Schweitzer Fachinformationen
Wenn es um professionelles Wissen geht, ist Schweitzer Fachinformationen wegweisend. Kunden aus Recht und Beratung sowie Unternehmen, öffentliche Verwaltungen und Bibliotheken erhalten komplette Lösungen zum Beschaffen, Verwalten und Nutzen von digitalen und gedruckten Medien.
Introduction xi
Chapter 1. Virtualization 1
1.1. Software networks 4
1.2. Hypervisors and containers 6
1.3. Kubernetes 8
1.4. Software networks 9
1.5. Virtual devices 11
1.6. Conclusion 12
Chapter 2. SDN (Software-Defined Networking) 13
2.1. The objective 14
2.2. The ONF architecture 16
2.3. NFV (Network Functions Virtualization) 21
2.4. OPNFV 23
2.5. Southbound interface 23
2.6. The controller 25
2.7. Northbound interface 26
2.8. Application layer 27
2.9. Urbanization 28
2.10. Conclusion 30
Chapter 3. Fabric, SD-WAN, vCPE, vRAN, vEPC 33
3.1. Fabrics control 33
3.2. NSX and VMware company 35
3.2.1. CISCO ACI (Application Centric Infrastructure) 39
3.2.2. OpenContrail and Juniper 40
3.2.3. Brocade 42
3.2.4. Nokia's SDN architecture 43
3.3. SD-WAN 43
3.4. vCPE 47
3.5. vRAN 48
3.6. vEPC 49
Chapter 4. Open Source Software for Networks 51
4.1. Open source software 51
4.2. Open Compute Project (OCP) 53
4.3. OPNFV 54
4.4. ONAP (Open Network Automation Protocol) 61
4.5. Open vSwitch 64
4.6. OpenDaylight platform 65
4.7. FD.io 66
4.8. PNDA 67
4.9. SNAS 68
Chapter 5. MEC 69
5.1. eNodeB and gNodeB virtualization 70
5.2. C-RAN 74
Chapter 6. Fog Networking 79
6.1. Fog architectures 79
6.2. Fog controllers 82
6.3. Fog and the Internet of Things 86
6.4. Conclusion on the Fog solution 87
Chapter 7. Skin Networking 89
7.1. Skin networking architecture 89
7.2. Virtual access points 90
7.3. Software LANs 92
7.4. Participatory Internet 94
7.5. Conclusion 96
Chapter 8. Software Network Automation 97
8.1. Automation of the implementation of software networks 97
8.2. Management of a complex environment 99
8.3. Multi-agent systems 101
8.4. Reactive agent systems 105
8.5. Active, programmable and autonomous networks 107
8.6. Autonomic networks 109
8.7. Conclusion 113
Chapter 9. New-generation Protocols 115
9.1. OpenFlow 117
9.2. VXLAN 123
9.3. NVGRE 124
9.4. MEF Ethernet 125
9.5. Carrier-Grade Ethernet 126
9.6. TRILL (Transparent Interconnection of a Lot of Links) 129
9.7. LISP (Locator/Identifier Separation Protocol) 131
9.8. Conclusion 132
Chapter 10. Mobile Cloud Networking, the Mobile Cloud and Mobility Control 133
10.1. Mobile Cloud Networking 133
10.2. Mobile Cloud 137
10.3. Mobility control 139
10.4. Mobility protocols 143
10.4.1. Mobile IP or MIP 144
10.4.2. Solutions for micromobility 145
10.5. Multihoming 146
10.6. Network-level multihoming 148
10.6.1. HIP (Host Identity Protocol) 149
10.6.2. SHIM6 (Level 3 Multihoming Shim Protocol for IPv6) 150
10.6.3. mCoA (Multiple Care-of-Addresses) in Mobile IPv6 151
10.7. Transport-level multihoming 153
10.7.1. SCTP (Stream Control Transmission Protocol) 153
10.7.2. CMT (Concurrent Multipath Transfer) 157
10.7.3. MPTCP (Multipath TCP) 159
10.8. Conclusion 160
Chapter 11. Wi-Fi and 5G 161
11.1. 3GPP and IEEE 162
11.2. New-generation Wi-Fi 163
11.2.1. Wi-Fi 5 (IEEE 802.11ac) 164
11.2.2. IEEE 802.11ad 166
11.2.3. IEEE 802.11af 167
11.2.4. Halow (IEEE 802.11ah) 168
11.2.5. Wi-Fi 6 (IEEE 802.11ax) and super WiGig (IEEE 802.11ay) 169
11.3. Small cells 170
11.3.1. Femtocells 171
11.3.2. Hotspots 174
11.3.3. Wi-Fi Passpoint 175
11.3.4. Virtualization of Wi-Fi and HNB 179
11.3.5. Backhaul networks 182
11.4. Software radio and radio virtual machine 184
11.5. 5G 185
11.5.1. 5G radio 189
11.5.2. The core network 192
11.5.3. C-RAN 193
Chapter 12. The Internet of Things 197
12.1. Sensor networks 198
12.2. RFID 200
12.3. NFC (Near-Field Communication) 204
12.4. NFC contactless payment 206
12.5. HIP (Host Identity Protocol) 207
12.6. Healthcare Internet 207
12.7. Case study: the smart city 210
12.8. Conclusion 213
Chapter 13. Vehicular Networks 215
13.1. 5G 217
13.2. 5G standardization 220
13.2.1. 5G vehicular networks 220
13.2.2. Technological presentation of C-V2X 222
13.3. VLC 224
13.4. Conclusion 226
Chapter 14. Tactile Internet 227
14.1. Tactile internet applications 227
14.2. Functionalities required for the tactile internet 229
14.3. Technical specifications for 5G 232
14.4. Tactile internet in Industry 4.0 234
14.5. Conclusion on tactile internet 235
Chapter 15. Security 237
15.1. Secure element 239
15.2. Secure elements-based solution 242
15.2.1. Virtual secure elements 242
15.2.2. The TEE (Trusted Execution Environment) 244
15.2.3. TSM 245
15.2.4. Solution without a TSM 249
15.2.5. HCE 250
15.2.6. Securing solutions 250
15.3. The blockchain 256
15.4. Conclusion 257
Chapter 16. Concretization and Morphware Networks 259
16.1. Accelerators 260
16.2. A reconfigurable microprocessor 261
16.3. Morphware networks 266
16.4. Conclusion 268
Conclusion 269
References 271
Index 273
Currently, networking technology is experiencing its third major wave of revolution. The first was the move from circuit-switched mode to packet-switched mode, the second from hardwired to wireless mode, and finally the third revolution, which we will examine in this book, is the move from hardware to software mode. Let us briefly examine these three revolutions, before focusing more particularly on the third, which will be studied in detail in this book.
A circuit is a collection of hardware and software elements, allocated to two users - one at each end of the circuit. The resources of that circuit belong exclusively to those two users; nobody else can use them. In particular, this mode has been used in the context of the public switched telephone network (PSTN). Indeed, telephone voice communication is a continuous application for which circuits are very appropriate.
A major change in traffic patterns brought about the first great revolution in the world of networks, pertaining to asynchronous and non-uniform applications. The data transported for these applications make only very incomplete use of circuits, but are appropriate for packet-switched mode. When a message needs to be sent from a transmitter to a receiver, the data for transmission are grouped together in one or more packets, depending on the total size of the message. For a short message, a single packet may be sufficient; however, for a long message, several packets are needed. The packets then pass through intermediate transfer nodes between the transmitter and the receiver, and ultimately make their way to the endpoint. The resources needed to handle the packets include memories, links between the nodes and sender/receiver. These resources are shared between all users. Packet-switched mode requires a physical architecture and protocols - i.e. rules - to achieve end-to-end communication. Many different architectural arrangements have been proposed, using protocol layers and associated algorithms. In the early days, each hardware manufacturer had their own architecture (e.g. SNA, DNA, DecNet, etc.). Then, the OSI (Open System Interconnection) model was introduced in an attempt to make all these different architectures mutually compatible. The failure of compatibility between hardware manufacturers, even with a common model, led to the re-adoption of one of the very first architectures introduced for packet-switched mode: TCP/IP (Transport Control Protocol/Internet Protocol).
The second revolution was the switch from hardwired mode to wireless mode. Figure I.1 shows that, by 2020, terminal connection should be essentially wireless, established using Wi-Fi technology, including 3G/4G/5G technology. In fact, increasingly, the two techniques are used together, as they are becoming mutually complimentary rather than representing competition for one another. In addition, when we look at the curve shown in Figure I.2, plotting worldwide user demand against the growth of what 3G/4G/5G technology is capable of delivering, we see that the gap is so significant that only Wi-Fi technology is capable of handling the demand very strongly until 2020, and then less and less due to the massive opening of new frequencies, especially those higher than 20 GHz. We will come back to wireless architectures, because the third revolution also has a significant impact on this transition towards radio-based technologies, especially 5G technology.
Figure I.1. Terminal connection by 2020
Figure I.2. The gap between technological progress and user demand. For a color version of the figure, see www.iste.co.uk/pujolle/software2.zip
The third revolution, which is our focus in this book, pertains to the move from hardware-based mode to software-based mode. This transition is taking place because of virtualization, whereby physical networking equipment is replaced by software fulfilling the same function.
Let us take a look at the various elements which are creating a new generation of networks. To begin with, we can cite the Cloud. The Cloud is a set of resources which, instead of being held at the premises of a particular company or individual, are hosted on the Internet. The resources are de-localized and brought together in resource centers, known as datacenters.
The reasons for the Cloud's creation stem from the low degree of use of server resources worldwide: only 10-20% of servers' capacities are actually being used. This low value derived from the fact that servers are hardly used at all at night-time, and see relatively little use outside of peak hours, which represent no more than 4-5 hours each day. In addition, the relatively low cost of hardware meant that, generally, servers were greatly oversized. Another factor that needs to be taken into account is the rising cost of personnel to manage and control the resources. In order to optimize the cost of both resources and engineers, those resources need to be shared. The purpose of Clouds is to facilitate such sharing in an efficient manner.
Figure I.3 shows the growth of the public Cloud services market. Certainly, that growth is impressive, but in the final analysis, it is relatively low in comparison to what it could have been if there were no problems of security. Indeed, as the security of the data uploaded to such systems is rather lax, there has been a massive increase in private Clouds, taking the place of public Cloud services. In Chapter 11, we will examine the advances made in terms of security, with the advent of secure Clouds.
Figure I.3. Public Cloud services market and their annual growth rate
Virtualization is also a key factor, as indicated at the start of this chapter. The increase in the number of virtual machines is undeniable, and in 2019, three quarters of the servers available throughout the world are virtual machines. Physical machines are able to host increasing numbers of virtual machines. This trend is shown in Figure I.4. In 2019, each physical server hosts approximately 10 virtual machines.
The use of Cloud services has meant a significant increase in the data rates being sent over the networks. Indeed, processing is now done in datacenters, and both the data and the signaling must be sent to these datacenters and then returned to the user after processing. We can see this increase in data rate requirement by examining the market of Ethernet ports for datacenters. Figure I.5 plots shipments of 1 Gbps Ethernet ports against those of 10, 40 and 100 Gbps ports. As we can see, 1 Gbps ports, which are already fairly fast, are being replaced by ports that are ever more powerful.
Figure I.4. Number of virtual machines per physical server
Figure I.5. Ethernet port shipment
The world of the Cloud is, in fact, rather diverse, if we look at the number of functions which it can fulfill. There are numerous types of Clouds available, but three categories, which are indicated in Figure I.6, are sufficient to clearly differentiate them. The category that offers the greatest potential is the SaaS (Software as a Service) cloud. SaaS makes all services available to the user - processing, storage and networking. With this solution, a company asks its Cloud provider to supply all necessary applications. Indeed, the company subcontracts its IT system to the Cloud provider. With the second solution - PaaS (Platform as a Service) - the company remains responsible for the applications. The Cloud provider offers a complete platform, leaving only the management of the applications to the company. Finally, the third solution - IaaS (Infrastructure as a Service) - leaves a great deal more initiative in the hands of the client company. The provider still offers the processing, storage and networking, but the client is still responsible for the applications and the environments necessary for those applications, such as the operating systems and databases.
Figure I.6. The three main types of Cloud
More specifically, we can define the three Cloud architectures as follows:
Figure I.7 shows the functions of the different types of Cloud in comparison with the classical model in operation...
Dateiformat: ePUBKopierschutz: Adobe-DRM (Digital Rights Management)
Systemvoraussetzungen:
Das Dateiformat ePUB ist sehr gut für Romane und Sachbücher geeignet – also für „fließenden” Text ohne komplexes Layout. Bei E-Readern oder Smartphones passt sich der Zeilen- und Seitenumbruch automatisch den kleinen Displays an. Mit Adobe-DRM wird hier ein „harter” Kopierschutz verwendet. Wenn die notwendigen Voraussetzungen nicht vorliegen, können Sie das E-Book leider nicht öffnen. Daher müssen Sie bereits vor dem Download Ihre Lese-Hardware vorbereiten.Bitte beachten Sie: Wir empfehlen Ihnen unbedingt nach Installation der Lese-Software diese mit Ihrer persönlichen Adobe-ID zu autorisieren!
Weitere Informationen finden Sie in unserer E-Book Hilfe.