ETSI GS NFV 004 V1.1.1 ( )
|
|
|
- Jewel Ball
- 10 years ago
- Views:
Transcription
1 GS NFV 004 V1.1.1 ( ) Group Specification Network Functions Virtualisation (NFV); Virtualisation Requirements Disclaimer This document has been produced and approved by the Network Functions Virtualisation (NFV) Industry Specification Group (ISG) and represents the views of those members who participated in this ISG. It does not necessarily represent the views of the entire membership.
2 2 GS NFV 004 V1.1.1 ( ) Reference DGS/NFV-0012 Keywords NFV, requirements 650 Route des Lucioles F Sophia Antipolis Cedex - FRANCE Tel.: Fax: Siret N NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N 7803/88 Important notice Individual copies of the present document can be downloaded from: The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on printers of the PDF version kept on a specific network drive within Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other documents is available at If you find errors in the present document, please send your comment to one of the following services: Copyright Notification No part may be reproduced except as authorized by written permission. The copyright and the foregoing restriction extend to reproduction in all media. European Telecommunications Standards Institute All rights reserved. DECT TM, PLUGTESTS TM, UMTS TM and the logo are Trade Marks of registered for the benefit of its Members. 3GPP TM and LTE are Trade Marks of registered for the benefit of its Members and of the 3GPP Organizational Partners. GSM and the GSM logo are Trade Marks registered and owned by the GSM Association.
3 3 GS NFV 004 V1.1.1 ( ) Contents Intellectual Property Rights... 4 Foreword Scope References Normative references Informative references Definitions and abbreviations Definitions Abbreviations General Description Introduction Objectives High level requirements General Portability Performance Elasticity Resiliency Security Service Continuity Service Assurance Operational and Management requirements Energy Efficiency requirements Coexistence with existing networks - Transition Service Models General Deployment models Service models Maintenance models Annex A (informative): Authors & contributors History... 17
4 4 GS NFV 004 V1.1.1 ( ) Intellectual Property Rights IPRs essential or potentially essential to the present document may have been declared to. The information pertaining to these essential IPRs, if any, is publicly available for members and non-members, and can be found in SR : "Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to in respect of standards", which is available from the Secretariat. Latest updates are available on the Web server ( Pursuant to the IPR Policy, no investigation, including IPR searches, has been carried out by. No guarantee can be given as to the existence of other IPRs not referenced in SR (or the updates on the Web server) which are, or may be, or may become, essential to the present document. Foreword This Group Specification (GS) has been produced by Industry Specification Group (ISG) Network Functions Virtualisation (NFV).
5 5 GS NFV 004 V1.1.1 ( ) 1 Scope The present document specifies the requirements that Telecommunications operations put on Network Functions Virtualisation in order to consolidate network equipment, belonging to fixed and mobile networks, onto industry standard high volume servers, switches and storage, which could be located in N-PoPs, Network Nodes and in end user premises. The present document addresses the requirements in the following areas: Portability/Interoperability Performance Management and Orchestration Elasticity Security Resiliency Network Stability Service Continuity Operations Energy Efficiency Migration and co-existence with existing platforms 2 References References are either specific (identified by date of publication and/or edition number or version number) or non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the referenced document (including any amendments) applies. Referenced documents which are not found to be publicly available in the expected location might be found at NOTE: While any hyperlinks included in this clause were valid at the time of publication, cannot guarantee their long term validity. 2.1 Normative references The following referenced documents are necessary for the application of the present document. [1] GS NFV 001: "Network Functions Virtualisation (NFV); Use Cases". [2] GS NFV 003: "Network Functions Virtualisation (NFV); Terminology for Main Concepts in NFV". 2.2 Informative references The following referenced documents are not necessary for the application of the present document but they assist the user with regard to a particular subject area. [i.1] NFV White paper: "Network Functions Virtualisation, An Introduction, Benefits, Enablers, Challenges & Call for Action. Issue 1".
6 6 GS NFV 004 V1.1.1 ( ) [i.2] IEEE : "IEEE Standard for a Precision Clock Synchronization Protocol for Networked Measurement and Control Systems". 3 Definitions and abbreviations 3.1 Definitions For the purposes of the present document, the terms and definitions given in GS NFV 003 [2] apply. 3.2 Abbreviations For the purposes of the present document, the following abbreviations apply: API BSS CMS CPE IMS NF NFV NFVI NIC NID NOC N-PoP OSS PNF SLA SPoF SW VM VNF VNPaaS Application Programming Interface Business Support System Cloud Management System Customer Premises Equipment IP Multimedia Subsystem Network Function Network Functions Virtualisation Network Functions Virtualisation Infrastructure Network Interface Card Network Interface Device Network Operations Centre Network Point of Presence Operations Support System Physical Network Function Service Level Agreement Single Point of Failure Software Virtual Machine Virtual Network Function Virtual Network Platform as a Service 4 General Description 4.1 Introduction Virtualisation aims to transform the way that network operators architect networks by evolving existing IT virtualisation technology and making use of cloud computing techniques in order to consolidate network equipment onto industry standard high volume servers, switches and storage, which could be located in N-PoPs, Network Nodes and in the end user premises. Virtualisation involves the implementation of network functions in software that can run on a range of industry standard hardware, enabling ubiquitous, convenient and on-demand access to a shared pool of configurable computing resources (e.g. networks, servers, storage and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.
7 7 GS NFV 004 V1.1.1 ( ) 4.2 Objectives Virtualisation brings specific benefits on efficient resource usage, resiliency and redundancy, as well as faster management of operations (e.g. SW upgrades) and enhanced time to market (e.g. to deploy new functionality less hardware dependant). However, the specific nature of the Telco environment (i.e. carrier grade requirements) imply technical challenges that the present document aims to address in order to facilitate interoperability and seamless evolution towards fully virtualised networks. The present document addresses the requirements to facilitate the assignment of infrastructure resources to virtual network functions. Specific NFV requirements will focus primarily on the differences introduced by the Network Functions Virtualisation (NFV) process, and not on aspects of the Network Functions (NF) interfaces, protocols and management that are identical whether the implementation is physical or virtual. 5 High level requirements 5.1 General [Gen.1] The NFV framework shall be able to permit Service Providers/Network Operators to partially or fully virtualise the network functions needed to create, deploy and operate the services they provide. NOTE: Partial refers to virtualisation of a specific set of functions (e.g. based on similar characteristics) within a network system/subsystem, and used for creation of certain service. For example, virtuali sation of network functions in the control plane but not the ones in the data plane. [Gen.2] In case of partial virtualisation, any impact on the performance or operation of non-virtualised network functions shall be manageable, predictable, and within the acceptable limits. [Gen.3] In case of partial virtualisation, there shall be manageable impact on the legacy management systems of the network functions that have not been virtualised. [Gen.4] The NFV framework shall be able to support a network service composed of Physical Network Functions (PNFs) and Virtual Network Functions (NFs) as a VNF Forwarding Graph implemented across N-PoP multivendor environments that may be instantiated in a single operator or in cooperating inter-operator environments. The following areas are in or out of scope: Scenario/NF Composition All Physical NFs Physical/Virtual NFs All Virtual NFs Intra-Operator Out-of-Scope In-Scope In-Scope Inter-Operator Cooperation Out-of-Scope In-Scope In-Scope 5.2 Portability [Port.1] The NFV framework shall be able to provide the capability to load, execute and move Virtualised Network Functions (VNFs) across different but standard N-PoP multivendor environments. [Port.2] The NFV framework shall support an interface to decouple VNF associated software instances from the underlying infrastructure. [Port.3] The NFV framework shall be able to provide the capability to optimize the location, reservation and allocation of the required resources of the Virtualised Network Functions (VNFs). NOTE: The portability requirements expose gaps such as binary compatibility, integration/interworking and meeting SLA requirements during porting that the industry needs to resolve. To move the industry forward in resolving these gaps, portability can be achieved through phases. For example, a first step could be de-coupling of software instances from the hardware enabling porting VNFs on other instances of the same architectural type and drive performance to meet various SLAs. The NFV target is to achieve portability across multi-vendors, hypervisors, hardware and meet SLA requirements.
8 8 GS NFV 004 V1.1.1 ( ) Reference is made to the technical challenges clause on Portability/Interoperability from [i.1]. 5.3 Performance [Per.1] The NFV framework shall be able to instantiate and configure any given VNF over the underlying infrastructure so that the behaviour of the resulting VNF instance in terms of performance is conforming to the requirements expressed in the VNF information model provided by the VNF vendor for such a type of infrastructure. [Per.2] The NFV framework shall be able to describe the underlying infrastructure requirements of a VNF so that it can be sized for a given performance target while the corresponding resources are allocated and isolated/shared in the infrastructure accordingly. [Perf.3] For any running VNF instance, the NFV framework shall be able to collect performance related information regarding the usage of compute, storage and networking resources by that VNF instance. [Perf.4] The NFV framework shall be able to collect performance related information concerning the resource usage at the infrastructure level (e.g. hypervisor, NIC, virtual switch). NOTE: VNF instance is a run-time copy of the VNF software, resulting from completing the deployment and instantiation of the VNF components and the connectivity between them, by using the VNF deployment and behaviour information model, as well as additional run-time instance-specific information and constraints. 5.4 Elasticity The following requirements apply when a VNF or its components can be parallelised to realize elasticity: [Elas.1] The VNF vendor shall describe in an information model for each component capable of parallel operation the minimum and maximum range of such instances it can support as well as additional information such as the required compute, packet throughput, storage, memory and cache requirements for each component. [Elas.2] The NFV framework shall be able to provide the necessary mechanisms to allow virtualised network functions to be scaled with SLA requirements. Different mechanisms shall be supported: e.g. on-demand scaling, automatic scaling. NOTE 1: On-demand scaling of a VNF instance may be initiated by the VNF instance itself, by another authorized entity (e.g. OSS), or by an authorized user (e.g. a NOC administrator). Automatic scaling of a VNF instance can be initiated based on some trigger, e.g. when pre-defined criteria included in the information model describing a VNF are met. [Elas.3] The scaling request or automatic decision may be granted or denied depending on e.g. network-wide views, rules, policies, resource constraints or external inputs. NOTE 2: The trigger for requesting scaling is out of the scope of the present document; e.g. how the virtual software function(s) detect a load situation. Decision criteria to grant or deny scaling requests are out of the scope of the present document. [Elas.4] The VNF user, through standard information model, shall be capable of requesting, for each component capable of scaling, specific minimum and maximum limits within the range specified by the VNF vendor to fulfil individual SLA, regulatory or licensing constraints. [Elas.5] The NFV framework shall provide the capability to move some or all VNF components from one compute resource onto a different compute resource while meeting the service continuity requirements for the VNF components. NOTE 3: The timeframe required to move VNF components is dependent upon a number of factors, such as available network bandwidth and compute capacity. NOTE 4: The movement of VNF components can be within a single administrative domain or between administrative domains.
9 9 GS NFV 004 V1.1.1 ( ) 5.5 Resiliency [Res.1] The NFV framework shall be able to provide the necessary mechanisms to allow network functions to be recreated after a failure. The relevant resiliency characteristics of a VNF or a set of VNFs shall be made available to the entities handling the network service they are involved in. Different mechanisms shall be supported: on-demand re-creation, automatic re-creation. NOTE 1: On-demand re-creation of a VNF instance can be initiated by another authorized entity (e.g. OSS), or by an authorized user (e.g. a NOC administrator). Automatic re-creation of a VNF instance may be initiated based on some trigger, e.g. when pre-defined criteria included in the information model describing a VNF are met. [Res.2] The NFV framework shall be able to provide a means to classify (sets of) VNFs that have similar reliability/availability requirements into resiliency categories. [Res.3] The NFV framework shall be able to support standard based replication of state data (synchronous and asynchronous) and preservation of data integrity with the necessary performance to fulfil the SLAs. [Res.4] The NFV framework (including the orchestration and other functions necessary for service continuity) shall facilitate resiliency schemes in both the control plane and the data plane, in order to secure service availability and continuity. Orchestration functionalities and other functions necessary for managing service continuity shall not become a single point of failure (SPoF). [Res.5] The SLA shall specify the "metrics" to define the value and variability of "stability". [Res.6] In order to enable network stability, the NFV framework shall support mechanisms to measure the following metrics and ensure that they are met per SLA: Maximum non-intentional packet loss rate (e.g. packets lost due to oversubscription of the service network interconnects, not due to polices or filters). Maximum rate of non-intentional drops of stable calls or sessions (depending on the service). Maximum latency and delay variation on a per-flow basis. Maximum time to detect and recover from faults aligned with the service continuity requirements (zero impact or some measurable impact). Maximum failure rate of transactions that are valid and not made invalid by other transactions. NOTE 2: Additional metrics necessary for defining network stability can be addressed during further phases of the NFV work. Reference is made to the technical challenges clause on Security and Resiliency from [i.1] and Use Cases "Virtualisation of Mobile Core Network and IMS" and "Service Chains (VNF Forwarding Graphs)" from GS NFV 001 [1]. 5.6 Security [Sec.1] The NFV framework shall implement appropriate security countermeasures to address: security vulnerabilities introduced by the virtuali sation layer; protection of data stored on shared storage resources or transmitted via shared network resources; protection of new interfaces exposed by the interconnectivity among NFV end-to-end architectural components, e.g. hardware resources, VNFs, management systems; isolation of distinct VNF sets executing over the NFVI to ensure security and separation between these VNF sets;
10 10 GS NFV 004 V1.1.1 ( ) secure management of VNF sets by other third-party entities (e.g. VNPaaS, enterprise virtual CPE, and virtual consumer home gateways). [Sec.2] The NFV framework shall be able to provide mechanisms for the network operator to control and verify the configuration of the elements that virtualise the hardware resource. [Sec.3] Management and orchestration functionalities shall be able to use standard security mechanisms wherever applicable for authentication, authorization, encryption and validation. [Sec.4] NFV Infrastructure shall be able to use standard security mechanisms wherever applicable for authentication, authorization, encryption and validation. NOTE 1: Detailed requirements on security of shared storage (e.g. mirroring, backups) are to be addressed during further phases of the NFV work. [Sec.5] The NFV framework shall be able to provide role-based information access control and rights management. NOTE 2: Each actor, based on its associated role definition, will have access to a subset of the VNF instances and a subset of the VNF instances management functions (e.g. creation, modification, activation ). A special role will be the administrator role that is able to manage roles and rights. [Sec.6] Access to NFV functions via NFV exposed APIs at all layers shall be protected using standard security mechanisms appropriate for that layer, wherever applicable for authentication, authorization, data encryption, data confidentiality and data integrity. [Sec.7] The management and orchestration functionality shall provide at least two levels of privileges to API clients (e.g. root privilege and user privilege, in this case the root privilege is a higher level of privilege than the user one). Each privilege gives access to a range of differentiated APIs. [Sec.8] The NFV exposed APIs should be divided into multiple subsets of APIs so that clients with different levels of privilege will only be able to use certain subsets of API functionality based on the clients' levels of privilege. NOTE 3: A special case is that the management and orchestration functionality allow using all APIs for the highest privilege only. [Sec.9] The management and orchestration functionality shall be able to authorize client's privilege for using APIs based on operator-defined criteria. Reference is made to the technical challenges clause on Security and Resiliency from [i.1] and Use Cases "Virtual Network Platform as a Service (VNPaaS)", "Virtual Network Function as a Service (VNFaaS)" and "Virtualisation of the Home Environment" from GS NFV 001 [1]. 5.7 Service Continuity The NFV framework shall provide the following capabilities: [Cont. 1] The SLA shall describe the level of service continuity required (e.g. seamless, non-seamless according to the definitions) and required attributes. NOTE 1: There are two cases of the impact on service continuity in the events of intervening exceptions or anomalies: zero impact (seamless service continuity) and measurable impact (non-seamless service continuity). NOTE 2: Seamless Service Continuity (with zero impact). In response to some anomaly (e.g. detected failure, commanded movement, and migration), there will be a means specified such that no observable state loss, no observable transmit queue packet loss and no observable transmit queue storage loss occurs, and any impact on latency and delay variation will be within the SLA specification for the function. NOTE 3: Non-seamless Service Continuity. Some level of measurable service impact can be perceived by the end-user. When there is measurable service continuity impact on the function, then any impact will be described in terms of the SLA specification, to include at least a maximum value of outage duration, packet loss, latency and delay variation.
11 11 GS NFV 004 V1.1.1 ( ) [Cont. 2] In the event of an anomaly that causes hardware failure or resource shortage/outage, the NFV framework shall be able to provide mechanisms such that the functionality of impacted VNF instance(s) shall be restored within the service continuity SLA requirements for the impacted VNF instance(s). [Cont. 3] In the event that a VNF instance (or a subset thereof) needs to be migrated, the NFV framework shall be able to consider the impact on the service continuity during the VNF instance migration process and such impact shall be measurable and within the limits described in the SLA. [Cont. 4] When a VNF instance subset (e.g. a VM) is migrated, the communication between the migrated VNF instance and other entities (e.g. VNF instance subset or physical network elements) shall be maintained regardless of its location and awareness of migration. 5.8 Service Assurance Once many network functions are provided in virtualised form, the more ubiquitous presence of virtualisation infrastructure presents the opportunity for running virtualised instrumentation functions whenever and wherever they are needed, e.g. to remotely view a point in the network to diagnose problems, to routinely monitor performance as seen by a customer or to measure latency between two remote points. Therefore sufficiently precise mechanisms will be needed in any circumstances where the relation between one function and another may be investigated, including when replica functions are created or functions are migrated. [SeA.1] The NFV framework shall provide mechanisms for time-stamping of hardware (e.g. network interface cards, NICs, and network interface devices, NIDs, that sit beneath virtualisation infrastructure). The minimum support from hardware shall be to: copy packets or frames; accurately time-stamp the copies, using a clock synchronized to a source of appropriate precision (e.g. IEEE 1588 [i.2]); and forward the time-stamped copies to a configured destination. Once the precise time-stamps have been added in hardware, all other instrumentation and diagnosis functions can then proceed as virtualised functions without strict time constraints, e.g. filtering headers, removing payloads, local analysis, forwarding for remote analysis, logging, storage, etc. [SeA.2] It should be possible to interrogate whether particular network interface hardware provides hardware timestamping facilities. NOTE 1: Detailed requirements and recommendations on how this could be economically implemented are to be addressed during further phases of the NFV work and/or referenced to a competent body. [SeA.3] A (set of) VNF instance(s) and/or a management system shall be able to detect the failure of such VNF instance(s) and/or network reachability to that (set of) VNF instance(s) and take action in a way that meets the fault detection and remediation time objective of that VNF resiliency category. NOTE 2: Detailed requirements on liveness checking of an VNF, e.g. watchdog timer or keepalive, as well as means including interface, syntax, methods for discovering, publishing, and retrieving notifications, are to be addressed during further phases of the NFV work. [SeA.4] A VNF shall be able to publish means by which other entities (e.g. another VNF, the orchestration functionality and/or a management system) can determine whether the VNF is operating properly. 5.9 Operational and Management requirements [OaM.1] The NFV framework shall incorporate mechanisms for automation of operational and management functions, e.g. creation, scaling and healing of VNF instances based on pre-defined criteria described in the VNF information model, network capacity adaptation to load, software upgrades and new features/nodes introduction, functions configuration and relocation and intervention on detected failures. NOTE 1: The examples given are considered an initial set and it is expected that additional mechanisms are addressed as NFV solutions start to be deployed.
12 12 GS NFV 004 V1.1.1 ( ) [OaM.2] The NFV framework shall be able to provide an management and orchestration functionality that shall be responsible for the VNF and VNF instances lifecycle management: instantiation, allocation and relocation of resources, scaling, and termination. [OaM.3] The management and orchestration functionality shall be limited to the differences introduced by the Network Function Virtualisation process. The management and orchestration functionality shall be neutral with respect to the logical functions provided by the VNFs. NOTE 2: Operational, Provisioning or Management aspects of the logical functions of the VNF are not considered part of the orchestration functionality depicted in the present document. [OaM.4] As part of VNF life cycle management, monitoring and collection of information related to usage, the management and orchestration functionality shall be able to interact with other operations systems (when they exist) managing the Virtual Network Functions and/or the NFV infrastructure comprised of compute/storage machines, network software/hardware and configurations and/or software on these devices. [OaM.5] The management and orchestration functionality shall be able to use standard information models that describe how to manage the VNF life cycle. Information models provide a structure of operational attributes of VNFs, as well as characteristics of the network service in terms of capacity, performance, resiliency, constraints and security, for example: deployment attributes and environment of a VNF e.g. VM images, required computational and storage resources and network reachability; operational attributes of a VNF, e.g. VNF topology as the links between the different network functions composing a specific network service, operations (initiation/tear-down), functional scripts. migration attributes of a VNF e.g. limitations for maximum acceptable propagation delay, scaling [Elas.2] and resiliency [Res.1] methods as defined by the SLA. NOTE 3: The examples above are not exhaustive and can be refined during further phases of the NFV work. [OaM.6] The management and orchestration functionality shall be able to manage the lifecycle of VNFs and VNF instances using the information models in combination with run-time information accompanying scheduled or ondemand requests regarding VNF instances and run-time policies/constraints. [OaM.7] The management and orchestration functionality shall be able to manage the NFV infrastructure in coordination with other applicable management systems (e.g. CMS) and orchestrate the allocation of resources needed by the VNF instances. [OaM.8] The management and orchestration functionality shall be able to maintain the integrity of each VNF instance with respect to its allocated NFV infrastructure resources. [OaM.9] The management and orchestration functionality shall be able to monitor and collect NFV infrastructure resource usage and map such usage against the corresponding particular VNF instances. [OaM.10] The management and orchestration functionality shall be able to monitor resources used on a per-vnf basis, and shall be made aware of receiving events that reflect NFV Infrastructure faults, correlate such events with other VNF related information, and act accordingly on the NFV Infrastructure that supports the VNF. [OaM.11]: The management and orchestration functionality shall support standard APIs for all applicable functions (e.g. VNF instantiation, VNF instances allocation/release of NFV infrastructure resources, VNF instances scaling, VNF instances termination, and policy management) that it provides to other authorized entities (e.g. OSS, VNF instances, 3 rd parties). [OaM.12] The management and orchestration functionality shall be able to manage policies and constraints (e.g. regarding placement of VMs). [OaM.13] The management and orchestration functionality shall enforce policies and constraints when allocating and/or resolving conflicts regarding NFV Infrastructure resources for VNF instances. [OaM.14] The NFV framework shall be able to manage the assignment of NFVI resources to a VNF in a way that resources (compute hardware, storage, network) can be shared between VNFs. Reference is made to the technical challenges clauses on Automation, Simplicity and Integration from [i.1].
13 13 GS NFV 004 V1.1.1 ( ) 5.10 Energy Efficiency requirements Network infrastructures consume significant amounts of energy. Studies have indicated that NFV could potentially deliver up to 50 % energy savings compared with traditional appliance based network infrastructures. The virtualisation aspect of network functions assumes some separation of communication, storage or computing resources, which implies changes in the distribution of energy consumption. VNFs provide on-demand access to a pool of shared resources where the locus of energy consumption for components of the VNF is the virtual machine instance where the VNF is instantiated. It is expected that the NFV framework can exploit the benefits of virtualisation technologies to significantly reduce the energy consumption of large scale network infrastructures. [EE.1] The NFV framework shall support the capability to place only VNF subset that can be moved or placed in a sleep state on a particular resource (compute, storage) so that resource can be placed into a power conserving state. NOTE 1: Workload consolidation can be achieved by e.g. scaling facilities so that traffic load is concentrated on a smaller number of servers during off-peak hours so that all the other servers can be switched off or put into energy saving mode. [EE.2] The NFV framework shall be able to provide mechanisms to enable an authorized entity to control and optimize energy consumption on demand, by e.g. scheduling and placing VNF instances on specific resources, including hardware and/or hypervisors, placing unused resources in energy saving mode, and managing power states as needed. NOTE 2: Energy efficiency mechanisms could consider maintaining service continuity requirements and network stability requirements. [EE.3] The NFV framework shall provide an information model that includes attributes defining the timeframe required for a compute resource, hypervisor and/or VNF (e.g. VM) to return to a normal operating mode after leaving a specific power-saving mode. NOTE 3: This information is necessary to determine when to power on resources and software sufficiently in advance of the time when such assets would be needed to meet expected future workloads Coexistence with existing networks - Transition [Mig.1] The NFV framework shall co-exist with legacy network equipment. I.e., the NFV framework shall be able to work in a hybrid network composed of classical physical network and virtual network functions as defined by a VNF Forwarding Graph. [Mig.2] The NFV framework shall support a transition path from today's Physical Network Functions (PNFs) based solutions, to a more open standards based virtual networks functions solutions. NOTE 1: For example, the NFV migration could allow a true "mix&match" deployment scenario by integrating multiple virtual and physical network functions from different vendors without incurring significant integration complexity and facilitate multi-vendor ecosystem. [Mig.3] The NFV framework in conjunction with legacy management system shall support the same service capability and acceptable performance impact within service SLA when transitioning from Physical Network Functions (PNFs) to Virtual Network Functions (and vice versa). [Mig.4] The NFV framework shall be able to interwork with legacy management systems with minimal impact on existing network nodes and interfaces. NOTE 2: Example of legacy management systems are Operational Support System (OSS), Business Support System (BSS), Cloud Management System or load balancing control systems that could exist in the operators' networks. [Mig.5] During the transition from physical to virtual the NFV framework shall be able to ensure security of VNF instances from various security threats, without disrupting or negatively impacting existent physical network functions (PNFs) and associated network elements and interfaces. Reference is made to the technical challenges clause on Coexistence with existing networks - migration, from [i.1].
14 14 GS NFV 004 V1.1.1 ( ) 6 Service Models 6.1 General In order to meet network service performance objectives (e.g. latency, reliability), or create value-added services for global customer or enterprises, it may be desirable for a Service Provider to be able to run VNF instances on NFV Infrastructure (including infrastructure elements common with cloud computing services) which is operated by a different Service Provider. The ability to remotely deploy and run Virtualised Network Functions on NFV Infrastructure provided by another Service Provider permits a Service Provider to more efficiently serve its global customers. The ability for a Service Provider to offer its NFV Infrastructure as a Service (e.g. to other Service Providers) enables an additional commercial service offer (in addition to a Service Providers existing catalogue of network services that may be supported by VNFs) to directly support, and accelerate, the deployment of NFV Infrastructure. The infrastructure may also be offered as a Service from one department to another within a single Service Provider. The commercial and deployment aspects of those agreements are out of the scope of the present document and only the technical requirements to facilitate these models will be depicted. Maintenance for NFV framework and hosted VNFs will be different to non-virtuali sed network functions. Especially in deployments, where not only the vendors of framework and VNFs but also the providers of framework and VNFs are different, it needs to be assured that all necessary service and maintenance tasks on the resources, the framework and the VNFs can be executed. There will be new interactions in such a multivendor - multi-operator environment. More details are provided in the maintenance clause. 6.2 Deployment models [Mod.1] The NFV framework shall provide the necessary mechanisms to achieve the same level of service availability for fully and partially virtualised scenarios as for existing non-virtualised networks. [Mod.2] Services (i.e. "User" services) making use of network functions shall be agnostic with regards to the actual implementation of it as virtual or non-virtual network function. [Mod.3] The NFV framework shall permit identification and management of two types of traffic flows: services traffic over Virtualised Network Functions, in addition to identifying traffic flows specific to resource facing operations (e.g. management, portability, scaling, etc.). Reference is made to the Use Case "Virtualisation of Mobile Core Network and IMS" from GS NFV 001 [1]. 6.3 Service models [Mod.5] The NFV framework shall provide the appropriate mechanisms to facilitate network operators to consume NFV infrastructure resources operated by a different infrastructure provider, via standard APIs, and without degraded capabilities (e.g. scaling, performance, etc.) compared to consuming self -operated infrastructure resources. [Mod.6] The NFV framework shall permit Virtual Network Functions from different Service Providers to coexist within the same infrastructure while facilitating the appropriate isolation between the resources allocated to the different service providers. [Mod.7] The NFV framework should permit a Service Provider to fulfil, assure and bill for services delivered to end users across infrastructures that are independently administered. [Mod.8] The NFV framework shall be able to provide the necessary mechanisms to instantiate different subsets of VNF (e.g. VMs) of the same VNF on infrastructure resources managed by different administrative domains. [Mod.9] Appropriate mechanisms shall exist for: Authentication and authorization to control access in a way that only authorized VNF instances from authorized Service Providers are allowed to be executed.
15 15 GS NFV 004 V1.1.1 ( ) Failure notification and diagnostics and measurement of SLA related parameters, so that VNF instance failures or resource demands from one Service Provider do not degrade the operation of other Service Provider's VNF instances. Maintaining the relationships between each virtual network function/application, the service making use of it and the resources allocated to it. [Mod.10] The NFV framework shall support different options for allocation of resources to adapt to different sets of virtual network functions/applications, e.g. pay-as-you-go, overcommitting, immediate reservation, etc. 6.4 Maintenance models Serviceability and Maintainability describe how the necessary tasks to run an NFV framework and the hosted VNFs are supported by the system. This mostly deals with exchanging software or hardware and with diagnosis and elimination of problems, as well as monitoring the health of NFV framework and VNFs, logging of resource usage, energy consumption, irregular events, etc. [Maint.1] The NFV framework shall be able to facilitate all necessary actions to assure long life cycle of the infrastructure services, such as hardware and software exchanges, live upgrades, troubleshooting, repair, logging. [Maint.2] The NFV framework shall be able to provide the necessary support for providers of VNFs deployed on the framework for the troubleshooting, repair and other service tasks for the VNFs. The serviceability and maintainability for VNFs should be possible as for non virtuali sed network functions. [Maint.3] The NFV framework shall provide the necessary means to exchange any piece of hardware (compute, storage, network equipment or equipment practice) without affecting service continuity of the hosted services. [Maint.4] The NFV framework shall provide the necessary means to exchange any piece of firmware and software of all domains without affecting service continuity. [Maint.5] The NFV framework shall provide the necessary means to verify the health of any resource it provides for the hosted VNFs. [Maint.6] The NFV framework shall provide the necessary means to diagnose faults of resources, so it can be identified which unit of hardware or software needs repair. [Maint.7] The NFV framework shall provide the necessary means to repair all parts of its software without affecting the service continuity of the hosted services. [Maint.8] The NFV framework shall provide the necessary means to verify that a corrective process was successful and the fault is eliminated. [Maint.9] The NFV framework shall provide an inventory of all units of hardware and software it consists of, including information about versions, releases, patches etc. [Maint.10] The NFV framework shall monitor, log and report all changes to its inventory. [Maint.11] The NFV framework shall provide the necessary means to log and report the usage of its resources. [Maint.12] The NFV framework shall provide the necessary means to log and report any unexpected events on the resources. [Maint.13] The NFV framework shall provide the necessary means to log and report all maintenance activity on the framework [Maint.14] The NFV framework shall provide the necessary interfaces for VNFs to implement their serviceability and maintainability. [Maint.15] The NFV framework shall provide the necessary interfaces for VNFs to report unexpected behaviour of resources. [Maint.16] The NFV framework shall support the correlation of events between the resources and VNFs. E.g. the events shall be logged including information like exact location and time.
16 16 GS NFV 004 V1.1.1 ( ) Annex A (informative): Authors & contributors The following people have contributed to the present document: Rapporteur: Susana Sabater, Vodafone Group PLC Other contributors: Jan Ignatius, NSN Peter Woerndle, Ericsson Ashiq Khan, DOCOMO Michael Brenner, Alcatel Lucent Don Clarke, British Telecom Marc Flauw, Hewlett Packard Naseem Khan, Verizon UK LTD Olivier Le Grand, France Telecom Dave McDysan, Verizon UK LTD Kazuaki Obana, NTT Parviz Yegani, Juniper Networks Valerie Young, Intel Tetsuya Nakamura, DOCOMO Hidetoshi Yokota, KDDI Corportaion Ulrich Kleber, Huawei
17 17 GS NFV 004 V1.1.1 ( ) History Document history V1.1.1 October 2013 Publication
ETSI GS NFV 003 V1.1.1 (2013-10)
GS NFV 003 V1.1.1 (2013-10) Group Specification Network Functions Virtualisation (NFV); Terminology for Main Concepts in NFV Disclaimer This document has been produced and approved by the Network Functions
ETSI TS 182 024 V3.0.0 (2015-10)
TS 182 024 V3.0.0 (2015-10) TECHNICAL SPECIFICATION Network Technologies (NTECH); Hosted Enterprise Services; Architecture, functional description and signalling 2 TS 182 024 V3.0.0 (2015-10) Reference
ETSI TS 102 778 V1.1.1 (2009-04) Technical Specification
TS 102 778 V1.1.1 (2009-04) Technical Specification Electronic Signatures and Infrastructures (ESI); PDF Advanced Electronic Signature Profiles; CMS Profile based on ISO 32000-1 2 TS 102 778 V1.1.1 (2009-04)
ETSI TR 183 070 V3.1.1 (2009-08) Technical Report
TR 183 070 V3.1.1 (2009-08) Technical Report Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); Resource and Admission Control Sub-System (); Rr interface
TECHNICAL REPORT End to End Network Architectures (E2NA); Location of Transcoders for voice and video communications
TR 103 279 V1.1.1 (2014-08) TECHNICAL REPORT End to End Network Architectures (E2NA); Location of Transcoders for voice and video communications 2 TR 103 279 V1.1.1 (2014-08) Reference DTR/E2NA-00006-Loc-Transcoders
ETSI TS 182 023 V2.1.1 (2009-01) Technical Specification
TS 182 023 V2.1.1 (2009-01) Technical Specification Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); Core and enterprise NGN interaction scenarios; Architecture
ETSI GS NFV 002 V1.1.1 (2013-10)
GS NFV 002 V1.1.1 (2013-10) Group Specification Network Functions Virtualisation (NFV); Architectural Framework Disclaimer This document has been produced and approved by the Network Functions Virtualisation
ETSI TS 102 640-3 V1.1.1 (2008-10) Technical Specification
TS 102 640-3 V1.1.1 (2008-10) Technical Specification Electronic Signatures and Infrastructures (ESI); Registered Electronic Mail (REM); Architecture, Formats and Policies; Part 3: Information Security
ETSI SR 003 091 V1.1.2 (2013-03)
SR 003 091 V1.1.2 (2013-03) Special Report Electronic Signatures and Infrastructures (ESI); Recommendations on Governance and Audit Regime for CAB Forum Extended Validation and Baseline Certificates 2
ETSI TS 184 009 V2.0.0 (2008-06) Technical Specification
TS 184 009 V2.0.0 (2008-06) Technical Specification Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); Rules covering the use of TV URIs for the Identification
ETSI TS 129 119 V9.0.0 (2010-01) Technical Specification
TS 129 119 V9.0.0 (2010-01) Technical Specification Universal Mobile Telecommunications System (UMTS); LTE; GPRS Tunnelling Protocol (GTP) specification for Gateway Location Register (GLR) (3GPP TS 29.119
ETSI TS 102 640-3 V2.1.1 (2010-01) Technical Specification
TS 102 640-3 V2.1.1 (2010-01) Technical Specification Electronic Signatures and Infrastructures (ESI); Registered Electronic Mail (REM); Part 3: Information Security Policy Requirements for REM Management
ETSI TR 102 678 V1.2.1 (2011-05) Technical Report
TR 102 678 V1.2.1 (2011-05) Technical Report Speech and multimedia Transmission Quality (STQ); QoS Parameter Measurements based on fixed Data Transfer Times 2 TR 102 678 V1.2.1 (2011-05) Reference RTR/STQ-00184m
ETSI TR 101 303 V1.1.2 (2001-12)
TR 101 303 V1.1.2 (2001-12) Technical Report Telecommunications and Internet Protocol Harmonization Over Networks (TIPHON) Release 3; Requirements definition study; Introduction to service and network
ETSI TS 102 640-4 V2.1.1 (2010-01) Technical Specification
TS 102 640-4 V2.1.1 (2010-01) Technical Specification Electronic Signatures and Infrastructures (ESI); Registered Electronic Mail (REM) Part 4: REM-MD Conformance Profiles 2 TS 102 640-4 V2.1.1 (2010-01)
ETSI TS 184 011 V3.1.1 (2011-02) Technical Specification
TS 184 011 V3.1.1 (2011-02) Technical Specification Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); Requirements and usage of E.164 numbers in NGN and
Technical Specifications (GPGPU)
TS 131 116 V6.7.0 (2005-03) Technical Specification Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); Remote APDU Structure for (Universal) Subscriber
ETSI TS 102 588 V7.1.0 (2007-07) Technical Specification
TS 102 588 V7.1.0 (2007-07) Technical Specification Smart Cards; Application invocation Application Programming Interface (API) by a UICC webserver for Java Card platform; (Release 7) 2 TS 102 588 V7.1.0
ETSI TR 102 997 V1.1.1 (2010-04) Technical Report. CLOUD; Initial analysis of standardization requirements for Cloud services
TR 102 997 V1.1.1 (2010-04) Technical Report CLOUD; Initial analysis of standardization requirements for Cloud services 2 TR 102 997 V1.1.1 (2010-04) Reference DTR/GRID-0009 StdRqmtsCloudSvc Keywords service,
ETSI TS 102 778-3 V1.1.2 (2009-12) Technical Specification
TS 102 778-3 V1.1.2 (2009-12) Technical Specification Electronic Signatures and Infrastructures (ESI); PDF Advanced Electronic Signature Profiles; Part 3: PAdES Enhanced - PAdES-BES and PAdES-EPES Profiles
ETSI TS 132 454 V10.0.0 (2011-04) Technical Specification
TS 132 454 V10.0.0 (2011-04) Technical Specification Universal Mobile Telecommunications System (UMTS); LTE; Telecommunication management; Key Performance Indicators (KPI) for the IP Multimedia Subsystem
ETSI TS 131 221 V9.0.0 (2010-02) Technical Specification
TS 131 221 V9.0.0 (2010-02) Technical Specification Universal Mobile Telecommunications System (UMTS); LTE; Contact Manager Application Programming Interface (API); Contact Manager API for Java Card (3GPP
ETSI TR 102 071 V1.2.1 (2002-10)
TR 102 071 V1.2.1 (2002-10) Technical Report Mobile Commerce (M-COMM); Requirements for Payment Methods for Mobile Commerce 2 TR 102 071 V1.2.1 (2002-10) Reference RTR/M-COMM-007 Keywords commerce, mobile,
ETSI TR 101 643 V8.0.0 (2000-06)
TR 101 643 V8.0.0 (2000-06) Technical Report Digital cellular telecommunications system (Phase 2+); General network interworking scenarios (GSM 09.01 version 8.0.0 Release 1999) GLOBAL SYSTEM FOR MOBILE
ETSI TS 124 423 V8.4.0 (2012-01)
TS 124 423 V8.4.0 (2012-01) Technical Specification Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); LTE; TISPAN; PSTN/ISDN simulation services;
ETSI TS 102 640-3 V2.1.2 (2011-09)
TS 102 640-3 V2.1.2 (2011-09) Technical Specification Electronic Signatures and Infrastructures (ESI); Registered Electronic Mail (REM); Part 3: Information Security Policy Requirements for REM Management
ETSI TS 102 778-1 V1.1.1 (2009-07) Technical Specification
TS 102 778-1 V1.1.1 (2009-07) Technical Specification Electronic Signatures and Infrastructures (ESI); PDF Advanced Electronic Signature Profiles; Part 1: PAdES Overview - a framework document for PAdES
ETSI TS 102 640-5 V2.1.1 (2010-01) Technical Specification
TS 102 640-5 V2.1.1 (2010-01) Technical Specification Electronic Signatures and Infrastructures (ESI); Registered Electronic Mail (REM); Part 5: REM-MD Interoperability Profiles 2 TS 102 640-5 V2.1.1 (2010-01)
ETSI TS 101 329-2 V1.1.1 (2000-07)
TS 101 329-2 V1.1.1 (2000-07) Technical Specification Telecommunications and Internet Protocol Harmonization Over Networks (TIPHON); End to End Quality of Service in TIPHON Systems; Part 2: Definition
ETSI ES 203 069 V1.2.1 (2011-09)
ES 203 069 V1.2.1 (2011-09) Standard Access, Terminals, Transmission and Multiplexing (ATTM); Remote management of CPE over broadband networks; CPE WAN Management Protocol (CWMP) 2 ES 203 069 V1.2.1 (2011-09)
ETSI TS 124 238 V8.2.0 (2010-01) Technical Specification
TS 124 238 V8.2.0 (2010-01) Technical Specification Universal Mobile Telecommunications System (UMTS); LTE; Session Initiation Protocol (SIP) based user configuration; Stage 3 (3GPP TS 24.238 version 8.2.0
TECHNICAL REPORT onem2m; Application Developer Guide (onem2m TR-0025 version 1.0.0 Release 1)
TR 118 525 V1.0.0 (2016-03) TECHNICAL REPORT onem2m; Application Developer Guide (onem2m TR-0025 version 1.0.0 Release 1) 2 TR 118 525 V1.0.0 (2016-03) Reference DTR/oneM2M-000025 Keywords application,
Software-Defined Network (SDN) & Network Function Virtualization (NFV) Po-Ching Lin Dept. CSIE, National Chung Cheng University
Software-Defined Network (SDN) & Network Function Virtualization (NFV) Po-Ching Lin Dept. CSIE, National Chung Cheng University Transition to NFV Cost of deploying network functions: Operating expense
ETSI ES 201 915-12 V1.3.1 (2002-10)
ES 201 915-12 V1.3.1 (2002-10) Standard Open Service Access (OSA); Application Programming Interface (API); Part 12: Charging SCF 2 ES 201 915-12 V1.3.1 (2002-10) Reference RES/SPAN-120094-12 Keywords
NFV Management and Orchestration: Enabling Rapid Service Innovation in the Era of Virtualization
White Paper NFV Management and Orchestration: Enabling Rapid Service Innovation in the Era of Virtualization NFV Orchestration Overview Network Function Virtualization (NFV) technology, in combination
How To Write A Cloud Service Level Agreement
TR 103 125 V1.1.1 (2012-11) Technical Report CLOUD; SLAs for Cloud services 2 TR 103 125 V1.1.1 (2012-11) Reference DTR/CLOUD-0012-SLArequirements Keywords CLOUD, SLA 650 Route des Lucioles F-06921 Sophia
DraftETSI EN 301 691 V1.1.1 (2000-03)
Draft EN 301 691 V1.1.1 (2000-03) European Standard (Telecommunications series) Integrated Services Digital Network (ISDN); Remote Control (RC) service; Service description 2 Draft EN 301 691 V1.1.1 (2000-03)
ETSI TS 124 147 V6.8.0 (2008-04) Technical Specification
TS 124 147 V6.8.0 (2008-04) Technical Specification Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); Conferencing using the IP Multimedia (IM) Core
ETSI TS 101 735 V1.1.1 (2000-07)
TS 101 735 V1.1.1 (2000-07) Technical Specification Digital Audio Broadcasting (DAB); Internet Protocol (IP) datagram tunnelling European Broadcasting Union Union Européenne de Radio-Télévision EBU UER
Technical Specification LTE; Evolved Universal Terrestrial Radio Access (E-UTRA); Layer 2 - Measurements (3GPP TS 36.314 version 11.1.
TS 136 314 V11.1.0 (2013-02) Technical Specification LTE; Evolved Universal Terrestrial Radio Access (E-UTRA); Layer 2 - Measurements (3GPP TS 36.314 version 11.1.0 Release 11) 1 TS 136 314 V11.1.0 (2013-02)
ETSI TS 102 280 V1.1.1 (2004-03)
TS 102 280 V1.1.1 (2004-03) Technical Specification X.509 V.3 Certificate Profile for Certificates Issued to Natural Persons 2 TS 102 280 V1.1.1 (2004-03) Reference DTS/ESI-000018 Keywords electronic signature,
Network Operations in the Era of NFV & SDN. Chris Bilton - Director of Research & Technology, BT
Network Operations in the Era of NFV & SDN Chris Bilton - Director of Research & Technology, BT Agenda 1 2 3 4 Introduction Overview of NfV & SDN The Challenge Today s Carrier operations Contrasting Carrier
Software Defined Security Mechanisms for Critical Infrastructure Management
Software Defined Security Mechanisms for Critical Infrastructure Management SESSION: CRITICAL INFRASTRUCTURE PROTECTION Dr. Anastasios Zafeiropoulos, Senior R&D Architect, Contact: [email protected]
ETSI TS 102 723-10 V1.1.1 (2012-11)
TS 102 723-10 V1.1.1 (2012-11) Technical Specification Intelligent Transport Systems (ITS); OSI cross-layer topics; Part 10: Interface between access layer and networking & transport layer 2 TS 102 723-10
ETSI NFV ISG DIRECTION & PRIORITIES
ETSI NFV ISG DIRECTION & PRIORITIES San Jose, May 6th 2015 Steven Wright (AT&T), Chair ETSI NFV ISG 1 ETSI 2012. All rights reserved NFV: The Equipment Market TransformaJon Classical Network Appliance
Vistara Lifecycle Management
Vistara Lifecycle Management Solution Brief Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid
PLUMgrid Toolbox: Tools to Install, Operate and Monitor Your Virtual Network Infrastructure
Toolbox: Tools to Install, Operate and Monitor Your Virtual Network Infrastructure Introduction The concept of Virtual Networking Infrastructure (VNI) is disrupting the networking space and is enabling
Universal Mobile Telecommunications System (UMTS); Service aspects; Virtual Home Environment (VHE) (UMTS 22.70 version 3.0.0)
TSG-SA Working Group 1 (Services) meeting #2 Edinburgh, Scotland 9 th -12 th March 1999 TSGS1#2(99)120 Agenda Item: 9.8 Source: Coordinator Title: Document for: Information I Universal Mobile Telecommunications
Draft ETSI EN 319 401 V1.1.1 (2012-03)
Draft EN 319 401 V1.1.1 (2012-03) European Standard Electronic Signatures and Infrastructures (ESI); General Policy Requirements for Trust Service Providers supporting Electronic Signatures 2 Draft EN
ETSI EN 319 401 V1.1.1 (2013-01)
EN 319 401 V1.1.1 (2013-01) European Standard Electronic Signatures and Infrastructures (ESI); General Policy Requirements for Trust Service Providers supporting Electronic Signatures 2 EN 319 401 V1.1.1
ETSI TR 101 480 V1.1.2 (1999-12)
TR 101 480 V1.1.2 (1999-12) Technical Report Integrated Services Digital Network (ISDN); Public Switched Telephone Network (PSTN); Framework for the provision of calling party name information 2 TR 101
Final draft ETSI ES 202 913 V1.2.1 (2004-05)
Final draft ES 202 913 V1.2.1 (2004-05) Standard Access and Terminals (AT); POTS requirements applicable to ADSL modems when connected to an analogue presented PSTN line 2 Final draft ES 202 913 V1.2.1
Why Service Providers Need an NFV Platform Strategic White Paper
Why Service Providers Need an NFV Platform Strategic White Paper Network Functions Virtualization (NFV) brings proven cloud computing and IT technologies into the networking domain to help service providers
Digital Telephone Network - A Practical Definition
TR 101 633 V7.0.0 (1999-08) Technical Report Digital cellular telecommunications system (Phase 2+); Support of Videotex (GSM 03.43 version 7.0.0 Release 1998) GLOBAL SYSTEM FOR MOBILE COMMUNICATIONS R
How To Understand Gsm (Gsm) And Gsm.Org (Gms)
TSG-SA Working Group 1 (Services) meeting #2 Edinburgh, Scotland 9 th -12 th March 1999 TSGS1#2(99)116 Agenda Item: 9.4 Source: Coordinator Title: Document for: Information I Universal Mobile Telecommunications
SDN and NFV in the WAN
WHITE PAPER Hybrid Networking SDN and NFV in the WAN HOW THESE POWERFUL TECHNOLOGIES ARE DRIVING ENTERPRISE INNOVATION rev. 110615 Table of Contents Introduction 3 Software Defined Networking 3 Network
Intel Network Builders
Intel Network Builders Nakina Systems Solution Brief Intel Xeon Processors Intel Network Builders Nakina Systems and Intel Make NFV Network Operational Introduction Every great generation of computing
ETSI EN 300 356-7 V4.1.2 (2001-07)
EN 300 356-7 V4.1.2 (2001-07) European Standard (Telecommunications series) Integrated Services Digital Network (ISDN); Signalling System No.7 (SS7); ISDN User Part (ISUP) version 4 for the international
Open Data Center Alliance Usage: VIRTUAL MACHINE (VM) INTEROPERABILITY IN A HYBRID CLOUD ENVIRONMENT REV. 1.1
sm Open Data Center Alliance Usage: VIRTUAL MACHINE (VM) INTEROPERABILITY IN A HYBRID CLOUD ENVIRONMENT REV. 1.1 Open Data Center Alliance Usage: Virtual Machine (VM) Interoperability in a Hybrid Cloud
Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.
ENTERPRISE MONITORING & LIFECYCLE MANAGEMENT Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid
ETSI TS 119 403 V2.1.1 (2014-11)
TS 119 403 V2.1.1 (2014-11) TECHNICAL SPECIFICATION Electronic Signatures and Infrastructures (ESI); Trust Service Provider Conformity Assessment - Requirements for conformity assessment bodies assessing
Delivering Managed Services Using Next Generation Branch Architectures
Delivering Managed Services Using Next Generation Branch Architectures By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by Versa Networks Executive Summary Network architectures for the WAN
ETSI TS 102 124 V6.1.0 (2004-12)
TS 102 124 V6.1.0 (2004-12) Technical Specification Smart Cards; Transport rotocol for ICC based Applications; Stage 1 (Release 6) 2 TS 102 124 V6.1.0 (2004-12) Reference RTS/SC-R0008r1 Keywords protocol,
Evolution of OpenCache: an OpenSource Virtual Content Distribution Network (vcdn) Platform
Evolution of OpenCache: an OpenSource Virtual Content Distribution Network (vcdn) Platform Daniel King [email protected] Matthew Broadbent [email protected] David Hutchison [email protected]
Leveraging SDN and NFV in the WAN
Leveraging SDN and NFV in the WAN Introduction Software Defined Networking (SDN) and Network Functions Virtualization (NFV) are two of the key components of the overall movement towards software defined
ETSI TR 103 123 V1.1.1 (2012-11)
TR 103 123 V1.1.1 (2012-11) Technical Report Electronic Signatures and Infrastructures (ESI); Guidance for Auditors and CSPs on TS 102 042 for Issuing Publicly-Trusted TLS/SSL Certificates 2 TR 103 123
ETSI EN 319 403 V2.2.2 (2015-08)
EN 319 403 V2.2.2 (2015-08) EUROPEAN STANDARD Electronic Signatures and Infrastructures (ESI); Trust Service Provider Conformity Assessment - Requirements for conformity assessment bodies assessing Trust
ETSI EN 301 002-1 V1.3.1 (2001-06)
EN 301 002-1 V1.3.1 (2001-06) European Standard (Telecommunications series) Integrated Services Digital Network (ISDN); Security tools (SET) procedures; Digital Subscriber Signalling System No. one (DSS1)
Network Functions Virtualization (NFV) for Next Generation Networks (NGN)
P a g e 1 Network Functions Virtualization (NFV) for Next Generation Networks (NGN) Summary Network Functions Virtualization (NFV) has drawn industry attention. Network Virtualization aims to transform
Transforming Service Life Cycle Through Automation with SDN and NFV
Transforming Service Life Cycle Through Automation with SDN and NFV Automated workflows improve TCO for service delivery 1 Table of Contents Executive Summary... 3 Introduction... 3 Today s Challenges...
Panel: Cloud/SDN/NFV 黃 仁 竑 教 授 國 立 中 正 大 學 資 工 系 2015/12/26
Panel: Cloud/SDN/NFV 黃 仁 竑 教 授 國 立 中 正 大 學 資 工 系 2015/12/26 1 Outline Cloud data center (CDC) Software Defined Network (SDN) Network Function Virtualization (NFV) Conclusion 2 Cloud Computing Cloud computing
Technical Specification Electronic Signatures and Infrastructures (ESI); ASiC Baseline Profile
TS 103 174 V2.2.1 (2013-06) Technical Specification Electronic Signatures and Infrastructures (ESI); ASiC Baseline Profile 2 TS 103 174 V2.2.1 (2013-06) Reference RTS/ESI-0003174v221 Keywords ASiC, electronic
ETSI GS NFV 002 V1.2.1 (2014-12)
GS NFV 002 V1.2.1 (2014-12) GROUP SPECIFICATION Network Functions Virtualisation (NFV); Architectural Framework Disclaimer This document has been produced and approved by the Network Functions Virtualisation
ETSI TS 124 088 V5.0.0 (2002-06)
TS 124 088 V5.0.0 (2002-06) Technical Specification Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); Call Barring (CB) Supplementary Service; Stage
Open Data Center Alliance Usage: VIRTUAL MACHINE (VM) INTEROPERABILITY
sm Open Data Center Alliance Usage: VIRTUAL MACHINE (VM) INTEROPERABILITY 1 Legal Notice This Open Data Center Alliance SM Usage: VM Interoperability is proprietary to the Open Data Center Alliance, Inc.
The following normative disclaimer shall be included on the front page of a PoC report:
Annex B (normative): NFV ISG PoC #28 Report The following normative disclaimer shall be included on the front page of a PoC report: Submission of this NFV ISG PoC Report as a contribution to the NFV ISG
Technical Report Electronic Signatures and Infrastructures (ESI); Data Preservation Systems Security; Part 2: Guidelines for Assessors
TR 101 533-2 V1.2.1 (2011-12) Technical Report Electronic Signatures and Infrastructures (ESI); Data Preservation Systems Security; Part 2: Guidelines for Assessors 2 TR 101 533-2 V1.2.1 (2011-12) Reference
An Integrated Validation Approach to SDN & NFV
www.wipro.com An Integrated Validation Approach to SDN & NFV Key challenges, implementation strategies and the road ahead. Jayaprakash Hariharan Mohan Kumar Table of Contents 03...Abstract 04...Introduction
ETSI NFV Management and Orchestration - An Overview
ETSI NFV Management and Orchestration - An Overview Mehmet Ersue ETSI NFV MANO WG Co-chair ([email protected]) IETF #88, Vancouver, Canada ization as a Paradigm Network Functions (VNF) Machine Machine
Annex A (normative): NFV ISG PoC Proposal Template A.1 NFV ISG PoC Proposal Template
1 Annex A (normative): NFV ISG PoC Proposal Template A.1 NFV ISG PoC Proposal Template A.1.1 PoC Team Members Include additional manufacturers, operators or labs should additional roles apply. PoC Project
CloudLink - The On-Ramp to the Cloud Security, Management and Performance Optimization for Multi-Tenant Private and Public Clouds
- The On-Ramp to the Cloud Security, Management and Performance Optimization for Multi-Tenant Private and Public Clouds February 2011 1 Introduction Today's business environment requires organizations
White Paper - Huawei Observation to NFV
White Paper - Huawei Observation to NFV White Paper - Huawei Observation to NFV 1 NFV Overview...2 1.1 Motivation for Network Function Virtualization...2 1.2 NFV Ecosystem Is Being Built Up...3 2 Major
Ontology, NFV and the Future OSS September 2015
Ontology, NFV and the Future OSS September 2015 As NFV moves from labs and trials into production, the need to assure the services it delivers has become urgent, but legacy tools struggle to deliver. Ontology
White Paper. Requirements of Network Virtualization
White Paper on Requirements of Network Virtualization INDEX 1. Introduction 2. Architecture of Network Virtualization 3. Requirements for Network virtualization 3.1. Isolation 3.2. Network abstraction
IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures
IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Introduction
3GPP TS 32.531 V9.4.0 (2010-12)
TS 32.531 V9.4.0 (2010-12) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Telecommunication management; Software Management (SWM);
ETSI TS 123 251 V6.5.0 (2005-09)
TS 123 251 V6.5.0 (2005-09) Technical Specification Universal Mobile Telecommunications System (UMTS); Network sharing; Architecture and functional description (3GPP TS 23.251 version 6.5.0 Release 6)
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
W H I T E P A P E R A p p l i c a t i o n D e l i v e r y f o r C l o u d S e r v i c e s : C u s t o m i z i n g S e r v i c e C r e a t i o n i n V i r t u a l E n v i r o n m e n t s Sponsored by: Brocade
What is SDN all about?
What is SDN all about? Emil Gągała Juniper Networks Piotr Jabłoński Cisco Systems In the beginning there was a chaos CLOUD BUILDING BLOCKS CAN I VIRTUALIZE MY Compute Network? Storage Where is my money?
DraftETSI EG 201 510 V1.1.2 (2000-02)
Draft EG 201 510 V1.1.2 (2000-02) Guide Intelligent Network (IN); Security aspects of Switching Control Function (SCF) - Service Switching Function (SSF) interconnection between networks; Part 1: Capability
Federated Application Centric Infrastructure (ACI) Fabrics for Dual Data Center Deployments
Federated Application Centric Infrastructure (ACI) Fabrics for Dual Data Center Deployments March 13, 2015 Abstract To provide redundancy and disaster recovery, most organizations deploy multiple data
Security Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
Organization Transformation for Network Function Virtualization Infrastructure As A Service (NFVIaaS)
Organization Transformation for Network Function Virtualization As A (NFVIaaS) Author: Enrico Montariolo Operations Architect VMware Global Professional s November 2015 Table of Contents Introduction...
The Role of Virtual Routers In Carrier Networks
The Role of Virtual Routers In Carrier Networks Sterling d Perrin Senior Analyst, Heavy Reading Agenda Definitions of SDN and NFV Benefits of SDN and NFV Challenges and Inhibitors Some Use Cases Some Industry
Network Functions as-a-service over Virtualised Infrastructures T-NOVA. Presenter: Dr. Mamadu Sidibe
Network Functions as-a-service over Virtualised Infrastructures T-NOVA Presenter: Dr. Mamadu Sidibe Presentation Outline Brief introduction to NFV T-NOVA Facts T-NOVA Consortium T-NOVA Vision T-NOVA objectives
