A Survey of Models for Computer Networks Management

نویسندگان

  • Dimitris Kontoudis
  • Panayotis Fouliras
چکیده

The virtualization concept along with its underlying technologies has been warmly adopted in many fields of computer science. In this direction, network virtualization research has presented considerable results. In a parallel development, the convergence of two distinct worlds, communications and computing, has increased the use of computing server resources (virtual machines and hypervisors acting as active network elements) in network implementations. As a result, the level of detail and complexity in such architectures has increased and new challenges need to be taken into account for effective network management. Information and data models facilitate infrastructure representation and management and have been used extensively in that direction. In this paper we survey available modelling approaches and discuss how these can be used in the virtual machine (host) based computer network landscape; we present a qualitative analysis of the current state-of-the-art and offer a set of recommendations on adopting any

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Survey on Multicast Routing Approaches in Wireless Mesh Networks

Wireless mesh networks (WMNs) which mediates the broadband Internet access, have been recently received many attentions by the researchers. In order to increase capacity in these networks, nodes are equipped with multiple radios tuned on multiple channels emerging multi radio multi-channel WMNs (MRMC WMNs). Therefore, a vital challenge that poses in MRMC WMNs is how to properly assign channels ...

متن کامل

P2P Network Trust Management Survey

Peer-to-peer applications (P2P) are no longer limited to home users, and start being accepted in academic and corporate environments. While file sharing and instant messaging applications are the most traditional examples, they are no longer the only ones benefiting from the potential advantages of P2P networks. For example, network file storage, data transmission, distributed computing, and co...

متن کامل

A novel key management scheme for heterogeneous sensor networks based on the position of nodes

Wireless sensor networks (WSNs) have many applications in the areas of commercial, military and environmental requirements. Regarding the deployment of low cost sensor nodes with restricted energy resources, these networks face a lot of security challenges. A basic approach for preparing a secure wireless communication in WSNs, is to propose an efficient cryptographic key management protocol be...

متن کامل

The Application of Combined Fuzzy Clustering Model and Neural Networks to Measure Valuably of Bank Customers

Currently, acquisition of resources in banks is subject to attraction of the resources of banking customers. Meanwhile, the Bank’s valuable customers are one of the best resources to make profit for banks. Several different models are introduced for evaluation of profitability of the customers; but most of them are classical models and they are unable to evaluate the customers in complete and o...

متن کامل

The Application of Combined Fuzzy Clustering Model and Neural Networks to Measure Valuably of Bank Customers

Currently, acquisition of resources in banks is subject to attraction of the resources of banking customers. Meanwhile, the Bank’s valuable customers are one of the best resources to make profit for banks. Several different models are introduced for evaluation of profitability of the customers; but most of them are classical models and they are unable to evaluate the customers in complete and o...

متن کامل

An efficient solution for management of pre-distribution in wireless sensor networks

A sensor node is composed of different parts including processing units, sensor, transmitter, receiver, and security unit. There are many nodes in a sensor unit. These networks can be used for military, industrial, medicine, environmental, house, and many other applications. These nodes may be established in the lands of enemies to monitor the relations. Hence, it is important to consider conse...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014