Skip to main content

Virtualization Techniques: Challenges and Opportunities

  • Conference paper
  • First Online:
Mobile, Secure, and Programmable Networking (MSPN 2016)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 10026))

Abstract

The gap between the deployment costs for the new services, apps and hosting machines with the expected revenue forces the operators to think in the virtualization concept although the heterogeneity in virtualization techniques solutions. While this virtualization architecture came with different challenges like instances isolation in the hardware or software layers, it anticipated many opportunities for fast deployment and resources management. This position paper lists the main challenges starting from tenants’ isolation and hardware trusting for virtualization layer till the software and network mapping issues for virtual instances communication under the softwarization techniques. Moreover, it sums up the directions for this research point in terms of the vision of software and hardware.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Ahmad, R.W., Gani, A., Hamid, S.H.A., Shiraz, M., Yousafzai, A., Xia, F.: A survey on virtual machine migration and server consolidation frameworks for clouddata centers. J. Netw. Comput. Appl. 52, 11–25 (2015)

    Article  Google Scholar 

  2. Aguiar, A.D.C.P.D.: On the virtualization of multiprocessed embedded systems. Ph.D. dissertation, Pontifıcia Universidade Catolica do Rio Grande do Sul (2014)

    Google Scholar 

  3. Mijat, R., Nightingale, A.: Virtualization is coming to a platform near you. ARM white paper (2011)

    Google Scholar 

  4. Le Vinh, T., Bouzefrane, S.: Trusted platforms to secure mobile cloud computing. In: The 16th IEEE International Conference, pp. 1096–1103, August 2014

    Google Scholar 

  5. Liang, C., Yu, F.R.: Wireless network virtualization: a survey, some research issues and challenges. IEEE Commun. Surv. Tutor. 17(1), 358–380 (2015)

    Article  Google Scholar 

  6. Jain, R., Paul, S.: Network virtualization and software defined networking for cloud computing: a survey. IEEE Commun. Mag. 51, 24–31 (2013)

    Article  Google Scholar 

  7. Popek, G.J., Goldberg, R.P.: Formal requirements for virtualizable third generation architectures. ACM SIGOPS Oper. Syst. Rev. 17, 412–421 (1974)

    MathSciNet  MATH  Google Scholar 

  8. VMWare Inc.: Introducing VMware virtual platform. Technical white paper, February 1999

    Google Scholar 

  9. Understanding Full Virtualization, Para-virtualization, and Hardware Assist. VMWre white paper (2007)

    Google Scholar 

  10. Rodriguez-Haro, F., Freitag, F., Navarro, L., et al.: A summary of virtualization techniques. In: The 2012 Iberoamerican Conference on Electronics Engineering and Computer Science, pp. 267–272 (2012)

    Google Scholar 

  11. http://lwn.net/Articles/531114/

  12. http://en.wikipedia.org/wiki/Cgroups

  13. https://tools.ietf.org/html/rfc5556

  14. NFV White Paper: Network Functions Virtualisation, An Introduction, Benefits, Enablers, Challenges & Call for Action, issue 1, October 2013

    Google Scholar 

  15. ETSI GS NFV 002 (V1.2.1): Network Functions Virtualisation (NFV); Architectural Framework, December 2014

    Google Scholar 

  16. ETSI GS NFV 003 (V1.2.1): Network Functions Virtualisation (NFV); Terminology for Main Concepts in NFV, December 2014

    Google Scholar 

  17. Mijumbi, R., Serrat, J., Gorricho, J., Bouten, N., De Turck, F., Boutaba, R.: Network function virtualization: state-of-the-art and research challenges. IEEE Commun. Surv. Tutor. PP(99), 1 (2015)

    Google Scholar 

  18. Hu, F., Hao, Q., Bao, K.: A survey on Software-Defined Network (SDN) and OpenFlow: from concept to implementation. IEEE Commun. Surv. Tutor. 16, 2181–2206 (2014)

    Article  Google Scholar 

  19. http://openvswitch.org/

  20. https://www.opendaylight.org/

  21. McKeown, N., Anderson, T., Balakrishnan, H., et al.: OpenFlow: enabling innovation in campus network. ACM SIGCOMM Comput. Commun. Rev. 38, 69–74 (2008)

    Article  Google Scholar 

  22. https://www.openstack.org/

  23. TPM Main Specification. http://www.trustedcomputinggroup.org/resources/tpm_main_specification

  24. Perez, R., Sailer, R., van Doorn, L., et al.: vTPM: virtualizing the trusted platform module. In: Proceedings of 15th Conference on USENIX Security Symposium, pp. 305–320 (2006)

    Google Scholar 

  25. England, P., Loeser, J.: Para-virtualized TPM sharing. In: Lipp, P., Sadeghi, A.-R., Koch, K.-M. (eds.) Trust 2008. LNCS, vol. 4968, pp. 119–132. Springer, Heidelberg (2008). doi:10.1007/978-3-540-68979-9_9

    Chapter  Google Scholar 

  26. Krautheim, F.J., Phatak, D.S., Sherman, A.T.: Private virtual infrastructure: a model for trustworthy utility cloud computing. In: DTIC Document (2010)

    Google Scholar 

  27. Strasser, M., Stamer, H.: A software-based trusted platform module emulator. In: Lipp, P., Sadeghi, A.-R., Koch, K.-M. (eds.) Trust 2008. LNCS, vol. 4968, pp. 33–47. Springer, Heidelberg (2008). doi:10.1007/978-3-540-68979-9_3

    Chapter  Google Scholar 

  28. Ibn-Khedher, H., Abd-Elrahman, E., Afifi, H.: Network issues in virtual machine migration. In: ISNCC, IEEE, Hamamet, Tunisia, vol. 1, pp. 1–6, May 2015

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lyes Bouali .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Bouali, L., Abd-Elrahman, E., Afifi, H., Bouzefrane, S., Daoui, M. (2016). Virtualization Techniques: Challenges and Opportunities. In: Boumerdassi, S., Renault, É., Bouzefrane, S. (eds) Mobile, Secure, and Programmable Networking. MSPN 2016. Lecture Notes in Computer Science(), vol 10026. Springer, Cham. https://doi.org/10.1007/978-3-319-50463-6_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-50463-6_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-50462-9

  • Online ISBN: 978-3-319-50463-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics