Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
About This E-Book Title Page Copyright Page Dedication Page Contents Acknowledgments About the Author Introduction
Whiteboards Who Is This Book For, and What Will You Get Out of It? How This Book is Organized
Part 1: Virtualization 101: The Basics of Virtualization Part 2: Virtualization 201: Virtualizing the Data Center (a.k.a. Clouds) Part 3: Network Functions Virtualized: Why Stop With Servers? Part 4: Modern Networking Approaches to Virtualization Part 5: Software Defined Networks: Virtualizing the Network Part 6: SDN Controllers Part 7: Virtualized Networks: Connecting It All Together Part 8: Security: The Security Thing Part 9: Visibility Part 10: The Big Picture
Part 1: Virtualization 101: The Basics of Virtualization
1. Primer on Virtualization
Server Proliferation, Massive Power Bills, and Other IT Nightmares How Servers Work How VMs Fix the Underutilized Server Problem Enter the Hypervisor Why Are Virtual Machines Such a Big Deal?
2. Benefits of Virtual Machines
Reduced Cost Less Space (Even More Cost Savings) Availability and Flexibility Faster Application Spin-Up and Provisioning Easier Access for Development Believe the Hype!
3. Hypervisors (VMWare, KVM, and Others)
An Operating System for Operating Systems A Virtual Machine Monitor Types of Hypervisors Hypervisor Vendors
KVM Xen VMware ESXi Microsoft Hyper-V
Choosing a Hypervisor Summary
4. Managing Virtual Resources
What Is a Workload? Managing Virtual Resources in the Hypervisor Virtual Resource Providers and Consumers So How Do You Manage Virtual Resources?
Part 2: Virtualization 201: Virtualizing the Data Center (a.k.a. Clouds)
5. Virtualized Data Centers (Some Call Them Clouds)
Benefits of Virtualizing the Data Center
Less Heat Buildup Reduced Hardware Spend Faster Deployment Testing and Development Faster Redeploy Easier Backups Disaster Recovery Server Standardization Separation of Services Easier Migration to the Cloud
Is It a Cloud Yet? The Five Cloud Attributes
On-Demand Self-Service Ubiquitous Network Access Pay Per Use Rapid Elasticity Location-Independent Resource Pooling
Types of Clouds
Software as a Service Infrastructure as a Service Platform as a Service
Cloud Deployment Models
Private Clouds Shared Multitenant Clouds Public Clouds Hybrid Clouds
6. Virtual Machine Connectivity
Networking in Traditional Data Centers Virtualized Data Center Design Addressing with Virtual Machines
7. Networking Gear in Virtualized Data Centers
The Evolution of Data Center Switching Cloud and Data Center Layout and Architecture Virtualized Aware Network Switches
8. VMware, VSphere, VMotion, and VXLAN
VMware Product Design
vSphere VMotion VXLAN
Summary
9. Multitenancy and the Problems of Communal Living
SaaS Multitenancy
Pros and Cons of SaaS Multitenancy
IaaS Multitenancy
Pros and Cons of IaaS Multitenancy
Part 3: Network Functions Virtualized: Why Stop With Servers?
10. How Do You Virtualize a Network?
Network Virtualization How Does This Fit with NFV and SDN?
Server Virtualization Network Virtualization Network Functions Virtualization Software-Defined Networking
Virtualizing the Network
11. Virtualizing Appliances
Layer 4 Through 7 Network Services
Firewalls VPNs SSL Offload Load Balancer
Fighting Virtualization with Virtualization What’s the “So What”?
12. Virtualizing Core Networking Functions
Virtualization Recap Where Core Functions Are Being Virtualized
13. What About Scalability and Performance?
Scalability Versus Performance Performance in Network Virtualization Scalability and Performance in Virtual Networks Scalability and Performance for Virtual Appliances Scalability and Performance of Virtualized Networks Summary
Part 4: Modern Networking Approaches to Virtualization
14. From Consumers to Creators
The Emergence of SaaS Cloud Business Consumer-Creators
15. OpenFlow
OpenFlow History How OpenFlow Works
16. VMware Nicira
VMware NSX
Network Virtualization with NSX How VMware Leverages Nicira (NSX)
17. Cisco Insieme
Cisco’s Hybrid SDN Solution Cisco SDN and Insieme
18. OpenStack
Applications on Modern Networks
Part 5: Software Defined Networks: Virtualizing the Network
19. The Evolution of the Data Center Network
Networks Worked Great, Until They Didn’t Traditional Data Center Design Goals
High Availability Low Latency Scalability Security
The Cost Model Explodes How We Got Here
20. What’s Wrong With the Network We Have?
A Brief Review of Networking
Control Planes and Forwarding Planes The Cost of Complexity Decoupling Networking Applications from Networking Gear
21. How SDN Works
Understanding SDN
The Application Layer The Control Layer The Infrastructure Layer
A Programmable Network So What’s the “So What?”
22. The Economic Impact of SDN, NFV, and the Cloud
Winners in SDN, NFV, and the Cloud
How the “Little Guy” Wins How Large Enterprises Win with SDN, NFV, and the Cloud
Losers in the Cloud The Economic Value of Increased Innovation
Part 6: SDN Controllers
23. SDN Controllers
Centralized Control
Commercial Versus Open Source Controllers
Network Virtualization
24. The OpenDaylight Project
How the ODL Architecture Works The ODL Controller Platform
25. The Fight to Control Your Network
Separation of Internal Controls You Can See It, But Who Controls It?
26. What’s the Business Case for SDN?
SDN Use Case Examples
Data Center Optimization Network Access Control Network Virtualization Virtual Customer Edge Dynamic Interconnects Virtual Core and Aggregation
Summary
Part 7: Virtualized Networks: Connecting It All Together
27. Goodbye Truck Rolls
Data Center Scale A New Maintenance Philosophy Summary
28. What If the Shoe Doesn’t Fit?
Where SDN Does Not Fit When Should You Adopt SDN? Stuck in the Middle
29. Service Chaining
Service Chaining in SDN
30. NFV: What Happens to All the Network Appliances?
How Network Appliances Are Different
Replacing Big Hardware Appliances with Many Small Virtual Appliances
When Not to Get Rid of an Appliance
Part 8: Security: The Security Thing
31. Where’s My Data, Exactly?
Storage Virtualization Storage-Area Networks Data Location and Security So What Are the Nontechnical Issues That We Need to Address? Summary
32. Preventing Data Leakage
Minimizing Data Loss Data Loss Prevention
33. Logging and Auditing
Where Logging Matters Summary
34. Encryption in Virtual Networks
Data in Motion Data at Rest Key Management Best Practices
35. Everything Old Is Now New Again
How We Got Here
The Mainframe Model The Personal Computer Model The Networked Model The Internet Model Grid Computing Model Cloud Computing Model
What We Have Learned Retro Security Considerations Recycled Ideas on Mobile and Web Apps
Part 9: Visibility
36. Overlay Networks
MPLS: The Original Virtual Network Virtual Layer 2 Designs Enter SDN Common Encapsulation Techniques
37. Network Management Tools
What’s in the Tool Bag? Tapping In Gaining Visibility
38. Quality of Experience
Deep Packet Inspection
39. Monitoring Traffic Between Virtual Switches
Getting VM Visibility Monitoring VM-to-VM traffic How VxLANs Work Creating a “Visibility Layer”
Part 10: The Big Picture
40. Pulling It All Together
Why the Network Had to Change How SDN and NFV Tie Together SDN’s Downside: A Loss of Visibility SDN Orchestration
41. How SDN and NFV Will Affect You
Operational Domains
Mobility Virtualization Virtual CPE and Service Chaining NFV and Service Orchestration WAN Optimization and Innovation Network Optimization Policy-Driven Application Provisioning and Delivery
SDN Use Cases
Network Access Control Network Virtualization Data Center Optimization Direct Inter-Connects
Embracing SDN and NFV
42. What’s Next in Networking?
Separate but Complementary Virtual Customer Premise Equipment
SDN and NFV Working Together
Summary
Index
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion