Software Networks
Реклама. ООО «ЛитРес», ИНН: 7719571260.
Оглавление
Guy Pujolle. Software Networks
Table of Contents
List of Tables
List of Illustrations
Guide
Pages
Software Networks. Virtualization, SDN, 5G and Security
Introduction
I.1. The first two revolutions
I.2. The third revolution
I.3. “Cloudification” of networks
I.4. Conclusion
1. Virtualization
1.1. Software networks
1.2. Hypervisors and containers
1.3. Kubernetes
1.4. Software networks
1.5. Virtual devices
1.6. Conclusion
2. SDN (Software-Defined Networking)
2.1. The objective
2.2. The ONF architecture
2.3. NFV (Network Functions Virtualization)
2.4. OPNFV
2.5. Southbound interface
2.6. The controller
2.7. Northbound interface
2.8. Application layer
2.9. Urbanization
2.10. Conclusion
3. Fabric, SD-WAN, vCPE, vRAN, vEPC
3.1. Fabrics control
3.2. NSX and VMware company
3.2.1. CISCO ACI (Application Centric Infrastructure)
3.2.2. OpenContrail and Juniper
3.2.3. Brocade
3.2.4. Nokia’s SDN architecture
3.3. SD-WAN
3.4. vCPE
3.5. vRAN
3.6. vEPC
4. Open Source Software for Networks
4.1. Open source software
4.2. Open Compute Project (OCP)
4.3. OPNFV
4.4. ONAP (Open Network Automation Protocol)
4.5. Open vSwitch
4.6. OpenDaylight platform
4.7. FD.io
4.8. PNDA
4.9. SNAS
5. MEC
5.1. eNodeB and gNodeB virtualization
5.2. C-RAN
6. Fog Networking
6.1. Fog architectures
6.2. Fog controllers
6.3. Fog and the Internet of Things
6.4. Conclusion on the Fog solution
7. Skin Networking
7.1. Skin networking architecture
7.2. Virtual access points
7.3. Software LANs
7.4. Participatory Internet
7.5. Conclusion
8. Software Network Automation
8.1. Automation of the implementation of software networks
8.2. Management of a complex environment
8.3. Multi-agent systems
8.4. Reactive agent systems
8.5. Active, programmable and autonomous networks
8.6. Autonomic networks
8.7. Conclusion
9. New-generation Protocols
9.1. OpenFlow
9.2. VXLAN
9.3. NVGRE
9.4. MEF Ethernet
9.5. Carrier-Grade Ethernet
9.6. TRILL (Transparent Interconnection of a Lot of Links)
9.7. LISP (Locator/Identifier Separation Protocol)
9.8. Conclusion
10. Mobile Cloud Networking, the Mobile Cloud and Mobility Control
10.1. Mobile Cloud Networking
10.2. Mobile Cloud
10.3. Mobility control
10.4. Mobility protocols
10.4.1. Mobile IP or MIP
10.4.2. Solutions for micromobility
10.5. Multihoming
10.6. Network-level multihoming
10.6.1. HIP (Host Identity Protocol)
10.6.2. SHIM6 (Level 3 Multihoming Shim Protocol for IPv6)
10.6.3. mCoA (Multiple Care-of-Addresses) in Mobile IPv6
10.7. Transport-level multihoming
10.7.1. SCTP (Stream Control Transmission Protocol)
10.7.2. CMT (Concurrent Multipath Transfer)
10.7.3. MPTCP (Multipath TCP)
10.8. Conclusion
11. Wi-Fi and 5G
11.1. 3GPP and IEEE
11.2. New-generation Wi-Fi
11.2.1. Wi-Fi 5 (IEEE 802.11ac)
11.2.2. IEEE 802.11ad
11.2.3. IEEE 802.11af
11.2.4. Halow (IEEE 802.11ah)
11.2.5. Wi-Fi 6 (IEEE 802.11ax) and super WiGig (IEEE 802.11ay)
11.3. Small cells
11.3.1. Femtocells
11.3.2. Hotspots
11.3.3. Wi-Fi Passpoint
11.3.4. Virtualization of Wi-Fi and HNB
11.3.5. Backhaul networks
11.4. Software radio and radio virtual machine
11.5. 5G
11.5.1. 5G radio
11.5.2. The core network
11.5.3. C-RAN
12. The Internet of Things
12.1. Sensor networks
12.2. RFID
12.3. NFC (Near-Field Communication)
12.4. NFC contactless payment
12.5. HIP (Host Identity Protocol)
12.6. Healthcare Internet
12.7. Case study: the smart city
12.8. Conclusion
13. Vehicular Networks
13.1. 5G
13.2. 5G standardization
13.2.1. 5G vehicular networks
13.2.2. Technological presentation of C-V2X
13.3. VLC
13.4. Conclusion
14. Tactile Internet
14.1. Tactile internet applications
14.2. Functionalities required for the tactile internet
14.3. Technical specifications for 5G
14.4. Tactile internet in Industry 4.0
14.5. Conclusion on tactile internet
15. Security
15.1. Secure element
15.2. Secure elements-based solution. 15.2.1. Virtual secure elements
15.2.2. The TEE (Trusted Execution Environment)
15.2.3. TSM
15.2.4. Solution without a TSM
15.2.5. HCE
15.2.6. Securing solutions
15.3. The blockchain
15.4. Conclusion
16. Concretization and Morphware Networks
16.1. Accelerators
16.2. A reconfigurable microprocessor
16.3. Morphware networks
16.4. Conclusion
Conclusion
References
Index
A, B, C
D, E, F
G, H, I
K, L, M
N, O, P
R, S, T
U, V, W
WILEY END USER LICENSE AGREEMENT
Отрывок из книги
Revised and Updated 2nd Edition
Advanced Networks Set
.....
Finally, there is one last reason to favor migration to a new network: security. Security requires a precise view and understanding of the problems at hand, which range from physical security to computer security, with the need to lay contingency plans for attacks that are sometimes entirely unforeseeable. The world of the Internet today is like a bicycle tire which is made up entirely of patches (having been punctured and repaired numerous times). Every time an attack succeeds, a new patch is added. Such a tire is still roadworthy at the moment, but there is a danger that it will burst if no new solution is envisaged in the next few years. Near the end of this book, in Chapter 15, we will look at the secure Cloud, whereby, in a datacenter, a whole set of solutions is built around specialized virtual machines to provide new elements, the aim of which is to enhance the security of the applications and networks.
An effective security mechanism must include a physical element: a safe box to protect the important elements of the arsenal, necessary to ensure confidentiality, authentication, etc. Software security is a reality, and to a certain extent, may be sufficient for numerous applications. However, secure elements can always be circumvented when all of the defenses are software-based. This means that, for new generations, there must be a physical element, either local or remote. This hardware element is a secure microprocessor known as a “secure element”. A classic example of this type of device is the smartcard, used particularly prevalently by telecom operators and banks.
.....