Call for Paper - November 2022 Edition
IJCA solicits original research papers for the November 2022 Edition. Last date of manuscript submission is October 20, 2022. Read More

Security Management in Network Visualization Environment by using modified root management algorithm for Creation of Virtual Node and Virtual Link

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2017
Authors:
Navin Mani Upadhyay, Kumari Soni, Arvind Kumar
10.5120/ijca2017913367

Navin Mani Upadhyay, Kumari Soni and Arvind Kumar. Security Management in Network Visualization Environment by using modified root management algorithm for Creation of Virtual Node and Virtual Link. International Journal of Computer Applications 162(6):37-43, March 2017. BibTeX

@article{10.5120/ijca2017913367,
	author = {Navin Mani Upadhyay and Kumari Soni and Arvind Kumar},
	title = {Security Management in Network Visualization Environment by using modified root management algorithm for Creation of Virtual Node and Virtual Link},
	journal = {International Journal of Computer Applications},
	issue_date = {March 2017},
	volume = {162},
	number = {6},
	month = {Mar},
	year = {2017},
	issn = {0975-8887},
	pages = {37-43},
	numpages = {7},
	url = {http://www.ijcaonline.org/archives/volume162/number6/27250-2017913367},
	doi = {10.5120/ijca2017913367},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

In the present days the data on particular topic availability is huge and massive. The network virtualization plays very important role in the field of internet. Since Virtual networks have emerged as a powerful and flexible platform for the future network. The dependability of virtual services relies on the network’s capabilities and capabilities include virtual nodes and links to maintain the virtualization. Due to existence of the multiple confliction policies, services and alternations to the existing internet there are some limitations occur according to the following features: robust routing, efficient search, scalability, decentralization, fault tolerances, trust and authentications; so this era needs network virtualization technique. But the difficulties with the network virtualization are Instantiation means creating virtual networks, logistics means runs them; Management means manage them, and Interactions. The creation of virtual networks is very difficult but the researchers from all over the globe will always trying to resolve it according to their way. So this is referred as future work also. The proposed algorithm in this paper is useful to create virtual node and link for network virtualization. There are already some techniques available to create the virtual network but they are not showing the exact structure which will be required. This paper introduces an algorithm to managing the virtual node and virtual link in any virtual network.

References

  1. Peterson, L., Shenker, S., Roscoe, T., Anderson,T. 2005. "Overcoming the Internet impasse through virtualization." in IEEE Computer Magazine, vol. 38., , pp. 34-41.
  2. Gao, L., Rexford, J., Feamster, N. 2006. "How to lease the Internet in your spare time",in ACM Computer Communication Review, January, pp. 114-121.
  3. Boutaba, R., Chowdhury, N. M. K., 2008."A Survey of network Virtualization.," David R. Cheriton School of computer Science, University of Waterloo., Technical Report CS-2008-25.
  4. Taylor, D., Turner, J., 2005."Diversifying the internet," in IEEE Globle Telecommunications Conference (GLOBECOM'05), Vol. 2.
  5. Gao, L., Rexford, J., Feamster, N., 2007. "How to lease the internet in your spare time," in SIGCOMM Computer Communication Review 37 (1), pp. 61-64.
  6. Boutaba, R., Chowdhury, N. M. K., 2009. "Network Virtualization: State of the art and research challenges",in IEEE Communications Magazine 47 (7), pp. 20-26.
  7. R. Zhang-Shen, S. Rangarajan, J. Rexford. Y. Zhu, 2008. "Cabernet: Connectivity architecture for better network services", in Workshop on Re-architecting the Internet (ReArch, 08), ACM SigComm, Madrid.
  8. Al-Fares, Mohammad, Loukissas, Alexander, Vahdat, Amin, 2008. “AScalable, Commodity Data Center Network Architecture”, In Proc. ACMSIGCOMM Conference on Data Communication, Seattle, WA.
  9. Barabash, Katherine, Cohen, Rami, Hadas,David, Jain,Vinit, Recio, Renato, Rochwerger , Benny, 2011. “A case for overlays in virtualization. InProceedings of the 3rd Workshop on Data Center”, Converged and Virtual Ethernet Switching, DC-CaVES ’11, pages 30–37. ITCP
  10. Birke, R. Crisan, D., Barabash, K., Levin,A., DeCusatis, C., Minkenberg, C., Gusat M., 2012.”Partition/aggregate in commodity 10g Ethernet software-defined networking. In High Performance Switching andRouting (HPSR)”, IEEE 13th International Conference on, pages 7–14.
  11. Wang, L., Zhang, F., Hou, C., Aroca, J.A., and Liu, Z. 2013. “Incorporating Rate Adaptation into Green Networking for Future Data Centers”, 12th International Symposium on Network Computing and Applications, pp. 106-109.
  12. D. Bethanabhotla et al., 2014. “User Association and Load Balancing for Cellular Massive MIMO,” Proc. Information Theory and Applications Workshop (ITA), pp. 1–10.
  13. Upadhyay N.M. , Mittal, G., Saurabh, S.K., Gupta, P.K., 2011. “Creation of virtual node, virtual link and managing them in network virtualization”. In WICT, University of Mumbai, Mumbai, India.
  14. Upadhyay N.M., Gaurav,K., Saurabh, S.K., 2013. “Security in Network Virtualization Concept and Challenges-A Survey”, in Procd. NCRTCSG, Ambala, India.

Keywords

Network virtualization; Virtual networks; Virtual Node; Virtual Link; InPs; ISPs;