The goal of this book is to describe new concepts for Internet next generation. This architecture is based on virtual networking using Cloud and datacenters facilities. Main problems concern 1) the placement of virtual resources for opening a new network on the fly, and 2) the urbanisation of virtual resource implemented on physical network equipment. This architecture deals with mechanisms capable of controlling automatically the placement of all virtual resources within the physical network.In this book, we describe how to create and delete virtual networks on the fly. Indeed, the system is able to create any new network with any kind of resource (e.g., virtual switch, virtual routers, virtual LSRs, virtual optical path, virtual firewall, virtual SIP-based servers, virtual devices, virtual servers, virtual access points, and so on). We will show how this architecture is compatible with new advances in SDN (Software Defined Networking), new high-speed transport protocol like TRILL (Transparent Interconnection of Lots of Links) and LISP (Locator/Identifier Separation Protocol), NGN, IMS, Wi-Fi new generation, and 4G/5G networks. Finally, we introduce the Cloud of security and the virtualisation of secure elements (smartcard) that should definitely transform how to secure the Internet.
Guy Pujolle is currently Professor at University Pierre and Marie Curie (Paris VI) in France and a member of the Scientific Advisory Board of Orange/France Telecom Group. He has published widely in the area of computer systems modeling and performance, queuing theory, high-speed networks, intelligence in networking, wireless networks, and Post-IP networks, including 19 influential texts and monographs in these areas.
Introduction ixChapter 1 Virtualization 11.1 Software networks 51.2 Hypervisors 71.3 Virtual devices 111.4 Conclusion 12Chapter 2 SDN (Software-Defined Networking) 152.1.The objective 162.2 The ONF architecture 192.3 NFV (Network Functions Virtualization) 252.4 OPNFV 272.5 Southbound interface 282.6 The controller 292.7 Northbound interface 312.8 Application layer 322.9 Urbanization 332.10 The NSX architecture 362.11 CISCO ACI (Application Centric Infrastructure) 402.12 OpenContrail and Juniper 422.13 Brocade 432.14 Alcatel Lucent’s SDN architecture 442.15 Conclusion 45Chapter 3 Smart Edges 493.1 Placement of the controller 493.2 Virtual access points 553.3 Software LANs 583.4 Automation of the implementation of software networks 603.5 Intelligence in networks 613.6 Management of a complex environment 623.7 Multi-agent systems 653.8 Reactive agent systems 703.9 Active networks 723.10 Programmable networks 743.11 Autonomous networks 743.12 Autonomic networks 753.13 Situated view 773.14 Conclusion 79Chapter 4 New-generation Protocols 814.1 OpenFlow 834.2 VXLAN 904.3 NVGRE (Network Virtualization using Generic Routing Encapsulation) 914.4 MEF Ethernet 924.5 Carrier-Grade Ethernet 934.6 TRILL (Transparent Interconnection of a Lot of Links) 974.7 LISP (Locator/Identifier Separation Protocols) 994.8 Conclusion 100Chapter 5. Mobile Cloud Networking and Mobility Control 1035.1 Mobile Cloud Networking 1035.2 Mobile Clouds 1085.3 Mobility control 1105.4 Mobility protocols 1155.5 Mobility control 1165.5.1 IP Mobile 1165.5.2 Solutions for micromobility 1175.6 Multihoming 1195.7 Network-level multihoming 1215.7.1 HIP (Host Identity Protocol) 1225.7.2 SHIM6 (Level 3 Multihoming Shim Protocol for IPv6) 1245.7.3 mCoA (Multiple Care-of-Addresses) in Mobile IPv6 1255.8 Transport-level multihoming 1275.8.1 SCTP (Stream Control Transmission Protocol) 1275.8.2 CMT (Concurrent Multipath Transfer) 1325.8.3 MPTCP (Multipath TCP) 1355.9 Conclusion 135Chapter 6 Wi-fi and 5G 1376.1 3GPP and IEEE 1386.2 New-generation Wi-Fi 1396.3 IEEE 802.11ac 1406.4 IEEE 802.11ad 1426.5 IEEE 802.11af 1436.6 IEEE 802.11ah 1456.7 Small cells 1476.8 Femtocells 1486.9 Hotspots 1516.10 Microcells 1536.11 Wi-Fi Passpoint 1536.12 Backhaul networks 1586.13 Software radio and radio virtual machine 1606.14 5G 1626.15 C-RAN 1686.16 The Internet of Things 1716.17 Sensor networks 1726.18 RFID 1746.19 EPCglobal 1776.20 Security of RFID 1786.21 Mifare 1796.22 NFC (Near-Field Comunication) 1806.23 Mobile keys 1816.24 NFC contactless payment 1826.25 HIP (Host Identity Protocol) 1846.26 The Internet of Things in the medical domain 1846.27 The Internet of Things in the home 1866.28 Conclusion 187Chapter 7 Security 1897.1 Secure element 1917.2 Virtual secure elements 1957.3 The TEE (Trusted Execution Environment) 1977.4 TSM 1997.5 Solution without a TSM 2037.6 HCE 2047.7 Securing solutions 2057.8 Conclusion 212Chapter 8. Concretization and Morphware Networks 2138.1 Accelerators 2148.2 A reconfigurable microprocessor 2158.3 Morphware networks 2208.4 Conclusion 223Conclusion 225Bibliography 229Index 231