Emerging Network Technologies that are Likely to Become Widely Available in the Future
| International Journal of Computer Trends and Technology (IJCTT) | |
© - May Issue 2013 by IJCTT Journal | ||
Volume-4 Issue-5 | ||
Year of Publication : 2013 | ||
Authors :Peter K. Kemei and William P.K. Korir |
Peter K. Kemei and William P.K. Korir"Emerging Network Technologies that are Likely to Become Widely Available in the Future "International Journal of Computer Trends and Technology (IJCTT),V4(5):1177-1184 May Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.
Abstract: - Emerging Networks technologies play an important role in the day-to-day administration of information technology in communications of different types of private and public networks. The emerging network technologies resolve the shortcoming of existing network architecture to enhance the facilitation of communication to the end user. These leads to adoption and improvement of some of the network technologies encouraging more innovation, research and development leading to emerging network technologies that are likely to become widely available in the future.
References-
[1] P Mell, T Grance, The NIST Definition of Cloud Computing, Version 15,1009 Available on: http://csrc.nist.gov/groups/SNS/cloud computing
[2] D Nurmi, R Wolski, C Grzegorczyk, G Obertelli, S Soman, L Youseff, D Zagorodnov, The Eucalyptus Open-sourceCloud-computing System, Proceedings of the 9th IEEE/ACM International Symposium on Cluster Computing and Grid, IEEExplore, visited on 15th August 2009.
[3] C Hutchinson, J Ward, K Castilon, Navigating the Next-Generation Application Architecture, IT Pro, IEEE Computer Society, 2009, March/April 2009, pp 18-22
[4] Sedayao, Implementing and Operating an Internet Scale Distributed Application using Services Oriented Architecture Principles and Cloud Computing Infrastructure, Proceedings of the iiWAS 2008, November, 2008, Linz, Austria, pp 417-421.
[5] F Majorczyk, E Totel, L Mé, A Saïdane, Anomaly Detection with Diagnosis in Diversified Systems using Information Flow Graphs, IFIP International Federation for Information Processing, LNCS, Vol 278, pp 301-315, Springer Boston, 2008.
[6] D Hervé, M Dacier, A Wespi, Towards a taxonomy of intrusion-detection systems, Computer Networks: The International Journal of Computer and Telecommunications Networking, Vol 9, April 1999, pp 805-822.
[7] C Dimitrakakis, A Mitrokotsa, Statistical Decision Making for Authentication and Intrusion Detection,Proceedings of the 8th IEEE International Conference on Machine Learning and Applications (ICMLA 2009), IEEE Press, December 2009
Keywords — Networks, Computing, Wireless, Internet, Technologies.