{"id":3708,"date":"2024-02-28T12:51:08","date_gmt":"2024-02-28T07:21:08","guid":{"rendered":"https:\/\/journal.ipem.edu.in\/computer_applications\/?page_id=3708"},"modified":"2024-03-30T15:08:00","modified_gmt":"2024-03-30T09:38:00","slug":"wireless-network-virtualization","status":"publish","type":"page","link":"https:\/\/journal.ipem.edu.in\/computer_applications\/wireless-network-virtualization\/","title":{"rendered":"Wireless Network Virtualization"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"3708\" class=\"elementor elementor-3708\">\n\t\t\t\t\t\t<div class=\"elementor-inner\">\n\t\t\t\t<div class=\"elementor-section-wrap\">\n\t\t\t\t\t\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-3b3d6bf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3b3d6bf\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d724340\" data-id=\"d724340\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c722ad7 elementor-widget elementor-widget-heading\" data-id=\"c722ad7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Wireless Network Virtualization<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-12c9a41 elementor-widget elementor-widget-html\" data-id=\"12c9a41\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<a class=\"author\" href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/wireless-network-virtualization\/#author\"> <em> Dr Mohammad Salim Hamidi <\/em><\/a>,\r\n  <a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/wireless-network-virtualization\/#author\"> <em> Elham Momand  <\/em><\/a>,\r\n  <a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/wireless-network-virtualization\/#author\"> <em> Allah Bobani Saidi  <\/em><\/a>\r\n\r\n\r\n\r\n\r\n                                        <p class=\"Issue\"><a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/wireless-network-virtualization\/\">Vol 8 ,  Issue 1 , December 2023<\/a><span class=\"pipe\"> | <\/span>Pages: 56-63\r\n                                        <\/p>\r\n                                        \r\n                <p class=\"doi\">DOI: <a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/wireless-network-virtualization\/\">10.61691\/IPEM_CA.8.2023.56-63<\/a><\/p>\r\n\r\n                                        <p class=\"Published\"><span class=\"articledate\">Published Online: December, 2023<\/span><\/p>\r\n                                <p class=\"Download\">        <a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/wp-content\/uploads\/2024\/03\/P_10.pdf\" target=\"_blank\">Download Article<\/a><\/p>\r\n                    \t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1eb397b elementor-widget elementor-widget-eael-adv-tabs\" data-id=\"1eb397b\" data-element_type=\"widget\" data-widget_type=\"eael-adv-tabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t        <div data-scroll-on-click=\"no\" data-scroll-speed=\"300\" id=\"eael-advance-tabs-1eb397b\" class=\"eael-advance-tabs eael-tabs-horizontal eael-tab-auto-active  active-caret-on\" data-tabid=\"1eb397b\">\n            <div class=\"eael-tabs-nav\">\n                <ul class=\"\" role=\"tablist\">\n                                            <li id=\"author\" class=\"inactive eael-tab-item-trigger eael-tab-nav-item\" aria-selected=\"true\" data-tab=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"author-tab\" aria-expanded=\"false\">\n                            \n                            \n                            \n                                                            <span class=\"eael-tab-title title-after-icon\" >Author Affiliations<\/span>                                                    <\/li>\n                                            <li id=\"abstract\" class=\"inactive eael-tab-item-trigger eael-tab-nav-item\" aria-selected=\"false\" data-tab=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"abstract-tab\" aria-expanded=\"false\">\n                            \n                            \n                            \n                                                            <span class=\"eael-tab-title title-after-icon\" >Abstract<\/span>                                                    <\/li>\n                                            <li id=\"references\" class=\"inactive eael-tab-item-trigger eael-tab-nav-item\" aria-selected=\"false\" data-tab=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"references-tab\" aria-expanded=\"false\">\n                            \n                            \n                            \n                                                            <span class=\"eael-tab-title title-after-icon\" >References<\/span>                                                    <\/li>\n                                            <li id=\"citation\" class=\"inactive eael-tab-item-trigger eael-tab-nav-item\" aria-selected=\"false\" data-tab=\"4\" role=\"tab\" tabindex=\"-1\" aria-controls=\"citation-tab\" aria-expanded=\"false\">\n                            \n                            \n                            \n                                                            <span class=\"eael-tab-title title-after-icon\" >Citation<\/span>                                                    <\/li>\n                                    <\/ul>\n            <\/div>\n            \n            <div class=\"eael-tabs-content\">\n\t\t        \n                    <div id=\"author-tab\" class=\"clearfix eael-tab-content-item inactive\" data-title-link=\"author-tab\">\n\t\t\t\t        <p class=\"Author-bg\"><b>Author Details<\/b><\/p>\n\n<div class=\"card-body table-responsive\">\n<div class=\"autinfo\"><b class=\"sn\">1. <\/b>Dr. Mohammad Salim Hamidi, <em>Jahan University<\/em><\/div>\n<div class=\"autinfo\"><b class=\"sn\">2. <\/b>Elham Momand, <em>Jahan University<\/em><\/div>\n<div class=\"autinfo\"><b class=\"sn\">3. <\/b>Allah Bobani Saidi , <em>Jahan University<\/em><\/div>\n<\/div>                    <\/div>\n\t\t        \n                    <div id=\"abstract-tab\" class=\"clearfix eael-tab-content-item inactive\" data-title-link=\"abstract-tab\">\n\t\t\t\t        <p style=\"text-align: justify;\">Virtualization refers to creating a set of logical architectures using a given set of physical entities, but in a way that is transparent to the user. Virtualization of wireless networks involves both infrastructure sharing and spectrum sharing. In addition, there are many different topologies for wireless networks (infrastructure and ad hoc and within ad hoc, single and multi-hop), different spectrum bands from several hundreds of MHz to several GHz, unlicensed versus licensed spectrum bands, different geographic coverage (wide, metro, local and personal area) and finally different mobility requirements. Know network virtualization, learn the limitations of virtualization, and learn the components. The provision of virtualization in wireless networks is a promising concept that has the potential to alleviate spectrum congestion and open up new services. In this paper, we have discussed three paradigms for virtualizing wireless networks: (1) universal, (2) cross-infrastructure, and (3) limited intra-infrastructure. Paradigms differ in the degree of virtualization and infrastructure sharing. Network virtualization, regardless of whether it is a wired or wireless environment, can be thought of as partitioning the entire system. The network can be thought of as composed of Infrastructure Providers or InPs who build and manage only the infrastructure (eg base stations, MMEs, S-Gateways, APs, spectrum, etc.) and Service Providers or SPs who actually provide various services to subscribers. <\/p>\n<p class=\"keywords\">Keywords<\/p>\nVirtualization, Technical Approach, Signaling, Isolation.                    <\/div>\n\t\t        \n                    <div id=\"references-tab\" class=\"clearfix eael-tab-content-item inactive\" data-title-link=\"references-tab\">\n\t\t\t\t        <ol>\n \t<li>Kalmanek, \u2015The essential elements ofsuccessful innovation,\u2016 ACM ComputerCommunications Review, vol. 42, no. 2, pp.105\u2013 109, April 2012.<\/li>\n \t<li>Defined Radios:TechnologiesandTechniques,September2008.<\/li>\n \t<li>Isiklar and A. Bener, \u2015Brokering and pricingarchitectureovercognitiveradio wireless networks,\u2016 in Proc. IEEE CCNC, January2008<\/li>\n \t<li>Maseng andT. Ulversoy,\u2015Dynamic Frequency broker and cognitive radio, \u2016The IET Seminar on Cognitive Radio and Software Academic Paper:<\/li>\n \t<li>Tripper, X.Wang &amp; P.Krishnamurthy\u2015JournalofCommunications\u2016Vol.8,No.5,pp.337-344 May 2013<\/li>\n \t<li>M.Buddhikot,P.Kolodzy,S.Miller,K.Ryan,andJ.Evans,\u2015Dimsumnet:NewdirectionsinWireless Networking Using Coordinated Dynamic,Spectrum,In Proc IEEE,WowMoM,2005<\/li>\n<\/ol>                    <\/div>\n\t\t        \n                    <div id=\"citation-tab\" class=\"clearfix eael-tab-content-item inactive\" data-title-link=\"citation-tab\">\n\t\t\t\t        <p>Hamidi, et.al(2003) ; Wireless Network Virtualization,IPEM JOURNAL OF COMPUTER APPLICATION &amp; RESEARCH, 8(1), 56-63<\/p>                    <\/div>\n\t\t                    <\/div>\n        <\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Wireless Network Virtualization Dr Mohammad Salim Hamidi , Elham Momand , Allah Bobani Saidi Vol 8 , Issue 1 , [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-3708","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/journal.ipem.edu.in\/computer_applications\/wp-json\/wp\/v2\/pages\/3708","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/journal.ipem.edu.in\/computer_applications\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/journal.ipem.edu.in\/computer_applications\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/journal.ipem.edu.in\/computer_applications\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/journal.ipem.edu.in\/computer_applications\/wp-json\/wp\/v2\/comments?post=3708"}],"version-history":[{"count":13,"href":"https:\/\/journal.ipem.edu.in\/computer_applications\/wp-json\/wp\/v2\/pages\/3708\/revisions"}],"predecessor-version":[{"id":3952,"href":"https:\/\/journal.ipem.edu.in\/computer_applications\/wp-json\/wp\/v2\/pages\/3708\/revisions\/3952"}],"wp:attachment":[{"href":"https:\/\/journal.ipem.edu.in\/computer_applications\/wp-json\/wp\/v2\/media?parent=3708"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}