Buy Software Networks Book by Guy Pujolle - Bookswagon
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Home > Computing and Information Technology > Computer networking and communications > Software Networks: Virtualization, SDN, 5G, and Security
Software Networks: Virtualization, SDN, 5G, and Security

Software Networks: Virtualization, SDN, 5G, and Security


     0     
5
4
3
2
1



International Edition


X
About the Book

Software Networks describe new concepts for the Internet�s next generation. This architecture is based on virtual networking using Cloud and datacenter facilities. The main problems to be dealt with are the placement of virtual resources for opening a new network on the fly, and the urbanization of virtual resources implemented on physical network equipment. The digital architecture also deals with mechanisms capable of automatically controlling the placement of all virtual resources within the physical network.

This book describes how to create and delete virtual networks on the fly. Indeed, the system is able to create any new network with any kind of virtual resource (e.g. switches, routers, LSRs, optical paths, firewalls, SIP-based servers, devices, servers, access points, etc.). Software Networks shows how this architecture is compatible with new advances in SDN (Software Defined Networking), new high-speed transport protocols such as TRILL (Transparent Interconnection of Lots of Links) and LISP (Locator/Identifier Separation Protocol), NGN, IMS, new generation Wi-Fi, and 4G/5G networks. Finally, the author introduces Clouds of security and the virtualization of secure elements (smartcards) that could certainly transform how to secure the Internet.

For this second edition, the author addresses in five new chapters the importance of open source software for networks, mobile edge computing, fog networking, tactile internet – a network environment allowing remote access, and security – the use of Cloud of security, secure elements and the emergence of the blockchain.



Table of Contents:

Introduction xi

Chapter 1. Virtualization 1

1.1. Software networks 4

1.2. Hypervisors and containers 6

1.3. Kubernetes 8

1.4. Software networks 9

1.5. Virtual devices 11

1.6. Conclusion 12

Chapter 2. SDN (Software-Defined Networking) 13

2.1. The objective 14

2.2. The ONF architecture 16

2.3. NFV (Network Functions Virtualization) 21

2.4. OPNFV 23

2.5. Southbound interface 23

2.6. The controller 25

2.7. Northbound interface 26

2.8. Application layer 27

2.9. Urbanization 28

2.10. Conclusion 30

Chapter 3. Fabric, SD-WAN, vCPE, vRAN, vEPC 33

3.1. Fabrics control 33

3.2. NSX and VMware company 35

3.2.1. CISCO ACI (Application Centric Infrastructure) 39

3.2.2. OpenContrail and Juniper 40

3.2.3. Brocade 42

3.2.4. Nokia’s SDN architecture 43

3.3. SD-WAN 43

3.4. vCPE 47

3.5. vRAN 48

3.6. vEPC 49

Chapter 4. Open Source Software for Networks 51

4.1. Open source software 51

4.2. Open Compute Project (OCP) 53

4.3. OPNFV 54

4.4. ONAP (Open Network Automation Protocol) 61

4.5. Open vSwitch 64

4.6. OpenDaylight platform 65

4.7. FD.io 66

4.8. PNDA 67

4.9. SNAS 68

Chapter 5. MEC 69

5.1. eNodeB and gNodeB virtualization 70

5.2. C-RAN 74

Chapter 6. Fog Networking 79

6.1. Fog architectures 79

6.2. Fog controllers 82

6.3. Fog and the Internet of Things 86

6.4. Conclusion on the Fog solution 87

Chapter 7. Skin Networking 89

7.1. Skin networking architecture 89

7.2. Virtual access points 90

7.3. Software LANs 92

7.4. Participatory Internet 94

7.5. Conclusion 96

Chapter 8. Software Network Automation 97

8.1. Automation of the implementation of software networks 97

8.2. Management of a complex environment 99

8.3. Multi-agent systems 101

8.4. Reactive agent systems 105

8.5. Active, programmable and autonomous networks 107

8.6. Autonomic networks 109

8.7. Conclusion 113

Chapter 9. New-generation Protocols 115

9.1. OpenFlow 117

9.2. VXLAN 123

9.3. NVGRE 124

9.4. MEF Ethernet 125

9.5. Carrier-Grade Ethernet 126

9.6. TRILL (Transparent Interconnection of a Lot of Links) 129

9.7. LISP (Locator/Identifier Separation Protocol) 131

9.8. Conclusion 132

Chapter 10. Mobile Cloud Networking, the Mobile Cloud and Mobility Control 133

10.1. Mobile Cloud Networking 133

10.2. Mobile Cloud 137

10.3. Mobility control 139

10.4. Mobility protocols 143

10.4.1. Mobile IP or MIP 144

10.4.2. Solutions for micromobility 145

10.5. Multihoming 146

10.6. Network-level multihoming 148

10.6.1. HIP (Host Identity Protocol) 149

10.6.2. SHIM6 (Level 3 Multihoming Shim Protocol for IPv6) 150

10.6.3. mCoA (Multiple Care-of-Addresses) in Mobile IPv6 151

10.7. Transport-level multihoming 153

10.7.1. SCTP (Stream Control Transmission Protocol) 153

10.7.2. CMT (Concurrent Multipath Transfer) 157

10.7.3. MPTCP (Multipath TCP) 159

10.8. Conclusion 160

Chapter 11. Wi-Fi and 5G 161

11.1. 3GPP and IEEE 162

11.2. New-generation Wi-Fi 163

11.2.1. Wi-Fi 5 (IEEE 802.11ac) 164

11.2.2. IEEE 802.11ad 166

11.2.3. IEEE 802.11af 167

11.2.4. Halow (IEEE 802.11ah) 168

11.2.5. Wi-Fi 6 (IEEE 802.11ax) and super WiGig (IEEE 802.11ay) 169

11.3. Small cells 170

11.3.1. Femtocells 171

11.3.2. Hotspots 174

11.3.3. Wi-Fi Passpoint 175

11.3.4. Virtualization of Wi-Fi and HNB 179

11.3.5. Backhaul networks 182

11.4. Software radio and radio virtual machine 184

11.5. 5G 185

11.5.1. 5G radio 189

11.5.2. The core network 192

11.5.3. C-RAN 193

Chapter 12. The Internet of Things 197

12.1. Sensor networks 198

12.2. RFID 200

12.3. NFC (Near-Field Communication) 204

12.4. NFC contactless payment 206

12.5. HIP (Host Identity Protocol) 207

12.6. Healthcare Internet 207

12.7. Case study: the smart city 210

12.8. Conclusion 213

Chapter 13. Vehicular Networks 215

13.1. 5G 217

13.2. 5G standardization 220

13.2.1. 5G vehicular networks 220

13.2.2. Technological presentation of C-V2X 222

13.3. VLC 224

13.4. Conclusion 226

Chapter 14. Tactile Internet 227

14.1. Tactile internet applications 227

14.2. Functionalities required for the tactile internet 229

14.3. Technical specifications for 5G 232

14.4. Tactile internet in Industry 4.0 234

14.5. Conclusion on tactile internet 235

Chapter 15. Security 237

15.1. Secure element 239

15.2. Secure elements-based solution 242

15.2.1. Virtual secure elements 242

15.2.2. The TEE (Trusted Execution Environment) 244

15.2.3. TSM 245

15.2.4. Solution without a TSM 249

15.2.5. HCE 250

15.2.6. Securing solutions 250

15.3. The blockchain 256

15.4. Conclusion 257

Chapter 16. Concretization and Morphware Networks 259

16.1. Accelerators 260

16.2. A reconfigurable microprocessor 261

16.3. Morphware networks 266

16.4. Conclusion 268

Conclusion 269

References 271

Index 273



About the Author :
Guy Pujolle is currently Professor at Sorbonne University in France. He has published widely in the area of computer systems modeling and performance, queuing theory, high-speed networks, intelligence in networking, wireless networks and Post-IP networks, including 19 influential texts and monographs in these areas.


Best Sellers


Product Details
  • ISBN-13: 9781786304582
  • Publisher: ISTE Ltd and John Wiley & Sons Inc
  • Publisher Imprint: ISTE Ltd and John Wiley & Sons Inc
  • Height: 236 mm
  • No of Pages: 312
  • Returnable: N
  • Sub Title: Virtualization, SDN, 5G, and Security
  • Width: 163 mm
  • ISBN-10: 1786304589
  • Publisher Date: 14 Feb 2020
  • Binding: Hardback
  • Language: English
  • Returnable: N
  • Spine Width: 23 mm
  • Weight: 662 gr


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Software Networks: Virtualization, SDN, 5G, and Security
ISTE Ltd and John Wiley & Sons Inc -
Software Networks: Virtualization, SDN, 5G, and Security
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Software Networks: Virtualization, SDN, 5G, and Security

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!