2016 IEEE 15th International Symposium on Network Computing and Applications (NCA) 2016
DOI: 10.1109/nca.2016.7778609
|View full text |Cite
|
Sign up to set email alerts
|

A scalable peer-to-peer control plane architecture for Software Defined Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…There are a number of good reasons for employing physically-distributed (but logically-centralized) SDN controllers in a network such as: scalability, redundancy, and fault-tolerance. The use of a physically-centralized controller can limit the scalability and reliability of large There exist different architectures where multiple controllers could be setup (or arranged) to form a distributed system such as hierarchical [14], [55] and peer-to-peer [19] distributed systems architectures. Such architectures can employ different communication and synchronization paradigms.…”
Section: Controllers' State Distributionmentioning
confidence: 99%
See 1 more Smart Citation
“…There are a number of good reasons for employing physically-distributed (but logically-centralized) SDN controllers in a network such as: scalability, redundancy, and fault-tolerance. The use of a physically-centralized controller can limit the scalability and reliability of large There exist different architectures where multiple controllers could be setup (or arranged) to form a distributed system such as hierarchical [14], [55] and peer-to-peer [19] distributed systems architectures. Such architectures can employ different communication and synchronization paradigms.…”
Section: Controllers' State Distributionmentioning
confidence: 99%
“…We considered the case of an anomalybased IDS, because it could be more vulnerable to network state inconsistency due to its reliance on parameters measured from the network. The IDS employs a clustering algorithm14 to learn about the behavior of network traffic and to detect theCHAPTER 4. CHALLENGES IN NETWORK STATE COLLECTION AND DISTRIBUTION anomalous ones.…”
mentioning
confidence: 99%