2017
DOI: 10.1109/comst.2016.2610963
|View full text |Cite
|
Sign up to set email alerts
|

Networking for Big Data: A Survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
53
0
1

Year Published

2017
2017
2021
2021

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 191 publications
(58 citation statements)
references
References 147 publications
0
53
0
1
Order By: Relevance
“…Such cyber configurations can pose serious complications with respect to privacy, security and integrity of both physical as well as ICT subsystems. Moreover, the multiplicities of Big Data applications in contemporary CPSs motivates to solicit the concept of Big Data networking, its formation, features, mathematical and statistical intricalities [30].…”
Section: Big-data To Knowledge (B2k) Frameworkmentioning
confidence: 99%
“…Such cyber configurations can pose serious complications with respect to privacy, security and integrity of both physical as well as ICT subsystems. Moreover, the multiplicities of Big Data applications in contemporary CPSs motivates to solicit the concept of Big Data networking, its formation, features, mathematical and statistical intricalities [30].…”
Section: Big-data To Knowledge (B2k) Frameworkmentioning
confidence: 99%
“…The relationship between Big Data and network performance is generally explored to understand what is the best way to have networks that support Big Data applications …”
Section: State Of the Artmentioning
confidence: 99%
“…The relationship between Big Data and network performance is generally explored to understand what is the best way to have networks that support Big Data applications. 5,6 Few are the examples of works that investigate how Big Data techniques can be used to perform network monitoring or RCA, directly targeted to the improvement of the network infrastructure. Among them Cui et al and Trevisan et al 7,8 explore how Big Data can be used to perform traffic engineering and classify specific kinds of traffic when using Software-defined networking (SDN).…”
Section: State Of the Artmentioning
confidence: 99%
“…If a device intends to get the wireless service, an AP (Access Point) and the corresponding radio frequency as well as the time slots are then all chosen by the device. Next, a routing path [49] from the chosen AP to target service is constructed. Thus the access request demands not only the AP and radio resource, but also network functions, routers, switches and corresponding bandwidth in backhaul and fronthaul.…”
Section: The Framework Of Smart Networkmentioning
confidence: 99%