Internet DRAFT - draft-hares-vnf-pool-use-case
draft-hares-vnf-pool-use-case
VNF BOF S. Hares
Internet-Draft Huawei
Intended status: Informational July 4, 2014
Expires: January 5, 2015
Use Cases for Resource Pools with Virtual Network Functions (VNFs)
draft-hares-vnf-pool-use-case-02
Abstract
This draft describes use cases the author has observed in
demonstrations or deployments for virtualized network functions
(VNFs) supported by VNF Pools. Several of these demonstrations
combined VNF Pools into VNFsets. The use cases were: cloud bursting,
parental controls, load balancer for multipath (L1-L7), WAN
optimization that runs either between access nodes and Data Centers,
WAN optimization between mobile phones and Data Centers (through
access nodes), application placement optimization, and optimized
placement of web applications utilizing minimal data transfer.
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on January 5, 2015.
Copyright Notice
Copyright (c) 2014 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
Hares Expires January 5, 2015 [Page 1]
Internet-Draft vnf-pool-use-case July 2014
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
2. Terms . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
3. Use Case List . . . . . . . . . . . . . . . . . . . . . . . . 4
4. Cloud Bursting Use Case . . . . . . . . . . . . . . . . . . . 5
5. Stateful Parental Controls . . . . . . . . . . . . . . . . . 6
6. Load balancer . . . . . . . . . . . . . . . . . . . . . . . . 7
7. Android phone TCP WAN optimization . . . . . . . . . . . . . 9
8. SOHO device optimization . . . . . . . . . . . . . . . . . . 10
9. Application Scaling . . . . . . . . . . . . . . . . . . . . . 11
10. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 12
11. Security Considerations . . . . . . . . . . . . . . . . . . . 12
12. References . . . . . . . . . . . . . . . . . . . . . . . . . 12
12.1. Normative References . . . . . . . . . . . . . . . . . . 12
12.2. Informative References . . . . . . . . . . . . . . . . . 12
Author's Address . . . . . . . . . . . . . . . . . . . . . . . . 13
1. Introduction
This draft focuses on providing one person's observations on the
deployment of Virtualized Network Functions which are supported by
VNF Pool where the VNF Pools may be grouped into VNF Sets. This
version of the draft no longer needs to explain the basic
architecture and problems since [I-D.zong-vnfpool-problem-statement]
provides an excellent description of the following:
o Terminology of VNF, VNF Pools, elements of VNF Pools, VNF Pool
Managers, and VNF Sets;
o Challenges to the reliability of VNFs (without Pools);
o Challenges to reliability within VNFs (redundancy and state
synchronization),
o Interactions with Service Control Entity managing the VNF
functions
o and the needs for reliable transport
This document simply introduces unique terms, and then describes
authors experience the VNF Pools and VNF Managers when the VNF Pools
contain only one type of function. The VNF Pools may operate in a
Hares Expires January 5, 2015 [Page 2]
Internet-Draft vnf-pool-use-case July 2014
set of VNF Pools. This document no longer examines VNF Set
management because is out of the scope of the VNF Charter.
Virtual Network functions supported by Virtual Network Pools and
organized into Virtual Sets have been observed to be more reliable
and be able to expand (or contract horizontally). By being more
reliable, this author observed that individual failures of virtual
functions due to software or system constraints (load) were survived
by switching over to another NFV function within the VNF Pool. For
example, with compatible software functions running, the current and
previous software ran a network applications (E.g. open source NAT or
open source DPI), a failure on one VNF running the current software
could quickly be replaced by a "hot standby" in the Pool running the
previous version. Upon increased traffic, one VNF function (for
firewalls) could be expanded to multiple firewalls each handling a
portion of the traffic. In a sense, the VNF expands horizontally to
handle the increased traffic. In the same way, as traffic
diminished, this VNF can contract.
This document describes each use case by describing the application
and how the VNF function when operating within VNF Pools within the
VNF Set that makes up the application. While some of these use cases
had multiple VNF Sets, VNF Set management is outside of the scope of
the VNF Pool work. Therefore, the explanations have been simplified
to consider all the VNF Pools into one set.
One final note, the author knows she has only provided abstract
descriptions of these deployments, but out of respect for products
and companies the abstract description is best.
2. Terms
The VNF Problem statement [I-D.zong-vnfpool-problem-statement]
defines the terms reliability, VNF, VNF Pool, VNF Pool Element, VNF
Pool User, VNF Pool Manager, and VNF Set. This draft uses these
definitions. The following definitions are not defined within the
VNF problem statement: Cloud Bursting, Stateful parental controls,
WAN optimization, and application placement. These terms are defined
below.
Cloud Bursting: the ability for Virtual processing to burst through
the limits of one virtual environment and automatically transfers a
portion of the processing to another virtual environment.
Stateful parental controls: the ability for network access devices to
have content filters that react to traffic, location, and user.
These controls follow the user across multiple access points within a
home network, or in a carrier network.
Hares Expires January 5, 2015 [Page 3]
Internet-Draft vnf-pool-use-case July 2014
WAN optimization: the ability to optimize traffic across a Wide-Area
network. WAN optimization often makes use of TCP FLOW optimizations
(with IETF TCP features) and TCP de-duplication of packets,
Application placement: ability for coordinating software to place
applications based a combination of compute resources, data storage,
network service, and security concerns. Application placement may
involve movement of some application data, movement of some
applications (data and compute), and movement of network resources to
service the applications. One type of network resource movement is
the movement of virtual network functions (VNFs) which are defined,
created, allocated with resources in a way to provide an integral
unit to the application placement control software.
OTT (Over the Top): This industry terms implies an overlay network
that is overlaid on existing networks as a virtual network.
Shared risk group (SRG): Shared risk groups occur when different VNFs
in a VNF Pool all exist upon the same instance of a virtual form or
hypervisor. When a hypervisor fails, all the VNF instances on the
same hypervisor will fail,
3. Use Case List
The use cases described in this draft are:
o Cloud Bursting
o stateful parental controls implemented in access nodes and
firewalls (stateful and regular)
o load balancer doing multipath (supports L1-L7 optimization),
o WAN optimization between access nodes and Data Centers,
o WAN optimization between mobile phones through access nodes to/
from Data center (E.g Riverbed WAN),
o Application placement optimization using optimized DNS and DCHP
VNFs,
o Application placement optimization to minimize data transfer.
The uses cases are done in the order of VNF sets to VNF single
operations. The Cloud bursting obviously takes a set of VNF Pools to
lift up services in a cloud environment and move these to another
cloud environment.
Hares Expires January 5, 2015 [Page 4]
Internet-Draft vnf-pool-use-case July 2014
Deployment of VNF functions into critical network functions requires
that multiple sources exist to reduce risk of software or hardware
issues, and to respond to economic pressure to continually improve
while reducing prices. Multi-vendor sources for these VNF, VNF
Pools, and VNR sets comes at the price of designing (or adopting an
existing) interoperability VNF Pool manager for VNF Pools.
4. Cloud Bursting Use Case
Description:
Three cases of cloud bursting exist. Public clouds adding more
resources upon demand. Private clouds adding more resources upon
demand from private cloud resources. Private clouds adding more
resources from the public cloud. In the public/private cloud, the
orchestration system looks within pools of additional resources to
fit the request for more resources for a particular time. Verizon
provided examples of cloud bursing at ONS 2012, and Terremark
utilizes cloud bursing to obtain more resources
(http://www.terremark.com/services/it-infrastructure/cloud-services/
enterprise-cloud/architecture/) operating over open-source
hypervisors (2012, 2013).
VNFs within the VNF Pools operate as management systems and networks
router/switches (virtual switches, routers, end systems) to spin up
additional transport process (TCP/STCP) and move work jobs via
standard interfaces (libvirt, CLI, REST, and JASON), and provide
standardized value-added functions. These value-added functions
include the following:
o VNFs in VNF Pools of system monitoring and orchestration
o VNF in VNF Pools for virtual firewall to protect the data
o VNF in VNF Pools for DPI or DDOS during
o VNF in VNF specialized DNS that controls private/public cloud move
o VNF in VNF WAN applications that create a large pipeline for for
movement of data and applications within Cloud (Private/Public) or
between clouds
o VNFs in VNF Pools for smart access to the could
Why VNF in VNF Pools for network router/switch or host system
functions
Hares Expires January 5, 2015 [Page 5]
Internet-Draft vnf-pool-use-case July 2014
VNFs in VNF Pools allow cloud bursting to temporarily expand
horizontally to take the load as the processing groups move between
clouds. Each of the functions has a scaling within its own pool
which allows the bursts of effort to grab or release the amount of
functions. The VNFs doing system monitoring of the move and the
orchestration are also included in the features that grab or release
functions.
Why VNF Pools:
Bursty nature of action of Cloud Bursting requires being able utilize
VNFs within Pools to expand horizontally for the estimated cloud
bursting activities. However, if the cloud bursting expands beyond
the resources estimated by the orchestration software then the VNFs
within the pool can expand the service.
Why Multi-vendor interoperable VNF Pools?:
Cloud bursting is a critical business infrastructure which needs
highly reliable software that can be maintained by Cloud operations.
Critical infrastructure requires multi-sources. Either the Cloud
operations creates a team to maintain VNF Pool software from Open
Source code bases, or the equipment vendors provide interoperable VNF
Pool Managers and VNF Pools that run across multiple platforms.
5. Stateful Parental Controls
Description:
Parental content filters are targeted filters that are installed
based on an identification of a user. When the centralized
controller detects the User (via traffic pattern, role identification
(ABFAB, HTTP)), an orchestration manager installs the appropriate
software to guarantee filters. Two types of security exist:
authentication and authorization. In authentication, ACL and other
port based filtering is set per customer for the user. This
filtering may block, prioritize, or transfer to a black hole
recording device different traffic. In authorization, the systems
create a web of trust via an identity server (for HTTP 1.0 SAML
template defined by OASIS and IETF ABFAB information for non-http).
The following is a list of some of the VNF functions found in VNF
Pools in the Stateful Parental Control Model
o VNF Pool for the specialized Access filters
o VNF Pool for open source DPIs (snort, etc.) to find
"inappropriate" material,
Hares Expires January 5, 2015 [Page 6]
Internet-Draft vnf-pool-use-case July 2014
o VNF Pool for specialized DPI inspection,
o VNF Pool probes on hyper-visors,
o VNF POol for management functions depositing configuration in Open
Flow switches, Ethernet Switches, Virtual switches, routers,
firewalls, and access nodes.
o VNF Pool for access firewall
o VNF Pool for spam filters for mail
o VNF Pool for DDOS software,
o VNF Pool for DNS/DHCP servers that allow the linking of the the
Public services to a instantly created VNFs for specialized access
o VNF Pool to move filters within Cloud (Private/Public) or between
clouds in anticipation of the persons movement (If in central
London, spread to other access nodes along public transportation
(Tube) lines or to hotels.).
o VNF Pool to do additional user identification of the systems
Why VNF Pools
The bursty nature of user access is dependent on the detection of the
movement of the user. At the moment the public software identifies
the user, this VNF Pool set operates to expand horizontally to
provide the necessary service to provide these parental features.
The VNF Pools allow groups of these parental ' families to be
instantiated.
Why inter-operable VNF Pool Managers
The VNF functions may go between the mobile devices the user moves
with (E.g. Android Pad or Android Phone) and the local network
systems supported by the Carrier, the hotel, or the airport systems.
Inter-operable VNF Pool Managers means that some NVF functions may
move from Android Pad /Android Phone to carrier's equipment.
6. Load balancer
Description:
Load balancers (such as Riverbed or Cisco) look to balance traffic in
different layers of the stack (L1-L7). SDN meta controllers
(OpenDaylight, Vyatta) monitor work with the time-critical OTT
Hares Expires January 5, 2015 [Page 7]
Internet-Draft vnf-pool-use-case July 2014
control process (which creates and manages the OTT VPNs (L2/L3/MPLS))
to determine where the load is at any specific time, and to track it
over time. The SDN orchestration devices work with the SDN OTT
control process to adjust to readjust the load at L1-L7.
The VNF functions that use VNF Pools in the load balancing service
are:
o VNFs for network probes in all devices (mobile phone, ipad, access
devices, vswitch, vrouter, tcp optimizer, DPI, hypervisors, VMs
dumming storage, VMs creating the network;
o VNFs for depositing configuration in Ethernet switches (open-flow
or IEEE 802.1), routers, firewalls, access nodes;
o VNFs for firewall;
o VNFs to do Traffic capacity/load balance calculation;
o VNFs running orchestrator monitor/change algorithms; and
o VNFs to users or specific traffic to aid in load balancing.
Why VNF Pools:
True end-to-end Load balancing requires load balancing across
multiple layers with VNF pools to support different functions.
Multi-vendors solutions will allow meta controllers to balance
traffic to reduce costs in networks. Current Enterprise customers
find the load balancing operates with TCP WAN optimization to utilize
all network bandwidth effectively.
Why inter-operable VNF Pool Managers
Network probes, network traffic capacity calculation, and
configuration of changes operate either when traffic thresholds are
exceeded or upon period timers. Each of these functions has bursty
needs needing the ability to expand horizontally.
Firewalls are traffic based which may be bursty or steady state
depending on the application profiles. VNF Pools allow for the
horizontal expansion during bursts.
Long lived traffic flows may be identified by looking for users or
application traffic patterns. This type of processing function has a
"DPI-Like" processing quality that make require quick examination of
some data. VNF support in VNF Pools allows the assurance of this
type of support
Hares Expires January 5, 2015 [Page 8]
Internet-Draft vnf-pool-use-case July 2014
7. Android phone TCP WAN optimization
Description:
Android phones and Android tablets often communicate across the LTE/
WiFi connections. Optimization of the link for the low-bandwidth of
LTE or Wifi connections, and the switch between LTE and WiFi requires
monitoring of traffic, choosing link, optimizing TCP (Window and
removing duplicates).
The VNFs that are aided by VPN Pools in this application includes:
o VNFs for probes in all devices (mobile phone, mobile pads, Wifi
enabled nodes, LTE IP RAN notes)
o VNFs for depositing configuration in SDN access nodes (Wifi or
LTE)
o VNFs for to handle remote phone parameter adjustments;
o VNFs to do firewalls (E.g traffic not allowed over LTE due to
customer policy);
o VNFs for TCP data de-duplication process;
o VNFs for Traffic capacity/load balance calculation (see Football
stadium problem below);
o VNFs for best processing of Video traffic or best network to pull
Video traffic from;
o VNFs to identify user or user traffic and
o VNFs to interface to secure data processes.
One scenario to consider is the football stadium scenario. A person
takes the IPAD to watch the close up replays or send email. During
fourth quarter, the person receive an urgent call to go home and
walks with the IPAD down the street to the metro-system to return
home. On the way, the person is utilizing the IPAD to send mail,
watch the football game, and do Skype calls.
This scenario is similar in needs to the parental controls. The
differences are TCP data de-duplication to improve WAN traffic and
specialized Video traffic handling, plus the mobile phone management
and security.
Why VNF Pools:
Hares Expires January 5, 2015 [Page 9]
Internet-Draft vnf-pool-use-case July 2014
The football user case illustrates how the network functions are used
in bursts. The VNF Pools allow these functions to expand out to fit
the users needs. The football example also shows how events can
cause massive numbers of these bursty users to occur at the same
time. Again, the expansion out for these events without reducing
service is key to the quality of user experience for mobile phone or
mobile pad users.
Why Inter-operable VPN Pools handled by VPN Pool Managers:
Phones systems do not want a single vendor for all features.
Multiple interoperable access nodes and Android pad/tablet
implementations require these VNF pools. The football stadium may
require that several mobile operators or mobile or cable operators
work together to provide this service.
8. SOHO device optimization
Description:
SOHO devices using SDN VM technology must balance traffic movement
between small cells (WiFi or femtocells). Access policies must be
configured for restriction on this policy.
The VNFs that VNF Pools in this application are:
o VNFs for probes in all devices (mobile phone, mobile pads, WiFi
enabled nodes, LTE or femtocells)
o VNFs for VPN to user identification and security.
o VNFs for depositing configuration in access nodes (Wifi, L),
o VNFs for handling remote phone parameter adjustments;
o VNFs for firewall (traffic not allowed over LTE);
o VNFs for TCP data de-duplication process;
o VNFs for Traffic capacity/load balancing over single/multiple soho
links;
o VNFs to allow applications load balance across internal soho links
based on traffic needs and use policy; and
o VNFs for VPN to user identification and security.
Why VNF Pools:
Hares Expires January 5, 2015 [Page 10]
Internet-Draft vnf-pool-use-case July 2014
SOHO devices will have limited resources for handling probes to find
local devices, change configurations in access devices, adjust remote
phone parameters, firewall traffic, and perform WAN optimization (TCP
de-duplication, prioritizing of traffic (like phones) or load
balancing). However, SOHOs may only need the probes, configurations
changes, and phone adjustments when users arrive into the home. The
data related VNF functions will occur as the SOHO office begins to
transfer data. The VNF pools allow the VNF function to scale up/down
via horizontal expansion.
VPN Pool Growth/Shrinking:
The VPN Pool Manager can handle increasing or decreasing the VNF Pool
size. Cooperating VNF Pool Managers can be seen to be useful in this
use case, but the cooperating VNF pool managers are outside the scope
of the VNF within a VNF Pool.
9. Application Scaling
Description:
Applications may be placed in a variety of hypervisors. The rapid
deployment of applications on services may allow millions of
applications to be available within the cloud. Creating a effective
lookup for the applications or redirecting applications takes an
Network Virtual environment that controls DCHP, DNS, and http access
rapidly. 2 Million URI references for each access node is possible
given the current growth.
VNF within the cloud must scale up to handle the VNF services
required by the network infrastructure. This includes the network
information functions of DNS, DCHP, URL processing, AAA (Diameter/
Radius). Fast enactment of these network functions allows an on-
demand creation of a multi-tenancy overlay (IETF NV03).
The VNFs operate in VNF Pools in this application are:
o VNFs for AAA functions (Diameter, Radius);
o VNFs for DNS functions;
o VNFs for DCHP functions
o VNFs for specialized URL/URI processing;
o VNFs for handling remote probes on these virtual information
functions;
Hares Expires January 5, 2015 [Page 11]
Internet-Draft vnf-pool-use-case July 2014
o VNFs for handling remote configuration of these virtual
information functions;
o VNFs for Traffic capacity/load balance calculation;
o VNFs for determine optimum placement of application (and
application's backup services) to optimize CPU compute, storage or
data
o VNFs for VPN to user identification and permissions to use data;
and
Wny VNF in VNF Pools
User load patterns or access patterns will impact how much load the
network information VNF functions (DNS, DHCP, URL processing, AAA
(Diameter/Radius) encounter. The VNF Pools with a good VNF Pool
manager can spread the load locally or between different systems.
The applications and the application usage will also determine how
loaded the VNF Function is that monitors CPU utilization, storage,
and network resources. Again, the VNF supported by VNF Pools can
expand or shrink horizontally.
The rest of the VNF functions needs for VNF Pools have been described
above.
10. IANA Considerations
This document includes no request to IANA.
11. Security Considerations
This document has no security issues as just contains use cases.
12. References
12.1. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
12.2. Informative References
Hares Expires January 5, 2015 [Page 12]
Internet-Draft vnf-pool-use-case July 2014
[I-D.zong-vnfpool-problem-statement]
Zong, N., Dunbar, L., Shore, M., Lopez, D., and G.
Karagiannis, "Virtualized Network Function (VNF) Pool
Problem Statement", draft-zong-vnfpool-problem-
statement-06 (work in progress), July 2014.
Author's Address
Susan Hares
Huawei
7453 Hickory Hill
Saline, CA 48176
USA
Email: shares@ndzh.com
Hares Expires January 5, 2015 [Page 13]