Table of Contents

 1     Scope          
 2     References
 3     Definitions 
 4     Abbreviations and acronyms             
 5     Conventions             
 6     Policy enforcement architecture and common use cases of DPI        
        6.1     Background and policy enforcement architecture         
        6.2     Common use cases of DPI        
        6.3     DPI use case: Network-oriented versus link-oriented DPI         
 7     Application scenarios in next generation networks 
 8     Application scenarios in enterprise networks             
        8.1     Use DPI to guarantee the information security of the enterprise network         
        8.2     Use DPI to improve internal  resources utility of the enterprise network            
        8.3     Enterprise internal management optimization
 9     Application scenario of deep packet inspection in SDN          
        9.1     SDN defined by ITU-T and ONF              
        9.2     SDN defined by ONF  
10     Security considerations      
Bibliography