Software Networks

Software Networks
Автор книги: id книги: 1887492     Оценка: 0.0     Голосов: 0     Отзывы, комментарии: 0 15938,7 руб.     (156,85$) Читать книгу Купить и скачать книгу Купить бумажную книгу Электронная книга Жанр: Отраслевые издания Правообладатель и/или издательство: John Wiley & Sons Limited Дата добавления в каталог КнигаЛит: ISBN: 9781119694724 Скачать фрагмент в формате   fb2   fb2.zip Возрастное ограничение: 0+ Оглавление Отрывок из книги

Реклама. ООО «ЛитРес», ИНН: 7719571260.

Описание книги

Software Networks describe new concepts for the Internet's next generation. This architecture is based on virtual networking using Cloud and datacenter facilities. The main problems to be dealt with are the placement of virtual resources for opening a new network on the fly, and the urbanization of virtual resources implemented on physical network equipment. The digital architecture also deals with mechanisms capable of automatically controlling the placement of all virtual resources within the physical network. This book describes how to create and delete virtual networks on the fly. Indeed, the system is able to create any new network with any kind of virtual resource (e.g. switches, routers, LSRs, optical paths, firewalls, SIP-based servers, devices, servers, access points, etc.). Software Networks shows how this architecture is compatible with new advances in SDN (Software Defined Networking), new high-speed transport protocols such as TRILL (Transparent Interconnection of Lots of Links) and LISP (Locator/Identifier Separation Protocol), NGN, IMS, new generation Wi-Fi, and 4G/5G networks. Finally, the author introduces Clouds of security and the virtualization of secure elements (smartcards) that could certainly transform how to secure the Internet. For this second edition, the author addresses in five new chapters the importance of open source software for networks, mobile edge computing, fog networking, tactile internet – a network environment allowing remote access, and security – the use of Cloud of security, secure elements and the emergence of the blockchain.

Оглавление

Guy Pujolle. Software Networks

Table of Contents

List of Tables

List of Illustrations

Guide

Pages

Software Networks. Virtualization, SDN, 5G and Security

Introduction

I.1. The first two revolutions

I.2. The third revolution

I.3. “Cloudification” of networks

I.4. Conclusion

1. Virtualization

1.1. Software networks

1.2. Hypervisors and containers

1.3. Kubernetes

1.4. Software networks

1.5. Virtual devices

1.6. Conclusion

2. SDN (Software-Defined Networking)

2.1. The objective

2.2. The ONF architecture

2.3. NFV (Network Functions Virtualization)

2.4. OPNFV

2.5. Southbound interface

2.6. The controller

2.7. Northbound interface

2.8. Application layer

2.9. Urbanization

2.10. Conclusion

3. Fabric, SD-WAN, vCPE, vRAN, vEPC

3.1. Fabrics control

3.2. NSX and VMware company

3.2.1. CISCO ACI (Application Centric Infrastructure)

3.2.2. OpenContrail and Juniper

3.2.3. Brocade

3.2.4. Nokia’s SDN architecture

3.3. SD-WAN

3.4. vCPE

3.5. vRAN

3.6. vEPC

4. Open Source Software for Networks

4.1. Open source software

4.2. Open Compute Project (OCP)

4.3. OPNFV

4.4. ONAP (Open Network Automation Protocol)

4.5. Open vSwitch

4.6. OpenDaylight platform

4.7. FD.io

4.8. PNDA

4.9. SNAS

5. MEC

5.1. eNodeB and gNodeB virtualization

5.2. C-RAN

6. Fog Networking

6.1. Fog architectures

6.2. Fog controllers

6.3. Fog and the Internet of Things

6.4. Conclusion on the Fog solution

7. Skin Networking

7.1. Skin networking architecture

7.2. Virtual access points

7.3. Software LANs

7.4. Participatory Internet

7.5. Conclusion

8. Software Network Automation

8.1. Automation of the implementation of software networks

8.2. Management of a complex environment

8.3. Multi-agent systems

8.4. Reactive agent systems

8.5. Active, programmable and autonomous networks

8.6. Autonomic networks

8.7. Conclusion

9. New-generation Protocols

9.1. OpenFlow

9.2. VXLAN

9.3. NVGRE

9.4. MEF Ethernet

9.5. Carrier-Grade Ethernet

9.6. TRILL (Transparent Interconnection of a Lot of Links)

9.7. LISP (Locator/Identifier Separation Protocol)

9.8. Conclusion

10. Mobile Cloud Networking, the Mobile Cloud and Mobility Control

10.1. Mobile Cloud Networking

10.2. Mobile Cloud

10.3. Mobility control

10.4. Mobility protocols

10.4.1. Mobile IP or MIP

10.4.2. Solutions for micromobility

10.5. Multihoming

10.6. Network-level multihoming

10.6.1. HIP (Host Identity Protocol)

10.6.2. SHIM6 (Level 3 Multihoming Shim Protocol for IPv6)

10.6.3. mCoA (Multiple Care-of-Addresses) in Mobile IPv6

10.7. Transport-level multihoming

10.7.1. SCTP (Stream Control Transmission Protocol)

10.7.2. CMT (Concurrent Multipath Transfer)

10.7.3. MPTCP (Multipath TCP)

10.8. Conclusion

11. Wi-Fi and 5G

11.1. 3GPP and IEEE

11.2. New-generation Wi-Fi

11.2.1. Wi-Fi 5 (IEEE 802.11ac)

11.2.2. IEEE 802.11ad

11.2.3. IEEE 802.11af

11.2.4. Halow (IEEE 802.11ah)

11.2.5. Wi-Fi 6 (IEEE 802.11ax) and super WiGig (IEEE 802.11ay)

11.3. Small cells

11.3.1. Femtocells

11.3.2. Hotspots

11.3.3. Wi-Fi Passpoint

11.3.4. Virtualization of Wi-Fi and HNB

11.3.5. Backhaul networks

11.4. Software radio and radio virtual machine

11.5. 5G

11.5.1. 5G radio

11.5.2. The core network

11.5.3. C-RAN

12. The Internet of Things

12.1. Sensor networks

12.2. RFID

12.3. NFC (Near-Field Communication)

12.4. NFC contactless payment

12.5. HIP (Host Identity Protocol)

12.6. Healthcare Internet

12.7. Case study: the smart city

12.8. Conclusion

13. Vehicular Networks

13.1. 5G

13.2. 5G standardization

13.2.1. 5G vehicular networks

13.2.2. Technological presentation of C-V2X

13.3. VLC

13.4. Conclusion

14. Tactile Internet

14.1. Tactile internet applications

14.2. Functionalities required for the tactile internet

14.3. Technical specifications for 5G

14.4. Tactile internet in Industry 4.0

14.5. Conclusion on tactile internet

15. Security

15.1. Secure element

15.2. Secure elements-based solution. 15.2.1. Virtual secure elements

15.2.2. The TEE (Trusted Execution Environment)

15.2.3. TSM

15.2.4. Solution without a TSM

15.2.5. HCE

15.2.6. Securing solutions

15.3. The blockchain

15.4. Conclusion

16. Concretization and Morphware Networks

16.1. Accelerators

16.2. A reconfigurable microprocessor

16.3. Morphware networks

16.4. Conclusion

Conclusion

References

Index

A, B, C

D, E, F

G, H, I

K, L, M

N, O, P

R, S, T

U, V, W

WILEY END USER LICENSE AGREEMENT

Отрывок из книги

Revised and Updated 2nd Edition

Advanced Networks Set

.....

Finally, there is one last reason to favor migration to a new network: security. Security requires a precise view and understanding of the problems at hand, which range from physical security to computer security, with the need to lay contingency plans for attacks that are sometimes entirely unforeseeable. The world of the Internet today is like a bicycle tire which is made up entirely of patches (having been punctured and repaired numerous times). Every time an attack succeeds, a new patch is added. Such a tire is still roadworthy at the moment, but there is a danger that it will burst if no new solution is envisaged in the next few years. Near the end of this book, in Chapter 15, we will look at the secure Cloud, whereby, in a datacenter, a whole set of solutions is built around specialized virtual machines to provide new elements, the aim of which is to enhance the security of the applications and networks.

An effective security mechanism must include a physical element: a safe box to protect the important elements of the arsenal, necessary to ensure confidentiality, authentication, etc. Software security is a reality, and to a certain extent, may be sufficient for numerous applications. However, secure elements can always be circumvented when all of the defenses are software-based. This means that, for new generations, there must be a physical element, either local or remote. This hardware element is a secure microprocessor known as a “secure element”. A classic example of this type of device is the smartcard, used particularly prevalently by telecom operators and banks.

.....

Добавление нового отзыва

Комментарий Поле, отмеченное звёздочкой  — обязательно к заполнению

Отзывы и комментарии читателей

Нет рецензий. Будьте первым, кто напишет рецензию на книгу Software Networks
Подняться наверх