Books & Videos

Table of Contents

  1. Chapter 1 Introduction

  2. Chapter 2 Centralized and Distributed Control and Data Planes

    1. Introduction

    2. What Do They Do?

    3. Distributed Control Planes

    4. Centralized Control Planes

    5. Conclusions

  3. Chapter 3 OpenFlow

    1. Introduction

    2. Hybrid Approaches

    3. Conclusions

  4. Chapter 4 SDN Controllers

    1. Introduction

    2. General Concepts

    3. Layer 3 Centric

    4. Plexxi

    5. Cisco OnePK

    6. Conclusions

  5. Chapter 5 Network Programmability

    1. Introduction

    2. The Management Interface

    3. The Application-Network Divide

    4. Modern Programmatic Interfaces

    5. I2RS

    6. Modern Orchestration

  6. Chapter 6 Data Center Concepts and Constructs

    1. Introduction

    2. The Multitenant Data Center

    3. The Virtualized Multitenant Data Center

    4. SDN Solutions for the Data Center Network

    5. VLANs

    6. EVPN

    7. VxLan

    8. NVGRE

    9. Conclusions

  7. Chapter 7 Network Function Virtualization

    1. Introduction

    2. Virtualization and Data Plane I/O

    3. Services Engineered Path

    4. Service Locations and Chaining

    5. NFV at ETSI

    6. Non-ETSI NFV Work

    7. Conclusions

  8. Chapter 8 Network Topology and Topological Information Abstraction

    1. Introduction

    2. Network Topology

    3. Traditional Methods

    4. LLDP

    5. BGP-TE/LS

    6. ALTO

    7. I2RS Topology

  9. Chapter 9 Building an SDN Framework

    1. Introduction

    2. Build Code First; Ask Questions Later...

    3. The Juniper SDN Framework

    4. IETF SDN Framework(s)

    5. Open Daylight Controller/Framework

    6. Policy

    7. Conclusions

  10. Chapter 10 Use Cases for Bandwidth Scheduling, Manipulation, and Calendaring

    1. Introduction

    2. Bandwidth Calendaring

    3. Big Data and Application Hyper-Virtualization for Instant CSPF

    4. Expanding Topology

    5. Conclusions

  11. Chapter 11 Use Cases for Data Center Overlays, Big Data, and Network Function Virtualization

    1. Introduction

    2. Data Center Orchestration

    3. Puppet (DevOps Solution)

    4. Network Function Virtualization (NFV)

    5. Optimized Big Data

    6. Conclusions

  12. Chapter 12 Use Cases for Input Traffic Monitoring, Classification, and Triggered Actions

    1. Introduction

    2. The Firewall

    3. Firewalls as a Service

    4. Network Access Control Replacement

    5. Extending the Use Case with a Virtual Firewall

    6. Feedback and Optimization

    7. Intrusion Detection/Threat Mitigation

    8. Conclusions

  13. Chapter 13 Final Thoughts and Conclusions

    1. What Is True About SDN?

    2. Multiple Definitions of SDN

    3. Are We Making Progress Yet?

  1. Colophon