Rec. ITU-T Y.2774 (03/2019) - Functional requirements of deep packet inspection for future networks
Summary
History
FOREWORD
Table of Contents
1 Scope
2 References
3 Definitions
     3.1 Terms defined elsewhere
     3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 General requirements of deep packet inspection for future networks
7 DPI functional requirements for SDN
     7.1 Overview of DPI in a SDN context
     7.2 DPI functional requirements for SDN within an entity
     7.3 DPI functional requirements for SDN at entity level
     7.4 DPI functional requirements for SDN at the network level
          7.4.1 PIB maintenance requirements
          7.4.2 Logical link between a DPI entity and the corresponding controller
          7.4.3 Multi DPI entities cooperation
          7.4.4 Bidirectional DPI function realized by two DPI entities
          7.4.5 Controller failure
8 DPI functional requirements for NFV
     8.1 DPI functional requirements for NFV within an entity
     8.2 DPI functional requirements for NFV at the entity level
     8.3 DPI functional requirements for NFV at the network level
9 DPI functional requirements for service chaining and DPI as a service
     9.1 Overview of service chaining and DPI as a service
     9.2 DPI functional requirements for DPI as a service and service chaining
          9.2.1 Classification requirements for DPI as a service
          9.2.2 General functional requirements for DPI as a service
10 DPI functional requirements in the network virtualization context
     10.1 Overview for DPI in the network virtualization context
     10.2 User layer functional requirements
     10.3 Control layer functional requirements
     10.4 Management layer functional requirements
11 DPI functional requirements for evolving mobile networks
     11.1 Introduction of evolving mobile networks
     11.2 General requirements for DPI deployed in evolving mobile networks
     11.3 Interface requirements for DPI deployed in evolving mobile networks
     11.4 Protocol requirements for DPI deployed in evolving mobile network
12 Security considerations
13 Other considerations
Bibliography