Secure roaming in 802.11 networks [[electronic resource] /] / by Paul Goransson and Raymond Greenlaw |
Autore | Goransson Paul |
Edizione | [1st edition] |
Pubbl/distr/stampa | Amsterdam ; ; Boston, : Newnes/Elsevier, c2007 |
Descrizione fisica | 1 online resource (369 p.) |
Disciplina | 621.384 |
Altri autori (Persone) | GreenlawRaymond |
Collana | Communications engineering series |
Soggetto topico |
Wireless LANs - Security measures
IEEE 802.11 (Standard) |
Soggetto genere / forma | Electronic books. |
ISBN |
1-281-12031-6
9786611120313 0-08-054894-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Secure Roaming In 802.11 Networks; Copyright Page; Table of Contents; Preface; Acknowledgments; About the Authors; Chapter 1. Introduction; 1.1 Introduction; 1.2 Basic Networking Terminology and Conventions; 1.3 Setting the Scene; 1.4 Different Notions of Roaming; 1.5 Big Cells, Little Cells; 1.6 Authentication, Authorization, Accounting, and Roaming; 1.7 How Fast Do We Roam on the Range?; 1.8 Taxonomy for Roaming; 1.9 Organization of the Book; Chapter 2. Cellular Telephony: Wireless Roaming Pioneers; 2.1 Introduction; 2.2 The Future of Computing; 2.3 Basic Concepts
2.4 Early History of Radio Telephony 2.5 The Digital Revolution; 2.6 Soft Versus Hard Handoffs in Various Cellular Technologies; 2.7 The Quest for Convergence; 2.8 Summary; Chapter 3. Roaming in 802.11 WLANs: General Principles; 3.1 Introduction; 3.2 Primer on the 802.11 Standard; 3.3 Introduction to 802.11 Roaming; 3.4 Local Roaming; 3.5 Global Roaming; 3.6 Mobile IP and Its Role in 802.11 Roaming; 3.7 Those Pesky Laws of Physics; Chapter 4. Dynamics of 802.11 Task Groups; 4.1 Introduction; 4.2 Evolution of an IEEE Standard; 4.3 Battle for Speed, Cost, and Market Dominance 4.4 The 802.11 Standard's Physical Layer 4.5 Fast Secure Roaming Task Groups; 4.6 802.11i Security; 4.7 802.11e Quality of Service; 4.8 802.11k Radio Resource Measurement Enhancements; 4.9 802.11r Roaming; 4.10 Other 802.11 Subgroups; 4.11 Wi-Fi Alliance Versus IEEE 802.11; Chapter 5. Practical Aspects of Basic 802.11 Roaming; 5.1 Introduction; 5.2 The Driver and Client in an 802.11 Station; 5.3 Detailed Analyses of Real-Life Roams; 5.4 Dissection of a Global Roam; 5.5 Dissection of a Local Roam; 5.6 Access-Point Placement Methodologies; Chapter 6. Fundamentals of User Authentication in 802.11 6.1 Introduction 6.2 802.1X Port-Level Authentication; 6.3 The AAA Server; 6.4 The Extensible Authentication Protocol; 6.5 Flexible and Strong Authentication in 802.11; 6.6 Other 802.11 Authentication Methodologies; 6.7 Network Access Control; 6.8 Summary; Chapter 7. Roaming Securely in 802.11; 7.1 Introduction; 7.2 The 802.11 Security Staircase; 7.3 Preauthentication in 802.11i; 7.4 Detailed Analysis of Real-Life Secured Roams; 7.5 Dissection of a WPA-PSK Protected Roam; 7.6 Dissection of a WPA2 Enterprise Roam; 7.7 Dissection of an 802.11i Preauthentication; 7.8 Summary Chapter 8. Optimizing Beyond the 802.11 Standard 8.1 Introduction; 8.2 Voice over Wireless IP Roaming; 8.3 Opportunistic Key Caching; 8.4 Centralized Wireless Switch Architectures; Chapter 9. The 802.11 Workgroups' Solutions for Fast Secure Roaming; 9.1 Introduction; 9.2 Overview of the 802.11r Standard; 9.3 Detailed Concepts and Terminology of 802.11r; 9.4 Protocol Exchanges in 802.11r; 9.5 The 802.11k Standard Applied to Roaming; 9.6 Concluding Remarks; Chapter 10. Roaming between 802.11 and Other Wireless Technologies; 10.1 Introduction; 10.2 Ideal Roaming Experience 10.3 IEEE 802.16: WiMAX |
Record Nr. | UNINA-9910457955203321 |
Goransson Paul | ||
Amsterdam ; ; Boston, : Newnes/Elsevier, c2007 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Secure roaming in 802.11 networks [[electronic resource] /] / by Paul Goransson and Raymond Greenlaw |
Autore | Goransson Paul |
Edizione | [1st edition] |
Pubbl/distr/stampa | Amsterdam ; ; Boston, : Newnes/Elsevier, c2007 |
Descrizione fisica | 1 online resource (369 p.) |
Disciplina | 621.384 |
Altri autori (Persone) | GreenlawRaymond |
Collana | Communications engineering series |
Soggetto topico |
Wireless LANs - Security measures
IEEE 802.11 (Standard) |
ISBN |
1-281-12031-6
9786611120313 0-08-054894-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Secure Roaming In 802.11 Networks; Copyright Page; Table of Contents; Preface; Acknowledgments; About the Authors; Chapter 1. Introduction; 1.1 Introduction; 1.2 Basic Networking Terminology and Conventions; 1.3 Setting the Scene; 1.4 Different Notions of Roaming; 1.5 Big Cells, Little Cells; 1.6 Authentication, Authorization, Accounting, and Roaming; 1.7 How Fast Do We Roam on the Range?; 1.8 Taxonomy for Roaming; 1.9 Organization of the Book; Chapter 2. Cellular Telephony: Wireless Roaming Pioneers; 2.1 Introduction; 2.2 The Future of Computing; 2.3 Basic Concepts
2.4 Early History of Radio Telephony 2.5 The Digital Revolution; 2.6 Soft Versus Hard Handoffs in Various Cellular Technologies; 2.7 The Quest for Convergence; 2.8 Summary; Chapter 3. Roaming in 802.11 WLANs: General Principles; 3.1 Introduction; 3.2 Primer on the 802.11 Standard; 3.3 Introduction to 802.11 Roaming; 3.4 Local Roaming; 3.5 Global Roaming; 3.6 Mobile IP and Its Role in 802.11 Roaming; 3.7 Those Pesky Laws of Physics; Chapter 4. Dynamics of 802.11 Task Groups; 4.1 Introduction; 4.2 Evolution of an IEEE Standard; 4.3 Battle for Speed, Cost, and Market Dominance 4.4 The 802.11 Standard's Physical Layer 4.5 Fast Secure Roaming Task Groups; 4.6 802.11i Security; 4.7 802.11e Quality of Service; 4.8 802.11k Radio Resource Measurement Enhancements; 4.9 802.11r Roaming; 4.10 Other 802.11 Subgroups; 4.11 Wi-Fi Alliance Versus IEEE 802.11; Chapter 5. Practical Aspects of Basic 802.11 Roaming; 5.1 Introduction; 5.2 The Driver and Client in an 802.11 Station; 5.3 Detailed Analyses of Real-Life Roams; 5.4 Dissection of a Global Roam; 5.5 Dissection of a Local Roam; 5.6 Access-Point Placement Methodologies; Chapter 6. Fundamentals of User Authentication in 802.11 6.1 Introduction 6.2 802.1X Port-Level Authentication; 6.3 The AAA Server; 6.4 The Extensible Authentication Protocol; 6.5 Flexible and Strong Authentication in 802.11; 6.6 Other 802.11 Authentication Methodologies; 6.7 Network Access Control; 6.8 Summary; Chapter 7. Roaming Securely in 802.11; 7.1 Introduction; 7.2 The 802.11 Security Staircase; 7.3 Preauthentication in 802.11i; 7.4 Detailed Analysis of Real-Life Secured Roams; 7.5 Dissection of a WPA-PSK Protected Roam; 7.6 Dissection of a WPA2 Enterprise Roam; 7.7 Dissection of an 802.11i Preauthentication; 7.8 Summary Chapter 8. Optimizing Beyond the 802.11 Standard 8.1 Introduction; 8.2 Voice over Wireless IP Roaming; 8.3 Opportunistic Key Caching; 8.4 Centralized Wireless Switch Architectures; Chapter 9. The 802.11 Workgroups' Solutions for Fast Secure Roaming; 9.1 Introduction; 9.2 Overview of the 802.11r Standard; 9.3 Detailed Concepts and Terminology of 802.11r; 9.4 Protocol Exchanges in 802.11r; 9.5 The 802.11k Standard Applied to Roaming; 9.6 Concluding Remarks; Chapter 10. Roaming between 802.11 and Other Wireless Technologies; 10.1 Introduction; 10.2 Ideal Roaming Experience 10.3 IEEE 802.16: WiMAX |
Record Nr. | UNINA-9910784349803321 |
Goransson Paul | ||
Amsterdam ; ; Boston, : Newnes/Elsevier, c2007 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Secure roaming in 802.11 networks / / by Paul Goransson and Raymond Greenlaw |
Autore | Goransson Paul |
Edizione | [1st edition] |
Pubbl/distr/stampa | Amsterdam ; ; Boston, : Newnes/Elsevier, c2007 |
Descrizione fisica | 1 online resource (369 p.) |
Disciplina | 621.384 |
Altri autori (Persone) | GreenlawRaymond |
Collana | Communications engineering series |
Soggetto topico |
Wireless LANs - Security measures
IEEE 802.11 (Standard) |
ISBN |
1-281-12031-6
9786611120313 0-08-054894-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Secure Roaming In 802.11 Networks; Copyright Page; Table of Contents; Preface; Acknowledgments; About the Authors; Chapter 1. Introduction; 1.1 Introduction; 1.2 Basic Networking Terminology and Conventions; 1.3 Setting the Scene; 1.4 Different Notions of Roaming; 1.5 Big Cells, Little Cells; 1.6 Authentication, Authorization, Accounting, and Roaming; 1.7 How Fast Do We Roam on the Range?; 1.8 Taxonomy for Roaming; 1.9 Organization of the Book; Chapter 2. Cellular Telephony: Wireless Roaming Pioneers; 2.1 Introduction; 2.2 The Future of Computing; 2.3 Basic Concepts
2.4 Early History of Radio Telephony 2.5 The Digital Revolution; 2.6 Soft Versus Hard Handoffs in Various Cellular Technologies; 2.7 The Quest for Convergence; 2.8 Summary; Chapter 3. Roaming in 802.11 WLANs: General Principles; 3.1 Introduction; 3.2 Primer on the 802.11 Standard; 3.3 Introduction to 802.11 Roaming; 3.4 Local Roaming; 3.5 Global Roaming; 3.6 Mobile IP and Its Role in 802.11 Roaming; 3.7 Those Pesky Laws of Physics; Chapter 4. Dynamics of 802.11 Task Groups; 4.1 Introduction; 4.2 Evolution of an IEEE Standard; 4.3 Battle for Speed, Cost, and Market Dominance 4.4 The 802.11 Standard's Physical Layer 4.5 Fast Secure Roaming Task Groups; 4.6 802.11i Security; 4.7 802.11e Quality of Service; 4.8 802.11k Radio Resource Measurement Enhancements; 4.9 802.11r Roaming; 4.10 Other 802.11 Subgroups; 4.11 Wi-Fi Alliance Versus IEEE 802.11; Chapter 5. Practical Aspects of Basic 802.11 Roaming; 5.1 Introduction; 5.2 The Driver and Client in an 802.11 Station; 5.3 Detailed Analyses of Real-Life Roams; 5.4 Dissection of a Global Roam; 5.5 Dissection of a Local Roam; 5.6 Access-Point Placement Methodologies; Chapter 6. Fundamentals of User Authentication in 802.11 6.1 Introduction 6.2 802.1X Port-Level Authentication; 6.3 The AAA Server; 6.4 The Extensible Authentication Protocol; 6.5 Flexible and Strong Authentication in 802.11; 6.6 Other 802.11 Authentication Methodologies; 6.7 Network Access Control; 6.8 Summary; Chapter 7. Roaming Securely in 802.11; 7.1 Introduction; 7.2 The 802.11 Security Staircase; 7.3 Preauthentication in 802.11i; 7.4 Detailed Analysis of Real-Life Secured Roams; 7.5 Dissection of a WPA-PSK Protected Roam; 7.6 Dissection of a WPA2 Enterprise Roam; 7.7 Dissection of an 802.11i Preauthentication; 7.8 Summary Chapter 8. Optimizing Beyond the 802.11 Standard 8.1 Introduction; 8.2 Voice over Wireless IP Roaming; 8.3 Opportunistic Key Caching; 8.4 Centralized Wireless Switch Architectures; Chapter 9. The 802.11 Workgroups' Solutions for Fast Secure Roaming; 9.1 Introduction; 9.2 Overview of the 802.11r Standard; 9.3 Detailed Concepts and Terminology of 802.11r; 9.4 Protocol Exchanges in 802.11r; 9.5 The 802.11k Standard Applied to Roaming; 9.6 Concluding Remarks; Chapter 10. Roaming between 802.11 and Other Wireless Technologies; 10.1 Introduction; 10.2 Ideal Roaming Experience 10.3 IEEE 802.16: WiMAX |
Record Nr. | UNINA-9910813346503321 |
Goransson Paul | ||
Amsterdam ; ; Boston, : Newnes/Elsevier, c2007 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Software defined networks : a comprehensive approach / / Paul Göransson, Chuck Black, Timothy Culver |
Autore | Goransson Paul |
Edizione | [Second edition.] |
Pubbl/distr/stampa | Cambridge, MA : , : Morgan Kaufmann, , [2017] |
Descrizione fisica | 1 online resource (1 volume) : illustrations |
Disciplina | 004.6 |
Soggetto topico | Software-defined networking (Computer network technology) |
ISBN | 0-12-804579-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction -- Why SDN? -- Genesis of SDN -- How SDN works -- The openflow specification -- Alternative definitions of SDN -- Emerging protocol, controller, and application models -- SDN in data center -- SDN in other environments -- Network functions virtualization -- Players in the SDN ecosystem -- SDN applications -- SDN open source -- Business ramifications -- SDN futures. |
Record Nr. | UNINA-9910583372003321 |
Goransson Paul | ||
Cambridge, MA : , : Morgan Kaufmann, , [2017] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Software defined networks : a comprehensive approach / / Paul Göransson, Chuck Black |
Autore | Goransson Paul |
Edizione | [1st edition] |
Pubbl/distr/stampa | Waltham, [Massachusetts] : , : Elsevier, , 2014 |
Descrizione fisica | 1 online resource (353 p.) |
Disciplina | 004.6 |
Soggetto topico | Software-defined networking (Computer network technology) |
Soggetto genere / forma | Electronic books. |
ISBN | 0-12-416684-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Half Title; Title Page; Copyright; Dedication; Praise Page; Contents; List of Figures; List of Tables; Foreword; Preface; 1 Introduction; 1.1 Basic Packet-Switching Terminology; 1.2 Historical Background; 1.3 The Modern Data Center; 1.4 Traditional Switch Architecture; 1.4.1 Data, Control and Management Planes; 1.4.2 Software-Based Routing and Bridging; 1.4.3 Hardware Lookup of Forwarding Tables; 1.4.4 Generically Programmable Forwarding Rules; 1.5 Autonomous and Dynamic Forwarding Tables; 1.5.1 Layer Two Control; 1.5.2 Layer Three Control; 1.5.3 Protocol Soup or (S)witch's Brew?
1.6 Can We Increase the Packet-Forwarding IQ?1.7 Open Source and Technological Shifts; 1.8 Organization of this Book; References; 2 Why SDN?; 2.1 Evolution of Switches and Control Planes; 2.1.1 Simple Forwarding and Routing Using Software; 2.1.2 Independence and Autonomy in Early Devices; 2.1.3 Software Moves into Silicon; 2.1.4 Hardware Forwarding and Control in Software; 2.1.5 The Growing Need for Simplification; 2.1.6 Moving Control Off the Device; 2.2 Cost; 2.2.1 Increased Cost of Development; 2.2.2 Closed Environments Encourage Vendor Lock-in; 2.2.3 Complexity and Resistance to Change 2.2.4 Increased Cost of Operating the Network2.3 SDN Implications for Research and Innovation; 2.3.1 Status Quo Benefits Incumbent Vendors; 2.3.2 SDN Promotes Research and Innovation; 2.4 Data Center Innovation; 2.4.1 Compute and Storage Virtualization; 2.4.2 Inadequacies in Networks Today; 2.5 Data Center Needs; 2.5.1 Automation; 2.5.2 Scalability; 2.5.3 Multipathing; 2.5.4 Multitenancy; 2.5.5 Network Virtualization; 2.6 Conclusion; References; 3 The Genesis of SDN; 3.1 The Evolution of Networking Technology; 3.1.1 Mainframe Networking: Remote Terminals 3.1.2 Peer-to-Peer, Point-to-Point Connections3.1.3 Local Area Networks; 3.1.4 Bridged Networks; 3.1.5 Routed Networks; 3.2 Forerunners of SDN; 3.2.1 Early Efforts; 3.2.2 Network Access Control; 3.2.3 Orchestration; 3.2.4 Virtualization Manager Network Plugins; 3.2.5 ForCES: Separation of Forwarding and Control Planes; 3.2.6 4D: Centralized Network Control; 3.2.7 Ethane: Controller-Based Network Policy; 3.3 Software Defined Networking is Born; 3.3.1 The Birth of OpenFlow; 3.3.2 Open Networking Foundation; 3.4 Sustaining SDN Interoperability; 3.5 Open Source Contributions 3.5.1 The Power of the Collective3.5.2 The Danger of the Collective; 3.5.3 Open Source Contributions to SDN; 3.6 Legacy Mechanisms Evolve Toward SDN; 3.7 Network Virtualization; 3.8 May I Please Call My Network SDN?; 3.9 Conclusion; References; 4 How SDN Works; 4.1 Fundamental Characteristics of SDN; 4.1.1 Plane Separation; 4.1.2 A Simple Device and Centralized Control; 4.1.3 Network Automation and Virtualization; 4.1.4 Openness; 4.2 SDN Operation; 4.3 SDN Devices; 4.3.1 Flow Tables; 4.3.2 SDN Software Switches; 4.3.3 Hardware SDN Devices; 4.3.4 Existing SDN Device Implementations 4.3.5 Scaling the Number of Flows |
Record Nr. | UNINA-9910464451603321 |
Goransson Paul | ||
Waltham, [Massachusetts] : , : Elsevier, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Software defined networks : a comprehensive approach / / Paul Göransson, Chuck Black |
Autore | Goransson Paul |
Edizione | [1st edition] |
Pubbl/distr/stampa | Waltham, [Massachusetts] : , : Elsevier, , 2014 |
Descrizione fisica | 1 online resource (353 p.) |
Disciplina | 004.6 |
Soggetto topico | Software-defined networking (Computer network technology) |
ISBN | 0-12-416684-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Half Title; Title Page; Copyright; Dedication; Praise Page; Contents; List of Figures; List of Tables; Foreword; Preface; 1 Introduction; 1.1 Basic Packet-Switching Terminology; 1.2 Historical Background; 1.3 The Modern Data Center; 1.4 Traditional Switch Architecture; 1.4.1 Data, Control and Management Planes; 1.4.2 Software-Based Routing and Bridging; 1.4.3 Hardware Lookup of Forwarding Tables; 1.4.4 Generically Programmable Forwarding Rules; 1.5 Autonomous and Dynamic Forwarding Tables; 1.5.1 Layer Two Control; 1.5.2 Layer Three Control; 1.5.3 Protocol Soup or (S)witch's Brew?
1.6 Can We Increase the Packet-Forwarding IQ?1.7 Open Source and Technological Shifts; 1.8 Organization of this Book; References; 2 Why SDN?; 2.1 Evolution of Switches and Control Planes; 2.1.1 Simple Forwarding and Routing Using Software; 2.1.2 Independence and Autonomy in Early Devices; 2.1.3 Software Moves into Silicon; 2.1.4 Hardware Forwarding and Control in Software; 2.1.5 The Growing Need for Simplification; 2.1.6 Moving Control Off the Device; 2.2 Cost; 2.2.1 Increased Cost of Development; 2.2.2 Closed Environments Encourage Vendor Lock-in; 2.2.3 Complexity and Resistance to Change 2.2.4 Increased Cost of Operating the Network2.3 SDN Implications for Research and Innovation; 2.3.1 Status Quo Benefits Incumbent Vendors; 2.3.2 SDN Promotes Research and Innovation; 2.4 Data Center Innovation; 2.4.1 Compute and Storage Virtualization; 2.4.2 Inadequacies in Networks Today; 2.5 Data Center Needs; 2.5.1 Automation; 2.5.2 Scalability; 2.5.3 Multipathing; 2.5.4 Multitenancy; 2.5.5 Network Virtualization; 2.6 Conclusion; References; 3 The Genesis of SDN; 3.1 The Evolution of Networking Technology; 3.1.1 Mainframe Networking: Remote Terminals 3.1.2 Peer-to-Peer, Point-to-Point Connections3.1.3 Local Area Networks; 3.1.4 Bridged Networks; 3.1.5 Routed Networks; 3.2 Forerunners of SDN; 3.2.1 Early Efforts; 3.2.2 Network Access Control; 3.2.3 Orchestration; 3.2.4 Virtualization Manager Network Plugins; 3.2.5 ForCES: Separation of Forwarding and Control Planes; 3.2.6 4D: Centralized Network Control; 3.2.7 Ethane: Controller-Based Network Policy; 3.3 Software Defined Networking is Born; 3.3.1 The Birth of OpenFlow; 3.3.2 Open Networking Foundation; 3.4 Sustaining SDN Interoperability; 3.5 Open Source Contributions 3.5.1 The Power of the Collective3.5.2 The Danger of the Collective; 3.5.3 Open Source Contributions to SDN; 3.6 Legacy Mechanisms Evolve Toward SDN; 3.7 Network Virtualization; 3.8 May I Please Call My Network SDN?; 3.9 Conclusion; References; 4 How SDN Works; 4.1 Fundamental Characteristics of SDN; 4.1.1 Plane Separation; 4.1.2 A Simple Device and Centralized Control; 4.1.3 Network Automation and Virtualization; 4.1.4 Openness; 4.2 SDN Operation; 4.3 SDN Devices; 4.3.1 Flow Tables; 4.3.2 SDN Software Switches; 4.3.3 Hardware SDN Devices; 4.3.4 Existing SDN Device Implementations 4.3.5 Scaling the Number of Flows |
Record Nr. | UNINA-9910786688203321 |
Goransson Paul | ||
Waltham, [Massachusetts] : , : Elsevier, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Software defined networks : a comprehensive approach / / Paul Göransson, Chuck Black |
Autore | Goransson Paul |
Edizione | [1st edition] |
Pubbl/distr/stampa | Waltham, [Massachusetts] : , : Elsevier, , 2014 |
Descrizione fisica | 1 online resource (353 p.) |
Disciplina | 004.6 |
Soggetto topico | Software-defined networking (Computer network technology) |
ISBN | 0-12-416684-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Half Title; Title Page; Copyright; Dedication; Praise Page; Contents; List of Figures; List of Tables; Foreword; Preface; 1 Introduction; 1.1 Basic Packet-Switching Terminology; 1.2 Historical Background; 1.3 The Modern Data Center; 1.4 Traditional Switch Architecture; 1.4.1 Data, Control and Management Planes; 1.4.2 Software-Based Routing and Bridging; 1.4.3 Hardware Lookup of Forwarding Tables; 1.4.4 Generically Programmable Forwarding Rules; 1.5 Autonomous and Dynamic Forwarding Tables; 1.5.1 Layer Two Control; 1.5.2 Layer Three Control; 1.5.3 Protocol Soup or (S)witch's Brew?
1.6 Can We Increase the Packet-Forwarding IQ?1.7 Open Source and Technological Shifts; 1.8 Organization of this Book; References; 2 Why SDN?; 2.1 Evolution of Switches and Control Planes; 2.1.1 Simple Forwarding and Routing Using Software; 2.1.2 Independence and Autonomy in Early Devices; 2.1.3 Software Moves into Silicon; 2.1.4 Hardware Forwarding and Control in Software; 2.1.5 The Growing Need for Simplification; 2.1.6 Moving Control Off the Device; 2.2 Cost; 2.2.1 Increased Cost of Development; 2.2.2 Closed Environments Encourage Vendor Lock-in; 2.2.3 Complexity and Resistance to Change 2.2.4 Increased Cost of Operating the Network2.3 SDN Implications for Research and Innovation; 2.3.1 Status Quo Benefits Incumbent Vendors; 2.3.2 SDN Promotes Research and Innovation; 2.4 Data Center Innovation; 2.4.1 Compute and Storage Virtualization; 2.4.2 Inadequacies in Networks Today; 2.5 Data Center Needs; 2.5.1 Automation; 2.5.2 Scalability; 2.5.3 Multipathing; 2.5.4 Multitenancy; 2.5.5 Network Virtualization; 2.6 Conclusion; References; 3 The Genesis of SDN; 3.1 The Evolution of Networking Technology; 3.1.1 Mainframe Networking: Remote Terminals 3.1.2 Peer-to-Peer, Point-to-Point Connections3.1.3 Local Area Networks; 3.1.4 Bridged Networks; 3.1.5 Routed Networks; 3.2 Forerunners of SDN; 3.2.1 Early Efforts; 3.2.2 Network Access Control; 3.2.3 Orchestration; 3.2.4 Virtualization Manager Network Plugins; 3.2.5 ForCES: Separation of Forwarding and Control Planes; 3.2.6 4D: Centralized Network Control; 3.2.7 Ethane: Controller-Based Network Policy; 3.3 Software Defined Networking is Born; 3.3.1 The Birth of OpenFlow; 3.3.2 Open Networking Foundation; 3.4 Sustaining SDN Interoperability; 3.5 Open Source Contributions 3.5.1 The Power of the Collective3.5.2 The Danger of the Collective; 3.5.3 Open Source Contributions to SDN; 3.6 Legacy Mechanisms Evolve Toward SDN; 3.7 Network Virtualization; 3.8 May I Please Call My Network SDN?; 3.9 Conclusion; References; 4 How SDN Works; 4.1 Fundamental Characteristics of SDN; 4.1.1 Plane Separation; 4.1.2 A Simple Device and Centralized Control; 4.1.3 Network Automation and Virtualization; 4.1.4 Openness; 4.2 SDN Operation; 4.3 SDN Devices; 4.3.1 Flow Tables; 4.3.2 SDN Software Switches; 4.3.3 Hardware SDN Devices; 4.3.4 Existing SDN Device Implementations 4.3.5 Scaling the Number of Flows |
Record Nr. | UNINA-9910815431003321 |
Goransson Paul | ||
Waltham, [Massachusetts] : , : Elsevier, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|