Introduction xiChapter 1. Virtualization 11.1. Software networks 41.2. Hypervisors and containers 61.3. Kubernetes 81.4. Software networks 91.5. Virtual devices 111.6. Conclusion 12Chapter 2. SDN (Software-Defined Networking) 132.1. The objective 142.2. The ONF architecture 162.3. NFV (Network Functions Virtualization) 212.4. OPNFV 232.5. Southbound interface 232.6. The controller 252.7. Northbound interface 262.8. Application layer 272.9. Urbanization 282.10. Conclusion 30Chapter 3. Fabric, SD-WAN, vCPE, vRAN, vEPC 333.1. Fabrics control 333.2. NSX and VMware company 353.2.1. CISCO ACI (Application Centric Infrastructure) 393.2.2. OpenContrail and Juniper 403.2.3. Brocade 423.2.4. Nokia's SDN architecture 433.3. SD-WAN 433.4. vCPE 473.5. vRAN 483.6. vEPC 49Chapter 4. Open Source Software for Networks 514.1. Open source software 514.2. Open Compute Project (OCP) 534.3. OPNFV 544.4. ONAP (Open Network Automation Protocol) 614.5. Open vSwitch 644.6. OpenDaylight platform 654.7. FD.io 664.8. PNDA 674.9. SNAS 68Chapter 5. MEC 695.1. eNodeB and gNodeB virtualization 705.2. C-RAN 74Chapter 6. Fog Networking 796.1. Fog architectures 796.2. Fog controllers 826.3. Fog and the Internet of Things 866.4. Conclusion on the Fog solution 87Chapter 7. Skin Networking 897.1. Skin networking architecture 897.2. Virtual access points 907.3. Software LANs 927.4. Participatory Internet 947.5. Conclusion 96Chapter 8. Software Network Automation 978.1. Automation of the implementation of software networks 978.2. Management of a complex environment 998.3. Multi-agent systems 1018.4. Reactive agent systems 1058.5. Active, programmable and autonomous networks 1078.6. Autonomic networks 1098.7. Conclusion 113Chapter 9. New-generation Protocols 1159.1. OpenFlow 1179.2. VXLAN 1239.3. NVGRE 1249.4. MEF Ethernet 1259.5. Carrier-Grade Ethernet 1269.6. TRILL (Transparent Interconnection of a Lot of Links) 1299.7. LISP (Locator/Identifier Separation Protocol) 1319.8. Conclusion 132Chapter 10. Mobile Cloud Networking, the Mobile Cloud and Mobility Control 13310.1. Mobile Cloud Networking 13310.2. Mobile Cloud 13710.3. Mobility control 13910.4. Mobility protocols 14310.4.1. Mobile IP or MIP 14410.4.2. Solutions for micromobility 14510.5. Multihoming 14610.6. Network-level multihoming 14810.6.1. HIP (Host Identity Protocol) 14910.6.2. SHIM6 (Level 3 Multihoming Shim Protocol for IPv6) 15010.6.3. mCoA (Multiple Care-of-Addresses) in Mobile IPv6 15110.7. Transport-level multihoming 15310.7.1. SCTP (Stream Control Transmission Protocol) 15310.7.2. CMT (Concurrent Multipath Transfer) 15710.7.3. MPTCP (Multipath TCP) 15910.8. Conclusion 160Chapter 11. Wi-Fi and 5G 16111.1. 3GPP and IEEE 16211.2. New-generation Wi-Fi 16311.2.1. Wi-Fi 5 (IEEE 802.11ac) 16411.2.2. IEEE 802.11ad 16611.2.3. IEEE 802.11af 16711.2.4. Halow (IEEE 802.11ah) 16811.2.5. Wi-Fi 6 (IEEE 802.11ax) and super WiGig (IEEE 802.11ay) 16911.3. Small cells 17011.3.1. Femtocells 17111.3.2. Hotspots 17411.3.3. Wi-Fi Passpoint 17511.3.4. Virtualization of Wi-Fi and HNB 17911.3.5. Backhaul networks 18211.4. Software radio and radio virtual machine 18411.5. 5G 18511.5.1. 5G radio 18911.5.2. The core network 19211.5.3. C-RAN 193Chapter 12. The Internet of Things 19712.1. Sensor networks 19812.2. RFID 20012.3. NFC (Near-Field Communication) 20412.4. NFC contactless payment 20612.5. HIP (Host Identity Protocol) 20712.6. Healthcare Internet 20712.7. Case study: the smart city 21012.8. Conclusion 213Chapter 13. Vehicular Networks 21513.1. 5G 21713.2. 5G standardization 22013.2.1. 5G vehicular networks 22013.2.2. Technological presentation of C-V2X 22213.3. VLC 22413.4. Conclusion 226Chapter 14. Tactile Internet 22714.1. Tactile internet applications 22714.2. Functionalities required for the tactile internet 22914.3. Technical specifications for 5G 23214.4. Tactile internet in Industry 4.0 23414.5. Conclusion on tactile internet 235Chapter 15. Security 23715.1. Secure element 23915.2. Secure elements-based solution 24215.2.1. Virtual secure elements 24215.2.2. The TEE (Trusted Execution Environment) 24415.2.3. TSM 24515.2.4. Solution without a TSM 24915.2.5. HCE 25015.2.6. Securing solutions 25015.3. The blockchain 25615.4. Conclusion 257Chapter 16. Concretization and Morphware Networks 25916.1. Accelerators 26016.2. A reconfigurable microprocessor 26116.3. Morphware networks 26616.4. Conclusion 268Conclusion 269References 271Index 273
Guy Pujolle is currently Professor at Sorbonne University in France. He has published widely in the area of computer systems modeling and performance, queuing theory, high-speed networks, intelligence in networking, wireless networks and Post-IP networks, including 19 influential texts and monographs in these areas.