Escalator Questionnaire. Why a Questionnaire? To understand better the challenges of smooth upgrade in the OPNFV context –Part 1: Questions investigating.

Slides:



Advertisements
Similar presentations
Computer Systems & Architecture Lesson 2 4. Achieving Qualities.
Advertisements

Networking Essentials Lab 3 & 4 Review. If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens.
High Availability Project Qiao Fu Project Progress Project details: – Weekly meeting: – Mailing list – Participants: Hui Deng
Chapter 13 Managing Computer and Data Resources. Introduction A disciplined, systematic approach is needed for management success Problem Management,
Copyright © 2007 Ramez Elmasri and Shamkant B. Navathe Slide
Yingping Huang and Gregory Madey University of Notre Dame A W S utonomic eb-based imulation Presented by Tariq M. King Published by the IEEE Computer Society.
1 © Copyright 2010 EMC Corporation. All rights reserved. EMC RecoverPoint/Cluster Enabler for Microsoft Failover Cluster.
Reliability Week 11 - Lecture 2. What do we mean by reliability? Correctness – system/application does what it has to do correctly. Availability – Be.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 23 Database Recovery Techniques.
CS-550 (M.Soneru): Recovery [SaS] 1 Recovery. CS-550 (M.Soneru): Recovery [SaS] 2 Recovery Computer system recovery: –Restore the system to a normal operational.
Chapter 19 Database Recovery Techniques. Slide Chapter 19 Outline Databases Recovery 1. Purpose of Database Recovery 2. Types of Failure 3. Transaction.
Physical design. Stage 6 - Physical Design Retrieve the target physical environment Create physical data design Create function component implementation.
24 February 2015 Ryota Mibu, NEC
HA Scenarios.
1© Copyright 2011 EMC Corporation. All rights reserved. EMC RECOVERPOINT/ CLUSTER ENABLER FOR MICROSOFT FAILOVER CLUSTER.
Academic Year 2014 Spring. MODULE CC3005NI: Advanced Database Systems “DATABASE RECOVERY” (PART – 1) Academic Year 2014 Spring.
Overview SAP Basis Functions. SAP Technical Overview Learning Objectives What the Basis system is How does SAP handle a transaction request Differentiating.
11 REVIEWING MICROSOFT ACTIVE DIRECTORY CONCEPTS Chapter 1.
ATIF MEHMOOD MALIK KASHIF SIDDIQUE Improving dependability of Cloud Computing with Fault Tolerance and High Availability.
Chapter 7 Requirement Modeling : Flow, Behaviour, Patterns And WebApps.
Achieving Qualities 1 Võ Đình Hiếu. Contents Architecture tactics Availability tactics Security tactics Modifiability tactics 2.
S/W Project Management
Failure Spread in Redundant UMTS Core Network n Author: Tuomas Erke, Helsinki University of Technology n Supervisor: Timo Korhonen, Professor of Telecommunication.
 Cloud computing  Workflow  Workflow lifecycle  Workflow design  Workflow tools : xcp, eucalyptus, open nebula.
Recovery-Oriented Computing User Study Training Materials October 2003.
ITEC224 Database Programming
An Introduction to Software Architecture
Chapter Fourteen Windows XP Professional Fault Tolerance.
Sofia, Bulgaria | 9-10 October SQL Server 2005 High Availability for developers Vladimir Tchalkov Crossroad Ltd. Vladimir Tchalkov Crossroad Ltd.
IMPROUVEMENT OF COMPUTER NETWORKS SECURITY BY USING FAULT TOLERANT CLUSTERS Prof. S ERB AUREL Ph. D. Prof. PATRICIU VICTOR-VALERIU Ph. D. Military Technical.
16 Copyright © 2007, Oracle. All rights reserved. Performing Database Recovery.
Module 9 Planning a Disaster Recovery Solution. Module Overview Planning for Disaster Mitigation Planning Exchange Server Backup Planning Exchange Server.
Presented by Reliability, Availability, and Serviceability (RAS) for High-Performance Computing Stephen L. Scott and Christian Engelmann Computer Science.
Other Quality Attributes Other Important Quality attributes Variability: a special form of modifiability. The ability of a system and its supporting artifacts.
Lecture 7: Requirements Engineering
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
1 Week #10Business Continuity Backing Up Data Configuring Shadow Copies Providing Server and Service Availability.
Chapter 1 Introduction to Databases. 1-2 Chapter Outline   Common uses of database systems   Meaning of basic terms   Database Applications  
Integrating Scale Out and Fault Tolerance in Stream Processing using Operator State Management Author: Raul Castro Fernandez, Matteo Migliavacca, et al.
Clustering In A SAN For High Availability Steve Dalton, President and CEO Gadzoox Networks September 2002.
Oracle's Distributed Database Bora Yasa. Definition A Distributed Database is a set of databases stored on multiple computers at different locations and.
Chapter 10 Chapter 10: Managing the Distributed File System, Disk Quotas, and Software Installation.
An OBSM method for Real Time Embedded Systems Veronica Eyo Sharvari Joshi.
INTRODUCTION TO DBS Database: a collection of data describing the activities of one or more related organizations DBMS: software designed to assist in.
Module 1 Introduction to Designing a Microsoft® Exchange Server 2010 Deployment.
Gerald Kunzmann, DOCOMO Carlos Goncalves, NEC Ryota Mibu, NEC
Architecture View Models A model is a complete, simplified description of a system from a particular perspective or viewpoint. There is no single view.
Lecture 13.  Failure mode: when team understands requirements but is unable to meet them.  To ensure that you are building the right system Continually.
Transaction Processing Concepts Muheet Ahmed Butt.
1. 2 Purpose of This Presentation ◆ To explain how spacecraft can be virtualized by using a standard modeling method; ◆ To introduce the basic concept.
Network management Network management refers to the activities, methods, procedures, and tools that pertain to the operation, administration, maintenance,
Lecture III: Challenges for software engineering with the cloud CS 4593 Cloud-Oriented Big Data and Software Engineering.
Oracle Architecture - Structure. Oracle Architecture - Structure The Oracle Server architecture 1. Structures are well-defined objects that store the.
Ingvar Bergström Senior Designer Developer Days June 2009 SMF in OpenSAF.
Managing Multi-User Databases
X V Consumer C1 Consumer C2 Consumer C3
The Development Process of Web Applications
Escalator: Refreshing Your OPNFV Environment With Less Troubles
Maximum Availability Architecture Enterprise Technology Centre.
Distributed Databases
Tomi Juvonen SW Architect, Nokia
VOLTHA Lock-In January 10 & 11, 2018.
Design and Programming
An Introduction to Software Architecture
Protection of UNIs and E-NNIs
Database Recovery 1 Purpose of Database Recovery
Design.
Distributed Systems and Concurrency: Distributed Systems
Presentation transcript:

Escalator Questionnaire

Why a Questionnaire? To understand better the challenges of smooth upgrade in the OPNFV context –Part 1: Questions investigating the different characteristics of the runtime aspect/part of the NFV system addressed by the projects, so that we can assess the needs and requirements toward smooth upgrades To understand better the expectations toward the project/smooth upgrade –Part 2: Questions about the ideal upgrade scenario and error handling To understand the tool support needed –Part 3: Questions about the ideal tool support for the different tasks related to smooth upgrade 2

Who should answer? Ideally we would like to have an answer from each OPNFV project, especially those addressing any runtime aspect of the system We do not want to restrict to projects the answers. We recognize that anyone may have –An opinion when it comes to upgrades –Information relevant to upgrade –Experience with upgrades in this context (e.g. OpenStack, ODL, etc.) –A perspective on upgrades We do not expect everyone to answer all the questions –Some questions may not be relevant to all projects, some projects may not be relevant to upgrade, but if you have a piece of information, an experience, an idea, a wish, please bring it up. 3

Part 1: Upgrade Target Characterization What runtime aspect/part of the OPNFV deployment is considered by the answers? What is the upgrade target considered? –Possible answers: Hypervisor, NFVI, VIM, etc. Does the upgrade target have direct impact on the availability of network functions hosted by the OPNFV deployment? –Possible answers: Yes/No 4

Part 1: Upgrade Target Characterization - Redundancy Is there any redundancy considered for the upgrade target? –Possible answers: Yes/No/Partially If yes, what is the redundancy schema? –Possible answers: Load-sharing all active (a.k.a. active-active, N-way-active) 1 active + 1 standby (a.k.a. active/standby, 1+1, 2N) N active + M standby (a.k.a. N+M) N-way (i.e. each unit may actively serve some traffic and at the same time back up traffic served by other redundant unit(s) as using in distributed databases) How much outage of the upgrade target can be tolerated by the network functions hosted? –Possible answers: None / X seconds/minutes / till event (e.g. next failure) 5

Part 1: Upgrade Target Characterization - Statefulness Is the upgrade target stateful or stateless? Does it have a state that needs to be preserved? –Possible answers: Yes/No/Partially If it is stateful where/how is the state preserved? –Possible answers: In memory checkpoint, external data base, communicated to standby, etc. What is the state synchronization mechanism? –Possible answers: Checkpoint service, message communication service, communication protocol, external storage, etc. 6

Part 1: Upgrade Target Characterization - Backward compatibility Which one of the items below is applicable to the upgrade target? –Software API –Communication protocol –Data structure/schema –Management information model Is there any versioning adopted for each of the above items? –Possible answers: Yes/No Can different versions of the above items coexist in the system? –Possible answers: Yes/No/Some versions Is there any backward compatibility requirement adopted for the above items? Please describe the requirements. –Possible answers: Yes and details/No 7

Part 1: Upgrade Target Characterization - Data Can the upgraded data structure(s)/information model reverted in case of upgrade failure? –Possible answers: Yes, without data loss Yes, for some versions/some constraints No, data may be lost No, backup needs to be restored, changes will be lost What is the amount of the data affected? –Possible answers: Constant – please specify Proportional to the NFVI system size or part of it – please specify 8

Part 1: Upgrade Target Characterization - Dependency Are there periods/operations in the upgrade target which are incompatible with upgrade? I.e. when upgrade must not be performed. –Possible answers: Yes, all upgrades (i.e. any upgrade in the NFV system) need to be negotiated Yes, some upgrades (i.e. upgrade of some parts of the NFV system) need to be negotiated Yes, the upgrade of the considered target needs to be negotiated No Does the upgrade target depend on other aspects/parts of the OPNFV deployment at runtime? –Possible answers: Yes/No/Partially Can the upgrade target tolerate any amount of outage of this sponsoring subsystem? –Possible answers: Yes, X seconds / No 9

Part 2: Project expectation toward upgrade Please describe the ideal upgrade scenario applicable to your project –E.g. Upgrade of compute hosts X at a time in a rolling fashion without introducing any service outage What challenges do you see in achieving this scenario? –E.g. Selection of the X host groups so that they don’t host redundant entities (i.e. entities protecting each other) 10

Part 2: Project expectation toward upgrade What may go wrong during the execution of an upgrade? –E.g. the upgrade target on the already upgraded hosts start to fail What recovery options would you like to see in case of upgrade failure? –E.g. downgrade the upgraded hosts to the previous version in a rolling fashion What challenges do you see in performing such a recovery? –E.g. May run out of the maintenance window, i.e. capacity requirements may increase faster than the rollback can complete 11

Part 3: Tool support What support would you like for: designing, validating, executing, verifying and rolling back of an upgrade? Please describe: –the main function of the tool –the input based on which it should operate –the output/result it should provide –the guarantees it should provide –the constraints of operation –any administrative control that it may need to have –any user interface it may need to have Is there an open source tool for any of the above steps that you would consider/recommend? 12

13 Thanks!