Virtualization in Networks A survey
DOI:
https://doi.org/10.14738/tnc.11.25Abstract
Virtualization is considered an integral part of any network. Many new features and services can be introduced with a mere implementation in software and without deploying extensive hardware. In this survey we will be looking at the history and motivations that led to the realization of virtualization techniques. We will be studying its architecture, current technologies followed by challenges and future of virtualization.
Keywords – Virtualization, VLAN, VPN, Cloud Computing, Virtualized Data Centers.
References
. http://whatisvirtualization.com/.
. http://en.wikipedia.org/wiki/Virtual_LAN.
. http://en.wikipedia.org/wiki/Virtual_private_network.
. Andersen, D., et al., Resilient overlay networks. Vol. 35. 2001: ACM.
. http://en.wikipedia.org/wiki/Cloud_computing#Cloud_clients.
. Geisa, E., Data centre virtualization q&a. 2006.
. ABELS, J.P.A.T., Progressive Degrees of Automation toward the Virtual Data Center. 2005: p. 3.
. Overcoming 7 Key challenges to virtualization: how Dell- and F5-BaseD it infrastructures smooth the way. 2009.
. Chowdhury, N. and R. Boutaba, A survey of network virtualization. Computer Networks, 2010. 54(5): p. 862-876.
. Chowdhury, N.M.K. and R. Boutaba, Network virtualization: state of the art and research challenges. Communications Magazine, IEEE, 2009. 47(7): p. 20-26.
. N. Feamster, L. Gao, and J. Rexford, “How to Lease the Internet in your Spare Time,” SIGCOMM Comp. Commun. Revi., vol. 37, no. 1, 2007, pp. 61–64.
. M. Boucadair et al., “A Framework for End-to-End Service Differentiation: Network Planes and Parallel Internets,” IEEE Commun. Mag., vol. 45, no. 9, Sept. 2007, pp. 134–43.
. M. Kounavis et al., “The Genesis Kernel: A Programming System for Spawning Network Architectures,” IEEE JSAC, vol. 19, no. 3, 2001, pp. 511–26.
. J. Touch, “Dynamic Internet Overlay Deployment and Management using the X-Bone,” Comp. Networks, vol. 36, no. 2–3, 2001, pp. 117–35.
. W. Ng et al., “MIBlets: A Practical Approach to Virtual Network Management,” Proc. 6th IFIP/IEEE Int’l. Symp. Integrated Net. Mgmt., 1999, pp. 201–15.
. J. E. van der Merwe et al., “The Tempest: A Practical Framework for Network Programmability,” IEEE Network, vol. 12, no. 3, 1998, pp. 20–28.
. S. da Silva, Y. Yemini, and D. Florissi, “The NetScript Active Network System,” IEEE JSAC, vol. 19, no. 3, 2001, pp. 538–51.
. A. Sundararaj and P. Dinda, “Towards Virtual Networks for Virtual Machine Grid Computing,” Proc. 3rd USENIX Virtual Machine Research Tech. Symp., 2004.
. P. Ruth et al., “Virtual Distributed Environments in a Shared Infrastructure,” Computer, vol. 38, no. 5, 2005, pp. 63–69.
. L. Peterson et al., “A Blueprint for Introducing Disruptive Technology into the Internet,” SIGCOMM Comp. Commun. Rev., vol. 33, no. 1, 2003, pp. 59–64.
. A. Bavier et al., “In VINI veritas: Realistic and Controlled Network Experimentation,” Proc. ACM SIGCOMM, 2006, pp. 3–14.
. http://www.industrialethernetu.com/courses/405_4.htm
. http://www.excitingip.com/780/an-introduction-for-enterprise-vpn-virtual-private-network/
. https://www.usenix.org/legacy/event/nsdi07/tech/full_papers/fonseca/fonseca_html/index.html
. http://www.comdesigninc.com/comdesign/Services/VoiceandDataIntegration/tabid/138/Default.aspx
. http://dcvizcayno.wordpress.com/2012/04/13/cloud-computing-tips-for-financial-industry/