2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT) 2018
DOI: 10.1109/dessert.2018.8409104
|View full text |Cite
|
Sign up to set email alerts
|

Classification of existing virtualization methods used in telecommunication networks

Abstract: This article studies the existing methods of virtualization of different resources. The positive and negative aspects of each of the methods are analyzed, the perspectivity of the approach is noted. It is also made an attempt to classify virtualization methods according to the application domain, which allows us to discover the method weaknesses which are needed to be optimized.

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0
1

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
2
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 42 publications
(8 citation statements)
references
References 3 publications
0
7
0
1
Order By: Relevance
“…When using containers, the application code in any offered service is involved in containerization along with its libraries, all dependencies, and configuration files necessary for its execution in the most diverse types of environments. This containerization becomes autonomous and portable, as it is abstracted from the host OS and can be executed on any computing platform [15]. This approach has been widely applied in the computing industry and demonstrated in several studies.…”
Section: Theoretical Foundationmentioning
confidence: 99%
“…When using containers, the application code in any offered service is involved in containerization along with its libraries, all dependencies, and configuration files necessary for its execution in the most diverse types of environments. This containerization becomes autonomous and portable, as it is abstracted from the host OS and can be executed on any computing platform [15]. This approach has been widely applied in the computing industry and demonstrated in several studies.…”
Section: Theoretical Foundationmentioning
confidence: 99%
“…Having enabled the creation of virtual hardware or machine which possesses emulated version of real hardware resources, the hypervisor facilitates a virtual environment to real hardware interactions by intercepting the system calls of the virtual machine. This type of hypervisor-based approach that involves bare-metal is often called paravirtualization (PV) [25,27]. The second hypervisor-based approach tagged type 2, is also called full virtualization as represented in Figure 1a.…”
Section: Basic Virtualization Approachesmentioning
confidence: 99%
“…La virtualización completa utiliza una máquina virtual que funciona con hardware físico real a través de un hipervisor y sistema operativo host (Ageyev et al, 2018). Mientras que la paravirtualización requiere un núcleo (en Inglés, kernel) modificado del sistema operativo para administrar instrucciones privilegiadas del sistema (Barham et al, 2003).…”
Section: Marco Teórico Tecnología De Contenedoresunclassified