Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "677c4a79-c0c4-4aa8-8707-b44d58a8b4b3"}, "_deposit": {"id": "4630", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4630"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4630", "sets": ["1597824273898", "user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Secure Data Center Networking with Open vSwitch", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Data centers have become the nextgenerationcomputing platforms for enterprisesand Internet users. This is primarily due to theeconomic and technical advantages of resourcesharing in data centers. By sharing computingand storage resources through services such ascloud computing or software-as-a-service (SaaS),users can amortize the cost of hardware andsoftware. Because of the virtualization ofresources, a new virtualized network access layerhas been introduced to interconnect VMs withinthe data centers. In data center, hosts have beenrecently employed virtual switch to interconnectvirtual machines (VMs) within data centernetworks. Virtual Switch is essential to controland manage VM within the hosts. Open vSwitch,a network switch specifically built for Xenvirtualization environment is presented. Thedesign and advantages of Open vSwitch isdescribed. And then secure VM networking isproposed by using Open vSwitch. By combiningIntrusion Detection System with Open vSwitch,more secure virtual networking can beestablished because Open vSwitch can get interVM traffic logs directly and can perform morecontrols VM communication."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value": []}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-03"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "9098.pdf", "filesize": [{"value": "69 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 69000.0, "url": {"url": "https://meral.edu.mm/record/4630/files/9098.pdf"}, "version_id": "1bcd0969-f0bd-4af3-b270-7264245bb86f"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Ninth International Conference On Computer Applications (ICCA 2011)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Hlaing, Pa Pa"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2011-05-05"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/269"}, "item_title": "Secure Data Center Networking with Open vSwitch", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004630", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-03"}, "publish_date": "2019-07-03", "publish_status": "0", "recid": "4630", "relation": {}, "relation_version_is_last": true, "title": ["Secure Data Center Networking with Open vSwitch"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Secure Data Center Networking with Open vSwitch

http://hdl.handle.net/20.500.12678/0000004630
http://hdl.handle.net/20.500.12678/0000004630
b59f7bb1-7bfe-44e9-a538-f51fd32d6b19
677c4a79-c0c4-4aa8-8707-b44d58a8b4b3
None
Preview
Name / File License Actions
9098.pdf 9098.pdf (69 Kb)
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 15:13:19.993953
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL