Skip to main content

Virtualization and Cloud Computing

  • Chapter
  • First Online:
Cloud Mobile Networks

Part of the book series: Wireless Networks ((WN))

Abstract

In an effort to move the networking industry from today’s manual configuration to embrace automated solutions that are coordinated with the rest of the infrastructure, there have been several emerging technologies in the past few years, chief among them are network virtualization (NV), network functions virtualization (NFV), and software-defined networking (SDN).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 129.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    The first two technologies are covered in this chapter whereas SDN is discussed in the next chapter.

  2. 2.

    L4–L7 services also can be virtualized to produce logical load balancers or logical firewalls, for example. This is referred to as network functions virtualization and will be discussed in Sect. 2.4.

  3. 3.

    Here, the network refers to a telecommunication or computer network.

  4. 4.

    Tunneling is a mechanism used to send unsupported protocols across different networks; it allows for the secure movement of data from one network to another. Specifically, tunneling refers to the transmission of data intended to be used only within a private network through a public network such that the routing nodes in the public network are oblivious to the fact that the transmission is part of a private network [48].

  5. 5.

    You can also set up your own VPN to safely access your secure home network while you are on the road.

  6. 6.

    The Network Functions Virtualization Industry Specification Group (NFV ISG) was initiated under the auspices of the European Telecommunications Standards Institute (ETSI). NFV ISG first met in January 2013, and will sunset two years after [53]; it included over 150 companies in 2013. The NFV ISG objective is not to produce standards but to achieve industry consensus on business and technical requirements for NFV. A more detailed version of [53] is expected to be released in the second half of 2014.

  7. 7.

    A single physical BS can be abstracted to support multiple mobile operators and allow individual control of each RAN by having a separate vBS configured for each operator.

  8. 8.

    MVNOs [57] are a new breed of wireless network operators who may not own the wireless infrastructure or spectrum, but give a virtual appearance of owning a wireless network. Basically, MVNOs resell the services of big operators, usually lower prices and with more flexible plans. Virgin Mobile is an example for MVNO.

  9. 9.

    By means of a wireless NIC, which is basically a Wi-Fi card, a computer workstation can be configured to act as an 802.11 access point. As a result, 802.11 virtualization techniques can be applied to the 802.11 wireless NIC. Virtualization of WLAN, known as VirtualWi-Fi (previously MultiNet [58, 59]) is a relatively old technology. It abstracts a single WLAN card as multiple virtual WLAN cards, each to connect to a different wireless network. Therefore, it allows a user to simultaneously connect his machine to multiple wireless networks using a single WLAN card.

  10. 10.

    Today, many people actually use cloud even before they knew it. The photos that you store on your social networking sites (e.g., Facebook) or any kind of file you store and view in online file storage sites (Dropbox, Google Drive, etc.) are stored on their servers, which can be accessed from anywhere by simply logging in with your account information. In addition, you may have used or heard about Google Docs, where you can create, store, and share documents (Word) and spreadsheets (Excel) on their server, once you have a Gmail id. It is also the same business model for emails services (Gmail, Yahoo mail, etc.) as you can log in to access your emails anywhere you want.

  11. 11.

    While most major cloud service providers such as Azure, AWS, and Rackspace have an hourly usage pricing model, since March 2014 Google Compute Engine has started providing a per-minute pricing model.

  12. 12.

    Other examples of XaaS are Storage as a Service (SaaS), Desktop as a Service (DaaS), Network as a Service (NaaS), and Monitoring as a Service (MaaS).

  13. 13.

    Some add a fourth type of cloud, called community cloud [75]. It refers to an infrastructure that is shared by multiple organizations and supports a specific community. The healthcare industry is an example of an industry that is employing the community cloud concept.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mojtaba Vaezi .

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this chapter

Cite this chapter

Vaezi, M., Zhang, Y. (2017). Virtualization and Cloud Computing. In: Cloud Mobile Networks. Wireless Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-54496-0_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-54496-0_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-54495-3

  • Online ISBN: 978-3-319-54496-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics