End-to-end performance evaluation of virtual networks using a prototype implementation

Asanga Udugama, Liang Zhao, Yasir Zaki, Carmelita Goerg, Andreas Timm-Giel

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Network virtualization is a concept where physical resources are used to create virtual resources that are combined to form virtual networks. As one of the key enablers of the future Internet, network virtualization solves a number of issues associated with today's networks. Concepts of network virtualization that are not restricted to virtualization technology, termed as overall concepts that include roles of parties and deployment aspects are currently being defined in different research activities. An area that lack attention is the evaluation of performance in prototypes that consider these overall concepts of network virtualization. The work presented here discusses and presents the performance in a network virtualization prototype that considers these overall concepts.

Original languageEnglish (US)
Title of host publicationMobile Networks and Management - Second International ICST Conference, MONAMI 2010, Revised Selected Papers
Pages38-49
Number of pages12
DOIs
StatePublished - 2011
Event2nd International ICST Conference on Mobile Networks and Management, MONAMI 2010 - Santander, Spain
Duration: Sep 22 2010Sep 24 2010

Publication series

NameLecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering
Volume68 LNICST
ISSN (Print)1867-8211

Other

Other2nd International ICST Conference on Mobile Networks and Management, MONAMI 2010
Country/TerritorySpain
CitySantander
Period9/22/109/24/10

Keywords

  • FP7 4WARD Project
  • Infrastructure Provider
  • Network Virtualization
  • Virtual Network Operator
  • Virtual Network Provider
  • Virtual Resources

ASJC Scopus subject areas

  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'End-to-end performance evaluation of virtual networks using a prototype implementation'. Together they form a unique fingerprint.

Cite this