Skip to main content
Top

2017 | OriginalPaper | Chapter

2. Virtualization and Cloud Computing

Authors : Mojtaba Vaezi, Ying Zhang

Published in: Cloud Mobile Networks

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In an effort to move the networking industry from today’s manual configuration to embrace automated solutions that are coordinated with the rest of the infrastructure, there have been several emerging technologies in the past few years, chief among them are network virtualization (NV), network functions virtualization (NFV), and software-defined networking (SDN).

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
The first two technologies are covered in this chapter whereas SDN is discussed in the next chapter.
 
2
L4–L7 services also can be virtualized to produce logical load balancers or logical firewalls, for example. This is referred to as network functions virtualization and will be discussed in Sect. 2.4.
 
3
Here, the network refers to a telecommunication or computer network.
 
4
Tunneling is a mechanism used to send unsupported protocols across different networks; it allows for the secure movement of data from one network to another. Specifically, tunneling refers to the transmission of data intended to be used only within a private network through a public network such that the routing nodes in the public network are oblivious to the fact that the transmission is part of a private network [48].
 
5
You can also set up your own VPN to safely access your secure home network while you are on the road.
 
6
The Network Functions Virtualization Industry Specification Group (NFV ISG) was initiated under the auspices of the European Telecommunications Standards Institute (ETSI). NFV ISG first met in January 2013, and will sunset two years after [53]; it included over 150 companies in 2013. The NFV ISG objective is not to produce standards but to achieve industry consensus on business and technical requirements for NFV. A more detailed version of [53] is expected to be released in the second half of 2014.
 
7
A single physical BS can be abstracted to support multiple mobile operators and allow individual control of each RAN by having a separate vBS configured for each operator.
 
8
MVNOs [57] are a new breed of wireless network operators who may not own the wireless infrastructure or spectrum, but give a virtual appearance of owning a wireless network. Basically, MVNOs resell the services of big operators, usually lower prices and with more flexible plans. Virgin Mobile is an example for MVNO.
 
9
By means of a wireless NIC, which is basically a Wi-Fi card, a computer workstation can be configured to act as an 802.11 access point. As a result, 802.11 virtualization techniques can be applied to the 802.11 wireless NIC. Virtualization of WLAN, known as VirtualWi-Fi (previously MultiNet [58, 59]) is a relatively old technology. It abstracts a single WLAN card as multiple virtual WLAN cards, each to connect to a different wireless network. Therefore, it allows a user to simultaneously connect his machine to multiple wireless networks using a single WLAN card.
 
10
Today, many people actually use cloud even before they knew it. The photos that you store on your social networking sites (e.g., Facebook) or any kind of file you store and view in online file storage sites (Dropbox, Google Drive, etc.) are stored on their servers, which can be accessed from anywhere by simply logging in with your account information. In addition, you may have used or heard about Google Docs, where you can create, store, and share documents (Word) and spreadsheets (Excel) on their server, once you have a Gmail id. It is also the same business model for emails services (Gmail, Yahoo mail, etc.) as you can log in to access your emails anywhere you want.
 
11
While most major cloud service providers such as Azure, AWS, and Rackspace have an hourly usage pricing model, since March 2014 Google Compute Engine has started providing a per-minute pricing model.
 
12
Other examples of XaaS are Storage as a Service (SaaS), Desktop as a Service (DaaS), Network as a Service (NaaS), and Monitoring as a Service (MaaS).
 
13
Some add a fourth type of cloud, called community cloud [75]. It refers to an infrastructure that is shared by multiple organizations and supports a specific community. The healthcare industry is an example of an industry that is employing the community cloud concept.
 
Metadata
Title
Virtualization and Cloud Computing
Authors
Mojtaba Vaezi
Ying Zhang
Copyright Year
2017
DOI
https://doi.org/10.1007/978-3-319-54496-0_2

Premium Partner