Skip to Main Content
Cyber Security in Parallel and Distributed Computing
book

Cyber Security in Parallel and Distributed Computing

by Dac-Nhuong Le, Raghvendra Kumar, Brojo Kishore Mishra, Jyotir Moy Chatterjee, Manju Khari
April 2019
Intermediate to advanced content levelIntermediate to advanced
294 pages
9h 31m
English
Wiley-Scrivener
Content preview from Cyber Security in Parallel and Distributed Computing

CHAPTER 10AN ON-DEMAND AND USER-FRIENDLY FRAMEWORK FOR CLOUD DATA CENTRE NETWORKS WITH PERFORMANCE GUARANTEE

P. Srinivas Kumar1, Abhishek Kumar2, Pramod Singh Rathore2, Jyotir Moy Chatterjee3

1Department of Computer Science & Engineering, Sri Satyasai University of Technology and Medical Sciences, Sehore, Madhya Pradesh, India

2 Computer Science Department, Aryabhatta College of Engineering & Research Center (ACERC Ajmer), Rajasthan, India

3 Asia Pacific University of Technology & Innovation, Kathmandu, Nepal.

Abstract

Distributed computing, a sort of web benefit provisioning model, gives enormous advantages over conventional IT benefit conditions with the assistance of virtualization innovation. As distributed computing isn’t a completely developed worldview, it poses numerous open issues to be tended to. Because of its unpredictable and dispersed design, the key research issue in distributed computing is effective asset provisioning. Diagrambased portrayals of complex systems provide less difficult perspectives and chart hypothetical procedures provide easier answers to a great many issues characteristic of systems. Subsequently, this chapter starts with an investigation of chart hypothesis applications in PC systems with a particular spotlight on diagram hypothesis applications in distributed computing. This work focuses on fundamental asset provisioning issues that emerge in distributed computing situations and presents some applied diagram hypothetical recommendations to ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures

Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures

Peter Thermos, Ari Takanen

Publisher Resources

ISBN: 9781119488057Purchase book