2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM) 2017
DOI: 10.23919/softcom.2017.8115539
|View full text |Cite
|
Sign up to set email alerts
|

FlowVista: Low-bandwidth SDN monitoring driven by business application interaction

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 4 publications
0
2
0
Order By: Relevance
“…In [544], an intent-based northbound interface with micro-services, and service-oriented design principles having a three-tier application architecture and domain-driven design is proposed to define business-like applications. A framework known as FlowVista, which identifies flows using the Northbound interface, where flows are matched directly by interacting with a business application, translates high-level business policies into low-level network flows [545]. Voice Over IP (VoIP) is a very good example for the realization of FlowVista, as VoIP is driven by high-level business policies.…”
Section: Business Applicationsmentioning
confidence: 99%
“…In [544], an intent-based northbound interface with micro-services, and service-oriented design principles having a three-tier application architecture and domain-driven design is proposed to define business-like applications. A framework known as FlowVista, which identifies flows using the Northbound interface, where flows are matched directly by interacting with a business application, translates high-level business policies into low-level network flows [545]. Voice Over IP (VoIP) is a very good example for the realization of FlowVista, as VoIP is driven by high-level business policies.…”
Section: Business Applicationsmentioning
confidence: 99%
“…The authors in [83] proposed FlowVisa as a plugin module in the control plane. It is used to identify traffic flows that belong to the critical application.…”
Section: ) Active Vs Passivementioning
confidence: 99%