2001
DOI: 10.1016/s1389-1286(01)00172-4
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic Internet overlay deployment and management using the X-Bone

Abstract: The X-Bone dynamically deploys and manages Internet overlays to reduce con®guration e ort and increase network component sharing. The X-Bone discovers, con®gures, and monitors network resources to create overlays over existing IP networks. Overlays are useful for deploying overlapping virtual networks on shared infrastructure and for simplifying topology. The X-Bone extends current overlay management by adding dynamic resource discovery, deployment, and monitoring, and allows network components (hosts, routers… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
35
0

Year Published

2003
2003
2016
2016

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 86 publications
(35 citation statements)
references
References 21 publications
0
35
0
Order By: Relevance
“…2 The flow duration is exponentially distributed with mean F d . The selection of the source and destination nodes for the overlay flows follows a randomly generated (non-uniform) traffic matrix.…”
Section: Simulation Modelmentioning
confidence: 99%
See 3 more Smart Citations
“…2 The flow duration is exponentially distributed with mean F d . The selection of the source and destination nodes for the overlay flows follows a randomly generated (non-uniform) traffic matrix.…”
Section: Simulation Modelmentioning
confidence: 99%
“…A sketch of the native network topology (also showing the location of the overlay nodes). 2 The Poisson flow arrival model is reasonable, as long as there are no correlations on bursts in the overlay flow arrival process. The Poisson model has been previously validated for application session arrivals [32].…”
Section: Simulation Modelmentioning
confidence: 99%
See 2 more Smart Citations
“…Realization of an overlay network involves mapping its topology onto the base network [2,3]. This mapping requires finding a "path" in the base network for each "edge" in the overlay network.…”
Section: Introductionmentioning
confidence: 99%