D-NFV breaking out of the DC Slide 1 D-NFV NFV Breaking Out of the Data Center Presented by: Yaakov (J) Stein CTO.

Slides:



Advertisements
Similar presentations
Distributed NFV Optimization
Advertisements

Logically Centralized Control Class 2. Types of Networks ISP Networks – Entity only owns the switches – Throughput: 100GB-10TB – Heterogeneous devices:
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
Guide to Network Defense and Countermeasures Second Edition
Chapter 22: Cloud Computing and Related Security Issues Guide to Computer Network Security.
Tunis, Tunisia, 28 April 2014 Business Values of Virtualization Mounir Ferjani, Senior Product Manager, Huawei Technologies 2.
Network Overlay Framework Draft-lasserre-nvo3-framework-01.
Copyright 2009 FUJITSU TECHNOLOGY SOLUTIONS PRIMERGY Servers and Windows Server® 2008 R2 Benefit from an efficient, high performance and flexible platform.
Keith Wiles DPACC vNF Overview and Proposed methods Keith Wiles – v0.5.
Citrix Partner Update The Citrix Delivery Centre.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Institute of Technology, Sligo Dept of Computing Semester 3, version Semester 3 Chapter 3 VLANs.
The Future of the Internet Jennifer Rexford ’91 Computer Science Department Princeton University
A Survey of Network Orchestration in Cloud
Presented by Sujit Tilak. Evolution of Client/Server Architecture Clients & Server on different computer systems Local Area Network for Server and Client.
Data Centers and IP PBXs LAN Structures Private Clouds IP PBX Architecture IP PBX Hosting.
(part 3).  Switches, also known as switching hubs, have become an increasingly important part of our networking today, because when working with hubs,
CISCO NETWORKING ACADEMY Chabot College ELEC Router Introduction.
Microsoft Virtual Academy Module 4 Creating and Configuring Virtual Machine Networks.
Improving Customer Satisfaction Through Advances in Remote Management Technology Greg Michel Product Manager Quintum Technologies Inc.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
© 2007 AT&T Knowledge Ventures. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Knowledge Ventures. Subsidiaries and affiliates of AT&T.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Polycom Conference Firewall Solutions. 2 The use of Video Conferencing Is Rapidly Growing More and More people are adopting IP conferencing Audio and.
EWAN Equipment Last Update Copyright 2010 Kenneth M. Chipps Ph.D. 1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
Enabling Innovation Inside the Network Jennifer Rexford Princeton University
FI-WARE – Future Internet Core Platform FI-WARE Interface to Networks and Devices (I2ND) July 2011 High-level description.
1 The SpaceWire Internet Tunnel and the Advantages It Provides For Spacecraft Integration Stuart Mills, Steve Parkes Space Technology Centre University.
Cloud Computing Saneel Bidaye uni-slb2181. What is Cloud Computing? Cloud Computing refers to both the applications delivered as services over the Internet.
CLOUD COMPUTING  IT is a service provider which provides information.  IT allows the employees to work remotely  IT is a on demand network access.
Software-Defined Networks Jennifer Rexford Princeton University.
The Citrix Delivery Center. 2 © 2008 Citrix Systems, Inc. — All rights reserved Every Day, IT Gets More Complex EMPLOYEES PARTNERS CUSTOMERS.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
Web Cache Redirection using a Layer-4 switch: Architecture, issues, tradeoffs, and trends Shirish Sathaye Vice-President of Engineering.
Server Virtualization
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
VMware vSphere Configuration and Management v6
An Application of VoIP and MPLS Advisor: Dr. Kevin Ryan
Virtual Machines Created within the Virtualization layer, such as a hypervisor Shares the physical computer's CPU, hard disk, memory, and network interfaces.
Task-Force 1 Softwarization of Networks ICT COST Action IC1304 Autonomous Control for a Reliable Internet of Services (ACROSS)
1 ALCATEL-LUCENT — PROPRIETARY AND CONFIDENTIAL COPYRIGHT © 2015 ALCATEL-LUCENT. ALL RIGHTS RESERVED. NFV transforms the way service providers architect.
SOFTWARE DEFINED NETWORKING/OPENFLOW: A PATH TO PROGRAMMABLE NETWORKS April 23, 2012 © Brocade Communications Systems, Inc.
Introducing a New Concept in Networking Fluid Networking S. Wood Nov Copyright 2006 Modern Systems Research.
3/12/2013Computer Engg, IIT(BHU)1 CLOUD COMPUTING-1.
SDN and Beyond Ghufran Baig Mubashir Adnan Qureshi.
Outline PART 1: THEORY PART 2: HANDS ON
© 2003, Cisco Systems, Inc. All rights reserved. 2-1 Campus Network Design.
Jenny Hobbs Consulting Systems Engineer April 2016 Business Case for Tailored Datacenter Integration (TDI)
CS 6027 Advanced Networking FINAL PROJECT ​. Cloud Computing KRANTHI ​ CHENNUPATI PRANEETHA VARIGONDA ​ SANGEETHA LAXMAN ​ VARUN ​ DENDUKURI.
Network Virtualization Ben Pfaff Nicira Networks, Inc.
1Security for Service Providers – Dave Gladwin – Newport Networks – SIP ’04 – 22-Jan-04 Security for Service Providers Protecting Service Infrastructure.
The evolviNG CPE Yaakov (J) Stein CTO The evolviNG CPE 2 The CPE The concept of Customer Premises Equipment originally referred to functionalities at.
Virtual CPE Reality Yaakov (J) Stein CTO.
Chapter 6: Securing the Cloud
Security Virtualization
Barracuda Firewall The Next-Generation Firewall for Everyone
CONNECTING TO THE INTERNET
6WIND MWC IPsec Demo Scalable Virtual IPsec Aggregation with DPDK for Road Warriors and Branch Offices Changed original subtitle. Original subtitle:
Establishing End-to-End Guaranteed Bandwidth Network Paths Across Multiple Administrative Domains The DOE-funded TeraPaths project at Brookhaven National.
Enterprise vCPE use case requirement
NFV Update Vienna, February 2018
Specialized Cloud Mechanisms
Specialized Cloud Architectures
NFV and SD-WAN Multi vendor deployment
Microsoft Virtual Academy
Presentation transcript:

D-NFV breaking out of the DC Slide 1 D-NFV NFV Breaking Out of the Data Center Presented by: Yaakov (J) Stein CTO

D-NFV breaking out of the DC Slide 2 Concretization and Virtualization PHYSICS LOGIC dedicated hardware ASIC FPGA special purpose processors general purpose software firmware VIRTUALIZATION CONCRETIZATION Concretization means moving a task to the left Justifications for concretization include : cost savings for mass produced products miniaturization/packaging constraints need for high processing rates energy savings / power limitation / low heat dissipation Virtualization is the opposite - moving a task to the right (although frequently reserved for the extreme case of HW → SW)

D-NFV breaking out of the DC Slide 3 Justifications for Virtualization The justifications for virtualization are initially harder to grasp lower development efforts and cost flexibility and ability to upgrade functionality chaining multiple functions on a single platform facilitating function relocation By function relocation we mean moving the network function from its conventional place to some other place (e.g., to a Data Center) Relocation has received much attention in the networking community since moving networking functions to Data Centers often enables benefiting from economies of scale This emphasis on this single reason for virtualization has been so strong that it has led many to completely confuse virtualization and relocation when in fact nonvirtualized functions can be relocated (at the expense of CAPEX and truck rolls) virtualized functions can remain in situ (will get to that in a moment) Data Center

D-NFV breaking out of the DC Slide 4 Function placement Telecomm functionalities tend to be placed in conventional locations Customer Premises Aggregation Point Point of Presence Core Network Edge Data Center Some telecomm functionalities really must reside at their locations LoopBack testing (what would it mean to move LB to a data center?) End-to-End security (why encrypt packets after they traverse the network ) Some should be left in the conventional locations End-to-End performance monitoring (it wouldn’t be end-to-end – would it ?) DDoS attack blocking (best to block as close to source as possible) Some may be placed almost anywhere Path Computation Charging/billing functionality

D-NFV breaking out of the DC Slide 5 Distributed NFV With Virtualized Network Functions (not virtualized network resources) placement is no longer dictated by convention or equipment placement can be optimally determined anywhere in the network The idea of optimally placing virtualized network functions in the network is called Distributed NFV Placement decisions can be based on resource availability (computational power, storage, bandwidth) real-estate availability and costs energy and cooling management and maintenance other economies of scale function chaining order policy security and privacy regulatory issues … Consider moving a DPI engine from where it is needed and sending the packets to be inspected to a remote DPI engine If bandwidth is unavailable or expensive or excessive delay is added then DPI must not be relocated even if computational resources are less expensive elsewhere!

D-NFV breaking out of the DC Slide 6 Some D-NFV criteria CriterionDescription Feasibility Some functions can’t be relocated from customer site, e.g., loopback testing, end-to-end security, traffic conditioning, encryption, WAN optimization Performance Some functions perform better at the customer premises, e.g., end-to-end QoS, application QoE monitoring Some functions may degrade due to network constraints (bandwidth, delay, availability) Cost Needs for higher network performance and resiliency may lead to cost increases, even with Data Center economies of scale Policy Some functions need to be left near the customer due to corporate privacy, security, and access policies Regulatory restrictions (e.g., on moving data across jurisdictions) may also apply

D-NFV breaking out of the DC Slide 7 Relocation and CPEs One relocation that has been actively discussed recently is being called virtualization of the CPE (vCPE) (virtualization means relocation) Here CPE functionality is virtualized and moved from the customer premises leaving behind only minimal functionality (OAM, traffic conditioning) Equally interesting is virtualization in the CPE Here functionalities are moved to the customer premises Customer Premises Customer Network CPE Network Data Center Customer Premises Customer Network CPE Network Data Center VNF

D-NFV breaking out of the DC Slide 8 Virtualization and relocation of CPE pC vC pC Partial Virtualization vC pvC vC Full Virtualization Full Relocation Partial Relocation p physical v virtual C CPE

D-NFV breaking out of the DC Slide 9 VM-enhanced NID Virtualization in the CPE requires a customer premises device capable of hosting VNFs A reasonable device would be the Network Interface Demarcation device For example, RAD has integrated an x86 module into its ETX2 L2/L3 NID This device retains all its NID functionality (OAM, traffic conditioning) and acquires the capability of hosting arbitrary software functions The combined ETX/VM device is located at the customer premises under the control of the Service Provider Thus the SP can rapidly download arbitrary functionalities to the NID for its own purposes (diagnostics, visibility, blocking traffic, etc.) as a Value Added Service for the customer (firewall, NAT, IDS, etc.) without the need for installing any new network equipment

D-NFV breaking out of the DC Slide 10 Advantages of VM-enhanced NID The NID needs to be deployed in any case and the additional cost of the computational power is minimal On-site installation, maintenance, and energy costs are much lower than for multiple dedicated devices The marginal cost of a VNF is that of a software license plus OPEX VNFs can be downloaded on-demand and very rapidly and can be activated/deactivated/removed as required Multiple VNFs can be chained on a single device the only limitation being the module’s computational power and memory The CPU connects to the internal NID switch ports and so can operate on packets at various stages (ingress, in-process, egress) VAS VNFs can be offered on a trial basis enabling a “try and buy” approach

D-NFV breaking out of the DC Slide 11 ETX/VM architecture The ETX/VM houses three virtual entities 1.standard ETX NID (OAM, policing, shaping, etc.) 2.VM infrastructure (hypervisor) 3.VNFs that run on the VM infrastructure The VNFs are managed by an NFV orchestrator and are written by compliant vendors or by the Service Providers themselves Network ETX2 Customer Site Customer Network Hypervisor VNF D-NFV orchestrator

D-NFV breaking out of the DC Slide 12 Example: Packet Replication Network Hypervisor Customer Network NNI UNI Classifier Packet Replicator D-NFV Orchestrator This simple VNF replicates particular packets, e.g., for diagnostics ad-hoc multicast lawful interception Management System

D-NFV breaking out of the DC Slide 13 Example: Packet Editing Network Hypervisor Customer Network NNI UNI Classifier Packet Editor D-NFV Orchestrator This simple VNF edits particular packet headers, e.g., to swap/add/remove VLAN tags or MPLS labels tunnel certain packets across another network remark packet priorities Management System

D-NFV breaking out of the DC Slide 14 Example: NAT64 IPv6 Network Hypervisor NAT64 D-NFV Orchestrator This VNF stitches together IPv4 and IPv6 networks (RFC 6145) traffic packets headers are rewritten control protocols are interworked (ICMP, ARP, NDP, …) Application Layer Gateways are implemented IPv4 Network

D-NFV breaking out of the DC Slide 15 Example: Application Visibility Network Hypervisor Customer Network NNI UNI DPI engine Statistics D-NFV Orchestrator This VNF is a probe for SP application type visibility Application statistics are sent for display using specialized packets The DPI engine is optimized for performance Visibility Display

D-NFV breaking out of the DC Slide 16 Example: Firewall Network Hypervisor Customer Network Firewall VLANs Pass-through VLANs NNI UNI Firewall VLANs Firewall Management Open vSwitch Firewall VNF D-NFV Orchestrator As a final example, consider a firewall VAS (demo at the RAD booth) The hypervisor and vSwitch are Open Source software The firewall VNF is a third-party application rule

D-NFV breaking out of the DC Slide 17 D-NFV Placement Problems Pure D-NFV placement optimization problem Given: the path taken by the traffic (and the availability of extra bandwidth if needed) the VNF(s) to be installed, including computational requirements for multiple VNFs – the (partial) ordering of VNFs places where computational resources are available, and present loadings D-NFV criteria and constraints Find the optimal D-NFV placement(s) Joint PC/D-NFV optimization Given: traffic source and sink points service bandwidth and delay requirements the VNF(s) to be installed, including computational requirements for multiple VNFs – the (partial) ordering of VNFs places where computational resources are available, and present loadings D-NFV criteria and constraints Find the optimal path and VNF placement(s)

D-NFV breaking out of the DC Slide 18 Summary One should differentiate between Virtualization and Relocation NFV means Network Function Virtualization not necessarily relocation to Data Centers Distributed NFV means placing VNFs in their optimal location which is frequently at the customer premises There are many advantages to a VM-enhanced customer NID and many useful VNFs for it D-NFV placement is a non-trivial orchestration problem