Index

A note on the digital index

A link in an index entry is displayed as the section title in which that entry appears. Because some sections have multiple index markers, it is not unusual for an entry to have several links to the same section. Clicking on any link will take you directly to the place in the text in which the marker appears.

A

abstraction, General Concepts
access control lists (ACLs), Data Plane, The Firewall
address binding, Creating the MPLS Overlay
affinity groups, Plexxi Affinity
affinity links, Plexxi Affinity
Amazon Web Services (AWS), Introduction, Introduction
analytics, Analytics
Apache Software Foundation, Thrift
application portability, Traditional Methods
application programming interfaces (APIs), definition of, Assumptions
Application-Based Network Operations (ABNO), IETF SDN Framework(s), ABNO
application-based protocols, and service chaining, An Application Level Approach
application-friendly interfaces, Introduction, Conclusions
Application-Layer Traffic Optimization (ALTO) Network Service, ALTO, Expanding Your Reach: Barbarians at the Gate
application-network divide, The Application-Network Divide, The Command-Line Interface, NETCONF and NETMOD, SNMPThe MIB (management information base)
basics of, The Application-Network Divide
command-line interface, The Command-Line Interface
Network Configuration Protocol, NETCONF and NETMOD
Simple Network Management Protocol (SNMP), SNMPThe MIB (management information base)
Asynchronous Transfer Mode (ATM), ATM/LANE
Atlas, Alia, I2RS
auto-API generation/update, API
availability zones, CloudStack

B

backward compatibility, Wire Protocol
bandwidth calendaring application (BCA), The Juniper SDN Framework, Enhancing the Controller
bandwidth manipulation, Introduction, Bandwidth Calendaring, Base Topology and Fundamental Concepts, OpenFlow and PCE Topologies, Example Configuration, OpenFlow Provisioned Example, Enhancing the Controller, Overlay Example Using PCE Provisioning, Expanding Your Reach: Barbarians at the Gate, Big Data and Application Hyper-Virtualization for Instant CSPF, Expanding Topology
base topology, Base Topology and Fundamental Concepts
calendaring example, Bandwidth Calendaring
in consumer environments, Expanding Your Reach: Barbarians at the Gate
controller enhancement, Enhancing the Controller
demo configuration files, Example Configuration
multilayer topology optimization, Big Data and Application Hyper-Virtualization for Instant CSPF
OpenFlow model, OpenFlow Provisioned Example
OpenFlow/PCE topologies, OpenFlow and PCE Topologies
overlay using PCE provisioning, Overlay Example Using PCE Provisioning
topology expansion, Expanding Topology
triggers for, Introduction
BGP Link State (BGP-LS), BGP-TE/LS
bidirectional programmatic interfaces, Introduction
big data techniques, Optimized Big Data
Big Network Controller (BNC), Big Switch Networks/Floodlight
Big Switch Network, Big Switch Networks/Floodlight, Conclusions, Conclusions
Big Switch Network Floodlight controller, Build Code First; Ask Questions Later...
BigDB database, Relationship to the idealized SDN framework
bin-packing, Bin-packing, Introduction
black holes, definition of, Moving Information Between Planes
Border Gateway Protocol (BGP), BGP-TE/LS (see BGP)
broadband subscription, NFV in, NFV in Mobility
broker model, The Juniper SDN Framework

C

CA Spectrum/IM topology, Traditional Methods
CAP Theorem, High Availability and State Storage
capital expenditure (CAPEX), Cost
Casado, Martin, FAWG (Forwarding Abstraction Workgroup)
centralized control planes, Introduction, Centralized Control Planes, Logical Versus Literal, ATM/LANE, Route Servers
advantage of, Centralized Control Planes
ATM/LANE, ATM/LANE
concept of, Introduction
problems with, Logical Versus Literal
route servers, Route Servers
chaining, Service Locations and ChainingScale
Cisco OnePK, Cisco OnePK, Conclusions
clean slate proposition, Stability, Introduction
cloud computing, Foreword by David Ward, VMware, OpenStack, VxLan
genesis of, VMware
hybrid clouds, Foreword by David Ward
OpenStack, OpenStack
scalability issues in, VxLan
CloudStack, CloudStack
cluster system design, Complexity and its resulting fragility
cluster-based high availability model, High Availability and State Storage
code bloat, Stability
command-line interface (CLI), The Command-Line Interface, Traditional Methods
communication protocols, XMPP
complexity, and service chaining, Scale
Config-Mgmt Working Group, Config and Extensibility
connecting nodes, Network Topology
Constrained Shortest Path First (CSPF), Big Data and Application Hyper-Virtualization for Instant CSPF
consumer environments, bandwidth manipulation in, Expanding Your Reach: Barbarians at the Gate
content delivery networks (CDNs), ALTO
content-based filtering, Publish and Subscribe Interfaces
control planes, Introduction, Introduction, Evolution versus Revolution, The Control Plane, Moving Information Between Planes, Distributed Control PlanesReplication, Centralized Control PlanesRoute Servers, Control-Plane Signaling
centralized, Centralized Control PlanesRoute Servers
distributed, Distributed Control PlanesReplication
distributed vs. centralized, Introduction, Introduction
mechanics of, The Control Plane
packet forwarding, Moving Information Between Planes
signaling of, Control-Plane Signaling
spectrum of distributions, Evolution versus Revolution
control points, controversy over, Conclusions
control/data plane separation, Why Can Separation Be Important?, Scale matters, Evolution, Cost, Innovation, Stability, Complexity and its resulting fragility
complexity of, Complexity and its resulting fragility
cost and, Cost
evolution and, Evolution
importance of, Why Can Separation Be Important?
innovation and, Innovation
scalability and, Scale matters
stability and, Stability
convergence processing, Convergence Time
cost, Cost
cross-platform compatibility, Introduction

D

data center interconnect (DCI), Data Center Interconnect (DCI)
data center orchestration, Data Center Orchestration, Data Center Orchestration, Data Center Orchestration, Creating Tenant and Virtual Machine State, Forwarding State, Data-Driven Learning, Control-Plane Signaling, Scaling and Performance Considerations, Puppet (DevOps Solution)
actual data center infrastructure, Data Center Orchestration
conceptual specialized service centers, Data Center Orchestration
control-plane signaling, Control-Plane Signaling
data-driven learning, Data-Driven Learning
flow types in, Data Center Orchestration
forwarding state, Forwarding State
scaling/performance concerns, Scaling and Performance Considerations
template-based solution, Puppet (DevOps Solution)
tenant/virtual machine state, Creating Tenant and Virtual Machine State
data centers, Assumptions, Introduction, Introduction, VMware, Introduction, The Multitenant Data Center, The Virtualized Multitenant Data CenterSummary comparison of VPLS and EVPN for DCI, SDN Solutions for the Data Center Network, VLANs, EVPN, VxLan, NVGREHybrid overlay-underlay approach, Introduction, Introduction, Network Function Virtualization (NFV), Optimized Big Data
big data techniques, Optimized Big Data
definition of, Assumptions
evolution of, Introduction
EVPN (Ethernet VPN), EVPN
integrated resource management, VMware
interconnection example, Introduction
low-latency access to, Introduction
multitenant, Introduction, The Multitenant Data Center
network functions virtualization, Network Function Virtualization (NFV)
NVGRE (Network Virtualization using Generic Routing Encapsulation), NVGREHybrid overlay-underlay approach
original design of, Introduction
SDN solutions for, SDN Solutions for the Data Center Network
virtualized multitenant, The Virtualized Multitenant Data CenterSummary comparison of VPLS and EVPN for DCI
VLANs (Virtual Local Area Networks), VLANs
VxLAN (Virtual Extensible LAN), VxLan
data models, The Management Interface, NFV at ETSI, API
high-level compilation scheme, API
for message format, The Management Interface
for virtualized network functions, NFV at ETSI
data planes, The Control Plane, Data Plane, Moving Information Between Planes, Why Can Separation Be Important?, Virtualization and Data Plane I/O
data plane I/O, Virtualization and Data Plane I/O
function of, Data Plane
mechanics of, The Control Plane
packet forwarding, Moving Information Between Planes
separation from control planes, Why Can Separation Be Important?
data replication, Introduction
data-driven approach, Publish and Subscribe Interfaces, The Juniper SDN Framework
data-driven learning, Data-Driven Learning
data-interchange languages, JSON
database synchronization, High Availability and State Storage, Introduction
deadlocks, Deadlock
declarative configuration language, Puppet
DevOps, Puppet (DevOps Solution)
distributed control planes, Introduction, Distributed Control Planes, IP and MPLS, Creating the IP Underlay, Convergence Time, Load Balancing, High Availability, Creating the MPLS Overlay, Replication, Conclusions
concept of, Introduction
convergence time, Convergence Time
high availability, High Availability
IP underlay creation, Creating the IP Underlay
load balancing, Load Balancing
model examples, IP and MPLS
MPLS overlay, Creating the MPLS Overlay
replication, Replication
transient cycle limitation in, Distributed Control Planes
weaknesses of, Conclusions
dormant topological information, Introduction
downstream-on-demand, Creating the MPLS Overlay
dual function switches, Dual Function Switches
dynamic circuits (switched virtual circuits), ATM/LANE
dynamic threat migration, Intrusion Detection/Threat Mitigation

E

elastic computing, Introduction, Introduction
element management system (EMS), The Application-Network Divide
element-by-element management, shortfalls of, Foreword by David Ward
Embrane, Embrane/LineRate
Endpoint Identifier (EID), Locator ID Split (LISP)
ephemeral state, Wire Protocol, General Concepts
ESXi hypervisor, VMware
Ethernet Virtual Private Network (EVPN), The Control Plane
ethernets, function of, Assumptions
European Telecommunications Standards Institute (ETSI), Introduction, NFV at ETSI
event bus, Publish and Subscribe Interfaces
event synchronization, High Availability and State Storage
eventual consensus model, Distributed Control Planes
evolution, Evolution
Evolved Packet Core (EPC), NFV at ETSI
EVPN (Ethernet VPN), EVPN for DCI, EVPN
extensibility, Config and Extensibility, Config and Extensibility
Extensibility Working Group, Config and Extensibility
Extensible Messaging and Presence Protocol (XMPP), XMPP

F

Facebook, Thrift
Facebook Messenger, XMPP
Fang/Bitar vCE, Platform Virtualization
fast path packet processing, Data Plane
FAWG (Forwarding Abstraction Workgroup), FAWG (Forwarding Abstraction Workgroup)
feedback loops, Introduction, The Application-Network Divide, Conclusions
firewalls, The FirewallFirewalls as a Service
FLOOD port, Wire Protocol
Floodlight, Big Switch Networks/Floodlight, Build Code First; Ask Questions Later...
flow provisioning models, OpenFlow Provisioned Example
FlowVisor, Introduction, Architecture
forwarding information base (FIB), The Control Plane
forwarding lookups, Data Plane
Forwarding Plane Models (FPMOD), FAWG (Forwarding Abstraction Workgroup)
forwarding state, Wire Protocol, Forwarding State
fragility, Complexity and its resulting fragility
functional decomposition, NFV at ETSI

I

IETF 82, Foreword by David Meyer
(IETF) SDN Birds of a Feather session, Foreword by David Meyer
IGP (Interior Gateway Protocol), Creating the IP Underlay
infrastructure as a service (IaaS), The Multitenant Data Center
Infrastructure as a Service (IaaS) clouds, CloudStack
input traffic shaping, The Firewall
Integrated Architecture white paper, Dual Function Switches
Integrated Hybrid model, Hybrid Approaches
interface definition language, Thrift
Interface to the Routing System (I2RS), Introduction, I2RSI2RS, I2RS TopologyI2RS Topology, SDN(P)
Internet Control Message Protocol (ICMP), functions of, Assumptions
Internet Engineering Task Force (IETF), Foreword by David Meyer, NETCONF and NETMOD, SNMP, IETF SDN Framework(s)
interoperation, Conclusions, Open Daylight Controller/Framework
Intrusion Detection/Threat Mitigation System (IDS), Intrusion Detection/Threat Mitigation
IP (Internet Protocol), Creating the IP Underlay
IP addressing, basics of, Assumptions
Ipsilon Networks, Centralized Control Planes

J

Jabber Software Foundation, XMPP
Java Message Service (JMS), Publish and Subscribe Interfaces
JavaScript Object Notation (JSON), JSON
joining routing, Traditional Methods
Juniper Contrail Controller, Relationship to the idealized SDN framework
Juniper Networks Virtual Network System SDN controller system, L3VPN
Juniper Networks’ integrated hybrid proposal, Dual Function Switches, NETCONF and NETMOD
Juniper SDN Framework, The Juniper SDN Framework

L

L3VPN, L3VPN
label allocation, Creating the MPLS Overlay
label distribution protocols, Creating the MPLS Overlay
label switched paths (LSPs), RSVP-TE problem statement, Overlay Example Using PCE Provisioning
advantages of, Overlay Example Using PCE Provisioning
path computation element servers and, RSVP-TE problem statement
LAN emulation (LANE), ATM/LANE, Conclusions
layer 2 networks, The Control Plane, Introduction, The Virtualized Multitenant Data Center
layer 3 networks, The Control Plane, Introduction, Layer 3 Centric, The Virtualized Multitenant Data Center
Layer123 SDN Conference (2012), Introduction
LineRate Systems, Embrane/LineRate
Link Layer Discovery Protocol (LLDP), LLDP
links, types of, Network Topology
live migration, Data Center Distributed Computing Pitfalls to Consider
load balancing, Load Balancing
local port, Wire Protocol
localization, Moving Information Between Planes
Locator/ID Separation Protocol (LISP), The Control Plane, Locator ID Split (LISP)
logical links, Network Topology
logical topology, Assumptions
logical tunnels, Creating the MPLS Overlay
loose coupling, Publish and Subscribe Interfaces

M

Management and Orchestration (MANO), NFV at ETSI
Management Information Base (MIB), The MIB (management information base)
management interfaces, Introduction, The Management Interface
elements of, The Management Interface
types of, Introduction
management planes, The Control Plane
Mangement Information Base (MIB), Traditional Methods
Map/Reduces applications, Optimized Big Data
message brokers, Publish and Subscribe Interfaces
message filtering, Publish and Subscribe Interfaces
message format specification, The Management Interface
message queuing, Publish and Subscribe Interfaces
messaging patterns, Publish and Subscribe Interfaces
Metadata Access Point (MAP), Metadata
metadata, and service chaining, Metadata
micro-loops, Distributed Control Planes
Microsoft Windows Server, Introduction
Middlebox appliances, Middlebox Studies
Migration Working Group, Dual Function Switches
migration, virtual machine (VM), Virtual Machine Migration and Elasticity
Mininet, Mininet
mobile policy systems, Wire Protocol
mobile service providers, NFV in, NFV in Mobility
modern orchestration, Modern Orchestration, OpenStack, CloudStack, Puppet, Orchestration
CloudStack, CloudStack
defacto standards in, Modern Orchestration
OpenStack, OpenStack
Puppet, Puppet
of virtualized multitenant data centers, Orchestration
modern programmatic interfaces, Modern Programmatic Interfaces (see programatic interfaces)
modify action, in OpenFlow, Wire Protocol
MPLS Traffic Engineering Database (MPLS TED), Relationship to the idealized SDN framework
multichassis system design, Complexity and its resulting fragility
multienterprise vs. multitenancy, The Multitenant Data Center
multilayered network typologies, Network Topology, Big Data and Application Hyper-Virtualization for Instant CSPF
Multiprotocol Label Switching (MPLS), Assumptions, The Control Plane, Why Can Separation Be Important?, Creating the MPLS Overlay, Overlay Example Using PCE Provisioning
advantages of, Overlay Example Using PCE Provisioning
architecture of, Why Can Separation Be Important?
formation of, The Control Plane
function of, Assumptions
overlay creation, Creating the MPLS Overlay
multitenant data centers, Introduction, CloudStack, The Multitenant Data Center

N

NETCONF-based controllers, General Concepts
NETMOD (NETCONF Data Modeling Language), NETCONF and NETMOD
network abstraction, General Concepts
Network Access Control (NAC), Network Access Control ReplacementNetwork Access Control Replacement, Extending the Use Case with a Virtual Firewall
network application development frameworks, Build Code First; Ask Questions Later...
Network Change Modeling, Traditional Methods
network compiler concept, Conclusions
Network Configuration Protocol (NETCONF), NETCONF and NETMOD, Traditional Methods
Network Domain Specific Language (DSL), Trema
Network Functions Virtualization (NFV), Foreword by David Ward, General Concepts, Introduction, Virtualization and Data Plane I/O, Virtualization and Data Plane I/O, Services Engineered Path, Service Locations and ChainingScale, NFV at ETSINFV at ETSI, Non-ETSI NFV WorkPlatform Virtualization, Conclusions, Network Function Virtualization (NFV)
and data center growth, General Concepts
data plane I/O, Virtualization and Data Plane I/O
European Telecommunications Standards Institute (ETSI) work, NFV at ETSINFV at ETSI
non-ETSI work, Non-ETSI NFV WorkPlatform Virtualization
practical application of, Conclusions
reliability concerns, Virtualization and Data Plane I/O
roots of, Introduction
and SDN, Foreword by David Ward
and service chaining, Network Function Virtualization (NFV)
Service Engineered Path (SEP), Services Engineered Path
service locations, Service Locations and ChainingScale
network interoperation, Conclusions
Network Operating System (NOS), The Juniper SDN Framework
network overlays, Network Overlays
network policy control, Policy
network port mapping, The Firewall
network programmability, Foreword by David Meyer, Introduction, Introduction, The Management Interface, The Application-Network DivideThe MIB (management information base), Modern Programmatic InterfacesJSON, I2RSI2RS, Modern OrchestrationPuppet, The Juniper SDN Framework, The Juniper SDN Framework, Conclusions
application-network divide, The Application-Network DivideThe MIB (management information base)
controllers as proxies, Conclusions
goals of, Introduction
history of, Foreword by David Meyer
I2RS, Introduction, I2RSI2RS
Juniper framework, The Juniper SDN Framework, The Juniper SDN Framework
management interfaces, The Management Interface
modern orchestration, Modern OrchestrationPuppet
modern programmatic interfaces, Modern Programmatic InterfacesJSON
network re-optimization, Analytics, Big Data and Application Hyper-Virtualization for Instant CSPF
network topology, Assumptions, The Control Plane, The Control Plane, Introduction, Network Topology, Network Topology, Network Topology, Network Topology, Traditional Methods, LLDP, BGP-TE/LS, ALTO, I2RS TopologyI2RS Topology, Conclusions
active vs. inactive information, Introduction
Application-Layer Traffic Optimization (ALTO), ALTO
BGP-TE/LS, BGP-TE/LS
classical types of, Network Topology
data set storage, The Control Plane
definition of, Assumptions, Network Topology
hybrid/layered, Network Topology
I2RS, I2RS TopologyI2RS Topology
importance of, Conclusions
layer 2/layer 3 networking, The Control Plane
Link Layer Discovery Protocol (LLDP), LLDP
pre-SDN methods, Traditional Methods
visual display of, Network Topology
network underlays, SDN Solutions for the Data Center Network
network virtualization, Introduction, General Concepts, Nicira
Network Virtualization using Generic Routing Encapsulation (NVGRE), NVGRE, OpenFlow, Network Overlays, Network Overlay Types
functionality of, NVGRE
network overlay types, Network Overlay Types
network overlays, Network Overlays
OpenFlow, OpenFlow
Nicira, Nicira
nodes, definition of, Network Topology
normal port, Wire Protocol
northbound interface, Assumptions, API
definition of, Assumptions
Open Daylight Project and, API
NOX/POX, NOX/POX

O

object identifiers (OIDs), The MIB (management information base)
of-config protocol, Config and Extensibility, Config and Extensibility
Onix controller model, OpenFlow-Related
Open Daylight Project, Introduction, SDN(P), Open Daylight Controller/FrameworkAnalytics
Open Network Research Center (ONRC), Architecture
Open Networking Foundation (ONF), Foreword by David Meyer, Introduction, Evolution versus Revolution, Introduction, Multiple Definitions of SDN
Open Systems Interconnection (OSI) model, Assumptions
Open Virtual Format (OVF), NFV at ETSI
Open vSwitch (OVS), Nicira, Tunnels terminated at the vSwitch
Open vSwitch Data Base Management Protocol (OVSDB), Nicira
OpenFlow protocol, Introduction, Conclusions, Introduction, Introduction, Introduction, Introduction, Wire Protocol, Wire Protocol, Wire Protocol, Wire Protocol, Wire Protocol, Wire Protocol, Replication, FAWG (Forwarding Abstraction Workgroup), FAWG (Forwarding Abstraction Workgroup), Config and Extensibility, Config and Extensibility, Config and Extensibility, Config and Extensibility, Config and Extensibility, Config and Extensibility, Config and Extensibility, Architecture, Architecture, Hybrid ApproachesDual Function Switches, Dual Function Switches, Conclusions, OpenFlow-Related, OpenFlow, OpenFlow Provisioned Example, Network Access Control Replacement, Extending the Use Case with a Virtual Firewall
abstraction shortcomings, FAWG (Forwarding Abstraction Workgroup), Conclusions
architecture of, Introduction, Architecture
config and extensibility, Config and Extensibility
config/wire protocols relationship, Config and Extensibility
controller components, Architecture
creation of, Introduction, Introduction
dual function switches, Dual Function Switches
extensibility of, Wire Protocol, Config and Extensibility, Config and Extensibility
forwarding model in, FAWG (Forwarding Abstraction Workgroup)
hybrid approaches, Config and Extensibility, Hybrid ApproachesDual Function Switches
key components of, Introduction
lack of standardization in, Conclusions
modify action in, Wire Protocol
network access control with, Network Access Control Replacement, Extending the Use Case with a Virtual Firewall
Onix design controllers, OpenFlow-Related
operator control in, Wire Protocol
packet replication in, Replication
parts of, Introduction
port types in, Wire Protocol
progression of enhancements, Config and Extensibility
underlay networks and, OpenFlow
use case example, OpenFlow Provisioned Example
wire protocol, Wire Protocol
wire version 1.0 primitives, Wire Protocol
wire/configuration merge, Config and Extensibility
OpenStack, OpenStack
operating system virtualization, Introduction
operational expenditure (OPEX), Cost
optical switch configuration, Config and Extensibility
orchestration, Modern Orchestration (see modern orchestration)
ordered/priority queuing, XMPP
out-of-band connectivity, OpenFlow and PCE Topologies
overlay concept, Evolution versus Revolution
overlay, creating MPLS, Creating the MPLS Overlay

P

Packet Design’s Route Explorer, Traditional Methods
packet processing, Data Plane, Moving Information Between Planes, Wire Protocol, Replication, FAWG (Forwarding Abstraction Workgroup), LLDP, Firewalls as a Service
fast path for, Data Plane
forwarding abstraction, FAWG (Forwarding Abstraction Workgroup)
forwarding modes, Wire Protocol
moving between planes, Moving Information Between Planes
packet_in/packet_out messages, LLDP
replication, Replication
virtual firewalls and, Firewalls as a Service
packet_in/packet_out messages, LLDP
Pan, Ping, I2RS
path availability, Introduction
path computation engine (PCE) servers, Layer 3 Centric, RSVP-TE problem statementRelationship to the idealized SDN framework, Overlay Example Using PCE Provisioning
PCE provisioning, Overlay Example Using PCE Provisioning
per-subscriber traffic steering, NFV in Mobility
performance data, Analytics
physical links, Network Topology
physical topology, Assumptions
platform as a service (PaaS), The Multitenant Data Center
platform virtualization, Platform Virtualization
Plexxi Systems, Plexxi, Hybrid overlay-underlay approach
plug-in contribution model, SDN(P)
policy control, Policy
port types, in OpenFlow, Wire Protocol
primitives, OpenFlow v. 1.0, Wire Protocol
process interaction, Complexity and its resulting fragility
programmatic interfaces, Modern Programmatic Interfaces, Publish and Subscribe Interfaces, XMPP, Google’s Protocol BuffersComment [tom3]: Patrick, do we want a reference/footnote on a title or later in the text?, Thrift, JSON
Extensible Messaging and Presence Protocol, XMPP
Google’s protocol buffers, Google’s Protocol BuffersComment [tom3]: Patrick, do we want a reference/footnote on a title or later in the text?
JSON, JSON
key attributes of, Modern Programmatic Interfaces
Publish-Subscribe interfaces, Publish and Subscribe Interfaces
Thrift, Thrift
proof-of-concept application, The Juniper SDN Framework
.proto files, Google’s Protocol BuffersComment [tom3]: Patrick, do we want a reference/footnote on a title or later in the text?
protocol buffers, Google’s Protocol BuffersComment [tom3]: Patrick, do we want a reference/footnote on a title or later in the text?
protocols, The Management Interface, XMPP, BGP-TE/LS, Build Code First; Ask Questions Later...
communication protocols, XMPP
in management interfaces, The Management Interface
mono-protocol culture, Build Code First; Ask Questions Later...
routing protocols, BGP-TE/LS
proxy control points, Conclusions
Publish-Subscribe (pub-sub) interfaces, Publish and Subscribe Interfaces
publishers, Publish and Subscribe Interfaces
punt paths, Data Plane
Puppet, Puppet, Puppet (DevOps Solution)
purpose-driven network elements, Why Can Separation Be Important?

Q

quality of service (QoS) policies, Data Plane

R

recursion, Creating the IP Underlay
redundancy, High Availability
remote procedure call (RPC), NETCONF and NETMOD, Google’s Protocol BuffersComment [tom3]: Patrick, do we want a reference/footnote on a title or later in the text?
replication, Replication
RESTful (representational state transfer) APIs, General Concepts, Enhancing the Controller
Round Trip Time (RTT), Data Center Distributed Computing Pitfalls to Consider
Route Explorer, Traditional Methods
route recursion, Creating the IP Underlay
route reflectors, Route Servers, Conclusions
route servers, Route Servers, Conclusions
RouteFlow architecture, Dual Function Switches
routers, definition of, Assumptions
routing information base (RIB), The Control Plane
Routing Locator (RLOC), Locator ID Split (LISP)
Routing System Working Group (IETF), Foreword by David Meyer
RSVP-TE networks, RSVP-TE problem statement
Ryu, Ryu

S

scalability, Scale matters, Logical Versus Literal, VMware, Conclusions, Conclusions, Publish and Subscribe Interfaces, Scale, Scaling and Performance Considerations
of centralized control planes, Logical Versus Literal
in data center orchestration, Scaling and Performance Considerations
of VMware, VMware
in OpenFlow environment, Conclusions
of pub-sub model, Publish and Subscribe Interfaces
of routing/switching system, Scale matters
and SDN controllers, Conclusions
and service chaining, Scale
schema sharing, The Multitenant Data Center
SDN controllers, Introduction, Introduction, General Concepts, General Concepts, General Concepts, General Concepts, VMwareVMware, Nicira, Relationship to the idealized SDN framework, OpenFlow-Related, Mininet, NOX/POX, Trema, Ryu, Big Switch Networks/Floodlight, Layer 3 CentricRelationship to the idealized SDN framework, Plexxi, Cisco OnePK, Conclusions, Conclusions, Conclusions, Conclusions, Conclusions, Conclusions, Conclusions, NFV at ETSI, Build Code First; Ask Questions Later...
attributes in common, Conclusions
Big Switch Networks/Floodlight, Big Switch Networks/Floodlight, Conclusions, Conclusions
Cisco OnePK, Cisco OnePK, Conclusions
functionality of, Introduction
general concepts of, General Concepts
idealized controller/framework, General Concepts
layer 3 centric, Layer 3 CentricRelationship to the idealized SDN framework
Mininet, Mininet
as network application development frameworks, Build Code First; Ask Questions Later...
as new management entities, NFV at ETSI
Nicira, Nicira
NOX/POX, NOX/POX
OpenFlow-related, OpenFlow-Related
Plexxi Systems, Plexxi
products available, General Concepts
and proprietary techniques, Conclusions
Ryu, Ryu
services provided by, Introduction, General Concepts
Trema, Trema, Conclusions
varied meaning of, Conclusions
VMware, VMwareVMware
VMware/Nicira portfolio, Relationship to the idealized SDN framework
SDN frameworks, Introduction, Build Code First; Ask Questions Later..., The Juniper SDN Framework, IETF SDN Framework(s), Open Daylight Controller/FrameworkAnalytics, Conclusions
bidirectional communication in, Conclusions
IETF framework(s), IETF SDN Framework(s)
interoperability and, Build Code First; Ask Questions Later...
Juniper Networks, The Juniper SDN Framework
Open Daylight controller/framework, Open Daylight Controller/FrameworkAnalytics
standardization of, Introduction
SDN(P) (Software-Driven Network Protocol), IETF SDN Framework(s)
segment routing, Relationship to the idealized SDN framework
service abstraction layer (SAL), Open Daylight Controller/Framework
service chaining, Service Locations and ChainingScale, Platform Virtualization, Conclusions, Network Function Virtualization (NFV), Firewalls as a Service
Service Enabling Technologies (SETs), Services Engineered Path
Service Engineered Path (SEP), Services Engineered Path
service-oriented architecture (SOA), history of, Foreword by David Ward
Ships in the Night (SIN) model, Ships in the Night
Simple Network Management Protocol (SNMP), NETCONF and NETMOD, SNMPThe MIB (management information base), Traditional Methods
slow path lookups, Data Plane
software as a service (SaaS), The Multitenant Data Center
software paths, Data Plane
software-defined networking (SDN), Foreword by David Meyer, Foreword by David Ward, Foreword by David Ward, Foreword by David Ward, Preface, Assumptions, Introduction, Introduction, Centralized and Distributed Control and Data Planes, Why Can Separation Be Important?, Introduction, The Application-Network Divide, Conclusions, Conclusions, What Is True About SDN?, Economics, Multiple Definitions of SDN, Are We Making Progress Yet?
benefits of, Foreword by David Ward
control point controversy, Conclusions
control/data plane separation, Centralized and Distributed Control and Data Planes, Why Can Separation Be Important?
definition of, Foreword by David Ward, Preface, Introduction, Introduction, Multiple Definitions of SDN
economic result of, Economics
effect on future mode of operation (FMO), What Is True About SDN?
evolution of, Introduction
future of, Are We Making Progress Yet?
history of, Foreword by David Meyer, Foreword by David Ward
prerequisites to learning, Assumptions
service chains and, Conclusions
tight feedback loop in, The Application-Network Divide
software-driven networks, Introduction
southbound interface, Assumptions, API
definition of, Assumptions
Open Daylight Project and, API
Spanning Tree Protocol, VLANs
Spring development environment, VMware
SR-IOV, Data Plane I/O
standardization, Introduction
state storage, High Availability and State Storage
stateful PCE (PCE-P), Overlay Example Using PCE Provisioning
stateless control points, Conclusions
store-and-forward path, Introduction
subscribers, Publish and Subscribe Interfaces
Swift and Cinder, OpenStack
switched virtual circuits (SVCs), ATM/LANE
switches, Assumptions, Dual Function Switches
dual function, Dual Function Switches
OSI model layer of, Assumptions
syndication protocols, Publish and Subscribe Interfaces

T

table type patterns (TTPs), FAWG (Forwarding Abstraction Workgroup), FAWG (Forwarding Abstraction Workgroup)
templates, for data center orchestration, Puppet (DevOps Solution)
tenant private networks, The Virtualized Multitenant Data Center
terminal nodes, Network Topology
tethering, NFV in Mobility
threat migration, Intrusion Detection/Threat Mitigation
three-tiered application architecture, Virtual Machine Migration and Elasticity
Thrift, Thrift
tight coupling, Publish and Subscribe Interfaces, The Multitenant Data Center
topic-based filtering, Publish and Subscribe Interfaces
topological information abstraction, Introduction
topological layering, Network Topology
topologies, types of, Assumptions
traffic engineering (TE) networks, RSVP-TE problem statement, Locator ID Split (LISP)
traffic engineering database (TED), BGP-TE/LS, Overlay Example Using PCE Provisioning
traffic monitoring, Introduction, The FirewallFirewalls as a Service, Network Access Control ReplacementNetwork Access Control Replacement, Extending the Use Case with a Virtual Firewall, Feedback and Optimization, Intrusion Detection/Threat Mitigation
feedback/optimization and, Feedback and Optimization
firewalls, The FirewallFirewalls as a Service
general premise of, Introduction
Intrusion Detection/Threat Mitigation System (IDS), Intrusion Detection/Threat Mitigation
network access control replacement, Network Access Control ReplacementNetwork Access Control Replacement
virtual firewall use case, Extending the Use Case with a Virtual Firewall
traffic shaping, The Firewall
traffic steering, Intrusion Detection/Threat Mitigation
transitional/integrated service virtualization, Platform Virtualization
Transmission Control Protocol (TCP), Assumptions, XMPP
and XMPP deployment model, XMPP
function of, Assumptions
Transport Discussion Group, Config and Extensibility
transport network management, Config and Extensibility
Trema, Trema, Conclusions
Trema OF controller, Build Code First; Ask Questions Later...
two-stage asynchronous loss, Moving Information Between Planes
typology management system, Traditional Methods

U

underlay concept, Evolution versus Revolution
User Datagram Protocol (UDP), Assumptions

V

video feeds, multipathing for, Replication
Virtio, Data Plane I/O
Virtual Ethernet Port Extension (VEPA), Virtualization and Data Plane I/O
Virtual Extensible LAN (VxLAN), VxLan
virtual machine mobility (VM mobility), Introduction, Introduction, Virtual Machine Migration and Elasticity, Data-Driven Learning
virtual machine state, creation of, Creating Tenant and Virtual Machine State
virtual private networks (VPNs), types of, Introduction
virtual Provider Edge (vPE) concept, Layer 3 Centric
virtual Route Reflector (vRR), Platform Virtualization
Virtual Tunnel Endpoints (VTEPs), VxLan
virtualization survey, methods of, Virtualization and Data Plane I/O
virtualized firewalls, Firewalls as a Service, Extending the Use Case with a Virtual Firewall
virtualized multitenant data centers, The Virtualized Multitenant Data Center, Orchestration, Connecting a Tenant to the Internet/VPN, Virtual Machine Migration and Elasticity, Data Center Interconnect (DCI), Fallacies of Data Center Distributed Computing, Data Center Distributed Computing Pitfalls to ConsiderSummary comparison of VPLS and EVPN for DCI
architecture of, The Virtualized Multitenant Data Center
data center interconnect (DCI), Data Center Interconnect (DCI)
fallacies of, Fallacies of Data Center Distributed Computing
Internet/VPN connection, Connecting a Tenant to the Internet/VPN
orchestration of, Orchestration
pitfalls to consider, Data Center Distributed Computing Pitfalls to ConsiderSummary comparison of VPLS and EVPN for DCI
virtual machine (VM) migration, Virtual Machine Migration and Elasticity
VLANs (Virtual Local Area Networks), VLANs for DCI, VLANs
VM (virtual machine) migration, Virtual Machine Migration and Elasticity
VMotion solution, Data Center Distributed Computing Pitfalls to Consider
VMware, Introduction, VMwareVMware, Introduction, Data Center Distributed Computing Pitfalls to Consider
VMware/Nicira portfolio, Relationship to the idealized SDN framework
vSphere Distributed Switch (VDS), VMware
vSwitches (virtual switches), The Virtualized Multitenant Data Center, Tunnels terminated at the vSwitch

W

Wainewright, Phil, The Multitenant Data Center
Ward, David, I2RS
web syndication protocols, Publish and Subscribe Interfaces
WiFi tethering, NFV in Mobility
wire protocol, in OpenFlow, Wire Protocol

X

XMPP Standards Foundation, XMPP