNet node sends probes to its

neighbours, and determines immediately if there is any

connectivity failure or the failure is recovered.

VegaNet is only useful as a testbed for production

networks, the specialized deployment environments of

which may lead to unique characteristics as opposed to

NV; future internet architecture.

4) NV in Data Centers (SOA)

Data center applications are composed of both compute

and network resources. For the last decade, new

virtualization technology has become available for

powerful automation of that compute resources. That is,

server and storage virtualization technologies which offer

mobility, flexibility, higher overall throughput and lower

average power for mandating green data centers. Still,

there is one more step to virtualization which many

professionals overlooked i.e. the network. Network in

data centers probably does have a significant amount of

physical cabling which lead to server performance

bottleneck, unsaclablity, power exhaustion and lack of

mobility.

Network virtualization in the following literatures

introduces “do more with less” infrastructure to the data

center environment.

Accordingly, Md. Faizul Bari et al. [9] conducted a

comprehensive analysis of the advancement in data center

network virtualization and their future work. Since

virtualization of data center networks is still new and still

developing stage, most of the researches focus on the

basic functionalities of virtual network such as packet

forwarding, bandwidth allocation and multipath for load

balancing and fault-tolerance rather than management

concerns such as security, energy saving etc. Packet

forwarding is about making the decision to send packets

from one network segment to another by nodes in a

computer network based on unicast, broadcast or

multicast schemes. For the bandwidth management,

mechanism such as congestion control over IP-tunnel or

rate-limiting for all traffic traversing the link are deployed.

Moreover, load balancing can be achieved by using equal

cost multipath in layer 3 switches or creating VLAN to

distribute network traffic. According to those

functionalities, [9] surveyed a dozen of existing projects

regards to the data center networking technology. Then,

they evaluated the research works over performance

matric such as scalability, fault-tolerance, QoS support etc.

For the future research directions, they listed out some

proposals. Virtualized data centers at network edge can

bring efficiency improvements in communication.

Page 4: Network Virtualization and Application Areas.pdf

ISSN 2348-5426 International Journal of Advances in Science and Technology (IJAST)

www.sciencepublication.org

11

Besides virtualizing the physical servers, several

resources such as router, switch and storage system can be

virtualized to meet the dynamic demands. Moreover,

decreasing the number of physical routers and switches

will create greener data center environment. Another

interesting area is software defined network (SDN)

concept. Providing network programmability with simple

API offers network isolation; allowing each virtual

network to be managed and evolved independently.

Furthermore, different level of security can be achieved

via virtualization of network and other computing

resources.

Among cloud service models, infrastructure-as-a-

service (IaaS) is gaining more and more customer interest

since it enables on-demand creation and deployment of

data centers with minimum operational cost and

complexity. However, IaaS solutions on the market do not

meet the QoS requirements for specific services such as

interactive multi-media applications. [10] presents

specific flow control concept to support QoS guaranteed

multiple, concurrently execution of services in IaaS

domain. In this paper, a virtualization overlay is

introduced to data center network for QoS management.

To manage network resource usage, services or

applications are run inside an isolated address space and

can be connected via tunnelling the virtual links. By using

ISONI eXchange Box (IXB) architecture, each virtual

link aggregates the transport connections of service

interactions with a certain QoS level. Virtual links are

mapped onto QoS classes of the partitioned

infrastructure’s transport network capabilities such as

maximum required bandwidth, maximum allowed delay,

and maximum allowed jitter etc. by the virtual network

manager. Meanwhile data center manager takes the intra-

network QoS control; for example best-effort network

traffic with each data center

5) NV and Disaster Recovery

An emergency management service for disaster

recovery can be constructed with heterogeneous networks

to address the crisis situation and adopt the network

according to real-time requirements. In this context, QoS

parameters as well as security are taken into consideration.

In [3], QoS aware heterogeneous network service

activation is proposed to maximize some QoS matrices

such as throughput, latency and bandwidth. In this case,

dedicated virtual links are used for different services. For

the security perspective in emergency service network,

each sub network is connected via VPN.

Another work [4] proposed wireless multihop access

network virtualization (WMANV) which provides

transparent Internet access during crisis as if they are

connected via conventional access points (APs) by using

commodity mobile devices or mobile nodes (MN). To

construct wireless multihop network during disaster,

network auto-configuration middleware (NAS) can be

deployed yet it is not always available in MNs which are

used as APs. In the proposed system, tree-structured

wireless access network is constructed within two steps.

Initially, any MN connects to the nearest software-defined

internet gateway which can forced that node to download

and install NAS. This middleware transforms the node

into programmable AP which bridges between internet

and nearby MNs. To realize this, every MN need dual

function such as station node to connect nearby AP and

programmable AP for other nodes and this can be

achieved by virtualized NIC. A single NIC in each MN is

virtualized into 2 NIC; one works as common station

mode and the other works in access mode. Nonetheless,

both approaches [3, 4] work within specific or constrained

environments. Moreover, the latter approach requires

appropriate storage space in MN for middleware

execution

6) NV and Cloud Computing

In simple terms, cloud computing gives the ability to

share computing resources using only the Internet access.

Fundamentally, it uses virtualization technology which

hides detailed physical infrastructure to users. Cloud

providers provide 3 main service models such as

Software-as-a-Service (SaaS), Platform-as-a-Service

(PaaS) and Infrastructure-as-a-Service (IaaS). However,

connectivity between these services has not received

much attention in the academic research. Thus, Network-

as-a-Service (NaaS) can be a solution to orchestrate with

multi-provider cloud services. One of the attempts is [11]

which proposed the network virtualization platform (NVP)

which is called network resource provisioning system as

the mediation layer able to provide NaaS to cloud

computing by exploiting the functionality provided by

control plane enabled networks. NVP is logically placed

at the same abstraction level of cloud virtualization

platform, and it accepts on-demand NaaS requests from

the user via a dedicated interface. The resulting NaaS

abstraction is a class of virtualized connectivity services

to end users at different levels of QoS criteria. To provide

these services, NVP uses decentralized signaling

approaches for the automatic collection of the network

information such as topology and QoS etc. at regular

intervals between the distributed entities (Des) that

directly control the control plane of the network APs.

Another approach [12] focuses on service provider

perspective. It classified the cloud computing IT resources

as three actors each of which plays a different role: the

Physical Infrastructure Provider (PIP), the Virtual

Infrastructure Provider (VIP) and the Virtual

Page 5: Network Virtualization and Application Areas.pdf

ISSN 2348-5426 International Journal of Advances in Science and Technology (IJAST)

www.sciencepublication.org

12

Infrastructure Operator (VIO). From a bottom-up

perspective, the physical infrastructure is provided by the

PIP, which is virtualized by the VIP, and which is finally

operated by the VIO. From network infrastructure point

of view, different types of virtual elements are defined

such as virtual hosts (vhost) which is run as virtual

machine via VMware or Xen software, virtual nodes

(vnode) which comprises virtual ports (vports) and

forwarding tables and virtual links (vlink) which is

defined by the two vports that are directly connected at a

virtual level. Each physical resource from the PIP

(Physical Infrastructure Provider) is mapped to one or

more of these virtual elements at the VIP (Virtual

Infrastructure Provider) level. The paper also proposed

layer 2 virtual MAC addressing scheme for network

virtualization

7) NV for Critical Applications

Current large-scale communication network; Internet

cannot be deployed for critical applications because of

their particular requirements such as security,

management complexity, continuous communication,

dynamic interactive response etc. On the other hand, end-

users of such systems can be non-technician or they have

limited time to handle network configuration on their

devices. One technical solution is network virtualization.

By creating a small and secure logical overlay networks

over Internet, the underlying base network can be shielded

and become trusted environment for their participants.

Enhancing them with ad hoc protocols and techniques can

result in self-creating, self-organizing and self-

administering communities on top of existing network

infrastructures, drastically reducing complexity. This

integrated approach makes the existing platform

applicable in critical applications area such as healthcare,

personal networking and emergency applications and

tactical network.

In [6], a virtual private ad-hoc network is established

between members that have a common trust relationship

by establishing private-public key certificates and user

profiles. Despite of scalability, VPAN can fulfill the need

for secure communication between a variety of critical

services and applications.

Accordingly, [13] focused on the use of network

virtualization technique to address the restricts of military

communication in traditional network and proposes the

routing mechanism based on the multi-level of security

for tactical network

H. Network Virtualization in Different Networks

1) Sensor Network

Among NV literatures, the virtualization of wireless

sensor network is a brand new research approach. With

the advancement of the Internet of Things (IoT) and IPv6

communication over low-power and low-cost sensor

nodes, it is very difficult to build large-scale sensor

networks using different types of sensor nodes for

scalability, flexibility, management cost. In this case,

virtualized of wireless sensor network (VWSN) can

provide the separation of the function for the traditional

WSNs service provider into sensor infrastructure provider

(SInP) that manages the physical sensor infrastructure and

sensor virtualization network service provider (SVNSP)

that develops the VSN by aggregating resources from

multiple SInPs and offers services to the application level

users. Since most of the sensor nodes remain idle for the

maximum periods of its lifetime, VWSN is one of the best

ways to utilize the physical sensor node resources

efficiently [14]. Moreover, by allowing heterogeneous

sensor nodes in WSNs to coexist on a shared physical

sensor substrate, virtualization in sensor network may

provide flexibility, cost effective solutions, promote

diversity, ensure security and increase manageability.

In [14], it pointed out that the real world deployments

of WSNs have been tailor-made solutions where

applications are bundled with a WSN at the time of

deployment with no possibility for other applications to

re-use the deployed WSN. Only VWSN can provide a

platform independent WSN framework with dynamic

resource discovery, middleware independent overlay

protocol for signalling, resource reservation and

management.

However, several issues are needed to be pay

attentions including a publication and discovery

framework to allow different actors, including sensors, to

publish and discover on the fly. Another issue is the need

for middleware-independent overlay protocols. The final

issue is that energy-efficient signalling and signal

processing framework must be deployed.

2) Wireless Network

One of the challenging features for future networks

will be the handling of the predicted increase in mobile

traffic volume in terms of voice as well as data traffic.

This situation leads to focus on virtualizing mobile

communication systems so that multiple operators can

share the same physical resources while being able to stay

isolated from each other. Major application areas of NV

in wireless network are network sharing and combined

control.

For instance, to connect two enterprise networks of

different network types on one physical substrate, each of

the separate networks could be implemented as a virtual

network, which in this way could still be controlled

independently. In addition, virtual network slices are used

to create testing space in order to develop new network-

wide protocols; or to compartmentalize and isolate certain

Page 6: Network Virtualization and Application Areas.pdf

ISSN 2348-5426 International Journal of Advances in Science and Technology (IJAST)

www.sciencepublication.org

13

types of user traffic. [15] Another research work [16] used

virtualized LTE based station in which the virtualized

hypervisor is also responsible for allocating the LTE

spectrum between the different virtual LTE enhanced

nodes.

NV can also bring benefits to radio access networks

(RAN). By using software-defined radio network,

wireless base-station could flexibly adapt radios to

different standards based on shifts and user demands

which is a solution to mitigate the mobile broadband

coverage gap [17].

I. Network Virtualization with Specific Network

Characteristics

1) Security

Current diversified network is dealing with appearance

of new services which have different network

requirements (such as bandwidth and latency) and traffic

behaviours (such as security, reliability, and mobility). In

this case, with the abstraction of the virtual network from

physical devices, NV will facilitate to set the dynamic

policies which can be enforced seamlessly to each virtual

environment. For example, VN can be created to support

services that require only occasional transmission of a few

bytes of data, services that require high bandwidth, or

services that require interactive delay, or services that

allow intermittent data transmission and result in very

large delay.

2) Energy Awareness

Network-level environmental awareness is another

characteristic of NV technology offered. Important issue

for the green network is how to provide customer demand

within minimum communication. Alternatively, existing

bandwidth spectrum can be shared among innovative

applications over the internet. With the efficient

scheduling VN, network can be shared fairly among

multiple services irrespective of QoS requirements.

Moreover, virtualized forwarding plane can reduce the

power-consumption devices and hence energy used per

bits can be decreased.

IX. CONCLUSIONS

Simply, network virtualization is a technique to create

an abstraction of networking resources which can make

network control and management problems easier for any

working environment. Many researchers pointed out that

virtualizing network elements (nodes and links) can

realize certain benefits. Furthermore, sharing and isolation

of network bandwidth makes the underlying network

more flexible, secure and scalable. However, since it is

relatively a new research topic, there is no general

architecture or framework that can guarantee these

benefits nor be adapted as future internet technology.

Meanwhile, some researchers emphasize on practical

application areas of VN. Some papers proposed that NV

can be useful as networking testbeds or value-added

overlays on top of the existing networks i.e. wired or

wireless networks. At the same time, some research

explored innovative applications areas such as disaster

recovery, critical and emergency applications. In this

paper, distinct application areas of network virtualization

are reviewed. The purpose as well as our future research

goal is from the big picture of how NV is implemented in

different application domains, general yet flexible future

internet architecture can be constructed through network

virtualization.

REFERENCES

[1] J. S. Turner and D. E. Taylor, “Diversifying the

Internet,” in IEEE Global Telecommunications

Conference, 2005. GLOBECOM ’05, 2005, vol. 2,

p. 6 pp.–760.

[2] M. Xu, Q. Li, P. P. C. Lee, Y. Peng, and J. Wu,

“VegaNet: a Virtualized Experimentation Platform

for Production Networks with Connectivity

Consistency,” IEEE Netw., vol. 26, no. 5, pp. 15–21,

2012.

[3] C. Subramaniam, J. Gokulakrishnan, D. Jitendra

Kumar Jain, and U. Mohan Bharathy, “Network

Virtualization for Emergency Management

Services,” in the proceeding of 2010 International

Conference on Multimedia Communications

(Mediacom), 2010, pp. 67–70.

[4] Q. T. Minh, K. Nguyen, and S. Yamada,

“Virtualized Multihop Access Networks for

Disaster Recovery,” in World of Wireless, Mobile

and Multimedia Networks (WoWMoM), 2013 IEEE

14th International Symposium and Workshops on a,

2013, pp. 1–6.

[5] G. Rosenbaum, W. Lau, and S. Jha, “Recent

Directions in Virtual Private Network Solutions,” in

the proceeding of 11th IEEE International

Conference on Networks, 2003. ICON2003, 2003,

pp. 217–223.

[6] P. Dedecker, J. Hoebeke, I. Moerman, J. Moreau,

and P. Demeester, “Network Virtualization as an

Integrated Solution for Emergency Communication,”

Page 7: Network Virtualization and Application Areas.pdf

ISSN 2348-5426 International Journal of Advances in Science and Technology (IJAST)

www.sciencepublication.org

14

Telecommun. Syst., vol. 52, no. 4, pp. 1859–1876,

Apr. 2013.

[7] B. Chun, D. Culler, T. Roscoe, A. Bavier, L.

Peterson, M. Wawrzoniak, and M. Bowman,

“PlanetLab: an Overlay Testbed for Broad-

coverage Services,” SIGCOMM Comput Commun

Rev, vol. 33, no. 3, pp. 3–12, Jul. 2003.

[8] K.-K. Nguyen, M. Cheriet, and M. Lemay,

“Enabling Infrastructure as a Service (IaaS) on IP

Networks: from Distributed to Virtualized Control

Plane,” IEEE Commun. Mag., vol. 51, no. 1, pp.

136–144, 2013.

[9] M. F. Bari, R. Boutaba, R. Esteves, L. Z. Granville,

M. Podlesny, M. G. Rabbani, Q. Zhang, and M. F.

Zhani, “Data Center Network Virtualization: A

Survey,” IEEE Commun. Surv. Tutor., vol. 15, no. 2,

pp. 909–928, 2013.

[10] T. Voith, K. Oberle, and M. Stein, “Quality of

Service Provisioning for Distributed Data Center

Inter-connectivity Enabled by Network

Virtualization,” Future Gener. Comput. Syst., vol.

28, no. 3, pp. 554–562, Mar. 2012.

[11] F. Baroncelli, B. Martini, and P. Castoldi,

“Network Virtualization for Cloud Computing,”

Ann. Telecommun. - Ann. Télécommunications, vol.

65, no. 11–12, pp. 713–721, Dec. 2010.

[12] J. Matias, E. Jacob, D. Sanchez, and Y. Demchenko,

“An OpenFlow Based Network Virtualization

Framework for the Cloud,” in 2011 IEEE Third

International Conference on Cloud Computing

Technology and Science (CloudCom), 2011, pp.

672–678.

[13] J. Kerdsri and K. Wipusitwarkun, “Data-wise

Routing in Virtualization Environment (DRIVE)

with multiple level of security for tactical network,”

in 2012 IEEE/SICE International Symposium on

System Integration (SII), 2012, pp. 933–938.

[14] I. Khan, “Design and analysis of virtualization

framework for Wireless Sensor Networks,” in

World of Wireless, Mobile and Multimedia

Networks (WoWMoM), 2013 IEEE 14th

International Symposium and Workshops on a,

2013, pp. 1–2.

[15] M. Hoffmann and M. Staufer, “Network

Virtualization for Future Mobile Networks: General

Architecture and Applications,” in 2011 IEEE

International Conference on Communications

Workshops (ICC), 2011, pp. 1–5.

[16] Y. Zaki, L. Zhao, C. Goerg, and A. Timm-Giel,

“LTE mobile network virtualization,” Mob Netw

Appl, vol. 16, no. 4, pp. 424–432, Aug. 2011.

[17] X. Costa-Perez, J. Swetina, T. Guo, R. Mahindra,

and S. Rangarajan, “Radio Access Network

Virtualization for Future Mobile Carrier Networks,”

IEEE Commun. Mag., vol. 51, no. 7, pp. 27–35,

2013.

Thiri The Wut Yee

She got Bachelor of Computer

Science (B.C.Sc) and Master of

Computer Science (M.C.Sc) in

Computer Science major from the

University of Computer Studies,

Yangon (UCSY), Myanmar during

2004 and 2009 respectively. She

has been working as a government

employee from Ministry of

Science and Technology (MOST), Republic of the Union

of Myanmar since 2007. She has over six years teaching

experience in IT subjects by working as a tutor at UCSY.

She was also a member from Mobile and Web Computing

Lab (MWC Lab) at UCSY and did research about mobile

computing. She got a publication from 7th

International Networked Computing and Advanced

Information Management Conference (NCM2011) .

Currently, she attend PhD candidate at Sirindhorn

International Institute of Technology (SIIT), Thammasat

University. Her current field of interest is future

internetworking and network virtualization.

Assoc. Prof. Komwut Wipusitwarakun

He was graduated B.Eng. (Honors)

in Electrical Engineering, at

Chulalongkorn University,

Thailand, M.Eng. in

Communication Engineering, and

Ph.D. degree in Communication

Engineering, Osaka University,

Osaka, Japan respectively. His

faculty areas are mobile

computing, internet and computer

networking. He did supervise many students in different

network fields including wireless mesh networks,

heterogeneous internetworking, active networks, mobile

agents, overlay service networks, self-healing networks,

cross-layer protocol design and analysis. He got over 30

science citations high impact factor journal publications.

Now, he is working as System Manager of Computer

Center, at the School of Information, Computer, and

Communication Technology (ICT), Sirindhorn

International Institute of Technology (SIIT), Thammasat

University