1 Scope
2 References
3 Definitions
4 Abbreviations and acronyms
5 Conventions
6 Policy enforcement architecture and common use cases of DPI
6.1 Background and policy enforcement architecture
6.2 Common use cases of DPI
6.3 DPI use case: Network-oriented versus link-oriented DPI
7 Application scenarios in next generation networks
8 Application scenarios in enterprise networks
8.1 Use DPI to guarantee the information security of the enterprise
network
8.2 Use DPI to improve internal resources utility of the
enterprise network
8.3 Enterprise internal management optimization
9 Application scenario of deep packet inspection in SDN
9.1 SDN defined by ITU-T and ONF
9.2 SDN defined by ONF
10 Security considerations
Bibliography