{"created":"2020-09-01T15:13:18.016983+00:00","id":4630,"links":{},"metadata":{"_buckets":{"deposit":"677c4a79-c0c4-4aa8-8707-b44d58a8b4b3"},"_deposit":{"id":"4630","owners":[],"pid":{"revision_id":0,"type":"recid","value":"4630"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/4630","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Secure Data Center Networking with Open vSwitch","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"Data centers have become the nextgenerationcomputing platforms for enterprisesand Internet users. This is primarily due to theeconomic and technical advantages of resourcesharing in data centers. By sharing computingand storage resources through services such ascloud computing or software-as-a-service (SaaS),users can amortize the cost of hardware andsoftware. Because of the virtualization ofresources, a new virtualized network access layerhas been introduced to interconnect VMs withinthe data centers. In data center, hosts have beenrecently employed virtual switch to interconnectvirtual machines (VMs) within data centernetworks. Virtual Switch is essential to controland manage VM within the hosts. Open vSwitch,a network switch specifically built for Xenvirtualization environment is presented. Thedesign and advantages of Open vSwitch isdescribed. And then secure VM networking isproposed by using Open vSwitch. By combiningIntrusion Detection System with Open vSwitch,more secure virtual networking can beestablished because Open vSwitch can get interVM traffic logs directly and can perform morecontrols VM communication."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value":[]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-07-03"}],"displaytype":"preview","filename":"9098.pdf","filesize":[{"value":"69 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/4630/files/9098.pdf"},"version_id":"1bcd0969-f0bd-4af3-b270-7264245bb86f"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Ninth International Conference On Computer Applications (ICCA 2011)","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Hlaing, Pa Pa"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2011-05-05"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/269"},"item_title":"Secure Data Center Networking with Open vSwitch","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-07-03","publish_status":"0","recid":"4630","relation_version_is_last":true,"title":["Secure Data Center Networking with Open vSwitch"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2022-03-24T23:12:48.574997+00:00"}