The SDN, NFV & Network Virtualization Bible

The SDN, NFV & Network Virtualization Bible

The SDN, NFV & Network Virtualization Bible: 2015 – 2020 Opportunities, Challenges, Strategies & Forecasts Table of Contents 1 Chapter 1: Introduction ................................................................................... 20 1.1 Executive Summary ....................................................................................................................................... 20 1.2 Topics Covered .............................................................................................................................................. 22 1.3 Forecast Segmentation ................................................................................................................................. 23 1.4 Key Questions Answered ............................................................................................................................... 25 1.5 Key Findings ................................................................................................................................................... 27 1.6 Methodology ................................................................................................................................................. 28 1.7 Target Audience ............................................................................................................................................ 29 1.8 Companies & Organizations Mentioned ....................................................................................................... 30 2 Chapter 2: An Overview of SDN, NFV & Network Virtualization ....................... 36 2.1 What is Network Virtualization? ................................................................................................................... 36 2.2 What is SDN (Software Defined Networking)? .............................................................................................. 37 2.3 SDN Protocols ................................................................................................................................................ 37 2.3.1 OpenFlow .......................................................................................................................................... 38 2.3.2 BGP-TE (Border Gateway Protocol - Traffic Engineering) ................................................................. 38 2.3.3 PCEP (Path Computation Element Protocol) ..................................................................................... 39 2.3.4 I2RS (Interface to the Routing System) ............................................................................................. 39 2.3.5 VxLAN (Virtual Extensible LAN) ......................................................................................................... 40 2.3.6 ALTO (Application Layer Traffic Optimization) .................................................................................. 40 2.3.7 IETF Software Driven Networks ......................................................................................................... 40 2.4 SDN Implementation Approaches ................................................................................................................. 41 2.4.1 Network Virtualization Approach ...................................................................................................... 41 2.4.2 Evolutionary Approach ...................................................................................................................... 41 2.4.3 The “Central Control” Approach ....................................................................................................... 42 2.5 What is NFV (Network Functions Virtualization)? ......................................................................................... 43 2.6 NFV Enabling Technologies ........................................................................................................................... 44 2.6.1 Cloud Computing and Network Virtualization................................................................................... 44 2.6.2 Open Management and Control Protocols ....................................................................................... 44 .. Page 2 The SDN, NFV & Network Virtualization Bible: 2015 – 2020 Opportunities, Challenges, Strategies & Forecasts 2.6.3 Industry Standard High-Volume Servers ........................................................................................... 44 2.7 NFV Implementation Architecture ................................................................................................................ 45 2.7.1 NFVI (NFV Infrastructure) .................................................................................................................. 45 2.7.1.1 Hardware Resources ..................................................................................................................................... 45 2.7.1.2 Virtualized Resources .................................................................................................................................... 45 2.7.2 VNFs (Virtualized Network Functions)............................................................................................... 46 2.7.3 NFV-MANO (NFV-Management and Orchestration) ......................................................................... 46 2.7.3.1 VIM (Virtualized Infrastructure Manager) ..................................................................................................... 46 2.7.3.2 Orchestrator.................................................................................................................................................. 46 2.7.3.3 VNF Manager ................................................................................................................................................ 47 2.8 How SDN and NFV Differ from Each Other ................................................................................................... 48 2.8.1 Similarities and Differences ............................................................................................................... 48 2.8.2 Can Both Technologies Complement Each Other? ............................................................................ 49 2.8.3 How Are Vendors Positioning their Solutions?.................................................................................. 49 2.9 Market Drivers............................................................................................................................................... 50 2.9.1 Leveraging Generic Low-cost Hardware ............................................................................................ 50 2.9.2 Multi-tenancy on Same Hardware .................................................................................................... 50 2.9.3 Reduced Power Consumption ........................................................................................................... 50 2.9.4 Faster TTM (Time to Market) ............................................................................................................ 50 2.9.5 Improved Operational Efficiency & Performance ............................................................................. 51 2.9.6 Centralized Provisioning and Network Control ................................................................................. 51 2.9.7 Ability to Launch New Services & Virtual Networks Quickly ............................................................. 51 2.9.8 Dynamic Scaling of Services............................................................................................................... 52 2.9.9 Opening the Door to Multi-vendor Interoperability ......................................................................... 52 2.9.10 CapEx and OpEx Reduction ............................................................................................................... 52 2.9.11 Fast Troubleshooting and Improved Diagnostics .............................................................................. 52 2.9.12 Vendor Support ................................................................................................................................. 52 2.10 Market Barriers .......................................................................................................................................... 53 2.10.1 Lack of Standardization & Technology Maturity ............................................................................... 53 2.10.2 Uncertain Cost-Benefits Tradeoffs .................................................................................................... 53 2.10.3 NFV May Slow/Delay Traffic .............................................................................................................. 53 .. Page 3 The SDN, NFV & Network Virtualization Bible: 2015 – 2020 Opportunities, Challenges, Strategies & Forecasts 2.10.4 Will Multi-vendor Interoperability Really Work? .............................................................................. 54 2.10.5 Co-Existence with Legacy Networks: Integration Challenges ............................................................ 54 3 Chapter 3: SDN/NFV Use Case Scenarios .......................................................... 55 3.1 Enterprise, Data Center & Generic Use Cases ............................................................................................... 55 3.1.1 Network Virtualization .....................................................................................................................

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    42 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us