000 06168cam a2200445Ii 4500
999 _c89647
_d89647
005 20250307110054.0
006 m o d
007 cr cnu---unuuu
008 250307b ||||| |||| 00| 0 eng d
020 _a9781786304582
020 _a9781119694748
_q(electronic bk. : oBook)
020 _a1119694744
_q(electronic bk. : oBook)
035 _a(OCoLC)1137260425
040 _aDG1
_beng
_erda
_epn
_cDG1
_dOCLCF
041 _aeng
050 4 _aTK5105.5
082 0 4 _a004.6
_223
100 1 _aPujolle, G.,
_d1949-
_0http://id.loc.gov/authorities/names/n81085155
_eauthor.
245 1 0 _aSoftware networks :
_bvirtualization, SDN, 5G and security /
_cGuy Pujolle.
250 _aRevised and updated 2nd edition.
264 1 _aLondon :
_bISTE Ltd. ;
_aHoboken, NJ :
_bWiley,
_c2020.
300 _a1 online resource :
_billustrations.
336 _atext
_btxt
_2rdacontent.
337 _acomputer
_bc
_2rdamedia.
338 _aonline resource
_bcr
_2rdacarrier.
340 _2rdacc
_0http://rdaregistry.info/termList/RDAColourContent/1003.
490 1 _aNetworks & telecommunication series, advanced networks set ;
_vvolume 1.
504 _aIncludes bibliographical references and index.
505 0 _aTable of Contents Foreword xi Preface xvii Acknowledgments xxv Online Resources xxvii Part I Introduction and Foundations 1 1 Introduction 3 2 The Nature of Code 39 3 Fundamental Principles 67 4 Functional and Nonfunctional Requirements 91 5 UML Overview 115 6 Partitioning Systems into Domains 125 Part II Semantic Modeling: Model-based Functional Requirements 151 7 Use Case Diagrams: Scope and Context 153 8 Class Models: Policies to Enforce 183 9 Interaction Diagrams: Process at a Mid-Level 237 10 State Models: Process at a Fine-Grained Level 261 11 Partitioning Domains into Subdomains 305 12 Wrapping Up Semantic Modeling 323 Part III Model-based Design and Code 369 13 Introduction to Design and Code 371 14 Designing Interfaces: Specifying Real-World Interaction 379 15 High-Level Design: Classes and Operations 407 16 High-Level Design: Contracts and Signatures 447 17 Detailed Design and Code 503 18 Formal Disciplines of Design and Code 539 19 Optimization 583 20 Model Compilation 633 21 Advanced Open Model Compilation 675 22 Wrapping Up Model-Based Design and Code 705 Part IV Related Topics 723 23 Estimation 725 24 Development and Maintenance Processes 759 25 Economics of Error Handling 787 26 Arguments Against Model-Based Software Engineering 815 Part V Summary 827 27 Closing Remarks 829 Part VI Appendices 843 Appendix A: Documentation Principles 845 Appendix B: WebBooks 2.0 Background 849 Appendix C: WebBooks 2.0 Domains 853 Appendix D: Semantic Model for Order fulfillment 857 Appendix E: (Pro Forma) Order fulfillment Design 885 Appendix F: Semantic Model for Payment 905 Appendix G: (Pro Forma) Payment Design 927 Appendix H: Semantic Model for Scalability 943 Appendix I: (Pro Forma) Scalability Design 969 Appendix J: Semantic Model for High availability 985 Appendix K: (Pro Forma) High availability Design 1001 Appendix L: Semantics of Semantic Modeling 1011 Appendix M: Sample Production Rules 1049 Appendix N: Software Structural Complexity Metrics 1061 References 1081 Index 1091
506 _aAvailable to OhioLINK libraries.
520 _aSoftware Networks describe new concepts for the Internet's next generation. This architecture is based on virtual networking using Cloud and datacenter facilities. The main problems to be dealt with are the placement of virtual resources for opening a new network on the fly, and the urbanization of virtual resources implemented on physical network equipment. The digital architecture also deals with mechanisms capable of automatically controlling the placement of all virtual resources within the physical network. This book describes how to create and delete virtual networks on the fly. Indeed, the system is able to create any new network with any kind of virtual resource (e.g. switches, routers, LSRs, optical paths, firewalls, SIP-based servers, devices, servers, access points, etc.). Software Networks shows how this architecture is compatible with new advances in SDN (Software Defined Networking), new high-speed transport protocols such as TRILL (Transparent Interconnection of Lots of Links) and LISP (Locator/Identifier Separation Protocol), NGN, IMS, new generation Wi-Fi, and 4G/5G networks. Finally, the author introduces Clouds of security and the virtualization of secure elements (smartcards) that could certainly transform how to secure the Internet. For this second edition, the author addresses in five new chapters the importance of open source software for networks, mobile edge computing, fog networking, tactile internet - a network environment allowing remote access, and security - the use of Cloud of security, secure elements and the emergence of the blockchain.
545 0 _aAbout the Author STEVE TOCKEY is Principal Consultant at Construx. Steve is an expert in software engineering practices including object-oriented development, distributed object computing, software project management, and software quality. He earned a Masters of Software Engineering degree from Seattle University and has served as an adjunct faculty member for the program. Prior to joining Construx, Tockey worked at Lawrence Livermore National Laboratory, Boeing, and Rockwell Collins.
650 0 _aComputer networks.
_0http://id.loc.gov/authorities/subjects/sh85029513.
650 0 _aCloud computing.
_0http://id.loc.gov/authorities/subjects/sh2008004883.
655 4 _aElectronic books.
710 2 _aOhio Library and Information Network.
_0http://id.loc.gov/authorities/names/no95058981.
830 0 _aNetworks & telecommunications series.
_pAdvanced networks set ;
_0http://id.loc.gov/authorities/names/no2017078606
_vv. 1.
856 4 0 _uhttps://onlinelibrary.wiley.com/doi/book/10.1002/9781119546665
_yFull text is available at Wiley Online Library Click here to view
942 _2ddc
_cER