000 03263cam a2200433Ii 4500
999 _c200451999
_d70211
001 200451999
003 TR-AnTOB
005 20230915001309.0
006 m o d
007 cr cnu---unuuu
008 200122s2020 enk ob 001 0 eng d
020 _a9781119694748
_q(electronic bk. : oBook)
020 _a1119694744
_q(electronic bk. : oBook)
020 _z9781786304582
035 _a(OCoLC)1137260425
040 _aDG1
_beng
_erda
_epn
_cDG1
_dOCLCF
_dTR-AnTOB
041 0 _aeng
050 4 _aTK5105.5
_b.P795 2020
090 _aTK5105.5
_b.P795 2020EBK
100 1 _aPujolle, G.,
_d1949-
_0http://id.loc.gov/authorities/names/n81085155
_eauthor
245 1 0 _aSoftware networks :
_bvirtualization, SDN, 5G and security /
_cGuy Pujolle
250 _aRevised and updated 2nd edition
264 1 _aLondon :
_bISTE Ltd. ;
_aHoboken, NJ :
_bWiley,
_c2020.
300 _a1 online resource :
_billustrations
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
340 _2rdacc
_0http://rdaregistry.info/termList/RDAColourContent/1003
490 0 _aNetworks & telecommunication series, advanced networks set ;
_vvolume 1
504 _aBIBINDX
520 _aSoftware Networks describe new concepts for the Internet's next generation. This architecture is based on virtual networking using Cloud and datacenter facilities. The main problems to be dealt with are the placement of virtual resources for opening a new network on the fly, and the urbanization of virtual resources implemented on physical network equipment. The digital architecture also deals with mechanisms capable of automatically controlling the placement of all virtual resources within the physical network. This book describes how to create and delete virtual networks on the fly. Indeed, the system is able to create any new network with any kind of virtual resource (e.g. switches, routers, LSRs, optical paths, firewalls, SIP-based servers, devices, servers, access points, etc.). Software Networks shows how this architecture is compatible with new advances in SDN (Software Defined Networking), new high-speed transport protocols such as TRILL (Transparent Interconnection of Lots of Links) and LISP (Locator/Identifier Separation Protocol), NGN, IMS, new generation Wi-Fi, and 4G/5G networks. Finally, the author introduces Clouds of security and the virtualization of secure elements (smartcards) that could certainly transform how to secure the Internet. For this second edition, the author addresses in five new chapters the importance of open source software for networks, mobile edge computing, fog networking, tactile internet - a network environment allowing remote access, and security - the use of Cloud of security, secure elements and the emergence of the blockchain
650 0 _aComputer networks
_0http://id.loc.gov/authorities/subjects/sh85029513
_9968
650 0 _aCloud computing
_0http://id.loc.gov/authorities/subjects/sh2008004883
_980042
655 0 _aElectronic books
_92032
856 4 0 _3Wiley Online Library
_zConnect to resource
_uhttps://onlinelibrary.wiley.com/doi/book/10.1002/9781119694748
942 _2lcc
_cEBK