Skip to main content

Your submission was sent successfully! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates from Canonical and upcoming events where you can meet our team.Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

  1. Blog
  2. Article

Canonical
on 11 March 2015

NFV and SDN on OpenStack for network operators


Network Functions Virtualisation (NFV) and Software-Defined Networking (SDN) are two of the hottest infrastructure technologies around, particularly for telecoms and network operators wanting to map their services in a more efficient, scalable, and cost-effective way.

One of the biggest areas of interest for operators as they look to integrate those technologies is to have a quick and easy way to deploy and map them onto cloud infrastructure, particularly OpenStack. This whitepaper gives an overview of the ever-changing infrastructure landscape for network operators, and the challenges they face when implementing NFV and SDN technologies.

The eBook also presents a reference architecture for integrating NFV and SDN technologies onto Ubuntu OpenStack clouds, allowing for maximum flexibility in configuration, management, and scaling.

Download eBook

Related posts


Stefano Fioravanzo
3 March 2025

Experiment Tracking with MLFlow in Canonical’s Data Science Stack

Desktop Article

Welcome back, data scientists! In my previous post, we explored how easy it is to set up a machine learning environment with Canonical’s Data Science Stack (DSS) and run your first model using Hugging Face’s Smol Course. Today, let’s take it a step further with experiment tracking. Experimentation is at the heart of data science, ...


Amir Abdel Baki
28 February 2025

Life at Canonical: Akshara Pathak shares her experience as a new joiner in Customer Success

Ubuntu Article

As Canonical continues to grow, we have developed a unique onboarding process that enables our new hires to quickly settle and establish themselves in our globally distributed environment.  During your first few weeks, your manager will create an onboarding plan to introduce you to the business, your closest stakeholders and colleagues. Y ...


Luci Stanescu
28 February 2025

How to conduct a vulnerability assessment

Security Article

The realm of information security is fraught with jargon, as anyone who has come across vulnerability-related terms can tell you. To complicate matters further, some of these terms are used interchangeably or in contexts outside of computing. This can muddy the waters for people looking to learn about vulnerability assessments – so in thi ...