2008
DOI: 10.1109/icact.2008.4493877
|View full text |Cite
|
Sign up to set email alerts
|

ENDIST: Edge Node Divided Spanning Tree

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2008
2008
2016
2016

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 7 publications
0
4
0
Order By: Relevance
“…A previous work named ENDIST [7] provides multiple routing paths from edge-node divided trees but may have serious overlapping in a symmetric DCN topology like Portland. Later, Disjoint-ENDIST (DENDIST) [8] is built upon ENDIST but provides a selection of disjoint paths for initializing a DCN.…”
Section: Background: Per-flow Routing In Sdnmentioning
confidence: 99%
See 2 more Smart Citations
“…A previous work named ENDIST [7] provides multiple routing paths from edge-node divided trees but may have serious overlapping in a symmetric DCN topology like Portland. Later, Disjoint-ENDIST (DENDIST) [8] is built upon ENDIST but provides a selection of disjoint paths for initializing a DCN.…”
Section: Background: Per-flow Routing In Sdnmentioning
confidence: 99%
“…As a result, rather than static routing, dynamic routing is shown a better choice for a SDN-based datacenter with better performance in many aspects. As cloud computing gets more prevalent, many related works [7] [8] [9] have been devoted to dynamic routing for providing better performance for datacenter networks (DCNs). However, as software-defined networking (SDN) emerges for per-flow routing, many of these algorithms become timeinefficient and even induce much overhead to the DCN.…”
Section: Udp Streaming In Spb Vs Swf In Sdnmentioning
confidence: 99%
See 1 more Smart Citation
“…On the other hand, the routing research in cloud computing targets various performance perspectives under different applications and includes Hash-based routing (HBR) [2], ENDIST [4], and D 2 ENDIST [5]. HBR constructs a mapping of ports between downlinks and uplinks using a hash table to achieve load balancing.…”
Section: Introductionmentioning
confidence: 99%