2012 Fourth International Conference on Communication Systems and Networks (COMSNETS 2012) 2012
DOI: 10.1109/comsnets.2012.6151314
|View full text |Cite
|
Sign up to set email alerts
|

Hierarchy-aware distributed overlays in data centers using DC2

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 10 publications
(10 citation statements)
references
References 14 publications
0
10
0
Order By: Relevance
“…The Trie node starts with the root node containing an array of number with size 10, which has numbers from 0 to 9. When a file name is given by the user, a unique hash key value will be generated, and a corresponding hash value will be stored in the tree structure starting from the root node …”
Section: The Proposed Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…The Trie node starts with the root node containing an array of number with size 10, which has numbers from 0 to 9. When a file name is given by the user, a unique hash key value will be generated, and a corresponding hash value will be stored in the tree structure starting from the root node …”
Section: The Proposed Methodsmentioning
confidence: 99%
“…When a file name is given by the user, a unique hash key value will be generated, and a corresponding hash value will be stored in the tree structure starting from the root node. [16][17][18][19] For example, in the case of numeric keys, each node has an array of ten pointers to its branches, one for each of the ten numbers. The keys as file names are stored in the leaf nodes.…”
Section: Digit Compact Prefix Insertion and Searchingmentioning
confidence: 99%
“…Paths through the highest layer of the tree may even be 240:1 oversubscribed [8,13]. The large oversubscription introduced in current electronic data center network designs fragments the server pool by preventing idle servers from being assigned to services.…”
Section: Challenges Of Data Center Networkingmentioning
confidence: 99%
“…Procedure CHECK-CAPABILITY(e W axay , e W auat ) 1: for all a ∈ Sa uat do 2: if the capability constraint of access point a is not satisfied then 3…”
Section: Algorithm 2 Node Joiningmentioning
confidence: 99%
“…For distributed execution engines such as MapReduce [2], the master node assigns tasks to a group of servers for cooperative computations. In social networks (e.g., Facebook, Twitter, etc) [3], users frequently share their messages, photos and videos with their friends, and group communications are also needed. In group communications, a source node has to transmit one copy of the data to multiple destination nodes.…”
Section: Introductionmentioning
confidence: 99%