You are previewing Software Networks.
O'Reilly logo
Software Networks

Book Description

The goal of this book is to describe new concepts for Internet next generation. This architecture is based on virtual networking using Cloud and datacenters facilities. Main problems concern 1) the placement of virtual resources for opening a new network on the fly, and 2) the urbanisation of virtual resource implemented on physical network equipment. This architecture deals with mechanisms capable of controlling automatically the placement of all virtual resources within the physical network.

In this book, we describe how to create and delete virtual networks on the fly. Indeed, the system is able to create any new network with any kind of resource (e.g., virtual switch, virtual routers, virtual LSRs, virtual optical path, virtual firewall, virtual SIP-based servers, virtual devices, virtual servers, virtual access points, and so on). We will show how this architecture is compatible with new advances in SDN (Software Defined Networking), new high-speed transport protocol like TRILL (Transparent Interconnection of Lots of Links) and LISP (Locator/Identifier Separation Protocol), NGN, IMS, Wi-Fi new generation, and 4G/5G networks. Finally, we introduce the Cloud of security and the virtualisation of secure elements (smartcard) that should definitely transform how to secure the Internet.

Table of Contents

  1. Cover
  2. Title
  3. Copyright
    1. I.1. The first two revolutions
    2. I.2. The third revolution
    3. I.3. “Cloudification” of networks
    4. I.4. Conclusion
    1. 1.1. Software networks
    2. 1.2. Hypervisors
    3. 1.3. Virtual devices
    4. 1.4. Conclusion
    1. 2.1. The objective
    2. 2.2. The ONF architecture
    3. 2.3. NFV (Network Functions Virtualization)
    4. 2.4. OPNFV
    5. 2.5. Southbound interface
    6. 2.6. The controller
    7. 2.7. Northbound interface
    8. 2.8. Application layer
    9. 2.9. Urbanization
    10. 2.10. The NSX architecture
    11. 2.11. CISCO ACI (Application Centric Infrastructure)
    12. 2.12. OpenContrail and Juniper
    13. 2.13. Brocade
    14. 2.14. Alcatel Lucent’s SDN architecture
    15. 2.15. Conclusion
    1. 3.1. Placement of the controller
    2. 3.2. Virtual access points
    3. 3.3. Software LANs
    4. 3.4. Automation of the implementation of software networks
    5. 3.5. Intelligence in networks
    6. 3.6. Management of a complex environment
    7. 3.7. Multi-agent systems
    8. 3.8. Reactive agent systems
    9. 3.9. Active networks
    10. 3.10. Programmable networks
    11. 3.11. Autonomous networks
    12. 3.12. Autonomic networks
    13. 3.13. Situated view
    14. 3.14. Conclusion
    1. 4.1. OpenFlow
    2. 4.2. VXLAN
    3. 4.3. NVGRE (Network Virtualization using Generic Routing Encapsulation)
    4. 4.4. MEF Ethernet
    5. 4.5. Carrier-Grade Ethernet
    6. 4.6. TRILL (Transparent Interconnection of a Lot of Links)
    7. 4.7. LISP (Locator/Identifier Separation Protocols)
    8. 4.8. Conclusion
    1. 5.1. Mobile Cloud Networking
    2. 5.2. Mobile Clouds
    3. 5.3. Mobility control
    4. 5.4. Mobility protocols
    5. 5.5. Mobility control
      1. 5.5.1. IP Mobile
      2. 5.5.2. Solutions for micromobility
    6. 5.6. Multihoming
    7. 5.7. Network-level multihoming
      1. 5.7.1. HIP (Host Identity Protocol)
      2. 5.7.2. SHIM6 (Level 3 Multihoming Shim Protocol for IPv6)
      3. 5.7.3. mCoA (Multiple Care-of-Addresses) in Mobile IPv6
    8. 5.8. Transport-level multihoming
      1. 5.8.1. SCTP (Stream Control Transmission Protocol)
      2. 5.8.2. CMT (Concurrent Multipath Transfer)
      3. 5.8.3. MPTCP (Multipath TCP)
    9. 5.9. Conclusion
    1. 6.1. 3GPP and IEEE
    2. 6.2. New-generation Wi-Fi
    3. 6.3. IEEE 802.11ac
    4. 6.4. IEEE 802.11ad
    5. 6.5. IEEE 802.11af
    6. 6.6. IEEE 802.11ah
    7. 6.7. Small cells
    8. 6.8. Femtocells
    9. 6.9. Hotspots
    10. 6.10. Microcells
    11. 6.11. Wi-Fi Passpoint
    12. 6.12. Backhaul networks
    13. 6.13. Software radio and radio virtual machine
    14. 6.14. 5G
    15. 6.15. C-RAN
    16. 6.16. The Internet of Things
    17. 6.17. Sensor networks
    18. 6.18. RFID
    19. 6.19. EPCglobal
    20. 6.20. Security of RFID
    21. 6.21. Mifare
    22. 6.22. NFC (Near-Field Comunication)
    23. 6.23. Mobile keys
    24. 6.24. NFC contactless payment
    25. 6.25. HIP (Host Identity Protocol)
    26. 6.26. The Internet of Things in the medical domain
    27. 6.27. The Internet of Things in the home
    28. 6.28. Conclusion
    1. 7.1. Secure element
    2. 7.2. Virtual secure elements
    3. 7.3. The TEE (Trusted Execution Environment)
    4. 7.4. TSM
    5. 7.5. Solution without a TSM
    6. 7.6. HCE
    7. 7.7. Securing solutions
    8. 7.8. Conclusion
    1. 8.1. Accelerators
    2. 8.2. A reconfigurable microprocessor
    3. 8.3. Morphware networks
    4. 8.4. Conclusion
  4. End User License Agreement