Network Function Virtualization
Autor Ken Gray, Thomas D. Nadeauen Limba Engleză Paperback – 3 iul 2016
Drawing upon years of practical experience, and using numerous examples and an easy-to-understand framework, authors Tom Nadeau and Ken Gary discuss the relevancy of NFV and how it can be effectively used to create and deploy new services. Readers will learn how to determine if network function virtualization is right for their enterprise network, be able to use hands-on, step-by-step guides to design, deploy, and manage NFV in an enterprise, and learn how to evaluate all relevant NFV standards, including ETSI, IETF, Openstack, and Open Daylight.
- Provides a comprehensive overview of Network Function Virtualization (NFV)
- Discusses how to determine if network function virtualization is right for an enterprise network
- Presents an ideal reference for those interested in NFV Network Service Chaining, NSC network address translation (NAT), firewalling, intrusion detection, domain name service (DNS), caching, and software defined networks
- Includes hands-on, step-by-step guides for designing, deploying, and managing NFV in the enterprise
- Explains, and contrasts, all relevant NFV standards, including ETSI, IETF, Openstack, and Open Daylight
Preț: 261.68 lei
Preț vechi: 363.62 lei
-28% Nou
Puncte Express: 393
Preț estimativ în valută:
50.08€ • 52.83$ • 41.74£
50.08€ • 52.83$ • 41.74£
Carte tipărită la comandă
Livrare economică 26 decembrie 24 - 09 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780128021194
ISBN-10: 0128021195
Pagini: 270
Dimensiuni: 191 x 235 x 17 mm
Greutate: 0.47 kg
Editura: ELSEVIER SCIENCE
ISBN-10: 0128021195
Pagini: 270
Dimensiuni: 191 x 235 x 17 mm
Greutate: 0.47 kg
Editura: ELSEVIER SCIENCE
Cuprins
Part I: Overview and Definition of NFV/NSC1). Introduction2). Network Function Virtualization (NFV)3). Network Service Chaining (NSC)
Part II: Related Standards4). ETSI5). IETF6). Openstack7). Open Daylight
Part III: Advanced Topics8). Middlebox Topics9). Service Chaining methods - orchestrated overlays, route leaking, direct assignment10). Metadata11). Programmability Aspects of NFV/NSC12). Performance Implications When Using Commodity Hardware for NSC (COTS)13). Conclusions and Future Directions
Part II: Related Standards4). ETSI5). IETF6). Openstack7). Open Daylight
Part III: Advanced Topics8). Middlebox Topics9). Service Chaining methods - orchestrated overlays, route leaking, direct assignment10). Metadata11). Programmability Aspects of NFV/NSC12). Performance Implications When Using Commodity Hardware for NSC (COTS)13). Conclusions and Future Directions