Internet DRAFT - draft-geng-nfvrg-distributed-nfv
draft-geng-nfvrg-distributed-nfv
NFVRG L. Geng
Internet-Draft China Mobile
Intended status: Informational March 7, 2017
Expires: September 8, 2017
Distributed NFV in Scattered Premises
draft-geng-nfvrg-distributed-nfv-00
Abstract
This document introduces the distributed NFV (D-NFV) concept based on
potential implementation in scattered locations including customer
edge devices and transport network equipments. The motivation of
pushing NFV entities from conventional centralized infrastructures to
distributed promises is discussed, which are driven by the
requirements of high flexibility, low end-to-end latency and faster
time-to-market in future network. To better understand the D-NFV
concept, examples of D-NFV implementation is introduced. Potential
use cases are also described as references for readers. Gaps have
also been recognized in the documents in terms of the investigation
of appropriate virtualization technologies used in the D-NFV and
corresponding management and orchestration challenges.
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on September 8, 2017.
Copyright Notice
Copyright (c) 2017 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
Geng Expires September 8, 2017 [Page 1]
Internet-Draft Distributed NFV March 2017
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
2. Requirements Language . . . . . . . . . . . . . . . . . . . . 3
3. Terminology and Abbreviations . . . . . . . . . . . . . . . . 3
4. NFV in Different Points of Presence . . . . . . . . . . . . . 3
4.1. Centralized NFV . . . . . . . . . . . . . . . . . . . . . 3
4.2. Distributed NFV . . . . . . . . . . . . . . . . . . . . . 4
5. Typical NFVI-PoPs in Distributed NFV . . . . . . . . . . . . 6
5.1. Distributed NFV in Customer Edge Devices . . . . . . . . 6
5.2. Distributed NFV in Service Provider Transport and Bearer
Networks . . . . . . . . . . . . . . . . . . . . . . . . 7
6. Use cases of Distributed NFV . . . . . . . . . . . . . . . . 7
6.1. Use Case 1 - VNFaaS and VNPaaS in Residential and
Enterprise Network . . . . . . . . . . . . . . . . . . . 7
6.2. Use Case 2 - Mission Critical Services . . . . . . . . . 7
6.3. Use Case 3 - End-to-end Network Slicing Management . . . 8
6.4. Use Case 4 - Managed Multiple Provisioning for Network
Elements . . . . . . . . . . . . . . . . . . . . . . . . 8
6.5. Use Case 5 - Elastic VPN . . . . . . . . . . . . . . . . 8
7. Rethinking VNFs in Distributed NFV . . . . . . . . . . . . . 8
8. Virtualization Technologies in Distributed NFV . . . . . . . 8
9. Management and Orchestration of Distributed NFV . . . . . . . 8
10. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 9
11. Security Considerations . . . . . . . . . . . . . . . . . . . 9
12. References . . . . . . . . . . . . . . . . . . . . . . . . . 9
12.1. Normative References . . . . . . . . . . . . . . . . . . 9
12.2. Informative References . . . . . . . . . . . . . . . . . 9
Author's Address . . . . . . . . . . . . . . . . . . . . . . . . 9
1. Introduction
As new services such as IoT start to emerge, service provider's
network is required to have higher flexibility, greater security and
reliable service quality guarantee from customer end to service
provider core. NFV technology has been proved to be an excellent
candidate to fulfil these demands for future network. And it has
been widely investigated in centralized premises including data
centre and mobile core network applications. To further improve
overall system flexibility and performance, it is also extremely
Geng Expires September 8, 2017 [Page 2]
Internet-Draft Distributed NFV March 2017
interesting to explore how NFV technology can be implemented in
scattered network premises.
NFV make use of the virtualization technology to decouple software
functions from hardware infrastructures. There is no fundamental
limitations on where NFV can be applied to. Some network functions
in principle are most efficient when hosted in distributed premises.
In this case, it is worth to consider how these functions can be
virtualized locally to maintain their efficiency whilst benefit from
the flexibility, fast time-to-market deployment and new business
model such as VNPaaS that NFV can offer.
2. Requirements Language
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC 2119 [RFC2119].
3. Terminology and Abbreviations
The terminology and abbreviations used in this document are defined
in this section.
o D-NFV: Distributed NFV. A system architecture where the NFV
entities are distributively implemented in scattered network
premises.
o NFVI-PoPs: NFV infrastructure points of presence. The location
where network functions are realized by VNFs.
4. NFV in Different Points of Presence
In general, NFV provides decoupled software and hardware for vendor-
specific network elements. Based on this principle, VNFs are allowed
to be located anywhere as long as the corresponding infrastructures
support. According to ETSI, proposed points of presence for NFV
include customers' premises, central offices, data centres and etc.
In principle, VNFs should be placed where they are most cost-
effective, providing better efficiency and performances .
4.1. Centralized NFV
At present, most of the NFV deployments are centralized. As an
example, the evolving mobile core network is one of the most popular
areas where centralized NFV deployment most likely to take place in
the near future. It is accelerating its pace in the process of the
transition to the next generation NFV-based architecture for 5G. In
fact, most of the network functions in core network in form of
Geng Expires September 8, 2017 [Page 3]
Internet-Draft Distributed NFV March 2017
conventional vendor-specific network elements are intrinsically
centralized. Naturally, the virtualized entities of these network
functions are expected to follow the centralized architecture.
+------+ Centralized NFVI-PoPs
|Device| +---------------------+
| 1 | ____ | |
+------+-----( )__ | +---+ +---+ +---+ |
+------+ __( )_ | |VNF| |VNF| |VNF| |
|Device| _( )__ + +---+ +---+ +---+ |
| 2 +--( Network ) | |
+------+ (___________________)---| +---------------+ |
| | | NFVI | |
Distributed +---+--+ | +---------------+ |
Devices 1-3 |Device| +---------------------+
| 3 |
+------+
Figure 1
Figure 1 illustrates the scheme diagram of a centralized NFV
deployment. In centralized NFV, conventional vendor-specific network
elements are realized as VNFs which reside in centralized NFVI-PoPs
(i.e. private telecommunication clouds).
The computing and storage hardware resources in the centralized NFV
are commonly in the form of server clusters. They are normally
pooled and usually span across different physical locations. Network
hardware resources (i.e. switches, routers) are essential in
centralized NFV to provide connectivities. These include
connectivities within and between NFVI-PoPs. Given the powerful
computing and storage resources benefited from clusters, centralized
NFV is capable of supporting the virtualization of many complex
network elements. The COTS used in NFVI also guarantees the system
scalability and elastic deployment.
4.2. Distributed NFV
Centralization is not an intrinsic nature of NFV. Many vendor-
specific network elements located in scattered premises may also
benefit from the implementation of NFV by decoupling software and
hardware. Service providers used to replace these equipments or make
a full system upgrade on them to deploy new functions and services.
With the implementation of NFV, service providers can push new
functions and services directly corresponding network elements and
end users respectively simply by the deployment of new VNFs.
Geng Expires September 8, 2017 [Page 4]
Internet-Draft Distributed NFV March 2017
Many services need local processing provided by network functions are
implemented in distributed network elements. These network
functions, when virtualized, still make sense to be hosted at the
same location for many reasons. Some examples are given as follows.
o Security. Service requiring end-to-end security has to be
implemented from the customer end. VNF for such purposes, i.e.
encryption are preferred to be hosted locally.
o Latency. Mission critical services are very sensitive to latency.
Local precessing is preferred to minimize the round trip latency.
o Resilience. In some scenarios where services are provided
remotely in the cloud, customers want their internal networks and
services to keep working when there is a network failure. Locally
hosted VNFs can work as backups for this purpose.
D-NFV focuses on the scenarios where the NFVI-PoPs locate in
scattered premises. Common infrastructures seen in these premises
include but are not limited to end-user devices, customer premises
equipment and dedicated network equipments in transport and bearer
networks.
Distributed
NFVI-PoP 1
+-------------+
| +---+ +---+ |
| |VNF| |VNF| |
| +---+ +---+ |
Distributed | NFVI |
NFVI-PoP 2 +-------------+
+-------------+ _|__
| +---+ +---+ | ( )__ +--------------+
| |VNF| |VNF| +-------( )_ | Centralized |
| +---+ +---+ | _( +------------+Infrastructure|
| NFVI | ( Network ) | (Data Center)|
+-------------+ (___________________) +--------------+
|
+-------------+
Distributed | +---+ +---+ |
NFVI-PoP 3 | |VNF| |VNF| |
| +---+ +---+ |
| NFVI |
+-------------+
Figure 2
Geng Expires September 8, 2017 [Page 5]
Internet-Draft Distributed NFV March 2017
Figure 2 illustrates the scheme diagram of a D-NFV deployment in
customer premises. Instead of nested with integrated software and
hardware, the CPE provides NFVI for various VNFs. Since the VNFs are
decoupled with the hardware resources, service provider can
dynamically deploy corresponding VNFs according to performance and
customer requirements.
The hardware resources in scattered premises are normally different
from that in centralized data centres. Typical examples include SoCs
and individual servers. Given the fact that these infrastructures
are not designed to be clustered, the network hardware between NFVI-
PoPs of D-NFV is not as essential as that of centralized scenario.
However, specific services may require network connectivity between
NFVI-PoPs to achieve better performances. Network connectivity
within NFVI-PoPs in D-NFV may be required depending on the actual
design of the VNF entities.Given the limited computing and storage
resources, VNFs in the D-NFV should be normally much less resource-
hungry than those in centralized NFV.
5. Typical NFVI-PoPs in Distributed NFV
D-NFV focuses on NFV implementations in scattered locations. This
section introduces 2 typical examples of NFVI-PoPs including customer
edge devices and transport network equipments.
5.1. Distributed NFV in Customer Edge Devices
A customer edge device is the first service-provider-owned device for
an end-user to connect to the network and subscribe to specific
services. This device is normally purchased by service providers
with required functionalities. Accordingly, it normally has well-
defined hardware and vendor-specific software.
In residential network, customer edge devices are typically in forms
of WiFi routers, with various uplink interface including PON, xDSL
and cellular. Service providers used to provide only internet access
to residential users and the customer edge devices were rather
simple. Recently, many service provider started to provide value-
added services such as IPTV, VoIP, home storage, remote download and
VPNs. Accordingly, the concept of "intelligent home gateway" is
introduced, which enables the residential customer edge device to
dynamically implement new services by downloading applications.
These application are normally realized as C and Java modules. D-NFV
is another way to provide application and hardware decoupling, with
extra benefits of better isolation between applications, improved
service security, high reliability, managed resource allocation and
comprehensive device capability exposure. As IoT services start to
emerge in residential market, D-NFV can improve overall deployment
Geng Expires September 8, 2017 [Page 6]
Internet-Draft Distributed NFV March 2017
flexibility and generate potential new business model by providing
guaranteed isolation, resources and deep capability exposure for
different value-added service providers
Other example of customer edge devices include enterprise premise and
industrial premise equipment. There are plenty of services which
require local implementation and flexible deployment for optimized
performance. For example, WAN acceleration and firewalls have best
efficiency when they are implemented locally. Meanwhile, low latency
services such as manufacture plant control and item tracking in
industrial network also require extremely high reliability which need
dedicatedly allocated hardware and network resources.
5.2. Distributed NFV in Service Provider Transport and Bearer Networks
The application of NFV in service provider transport network has been
investigated mostly in combination of SDN technology. It is
interesting to see that NFV as a technology is applied to transport
network as a way of implementing the separated control plane in
centralized infrastructure. This can be seen as a coordination of
SDN and NFV technology with the control plane decoupled and
virtualized.
Indeed, as a data plane network equipment, current virtualization
technologies are not efficient enough to provide data forwarding
performance comparable to network processing chips used in these
devices. However, it is attractive to use NFV technology in these
network equipment to provide isolated management and control plane.
There is great potential for service providers to exploit this
technology for a much more flexible management and control model for
data plane equipments at a sliced granularity.
6. Use cases of Distributed NFV
In this version, several use cases are listed for general references.
Descriptions in detail are subjected to be added according to initial
discussion in the group. The author would also like to call for more
use cases for D-NFV identified by the community.
6.1. Use Case 1 - VNFaaS and VNPaaS in Residential and Enterprise
Network
6.2. Use Case 2 - Mission Critical Services
Geng Expires September 8, 2017 [Page 7]
Internet-Draft Distributed NFV March 2017
6.3. Use Case 3 - End-to-end Network Slicing Management
6.4. Use Case 4 - Managed Multiple Provisioning for Network Elements
6.5. Use Case 5 - Elastic VPN
7. Rethinking VNFs in Distributed NFV
In centralized NFV, VNFs are normally virtualized forms of
conventional network elements. Sometimes, the network function of a
network element may be broken into multiple VNFs for specific
implementation considerations. In D-NFVs, VNFs are typically not a
full representation of any existing network element. They are more
like applications or new services that are pushed to the customer or
equipments.
As distributed NFVI-PoP are normally limited in hardware resources,
VNFs with complex functionalities are not recommended in these
infrastructures. Meanwhile, as VNFs in D-NFV are subjected to be
application-specific, it is expected that the variety of VNFs in
D-NFV will proportionally grow with the number of services provided
through the network. Hence, these VNFs need to have fast time-to-
market and adapt to practices like DevOps.
8. Virtualization Technologies in Distributed NFV
The D-NFV may need to consider various virtulization technologies
that are different from centralized NFV, as VNFs in D-NFV are
expected in much smaller granularities. In this case, container-
based virtualization technology may be preferred. This is also due
to the potential large number of VNFs and limited hardware resources
provided in distributed NFVI-PoPs. Further studies need to be
carried out to investigate the appropriated virtualization
technologies used in different scenarios of D-NFV
9. Management and Orchestration of Distributed NFV
The management and orchestration of D-NFV need to consider the
following difference compared with that of centralized NFV.
o Individually located NFVI and VIM - The nature of D-NFV decide the
scattered locations of NFVI-PoPs. In addition, the limited
hardware resources are unlikely to support a full MANO
implementation in distributed NFVI-PoPs and this is simply not
cost-efficient and makes the overall system complicated. Hence a
centralized MANO is expected as a feasible solution. This
introduce a rather diverted model for the virtualization layer
Geng Expires September 8, 2017 [Page 8]
Internet-Draft Distributed NFV March 2017
management where the VIM and NFVI will locate in centralized and
distributed infrastructure respectively.
o Massive number of NFVI-PoPs and VNFs - Distributed NFVI-PoPs have
a large number in quantity. Taking the residential NFVI-PoP as an
example, the number is expected to be millions for a service
provide with a fair size business. This does not count the
potential industrial and IoT applications which introduce even
more. The number of VNFs need to be provisioned can be easily
10-100 times of the NFVI-PoPs. The traditional MANO intrinsically
designed for data center applications simply does not fit. It is
also too heavy for this purpose - D-NFV may not need such
comprehensive resource and network provisioning. The management
and orchestration for D-NFV needs to be redesigned.
10. IANA Considerations
This memo includes no request to IANA.
11. Security Considerations
TBA
12. References
12.1. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119,
DOI 10.17487/RFC2119, March 1997,
<http://www.rfc-editor.org/info/rfc2119>.
[RFC2629] Rose, M., "Writing I-Ds and RFCs using XML", RFC 2629,
DOI 10.17487/RFC2629, June 1999,
<http://www.rfc-editor.org/info/rfc2629>.
12.2. Informative References
[ETSI-GS-NFV-002]
ETSI, "ETSI GS NFV 002", 2014,
<http://www.etsi.org/deliver/etsi_gs/
NFV/001_099/003/01.02.01_60/gs_NFV003v010201p.pdf>.
Author's Address
Geng Expires September 8, 2017 [Page 9]
Internet-Draft Distributed NFV March 2017
Liang Geng
China Mobile
Email: gengliang@chinamobile.com
Geng Expires September 8, 2017 [Page 10]