The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud radio access network (C-RAN) centralizes several baseband units to form a pool, which is the primary form of the wireless network virtualization. Some aspects of C-RAN are always developing, such as the processing capacity and multiple radio access technology (multi-RAT) convergence. In this paper, the Not Only Stack (NO Stack) framework, as a virtualization approach, is suggested to be employed...
Programmable Virtual Networks (PVNs) make the network more flexible and allow the fast introduction of new services. However, several shortcomings hamper their wider adoption, including: (i) the extensive knowledge required to configure and manage the NetApps, (ii) the lack of descriptors to detail all nuances of the NetApps, and (iii) there is no solution that enables to distribute and configure...
Virtualization is one of the important key technologies in cloud computing. Main advantages include maximum resource utilization and high flexibility. The virtualization technology offers different services to users and the vendors and has become an upcoming technology in the IT (Information Technology) industry. This article explores various network virtualization technologies using cloud computing...
Currently, Software Defined Networking (SDN) paradigm has attracted a significant interest from industry and academia as a future network architecture. The programmable control plane enables flexible and rapid modifications of network behavior. With OpenFlow, one of the promising SDN protocols, we can provide several advantages to develop advanced network virtualization technologies. In this paper,...
Virtual Private LAN Service (VPLS) is a widely used network technology which connects geographically distributed customer sites as a local area network. However, the process of provisioning a new VPLS circuit is complicated because service provider has to check device configurations one by one. Therefore, it is difficult to provide the service on demand. OpenFlow, the most notable protocol in Software...
Data centers have been gaining increasing interest due to their capacity to store a large amount of information; as a result they have become the main support for the deployment of cloud computing. Currently, data centers face performance problems, such as: lack of guaranteed quality of service, security risks, management complexity and inflexibility. Virtualized data centers are an emerging tool...
Network Functions Virtualization (NFV) opens new opportunities and challenges for security community. Unlike existing physical network infrastructure, in a virtualized network platform, security services can be dynamically deployed and maintained to cope with the threat of sophisticated network attacks that are increasing over time. This paper surveys the activity that many security vendors and Internet...
Diverse proprietary network appliances increase both the capital and operational expense of service providers, meanwhile causing problems of network ossification. Network function virtualization (NFV) is proposed to address these issues by implementing network functions as pure software on commodity and general hardware. NFV allows flexible provisioning, deployment, and centralized management of virtual...
Cloud computing is based on virtualization, where a single physical resource is virtualized into multiple virtual resources. Processor and network virtualization offer many advantages like saving in hardware cost, energy consumption, human effort and management of resources. In this paper we have evaluated the effect of network and processor virtualization using popular open source tools, Open vSwitch...
A previously developed plug-in architecture for network-virtualization nodes allows network operators to introduce new types of virtual nodes and links and slice developers to use them in slices (i.e., virtual networks). In this paper, a method for extending network-virtualization infrastructures by introducing plug-ins to nodes in the infrastructure and a freely-designed plug-in-specific packet header,...
Network virtualization introduces two concepts: slice (i.e., virtual network), which consists of virtual nodes and links, and slice developer, which is the third role in networks. Slice developers can introduce new network services by using slices. A method for introducing new types of virtual nodes and links for new services into the slice-definition language and the virtualization infrastructure...
The arising opportunity exposed in this paper is leveraging the capabilities of network virtualization to provide a whole IP Network as a Service (NaaS). Users are offered the capability to customize the policies, the configuration and the management on their allocated virtual network to meet their own requirements. Following the NaaS paradigm, the European Community funded project Mantychore is developing...
As the number of services and users in Internet Protocol Multimedia Subsystem (IMS) keeps increasing, network virtualization seems to be a good alternative for Mobile Virtual Network Operators (MVNOs) in order to provide better services to customers and save cost and time. As a matter of fact, it offers better performances in terms of resource management and automatic allocation. Furthermore, when...
This paper describes our experience using the dynamic resource reallocation capabilities offered by virtualization technologies, in implementing: 1. Automation of end-to-end failover of mission critical virtualized application, a SAN network and EMC Clarion based storage to a remote site and 2. On-demand and scheduled assurance of failover and measurement of RPO and RTO (The Recovery Point Objective...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.