ТОП просматриваемых книг сайта:
Software Networks. Guy Pujolle
Читать онлайн.Название Software Networks
Год выпуска 0
isbn 9781119694724
Автор произведения Guy Pujolle
Жанр Отраслевые издания
Издательство John Wiley & Sons Limited
6 Chapter 5Figure 5.1. MEC environment as defined by the ETSIFigure 5.2. eNodeB or gNodeB of an antenna of a network of mobiles. For a color ...Figure 5.3. eNodeB deporting in an MEC datacenterFigure 5.4. Example of video processing by the MEC datacenterFigure 5.5. MEC datacenter locationFigure 5.6. C-RANFigure 5.7. C-RAN with an antenna-level distribution. For a color version of the...Figure 5.8. PON architectureFigure 5.9. Interconnection of datacenters by the core network
7 Chapter 6Figure 6.1. Cloud architecture split into two levelsFigure 6.2. Fog server, here called skin serverFigure 6.3. A Fog datacenter to manage a hospitalFigure 6.4. Process of Industry 4.0. For a color version of the figure, see www....Figure 6.5. Architecture of an environment with controllersFigure 6.6. The main functions of a Fog controllerFigure 6.7. Proximity marketingFigure 6.8. Networks for the Internet of Things. For a color version of the figu...
8 Chapter 7Figure 7.1. A femto-datacenterFigure 7.2. Virtualized HNBFigure 7.3. Context of a network around a femto-datacenterFigure 7.4. A femto-datacenter environment to create virtual LANsFigure 7.5. Participatory Internet networkFigure 7.6. Mesh network and ad hoc network
9 Chapter 8Figure 8.1. Self-piloting system. For a color version of the figure, see www.ist...Figure 8.2. Operation of the blackboardFigure 8.3. Operation of a multi-agent systemFigure 8.4. Problem-solvingFigure 8.5. Architecture of active networksFigure 8.6. Definition of an autonomic networkFigure 8.7. The architecture of autonomic networksFigure 8.8. One-hop situated view. For a color version of the figure, see www.is...
10 Chapter 9Figure 9.1. SDN architectureFigure 9.2. OpenFlow protocolFigure 9.3. OpenFlow protocol in a networkFigure 9.4. Fields in the OpenFlow protocolFigure 9.5. The different ONF standards pertaining to the OpenFlow protocolFigure 9.6. Management of the flow table in OpenFlowFigure 9.7. A group table integrated between two elementary flow tablesFigure 9.8. VXLAN protocolFigure 9.9. VXLAN encapsulationFigure 9.10. NVGRE protocolFigure 9.11. The different versions of Carrier-Grade Ethernet. For a color versi...Figure 9.12. TRILL protocolFigure 9.13. LISP protocol
11 Chapter 10Figure 10.1. An architecture for Mobile Cloud NetworkingFigure 10.2. A local architecture for Mobile Cloud NetworkingFigure 10.3. A third mobile Cloud architectureFigure 10.4. A fourth architecture for mobile CloudFigure 10.5. Example of the mobile CloudFigure 10.6. Two mobile CloudsFigure 10.7. A large mobile CloudFigure 10.8. Properties of mobile device controllersFigure 10.9. Hardware and software solutions for a controllerFigure 10.10. Access authorization cases by a controllerFigure 10.11. Mobile IP for IPv4Figure 10.12. Mobile IP for IPv6Figure 10.13. HIP architectureFigure 10.14. Base exchange procedure for HIPFigure 10.15. HIP base exchange with DNSFigure 10.16. Example of matching in SHIM6Figure 10.17. Mobile IPv6Figure 10.18. Registration of several CoAs in Mobile IPv6Figure 10.19. SCTP architectureFigure 10.20. Structure of SCTP packetFigure 10.21. Heartbeat mechanismFigure 10.22. Architecture of LS-SCTP
12 Chapter 11Figure 11.1. The different generations of wireless networksFigure 11.2. The two major wireless solutions and their convergenceFigure 11.3. SDMAFigure 11.4. Small cells and backhaul networkFigure 11.5. Operation of a femtocellFigure 11.6. Access to the HNBFigure 11.7. A network of metrocellsFigure 11.8. The integration of 3G/4G/5G and Wi-Fi accessFigure 11.9. Virtualization of a Wi-Fi access pointFigure 11.10. Virtualization of 5G devices: (a) spatial same operating system; (...Figure 11.11. HNB virtualizationFigure 11.12. Virtualization of a mesh access networkFigure 11.13. A backhaul networkFigure 11.14. The different advances made in the field of software radioFigure 11.15. The different 5G access solutionsFigure 11.16. From 4G to 5GFigure 11.17. Key technological components of 5GFigure 11.18. Coexistence of three different shapes of waves linked to OFDMFigure 11.19. A massive MIMO systemFigure 11.20. Basic slicing of 5G core networkFigure 11.21. The fully centralized Cloud-RAN architecture. For a color version ...Figure 11.22. The partially distributed Cloud-RAN architecture. For a color vers...
13 Chapter 12Figure 12.1. A passive RFIDFigure 12.2. Active RFIDFigure 12.3. Structure of GEN1 Electronic Product CodeFigure 12.4. The structure of GEN2 Electronic Product CodeFigure 12.5. The environment of a mobile key (AEE: Application Execution Environ...Figure 12.6. A BAN (Body Area Network)Figure 12.7. Infrastructure of a smart city
14 Chapter 13Figure 13.1. Vehicle-to-Vehicle communication – V2V. For a color version of the ...Figure 13.2. V2V via 5GFigure 13.3. Communication through light between vehicles. For a color version o...Figure 13.4. The frame and an example of C-V2X sub-frames
15 Chapter 14Figure 14.1. Some 5G-specific applicationsFigure 14.2. Architecture of the tactile internet
16 Chapter 15Figure 15.1. A Cloud of securityFigure 15.2. Hardware architecture of the smartcardFigure 15.3. Authentication procedure using an EAP smartcardFigure 15.4. Virtualization of smartcardsFigure 15.5. A Cloud of secure elements. For a color version of this figure, www...Figure 15.6. The key for the InternetFigure 15.7. The different security solutionsFigure 15.8. Relationships between the different participants with the TSMFigure 15.9. The economic system of NFC and TSMFigure 15.10. The security domainsFigure 15.11. Solution without a TSMFigure 15.12. Securing by local secure elementsFigure 15.13. Securing using external secure elements before Android 4.4Figure 15.14. Securing using external secure elements with Android 4.4 and laterFigure 15.15. Securing by a Cloud of secure elementsFigure 15.16. Advantages of the external solutionFigure 15.17. Architecture of securing using external secure elementsFigure 15.18. Securing of virtual machinesFigure 15.19. Securing of an electronic paymentFigure 15.20. Operation of a blockchain
17 Chapter 16Figure 16.1. The process of concretizationFigure 16.2. A DSPFigure 16.3. Example of an FPGAFigure 16.4. An EDLP componentFigure 16.5. The different types of microprocessorsFigure 16.6. Reconfigurable element matrixFigure 16.7. Reconfigurable microprocessor using fine- and coarse-grained elemen...Figure 16.8. A hardware networkFigure 16.9. Software networks. For a color version of the figure, see www.iste....Figure 16.10. Morphware network. For a color version of the figure, see www.iste...
18 ConclusionFigure C.1. The fundamental elements of new generation networks (NGNs). For a co...
Guide
1 Cover
2 Table of Contents
Pages
1 v
2 iii
3 iv
4 xi
5 xii
6 xiii
7 xiv
8 xv