Distributed NFV Optimization

Slides:



Advertisements
Similar presentations
Ch. 12 Routing in Switched Networks
Advertisements

Capacity Planning IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
1 Chapter 11: Data Centre Administration Objectives Data Centre Structure Data Centre Structure Data Centre Administration Data Centre Administration Data.
NEW OUTLOOK ON MULTI-DOMAIN AND MULTI-LAYER TRAFFIC ENGINEERING Adrian Farrel
Data and Computer Communications
Logically Centralized Control Class 2. Types of Networks ISP Networks – Entity only owns the switches – Throughput: 100GB-10TB – Heterogeneous devices:
D-NFV breaking out of the DC Slide 1 D-NFV NFV Breaking Out of the Data Center Presented by: Yaakov (J) Stein CTO.
Network Capacity Planning IACT 418 IACT 918 Corporate Network Planning.
Copyright 2009 FUJITSU TECHNOLOGY SOLUTIONS PRIMERGY Servers and Windows Server® 2008 R2 Benefit from an efficient, high performance and flexible platform.
Oct 26, 2004CS573: Network Protocols and Standards1 IP: Routing and Subnetting Network Protocols and Standards Autumn
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
The Future of the Internet Jennifer Rexford ’91 Computer Science Department Princeton University
Chapter Preview  In this chapter, we will study:  The basic components of a telecomm system  The technologies used in telecomm systems  Various ways.
(part 3).  Switches, also known as switching hubs, have become an increasingly important part of our networking today, because when working with hubs,
Datacenter Wide-areaEnterprise LOAD-BALANCER Client Servers.
Abstraction and Control of Transport Networks (ACTN) BoF
Improving Customer Satisfaction Through Advances in Remote Management Technology Greg Michel Product Manager Quintum Technologies Inc.
Chapter 11: Dial-Up Connectivity in Remote Access Designs
Network Topologies.
© 2007 AT&T Knowledge Ventures. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Knowledge Ventures. Subsidiaries and affiliates of AT&T.
Polycom Conference Firewall Solutions. 2 The use of Video Conferencing Is Rapidly Growing More and More people are adopting IP conferencing Audio and.
EWAN Equipment Last Update Copyright 2010 Kenneth M. Chipps Ph.D. 1.
VAP What is a Virtual Application ? A virtual application is an application that has been optimized to run on virtual infrastructure. The application software.
Enabling Innovation Inside the Network Jennifer Rexford Princeton University
1 GRUPPO TELECOM ITALIA Software Defined Networking (SDN) and Network Functions Virtualization (NFV) Research issues and trends Antonio Manzalini– Telecom.
Networking Virtualization Using FPGAs Russell Tessier, Deepak Unnikrishnan, Dong Yin, and Lixin Gao Reconfigurable Computing Group Department of Electrical.
1 The SpaceWire Internet Tunnel and the Advantages It Provides For Spacecraft Integration Stuart Mills, Steve Parkes Space Technology Centre University.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 12 Slide 1 Distributed Systems Architectures.
SPARC – Split Architecture Virtualization Pontus Sköldström.
Networking Basics Lesson 1 Introduction to Networks.
Definitions What is a network? A series of interconnected computers, linked together either via cabling or wirelessly. Often linked via a central server.
Budapest University of Technology and Economics Department of Telecommunications and Media Informatics Optimized QoS Protection of Ethernet Trees Tibor.
Developments in networked embedded system technologies and programmable logic are making it possible to develop new, highly flexible data acquisition system.
LAN Switching and Wireless – Chapter 1
LAN Switching and Wireless – Chapter 1 Vilina Hutter, Instructor
Embedded Runtime Reconfigurable Nodes for wireless sensor networks applications Chris Morales Kaz Onishi 1.
FUTURE OF NETWORKING SAJAN PAUL JUNIPER NETWORKS.
TELEPHONE NETWORK Telephone networks use circuit switching. The telephone network had its beginnings in the late 1800s. The entire network, which is referred.
1 Drivers for Building Life Cycle Integrations Jim Sinopoli.
S4-Chapter 3 WAN Design Requirements. WAN Technologies Leased Line –PPP networks –Hub and Spoke Topologies –Backup for other links ISDN –Cost-effective.
Server Virtualization
Software Defined Networks for Dynamic Datacenter and Cloud Environments.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
1 ALCATEL-LUCENT — PROPRIETARY AND CONFIDENTIAL COPYRIGHT © 2015 ALCATEL-LUCENT. ALL RIGHTS RESERVED. NFV transforms the way service providers architect.
Dzmitry Kliazovich University of Luxembourg, Luxembourg
WebCCTV 1 Contents Introduction Getting Started Connecting the WebCCTV NVR to a local network Connecting the WebCCTV NVR to the Internet Restoring the.
Use Cases for High Bandwidth Query and Control of Core Networks Greg Bernstein, Grotto Networking Young Lee, Huawei draft-bernstein-alto-large-bandwidth-cases-00.txt.
3/12/2013Computer Engg, IIT(BHU)1 CLOUD COMPUTING-1.
Wikipedia Edit. Internet of Things It is the idea of enabling everyday objects with software, sensors and network connectivity. The connectivity would.
SDN and Beyond Ghufran Baig Mubashir Adnan Qureshi.
Eric Osborne ARNOG 2016 NFV (and SDN). Introduction About me: 20+ years in Internet networking: startup, Cisco, Level(3) Currently a principal architect.
Wireless sensor and actor networks: research challenges Ian. F. Akyildiz, Ismail H. Kasimoglu
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Software Defined Networking BY RAVI NAMBOORI. Overview  Origins of SDN.  What is SDN ?  Original Definition of SDN.  What = Why We need SDN ?  Conclusion.
1Security for Service Providers – Dave Gladwin – Newport Networks – SIP ’04 – 22-Jan-04 Security for Service Providers Protecting Service Infrastructure.
Yiting Xia, T. S. Eugene Ng Rice University
Xin Li, Chen Qian University of Kentucky
SDN & NFV and all that Yaakov (J) Stein CTO – RAD Data Communications
LESSON 2.1_A Networking Fundamentals Understand Switches.
Enterprise vCPE use case requirement
Enterprise vCPE use case requirement
How Global MPLS Service Brings World Altogether?
Best Practices for Virtualization on the Subscriber Premises
CPE 401 / 601 Computer Network Systems
Cloud Computing and Cloud Networking
Network Virtualisation for Packet Optical Networks
Carlos J. Bernardos, Alain Mourad, Akbar Rahman
Ch 15 Network Characteristics
NFV and SD-WAN Multi vendor deployment
Microsoft Virtual Academy
Presentation transcript:

Distributed NFV Optimization Yaakov (J) Stein

Concretization and Virtualization PHYSICS LOGIC dedicated hardware ASIC FPGA special purpose processors general purpose software firmware VIRTUALIZATION CONCRETIZATION Concretization means moving a task to the left Justifications for concretization include : cost savings for mass produced products miniaturization/packaging constraints need for high processing rates energy savings / power limitation / low heat dissipation Virtualization is the opposite - moving a task to the right (although frequently reserved for the extreme case of HW → SW)

Justifications for Virtualization The justifications for virtualization are initially harder to grasp lower development efforts and cost flexibility and ability to upgrade functionality chaining multiple functions on a single platform facilitating function relocation By function relocation we mean moving the network function from its conventional place to some other place (e.g., to a Data Center) Relocation has received much attention in the networking community since moving networking functions to Data Centers often enables benefiting from economies of scale This emphasis on this single reason for virtualization has been so strong that it has led many to completely confuse virtualization and relocation when in fact nonvirtualized functions can be relocated (at the expense of CAPEX and truck rolls) virtualized functions can remain in situ (will get to that in a moment) Data Center

Function placement Telecomm functionalities tend to be placed in conventional locations Customer Premises Aggregation Point Point of Presence Core Network Edge Data Center Some telecomm functionalities really must reside at their locations LoopBack testing (what would it mean to move LB to a data center?) End-to-End security (why encrypt packets after they traverse the network ) Some should be left in the conventional locations End-to-End performance monitoring (it wouldn’t be end-to-end – would it ?) DDoS attack blocking (best to block as close to source as possible) Some may be placed almost anywhere Path Computation Charging/billing functionality

Distributed NFV Distributed NFV (DNFV) allows VNF placement anywhere in the network placement is no longer dictated by convention or equipment placement can be optimally determined anywhere in the network Placement decisions can be based on resource availability (computational power, storage, bandwidth) real-estate availability and costs energy and cooling management and maintenance other economies of scale function chaining order policy security and privacy regulatory issues …

Relocation and CPEs One relocation that has been actively discussed recently is being called virtualization of the CPE (vCPE) (virtualization means relocation) Here CPE functionality is virtualized and moved from the customer premises leaving behind only minimal functionality (OAM, traffic conditioning) Equally interesting is virtualization in the CPE Here functionalities are moved to the customer premises Customer Premises Data Center Customer Network VNF VNF Network CPE Customer Premises Data Center Customer Network VNF VNF Network CPE

Virtualization and relocation of CPE p physical v virtual C CPE pC Partial Virtualization Full Virtualization vC pvC Partial Relocation pvC vC vC Full Relocation pC vC vC

DNFV Optimization Problems (1) We should distinguish between pure connectivity (transport) services services containing nontrivial functionalities The first problem is the well-known path computation problem for a pure connectivity service Pure path computation problem (the problem solved by PCE) Given: traffic source and sink points full topology information link and node resource information service bandwidth and delay requirements Find the optimal path for a pure connectivity service

DNFV Optimization Problems (2) Next, we consider the pure DNFV placement problem In this problem we assume that the path computation has been handled by manual static routing or via routing protocols or via path computation Pure D-NFV placement optimization problem Given: the path taken by the traffic (and the availability of extra bandwidth if needed) the VNF(s) to be installed, including computational requirements for multiple VNFs – the (partial) ordering of VNFs places where computational resources are available, and present loadings D-NFV criteria and constraints Find the optimal D-NFV placement(s)

DNFV Optimization Problems (3) Separate path computation and VNF placement is obviously suboptimal unless plentiful computational resources are available along the path Joint PC/D-NFV optimization Given: traffic source and sink points full topology information link and node resource information service bandwidth and delay requirements VNF(s) to be installed, including computational requirements for multiple VNFs – the (partial) ordering of VNFs places where computational resources are available, and present loadings D-NFV criteria and constraints Find the optimal path and VNF placement(s)