“Software Defined Network”(SDN)
Journal Title: IOSR Journal of Mobile Computing & Application (IOSR-JMCA) - Year 2018, Vol 5, Issue 1
Abstract
This paper explains a b out the basic concept of Software Defined Network (SDN). The paper also lists and discuss about the details of two sample products of Software Defined Network. Besides that, this paper also list out the details on the main issues and challenges of Software Defined Network. Finally this paper summarized on the importance and the future of the Software Defined Network in the development of network performance in the business world.
Authors and Affiliations
Parteeban a/l M Varatharajoo
Stress Faced By Women Entrepreneurs in Madurai District
“Women entrepreneur” is an individual who agrees exciting role to come across her individual wants and become economically autonomous. The development of women entrepreneurs and their involvement to the development of th...
Improving Search Engine Performance for e-Commerce Transactions using the REST-based API
This paper examined the difficulty in getting suitable and frequently updated prices for goods while shopping on e-commerce websites with the aid of price comparison websites. The study proposed to develop a price compar...
Work-related Smartphone Use Outside of Official Working Hours: The Impact on Work-life Conflict and Work Engagement
Work-related communication technology use after hourshas been a profound influence on employee’s work and family lives. The purpose of this study was to investigatethe influence of work-related smartphone use outside of...
Monthly Scholarship: A study to analyze the spending and saving pattern of Graduates in Saudi Arabia
Graduating students are given stipend generously in Saudi Arabia. This research was conducted as it is observed that most of college students received a monthly stipend but had no money in their bank accounts. Most of th...
Analysis of Malware Attack and Strategies for Curbing The Threat
Malicious Software otherwise known as Malware is software used or developed by attackers with the intent of disrupting computer operations. It can also be used to gather sensitive information, or to gain access to privat...