Virtualized Network Function (VNF) Pool Problem Statement IETF 90 th, Toronto, Canada. Melinda Shore Ning Zong Linda Dunbar Diego Lopez Georgios Karagiannis.

Slides:



Advertisements
Similar presentations
Diameter Credit Control Application Tutorial - IETF67
Advertisements

High Availability Project Qiao Fu Project Progress Project details: – Weekly meeting: – Mailing list – Participants: Hui Deng
OSI Model OSI MODEL.
An Approach to Secure Cloud Computing Architectures By Y. Serge Joseph FAU security Group February 24th, 2011.
1 Cheriton School of Computer Science 2 Department of Computer Science RemusDB: Transparent High Availability for Database Systems Umar Farooq Minhas 1,
IETF BMWG – Benchmarking Methodology WG: Considerations for Benchmarking VNFs and their Infrastructure Al Morton Nov 19, 2014
City University London
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Chapter 1 Read (again) chapter 1.
6/26/2015 4:41 AM 1 NVRG Charter Revision Joe Touch, USC/ISI.
Considerations for Benchmarking VNFs and their Infrastructure Al Morton November 13, 2014.
Dynamic Adaptation of VNF Forwarding Graph
Resource Management for Dynamic Service Chain Adaptation
HA Scenarios.
VIRTUALIZATION AND YOUR BUSINESS November 18, 2010 | Worksighted.
©Ian Sommerville 2006Critical Systems Slide 1 Critical Systems Engineering l Processes and techniques for developing critical systems.
The OSI Model A layered framework for the design of network systems that allows communication across all types of computer systems regardless of their.
Client-Server Computing in Mobile Environments
5205 – IT Service Delivery and Support
NETWORK MODELS T.Najah Al_Subaie Kingdom of Saudi Arabia Prince Norah bint Abdul Rahman University College of Computer Since and Information System NET331.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 11 Slide 1 Architectural Design.
Windows Server 2008 R2 CSIT 320 (Blum) 1. Server Consolidation – Today’s chips have enhanced capabilities compared to those of the past. In particular.
Protocols and the TCP/IP Suite Chapter 4. Multilayer communication. A series of layers, each built upon the one below it. The purpose of each layer is.
ATIF MEHMOOD MALIK KASHIF SIDDIQUE Improving dependability of Cloud Computing with Fault Tolerance and High Availability.
Network Architecture and Protocol Concepts. Network Architectures (1) The network provides one or more communication services to applications –A service.
Lecture 1 The OSI Model Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
A Cloud is a type of parallel and distributed system consisting of a collection of inter- connected and virtualized computers that are dynamically provisioned.
Virtualization. Virtualization  In computing, virtualization is a broad term that refers to the abstraction of computer resources  It is "a technique.
IEEE R lmap 23 Feb 2015.
M.A.Doman Short video intro Model for enabling the delivery of computing as a SERVICE.
Redundancy. 2. Redundancy 2 the need for redundancy EPICS is a great software, but lacks redundancy support which is essential for some highly critical.
IETF54 Charter Issues Dealt with since IETF53 PANA WG Meeting Basavaraj Patil.
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: MIIS and Its Higher Layer Transport Requirements: Ad hoc Update and Discussion on.
Internet Protocol Internetworking Lab 1. Why Internet?
A Brief Intro to Virtualiztion. What is Virtualization? An abstraction Usually performed via software Many different types –Hardware –Software –Data –Network.
Application Policy on Network Functions (APONF) G. Karagiannis and T.Tsou 1.
2.1 Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
MODULE I NETWORKING CONCEPTS.
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
SECURITY IN CLOUD COMPUTING By Bina Bhaskar Anand Mukundan.
Introduction to Grids By: Fetahi Z. Wuhib [CSD2004-Team19]
OSI Model Cisco Academy Semester 1, Chapter 2. The Seven Layers of the OSI Model International Organization of Standardization ISO.
What is virtualization? virtualization is a broad term that refers to the abstraction of computer resources in order to work with the computer’s complexity.
Gerald Kunzmann, DOCOMO Carlos Goncalves, NEC Ryota Mibu, NEC
Security Vulnerabilities in A Virtual Environment
Chapter 2: Testing in Software Life Cycle MNN1063 System Testing and Evaluation.
Network Virtualization Overlay Use Cases Lucy Yong, Mehmet Toy, Aldrin Isaac, Vishwas Manral, Linda Dunbar September 20, 2012 Boston draft-mity-nvo3-use-case.
Reading TCP/IP Protocol. Training target: Read the following reading materials and use the reading skills mentioned in the passages above. You may also.
NFV Configuration Problem Statements Haibin Song Georgios Karagiannis
OSI Model. Open Systems Interconnection (OSI) is a set of internationally recognized, non proprietary standards for networking and for operating system.
Virtualized Network Function (VNF) Pool BoF IETF 90 th, Toronto, Canada. BoF Chairs: Ning Zong Melinda Shore
1 © Process Software Corp. DHCP Failover Protocol Jeff DECUS Europe 2000 Thursday, 13 Apr :00 - 9:45.
and LMAP liaison Document Number: IEEE R0 Date Submitted: Source: Antonio BovoVoice:
TCP/IP Protocol Suite Suresh Kr Sharma 1 The OSI Model and the TCP/IP Protocol Suite Established in 1947, the International Standards Organization (ISO)
Fabric: A Retrospective on Evolving SDN Presented by: Tarek Elgamal.
VIRTUALIZATION TECHNIQUES By:- Aman, Denis and Dharit.
Path Computation Element (PCE) Discovery using Domain Name System(DNS) draft-wu-pce-dns-pce-discovery-07 Qin Wu ) Dhruv Dhody
CLOUD COMPUTING Presented to Graduate Students Mechanical Engineering Dr. John P. Abraham Professor, Computer Engineering UTPA.
CS 6027 Advanced Networking FINAL PROJECT ​. Cloud Computing KRANTHI ​ CHENNUPATI PRANEETHA VARIGONDA ​ SANGEETHA LAXMAN ​ VARUN ​ DENDUKURI.
OSI Model OSI MODEL. Communication Architecture Strategy for connecting host computers and other communicating equipment. Defines necessary elements for.
OSI Model OSI MODEL.
X V Consumer C1 Consumer C2 Consumer C3
A Brief Intro to Virtualiztion
A Brief Intro to Virtualiztion
Dr. John P. Abraham Professor, Computer Engineering UTPA
Virtualization Layer Virtual Hardware Virtual Networking
SUPA Policy-based Management Framework (SUPA: Simplified Use of Policy Abstractions) draft-ietf-supa-policy-based-management-framework-01 Will Liu, John.
OSI Model OSI MODEL.
Presentation transcript:

Virtualized Network Function (VNF) Pool Problem Statement IETF 90 th, Toronto, Canada. Melinda Shore Ning Zong Linda Dunbar Diego Lopez Georgios Karagiannis

Main Changes Since London BoF Add a new section of VNF Pool. The new section is mainly to outline that our scope is based on the VNF instance pooling managed by a VNF, which is not visible to the entities outside of VNF, such as Service Control Entity. Scope clarification – We specifically concern with reliability of an individual VNF, not address the reliability related control or routing between different VNFs in the whole service graph. – Service state synchronization is out of scope in this phase. – We currently assume that a VNF Pool contains the VNF instances of same functional type. Different types of VNF instances are in separate VNF Pools. Re-arrange the section of Problems to focus on – Redundancy model managed by VNF – Interaction between VNF and Service Control Entity Update the section of Relation between VNFPool and SFC.

Using VNFs to Build Network Service Virtualized Network Functions (VNFs) can be used to build network services, with various forms of service graph.

Reliability Challenges However, there are reliability challenges to VNFs. – For a VNF instance, it typically would not have built-in reliability mechanisms on its host (i.e., a general purpose server). – More risk factors that may lead a VNF instance unreliable, such as hardware failure or status change such as server overload; software failure at various levels including hypervisor, Virtual Machine (VM), VNF; instance migration caused by instance performance, server consolidation or other service requirement changes. maybe more …

VNF Pool To achieve high reliability, a VNF may adopt a pooling mechanism, where a number of VNF instances with the same function are grouped as a pool to provide the function. We call such a pool a VNF Pool. The reliability mechanisms such as redundancy model are achieved by the VNF Pool adopted by the VNF, and thus not visible to the Service Control Entity.

Challenges and Open Issues Redundancy management – How to manage the redundancy model, e.g., select active/standby VNF instances in a VNF Pool considering the infrastructure conditions? – There could be policies influencing the selection/placement of backup instance too. Interaction between VNF and Service Control Entity – What information is exchanged between a VNF and a Service Control Entity? – After a VNF instance failover, how does a VNF notify the Service Control Entity of characteristic changes of the VNF, without disclosure of the pooling procedure? Reliable transport – The transport mechanism used to carry the pool control messages, e.g., redundancy management, should provide reliable message delivery.

Relation to SFC SFC and VNF Pool are complementary. – SFC would essentially see a VNF Pool-enabled VNF as a normal service function and therefore be able to merge it into an SFC just like any other service functions. – Just like the communication between any pool users and VNF Pool, the information exchanged between the VNF Pool and the SFC may include some operational information of the VNF Pool.

Q & A