Internet DRAFT - draft-deng-nfvcon-nb-use-cases
draft-deng-nfvcon-nb-use-cases
Network Working Group L. Deng
Internet-Draft China Mobile
Intended status: Informational H. Song
Expires: December 6, 2014 Huawei
G. Karagian
U. of Twente
E. Haleplidis
U. of Patras
B. Martini
CNIT
June 4, 2014
NFV configuration north bound use cases
draft-deng-nfvcon-nb-use-cases-00
Abstract
This specification lists some classical use cases of NFV
configuration, especially those related to the north bound operation
with the involvement of network function provider and the network
function consumers, for example VNF installation, migration,
replication, on-demand resource allocation and etc.. These use cases
are only relative to the virtualization characteristics of network
functions. These use cases will be used to identify the proper
standard space and scope for the NFV configuration.
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on December 6, 2014.
Deng, et al. Expires December 6, 2014 [Page 1]
Internet-Draft nb use cases June 2014
Copyright Notice
Copyright (c) 2014 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 4
3. Use Cases . . . . . . . . . . . . . . . . . . . . . . . . . . 4
3.1. VNF store: NSP's app store for VNFs . . . . . . . . . . . 5
3.2. VNF as a Service (VNFaaS): configuration and management . 5
3.3. VNF as a Platform (VNFaaP): configuration and management 7
3.4. VNF migration: travel with your NSP "devices" . . . . . . 9
3.5. VNF installation: customizing personal VNFs . . . . . . . 10
3.6. VNF template: common profile for managing multiple VNF
instances . . . . . . . . . . . . . . . . . . . . . . . . 10
3.7. Dynamic resource usage . . . . . . . . . . . . . . . . . 11
3.8. Service Function Chaining . . . . . . . . . . . . . . . . 11
4. Security Considerations . . . . . . . . . . . . . . . . . . . 12
5. Acknowledgement . . . . . . . . . . . . . . . . . . . . . . . 12
6. References . . . . . . . . . . . . . . . . . . . . . . . . . 12
6.1. Normative References . . . . . . . . . . . . . . . . . . 12
6.2. Informative References . . . . . . . . . . . . . . . . . 13
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 13
1. Introduction
This document describes the typical use cases for NFV (Network
Function Virtualization) configuration and management. Based on the
Network Function Configuration Architecture, see VNF configuration
architecture [I-D.zhou-opsawg-vnf-config-arch], four key roles can be
identified in these use cases, (1), the network function provider,
(2) network service provider, (3), the network function consumer,
(4), the NFV control plane, (5), the NFV infrastructure, see
Figure 1.
Deng, et al. Expires December 6, 2014 [Page 2]
Internet-Draft nb use cases June 2014
Network function providers provide the network function software and
related description information that are necessary for the network
function consumer to know. Network function providers are
responsible for the lifecycle management of the network functions,
for example, on-shelf, updates, and delete.
Network function consumers are those who use the network functions
deployed inside the network service provider, i.e. NSP's network.
The network function consumers can be the home user, the enterprise
user or the NSP. Home user and enterprise user can directly manage
their network functions such like virtual firewall or virtual
residential gateway in the provider's network. But NSPs can also be
the user of network functions, for example, carrier grade NAT.
+----------------+ +----------------+ +----------------+
|Network Function| |Network Function| |Network Service |
| Provider | |Consumer | | |
+----------------+ +-------+--------+ +----------------+
-- | --
-- | --
-- | ---
-- | ---
-- | --
-- | ---
-- | --
+--------------------------------+
|NFV Control and Management Plane|
+--------------------------------+
|
|
|
+-------------------+---------------------+
| NFV Infrastructure |
|+----------+ +---------+ +--------+ |
|| Computing| | Storage | | Network| |
|+----------+ +---------+ +--------+ |
+-----------------------------------------+
Figure 1 Key roles used in use cases
(Note: this architecture will be mapped to the published ETSI NFV architecture)
There are many issues that the NFV control plane may be involved in,
and it is assumed that the existing standard protocols have already
solved the physical network functions' management and operation
problems (despite the fact that they have not), but they have not
solved the new problems introduced by the virtualization of network
Deng, et al. Expires December 6, 2014 [Page 3]
Internet-Draft nb use cases June 2014
functions, for example, the virtualization network function
installation, the dynamic lifecycle management, the dynamic
migration, the revocable of a particular network function. In this
document, only those use cases relative to the new problems will be
introduced.
2. Terminology
Note: The following terms used in this document will be aligned with
their definitions from ETSI GS NFV 003[ETSI_GS_NFV_003] . (Note: It
will aovid confusion of different terms. But what about the
copyright issue? or there is no copyright issue?)
Network Function Provider: a Network Function Provider (NFP) provides
virtual network function software.
Network Service Provider (NSP): a company or organization, that
provides a network service on a commercial basis to third parties. A
network service is a composition of network functions and defined by
its functional and behavior specification. The NSP operates the NFV
Control Plane.
Network Function Consumer: a Network Function Consumer (NFC) is the
consumer of virtual network functions. It can be either an
individual user, home user or the enterprise user.
Virtual Network Function: an implementation of an executable software
program that constitutes the whole or a part of a network function
that can be deployed on a virtualization infrastructure.
Physical Network Function: a physical network function indicates a
physical appliance of functional building block within an operator's
network infrastructure, which has well-defined external interfaces
and a well-defined functional behavior.
NFV Infrastructure: NFV Infrastructure indicates the computing,
storage and network resources to implement the virtual network
function. High performance acceleration platform is also part of it.
NFV Control and Management Plane: a NFV Control and Management Plane
is operated by a NSP and orchestrates the NFV Infrastructure to
provide NFV service to NFC.
3. Use Cases
Deng, et al. Expires December 6, 2014 [Page 4]
Internet-Draft nb use cases June 2014
3.1. VNF store: NSP's app store for VNFs
By the decoupling between the software implementation and hardware
platform of network devices enabled by virtualization technology, it
is envisioned that various functional components of consumer/network
devices (e.g. gateway, firewall, IDS, WAN acceleration), which are
traditionally provided by the local NSP/ third party device
manufactures in the form of dedicated hardware boxes, can be deployed
into a virtual machine within the local NSP's data center as a piece
of software instance (i.e. virtual network function or VNF).
By setting up an VNF store, an NSP operated application store
dedicated for various VNFs, the local NSP would be able to provide a
much convenient way for its users (both enterprise and individual
consumers) to search for, learn more about, compare between and make
purchase for specific NSP VNFs according to its personalized needs,
and a more convenient way for the network function providers to
provide their software package. Please note that a NSP itself can be
the customer of the VNF store. The main motivation for a NSP to
become the customer is for its transparent service to its
subscribers, for example, traffic optimization, carrier grade NAT and
etc.
(Note: the authors will add the list of what should be done in the
context of NFVCon.)
3.2. VNF as a Service (VNFaaS): configuration and management
This use case is based on Use case #2: Virtual Network Function as a
Service (VNFaaS) described in ETSI GS NFV 001[ETSI_GS_NFV_001] . This
use case focuses on the configuration of a virtualized enterprise
service, where the VNF is the NSP's application and the enterprise
user is the consumer of this service. By making the VNF
functionality available to enterprise users as a service is
comparable to the cloud computing concept denoted as the Software as
a Service (SaaS). According to NIST SP 800-146 [NIST_SP_800-146]
SaaS is the possibility for the consumer to use software applications
running on a cloud infrastructure. The consumer, however, cannot
manage the application only from a configuration perspective and
cannot control the underlying infrastructure.
The main motivation of specifying such virtualized enterprise service
is that rather than that enterprise users invest their own capital in
deployment of networking infrastructure, the NSP may be able to
provide advanced networking features as a measured service on an
expense basis.
Deng, et al. Expires December 6, 2014 [Page 5]
Internet-Draft nb use cases June 2014
Several examples of VNFaaS are provided in ETSI GS NFV
001[ETSI_GS_NFV_001]. For example, in use case #2: Virtual Network
Function as a Service (VNFaaS), the VNFaaS is related to the services
that are deployed by enterprise users at the edge of branch offices.
Due to the fact that the enterprise users are faced with big required
investments, such enterprise users are looking for outsource
alternatives, which can be the virtualization of the enterprise CPE
(e.g., VFN of an access router) into the NSP's network. In this
example the used VNFs are the virtualized CPE and PE (Provider
Equiment). In use case #5: Virtualization of Mobile Core and IMS (IP
Multimedia Subsystem), the VNFaaS is related to services that are
related to the virtualization of the EPC (Evolved Packet Core). The
EPC and IMS are standardized by the 3GPP standardization body. In
this example the VNFs are the network entities supported by the EPC,
such as the MME (Mobility Management Entity), P-GW (Packet Data
Network Gateway), S-GW (Serving Gateway), Home Subscriber System
(HSS). In this example the VNFaaS is the EPCaaS.
Both that VNFaaS provider and enterprise consumer share the
responsibility for the management of the VNFaaS. The NSP is
responsible for the lifecycle management of the VNFaaS instances to
provide the expected service level (SLA) for the subscribers to the
VNFaaS. The VNFaaS lifecycle management is similar to the cloud
lifecycle management steps. In particular, the EU FP7 project Mobile
Cloud Networking (MCN) [MCN], defined the following lifecycle
management steps that can also be applied for the VNFaaS lifecycle
management:
o Design: at this stage the service's technical design is carried
out.
o Implement: with a service design the service is implemented.
o Deploy and provision: The VNF management is deployed and the
necessary service instances are starting to be created. o
o Runtime and Operation: the created VNF and service instances for
each tenant are monitored and managed. It is during this step
where scaling in and out of VFNs is carried out. Scaling in
occurs when a VFN is releasing resources and scaling out occurs
when new resources are allocated to a VFN.
o Disposal: the VFNs associated with a service instance are
disposed.
The enterprise users expect to manage and configure their customer
premises entities.
Deng, et al. Expires December 6, 2014 [Page 6]
Internet-Draft nb use cases June 2014
The NFVcon can focus on providing the interfaces and protocols
required by the network function provider, network service provider
and the network function consumer to configure and manage the VNFaaS.
Some challenges that need to be solved are:
o Appropriate authentication and authorization mechanism are
required to support the orchestration of VNF instances. For
example only authorized VNF instances are permitted to execute on
the NFVI. Moreover, mechanisms should be provided such that VNF
instances can only access the physical and virtual terminations to
which their access is authorized.
o A virtualized environment needs to guarantee complete isolation
among the network function consumers. Special considerations are
needed for protecting network function consumer data and
configuration files.
o By providing a VNFaaS as a measured service requires usage
measurement metrics and infrastructure appropriate to the type of
VNF as well as appropriate Service Level Agreements. VNFaaS usage
measurements need the appropriately auditable accounting treatment
to be used as basis for service billing arrangements.
o Resource scaling: scaling up and down network resources used by
VNFs
o Service awareness: service aware resource allocation to network
functions
o State maintenance: Network and network function state management
during network function relocation, replication and resource
scaling
o Appropriate mechanism for monitoring/fault detection/diagnosis
of all components and their states after virtualization, e.g., VNF
instances, hardware, hypervisor
o Traffic control separation mechanism: Data and management
traffic identification/separation for non-virtualized and
virtualized networks.
3.3. VNF as a Platform (VNFaaP): configuration and management
This use case is based on Use case #3: Virtual Network Platfom as a
Service (VNPaaS) described in ETSI GS NFV 001[ETSI_GS_NFV_001]. This
use case focuses on the configuration of a virtualized network
platform, where a network service provider makes available a suite of
Deng, et al. Expires December 6, 2014 [Page 7]
Internet-Draft nb use cases June 2014
infrastructure and applications as a platform on which the enterprise
users can deploy their own network applications. By using this
platform, the enterprise users could develop their own network
service that is customized to their business purposes.
Making the VNF platform available to enterprise users as a service is
comparable to the cloud computing concept as a Platform as a Service
(PaaS), which is defined in NIST SP 800-146 [NIST_SP_800-146] as
follows. PaaS is the possibility for the consumer to use software
applications running on a cloud infrastructure. The consumer can
control the deployed application, but it cannot control the
underlying network or the cloud infrastructure (i.e., the NFVI).
In this use case the NSP provides a toolkit of (1) networking and
computing infrastructure and (2) potentially some VNFs as a platform,
for the creation of a virtual network, denoted as Virtual Network
Platform as a Service (VNPaaS). The enterprise consumer uses this
toolkit to develop its own virtual network.
The VNPaaS is similar to VNFaaS, but it differs mainly on the scope
of control provided to the consumer of the service. The VNPaaS is
able to provide a larger scale service, which typically will be the
provision of a virtual network rather than a single virtual network
function. In particular, the VNFaaS is limited to the configuration
of a set of VNF instances made available by the NSP, while the VNPaaS
provides the possibility to the enterprise consumer to introduce
their own VNF instances as well.
Several types of services can be supported by a VNPaaS, ranging from
a simple firewall service for a single enterprise to a whole business
communication suite based on an IMS network for a 3rd party.
The NFVcon can focus on providing the interfaces and protocols
required by the network function provider, network service provider
and the network function consumer to configure and manage the VNPaaS.
In addition to the VNFaaS challenges listed in Section 3.3, some
additional challenges need to solved:
o Access control should be based on an authorized user identity
o Infrastructure resources need to provide mechanisms to separate
workloads from different network service providers.
o Infrastructure resources and network functions support an
interface used to monitor, guarantee and limit the usage of the
resources by each network service provider.
Deng, et al. Expires December 6, 2014 [Page 8]
Internet-Draft nb use cases June 2014
3.4. VNF migration: travel with your NSP "devices"
A travelling consumer's experience would be highly improved if he/she
found that all their subscribed network devices are also travelling
with them automatically/on demand. The portability of VNF-based NSP
services is based on VNF migration within the local NSP's data
centers or even across different NSPs' domains.
+----------------+ 2.vRGW is migrated to a +----------------+
| Haibin's vRGW +----------------------------> Haibin's vRGW |
+--------+-------+ data center in Shenzhen +--------+-------+
| |
| |
Previous | |
| | Now
| |
| |
| |
+---+--+ 1.Haibin left Nanjing +---+--+
|Haibin+------------------------------------->|Haibin|
+------+ and moved to Shenzhen +------+
Nanjing Shenzhen
Figure 2. VNF migration
As shown in Figure 2, while Haibin moves from Nanjing to Shenzhen,
his virtual residential gateway (including DHCP, firewall and ALG
functions and etc) is also migrated from Nanjing to Shenzhen. This
kind of migration, when compared with the dedicated hardware box
residential gateway, can improve the user's experience as he did not
lose any data or configuration.
Usually it has the following features:
o It allows a network function consumer to do migration
configuration/subscription for a given VNF;
o It allows the local NSP to detect the movement of a travelling
consumer and trigger subsequent VNF migration accordingly;
o It provides robust authentication mechanism for a roaming user
to access a migrated VNF;
o It provides clearly stated resource requirement for
accommodating a migrated VNF in a visiting datacenter/NSP domain,
and provide reliable resource/performance splicing for a migrated
Deng, et al. Expires December 6, 2014 [Page 9]
Internet-Draft nb use cases June 2014
VNF against local abuse from bugs/holes in third party developed
software. This may not be visible to the NFC, but the SLA will be
met during and after the migration.
3.5. VNF installation: customizing personal VNFs
A NSC may want to customize its VNF instance, to specialize its
installation of functional building blocks, with regarding to its own
requirements from traffic pattern, service preference, and security/
privacy sensitivity.
Take traffic pattern for example, if there is a VNF for censoring the
traffic, if the traffic sent to this VNF are video packets, then the
NSC may want to install a video censoring function block, e.g. for
pornography. If the traffic sent to the VNF is text packets then the
user may want to install a text censoring function block. If the
traffic is a combination of video and text, then the NSC may need to
install another functional block for classification. NFCs do not
need to install unnecessary function blocks on their own VNFs.
There are also considerations from security or privacy aspects. A
website's owner has much more concerns on security protection than an
individual subscriber, while a habitual on-line shopper cares much
more on privacy protection than a webpage visitor. This also brings
different components to be installed on the NFC's VNF.
Deployment position considerations can be another advantage of
virtualization.
The difference between this VNF installation and the traditional
dedicated hardware physical network function appliance is that a NFC
can customize his VNF and the position of the VNF, and make the VNF
run immediately after his requirements are sent to the NFV control
plane.
(Note: the authors will add the list of what should be done in the
context of NFVCon.)
3.6. VNF template: common profile for managing multiple VNF instances
For enterprise scenario, it is often the case that an IT personnel is
responsible for setting up the network access environments for a
potentially quite large number of individual employees. Although
there maybe variations among employees' requirements and entitlements
according to their roles and ranks in the organizational hierarchy,
it is expected that by predefining some general applicable VNF
templates to capture the common demand for a group and allowing the
consumer to apply them to multiple VNF instances simultaneously with
Deng, et al. Expires December 6, 2014 [Page 10]
Internet-Draft nb use cases June 2014
a simple command/interface, the management cost would be greatly
reduced. This kind of VNF includes the virtual firewall.
If there are some exactly same VNFs, the NFV control and management
plane (1) can map the same configuration to multiple replicas,
without that the NFC needs to know the position of the VNFs, and (2)
operates them individually.
This use case has the following features:
o It allows pre-defined template for VNF configuration;
o It allows for template-based VNF group management.
(Note: the authors will add the list of what should be done in the
context of NFVCon.)
3.7. Dynamic resource usage
Network function customers may have demand for automatic scale out
and scale in for resource usage, and pay for the amount of resource
it has used. This is extremely useful when the NFC cannot predict
his resource usage or the resource usage is not stable. For example,
one enterprise user as a NFC may have much traffic processing load on
its VNF(s) during the daytime, but in the night, the NFC does not
have any load on its VNF(s). Automatic scale out and scale in can be
implemented in different ways, such like automatically generating/
deleting new VNF instances while monitoring the load status.
This use case may require the NFC and the NFV control and management
plane to negotiate the policy of it.
3.8. Service Function Chaining
For service function chains, NFC tells the NFV control and management
plane about the specific service processing order, to make specific
traffic go through that order. The service functions can be inside
one VNF, different VNFs in one physical server or different VNFs in
different physical servers. The description from the NFC to the NFV
control and management plane may include the traffic classification
rules, and the service chaining order, and other relative policies.
The control and management plane can be agnostic of the service
chaining logic, but must be able to pass the right chain description/
policy to the right VNF.
Deng, et al. Expires December 6, 2014 [Page 11]
Internet-Draft nb use cases June 2014
4. Security Considerations
Network function virtualization may make attacks easier, when using
standard IT method to normalize the dedicated network function
appliances, and make it easily accessed by the consumers. In
particular, the following security considerations need to be taken
into account:
o Access control should be based on an authorized user identity
o Provide robust authentication mechanism for a roaming user to
access a migrated VNF
o Appropriate authentication and authorization mechanism are
required to support the orchestration of VNF instances. For
example only authorized VNF instances are permitted to execute on
the NFVI. Moreover, mechanisms should be provided such that VNF
instances can only access the physical and virtual terminations to
which their access is authorized.
o A virtualized environment needs to guarantee complete isolation
among the network function consumers. Special considerations are
needed for protecting network function consumer data and
configuration files.
5. Acknowledgement
Thanks to Diego Lopez for his valuable comments to this document.
And thanks to the people who joined the succesful side meeting
discussion, some of the ideas are from the discussion. The main
people are: Diego Lopez, Mehmet Ersue, Melinda Shore, Juergen
Schoenwaelder, Jiang Yuanlong, Cathy Zhou, Zhen Cao,Hui Deng,
Georgios Karagian, Evangelos Haleplidis, Deng Lingli, Kostas
Pentikousis, Michael Scharf.
6. References
6.1. Normative References
[I-D.zhou-opsawg-vnf-config-arch]
Zhou, H., Song, H., and F. Qiao, "Virtual Network Function
Configuration Architecture", draft-zhou-opsawg-vnf-config-
arch-00 (work in progress), September 2013.
Deng, et al. Expires December 6, 2014 [Page 12]
Internet-Draft nb use cases June 2014
6.2. Informative References
[ETSI_GS_NFV_001]
"Network Functions Virtualisation (NFV); Use Cases", ETSI
GS NFV specification Network Functions Virtualisation
(NFV) ETSI ISG, ETSI GS NFV 001, v1.1.1, October 2013.
[ETSI_GS_NFV_003]
"Network Function Virtualisation (NFV); Terminology for
Main Concepts in NFV", ETSI GS NFV specification Network
Function VIrtualisation (NFV) ETSI ISG, ETSI GS NFV 003,
v1.1.1, Oct 2013.
[NIST_SP_800-146]
"Draft Cloud Computing Synopsis and recommendations", NIST
specifications , May 2011.
Authors' Addresses
Deng Lingli
China Mobile
Email: denglingli@chinamobile.com
Haibin Song
Huawei
Email: haibin.song@huawei.com
Georgios Karagian
U. of Twente
Email: karagian@cs.utwente.nl
Evangelos Haleplidis
U. of Patras
Email: ehalep@gmail.com
Barbara Martini
CNIT
Email: barbara.martini@cnit.it
Deng, et al. Expires December 6, 2014 [Page 13]