Bibliography

Warning! This page is not regularly maintained and has not been updated after 2009. It can still be a good starting point. You should also check out our survey(s).

This page contains a bibliography of the existing works on network virtualization that I’ve found useful in my research. It also touches some other concepts that are closely related, such as active and programmable networks, virtual private networks (VPNs), overlay networks, and virtual machines.

I am still working on how to properly categorize all the papers. If you have any comments, or suggestions regarding any aspect of this list, please don’t hesitate to contact me. Also, if you find that any significant work is missing or some information must be emended, please do the same.

Jump to…

Active and Programmable Networks

  • D. L. Tennenhouse and D. J. Wetherall, “Towards an active network architecture”, ACM Computer Communication Review, vol. 26, no. 2, 1996.
  • Y. Yemini and S. da Silva, “Towards programmable networks”, in IFIP/IEEE International Symposium on Distributed Systems: Operations and Management, October 1997.
  • A. T. Campbell, H. G. D. Meer, M. E. Kounavis, K. Miki, J. B. Vicente, and D. Villela, “A survey of programmable networks”, SIGCOMM Computer Communication Review, vol. 29, no. 2, pp. 7-23, 1999.
  • A. A. Youssef, “A survey of active networks”, University of Maryland, Tech. Rep. CS-TR-4422, 1999.
  • D. Niculescu, “Survey of active network research”, http://www.research.rutgers.edu/~dnicules/research/other/active_survey.pdf, 1999.
  • D. Decasper and B. Plattner, “DAN: Distributed code caching for active networks”, in Proceedings of the IEEE INFOCOM’98, vol. 2, 1998, pp. 609-616.
  • D. L. Tennenhouse, J. M. Smith, W. D. Sincoskie, D. J. Wetherall, and G. J. Minden, “A survey of active network research”, IEEE Communications Magazine, vol. 35, no. 1, pp. 80-86, January 1997.
  • “Open Signaling working group”, http://comet.columbia.edu/opensig/.
  • K. Calvert, S. Bhattacharjee, E. Zegura, and J. Sterbenz, “Directions in active networks”, IEEE Communications Magazine, vol. 36, no. 10, pp. 72-78, October 1998.
  • S. da Silva, Y. Yemini, and D. Florissi, “The NetScript active network system”, IEEE Journal on Selected Areas in Communication, vol. 19, no. 3, pp. 538-551, 2001.
  • S. da Silva, D. Florissi, and Y. Yemini, “NetScript: A language-based approach to active networks”, Columbia University, Tech. Rep., January 1998.

Virtual Private Networks and Tunneling Mechanisms

  • P. Ferguson and G. Huston, “What is a VPN?” Cisco Systems, Tech. Rep., 1998.
  • D. Benhaddou and W. Alanqar, “Layer 1 virtual private networks in multidomain next-generation networks”, IEEE Communications Magazine, vol. 45, no. 4, pp. 52-58, April 2007.
  • C. Perkins, “IP encapsulation within IP”, RFC 2003, October 1996.
  • A. Valencia, M. Littlewood, and T. Kolar, “Cisco Layer Two Forwarding (Protocol) “L2F”, RFC 2341, May 1998.
  • E. Rosen and Y. Rekhter, “BGP/MPLS VPNs”, RFC 2547, March 1999.
  • K. Hamzeh, G. Pall, W. Verthein, J. Taarud, W. Little, and G. Zorn, “Point-to-Point Tunneling Protocol (PPTP)”, RFC 2637, July 1999.
  • W. Townsley, A. Valencia, A. Rubens, G. Pall, G. Zorn, and B. Palter, “Layer Two Tunneling Protocol “L2TP”, RFC 2661, August 1999.
  • B. Fox and B. Gleeson, “Virtual Private Networks Identifier”, RFC 2685, September 1999.
  • B. Gleeson, A. Lin, J. Heinanen, G. Armitage, and A. Malis, “A Framework for IP Based Virtual Private Networks”, RFC 2764, February 2000.
  • D. Farinacci, T. Li, S. Hanks, D. Meyer, and P. Traina, “Generic Routing Encapsulation (GRE)”, RFC 2784, March 2000.
  • E. Chen, “Route Refresh Capability for BGP-4”, RFC 2918, September 2000.
  • A. Nagarajan, “Generic Requirements for Provider Provisioned Virtual Private Networks (PPVPN)”, RFC 3809, June 2004.
  • E. Mannie, “Generalized Multi-Protocol Label Switching (GMPLS) Architecture”, RFC 3945, October 2004.
  • L. Andersson and T. Madsen, “Provider Provisioned Virtual Private Network (VPN) Terminology”, RFC 4026, March 2005.
  • M. Carugi and D. McDysan, “Service Requirements for Layer 3 Provider Provisioned Virtual Private Networks (PPVPNs)”, RFC 4031, April 2005.
  • R. Callon and M. Suzuki, “A Framework for Layer 3 Provider-Provisioned Virtual Private Networks (PPVPNs)”, RFC 4110, July 2005.
  • L. Fang, “Security Framework for Provider-Provisioned Virtual Private Networks (PPVPNs)”, RFC 4111, July 2005.
  • Y. E. Mghazli, T. Nadeau, M. Boucadair, K. Chan, and A. Gonguet, “Framework for Layer 3 Virtual Private Networks (L3VPN) Operations and Management”, RFC 4176, October 2005.
  • E. Rosen and Y. Rekhter, “BGP/MPLS IP Virtual Private Networks (VPNs)”, RFC 4364, February 2006.
  • T. Nadeau and H. van der Linde, “MPLS/BGP Layer 3 Virtual Private Network (VPN) Management Information Base”, RFC 4382, February 2006.
  • E. Rosen, P. Psenak, and P. Pillay-Esnault, “OSPF as the Provider/Customer Edge Protocol for BGP/MPLS IP Virtual Private Networks (VPNs)”, RFC 4577, June 2006.
  • J. D. Clercq, D. Ooms, M. Carugi, and F. L. Faucheur, “BGP-MPLS IP Virtual Private Network (VPN) Extension for IPv6 VPN”, RFC 4659, September 2006.
  • L. Andersson and E. Rosen, “Framework for Layer 2 Virtual Private Networks (L2VPNs)”, RFC 4664, September 2006.
  • W. Augustyn and Y. Serbest, “Service Requirements for Layer 2 Provider-Provisioned Virtual Private Networks”, RFC 4665, September 2006.
  • P. Marques, R. Bonica, L. Fang, L. Martini, R. Raszuk, K. Patel, and J. Guichard, “Constrained Route Distribution for Border Gateway Protocol/MultiProtocol Label Switching (BGP/MPLS) Internet Protocol (IP) Virtual Private Networks (VPNs)”, RFC 4684, November 2006.
  • Y. Rekhter, R. Bonica, and E. Rosen, “Use of Provider Edge to Provider Edge (PE-PE) Generic Routing Encapsulation (GRE) or IP in BGP/MPLS IP Virtual Private Networks”, RFC 4797, January 2007.
  • T. Morin, “Requirements for Multicast in Layer 3 Provider-Provisioned Virtual Private Networks (PPVPNs)”, RFC 4834, April 2007.
  • T. Takeda, “Framework and Requirements for Layer 1 Virtual Private Networks”, RFC 4847, April 2007.
  • “OpenVPN: An open source SSL VPN solution”, http://openvpn.net/.

Overlay Networks

  • E. K. Lua, J. Crowcroft, M. Pias, R. Sharma, and S. Lim, “A survey and comparison of peer-to-peer overlay network schemes”, IEEE Communications Surveys & Tutorials, vol. 7, no. 2, pp. 72-93, 2005.
  • D. Andersen, H. Balakrishnan, F. Kaashoek, and R. Morris, “Resilient overlay networks”, SIGOPS Operating Systems Review, vol. 35, no. 5, pp. 131-145, 2001.
  • D. Doval and D. O’Mahony, “Overlay networks: A scalable alternative for P2P”, IEEE Internet Computing, vol. 7, no. 4, pp. 79-82, 2003.
  • S. Savage, T. Anderson, A. Aggarwal, D. Becker, N. Cardwell, A. Collins, E. Hoffman, J. Snell, A. Vahdat, G. Voelker, and J. Zahorjan, “Detour: A case for informed internet routing and transport”, IEEE Internet Computing, vol. 19, no. 1, pp. 50-59, January 1999.
  • K. Lakshminarayana, I. Stoica, S. Shenker, and J. Rexford, “Routing as a service”, UC Berkeley, Tech. Rep. UCB/EECS-2006-19, 2006.
  • L. Subramanian, I. Stoica, H. Balakrishnan, and R. Katz, “OverQoS: An overlay based architecture for enhancing internet QoS”, in Proceedings of the 1st Symposium on Networked Systems Design and Implementation (NSDI), March 2004, pp. 71-84.
  • I. Stoica, D. Adkins, S. Zhuang, S. Shenker, and S. Surana, “Internet indirection infrastructure”, in Proceedings of the ACM SIGCOMM Conference (SIGCOMM’02), 2002, pp. 73-88.
  • Y. Chu, S. Rao, S. Seshan, and H. Zhang, “Enabling conferencing applications on the internet using an overlay muilticast architecture”, SIGCOMM Computer Communication Review, vol. 31, no. 4, pp. 55-67, 2001.
  • J. Jannotti, D. K. Gifford, K. L. Johnson, M. F. Kaashoek, and J. James W. O’Toole, “Overcast: Reliable multicasting with an overlay network”, in Proceedings of the 4th conference on Symposium on Operating System Design & Implementation (OSDI’00), 2000, pp. 197-212.
  • B. Krishnamurthy, C. Wills, and Y. Zhang, “On the use and performance of content distribution networks”, in Proceedings of the 1st ACM SIGCOMM Workshop on Internet Measurement (IMW’01). New York, NY, USA: ACM, 2001, pp. 169-182.
  • D. G. Andersen, “Mayday: Distributed filtering for internet services”, in Proceedings of the 4th conference on USENIX Symposium on Internet Technologies and Systems (USITS’03). Berkeley, CA, USA: USENIX Association, 2003.
  • A. Keromytis, V. Misra, and D. Rubenstein, “SOS: Secure overlay services”, in Proceedings of the ACM SIGCOMM Conference (SIGCOMM’02), August 2002.
  • F. Dabek, M. F. Kaashoek, D. Karger, R. Morris, and I. Stoica, “Wide-area cooperative storage with CFS”, in Proceedings of the eighteenth ACM symposium on Operating systems principles (SOSP’01). New York, NY, USA: ACM, 2001, pp. 202-215.
  • Z. Duan, Z.-L. Zhang, and Y. T. Hou, “Service overlay networks: SLAs, QoS, and bandwidth provisioning”, IEEE/ACM Transactions on Networking, vol. 11, no. 6, pp. 870-883, 2003.

Machine, Server and Storage Virtualization

  • L. I. Dickman, “Small virtual machines: A survey”, in Proceedings of the Workshop on Virtual Computer Systems. New York, NY, USA: ACM, 1973, pp. 191-202.
  • R. P. Goldberg, “Architecture of virtual machines”, in Proceedings of the Workshop on Virtual Computer Systems. New York, NY, USA: ACM, 1973, pp. 74-112.
  • G. J. Popek and R. P. Goldberg, “Formal requirements for virtualizable third generation architectures”, Communications of the ACM, vol. 17, no. 7, pp. 412-421, 1974.
  • J. E. Smith and R. Nair, “The architecture of virtual machines”, Computer, vol. 38, no. 5, pp. 32-38, 2005.
  • “Linux VServer project”, http://linux-vserver.org/.
  • “OpenVZ: Server virtualizaiton open source project”, http://openvz.org/.
  • “Virtuozzo server virtualization”, http://www.swsoft.com/en/products/virtuozzo/.
  • “Kernel based virtual machine”, http://kvm.qumranet.com/.
  • R. Rose, “Survey of system virtualization techniques”, http://www.robertwrose.com/vita/rose-virtualization.pdf, 2004.
  • P. Kamp and R. N. M. Watson, “Jails: Confining the omnipotent root”, in Proceedings of the 2nd SANE Conference, 2000.
  • S. Nanda and T. cker Chiueh, “A survey on virtualization techniques”, SUNY at Stony Brook, Tech. Rep. TR-179, 2004.
  • J. Dike, “A user-mode port of the linux kernel”, in Proceedings of the 4th Annual Linux Showcase & Conference (ALS’00). Berkeley, CA, USA: USENIX Association, 2000, pp. 7-7.
  • C. Clark, K. Fraser, S. Hand, J. G. Hansen, E. Jul, C. Limpach, I. Pratt, and A. Warfield, “Live migration of virtual machines”, in Proceedings of the 2nd ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI’05), Boston, MA, May 2005, pp. 273-286.
  • H. Inoue, A. Ikeno, M. Kondo, J. Sakai, and M. Edahiro, “VIRTUS: A new processor virtualization architecture for security-oriented next-generation mobile terminals”, in Proceedings of the 43rd ACM/IEEE Design Automation Conference, 2006, pp. 484-489.
  • H. A. Lagar-Cavilla, N. Tolia, M. Satyanarayanan, and E. de Lara, “VMM-independent graphics acceleration”, in Proceedings of the 3rd international conference on Virtual Execution Environments (VEE’07). New York, NY, USA: ACM, 2007, pp. 33-43.
  • J. Wiegert, G. Regnier, and J. Jackson, “Challenges for scalable networking in a virtualized server”, in Proceedings of 16th International Conference on Computer Communications and Networks (ICCCN’07), 2007, pp. 179-184.
  • H. Raj and K. Schwan, “High performance and scalable i/o virtualization via self-virtualized devices”, in Proceedings of the 16th International Symposium on High Performance Distributed Computing (HPDC’07). New York, NY, USA: ACM, 2007, pp. 179-188.
  • “VMWare Inc.” http://vmware.com/.
  • A. Menon, A. L. Cox, and W. Zwaenepoel, “Optimizing network virtualization in Xen”, in Proceedings of the Annual Technical Conference on USENIX’06 Annual Technical Conference (USENIX-ATC’06). Berkeley, CA, USA: USENIX Association, 2006, pp. 2-2.
  • P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield, “Xen and the art of virtualization”, in Proceedings of the nineteenth ACM symposium on Operating systems principles (SOSP’03). New York, NY, USA: ACM, 2003, pp. 164-177.
  • G. A. Alvarez, E. Borowsky, S. Go, T. H. Romer, R. Becker-Szendy, R. Golding, A. Merchant, M. Spasojevic, A. Veitch, and J. Wilkes, “MINERVA: An automated resource provisioning tool for large-scale storage systems”, ACM Transaction on Computer Systems, vol. 19, no. 4, pp. 483-518, 2001.
  • E. Anderson, M. Hobbs, K. Keeton, S. Spence, M. Uysal, and A. Veitch, “Hippodrome: Running circles around storage administration”, in Proceedings of the 1st USENIX Conference on File and Storage Technologies (FAST’02). Berkeley, CA, USA: USENIX Association, 2002, p. 13.
  • C. R. Lumb, A. Merchant, and G. A. Alvarez, “Facade: Virtual storage devices with performance guarantees”, in Proceedings of the 2nd USENIX Conference on File and Storage Technologies (FAST’03). Berkeley, CA, USA: USENIX Association, 2003, pp. 131-144.
  • L. Huang, G. Peng, and T. cker Chiueh, “Multi-dimensional storage virtualization”, SIGMETRICS Performance Evaluation Review, vol. 32, no. 1, pp. 14-24, 2004.
  • T. Clark, Storage Virtualization: Technologies for Simplifying Data Storage and Management. Addison Wesley Press, 2005, ch. 1, pp. 1-11.

Network Virtualization and Related

  • M. Handley, E. Kohler, A. Ghosh, O. Hodson, and P. Radoslavov, “Designing extensible IP router software”, in Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation (NSDI’05). Berkeley, CA, USA: USENIX Association, 2005, pp. 189-202.
  • E. Kohler, R. Morris, B. Chen, J. Jannotti, and M. F. Kaashoek, “The Click modular router”, ACM Transactions on Computer Systems, vol. 18, no. 3, pp. 263-297, 2000.
  • A. Milanova, S. Fahmy, D. Musser, and B. Yener, “A secure programming paradigm for network virtualization”, in Proceedings of the 3rd International Conference on Broadband Communications, Networks, and Systems (BROADNETS’2006), 2006.
  • J. E. van der Merwe and I. M. Leslie, “Switchlets and dynamic virtual ATM networks”, in Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management (IM’97), 1997, pp. 355-368.
  • S. Rooney, “The Hollowman: An innovative ATM control architecture”, in Proceedings of the fifth IFIP/IEEE International Symposium on Integrated Network Management V : Integrated Management in a Virtual World. London, UK, UK: Chapman & Hall, Ltd., 1997, pp. 369-380.
  • S. F. Bush, “Active virtual network management protocol”, in Proceedings of the Workshop on Parallel and Distributed Simulation, 1999, pp. 182-192.
  • J. E. van der Merwe, S. Rooney, I. Leslie, and S. Crosby, “The Tempest: A practical framework for network programmability”, IEEE Network Magazine, vol. 12, no. 3, pp. 20-28, 1998.
  • D. Wetherall, J. Guttag, and D. Tennenhouse, “ANTS: A toolkit for building and dynamically deploying network protocols”, in IEEE OPENARCH’98, 1998, pp. 117-129.
  • N. Feamster, L. Gao, and J. Rexford, “How to lease the Internet in your spare time”, SIGCOMM Computer Communication Review, vol. 37, no. 1, pp. 61-64, 2007.
  • Y. Zhu, J. Rexford, A. Bavier, and N. Feamster, “UFO: A resilient layered routing architecture”, Princeton University, Tech. Rep. TR-780-07, 2007.
  • Y. Wang, J. van der Merwe, and J. Rexford, “VROOM: Virtual ROuters On the Move”, in Proceedings of the Sixth Workshop on Hot topics in the Internet (HotNets-VI), 2007.
  • A. Greenberg, G. Hjalmtysson, D. A. Maltz, A. Myers, J. Rexford, G. Xie, H. Yan, J. Zhan, and H. Zhang, “A clean slate 4d approach to network control and management”, SIGCOMM Computer Communication Review, vol. 35, no. 5, pp. 41-54, 2005.
  • A. Feldmann, “Internet clean-slate design: What and why?” SIGCOMM Computer Communication Review, vol. 37, no. 3, pp. 59-64, July 2007.
  • A. Whitaker, R. S. Cox, M. Shaw, and S. D. Grible, “Constructing services with interposable virtual hardware”, in Proceedings of the 1st conference on Symposium on Networked Systems Design and Implementation (NSDI’04). Berkeley, CA, USA: USENIX Association, 2004.
  • A. Whitaker, M. Shaw, and S. D. Gribble, “Scale and performance in the Denali isolation kernel”, in Proceedings of the 5th symposium on Operating Systems Design and Implementation (OSDI’02), 2002, pp. 195-210.
  • M. Kounavis, A. Campbell, S. Chou, F. Modoux, J. Vicente, and H. Zhuang, “The Genesis Kernel: A programming system for spawning network architectures”, IEEE Journal on Selected Areas in Communications, vol. 19, no. 3, pp. 511-526, 2001.
  • D. Villela, A. T. Campbell, and J. Vicente, “Virtuosity: Programmable resource management for spawning networks”, Computer Networks, vol. 36, no. 1, pp. 49-73, 2001.
  • A. T. Campbell, M. E. Kounavis, D. A. Villela, J. Vicente, K. Miki, H. G. D. Meer, and K. S. Kalaichelvan, “Spawning networks”, IEEE Network Magazine, vol. 13, no. 4, pp. 16-30, 1999.
  • A. A. Lazar and A. T. Campbell, “Spawning networking architectures (White Paper)”, Columbia University, Tech. Rep., 1998.
  • GENI Planning Group, “GENI design principles”, Computer, vol. 39, no. 9, pp. 102-105, 2006.
  • “GENI: Global Environment for Network Innovations”, http://www.geni.net/.
  • “Virtuoso: Resource management and prediction for distributed computing using virtual machines”, http://virtuoso.cs.northwestern.edu/.
  • R. Figueiredo, P. Dinda, and J. Fortes, “A case for grid computing on virtual machines”, in Proceedings of the International Conference on Distributed Computing Systems (ICDCS), 2003.
  • A. Sundararaj and P. Dinda, “Towards virtual networks for virtual machine grid computing”, in Proceedings of the 3rd USENIX Virtual Machine Research and Technology Symposium (VM’04), 2004.
  • A. Shoykhet, J. Lange, and P. Dinda, “Virtuoso: A system for virtual machine marketplaces”, Northwestern University, Tech. Rep. NWU-CS-04-39, July 2004.
  • N. Kiyanclar, “A Survey of Virtualization Techniques Focusing on Secure On-Demand Cluster Computing”, ArXiv Computer Science e-Prints, 2005.
  • P. Garbacki and V. K. Naik, “Efficient resource virtualization and sharing strategies for heterogeneous grid environments”, in Proceedings of the 10th IFIP/IEEE International Symposium on Integrated Network Management (IM’07), 2007, pp. 40-49.
  • B. Quetier, V. Neri, and F. Cappello, “Selecting a virtualization system for Grid/P2P large scale emulation”, in Proceedings of the Workshop on Experimental Grid testbeds for the Assessment of large-scale Distributed Applications and Tools (EXPGRID’06), 2006.
  • I. Foster, C. Kesselman, and S. Tuecke, “The anatomy of the grid: Enabling scalable virtual organizations”, International Journal of High Performance Computing Applications, vol. 15, no. 3, pp. 200-222, 2001.
  • I. Foster, C. Kesselman, J. Nick, and S. Tuecke, “The physiology of the Grid: An open Grid services architecture for distributed systems integration”, 2002.
  • P. Ruth, P. McGachey, and D. Xu, “VioCluster: Virtualization for dynamic computational domains”, in Proceedings of IEEE International Conference on Cluster Computing (Cluster’05), 2006.
  • L. Peterson, T. Anderson, D. Culler, and T. Roscoe, “A blueprint for introducing disruptive technology into the Internet”, SIGCOMM Computer Communication Review, vol. 33, no. 1, pp. 59-64, 2003.
  • A. Bavier, M. Huang, and L. Peterson, “An overlay data plane for PlanetLab”, in Proceedings of the Advanced Industrial Conference on Telecommunications/Service Assurance with Partial and Intermittent Resources Conference/ E-Learning on Telecommunications Workshop (AICT/SAPIR/ELETE’05), 2005, pp. 8-14.
  • N. Spring, L. Peterson, A. Bavier, and V. Pai, “Using PlanetLab for network research: Myths, realities, and best practices”, SIGOPS Operating Systems Review, vol. 40, no. 1, pp. 17-24, 2006.
  • “PlanetLab: An open platform for developing, deploying, and accessing planetary-scale services”, http://www.planet-lab.org/.
  • R. Figueiredo, P.A. Dinda, and J. Fortes, “Resource virtualization renaissance”, Computer, vol. 38, no. 5, pp. 28-31, 2005.
  • M.-S. Kim and A. Leon-Garcia, “Autonomic network resource management using virtual network concept”, LNCS, vol. 4773/2007, pp. 254-264, 2007.
  • A. Leon-Garcia and L. G. Mason, “Virtual network resource management for next-generation networks”, IEEE Communications Magazine, vol. 41, no. 7, pp. 102-109, 2003.
  • G. Woodruff, N. Perinpanathan, F. Chang, P. Appanna, and A. Leona-Garcia, “ATM network resources management using layer and virtual network concepts”, in Proceedings of the fifth IFIP/IEEE international symposium on Integrated Network Management V : Integrated Management in a Virtual World. London, UK, UK: Chapman & Hall, Ltd., 1997, pp. 315-326.
  • D. Guo, L. Zhao, H. Chen, and X. Luo, “Formalized model and implementation of service virtualization”, in Proceedings of the IEEE International Conference on Web Services (ICWS’05), 2005, pp. 835-836.
  • H. Chen, D. Guo, X. Qun-Wei, X. Luo, and W.-M. Zhang, “Service virtualization in large scale, heterogeneous and distributed environment”, in Proceedings of the GCA’05), 2005, pp. 62-68.
  • A. Bavier, N. Feamster, M. Huang, L. Peterson, and J. Rexford, “In VINI veritas: Realistic and controlled network experimentation”, in Proceedings of the SIGCOMM’06. New York, NY, USA: ACM, 2006, pp. 3-14.
  • “VINI: A virtual network infrastructure”, http://www.vini-veritas.net/.
  • S. Bhatia, M. Motiwala, W. Mühlbauer, V. Valancius, A. Bavier, N. Feamster, L. Peterson, and J. Rexford, “Hosting virtual networks on commodity hardware”, Georgia Tech, Tech. Rep. GT-CS-07-10, January 2008.
  • X. Jiang and D. Xu, “VIOLIN: Virtual internetworking on overlay infrastructure”, Purdue University, Tech. Rep. TR-03-027, 2003.
  • P. Ruth, X. Jiang, D. Xu, and S. Goasguen, “Virtual distributed environments in a shared infrastructure”, Computer, vol. 38, no. 5, pp. 63-69, 2005.
  • A. Awadallah and M. Rosenblum, “The vMatrix: A network of virtual machine monitors for dynamic content distribution”, in In Proceedings of the Seventh International Workshop on Web Content Caching and Distribution, 2002.
  • “User controlled lightpaths”, http://www.uclp.ca/.
  • U. of Waterloo, “User controlled lightpaths project”, http://uclp.uwaterloo.ca/.
  • R. Boutaba, W. Golab, Y. Iraqi, and B. St-Arnaud, “Grid-controlled lightpaths for high performance grid applications”, Journal of Grid Computing, vol. 1, no. 4, pp. 387-394, December 2003.
  • R. Boutaba, W. Golab, Y. Iraqi, and B. St-Arnaud, “Lightpaths on demand: A web services-based management system”, IEEE Communications Magazine, vol. 42, no. 7, July 2004.
  • J. Wu, H. Zhang, S. Campbell, M. Savoie, G. Bochmann, and B. St Arnaud, “A grid oriented lightpath provisioning system”, in Proceedings of the GLOBECOM’04, 2004, pp. 395-399.
  • B. Nandy, D. Bennett, I. Ahmad, S. Majumdar, and B. St.Arnaud, “User controlled lightpath management system based on a service oriented architecture”, http://www.solananetworks.com/UCLP/files/UCLPv2-SOA.pdf, 2006.
  • J. Recio, E. Grasa, S. Figuerola, and G. Junyent, “Evolution of the user controlled lightpath provisioning system”, in Proceedings of 7th International Conference on Transparent Optical Networks, vol. 1, July 2005, pp. 263-266.
  • R. Boutaba, W. Ng, and A. Leon-Garcia, “Web-based customer management of VPNs”, Journal of Network and Systems Management, vol. 9, no. 1, pp. 67-87, 2001.
  • S. Kent and K. Seo, “Security Architecture for the Internet Protocol”, RFC 4301, December 2005.
  • N. Fujita, J. D. Touch, V. Pingali, and Y.-S. Wang, “A dynamic topology and routing management strategy for virtual ip networks”, IEICE Transactions on Communications, vol. E89-B, no. 9, pp. 2375-2384, 2006.
  • J. D. Touch, Y.-S. Wang, L. Eggert, and G. Finn, “A virtual internet architecture”, USC/Information Sciences Institute, Tech. Rep. TR-570, 2003.
  • J. Touch and S. Hotz, “The X-Bone”, in In Proceedings of the Third Global Internet Mini-Conference at GLOBECOM’98, 1998, pp. 44-52.
  • Y. shun Wang and J. Touch, “Application deployment in virtual networks using the x-bone”, in Proceedings of the 2002 DARPA Active Networks Conference and Exposition (DANCE’02). Washington, DC, USA: IEEE Computer Society, 2002, p. 484.
  • J. Touch, Y. Wang, V. Pingali, L. Eggert, R. Zhou, and G. Finn, “A global x-bone for network experiments”, in Proceedings of the IEEE Tridentcom 2005, 2005, pp. 194-203.
  • M. Boucadair, P. Levis, D. Griffin, N. Wang, M. Howarth, G. Pavlou, E. Mykoniati, P. Georgatsos, B. Quoitin, J. Rodriguez Sanchez, and M. Garcia-Osma, “A framework for end-to-end service differentiation: Network planes and parallel internets”, IEEE Communications Magazine, vol. 45, no. 9, pp. 134-143, September 2007.
  • N. Wang, D. Griffin, J. Spencer, J. Griem, J. R. Sanchez, M. Boucadair, E. Mykoniati, B. Quoitin, M. Howarth, G. Pavlou, A. J. Elizondo, M. L. G. Osma, and P. Georgatsos, “A framework for lightweight QoS provisioning: Network planes and parallel internets”, in Proceedings of the 10th IFIP/IEEE International Symposium on Integrated Network Management (IM’07), 2007, pp. 797-800.
  • M. B. et al., “Parallel internets framework”, AGAVE Deliverable D1.1, 2006.
  • H. Eriksson, “MBone: The multicast backbone”, Communications of the ACM, vol. 37, no. 8, pp. 54-60, 1994.
  • W. Ng, R. Boutaba, and A. Leon-Garcia, “Provision and customization of ATM virtual networks for supporting IP services”, in Proceedings of the IEEE ATM Workshop’1999, 1999, pp. 205-210.
  • W. Ng, D. Jun, H. Chow, R. Boutaba, and A. Leon-Garcia, “Miblets: A practical approach to virtual network management”, in Proceedings of the Sixth IFIP/IEEE International Symposium on Integrated Network Management (IM’99), 1999, pp. 201-215.
  • A. Jun and A. Leon-Garcia, “A virtual network approach to network resources management”, in Proceedings of the Canadian Conference on Broadband Research (CCBR’98), June 1998.
  • A. Jun and A. Leon-Garcia, “Virtual network resources management: A divide-and-conquer approach for the control of future networks”, in Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM’98), vol. 2, 1998, pp. 1065-1070.
  • W. Szeto, Y. Iraqi, and R. Boutaba, “A multi-commodity flow based approach to virtual network resource allocation”, in Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM’03), 2003, pp. 3004-3008.
  • A. Gupta, J. M. Kleinberg, A. Kumar, R. Rastogi, and B. Yener, “Provisioning a virtual private network: A network design problem for multicommodity flow”, in ACM Symposium on Theory of Computing, 2001, pp. 389-398.
  • Y. Zhu and M. Ammar, “Algorithms for assigning substrate network resources to virtual network components”, in Proceedings of the IEEE INFOCOM’06, 2006.
  • M. Yu, Y. Yi, J. Rexford, and M. Chiang, “Rethinking virtual network embedding: Substrate support for path splitting and migration”, Princeton University, Tech. Rep. TR-788-07, July 2007.
  • J. Fan and M. Ammar, “Dynamic topology configuration in service overlay networks: A study of reconfiguration policies”, in Proceedings of the IEEE INFOCOM’06, 2006.
  • J. Lu and J. Turner, “Efficient mapping of virtual networks onto a shared substrate”, Washington University, Tech. Rep. WUCSE-2006-35, 2006.
  • R. Ricci, C. Alfeld, and J. Lepreau, “A solver for the network testbed mapping problem”, ACM Computer Communication Review, vol. 33, no. 2, pp. 65-81, April 2003.
  • D. Hausheer and B. Stiller, “Auctions for virtual network environments”, in Workshop on Management of Network Virtualisation, 2007.
  • D. Hausheer and B. Stiller, “PeerMart: Decentralized auctions for bandwidth trading on demand”, http://ercim-news.ercim.org/content/view/100/254/, January 2007.
  • P. Chandra, A. Fisher, C. Kosak, T. S. E. Ng, P. Steenkiste, E. Takahashi, and H. Zhang, “Darwin: Customizable resource management for value-added network services”, IEEE Network, vol. 15, no. 1, pp. 22-35, 2001.
  • P. Chandra, A. Fisher, and P. Steenkiste, “Beagle: A resource allocation protocol for advanced services internet”, Carnegie Mellon University, Tech. Rep. CMU-CS-98-150, August 1998.
  • P. Chandra, A. Fisher, C. Kosak, and P. Steenkiste, “Network support for application-oriented QoS”, in Proceedings of Sixth International Workshop on Quality of Service (IWQoS’98), May 1998, pp. 187-195.
  • L. Delgrossi and D. Ferrari, “A virtual network service for integrated-services internetworks”, in Proceedings of the 7th IEEE International Workshop on Network and Operating System Support for Digital Audio and Video, 1997, 1997, pp. 291-295.
  • R. Gold, P. Gunningberg, and C. Tschudin, “A virtualized link layer with support for indirection”, in Proceedings of the ACM SIGCOMM workshop on Future Directions in Network Architecture (FDNA’04). New York, NY, USA: ACM, 2004, pp. 28-34.
  • A. Vahdat, M. Dahlin, T. E. Anderson, and A. Aggarwal, “Active names: Flexible location and transport of wide-area resources”, in Proceedings of the USENIX Symposium on Internet Technologies and Systems, 1999.
  • D. D. Clark, K. Sollins, J. Wroclawski, and T. Faber, “Addressing reality: An architectural response to real-world demands on the evolving Internet”, SIGCOMM Computer Communication Review, vol. 33, no. 4, pp. 247-257, 2003.
  • N. K. Sehgal and M. Ganguli, “Applications of virtualization for server management and security”, in Proceedings of the IEEE International Conference on Industrial Technology (ICIT’06), 2006, pp. 2752-2755.
  • D. A. Menasce and M. N. Bennani, “Autonomic virtualized environments”, in Proceedings of the International Conference on Autonomic and Autonomous Systems (ICAS’06). Washington, DC, USA: IEEE Computer Society, 2006, p. 28.
  • X. Jiang and D. Xu, “Collapsar: A VM-based architecture for network attack detention center”, in Proceedings of the 13th conference on USENIX Security Symposium (SSYM’04). Berkeley, CA, USA: USENIX Association, 2004.
  • S. Soltesz, H. Pötzl, M. E. Fiuczynski, A. Bavier, and L. Peterson, “Container-based operating system virtualization: A scalable, high-performance alternative to hypervisors”, SIGOPS Operating Systems Review, vol. 41, no. 3, pp. 275-287, 2007.
  • J. Turner and D. Taylor, “Diversifying the internet”, in Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM’05), vol. 2, 2005.
  • M. Kozuch and M. Satyanarayanan, “Internet suspend /resume”, in Proceedings of the Workshop on Mobile Computing Systems and Applications, 2002, pp. 40-46.
  • H. Chen, R. Chen, F. Zhang, B. Zang, and P. Yew, “Mercury: Combining performance with dependability using self-virtualization”, in International Conference on Parallel Processing (ICPP’07), 2007, p. 9.
  • C. Edwards, A. Harwood, and E. Tanin, “Network virtualisation for transparent testing and experimentation of distributed applications”, in Proceedings of the IEEE International Conference on Networks, vol. 2, Nov. 2005, pp. 1089-1094.
  • S. J. Vaughan-Nichols, “New approach to virtualization is a lightweight”, Computer, vol. 39, no. 11, pp. 12-14, 2006.
  • W. Huang, J. Liu, M. Koop, B. Abali, and D. Panda, “Nomad: Migrating OS-bypass networks in virtual machines”, in Proceedings of the 3rd international conference on Virtual execution environments (VEE’07). New York, NY, USA: ACM, 2007, pp. 158-168.
  • C. P. Sapuntzakis, R. Chandra, B. Pfaff, J. Chow, M. S. Lam, and M. Rosenblum, “Optimizing the migration of virtual computers”, SIGOPS Operating Systems Review, vol. 36, no. SI, pp. 377-390, 2002.
  • T. Anderson, L. Peterson, S. Shenker, and J. Turner, “Overcoming the Internet impasse through virtualization”, Computer, vol. 38, no. 4, pp. 34-41, 2005.
  • M. El-Darieby, J. Rolia, and D. Petriu, “Performance modeling for virtual network based service provisioning”, in Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management (IM’01), 2001, pp. 139-152.
  • J. Crowcroft, S. Hand, R. Mortier, T. Roscoe, and A. Warfield, “Plutarch: An argument for network pluralism”, in Proceedings of the ACM SIGCOMM workshop on Future Directions in Network Architecture (FDNA’03). New York, NY, USA: ACM, 2003, pp. 258-266.
  • G. Banga, P. Druschel, and J. C. Mogul, “Resource containers: A new facility for resource management in server systems”, in Proceedings of the 3rd symposium on Operating Systems Design and Implementation (OSDI’99). Berkeley, CA, USA: USENIX Association, 1999, pp. 45-58.
  • K. Tanaka, M. Yoshikawa, and K. Ishihara, “Schema virtualization in object-oriented databases”, in Proceedings of the Fourth International Conference on Data Engineering. Washington, DC, USA: IEEE Computer Society, 1988, pp. 23-30.
  • S. Crosby and D. Brown, “The virtualization reality”, Queue, vol. 4, no. 10, pp. 34-41, 2007.
  • J. R. Lange and P. A. Dinda, “Transparent network services via a virtual traffic layer for virtual machines”, in Proceedings of the 16th international symposium on High Performance Distributed Computing (HPDC’07). New York, NY, USA: ACM, 2007, pp. 23-32.
  • L. M. Silva, J. Alonso, P. Silva, J. Torres, and A. Andrzejak, “Using virtualization to improve software rejuvenation”, in Proceedings of the Sixth IEEE International Symposium on Network Computing and Applications (NCA’07), 2007, pp. 33-44.
  • M. Caesar, M. Castro, E. B. Nightingale, G. O’Shea, and A. Rowstron, “Virtual ring routing: Network routing inspired by dhts”, in Proceedings of the 2006 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM’06). New York, NY, USA: ACM, 2006, pp. 351-362.
  • K. Miller and M. Pegah, “Virtualization: Virtually at the desktop”, in Proceedings of the 35th annual ACM SIGUCCS conference on User services (SIGUCCS’07). New York, NY, USA: ACM, 2007, pp. 255-260.
  • R. Aiken, R. Carlson, I. Foster, T. Kuhfuss, R. Stevens, and L. Winkler, “Architecture of the multi-modal organizational research and production heterogeneous network (MORPHnet)”, Argonne National Lab, Tech. Rep. TR-ANL-97/1, 1997.
  • F. Baker, “Requirements for IPv4 routers”, RFC 1812, June 1995.
  • B. Braden, D. Clark, and S. Shenker, “Integrated services in the Internet architecture: An overview”, RFC 1633, June 1994.
  • S. Blake, D. Black, M. Carlson, E. Davies, Z. Wang, and W. Weiss, “An architecture for differentiated services”, RFC 2475, December 1998.
  • Y. Cheng, R. Farha, A. Tizghadam, M. S. Kim, M. Hashemi, A. Leon-Garcia, and J. W.-K. Hong, “Virtual network approach to scalable ip service deployment and efficient resource management”, IEEE Communications Magazine, vol. 43, no. 10, pp. 76-84, October 2005.
  • Z.-L. Zhang, Z. Duan, L. Gao, and Y. T. Hou, “Decoupling QoS control from core routers: A novel bandwidth broker architecture for scalable support of guaranteed services”, in Proceedings of the ACM SIGCOMM’00, September 2000, pp. 71-83.
  • L. Zhang, S. Deering, D. Estrin, S. Shenker, and D. Zappala, “RSVP: A New Resource reSerVation Protocol”, IEEE Network, vol. 7, no. 5, pp. 8-18, 1993.
  • J. Case, M. Fedor, M. Schoffstall, and J. Davin, “Simple Network Management Protocol (SNMP)”, RFC 1157, May 1990.
  • M. Feridan, M. Moser, and A. Tanner, “Building an abstraction layer for management systems integration”, in Proceedings of the 1st IEEE/IFIP International Workshop on End-to-End Virtualization and Grid Management (EVGM’2007), October 2007, pp. 57-60.
  • A. P. Jayasumana, Q. Han, and T. H. Illangasekare, “Virtual sensor networks: A resource efficient approach for concurrent applications”, in Proceedings of the International Conference on Information Technology (ITNG’07). Washington, DC, USA: IEEE Computer Society, 2007, pp. 111-115.
  • G. Smith, A. Chaturvedi, A. Mishra, and S. Banerjee, “Wireless virtualization on commodity 802.11 hardware”, in Proceedings of the the second ACM International Workshop on Wireless Network Testbeds, Experimental Evaluation and Characterization (WinTECH’07). New York, NY, USA: ACM, 2007, pp. 75-82.
  • G. C. Hadjichristofi, A. Brender, M. Gruteser, R. Mahindra, and I. Seskar, “A wired-wireless testbed architecture for network layer experimentation based on ORBIT and VINI”, in Proceedings of the the second ACM International Workshop on Wireless Network Testbeds, Experimental Evaluation and Characterization (WinTECH’07). New York, NY, USA: ACM, 2007, pp. 83-90.
  • D. M. et al., “Core network design and vendor prophecies”, in NANOG 25, June 2003.
  • M. Kolon, “Intelligent logical router service”, Juniper Networks, Tech. Rep. 200097-001, October 2004.
  • L. Mathy, N. Egi, M. Hoerdt, A. Greenhalgh, and M. Handley, “(Some) implementation issues for virtual routers”, in Workshop on Management of Network Virtualisation, 2007.
  • S. Karlin and L. Peterson, “VERA: An extensible router architecture”, Computer Networks, vol. 38, no. 3, pp. 277-293, 2002.
  • LAN/MAN Standards Committee, “IEEE standard for local and metropolitan area networks: Virtual bridged local area networks”, IEEE Std 802.1Q-2005, May 2006.