|刊登類別:
有類似物品要出售?

Software Networks : Virtualization, SDN, 5G and Security, Hardcover by Pujoll...

狀況:
很新
庫存 2 件
價格:
US $148.86
大約HK$ 1,162.31
運費:
免費 Economy Shipping. 查看詳情— 運送
所在地:Jessup, Maryland, 美國
送達日期:
估計於 7月5日, 五7月16日, 二之間送達 運送地點 43230
估計送達日期 — 會在新視窗或分頁中開啟考慮到賣家的處理時間、寄出地郵遞區碼、目的地郵遞區碼、接收包裹時間,並取決於所選的運送方式以及收到全部款項全部款項 — 會在新視窗或分頁中開啟的時間。送達時間會因時而異,尤其是節日。
退貨:
14 日退貨. 由買家支付退貨運費. 查看詳情- 更多退貨相關資訊
保障:
請參閱物品說明或聯絡賣家以取得詳細資料。閱覽全部詳情查看保障詳情
(不符合「eBay 買家保障方案」資格)

賣家資料

註冊為商業賣家
賣家必須承擔此刊登物品的所有責任。
eBay 物品編號:386833500386
上次更新時間: 2024-06-15 04:15:25查看所有版本查看所有版本

物品細節

物品狀況
很新: 狀況完好的書籍。封面發亮且沒有損壞,精裝本書籍含書皮。不存在缺頁或內頁受損,無褶皺或破損,同時也沒有對文字標注/標記,或在留白處書寫內容。內封面上標記極少。書籍的磨損和破損程度也很低。 查看所有物品狀況定義會在新視窗或分頁中開啟
Book Title
Software Networks : Virtualization, SDN, 5G and Security
ISBN
9781848216945
Subject Area
Computers, Technology & Engineering
Publication Name
Software Networks : Virtualization, Sdn, 5 g and Security
Item Length
9.5 in
Publisher
Wiley & Sons, Incorporated, John
Subject
Networking / General, Telecommunications
Publication Year
2015
Type
Textbook
Format
Hardcover
Language
English
Item Height
0.8 in
Author
Guy Pujolle
Item Width
6.4 in
Item Weight
19.4 Oz
Number of Pages
262 Pages

關於產品

Product Information

The goal of this book is to describe new concepts for Internet next generation. This architecture is based on virtual networking using Cloud and datacenters facilities. Main problems concern 1) the placement of virtual resources for opening a new network on the fly, and 2) the urbanisation of virtual resource implemented on physical network equipment. This architecture deals with mechanisms capable of controlling automatically the placement of all virtual resources within the physical network. In this book, we describe how to create and delete virtual networks on the fly. Indeed, the system is able to create any new network with any kind of resource (e.g., virtual switch, virtual routers, virtual LSRs, virtual optical path, virtual firewall, virtual SIP-based servers, virtual devices, virtual servers, virtual access points, and so on). We will show how this architecture is compatible with new advances in SDN (Software Defined Networking), new high-speed transport protocol like TRILL (Transparent Interconnection of Lots of Links) and LISP (Locator/Identifier Separation Protocol), NGN, IMS, Wi-Fi new generation, and 4G/5G networks. Finally, we introduce the Cloud of security and the virtualisation of secure elements (smartcard) that should definitely transform how to secure the Internet.

Product Identifiers

Publisher
Wiley & Sons, Incorporated, John
ISBN-10
1848216947
ISBN-13
9781848216945
eBay Product ID (ePID)
204230704

Product Key Features

Author
Guy Pujolle
Publication Name
Software Networks : Virtualization, Sdn, 5 g and Security
Format
Hardcover
Language
English
Subject
Networking / General, Telecommunications
Publication Year
2015
Type
Textbook
Subject Area
Computers, Technology & Engineering
Number of Pages
262 Pages

Dimensions

Item Length
9.5 in
Item Height
0.8 in
Item Width
6.4 in
Item Weight
19.4 Oz

Additional Product Features

LCCN
2015-942608
Intended Audience
Scholarly & Professional
Lc Classification Number
Mlcm 2018/45862 (T)
Table of Content
INTRODUCTION ix CHAPTER 1. VIRTUALIZATION 1 1.1. Software networks 5 1.2. Hypervisors 7 1.3. Virtual devices 11 1.4. Conclusion 12 CHAPTER 2. SDN (SOFTWARE-DEFINED NETWORKING) 15 2.1.The objective 16 2.2. The ONF architecture 19 2.3. NFV (Network Functions Virtualization) 25 2.4. OPNFV 27 2.5. Southbound interface 28 2.6. The controller 29 2.7. Northbound interface 31 2.8. Application layer 32 2.9. Urbanization 33 2.10. The NSX architecture 36 2.11. CISCO ACI (Application Centric Infrastructure) 40 2.12. OpenContrail and Juniper 42 2.13. Brocade 43 2.14. Alcatel Lucent''s SDN architecture 44 2.15. Conclusion 45 CHAPTER 3. SMART EDGES 49 3.1. Placement of the controller 49 3.2. Virtual access points 55 3.3. Software LANs 58 3.4. Automation of the implementation of software networks 60 3.5. Intelligence in networks 61 3.6. Management of a complex environment 62 3.7. Multi-agent systems 65 3.8. Reactive agent systems 70 3.9. Active networks 72 3.10. Programmable networks 74 3.11. Autonomous networks 74 3.12. Autonomic networks 75 3.13. Situated view 77 3.14. Conclusion 79 CHAPTER 4. NEW-GENERATION PROTOCOLS 81 4.1. OpenFlow 83 4.2. VXLAN 90 4.3. NVGRE (Network Virtualization using Generic Routing Encapsulation) 91 4.4. MEF Ethernet 92 4.5. Carrier-Grade Ethernet 93 4.6. TRILL (Transparent Interconnection of a Lot of Links) 97 4.7. LISP (Locator/Identifier Separation Protocols) 99 4.8. Conclusion 100 CHAPTER 5. MOBILE CLOUD NETWORKING AND MOBILITY CONTROL 103 5.1. Mobile Cloud Networking 103 5.2. Mobile Clouds 108 5.3. Mobility control 110 5.4. Mobility protocols 115 5.5. Mobility control 116 5.5.1. IP Mobile 116 5.5.2. Solutions for micromobility 117 5.6. Multihoming 119 5.7. Network-level multihoming 121 5.7.1. HIP (Host Identity Protocol) 122 5.7.2. SHIM6 (Level 3 Multihoming Shim Protocol for IPv6) 124 5.7.3. mCoA (Multiple Care-of-Addresses) in Mobile IPv6 125 5.8. Transport-level multihoming 127 5.8.1. SCTP (Stream Control Transmission Protocol) 127 5.8.2. CMT (Concurrent Multipath Transfer) 132 5.8.3. MPTCP (Multipath TCP) 135 5.9. Conclusion 135 CHAPTER 6. WI-FI AND 5G 137 6.1. 3GPP and IEEE 138 6.2. New-generation Wi-Fi 139 6.3. IEEE 802.11ac 140 6.4. IEEE 802.11ad 142 6.5. IEEE 802.11af 143 6.6. IEEE 802.11ah 145 6.7. Small cells 147 6.8. Femtocells 148 6.9. Hotspots 151 6.10. Microcells 153 6.11. Wi-Fi Passpoint 153 6.12. Backhaul networks 158 6.13. Software radio and radio virtual machine 160 6.14. 5G 162 6.15. C-RAN 168 6.16. The Internet of Things 171 6.17. Sensor networks 172 6.18. RFID 174 6.19. EPCglobal 177 6.20. Security of RFID 178 6.21. Mifare 179 6.22. NFC (Near-Field Comunication) 180 6.23. Mobile keys 181 6.24. NFC contactless payment 182 6.25. HIP (Host Identity Protocol) 184 6.26. The Internet of Things in the medical domain 184 6.27. The Internet of Things in the home 186 6.28. Conclusion 187 CHAPTER 7. SECURITY 189 7.1. Secure element 191 7.2. Virtual secure elements 195 7.3. The TEE (Trusted Execution Environment) 197 7.4. TSM 199 7.5. Solution without a TSM 203 7.6. HCE 204 7.7. Securing solutions 205 7.8. Conclusion 212 CHAPTER 8. CONCRETIZATION AND MORPHWARE NETWORKS 213 8.1. Accelerators 214 8.2. A reconfigurable microprocessor 215 8.3. Morphware networks 220 8.4. Conclusion 223 CONCLUSION 225 BIBLIOGRAPHY 229 INDEX 231
Copyright Date
2014
Dewey Decimal
004.6782
Dewey Edition
23
Illustrated
Yes

賣家提供的物品說明

Great Book Prices Store

Great Book Prices Store

96.8% 正面信用評價
已賣出 120.56 萬 件物品
瀏覽商店聯絡
通常在 24 小時內回覆

詳盡賣家評級

過去 12 個月的平均評級

說明準確
4.9
運費合理
5.0
運送速度
4.9
溝通
4.8

賣家信用評價 (344,236)

a***a (79)- 買家留下的信用評價。
過去 1 個月
購買已獲認證
Thank you for a great item at a good price.
9***9 (431)- 買家留下的信用評價。
過去 1 個月
購買已獲認證
Excellent seller. The book was accurately described. I will keep this seller on my good list.
n***h (1397)- 買家留下的信用評價。
過去 1 個月
購買已獲認證
Great deal and great price. Seller rated A+. Item arrived as described. Thank uou