-
1
-
-
84868935195
-
-
Series Switching Technology in Data Center Networks
-
Architecture Brief: Using Cisco Catalyst 6500 and Cisco Nexus 7000 Series Switching Technology in Data Center Networks. http://www.cisco.com/en/US/prod/ collateral/switches/ps9441/ps9402/ps9512/White-Paper-C17-449427.pdf.
-
Architecture Brief: Using Cisco Catalyst 6500 and Cisco Nexus 7000
-
-
-
3
-
-
84858486852
-
-
Beth Israel Deaconess Medical Center
-
Beth Israel Deaconess Medical Center. Network Outage Information, http://home.caregroup.org/templatesnew/departments/BID/network-outage/.
-
Network Outage Information
-
-
-
4
-
-
84868926500
-
-
BladeLogic Sets Standard for Data Center Automation and Provides Foundation for Utility Computing with Operations Manager Version 5. Business Wire, Sept 15, 2003
-
BladeLogic Sets Standard for Data Center Automation and Provides Foundation for Utility Computing with Operations Manager Version 5. Business Wire, Sept 15, 2003, http://findarticles.com/p/articles/mi-m0EIN/is-2003-Sept- 15/ai-107753392/pg-2.
-
-
-
-
7
-
-
65249186076
-
-
Microsoft: Datacenter Growth Defies Moore's Law. InfoWorld, April 18, 2007, http://www.pcworld.com/article/id,130921/article.html.
-
Microsoft: Datacenter Growth Defies Moore's Law. InfoWorld, April 18, 2007, http://www.pcworld.com/article/id,130921/article.html.
-
-
-
-
8
-
-
84868930916
-
-
Net-SNMP. http://net-snmp.sourceforge.net.
-
Net-SNMP
-
-
-
9
-
-
84868926499
-
-
NetFPGA
-
NetFPGA. http://netfpga.org.
-
-
-
-
10
-
-
65249182418
-
-
nuttcp. http://linux.die.net/man/8/nuttcp.
-
nuttcp. http://linux.die.net/man/8/nuttcp.
-
-
-
-
11
-
-
84869638575
-
-
Policy based routing, http://www.cisco.com/warp/public/732/Tech/plicy-wp. htm.
-
Policy based routing
-
-
-
12
-
-
56549121497
-
-
Ruby on Rails, http://www.rubyonrails.org.
-
Ruby on Rails
-
-
-
14
-
-
77955458221
-
-
September 2007
-
US Search Engine Rankings, September 2007. http://searchenginewatch.com/ showPage.html?page=3627654.
-
US Search Engine Rankings
-
-
-
15
-
-
65249104763
-
-
Cisco Data Center Infrastructure 2.1 Design Guide, 2006.
-
Cisco Data Center Infrastructure 2.1 Design Guide, 2006.
-
-
-
-
17
-
-
4243137229
-
Cyber defense technology networking and evaluation
-
R. Bajcsy, et. al. Cyber defense technology networking and evaluation. Commun. ACM, 47(3):58-61, 2004 http://deterlab.net.
-
(2004)
Commun. ACM
, vol.47
, Issue.3
, pp. 58-61
-
-
Bajcsy, R.1
et., al.2
-
18
-
-
85032963495
-
Design and Implementation of a Routing Control Platform
-
M. Caesar, D. Caldwell, N. Feamster, J. Rexford, A. Shaikh, and J. van der Merwe. Design and Implementation of a Routing Control Platform. In NSDI 2005.
-
NSDI 2005
-
-
Caesar, M.1
Caldwell, D.2
Feamster, N.3
Rexford, J.4
Shaikh, A.5
van der Merwe, J.6
-
19
-
-
33751065316
-
The Cutting EDGE of IP Router Configuration
-
D. Caldwell, A. Gilbert, J. Gottlieb, A. Greenberg, G. Hjalmtysson, and J. Rexford. The Cutting EDGE of IP Router Configuration. In HotNets 2003.
-
HotNets 2003
-
-
Caldwell, D.1
Gilbert, A.2
Gottlieb, J.3
Greenberg, A.4
Hjalmtysson, G.5
Rexford, J.6
-
20
-
-
36949033604
-
Ethane: Taking Control of the Enterprise
-
M. Casado, M. J. Freedman, J. Pettit, J. Luo, N. McKeown, and S. Shenker. Ethane: Taking Control of the Enterprise. In SIGCOMM 2007.
-
SIGCOMM 2007
-
-
Casado, M.1
Freedman, M.J.2
Pettit, J.3
Luo, J.4
McKeown, N.5
Shenker, S.6
-
21
-
-
38149109851
-
-
K. Elmeleegy, A. Cox, and T. Ng. On Count-to-Infinity Induced Forwarding Loops in Ethernet Networks. In Infocom 2006.
-
K. Elmeleegy, A. Cox, and T. Ng. On Count-to-Infinity Induced Forwarding Loops in Ethernet Networks. In Infocom 2006.
-
-
-
-
23
-
-
33750037341
-
A Clean Slate 4D Approach to Network Control and Management
-
October
-
A. Greenberg, G. Hjalmtysson, D. A. Maltz, A. Myers, J. Rexford, G. Xie, H. Yan, J. Zhan, and H. Zhang. A Clean Slate 4D Approach to Network Control and Management. In ACM SIGCOMM Computer Communication Review. 85(5). October, 2005.
-
(2005)
ACM SIGCOMM Computer Communication Review
, vol.85
, Issue.5
-
-
Greenberg, A.1
Hjalmtysson, G.2
Maltz, D.A.3
Myers, A.4
Rexford, J.5
Xie, G.6
Yan, H.7
Zhan, J.8
Zhang, H.9
-
24
-
-
62849115476
-
A Policy-aware Switching Layer for Data Centers. Technical report, EECS Dept., University of California at Berkeley
-
June
-
D. Joseph, A. Tavakoli, and I. Stoica. A Policy-aware Switching Layer for Data Centers. Technical report, EECS Dept., University of California at Berkeley, June 2008.
-
(2008)
-
-
Joseph, D.1
Tavakoli, A.2
Stoica, I.3
-
25
-
-
0040291388
-
The Click modular router
-
August
-
E. Kohler, R. Morris, B. Chen, J. Jannotti, and M. F. Kaashoek. The Click modular router. ACM Transactions on Computer Systems, 18(3):263-297, August 2000.
-
(2000)
ACM Transactions on Computer Systems
, vol.18
, Issue.3
, pp. 263-297
-
-
Kohler, E.1
Morris, R.2
Chen, B.3
Jannotti, J.4
Kaashoek, M.F.5
-
27
-
-
85126502787
-
-
A. Mahimkar, J. Dange, V. Shmatikov, H. Vin, and Y. Zhang. dFence: Transparent Network-based Denial of Service Mitigation. In NSDI 2007.
-
A. Mahimkar, J. Dange, V. Shmatikov, H. Vin, and Y. Zhang. dFence: Transparent Network-based Denial of Service Mitigation. In NSDI 2007.
-
-
-
-
29
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
V. Paxson. Bro: A system for detecting network intruders in real-time. Computer Networks, 31(23-24):2435-2463, 1999.
-
(1999)
Computer Networks
, vol.31
, Issue.23-24
, pp. 2435-2463
-
-
Paxson, V.1
-
32
-
-
84871284967
-
Middleboxes No Longer Considered Harmful
-
M. Walfish, J. Stribling, M. Krohn, H. Balakrishnan, R. Morris, and S. Shenker. Middleboxes No Longer Considered Harmful. In OSDI 2004.
-
OSDI 2004
-
-
Walfish, M.1
Stribling, J.2
Krohn, M.3
Balakrishnan, H.4
Morris, R.5
Shenker, S.6
|