2015 IEEE International Conference on Smart City/SocialCom/SustainCom (SmartCity) 2015
DOI: 10.1109/smartcity.2015.193
|View full text |Cite
|
Sign up to set email alerts
|

Design of SDN-Enabled Cloud Data Center

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 9 publications
0
5
0
Order By: Relevance
“…In [29], Cloud Sim SDN is a simulation of hosts and networks, and requests latency usage in SDN-enabled cloud data centers. Cloud Sim SDN supports computing power which both hosts and switches consume.…”
Section: Simulation Results and Discussionmentioning
confidence: 99%
“…In [29], Cloud Sim SDN is a simulation of hosts and networks, and requests latency usage in SDN-enabled cloud data centers. Cloud Sim SDN supports computing power which both hosts and switches consume.…”
Section: Simulation Results and Discussionmentioning
confidence: 99%
“…The simulation model implements a network topology considering host-to-host data flow transfers between two or more SDN-enabled distributed data centers. For the scope of our research, the experimental setup considers a small-medium network topology based on three-layer for data centers [32]. This topology consists of the access layer to connect hosts (compute nodes), an aggregation or region layer in the middle to connect the access switches and a core layer in the root of the tree.…”
Section: Simulation Modelmentioning
confidence: 99%
“…In addition, the large scale of the clouds itself, the advent of mobile devices with direct access to cloud infrastructure amplify cloud vulnerabilities and threats. As a cloud computing is more extended and its utilization increases, it becomes prone to network infrastructure related potential and successful and potential attacks such as Distributed Denial of Service, hacking, stealing sensitive information, performing malicious code execution and compromising vulnerable virtual machines (VMs) which can happen in a high possibility in cloud compared to the traditional computing [7,8].…”
Section: Introductionmentioning
confidence: 99%