2012
DOI: 10.1007/978-3-642-31869-6_54
|View full text |Cite
|
Sign up to set email alerts
|

Building a Microscope for the Data Center

Abstract: O PDF relativo ao artigo que solicita, não se encontra disponível em Acesso Aberto. Motivos: O editor não permite o depósito e disponibilização em acesso aberto do PDF que solicita. Para consultar o documento deve aceder ao endereço do editor.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 15 publications
0
2
0
Order By: Relevance
“…video streaming), the result of which have support for quality of service, deployability, manageability, and defence against security attacks, and also poor server utilization and high operational cost . [5][6][7] Neither performance isolation nor failure can restrict the communication pattern and bandwidth usage of each application, which causes vulnerability to insider attacks such as performance interference and Denial of Service (DoS) attacks, and difficulty in introducing changes in traditional data center networks . [5][6][7] The data centers needed for Cloud Computing is mounting exponentially.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…video streaming), the result of which have support for quality of service, deployability, manageability, and defence against security attacks, and also poor server utilization and high operational cost . [5][6][7] Neither performance isolation nor failure can restrict the communication pattern and bandwidth usage of each application, which causes vulnerability to insider attacks such as performance interference and Denial of Service (DoS) attacks, and difficulty in introducing changes in traditional data center networks . [5][6][7] The data centers needed for Cloud Computing is mounting exponentially.…”
Section: Introductionmentioning
confidence: 99%
“…[5][6][7] Neither performance isolation nor failure can restrict the communication pattern and bandwidth usage of each application, which causes vulnerability to insider attacks such as performance interference and Denial of Service (DoS) attacks, and difficulty in introducing changes in traditional data center networks . [5][6][7] The data centers needed for Cloud Computing is mounting exponentially. 8 Pay-as-you-go access to cloud based services are made it as a cheaper substitute to traditional data centers, since clouds often provide on-demand services and data center network virtualization, an expectant solution to address problems relating to the resource utilization, and energy efficiency .…”
Section: Introductionmentioning
confidence: 99%