List of Figures

  1. Figure 2.1 Cloud computing architecture.
  2. Figure 2.2 Virtual machine architectures.
  3. Figure 2.3 Docker container architectures.
  4. Figure 2.4 VPN illustration.
  5. Figure 2.5 Switch-based SDN virtualization.
  6. Figure 2.6 Host-based SDN virtualization.
  7. Figure 3.1 NFV architecture in cloud computing stacks.
  8. Figure 3.2 ETSI NFV reference architecture.
  9. Figure 3.3 OPNFV architecture.
  10. Figure 3.4 VNF performance characterization.
  11. Figure 3.5 NF model overview.
  12. Figure 3.6 Load balancer code and a slice (bold and bold italics).
  13. Figure 3.7 Model.
  14. Figure 3.8 Source-code-based NF modeling method. (a) Step 1: slice program; (b) Step 2: execution paths; (c) Step 3: fill in model; (d) Step 4: Models of LB(hash) and cache.
  15. Figure 3.9 Black box NF modeling method.
  16. Figure 3.10 VNF placement system overview.
  17. Figure 4.1 SDN architecture.
  18. Figure 4.2 SDN components and examples.
  19. Figure 4.3 SDN comparison.
  20. Figure 4.4 Inter-data center WAN: a use case of SDN.
  21. Figure 4.5 SDN controller overview.
  22. Figure 4.6 Example of SDN NIB.
  23. Figure 4.7 OpenFlow overview.
  24. Figure 4.8 Adaptive SDN anomaly detection framework.
  25. Figure 4.9 Conditional SDN measurement overview.
  26. Figure 4.10 SDN checkpoint system.
  27. Figure 4.11 Example of controller and switch connection.
  28. Figure 4.12 Example of Internet2 network protection.
  29. Figure 4.13 Example of Fat-tree network protection.
  30. Figure 4.14 Protection against link and node failures.
  31. Figure 4.15 SENSS architecture.
  32. Figure 4.16 SdnTE network architecture.
  33. Figure 5.1 5G architecture. ...

Get Network Function Virtualization now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.