Home Page Icon
Home Page
Table of Contents for
End User License Agreement
Close
End User License Agreement
by Guy Pujolle
Software Networks
Cover
Title
Copyright
Introduction
I.1. The first two revolutions
I.2. The third revolution
I.3. “Cloudification” of networks
I.4. Conclusion
1: Virtualization
1.1. Software networks
1.2. Hypervisors
1.3. Virtual devices
1.4. Conclusion
2: SDN (Software-Defined Networking)
2.1. The objective
2.2. The ONF architecture
2.3. NFV (Network Functions Virtualization)
2.4. OPNFV
2.5. Southbound interface
2.6. The controller
2.7. Northbound interface
2.8. Application layer
2.9. Urbanization
2.10. The NSX architecture
2.11. CISCO ACI (Application Centric Infrastructure)
2.12. OpenContrail and Juniper
2.13. Brocade
2.14. Alcatel Lucent’s SDN architecture
2.15. Conclusion
3: Smart Edges
3.1. Placement of the controller
3.2. Virtual access points
3.3. Software LANs
3.4. Automation of the implementation of software networks
3.5. Intelligence in networks
3.6. Management of a complex environment
3.7. Multi-agent systems
3.8. Reactive agent systems
3.9. Active networks
3.10. Programmable networks
3.11. Autonomous networks
3.12. Autonomic networks
3.13. Situated view
3.14. Conclusion
4: New-generation Protocols
4.1. OpenFlow
4.2. VXLAN
4.3. NVGRE (Network Virtualization using Generic Routing Encapsulation)
4.4. MEF Ethernet
4.5. Carrier-Grade Ethernet
4.6. TRILL (Transparent Interconnection of a Lot of Links)
4.7. LISP (Locator/Identifier Separation Protocols)
4.8. Conclusion
5: Mobile Cloud Networking and Mobility Control
5.1. Mobile Cloud Networking
5.2. Mobile Clouds
5.3. Mobility control
5.4. Mobility protocols
5.5. Mobility control
5.5.1. IP Mobile
5.5.2. Solutions for micromobility
5.6. Multihoming
5.7. Network-level multihoming
5.7.1. HIP (Host Identity Protocol)
5.7.2. SHIM6 (Level 3 Multihoming Shim Protocol for IPv6)
5.7.3. mCoA (Multiple Care-of-Addresses) in Mobile IPv6
5.8. Transport-level multihoming
5.8.1. SCTP (Stream Control Transmission Protocol)
5.8.2. CMT (Concurrent Multipath Transfer)
5.8.3. MPTCP (Multipath TCP)
5.9. Conclusion
6: Wi-Fi and 5G
6.1. 3GPP and IEEE
6.2. New-generation Wi-Fi
6.3. IEEE 802.11ac
6.4. IEEE 802.11ad
6.5. IEEE 802.11af
6.6. IEEE 802.11ah
6.7. Small cells
6.8. Femtocells
6.9. Hotspots
6.10. Microcells
6.11. Wi-Fi Passpoint
6.12. Backhaul networks
6.13. Software radio and radio virtual machine
6.14. 5G
6.15. C-RAN
6.16. The Internet of Things
6.17. Sensor networks
6.18. RFID
6.19. EPCglobal
6.20. Security of RFID
6.21. Mifare
6.22. NFC (Near-Field Comunication)
6.23. Mobile keys
6.24. NFC contactless payment
6.25. HIP (Host Identity Protocol)
6.26. The Internet of Things in the medical domain
6.27. The Internet of Things in the home
6.28. Conclusion
7: Security
7.1. Secure element
7.2. Virtual secure elements
7.3. The TEE (Trusted Execution Environment)
7.4. TSM
7.5. Solution without a TSM
7.6. HCE
7.7. Securing solutions
7.8. Conclusion
8: Concretization and Morphware Networks
8.1. Accelerators
8.2. A reconfigurable microprocessor
8.3. Morphware networks
8.4. Conclusion
Conclusion
Bibliography
Index
End User License Agreement
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Sustainability Calling
WILEY END USER LICENSE AGREEMENT
Go to
www.wiley.com/go/eula
to access Wiley’s ebook EULA.
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset