Comparative Analysis Of Network Virtualization

Print   

02 Nov 2017

Disclaimer:
This essay has been written and submitted by students and is not an example of our work. Please click this link to view samples of our professional work witten by our professional essay writers. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of EssayCompany.

Abstract:

Network virtualization is used sharing the information from the single physical machine to multiple machines using virtual machine. Now a day’s virtual machine is quickly becoming a core component of the IT infrastructure. Virtualization can show the secure sharing, avoidance of hacking, multi platform usage in a single system. In this survey, it is being mentioned by using techniques of link-virtualization, SR-IOV, VMPlanner, WMN, and XenLoop. We can share the data without losing the performance, traffic effective, sharing memory with high speed, etc. The hidden hops supports the introduction of new Internet services  Where as link virtualization uses the multiple protocol label switching (MPLS) to open flow receives a lot of attention to be possible virtualized link. At the same time, SRIOV allows an I/O device with multiple virtual devices without losing performance. Virtual private AD-HOC network is used to require secure transparent continuous connectivity using heterogeneous devices and VM mapping to allocate the server resources and bandwidth resources with VM nodes while considering VM planner is implemented in network virtualization to avoid traffic to make efficient. Wireless mesh network shares network  connectivity in rural areas and other areas also that Xen loop provides high-speed network in bidirectional ways. However, the current scenario consists of the networking phenomena in a complex manner that means the synchronization of the networking is not present. From these results, it yields the necessity of a new system that enhances the availability to the needs. The survey point outs the scarcity that has to be improved. The introduction of an advanced system can overcome this and will be able to provide an optimal performance to our networking with the simplification of the current systems.

Introduction:

Virtualization is an attractive design principle as it abstracts heterogeneous resources and as it allows for resource sharing. Network virtualization is used to sharing the data secure and can use the internet communication in virtual machine. From the survey we show that previous system cannot allocate the bandwidth to each machine. So we can optimize the resource as allocating same bandwidth to all virtual machine from the physical system. Functionality of network virtualization Flexible management the network virtualization layer breaks the coupling between the logic used to construct the forwarding table and the physical hardware that implements the packet forwarding task [7] [8]. Xen virtualization layer is directly placed over the hardware, each virtual router has access to all computer components, such as memory, processor, and I/O devices. The capability to manage virtual technology is slightly which is receiving a lot of awareness right now. Xen, KVM, QEMU and others provide the infrastructure required operation on a virtual machine, and each can provide guests with a virtual network interface [16].

Connect between Virtual Nodes through virtualized NIC, Network Isolation: Node that is the member of a virtual network cannot see other virtual network's packets. Bandwidth Isolation: Virtual link shared physical link’s bandwidth. A virtual link cannot intrude on other virtual links’ bandwidth [17]. Virtual Private Ad Hoc Networks (VPAN) offer a solution to this complex problem by creating virtual networks on top of the existing network infrastructure. As such, in the future, users will not be restricted to work on a single device, but their device will act as a portal to a number of secure self-organizing network environments [18]. Network virtualization of a wireless mesh network (WMN) is an economical way for different subscribers to customize their exclusive access networks through a common network infrastructure. The most critical task of network virtualization is virtual network embedding, which can be divided into two sub-problems: node mapping and link mapping [19]. A fully visible and high-performance inter-VM network loopback channel, called XenLoop, in the Xen virtual mechanism atmosphere. XenLoop intercepts outgoing network packets and shepherds the packets destined to a co-resident VMs through a high-speed inter-VM shared memory channel that bypasses the virtualized system interface [20]

II. Existing system:

Virtual networks (VNets) :

Network virtualization is an important concept to overcome the ossification of today’s the Internet as it facilitates innovation also in the network core, and as it promises a more efficient use of the given resources and infrastructure. Network virtualization  goes to one step further and envisions a world where multiple virtual networks (VNets)  —which can be based on different networking protocols—cohabit the same physical network (the so-called substrate network) [4]

Slice using (B) slice in computer (C) slice on a network

Virtualization Hardware

Fig. 1 Obtaining "sliced" resources by means of virtualization for different scenarios

Hidden hops:

Network virtualization has emerged as a solution for the Internet inability to address the required challenges caused by the lack of coordination among Internet service providers for the deployment of new services.

Mapping is accomplished through resource sharing, with the resource being CPU time and memory for nodes and bandwidth for links.

This concept of virtual networks is realized in several different implementations. Examples are Virtual Private Networks, Peer-to-Peer networks and networks virtualized with System Virtualization. This paper proposes an algorithm to solve the virtual network embedding problem based in optimization theory. The aim is to maximize the remaining SN resources (CPU and Bandwidth) while mapping the virtual nodes and links with specific demands. [12]

2. Link-virtualization:

Router vendors such as Cisco and Juniper offer router virtualization, and Multiprotocol Label Switching (MPLS) solutions and Virtual Private Networks (VPNs) are widely deployed. Furthermore split architectures like Open Flow receives a lot of attention as they open new possibilities to virtualize link. [1]

Single-Root I/O Virtualization (SR-IOV):

The single-root I/O virtualization (SR-IOV) typically allows an I/O device to be shared by multiple Virtual Machines (VMs), without losing performance. [2]

SR-IOV has been proposed to improve the performance and scalability of I/O in Virtual machines and some 10GE NICs supporting this functionality have already appeared in the market. In addition to the SR-IOV support, these NICs all provide optimizations for various network layers within the OS kernel. In this paper we try to present a comprehensive view of the performance gain by SR-IOV. This study is conducted by evaluating the performance of 10GE NICs with SR-IOV support at different layers in various virtualized environments.

SR-IOV allows a single PCI device to be shared among multiple virtual technologies while retaining the performance benefit of conveying a PCI device to a virtual machine. A common example is where a single SR-IOV capable NIC - with perhaps only a single physical network port - might be shared with numerous virtual machines by assigning a virtual task to each VM.

SR-IOV shore up is implementing in the kernel. The core performance is contained in the PCI subsystem, but there must also be driver hold up for both the Physical Function (PF) and Virtual Function (VF) devices. With an SR-IOV capable device one can assign VFs from a PF. The VFs surfaces as PCI devices which are backed on the physical PCI device by resources (queues, and register sets).

Fig. 2. The device interacts with processor through interrupt, register and shared memory.

3.1. SR-IOV in FEDORA LINUX:

SR-IOV support further extends Fedora's ability to act as a high-performance server Virtualization solution. With the F11 feature PCI device assignment Fedora can assign a physical PCI device to a guest. With SR-IOV support Fedora can now allocate resources from a PCI device which itself supports SR-IOV. These resources, called Virtual Functions, surface as new PCI devices which can be assigned to a guest OS. This gives the same performance benefit of assigning a physical PCI device to a guest. It eliminates the need to have the server filled with physical PCI devices (which may not be physically possible for large counts of PCI devices), and the administrative complications of managing a large number of devices (these are typically NICs or HBAs, so there's cabling involved). Because the guest OS is efficiently driving the hardware directly, the I/O performance is on par with bare metal act. A definite development over emulated I/O devices or paravirtual I/O devices.[11]

3.2. Advantage of SR-IOV:

• Direct I/O throughput

• Reduced CPU utilization

• Increased scalability

• Improved device performance for virtual guests

4. VMPlanner:

VMPlanner is implemented and evaluated in a virtual background with traffic traces collected from a data center test-bed, and the trial results illustrate the effectiveness and competence of this approach. [3]

Fig. 3. System diagram of VMPlanner.

Virtual Private Ad Hoc Networking (VPAN):

Virtual Private Ad Hoc Networking (VPAN) platform is introduced as an integrated networking solution for many applications that require secure transparent continuous connectivity using heterogeneous devices and network technologies. For National Security and Public Safety (NSPS) workers, a special-purpose communication network is necessary with its special requirements. For emergency workers, a permanent connection enabling voice and data communication. [5]

When a VN request arrives, the substrate network has to provision for it, that is, find a suitable VN mapping, and allocate server resources and bandwidth resources to the VN nodes and VN edges, respectively. [15]. AVPN is a confidential data network that makes use of the open telecommunications infrastructure, thereby maintaining privacy through the use of a tunneling protocol and security events [14]. VPNs can offer authentication of the tunnel endpoints, confidentiality and authenticity of data transferred between these endpoints [15]. Mostly, traffic is routed over the tunnels by manually updating the routing tables in the endpoints, although a routing daemon can be run in order to exchange tables.[13]

Wireless Mesh Networks (WMNs):

Context-based approach for an effective means to extend multi-VNs from the Internet domain into WMN environments. Wireless Mesh Networks (WMNs) are spreading both in city and rural areas to connect heterogeneous home users. Their aim is to support (mobile) users seamlessly with cheap and easy to maintain connectivity. Network virtualization can make use of this mesh topology by sharing, and also by combining links for desired network properties. [9]

XenLoop:

XenLoop intercepts outgoing network packets under the network layer and shepherds the packets destined to co-resident VMs throughout a high-speed inter-VM common memory channel that bypasses the virtualized network interface. The heart of XenLoop module is a high-speed bidirectional inter-VM channel. This channel consists of three components—two first-in-first-out (FIFO) data channels, one each for transferring packets in each direction. [10]

Comparison of network virtualization:

Network Virtualization

Method

Author

Year

Improvement

Virtual networks (VNets)-Hidden hops

Juan Felipe Botero , Xavier Hesselbach ,Andreas Fischer , Hermann de Meer

2011

Split the infrastructure in multiple network in physical machine

Link-virtualization

Even, Moti Medina, Gregor Schaffrath , Stefan Schmid

2012

Router virtualization split architecture and create the virtualize link network

SR-IOV

Yaozu Dong, Xiaowei Yang, Jianhui Li, Guangdeng Liao , Kun Tian, Haibing Guan

2012

Improve the performance of virtual machines and shares the i/o devices with loss

VMPlanner

Weiwei Fang, Xiangmin Liang, Shengxin Li, Luca Chiaraviglio, Naixue Xiong

2012

Discard the traffics in a network and makes efficient

Virtual Private Ad Hoc Networking

Peter Dedecker , Jeroen Hoebeke , Ingrid Moerman ,Joris Moreau , Piet Demeester

2011

Shares voice and data communication with secure between workers

Wireless Mesh Networks

Ricardo Matos · Susana Sargento ,Karin Anna Hummel , Andrea Hess ·Kurt Tutschku ,Hermann de Meer

2011

Cheap and easy to maintain and spread in rural areas

Xenloop

JianWang , Kwame-LanteWright , Kartik Gopalan

2009

High speed network in bidirectional

Conclusion:

In current scenario it consists of the networking is not in a simplified manner. Here the current system follows static and dynamic routing. We follow the same mechanisms in the LAN and the wireless systems. The splitting of architecture cannot be considered as a best one because it may give the partiality for the networking methodology. The traffic becomes a main problem at the same time we are not at all aware of the process that goes in the background and it is not reaching to its optimal level. While considering the current methods we are not able to get the performance up to the expected level.it gives an unsynchronized rating in the networking speed. On the basis of this we may have to consider the introduction of a system that gives the optimal service in the networking speed and to simplify the current systems which enable synchronization in an effective way. The necessity emerges to the need of the new system that can meet the needs by overcoming the current problems so that tomorrow will define the networking through a special approach.



rev

Our Service Portfolio

jb

Want To Place An Order Quickly?

Then shoot us a message on Whatsapp, WeChat or Gmail. We are available 24/7 to assist you.

whatsapp

Do not panic, you are at the right place

jb

Visit Our essay writting help page to get all the details and guidence on availing our assiatance service.

Get 20% Discount, Now
£19 £14/ Per Page
14 days delivery time

Our writting assistance service is undoubtedly one of the most affordable writting assistance services and we have highly qualified professionls to help you with your work. So what are you waiting for, click below to order now.

Get An Instant Quote

ORDER TODAY!

Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

Get a Free Quote Order Now