A Survey of Network Virtualization
A Survey of Network Virtualization
A Survey of Network Virtualization
discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/222564894
CITATIONS READS
690 1,044
2 authors, including:
R. Boutaba
University of Waterloo
403 PUBLICATIONS 9,625 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by R. Boutaba on 28 February 2014.
Abstract
Due to the existence of multiple stakeholders with conflicting goals and policies, alterations to the
existing Internet are now limited to simple incremental updates; deployment of any new, radically differ-
ent technology is next to impossible. To fend off this ossification once and for all, network virtualization
has been propounded as a diversifying attribute of the future inter-networking paradigm. By allowing
multiple heterogeneous network architectures to cohabit on a shared physical substrate, network virtu-
alization provides flexibility, promotes diversity, and promises security and increased manageability. In
this paper, we present a network virtualization model with a set of quintessential design goals, survey
the past and the state-of-the-art of network virtualization, and discuss the future challenges that must
be addressed to realize a viable network virtualization model.
1 Introduction
The Internet has been stunningly successful in modeling the way we access and exchange information in
the modern world. Over the course of past three decades, the Internet architecture has proven its worth by
supporting multitude of distributed applications and a wide variety of network technologies over which it
currently runs. However, its popularity has become the biggest impediment to its further growth. Due to
its multi-provider nature, adopting a new architecture or modification of the existing one requires consensus
among competing stakeholders. As a result, alterations to the Internet architecture have become restricted to
simple incremental updates instead of radical changes by introducing and deploying new network technologies
[1, 2].
Even though architectural purists view network virtualization as a means for evaluating new architec-
tures, the pluralist approach considers virtualization as a fundamental attribute of the architecture itself
[1]. According to them, network virtualization can extenuate the ossifying forces of the current Internet and
stimulate innovation by enabling diverse network architectures to cohabit on a shared physical substrate. To
introduce diversity, separation of policy from mechanism is a well-tested principle in computing literature.
Similar approach has been propounded for virtualizing networks [2, 3, 4]. In this case, the role of the tra-
ditional ISPs has been divided into two: infrastructure providers, who manage the physical infrastructure,
and service providers, who create virtual networks by aggregating resources from multiple infrastructure
providers and offer end-to-end services to the end users. Such an environment will foster deployment of
multiple coexisting heterogeneous network architectures that are not bounded by the inherent limitations
found in the existing Internet.
This paper examines the past and the state-of-the-art in network virtualization and identifies key issues
for future exploration. The rest of this article is organized as follows. In Section 2, we review three existing
ideas: virtual private networks, programmable networks, and overlay networks, that are closely related
1
to the concept of virtual networks. Next, in Section 3, we present a reference business model of a network
virtualization environment and identify critical design factors to materialize it. Following this, we summarize
a number of past and present projects on network virtualization and related concepts in Section 4. In Section
5, we identify key research issues for further exploration based on our analysis of the surveyed work. We
conclude in Section 6.
2 Historical Perspective
The concept of multiple co-existing networks is not necessarily new. It appeared in the networking literature
several times in the past in different capacities. In this section, we discuss three such incarnations that are
closely related to the concept of network virtualization. A virtual private network, also known as a VPN, is
a specialized virtual network that connects multiple distributed sites through tunnels over shared or public
networks. An overlay network is yet another form of network virtualization which is typically implemented
in the application layer, though various implementations at lower layers of the network stack do exist. It has
been extensively used as a weak but effective tool to deploy new features and fixes in the Internet. Active
and programmable networks, on the other hand, is a concept that enables customization of network elements
based on service providers’ requirements.
1. Carrier protocol (e.g. IP), used by the SP network to carry the VPN packets.
2. Encapsulating protocol, used to wrap the original data. It can range from very simple wrapper protocols
(e.g. GRE [11], PPTP [12], L2TP [13]) to secure protocols (e.g. IPSec [14]).
3. Passenger Protocol, which is the original data in customer networks.
Sender CE devices encapsulate the passenger packets and route them into carrier networks; when these
encapsulated packets reach the end of the tunnels, i.e. receiver CE devices, they are extracted and actual
packets are injected into receiver networks.
On the other extreme, all the states in PE-based L3VPNs are maintained in the PE devices, and a
connected CE device may behave as if it were connected to a private network. In this case, the PE devices
know that certain traffic is VPN traffic and they process that accordingly. When a PE-based VPN maintains
2
a complete logical router with unique forwarding table and unique routing protocol set for each VPN, it is
known as Virtual Router PPVPN. If a single BGP instance is shared between VPNs, with separate forwarding
environment and a separate forwarding table for each of them, it is known as BGP/MPLS IP VPN [7]. In
this case route advertisements are marked with attributes to identify their VPN context.
3
2.2.1 Open Signaling Approach (Opensig)
Open signaling [21] takes a telecommunication approach to the problem with a clear distinction between
transport, control, and management planes that constitute programmable networks and emphasize on QoS
guarantees for created services. It argues for modeling communication hardware using a set of open pro-
grammable network interfaces, thereby enabling open access to switches and routers by third party software
providers. It creates an abstraction layer for physical network devices to act as distributed computing ob-
jects with well-defined open programming interfaces, which allow service providers to manipulate the network
states.
4
(a) Relationship between Players (b) Hierarchy of Roles
Most importantly, overlays have been used as testbeds. PlanetLab(§4.5.1) is such an example. With
the advent of PlanetLab, researchers can easily create and manage customized environments to design and
evaluate new architectures, protocols, and algorithms.
However, Anderson et al. [1] point out that standard overlays falter as a deployment path for radical
architectural innovation in at least two ways. First, overlays have largely been seen as a way to deploy
narrow fixes to specific problems without any holistic view of the interactions between different overlays.
Second, most overlays have been designed in application layer on top of IP and hence are not capable of
supporting radically different concepts.
5
infrastructure and offer their resources through programmable interfaces to different service providers. They
do not offer direct services to end users. Infrastructure providers distinguish themselves through the quality
of resources they provide, the freedom they delegate to their customers (i.e. service providers), and the tools
they provide to exploit that freedom.
Infrastructure providers communicate and collaborate among themselves, based on specific agreements,
to create the complete underlying network. Those offering connectivity to service providers through different
networking technologies, e.g. optical fiber, or satellite, are known as the facilities providers. On the other
hand, Infrastructure providers connecting customer premise equipments (CPEs) to the network are the access
providers [3].
3.1.4 Broker
Brokers play a pivotal role in the network virtualization economy. They act as mediators between infrastruc-
ture providers, service providers, and end users in the network virtualization marketplace. Service providers
buy (lease) resources from infrastructure providers to create virtual networks and sell services deployed on
those virtual networks to interested end users through brokers. Their presence simplify the process of match-
ing service providers’ requirements to available resources by aggregating offers from multiple infrastructure
providers. Similarly, they also allow end users to select desirable services from a wide range of service
providers.
3.2 Architecture
In the network virtualization environment (NVE), the basic entity is a virtual network (VN). Each virtual
network is composed and managed by a single service provider. It is a collection of virtual nodes connected
together by a set of virtual links forming a virtual topology. Once provisioned a virtual network has the
semblance of an actual physical network. Figure 2 depicts two possibly heterogeneous virtual networks
VN1 and VN2 created by service providers SP1 and SP2, respectively. SP1 composed VN1 on top of the
physical resources managed by two different infrastructure providers InP1 and InP2, and provides end-to-end
services to the end users U2 and U3. SP2, on the other hand, deployed its virtual network VN2 by combining
resources from infrastructure provider InP1, with a child virtual network from service provider SP1. End
users U1 and U3 are connected through VN2.
The owner of a virtual network is free to implement end-to-end services by selecting custom packet
formats, routing protocols, forwarding mechanisms, as well as control and management planes. End users
can opt-in to any virtual network. For example, end user U3 is subscribed to both VN1 and VN2.
3.2.1 Concepts
Here we formally define the common terminologies and notations that frequently appear to describe or refer
to the different aspects of a network virtualization architecture.
6
Figure 2: Network Virtualization Architecture
Physical Topology A weighted undirected graph GP = (VP , EP ), where each node in the network is a
vertex vP ∈ VP , with a set of attributes AvP . Similarly, each physical link between two nodes is represented
by an edge eP ∈ EP , with corresponding set of attributes AeP .
Virtual Topology Another weighted undirected graph GV = (VV , EV ), where VV is the set of virtual
nodes and EV is the set of virtual links. It is also known as logical topology. Virtual nodes, vV and virtual
links, eV also have their corresponding set of attributes AvV and AeV respectively, that are provided by the
service provider when placing a request for a virtual network.
Virtual Node A virtual node can either be a virtual host or a virtual router. A virtual host act as a
packet source or a sink and is never located inside the network. A virtual router, on the other hand, acts
in the same way as a router in the physical network. Its main functionality is to forward packets according
to the protocols of that virtual network.
Virtual Link An edge, eV ∈ EV , in the virtual network that may span over one or more connected physical
links i.e. a path in the underlying physical topology. As mentioned earlier, eV has a set of attributes AeV
that characterize it. Bandwidth, delay, loss etc. are the examples of attributes of a virtual link.
Concurrence Concurrence of virtual networks means that multiple virtual networks from different service
providers can coexist together, spanning over part or full of the underlying physical networks provided by
one or more infrastructure providers. VN1 and VN2 in Figure 2 are examples of concurrent virtual networks.
To put it simply, an infrastructure provider might cater to multiple service providers and a service provider
might use resources from different infrastructure providers.
Recursion While virtual networks can be concurrent, in some cases, it might also be necessary to create
and maintain one or more virtual networks within another virtual network creating a virtual network hi-
7
erarchy with parent-child relationship. This is known as recursion as well as nesting of virtual networks.
In Figure 1(b), ‘Service Provider 0’ has created a virtual network on top of an actual physical network
provided by ‘Infrastructure Provider 0’, and has leased away a portion of the allocated resources to ‘Service
Provider 1’, to whom it appears as ‘Infrastructure Provider 1’. This hierarchical construct can continue until
cumulative overhead of creating child virtual networks makes further subdivision impossible.
Inheritance Child virtual networks, i.e. networks derived from other networks, can inherit architectural
components from their parents. Also, constraints on a parent virtual network automatically translate to
similar constraints on its children. In Figure 2, constraints due to InP2 will automatically be transferred to
SP2 from SP1 through inheritance.
Revisitation Revisitation allows a physical node in the underlying infrastructure to host multiple virtual
nodes of a single virtual network. Use of multiple logical routers to handle diverse functionalities in a complex
network can be a great relief for network operators. It can also be useful for creating testbed networks. In
Figure 2, we can see an illustration of revisitation in VN2.
3.3.1 Flexibility
Network virtualization must provide flexibility at every aspect of networking. Each service provider should
be able to use arbitrary network topology, routing or forwarding functions as well as customized control
protocols independent of the underlying physical network and other coexisting virtual networks.
For example, deploying source routing in today’s Internet is immensely difficult because of the lack of
consensus among the ISPs; in a virtualized environment, the owner of a virtual network should be able to
offer source routing without having to coordinate with any other parties.
3.3.2 Manageability
By separating service providers from infrastructure providers, network virtualization will modularize network
management tasks and introduce accountability at every layer of networking [4, 43, 44, 2]. Infrastructure
providers will be in total control of the management and operations of physical entities in the network
and provide access to resources. Whereas, service providers will lease subsets of resources from different
infrastructure providers, create virtual networks on top of the allocated resources following specific policies,
and provide actual services to end users. This separation of accountability will provide complete, end-to-end
control of the virtual networks to the service providers obviating the requirement of coordination across
administrative boundaries as seen in the existing Internet.
3.3.3 Scalability
Coexistence of multiple networks is one of the fundamental motivations behind network virtualization. Scal-
ability comes as an indispensable part of this equation. Optimally, there should be as many virtual networks
as the underlying infrastructure can manage resource for. But due to conflicting requirements and different
constraints it might not be possible to accommodate so many of them in practice. Infrastructure providers
should try to maximize the number of coexisting virtual networks without degrading performance of any
one of them. This will increase utilization of resources and amortize capital expenditure (CAPEX) and
operational expenditure (OPEX) of individual virtual networks.
8
3.3.4 Isolation, Security, and Privacy
Network virtualization must provide isolation (both logical and resource) between different co-existing virtual
networks, which will result in networks that are resilient to faults and attacks. Failure or security breach in
one virtual network should not be able to affect another. Also the risk involved in carrying untrusted services
and applications along with confidential information can be reduced by using separate virtual networks
for each of them. Network protocols are often misconfigured and are subject to implementation bugs.
Virtualization will ensure that misconfigurations or bugs in one network do not hamper the operations of
another.
3.3.5 Programmability
To make virtual networks flexible and manageable, programmability of the network elements is of utmost
importance. Only through programmable network elements, it will be possible for the service providers to
implement customized protocols and deploy diverse services. Hence, the design decisions: “how much pro-
grammability should be allowed”, and “how it should be exposed” must have satisfactory answers. Once again
the disagreement between the active networks community and the open programmable networks community
becomes eminent. We must find a win-win situation where programmability will be easy, effective, as well
as secure at the same time.
3.3.6 Heterogeneity
Heterogeneity in the context of network virtualization comes from two fronts. First, heterogeneity of the
underlying networking technologies (e.g., optical, wireless, sensor etc.). Since each networking technology
has its unique characteristics, enabling virtualization in each of them call for different solutions. Second, each
end-to-end virtual network, created on top of that heterogeneous combination of infrastructure networks, can
also be heterogeneous. Service providers must be allowed to compose and run end-to-end virtual networks
without any restrictions and across multiple domains without the need for technology specific solutions.
Moreover, underlying infrastructures must be capable of supporting heterogeneous protocols and algorithms
implemented by different service providers. In addition, heterogeneity of end user devices must also be taken
into account.
9
4 Network Virtualization Projects
The term “virtual networks” has been extravagantly used by different research groups to describe their works
on virtual private networks, overlay networks, and active or programmable networks. Until recently, very few
of them actually followed the pluralist view of network virtualization. In this section, we survey a number
of virtual network architectures and related projects (e.g. overlay, programmable network or VPN inspired
designs) that have emerged in the literature. We categorize the projects based on a set of characteristics and
select a representative project for each characteristic. At the end of the section, we summarize the surveyed
projects in Table 1.
4.1 Characteristics
In the motley of multifarious designs, one can observe a set of characteristics that govern the construction
of different network virtualization architectures by careful examination. We use the following characteristics
to better understand the already crowded field:
• Networking technology
• Layer of virtualization
• Architectural domain
• Level of virtualization
10
4.2.2 ATM: Tempest
The Tempest [52] is a network control architecture that allows multiple heterogeneous control architectures
to run simultaneously over single physical ATM network. It is defined as a set of policies, algorithms,
mechanisms, and protocols to control and manage various devices on the network following the open signaling
(§2.2.1) school of thought of network programmability. It is based on the concept of switchlets [53], which
allows a single ATM switch to be controlled by multiple controllers by strictly partitioning the resources of
that switch between those controllers. The set of switchlets that a controller or group of controllers possess
forms its virtual network. Third parties can lease such virtual networks from the Tempest network operator
to use them for any purpose as they see fit.
The Tempest supports programmability at two levels of granularity. First, switchlets support the intro-
duction of alternative control architectures in the network. Second, services can be refined by dynamically
loading programs into the network that customize existing control architectures. This allows the users to
have application-specific control. And the association between user defined control policy and the allocated
network resources is known as connection closure.
The basic components of the Tempest are as follows: first, a control architecture communicates with
a switch independent control interface Ariel. Then it goes to the Prospero switch divider, which logically
divides an ATM switch into switchlets and assigns resources to the client. There is an SNMP based switch
management interface, Caliban, that provides basic functionalities to manage the switchlets. A basic boot-
strapping virtual network is provided for the components to interact between themselves to create the actual
virtual network. Afterward, network builder creates the topology of the virtual network based on a given
specification. Network builder is also responsible for the modification and maintenance of virtual networks.
And finally, the Hollowman control architecture [54] provides an out-of-band signaling mechanism for com-
munication between ATM enabled workstations to devolve control from the ATM switches into an application
level distributed processing environment.
11
each maintain a network presence on a given LAN. As a result, the management process is concerned with
managing VMs present in the same LAN, instead of dealing with heterogeneous management policies of
different sites.
Each physical machine hosting a VM runs a VNET process that intercepts VM traffic and tunnels it to
the appropriate destination. The destination is either another VM that can be contacted directly through
VNET or an address external to the overlay. Traffic destined for an external address is routed through the
overlay to a VNET proxy node, which is responsible for injecting the packets onto the appropriate network.
The overlay thus consists of a set of TCP connections or UDP peers (VNET links) and a set of rules (VNET
routes) to control routing on the overlay.
Since VNET operates at layer 2, it is agnostic to layer 3. As a result, protocols other than IP can be
used. Furthermore, MAC address of a VM’s virtual Ethernet adapter and the LAN it appears in are kept
fixed for the lifetime of that VM. As a result, a VM can be migrated from one machine to another without
any participation from the VM’s OS and all connections remain open after migration.
12
4.4 Architectural Domain
Most virtual networking projects are related to the introduction of new services. However, typically each
one focuses on a particular architectural domain (e.g. management, transport, application etc.). We discuss
four projects that address virtualization in the context of network management, resource management, and
service composition through virtual active networks (VANs), and spawning networks.
13
create a programmable stream-processing system that enables creation of arbitrary packet formats, dynamic
composition of standard and active protocol, and can operate on any type of packet stream defined by the
presentation language.
In essence, NetScript is analogous to PostScript for printers. Just as PostScript captures the programma-
bility of printer engines, NetScript creates a software abstraction to capture the programmability of network
node functions. NetScript communication abstractions consider network nodes as collections of Virtual Net-
work Engines (VNEs) interconnected by Virtual Links (VLs) that constitute NetScript Virtual Networks
(NVNs) [82].
14
There are resource monitor and resource broker services that handle the resource management in Plan-
etLab. To obtain a slice a user first contacts a resource broker, then goes through admission control process
in each of the nodes assigned by the broker and finally it launches its service in the resulting slice.
PlanetLab currently consists of over 800 nodes at around 400 sites [45], and hundreds of research exper-
iments have been successfully conducted over the years that prove its worth.
4.5.2 VINI
VINI [46, 89] is a virtual network infrastructure allowing network researchers to evaluate their protocols and
services in a realistic environment with high degree of control. It can be viewed as an extension to PlanetLab
toward GENI, that will be able to provide infrastructure like PlanetLab(§4.5.1) along with the support for
virtual networks as in X-Bone(§4.2.1) or VIOLIN(§4.3.4).
VINI offers more latitude to researchers than PlanetLab at routing level; and provides the ability to create
real complex networks, and to inject exogenous events to create more realistic alternative to simulation and
emulation of proposed network architectures. To achieve realism, VINI can be placed as a middle-ground
of an end-to-end Internet path. The real traffic that traverse through VINI is then used by the research
experiments running on VINI.
Initial prototype of VINI (PL-VINI) was implemented on PlanetLab by synthesizing a collection of
available software components. It can be considered as a specific instantiation of an overlay network that
runs software routers and allows multiple such overlays to exist in parallel. In particular, it used XORP
for routing [90], Click for packet forwarding and network address translation [91], and OpenVPN servers to
connect with end users [92].
Recently a software platform for hosting multiple virtual networks on shared physical network infrastruc-
ture, Trellis [93], has been developed. Trellis synthesizes container-based virtualization technologies together
with a tunneling mechanism into a coherent platform to achieve the following design goals: performance,
scalability, flexibility, and isolation. It allows each virtual network to define its custom topology, routing
protocols, and forwarding tables. Initial evaluations show that virtual networks hosted on Trellis can transfer
packets as fast as regular networks, and Trellis can host at least 64 such virtual networks without performance
degradation.
4.5.3 GENI
Based on the experience accumulated from using PlanetLab and other similar testbeds, the Global Envi-
ronment for Network Innovations (GENI) [94, 95] is a major planned initiative of the US National Science
Foundation (NSF) to build an open, large-scale, realistic experimental facility for evaluating new network
architectures, carrying real traffic on behalf of end users, and connecting to the existing Internet to reach
external sites. The purpose of GENI is to give researchers the opportunity to create customized virtual
network and experiment unfettered by assumptions or requirements of the existing Internet.
Main design goals of GENI [95] include: sliceability to share resources, generality to give an initial flexible
platform for the researchers, fidelity, diversity and extensibility, wide deployment and user access for testing
and evaluation purposes as well as actual use of deployed services and prototypes, controlled isolation and
monitoring facilities.
GENI proposes virtualization in the form of slices of resources in space and time. If resources are
partitioned in time, a given resource might not sustain real user workload, thereby limiting its feasibility
for deployment studies. On the other hand, if resources are partitioned in space, only a limited number of
researchers might be able to include a given resource in their slices. In order to maintain balance, GENI
proposes to use both types of virtualization based on resource type. If sufficient capacity is available to
support deployment studies, GENI uses time-based slicing; otherwise, it partitions resources in space to
support a handful of high priority projects instead of making those resources available to everyone.
15
virtualization that promotes separation between infrastructure providers and service providers to end this
deadlock. CABO exploits virtualization to allow service providers to simultaneously run multiple end-to-
end services over equipment owned by different infrastructure providers. On one hand, CABO gives service
providers direct control over the protocols and services that run on the virtual nodes and allows them to
instantiate a virtual network on multi-provider infrastructure. On the other hand, it enables infrastructure
providers to automatically discover and manage their physical infrastructure by running a discovery plane
of their own [96].
To allow multiple virtual networks to share the same physical equipments, CABO virtualizes the nodes
and the links. Virtual nodes are connected using virtual links to form a virtual network. These virtual nodes
are created by the service providers and hosted by infrastructure providers’ equipments using a subset of
available resources. Similarly, virtual links are formed from a path in the underlying physical network and
include portion of the resources along the path.
CABO has introduced and achieved some significant developments in terms of virtual routers and routing
in virtualized networks in general. It supports automatic migration of virtual routers from one physical node
to another [97] using migration technologies in the underlying virtual machines. It also proposes a new multi-
layer routing scheme that is scalable as well as quick to react to any changes in network conditions [98].
In supporting programmable routers, CABO resembles the theme introduced in active networks research
[22, 99], except for that it does not enable users to program the network; rather service providers can
customize their networks according to their need.
4.6 Summary
A summary of the characteristics of the reviewed network virtualization projects is presented in Table 1.
5.1 Interfacing
Service providers will synthesize physical infrastructure from one or more infrastructure providers to build
their virtual networks. Hence, every infrastructure provider must provide a well-defined interface so that
service providers can communicate with them and express their requirements. Ideally, every interface should
follow a standard. Expressing a virtual network request in terms of virtual nodes, and virtual links along
with their corresponding attributes can be a suitable solution.
Similarly, appropriate interfaces between end users and service providers, as well as among multiple
infrastructure providers, and among service providers must also be identified and standardized. Examples of
such interfaces and agreements between collaborating parties can be found in the AGAVE (§4.3.3) framework.
16
Table 1: Characteristics of different network virtualization projects
Architectural Networking Layer of Level of Ref.
X-Bone Automating the deployment of IP Application Node & Link [47, 48]
IP overlays
Genesis Spawning virtual network Network Node & Link [83, 84, 85]
architectures
UCLP Dynamic provisioning and SONET Physical Link [55, 59, 60]
reconfiguration of lightpaths
VNRMS Virtual network management ATM/IP Node & Link [71, 72, 73]
17
and bootstrapping, call for at least another network that will always be present to provide connectivity
to handle these issues. Genesis (§4.4.4) and Tempest (§4.2.2) follow this approach and provide a separate
bootstrapping interface.
18
a dynamic allocation framework where each substrate link periodically reassigns bandwidth shares between
the virtual links. However, dynamic allocation gives a hint of best-effort mechanisms found in the existing
Internet, and a careful investigation is required to validate such measure.
Existing system virtualization technology provides scheduling mechanisms for CPU, memory, disk, and
network interface in each of the VMs running on the host machine. Network virtualization can utilize these
mechanisms to implement resource scheduling in the physical infrastructure. Previous results from research
on packet scheduling algorithms for IP networks can also be useful in the design of schedulers.
19
L2, and L1 VPNs, respectively (§2.1). Similar protocols can be used in virtual networks too. Creating inter-
infrastructure provider tunnels poses a great challenge, since it will require collaboration between multiple
infrastructure providers. Whether the total tunneling procedure should be done without the knowledge of
infrastructure providers of the tunnels’ presence or should they know, is yet to be decided.
Speed matters for network links. The overhead for transporting packets across a virtual link must be
minimal compared to that of transporting packets across a native link. This translates into minimum
encapsulation and multiplexing cost. Optical fibers can be very useful in this regard, since they can be
physically sub-divided into smaller lightpaths instead of encapsulating or multiplexing packets from different
virtual networks to keep them isolated. Moreover, virtual links must also be flexible enough to carry packets
of any protocol.
20
• Geographical mobility from one physical network to another, and
• Logical mobility from one virtual network to another.
Finding the exact location of any resource at a particular moment and routing packets accordingly is a
complex research challenge that needs close scrutiny.
21
Table 2: Recent Network Virtualization Related Projects
Project Originated In Link
example, a large multinational corporation might deploy a virtual network across the globe, with child
virtual networks for each of the continents, to manage its operations. It is very likely that those child
virtual networks will need to communicate with the global one, as well as among themselves. In some cases,
communicating virtual networks might not even be under the same administrative domain, i.e. managed
by different service providers. Hence, the necessity, scope, and required interface for such interconnections
among service providers and corresponding virtual networks deserve close scrutiny.
6 Conclusion
Amid current trends of virtualizing practically every aspect of computing, ranging from operating systems,
storage systems to servers, and even large data centers (e.g., cloud computing), network virtualization stands
at a unique point in the virtualization design space. In one hand, it is necessary to have a virtualized network
to interconnect all other virtualized appliances to give each of the virtual entities a complete semblance of
their native counterparts. On the other hand, after enjoying years of rapid growth, the progress of the
Internet and networking in general has come to a standstill. Most researchers now agree that a redesign is a
bare necessity, not luxury [120]. Network virtualization can take the leading role in this scenario to promote
innovation, to provide flexibility, and to introduce heterogeneity. This realization has given birth to several
projects all over the world that are directly or indirectly related to network virtualization (Table 2).
However, realization of the network virtualization environment needs to satisfy the requirements set
by its characteristics and design goals. Even though these requirements will ensure an open, flexible, and
22
heterogeneous networking environment, ensuring themselves is not so easy. We encourage more insight into
the problems pointed out in this article and look forward to a motivated search for solutions to the open
research issues from the researchers in this field.
References
[1] T. Anderson, L. Peterson, S. Shenker, and J. Turner, “Overcoming the Internet impasse through
virtualization,” Computer, vol. 38, no. 4, pp. 34–41, 2005.
[2] J. Turner and D. Taylor, “Diversifying the internet,” in Proceedings of the IEEE Global Telecommuni-
cations Conference (GLOBECOM’05), vol. 2, 2005.
[3] M. Boucadair, B. Decraene, M. Garcia-Osma, A. J. Elizondo, J. R. Sanchez, B. Lemoine, E. Mykoniati,
P. Georgatsos, D. Griffin, J. Spencer, J. Griem, N. Wang, M. Howarth, G. Pavlou, S. Georgoulas, and
B. Quoitin, “Parallel Internets framework,” AGAVE Deliverable (Id: AGAVE/WP1/FTRD/D1.1/public),
2006.
[4] N. Feamster, L. Gao, and J. Rexford, “How to lease the internet in your spare time,” SIGCOMM
Computer Communication Review, vol. 37, no. 1, pp. 61–64, 2007.
[5] P. Ferguson and G. Huston, “What is a VPN?” Cisco Systems, Tech. Rep., 1998.
[6] E. Rosen and Y. Rekhter, “BGP/MPLS VPNs,” RFC 2547, March 1999.
[7] ——, “BGP/MPLS IP Virtual Private Networks (VPNs),” RFC 4364, February 2006.
[8] L. Andersson and T. Madsen, “Provider Provisioned Virtual Private Network (VPN) Terminology,”
RFC 4026, March 2005.
[9] M. Carugi and D. McDysan, “Service Requirements for Layer 3 Provider Provisioned Virtual Private
Networks (PPVPNs),” RFC 4031, April 2005.
[10] R. Callon and M. Suzuki, “A Framework for Layer 3 Provider-Provisioned Virtual Private Networks
(PPVPNs),” RFC 4110, July 2005.
[11] D. Farinacci, T. Li, S. Hanks, D. Meyer, and P. Traina, “Generic Routing Encapsulation (GRE),” RFC
2784, March 2000.
[12] K. Hamzeh, G. Pall, W. Verthein, J. Taarud, W. Little, and G. Zorn, “Point-to-Point Tunneling
Protocol (PPTP),” RFC 2637, July 1999.
[13] W. Townsley, A. Valencia, A. Rubens, G. Pall, G. Zorn, and B. Palter, “Layer Two Tunneling Protocol
“L2TP”,” RFC 2661, August 1999.
[14] S. Kent and K. Seo, “Security Architecture for the Internet Protocol,” RFC 4301, December 2005.
[15] L. Andersson and E. Rosen, “Framework for Layer 2 Virtual Private Networks (L2VPNs),” RFC 4664,
September 2006.
[16] W. Augustyn and Y. Serbest, “Service Requirements for Layer 2 Provider-Provisioned Virtual Private
Networks,” RFC 4665, September 2006.
[17] E. Mannie, “Generalized Multi-Protocol Label Switching (GMPLS) Architecture,” RFC 3945, October
2004.
[18] D. Benhaddou and W. Alanqar, “Layer 1 virtual private networks in multidomain next-generation
networks,” IEEE Communications Magazine, vol. 45, no. 4, pp. 52–58, April 2007.
[19] T. Takeda, “Framework and Requirements for Layer 1 Virtual Private Networks,” RFC 4847, April
2007.
23
[20] A. T. Campbell, H. G. D. Meer, M. E. Kounavis, K. Miki, J. B. Vicente, and D. Villela, “A survey
of programmable networks,” SIGCOMM Computer Communication Review, vol. 29, no. 2, pp. 7–23,
1999.
[21] “Open Signaling working group,” http://comet.columbia.edu/opensig/.
[22] D. L. Tennenhouse and D. J. Wetherall, “Towards an active network architecture,” ACM Computer
Communication Review, vol. 26, no. 2, 1996.
[23] D. L. Tennenhouse, J. M. Smith, W. D. Sincoskie, D. J. Wetherall, and G. J. Minden, “A survey of
active network research,” IEEE Communications Magazine, vol. 35, no. 1, pp. 80–86, January 1997.
[24] A. A. Youssef, “A survey of active networks,” University of Maryland, Tech. Rep. CS-TR-4422, 1999.
[25] D. Niculescu, “Survey of active network research,” http://www.research.rutgers.edu/∼dnicules/
research/other/active survey.pdf, 1999.
[26] D. Wetherall, J. Guttag, and D. Tennenhouse, “ANTS: A toolkit for building and dynamically deploy-
ing network protocols,” in IEEE OPENARCH’98, 1998, pp. 117–129.
[27] D. Decasper and B. Plattner, “DAN: Distributed code caching for active networks,” in Proceedings of
the IEEE INFOCOM’98, vol. 2, 1998, pp. 609–616.
[28] K. Calvert, S. Bhattacharjee, E. Zegura, and J. Sterbenz, “Directions in active networks,” IEEE
Communications Magazine, vol. 36, no. 10, pp. 72–78, October 1998.
[29] S. Savage, T. Anderson, A. Aggarwal, D. Becker, N. Cardwell, A. Collins, E. Hoffman, J. Snell,
A. Vahdat, G. Voelker, and J. Zahorjan, “Detour: a case for informed internet routing and transport,”
IEEE Internet Computing, vol. 19, no. 1, pp. 50–59, January 1999.
[30] D. Andersen, H. Balakrishnan, F. Kaashoek, and R. Morris, “Resilient overlay networks,” SIGOPS
Operating Systems Review, vol. 35, no. 5, pp. 131–145, 2001.
[31] H. Eriksson, “MBone: The multicast backbone,” Communications of the ACM, vol. 37, no. 8, pp.
54–60, 1994.
[32] J. Jannotti, D. K. Gifford, K. L. Johnson, M. F. Kaashoek, and J. James W. O’Toole, “Overcast:
Reliable multicasting with an overlay network,” in Proceedings of the 4th conference on Symposium on
Operating System Design & Implementation (OSDI’00), 2000, pp. 197–212.
[33] Y. Chu, S. Rao, S. Seshan, and H. Zhang, “Enabling conferencing applications on the internet using
an overlay muilticast architecture,” SIGCOMM Computer Communication Review, vol. 31, no. 4, pp.
55–67, 2001.
[34] L. Subramanian, I. Stoica, H. Balakrishnan, and R. Katz, “OverQoS: An overlay based architecture
for enhancing internet QoS,” in Proceedings of the 1st Symposium on Networked Systems Design and
Implementation (NSDI), March 2004, pp. 71–84.
[35] A. Keromytis, V. Misra, and D. Rubenstein, “SOS: Secure overlay services,” in Proceedings of the
ACM SIGCOMM Conference (SIGCOMM’02), August 2002.
[36] D. G. Andersen, “Mayday: Distributed filtering for internet services,” in Proceedings of the 4th con-
ference on USENIX Symposium on Internet Technologies and Systems (USITS’03). Berkeley, CA,
USA: USENIX Association, 2003.
[37] B. Krishnamurthy, C. Wills, and Y. Zhang, “On the use and performance of content distribution
networks,” in Proceedings of the 1st ACM SIGCOMM Workshop on Internet Measurement (IMW’01).
New York, NY, USA: ACM, 2001, pp. 169–182.
[38] E. K. Lua, J. Crowcroft, M. Pias, R. Sharma, and S. Lim, “A survey and comparison of peer-to-peer
overlay network schemes,” IEEE Communications Surveys & Tutorials, vol. 7, no. 2, pp. 72–93, 2005.
24
[39] F. Dabek, M. F. Kaashoek, D. Karger, R. Morris, and I. Stoica, “Wide-area cooperative storage with
CFS,” in Proceedings of the eighteenth ACM symposium on Operating systems principles (SOSP’01).
New York, NY, USA: ACM, 2001, pp. 202–215.
[40] I. Stoica, D. Adkins, S. Zhuang, S. Shenker, and S. Surana, “Internet indirection infrastructure,” in
Proceedings of the ACM SIGCOMM Conference (SIGCOMM’02), 2002, pp. 73–88.
[41] K. Lakshminarayana, I. Stoica, S. Shenker, and J. Rexford, “Routing as a service,” UC Berkeley, Tech.
Rep. UCB/EECS-2006-19, 2006.
[42] Z. Duan, Z.-L. Zhang, and Y. T. Hou, “Service overlay networks: SLAs, QoS, and bandwidth provi-
sioning,” IEEE/ACM Transactions on Networking, vol. 11, no. 6, pp. 870–883, 2003.
[43] M. Boucadair, P. Levis, D. Griffin, N. Wang, M. Howarth, G. Pavlou, E. Mykoniati, P. Georgatsos,
B. Quoitin, J. R. Sanchez, and M. Garcia-Osma, “A framework for end-to-end service differentiation:
Network planes and parallel Internets,” IEEE Communications, vol. 45, no. 9, pp. 134–143, September
2007.
[44] Y. Zhu and M. Ammar, “Algorithms for assigning substrate network resources to virtual network
components,” in Proceedings of the IEEE INFOCOM’06, 2006.
[45] “PlanetLab: An open platform for developing, deploying, and accessing planetary-scale services,”
http://www.planet-lab.org/.
[46] “VINI: A virtual network infrastructure,” http://www.vini-veritas.net/.
[47] J. Touch and S. Hotz, “The X-Bone,” in In Proceedings of the Third Global Internet Mini-Conference
at GLOBECOM’98, 1998, pp. 44–52.
[48] J. D. Touch, Y.-S. Wang, L. Eggert, and G. Finn, “A virtual internet architecture,” USC/Information
Sciences Institute, Tech. Rep. TR-570, 2003.
[49] C. Perkins, “IP encapsulation within IP,” RFC 2003, October 1996.
[50] F. Baker, “Requirements for IPv4 routers,” RFC 1812, June 1995.
[51] N. Fujita, J. D. Touch, V. Pingali, and Y.-S. Wang, “A dynamic topology and routing management
strategy for virtual ip networks,” IEICE Transactions on Communications, vol. E89-B, no. 9, pp.
2375–2384, 2006.
[52] J. E. van der Merwe, S. Rooney, I. Leslie, and S. Crosby, “The Tempest—A practical framework for
network programmability,” IEEE Network Magazine, vol. 12, no. 3, pp. 20–28, 1998.
[53] J. E. van der Merwe and I. M. Leslie, “Switchlets and dynamic virtual ATM networks,” in Proceedings
of the IFIP/IEEE International Symposium on Integrated Network Management (IM’97), 1997, pp.
355–368.
[54] S. Rooney, “The hollowman: an innovative atm control architecture,” in Proceedings of the fifth
IFIP/IEEE International Symposium on Integrated Network Management V : Integrated Management
in a Virtual World. London, UK, UK: Chapman & Hall, Ltd., 1997, pp. 369–380.
[55] U. of Waterloo, “User controlled lightpaths project,” http://uclp.uwaterloo.ca/.
[56] R. Boutaba, W. Golab, Y. Iraqi, and B. St-Arnaud, “Grid-controlled lightpaths for high performance
grid applications,” Journal of Grid Computing, vol. 1, no. 4, pp. 387–394, December 2003.
[57] ——, “Lightpaths on demand: A web services-based management system,” IEEE Communications
Magazine, vol. 42, no. 7, July 2004.
[58] J. Wu, H. Zhang, S. Campbell, M. Savoie, G. Bochmann, and B. St Arnaud, “A grid oriented lightpath
provisioning system,” in Proceedings of the GLOBECOM’04, 2004, pp. 395–399.
25
[59] J. Recio, E. Grasa, S. Figuerola, and G. Junyent, “Evolution of the user controlled lightpath provision-
ing system,” in Proceedings of 7th International Conference on Transparent Optical Networks, vol. 1,
July 2005, pp. 263–266.
[60] B. Nandy, D. Bennett, I. Ahmad, S. Majumdar, and B. St.Arnaud, “User controlled lightpath man-
agement system based on a service oriented architecture,” http://www.solananetworks.com/UCLP/
files/UCLPv2-SOA.pdf, 2006.
[61] “Virtuoso: Resource management and prediction for distributed computing using virtual machines,”
http://virtuoso.cs.northwestern.edu/.
[62] A. Sundararaj and P. Dinda, “Towards virtual networks for virtual machine grid computing,” in
Proceedings of the 3rd USENIX Virtual Machine Research and Technology Symposium (VM’04), 2004.
[63] N. Wang, D. Griffin, J. Spencer, J. Griem, J. R. Sanchez, M. Boucadair, E. Mykoniati, B. Quoitin,
M. Howarth, G. Pavlou, A. J. Elizondo, M. L. G. Osma, and P. Georgatsos, “A framework for
lightweight QoS provisioning: Network planes and parallel Internets,” in Proceedings of the 10th
IFIP/IEEE International Symposium on Integrated Network Management (IM’07), 2007, pp. 797–800.
[64] B. Braden, D. Clark, and S. Shenker, “Integrated services in the Internet architecture: An overview,”
RFC 1633, June 1994.
[65] S. Blake, D. Black, M. Carlson, E. Davies, Z. Wang, and W. Weiss, “An architecture for differentiated
services,” RFC 2475, December 1998.
[66] X. Jiang and D. Xu, “VIOLIN: Virtual internetworking on overlay infrastructure,” Purdue University,
Tech. Rep. TR-03-027, 2003.
[67] P. Ruth, X. Jiang, D. Xu, and S. Goasguen, “Virtual distributed environments in a shared infrastruc-
ture,” Computer, vol. 38, no. 5, pp. 63–69, 2005.
[68] A. Whitaker, M. Shaw, and S. D. Gribble, “Scale and performance in the denali isolation kernel,” in
Proceedings of the 5th symposium on Operating Systems Design and Implementation (OSDI’02), 2002,
pp. 195–210.
[69] P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield,
“Xen and the art of virtualization,” in Proceedings of the nineteenth ACM symposium on Operating
systems principles (SOSP’03). New York, NY, USA: ACM, 2003, pp. 164–177.
[70] J. Dike, “A user-mode port of the linux kernel,” in Proceedings of the 4th Annual Linux Showcase &
Conference (ALS’00). Berkeley, CA, USA: USENIX Association, 2000, pp. 7–7.
[71] A. Jun and A. Leon-Garcia, “A virtual network approach to network resources management,” in
Proceedings of the Canadian Conference on Broadband Research (CCBR’98), June 1998.
[72] ——, “Virtual network resources management: A divide-and-conquer approach for the control of fu-
ture networks,” in Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM’98),
vol. 2, 1998, pp. 1065–1070.
[73] W. Ng, R. Boutaba, and A. Leon-Garcia, “Provision and customization of ATM virtual networks for
supporting IP services,” in Proceedings of the IEEE ATM Workshop’1999, 1999, pp. 205–210.
[74] W. Ng, D. Jun, H. Chow, R. Boutaba, and A. Leon-Garcia, “Miblets: A practical approach to virtual
network management,” in Proceedings of the Sixth IFIP/IEEE International Symposium on Integrated
Network Management (IM’99), 1999, pp. 201–215.
[75] J. Case, M. Fedor, M. Schoffstall, and J. Davin, “Simple Network Management Protocol (SNMP),”
RFC 1157, May 1990.
26
[76] R. Boutaba, W. Ng, and A. Leon-Garcia, “Web-based customer management of VPNs,” Journal of
Network and Systems Management, vol. 9, no. 1, pp. 67–87, 2001.
[77] P. Chandra, A. Fisher, C. Kosak, T. S. E. Ng, P. Steenkiste, E. Takahashi, and H. Zhang, “Darwin:
Customizable resource management for value-added network services,” IEEE Network, vol. 15, no. 1,
pp. 22–35, 2001.
[78] P. Chandra, A. Fisher, C. Kosak, and P. Steenkiste, “Network support for application-oriented QoS,”
in Proceedings of Sixth International Workshop on Quality of Service (IWQoS’98), May 1998, pp.
187–195.
[79] P. Chandra, A. Fisher, and P. Steenkiste, “Beagle - a resource allocation protocol for advanced services
internet,” Carnegie Mellon University, Tech. Rep. CMU-CS-98-150, August 1998.
[80] S. da Silva, Y. Yemini, and D. Florissi, “The NetScript active network system,” IEEE Journal on
Selected Areas in Communication, vol. 19, no. 3, pp. 538–551, 2001.
[81] S. da Silva, D. Florissi, and Y. Yemini, “NetScript: A language-based approach to active networks,”
Columbia University, Tech. Rep., January 1998.
[82] Y. Yemini and S. da Silva, “Towards programmable networks,” in IFIP/IEEE International Symposium
on Distributed Systems: Operations and Management, October 1997.
[83] M. Kounavis, A. Campbell, S. Chou, F. Modoux, J. Vicente, and H. Zhuang, “The Genesis Ker-
nel: A programming system for spawning network architectures,” IEEE Journal on Selected Areas in
Communications, vol. 19, no. 3, pp. 511–526, 2001.
[84] A. A. Lazar and A. T. Campbell, “Spawning networking architectures (White Paper),” Columbia
University, Tech. Rep., 1998.
[85] A. T. Campbell, M. E. Kounavis, D. A. Villela, J. Vicente, K. Miki, H. G. D. Meer, and K. S.
Kalaichelvan, “Spawning networks,” IEEE Network Magazine, vol. 13, no. 4, pp. 16–30, 1999.
[86] D. Villela, A. T. Campbell, and J. Vicente, “Virtuosity: Programmable resource management for
spawning networks,” Computer Networks, vol. 36, no. 1, pp. 49–73, 2001.
[87] L. Peterson, T. Anderson, D. Culler, and T. Roscoe, “A blueprint for introducing disruptive technology
into the Internet,” SIGCOMM Computer Communication Review, vol. 33, no. 1, pp. 59–64, 2003.
[88] N. Spring, L. Peterson, A. Bavier, and V. Pai, “Using PlanetLab for network research: Myths, realities,
and best practices,” SIGOPS Operating Systems Review, vol. 40, no. 1, pp. 17–24, 2006.
[89] A. Bavier, N. Feamster, M. Huang, L. Peterson, and J. Rexford, “In VINI veritas: Realistic and
controlled network experimentation,” in Proceedings of SIGCOMM’06. New York, NY, USA: ACM,
2006, pp. 3–14.
[90] M. Handley, E. Kohler, A. Ghosh, O. Hodson, and P. Radoslavov, “Designing extensible IP router
software,” in Proceedings of the 2nd conference on Symposium on Networked Systems Design & Imple-
mentation (NSDI’05). Berkeley, CA, USA: USENIX Association, 2005, pp. 189–202.
[91] E. Kohler, R. Morris, B. Chen, J. Jannotti, and M. F. Kaashoek, “The Click modular router,” ACM
Transactions on Computer Systems, vol. 18, no. 3, pp. 263–297, 2000.
[92] “OpenVPN: An open source SSL VPN solution,” http://openvpn.net/.
[93] S. Bhatia, M. Motiwala, W. Mühlbauer, V. Valancius, A. Bavier, N. Feamster, L. Peterson, and
J. Rexford, “Hosting virtual networks on commodity hardware,” Georgia Tech, Tech. Rep. GT-CS-07-
10, January 2008.
27
[95] G. P. Group, “GENI design principles,” Computer, vol. 39, no. 9, pp. 102–105, 2006.
[96] A. Greenberg, G. Hjalmtysson, D. A. Maltz, A. Myers, J. Rexford, G. Xie, H. Yan, J. Zhan, and
H. Zhang, “A clean slate 4d approach to network control and management,” SIGCOMM Computer
Communication Review, vol. 35, no. 5, pp. 41–54, 2005.
[97] Y. Wang, E. Keller, B. Biskeborn, J. van der Merwe, and J. Rexford, “Virtual routers on the move:
Live router migration as a network-management primitive,” in Proceedings of the ACM SIGCOMM’08,
2008, pp. 231–242.
[98] Y. Zhu, J. Rexford, A. Bavier, and N. Feamster, “UFO: A resilient layered routing architecture,”
Princeton University, Tech. Rep. TR-780-07, 2007.
[99] S. F. Bush, “Active virtual network management protocol,” in Proceedings of the Workshop on Parallel
and Distributed Simulation, 1999, pp. 182–192.
[100] B. Raghavan, K. Vishwanath, S. Ramabhadran, K. Yocum, and A. C. Snoeren, “Cloud control with
distributed rate limiting,” in Proceedings of SIGCOMM’07, 2007, pp. 337–348.
[105] J. Fan and M. Ammar, “Dynamic topology configuration in service overlay networks - a study of
reconfiguration policies,” in Proceedings of the IEEE INFOCOM’06, 2006.
[106] M. Yu, Y. Yi, J. Rexford, and M. Chiang, “Rethinking virtual network embedding: Substrate support
for path splitting and migration,” ACM SIGCOMM Computer Communication Review, vol. 38, no. 2,
pp. 17–29, April 2008.
[107] J. He, R. Zhang-Shen, Y. Li, C.-Y. Lee, J. Rexford, and M. Chiang, “Davinci: Dynamically adaptive
virtual networks for a customized internet,” in ACM CoNEXT, 2008.
[108] D. M. et al., “Core network design and vendor prophecies,” in NANOG 25, June 2003.
[109] S. Karlin and L. Peterson, “VERA: An extensible router architecture,” Computer Networks, vol. 38,
no. 3, pp. 277–293, 2002.
[110] L. Mathy, N. Egi, M. Hoerdt, A. Greenhalgh, and M. Handley, “(Some) implementation issues for
virtual routers,” in Workshop on Management of Network Virtualisation, 2007.
[111] M. Kolon, “Intelligent logical router service,” Juniper Networks, Tech. Rep. 200097-001, October 2004.
[112] J. Fu and J. Rexford, “Efficient IP-address lookup with a shared forwarding table for multiple virtual
routers,” in ACM CoNEXT, 2008.
[113] M. K. Chowdhury, F. Zaheer, and R. Boutaba, “iMark: An identity management framework for
network virtualization environment,” in The 11th IFIP/IEEE International Symposium on Integrated
Network Management (IM), 2009.
28
[114] M. Feridan, M. Moser, and A. Tanner, “Building an abstraction layer for management systems inte-
gration,” in Proceedings of the 1st IEEE/IFIP International Workshop on End-to-End Virtualization
and Grid Management (EVGM’2007), October 2007, pp. 57–60.
[115] A. P. Jayasumana, Q. Han, and T. H. Illangasekare, “Virtual sensor networks - a resource efficient
approach for concurrent applications,” in Proceedings of the International Conference on Information
Technology (ITNG’07). Washington, DC, USA: IEEE Computer Society, 2007, pp. 111–115.
[116] G. Smith, A. Chaturvedi, A. Mishra, and S. Banerjee, “Wireless virtualization on commodity 802.11
hardware,” in Proceedings of the the second ACM International Workshop on Wireless Network
Testbeds, Experimental Evaluation and Characterization (WinTECH’07). New York, NY, USA: ACM,
2007, pp. 75–82.
[117] D. Hausheer and B. Stiller, “Auctions for virtual network environments,” in Workshop on Management
of Network Virtualisation, 2007.
[118] ——, “PeerMart: Decentralized auctions for bandwidth trading on demand,” http://ercim-news.ercim.
org/content/view/100/254/, January 2007.
[119] A. Shoykhet, J. Lange, and P. Dinda, “Virtuoso: A system for virtual machine marketplaces,” North-
western University, Tech. Rep. NWU-CS-04-39, July 2004.
[120] A. Feldmann, “Internet clean-slate design: What and why?” SIGCOMM Computer Communication
Review, vol. 37, no. 3, pp. 59–64, July 2007.
29