Network functions virtualization and software management
|
|
- Marlene Gordon
- 8 years ago
- Views:
Transcription
1 ericsson White paper Uen December 2014 Network functions virtualization and software management LEVERAGING THE FULL POTENTIAL WITH NETWORK SLICING Network Functions Virtualization technology allows for easier creation and expansion of separate logical nodes and functions for a specified group of traffic and signaling, often referred to as a network slice. In turn, network slicing opens up a new way of achieving in-service software management at the network level.
2 The purpose of NFV Network Functions Virtualization (NFV) is commonly described as a network architecture concept that uses IT virtualization technologies to virtualize entire classes of network node functions into building blocks that may be connected or chained together to create communication services. The initial interest in introducing NFV into telecom has, to a large extent, been driven by the desire to decrease costs through the use of generic hardware platforms as well as the separation of software and hardware lifecycles. This discussion has subsequently been combined with promises of increased efficiency from the IT industry when running networking applications in virtual machines within data centers. As the discussion has progressed, it has shifted further towards efficient management and improved time-to-market for new services. Some of the most promoted benefits of NFV include: Flexibility easier and quicker installation and provisioning of the network, which allows for more rapid service deployments. Cost the above-mentioned flexibility has the potential to lower costs for managing services deployed in a network, as well as managing the network itself. Scalability introduction of software services allows for easier scaling of available hardware resources. By scaling resource needs up and down over the course of the day and expanding capacity over time or in reaction to extraordinary events, it would be possible, for some use-cases, to increase the utilization of the equipment and allow for more efficient use of investments in the installed compute power. Security security has been and continues to be, along with virtualization, a major challenge in networking. Operators want to be able to provision and manage the network in a secured manner, and NFV helps them achieve security and integrity through separation and isolation (as long as the environment is secured). Rapid deployment in another network to better meet user needs, service providers want the ability to deploy their offerings anywhere in the world. Virtualization simplifies this. For NFV to become really useful, software-defined networking (SDN) technology is required. SDN allows computer-network administrators to manage network services by hiding physical deployments and presenting them as virtualized services. Network services also need to be virtualized in order to reach the same level of flexibility and achieve the advertised simplifications and gains of NFV. Without this, it is not possible to realize many of the promises of NFV in the data center. The introduction of SDN adds even more potential to NFV, as traffic no longer needs to be steered based on IP addresses alone. With SDN technology, it can instead be handled on a per-flow basis, which allows for fine granular control of the traffic, with service-chaining solutions of subscriber policies serving as good examples. SDN may, of course, also be used to steer which path to use when several functionally identical paths are available. NETWORK FUNCTIONS VIRTUALIZATION AND SOFTWARE MANAGEMENT THE PURPOSE OF NFV 2
3 Network slicing A logical instantiation of a network is often called a network slice. Network slices are possible to create with both legacy platforms and network functions, but virtualization technologies substantially lower barriers to using the technology, for example through increased flexibility and decreased costs. Currently, management of networks is mostly about managing individual network elements. One of the major ideas behind NFV is to automate management for the entire network so that complex network-spanning tasks are easier to perform. Integration of different NFV components will still be a complex task for the operator, but on the other hand NFV allows an entire network to be delivered as a pre-integrated network slice. Another aspect of management and network slicing is setting up separate management domains for different network slices. This may allow for completely separate management of different parts of the network that are used for different purposes. Examples of use cases include mobile virtual network operators (MVNOs) and enterprise solutions. This kind of network slice would, in current Evolved Packet Core (EPC) networks, only cover the PDN gateway (PGW) and the policy control resource function (PCRF). However, for machine type communication (MTC) and machine-tomachine (M2M) solutions, it is likely that it would also cover the Mobile Management Entities (MMEs) and Serving Gateways (SGWs). Separation of management may also be expanded into security aspects. Separate management per network slice, as described above, is a first step towards this, but by using network slicing it would be possible to deploy virtual network functions (VNFs) in separate networks with separate configuration and network topology. Add to this the potential to run VNFs on dedicated hardware, which provides more predictive characteristics as well, and it is obvious that improved security and improved quality of service assurance are also important aspects of network slicing technology. When the operator sources a complete network slice from a single vendor, the vendor can deploy a network optimized for a selected set of terminals according to policy and behavior. The network slice may, for example, be resilient to hardware and software failures, or it may be optimized for signaling intensive behaviors, such as in machine-to-machine terminals. When a network slice covers only a part of the network topology, it is called a sub-network slice, which indicates that network slicing can also be hierarchical. The most commonly used containment of network slices in EPC is the PGW and PCRF in the same slice. Since the PGW selects the PCRF and the Access Point Name (APN) name is used for PGW selection from the MME, the selection mechanisms employed here are often already in use in legacy networks. But with network slicing in the data center, they are likely to be even more commonly used. It is also likely that there will be dedicated PGWs and PCRFs for many different deployments, both small and large. Adding a SGW to the previous network slice of a PGW and PCRF and thereby creating another level of network slicing (while still supporting connections from other SGWs to the PGW) is a solution that is of interest when co-located SGWs and PGWs are used. As specified by 3GPP, the SGW selection in the MME can take the selected PGW into account. Throughout this paper, virtualized EPC networks and other mobile network solutions will be used as specific examples, although the generic principles are just as applicable to other scenarios such as fixed broadband access, legacy platforms and other networking nodes. Figure 1: Examples of network slices in an Evolved Packet Core deployment. NETWORK FUNCTIONS VIRTUALIZATION AND SOFTWARE MANAGEMENT NETWORK SLICING 3
4 Using network slicing for software upgrades Network slicing is not only used for simplifying the management of the network when running it with a static function set. It also has the potential to make changes to the functionality realized by networking functions. One of the more costly processes when managing an operator network is to upgrade networking software. This process includes many complex and costly tasks, such as maintaining a parallel network deployment for testing new software and configurations, including validation of compatibility of the different software versions of different networking products. The process also includes validation of network configuration changes and validation of features and properties added by the vendor, as well as running the system to make sure that no issues are introduced in old functionality when upgrading the system. Another aspect to consider is that the tests in the lab network do not correspond to the actual behavior of the network in live operation. This real-world behavior might require rollback of an upgrade if issues are identified. With a complex network with many different network elements, the total time it takes to upgrade a network can be as high as the total sum of upgrading all of the network elements one by one in a row. This is often the limiting factor for adding functionality to a network. If an operator is orchestrating management for data center functionality such as VNF scaling, it also makes sense to use that particular management solution when handling software upgrades. If the management solution is orchestrating a network slice, it also makes sense to upgrade the end to end service per network slice as well. This is especially true if upgrades of the individual VNFs impact the operation and maintenance (O&M) solution and perhaps also business systems such as charging and event logging servers. This then drives an integration of O&M and business solutions. Network slicing can drastically simplify the installation, validation and on-boarding of traffic for new software versions and, at the same time, decrease risks, as the integration can be done in advance and the on-boarding can also be done step-by-step while still evaluating the functionality. This has the potential to reduce deployment time of a slice down to minutes, and validation down to hours. If something goes wrong when activating a new network slice, the step-by-step migration is available for rollbacks as well, minimizing the risk of impacting higher-prioritized active user sessions. SETTING UP A PARALLEL NETWORK SLICE FOR VALIDATION When adding new functionality to a network, the affected network elements must all be updated and verified to support both the new and legacy functionalities. This is a complex integration activity that often takes several months. To avoid problems with live networks, some of these activities are often performed in a separate lab network that is used to verify new integration of products and configurations. This lab network can then be seen as a separate slice of the operator s network, even though it only has limited connectivity to the rest of the network. Network slicing allows operators to set up a lab network in parallel with the live network in the data center environment. Here they may reuse parts of the network configuration for the live instance. By taking a snapshot of the running configuration as a baseline for the new network slice, reconfigurations can be kept at a minimum. Test tools and other validation mechanisms can then be run on this network deployment without risking the live network. When the network slice is fully tested, the same setup can be taken into live service as it is already running in the same data center environment. Other aspects of network slicing, such as security features and separate management, enhance this solution even further. NETWORK FUNCTIONS VIRTUALIZATION AND SOFTWARE MANAGEMENT USING NETWORK SLICING FOR SOFTWARE UPGRADES 4
5 CONNECT THE PARALLEL NETWORK TO THE TERMINALS If the new software deployment works well in the lab environment, it is possible to add real terminals to the setup. Depending on the networking setup, different identifiers may be of interest. As an example, selection of APN in EPC can be used to select SGW and PGW. When applicable, steering based on the International Mobile Subscriber Identity (IMSI) of an actual terminal, or even IMSI-series or PLMN-IDs, can allow actual terminals to use the live radio interfaces. This allows further verification that is hard to simulate in a test environment. With real terminals in the network slice, the KPIs from these can be compared to KPIs from the live network. For instance, if the functionality is to be the same after a software upgrade of the components in a network slice, the KPIs should scale in the same manner, which makes this validation possible to automate as well. Figure 2: Load when migrating between network slices. STEP-BY-STEP MIGRATION OF SESSIONS Once testing with friendly users has been performed, a major advantage of network slices appears. As the deployment is done on virtual resources, there are minimal obstacles preventing it from being set to live service. The needed functionality is there, including scalability. The software deployment is therefore ready to take into service. To do this, real user terminals need to start using the new network slice. With the proper selection mechanisms in place such as Domain Name System (DNS) for SGW and PGW, and in the future Dedicated Core (DECOR) for MME, with PLMN-ID possibly used in some cases (for example, for handling roamers differently) this can be implemented in a finer and more granular way. By first re-attaching terminals that have a low monthly subscription fee or are pre-paid to the new network slice, the risk to subscribers that pay for and require a better service is decreased. Monitoring of KPIs during this process allows the operator to further evaluate whether everything is working as expected. There are many aspects to consider when performing a process like this. First of all, the re-attach rate is normally within reasonable limits, as the existing EPC nodes need to cater for the signaling load of reattaching terminals. However, in this case, scaling during operation requirements is added on top, though it is usually not an issue if the application scaling triggers are dimensioned properly. The next thing that vendors need to address is that not all terminals will re-attach within reasonable time. Sessions may have a lifetime of weeks or more, and terminal sessions therefore need to be terminated sooner or later. Figure 2 shows how load moves from one network slice to the other. At the end, one can also see sessions being torn down when the network slice is taken down and the corresponding gradual activation of sessions on the other network slice that maps to that. NETWORK FUNCTIONS VIRTUALIZATION AND SOFTWARE MANAGEMENT USING NETWORK SLICING FOR SOFTWARE UPGRADES 5
6 As an example, within EPC, the MME and SGW can be relocated with an active PDN connection through mobility procedures, but the PGW cannot be upgraded with an active session (due to the anchoring of a user IP address). So for the PGW and PCRF to be re-selected, current 3GPP standards require a re-attach that would terminate any ongoing traffic. Many of the services used in a terminal in an EPC network would accept a new IP address for the session due to a re-attachment to the network without only minor service impact. For many network deployments, it is therefore permissible to throw out the PDN connection (preferably with a re-attach requirement indication in the signaling) and wait for a new PDN connection to be established. Such an establishment can then be done directly towards the new network slice, including the PGW and PCRF. Figure 3: Example of parallel EPC networks with different software version combinations and configurations. A use case that needs more attention is when a service that requires high end to end availability is running on a dedicated APN on a dedicated PGW that is not part of the upgraded network slice in EPC, which could, for instance, be a VoLTE service. Upgrading the network slice would need to support mobility procedures in between the network slices if this upgrade is to be done without service interruption. This is possible, but might not be a prioritized solution. Instead, the simplest and most obvious way to address long-lived sessions during software upgrades is to initiate a re-attach procedure from the dedicated services APN when it is suitable for that service. Then it is only the service on the dedicated APN and PGW that needs to be re-attached. This does not have to be managed together in a service-oriented network slicing deployment with mobile-broadband services; instead it may be handled together with management procedures dedicated to the service in order to decrease the end to end impact. As this example shows, when multiple coordinated connections exist, the solution becomes more complex but still easier to manage and with less service impact compared to the legacy solutions. With NFV technology and network slicing, a parallel network can therefore be easily provisioned and tested in a data center environment. It allows for easy verification and for a step-by-step approach to migrating sessions to the new network. It is also worth noting that when a single vendor delivers the software for an entire network slice, the solution for parts of the network may be pre-integrated and delivered by that vendor. This simplifies the integration activities for the operator, as the components can be sourced and maintained as a ready solution. With software upgrades based on network slicing, the value of pre-integrated software increases even further as much of the complexity of the software upgrades becomes the responsibility of the vendor. NETWORK FUNCTIONS VIRTUALIZATION AND SOFTWARE MANAGEMENT USING NETWORK SLICING FOR SOFTWARE UPGRADES 6
7 A SUMMARIZED SOFTWARE UPGRADE PROCEDURE (AN EXAMPLE USING EPC) Task: The operator wants to upgrade the network to a new software version to support new services. Pre-requisite: A set of terminals is attached to the radio network and an existing network slice of the EPC. First step: Create a new network slice. The slice is deployed with the desired software versions of the desired VNFs. The software components and versions may be pre-delivered and integrated by a single vendor, but this is not a requirement. The software is then configured according to the desired functionality. For a pure software upgrade, this is, in principle, a clone of the software configuration of the currently active network slice. If a change in behavior is to be activated, the configuration is modified accordingly. Second step: Run quality assurance procedures. When quality assurance tools are available, such as end to end test tools, these can be run to ensure that the new network slice is behaving according to expectations. The next level of assurance is to let friendly users use the network. Validation during and after such procedures can also be done through inspection of KPIs. Third step: Migration of re-activating sessions. According to existing 3GPP procedures, active sessions cannot be migrated when they are active, so migration of sessions is done during attach and re-attach procedures. The migration can be done slowly to allow for automatic inspection of KPIs in order to identify potential issues with the new software versions or configurations. It is reasonable to address the most demanding subscriptions last, as the risk of something going wrong normally decreases with time and load of the new deployment. Fourth step: Schedule re-activation of sessions. Active sessions that do not re-attach to the network will not be able to connect to a new PGW, even though the SGW and MME can be relocated. To handle this, the PGW needs to disconnect active PDN connections. One efficient way of doing this with minimal service impact is to disconnect inactive subscribers, which will disconnect sessions that have not been used for a configured time. Fallback: If there is any indication that the new network slice is not able to fulfill the requirements for the solution, it is easy to perform a fallback at any step in the process. All that is required is to update the slice selection configuration and wait for the sessions to move over. When the new slice is to be removed, or if the issues with the new slice are too troublesome, then a controlled scheduling of re-attachment procedures for active sessions on the new network slice can be initiated. NETWORK FUNCTIONS VIRTUALIZATION AND SOFTWARE MANAGEMENT USING NETWORK SLICING FOR SOFTWARE UPGRADES 7
8 Conclusion Network slicing allows an operator to put more focus on the management of network solutions driven by business cases. With network slicing, a parallel network can be set up with a new software version of the involved functionality, followed by step-by-step migration of sessions lowering the risk for the operator and ensuring minimal disruption to subscribers. Network slicing is simplified by NFV, and therefore opens up a new way of achieving telecomgrade software management at the network level by focusing on the characteristics needed for a specific business segment. As a result, it enables more efficient business models for operators while simplifying software architecture requirements, including software upgrades, on network elements such as MME, SGW and PGW. With software upgrades based on network slicing, the value of vendor pre-integrated software increases, as much of the complexity of the software upgrades can become the responsibility of the vendor. NETWORK FUNCTIONS VIRTUALIZATION AND SOFTWARE MANAGEMENT CONCLUSION 8
9 GLOSSARY APN DECOR DNS EPC IMSI M2M MME MTC MVNO NFV O&M PCRF PDN PGW PLMN-ID SDN SGW VNF Access Point Name Dedicated Core (3GPP Work Item) Domain Name System Evolved Packet Core International Mobile Subscriber Identity machine-to-machine Mobility Management Entity machine type communication mobile virtual network operator Network Functions Virtualization operation and maintenance policy control resource function Public Data Network PDN gateway Public Land Mobile Network Identifier software-defined networking Serving Gateway virtual network function 2014 Ericsson AB All rights reserved NETWORK FUNCTIONS VIRTUALIZATION AND SOFTWARE MANAGEMENT GLOSSARY 9
NFV & SDN World. Practical Approaches to NFV Orchestration Deployment. Terry McCabe CTO Mobile Business Unit
NFV & SDN World Practical Approaches to NFV Orchestration Deployment Terry McCabe CTO Mobile Business Unit May 2015 Mitel 2 2015 Mitel. Proprietary and Confidential. Mavenir 4G Customer Launches Mavenir
More informationNetwork Virtualization Mist to MUST
Network Virtualization Mist to MUST Ching-Wen Cheng ITRI ICL M100 2015.03.07 Motivation and background (ITU-T T Aspect) Objectives and motivation FNs are recommended to provide services whose functions
More informationSDN and NFV in the WAN
WHITE PAPER Hybrid Networking SDN and NFV in the WAN HOW THESE POWERFUL TECHNOLOGIES ARE DRIVING ENTERPRISE INNOVATION rev. 110615 Table of Contents Introduction 3 Software Defined Networking 3 Network
More informationHow to bridge the gap between business, IT and networks
ericsson White paper Uen 284 23-3272 October 2015 How to bridge the gap between business, IT and networks APPLYING ENTERPRISE ARCHITECTURE PRINCIPLES TO ICT TRANSFORMATION A digital telco approach can
More informationNokia Siemens Networks Flexi Network Server
Nokia Siemens Networks Flexi Network Server Ushering network control into the LTE era 1. Moving towards LTE Rapidly increasing data volumes in mobile networks, pressure to reduce the cost per transmitted
More informationNFV Management and Orchestration: Enabling Rapid Service Innovation in the Era of Virtualization
White Paper NFV Management and Orchestration: Enabling Rapid Service Innovation in the Era of Virtualization NFV Orchestration Overview Network Function Virtualization (NFV) technology, in combination
More informationEfficient evolution to all-ip
Press information June 2006 Efficient evolution to all-ip The competitive landscape for operators and service providers is constantly changing. New technologies and network capabilities enable new players
More informationNFV: What Exactly Can Be Virtualized?
NFV: What Exactly Can Be Virtualized? Jim Hodges d Senior Analyst, Heavy Reading Agenda NFV Drivers ETSI NFV Use Cases Virtualization Criteria Applying the Criteria NFV Challenges Summary 2 NFV Adoption
More informationSBC Evolution to Virtualization and Cloud Deployments. December 2015
SBC Evolution to Virtualization and Cloud Deployments December 2015 Copyright Copyright 2015 Sonus Networks, Inc. All rights reserved. This item and the information contained herein are the property of
More informationVirtualization, SDN and NFV
Virtualization, SDN and NFV HOW DO THEY FIT TOGETHER? Traditional networks lack the flexibility to keep pace with dynamic computing and storage needs of today s data centers. In order to implement changes,
More information4G Americas Bringing Network Function Virtualization to LTE November 2014 0
4G Americas Bringing Network Function Virtualization to LTE November 2014 0 TABLE OF CONTENTS Introduction...4 1. Benefits of NFV as a Concept...8 1.1 Improved Capital Efficiency...8 1.2 Operational Efficiencies...9
More informationIntel Network Builders Solution Brief. Intel and ASTRI* Help Mobile Network Operators Support Small Cell Networks
Intel Network Builders Solution Brief Intel and ASTRI* Help Mobile Network Operators Support Small Cell Networks Overview Wireless networks built using small cell base stations are enabling mobile network
More informationLeveraging SDN and NFV in the WAN
Leveraging SDN and NFV in the WAN Introduction Software Defined Networking (SDN) and Network Functions Virtualization (NFV) are two of the key components of the overall movement towards software defined
More informationLong-Term Evolution. Mobile Telecommunications Networks WMNet Lab
Long-Term Evolution Mobile Telecommunications Networks WMNet Lab Background Long-Term Evolution Define a new packet-only wideband radio with flat architecture as part of 3GPP radio technology family 2004:
More informationFROM A RIGID ECOSYSTEM TO A LOGICAL AND FLEXIBLE ENTITY: THE SOFTWARE- DEFINED DATA CENTRE
FROM A RIGID ECOSYSTEM TO A LOGICAL AND FLEXIBLE ENTITY: THE SOFTWARE- DEFINED DATA CENTRE The demand for cloud infrastructure is rapidly increasing, the world of information is becoming application and
More informationBuilding Robust Signaling Networks
ericsson White paper Uen 284 23-3268 July 2015 Building Robust Signaling Networks MEETING THE CHALLENGES OF THE RISING SIGNALING STORM Distributed signaling network robustness that follows the concept
More informationCENTER I S Y O U R D ATA
I S Y O U R D ATA CENTER R E A DY F O R S D N? C R I T I C A L D ATA C E N T E R C O N S I D E R AT I O N S FOR SOFT WARE-DEFINED NET WORKING Data center operators are being challenged to be more agile
More informationSoftware-Defined Network (SDN) & Network Function Virtualization (NFV) Po-Ching Lin Dept. CSIE, National Chung Cheng University
Software-Defined Network (SDN) & Network Function Virtualization (NFV) Po-Ching Lin Dept. CSIE, National Chung Cheng University Transition to NFV Cost of deploying network functions: Operating expense
More informationSupporting mobility in the RAN cloud
Supporting mobility in the RAN cloud Michael Fitch BT 23 rd October 2012 Cloud basics On-Demand Self-Service A consumer can provision computing capabilities, such as server time and network storage, automatically
More informationEnsuring end-user quality in NFV-based infrastructure
Ensuring end-user quality in NFV-based infrastructure Distributed NFV cloud nodes provide instant assessment of the end-user experience EXECUTIVE SUMMARY Compute resources for virtual network functions
More informationCloud Infrastructure Services for Service Providers VERYX TECHNOLOGIES
Cloud Infrastructure Services for Service Providers VERYX TECHNOLOGIES Meeting the 7 Challenges in Testing and Performance Management Introduction With advent of the cloud paradigm, organizations are transitioning
More informationSDN Interfaces and Performance Analysis of SDN components
Institute of Computer Science Department of Distributed Systems Prof. Dr.-Ing. P. Tran-Gia SDN Interfaces and Performance Analysis of SDN components, David Hock, Michael Jarschel, Thomas Zinner, Phuoc
More informationEnsuring end-user quality in NFV-based infrastructures
Ensuring end-user quality in NFV-based infrastructures Leveraging distributed NFV cloud nodes to provide instant assessment of end-user experience EXECUTIVE SUMMARY Compute resources for virtual network
More informationThe real-time cloud. ericsson White paper Uen 284 23-3219 Rev B February 2014
ericsson White paper Uen 284 23-3219 Rev B February 2014 The real-time cloud COMBINING CLOUD, NFV AND SERVICE PROVIDER SDN Operators need to ensure that their networks remain a relevant and vital part
More informationPLUMgrid Toolbox: Tools to Install, Operate and Monitor Your Virtual Network Infrastructure
Toolbox: Tools to Install, Operate and Monitor Your Virtual Network Infrastructure Introduction The concept of Virtual Networking Infrastructure (VNI) is disrupting the networking space and is enabling
More informationHow To Manage A Virtualization Server
Brain of the Virtualized Data Center Contents 1 Challenges of Server Virtualization... 3 1.1 The virtual network breaks traditional network boundaries... 3 1.2 The live migration function of VMs requires
More informationThe programmable network cloud
ericsson White paper Uen 288 23-3211 Rev B December 2015 The programmable network cloud ENRICHING THE CLOUD WITH NFV AND SDN Operators need to ensure that their networks remain a relevant and vital part
More informationNetwork Functions as-a-service over Virtualised Infrastructures T-NOVA. Presenter: Dr. Mamadu Sidibe
Network Functions as-a-service over Virtualised Infrastructures T-NOVA Presenter: Dr. Mamadu Sidibe Presentation Outline Brief introduction to NFV T-NOVA Facts T-NOVA Consortium T-NOVA Vision T-NOVA objectives
More informationWhitepaper. 10 Metrics to Monitor in the LTE Network. www.sevone.com blog.sevone.com info@sevone.com
10 Metrics to Monitor in the LTE Network The deployment of LTE increases dependency on the underlying network, which must be closely monitored in order to avert serviceimpacting events. In addition, the
More informationSOFTWARE DEFINED NETWORK AND NETWORK FUNCTIONS VIRTUALIZATION An Inevitable Evolution for Communication Networks
SOFTWARE DEFINED NETWORK AND NETWORK FUNCTIONS VIRTUALIZATION An Inevitable Evolution for Communication Networks VIKRAM NAIR Director, Technology VINOD KUMAR GUPTA Senior Technical Leader, Technology SOFTWARE
More informationTO PACKET CORE. EVOLving THE PACKET CORE TO An NFV/sdN ARCHITECTURE
The JOURNEY TO PACKET CORE Virtualization EVOLving THE PACKET CORE TO An NFV/sdN ARCHITECTURE TechNOLOGY White Paper In their efforts to become more competitive, mobile network operators (MNOs) have begun
More informationA Coordinated. Enterprise Networks Software Defined. and Application Fluent Programmable Networks
A Coordinated Virtual Infrastructure for SDN in Enterprise Networks Software Defined Networking (SDN), OpenFlow and Application Fluent Programmable Networks Strategic White Paper Increasing agility and
More informationNTT DOCOMO Technical Journal. Core Network Infrastructure and Congestion Control Technology for M2M Communications
M2M 3GPP Standardization Further Development of LTE/LTE-Advanced LTE Release 10/11 Standardization Trends Core Network Infrastructure and Congestion Control Technology for M2M Communications The number
More informationSDN in Mobile Broadband Networks
SDN in Mobile Broadband Networks Advancing the transformation of the network architecture into a highly efficient and flexible software infrastructure, ensuring best customer experience Nurit Sprecher
More information10 METRICS TO MONITOR IN THE LTE NETWORK. [ WhitePaper ]
[ WhitePaper ] 10 10 METRICS TO MONITOR IN THE LTE NETWORK. Abstract: The deployment of LTE increases dependency on the underlying network, which must be closely monitored in order to avert service-impacting
More informationWhy Service Providers Need an NFV Platform Strategic White Paper
Why Service Providers Need an NFV Platform Strategic White Paper Network Functions Virtualization (NFV) brings proven cloud computing and IT technologies into the networking domain to help service providers
More informationImplementing LTE International Data Roaming
Implementing International Data Roaming Data Roaming Standardization Implementing International Data Roaming On completion of EPC standardization at 3GPP, specifications for international roaming between
More informationThe Distributed Cloud: Automating, Scaling, Securing & Orchestrating the Edge
White Paper The Distributed Cloud: Automating, Scaling, Securing & Orchestrating the Edge Prepared by Jim Hodges Senior Analyst, Heavy Reading www.heavyreading.com on behalf of www.juniper.net October
More informationAccelerating 4G Network Performance
WHITE PAPER Accelerating 4G Network Performance OFFLOADING VIRTUALIZED EPC TRAFFIC ON AN OVS-ENABLED NETRONOME INTELLIGENT SERVER ADAPTER NETRONOME AGILIO INTELLIGENT SERVER ADAPTERS PROVIDE A 5X INCREASE
More informationAPPLICATION DELIVERY CONTROLLERS AND THEIR ROLES IN THE MOBILE NETWORK
APPLICATION DELIVERY CONTROLLERS AND THEIR ROLES IN THE MOBILE NETWORK How operators can leverage ADCs to deploy scalable, virtualized networks and enable new business models Prepared by Signals Research
More informationCenter SDN & NFV. Modern Data IN THE
SDN & NFV IN THE Modern Data Center A GUIDE TO UNDERSTANDING THE IMPACT AND BENEFITS OF SOFTWARE-DEFINED NETWORKING AND NETWORK FUNCTIONS VIRTUALIZATION TABLE OF CONTENTS OF SDN AND NFV ARE SDN AND NFV
More informationUnderstanding the Business Case of Network Function Virtualization
White paper Understanding the Business Case of Network Function Virtualization Part I of the series discusses the telecom market scenario in general, market and business drivers behind push for a building
More informationDelivery of Voice and Text Messages over LTE
Delivery of Voice and Text Messages over LTE 1. The Market for Voice and SMS! 2. Third Party Voice over IP! 3. The IP Multimedia Subsystem! 4. Circuit Switched Fallback! 5. VoLGA LTE was designed as a
More informationTesting Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES
Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES Table of Contents Introduction... 1 Network Virtualization Overview... 1 Network Virtualization Key Requirements to be validated...
More informationTransforming Service Life Cycle Through Automation with SDN and NFV
Transforming Service Life Cycle Through Automation with SDN and NFV Automated workflows improve TCO for service delivery 1 Table of Contents Executive Summary... 3 Introduction... 3 Today s Challenges...
More informationCARRIER LANDSCAPE FOR SDN NEXT LEVEL OF TELCO INDUSTRILIZATION?
CARRIER LANDSCAPE FOR SDN NEXT LEVEL OF TELCO INDUSTRILIZATION? Andreas Gladisch, Fritz-Joachim Westphal Deutsche Telekom Innovation Labs COMPLEXITY BY DOZENS OF SPECIALIZED BOXES AND THOUSANDS OF PROTOCOLS.
More informationNetwork Functions Virtualization (NFV) for Next Generation Networks (NGN)
P a g e 1 Network Functions Virtualization (NFV) for Next Generation Networks (NGN) Summary Network Functions Virtualization (NFV) has drawn industry attention. Network Virtualization aims to transform
More information2015 Spring Technical Forum Proceedings
Virtualizing the Home Network Michael Kloberdans CableLabs Abstract One of the areas of focus in the Cable industry has been a virtualized home network. This paper proposes a road map with an analysis
More informationTesting Challenges for Modern Networks Built Using SDN and OpenFlow
Using SDN and OpenFlow July 2013 Rev. A 07/13 SPIRENT 1325 Borregas Avenue Sunnyvale, CA 94089 USA Email: Web: sales@spirent.com www.spirent.com AMERICAS 1-800-SPIRENT +1-818-676-2683 sales@spirent.com
More informationVIRTUALIZING THE EDGE
VIRTUALIZING THE EDGE NFV adoption to transform telecommunications infrastructure Karthik Kailasam Director, Integrated Modular Solutions September 2015 Key Messages The transformation of telecom networks
More informationPLUMgrid Open Networking Suite Service Insertion Architecture
White Paper PLUMgrid Open Networking Suite Service Insertion Architecture Introduction A rapid increase in the use of cloud services across the globe require networks to be adaptable and flexible. PLUMgrid
More informationIntroduction to Quality Assurance for Service Provider Network Functions Virtualization
Introduction to Quality Assurance for Service Provider Network Functions Virtualization Carsten Rossenhoevel, Managing Director European Advanced Networking Test Center 2015-09-08 Company Introduction
More informationUDC IN A BOX. A complete User Data Management Solution to meet different business needs
UDC IN A BOX A complete User Data Management Solution to meet different business needs Contents ENABLING CUSTOMER CENTRIC NETWORKS MORE THAN WHAT MEETS THE EYE CONCLUSION GLOSSARY FURTHER READING 2 4 6
More informationOpenFlow-enabled SDN and Network Functions Virtualization. ONF Solution Brief February 17, 2014
OpenFlow-enabled SDN and Functions Virtualization ONF Solution Brief February 17, 2014 Table of Contents 2 Executive Summary 3 SDN Overview 4 Introduction to NFV 5 NFV Challenges 6 NFV/SDN Example Use
More informationNokia Siemens Networks Flexi Network Gateway. Brochure
Nokia Siemens Networks Flexi Network Gateway Prepare for Mobile Broadband Growth Brochure. 2/14 Brochure Table of Content 1. Towards the flat all-ip Network... 3 2. Preparing the Gateway for Mobile Broadband
More informationNEC Virtualized Evolved Packet Core vepc
TE-524262 NEC Virtualized Evolved Packet Core vepc Design Concepts and Benefits INDEX Leading the transformation into Mobile Packet Core Virtualization P.3 Openness with Carrier-Grade Quality P.4 vepc
More informationThe Promise and the Reality of a Software Defined Data Center
The Promise and the Reality of a Software Defined Data Center Authored by Sponsored by Introduction The traditional IT operational model is highly manual and very hardware centric. As a result, IT infrastructure
More informationSDN- based Mobile Networking for Cellular Operators. Seil Jeon, Carlos Guimaraes, Rui L. Aguiar
SDN- based Mobile Networking for Cellular Operators Seil Jeon, Carlos Guimaraes, Rui L. Aguiar Background The data explosion currently we re facing with has a serious impact on current cellular networks
More informationNSN Liquid Core Management for Telco Cloud: Paving the way for reinventing telcos for the cloud
NSN Liquid Core Management for Telco Cloud: Paving the way for reinventing telcos for the cloud Keynotes Liquid Core Management provides operational support for NSN Liquid Core Network, covering all mobile
More informationLTE - Can SDN paradigm be applied?
LTE - Can SDN paradigm be applied? Source of this presentation: Towards Software Defined Cellular Networks Li Erran Li (Bell Labs, Alcatel-Lucent) Morley Mao (University of Michigan) Jennifer Rexford (Princeton
More informationTowards Software Defined Cellular Networks
Towards Software Defined Cellular Networks Li Erran Li (Bell Labs, Alcatel-Lucent) Morley Mao (University of Michigan) Jennifer Rexford (Princeton University) 1 Outline Critiques of LTE Architecture CellSDN
More informationEvolved Packet Core features build resiliency and preference
High Availability is more than five nines Evolved Packet Core features build resiliency and preference The availability of mobile broadband service has become essential to daily life. Without their smartphones,
More informationSpirent CLEAR Mobility. End-to-End Mobile Network Infrastructure Test and Lab Automation Solutions
End-to-End Infrastructure Test and Lab Automation Solutions End-to-End Infrastructure Test and Lab Automation Solutions Customer Experience Automating end-to-end user experience of data, voice and video
More informationWHITE PAPER. How To Compare Virtual Devices (NFV) vs Hardware Devices: Testing VNF Performance
WHITE PAPER How To Compare Virtual Devices (NFV) vs Hardware Devices: Testing VNF Performance www.ixiacom.com 915-3132-01 Rev. B, June 2014 2 Table of Contents Network Functions Virtualization (NFV): An
More informationCDN/CLOUD/SDN/NFV FOR MULTIMEDIA SERVICES
CDN/CLOUD/SDN/NFV FOR MULTIMEDIA SERVICES Nakjung Choi, Technical Director, Bell Labs Seoul KRnet 2014, June 24 th, 2014 CONTENT Background on CDN/Cloud/SDN/NFV Video Delivery in the Existing Infrastructure
More informationVirtual CPE and Software Defined Networking
Virtual CPE and Software Defined Networking Virtual CPE and Software Defined Networking Residential broadband service providers are looking for solutions that allow them to rapidly introduce innovative
More informationControl Plane Elasticity & Virtualization in the 4G Core
White Paper Control Plane Elasticity & Virtualization in the 4G Core Prepared by Gabriel Brown Senior Analyst, Heavy Reading www.heavyreading.com on behalf of www.amdocs.com May 2013 Control-Plane Virtualization
More informationehrpd Mike Keeley Market Segment Director
ehrpd Mike Keeley Market Segment Director Agenda ehrpd What, Why, and When? ehrpd s Impact on the Core Network ehrpd s Impact on the Mobile Device Verifying ehrpd works 2 Acronyms AAA AN BSC EAP- AKA ehrpd
More informationRoland Bless, bless@tm.uka.de. Stephan Baucke Ericsson Research
Network Virtualization within FP7 EU Project 4WARD Network of the Future Roland Bless, bless@tm.uka.de Institute of Telematics, University of Karlsruhe Stephan Baucke Ericsson Research 1 4WARD Overview
More informationDelivering Managed Services Using Next Generation Branch Architectures
Delivering Managed Services Using Next Generation Branch Architectures By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by Versa Networks Executive Summary Network architectures for the WAN
More informationTechnical white paper. Enabling mobile broadband growth Evolved Packet Core
Technical white paper Enabling mobile broadband growth Evolved Packet Core Contents 3 Enabling mobile broadband growth 4 Enabling migration from current networks to LTE 4 Terminology 5 The demand for cost-effective
More informationSoftware-defined networking: the service provider perspective
The communications technology journal since 1924 Software-defined networking: the service provider perspective February 21, 2013 2013 2 New network abstraction layers 2 Software-defined networking: the
More informationDriving SDN Adoption in Service Provider Networks
WHITEPAPER Software Defined Networking (SDN) Driving SDN Adoption in Service Provider Networks This whitepaper provides an overview of key requirements and enablers for driving SDN adoption in Service
More informationNFV Forum Progression to Launch
NFV Forum Progression to Launch Laurent Laporte Technology Development Strategist Sprint September 25, 2014 Progression to NFV Forum Launch TOPS Council SDN/NFV Focus Group: NFV Landscape Assessment completed,
More informationWhite Paper - Huawei Observation to NFV
White Paper - Huawei Observation to NFV White Paper - Huawei Observation to NFV 1 NFV Overview...2 1.1 Motivation for Network Function Virtualization...2 1.2 NFV Ecosystem Is Being Built Up...3 2 Major
More informationVMware vcloud Networking and Security
VMware vcloud Networking and Security Efficient, Agile and Extensible Software-Defined Networks and Security BROCHURE Overview Organizations worldwide have gained significant efficiency and flexibility
More informationRecommendations for Performance Benchmarking
Recommendations for Performance Benchmarking Shikhar Puri Abstract Performance benchmarking of applications is increasingly becoming essential before deployment. This paper covers recommendations and best
More informationDon t Fly Blind Through the Clouds: Avoiding the Pitfalls of Virtualization
By Pablo L. Martinez, 06 May, 2014. Don t Fly Blind Through the Clouds: Avoiding the Pitfalls of ization These days, clouds don t have a silver lining. It s more like a vein of gold in particular when
More informationService Automation Made Easy
Service Automation Made Easy Networks that know how to customize the network experience for every subscriber Challenge Service providers want to quickly develop and deliver personalized services their
More informationVirtual Platforms Addressing challenges in telecom product development
white paper Virtual Platforms Addressing challenges in telecom product development This page is intentionally left blank. EXECUTIVE SUMMARY Telecom Equipment Manufacturers (TEMs) are currently facing numerous
More informationNetwork Function Virtualization Primer. Understanding NFV, Its Benefits, and Its Applications
Network Function Virtualization Primer Understanding NFV, Its Benefits, and Its Applications Table of Contents Introduction..................................... 3 NFV The Basics...................................
More informationNew Approach to Mobile Traffic Management Needed
New Approach to Mobile Traffic Management Needed The variety of smart mobile devices and the apps that run on them, made mobile broadband more successful than anyone imagined. Now more than ever, mobile
More informationVirtualization techniques for network functions. Fabrice Guillemin, Orange Labs, OLN/CNC/NCA September 14, 2015
Virtualization techniques for network functions Fabrice Guillemin, Orange Labs, OLN/CNC/NCA September 14, 2015 Introduction Network functions are today hosted by dedicated hardware, typically high performance
More informationTotal Cost of Ownership Study Virtualizing the Mobile Core
Sponsored by Affirmed Networks and VMWare July 2015 Don t wait on NFV, Immediate Cost Savings Creates Opportunity for Telcos Architecture Only one pla orm vs. Three separate pla orms to manage Capex Opex
More informationWhat is SDN all about?
What is SDN all about? Emil Gągała Juniper Networks Piotr Jabłoński Cisco Systems In the beginning there was a chaos CLOUD BUILDING BLOCKS CAN I VIRTUALIZE MY Compute Network? Storage Where is my money?
More informationADVANCED SECURITY MECHANISMS TO PROTECT ASSETS AND NETWORKS: SOFTWARE-DEFINED SECURITY
ADVANCED SECURITY MECHANISMS TO PROTECT ASSETS AND NETWORKS: SOFTWARE-DEFINED SECURITY One of the largest concerns of organisations is how to implement and introduce advanced security mechanisms to protect
More informationWHITE PAPER. Authoritative Guide to Advanced LTE Testing
WHITE PAPER Authoritative Guide to Advanced LTE Testing 26601 Agoura Road, Calabasas, CA 91302 Tel: 818.871.1800 Fax: 818.871.1805 www.ixiacom.com 915-3102-01 Rev. A, August 2013 2 Table of Contents Introduction...
More informationNetwork Operations in the Era of NFV & SDN. Chris Bilton - Director of Research & Technology, BT
Network Operations in the Era of NFV & SDN Chris Bilton - Director of Research & Technology, BT Agenda 1 2 3 4 Introduction Overview of NfV & SDN The Challenge Today s Carrier operations Contrasting Carrier
More informationBUSINESS CASE FOR MOVING DNS TO THE CLOUD STRATEGIC WHITE PAPER NFV INSIGHTS SERIES
BUSINESS CASE FOR MOVING DNS TO THE CLOUD STRATEGIC WHITE PAPER NFV INSIGHTS SERIES The cloud and NFV are being touted as the means by which service providers can improve their current operations costs
More informationSoftware Defined Security Mechanisms for Critical Infrastructure Management
Software Defined Security Mechanisms for Critical Infrastructure Management SESSION: CRITICAL INFRASTRUCTURE PROTECTION Dr. Anastasios Zafeiropoulos, Senior R&D Architect, Contact: azafeiropoulos@ubitech.eu
More informationCustomer Benefits Through Automation with SDN and NFV
Customer Benefits Through Automation with SDN and NFV Helping service providers solve specific challenges they are facing today while improving the overall customer service life cycle 1 Table of Contents
More informationTake Charge of the Cloud Platform for NFV to Maximize Success
White Paper Take Charge of the Cloud Platform for NFV to Maximize Success Prepared by Caroline Chappell Principal Analyst, Cloud & NFV, Heavy Reading www.heavyreading.com on behalf of www.vmware.com February
More informationNationwide Interoperability Framework
Nationwide Interoperability Framework Emergency Response Interoperability Center (ERIC) Public Safety Homeland Security Bureau Federal Communications Commission PSCR, Boulder, CO Dec 2, 2010 7/9/101 1
More informationALEPO IN THE VIRTUALIZED CORE NETWORK
In this Document INTRODUCTION What is NFV? NFV Drivers & Benefits Alepo Virtualized Solutions The Alepo Advantage Network Function Virtualization has dominated the conversation in the communications industry
More informationDECODING SOFTWARE DEFINED NETWORKING (SDN) Nico Siebelink Technical Director Northern Europe
DECODING SOFTWARE DEFINED NETWORKING (SDN) Nico Siebelink Technical Director Northern Europe JUNIPER AND SDN IN THE NEWS 2 Copyright 2013 Juniper Networks, Inc. www.juniper.net WHY DO WE NEED SOFTWARE
More informationEnsuring Success in a Virtual World: Demystifying SDN and NFV Migrations
Ensuring Success in a Virtual World: Demystifying SDN and NFV Migrations Get Migration Right the First Time The virtualization of traditional networks promises vast and enduring benefits if the challenges
More informationThe Virtual Ascent of Software Network Intelligence
White Paper The Virtual Ascent of Software Network Intelligence Prepared by Jim Hodges Senior Analyst, Heavy Reading www.heavyreading.com on behalf of www.windriver.com July 2013 Introduction Although
More informationETSI NFV ISG DIRECTION & PRIORITIES
ETSI NFV ISG DIRECTION & PRIORITIES San Jose, May 6th 2015 Steven Wright (AT&T), Chair ETSI NFV ISG 1 ETSI 2012. All rights reserved NFV: The Equipment Market TransformaJon Classical Network Appliance
More informationBusiness aware traffic steering
Nokia Networks Business aware traffic steering Nokia Networks white paper Business aware traffic steering Contents 1. Executive Summary 3 2. Static load or QoS-based traffic steering alone is no longer
More informationHow Network Operators Do Prepare for the Rise of the Machines
Internet of Things and the Impact on Transport Networks How Network Operators Do Prepare for the Rise of the Machines Telecommunication networks today were never designed having Inter of Things use cases
More information