SlideShare a Scribd company logo
1 of 25
Download to read offline
NFV Orchestration: Challenges in Telecom Deployments
Shamik Mishra
OpenStack Summit, Vancouver, May 2015
Proprietary & Confidential. © Aricent 2015 2
Presenter
Shamik Mishra
 Senior Engineering Project Manager, Aricent
Focus Area: Management and Network Orchestration for NFV
 Identifying the requirements for NFV MANO
 Specifying extensible, Modular architecture for NFV Service Orchestrator
 Identifying possible requirements on the underlying Virtual Infrastructure Manager i.e. OpenStack
Proprietary & Confidential. © Aricent 2015
Agenda
 NFV Implementation Challenges
 End-to-End Service Monitoring of NFV
– Service Creation Model
– Service Aware Monitor
 Cloud-RAN use case
 Community Support
3
Proprietary & Confidential. © Aricent 2015
NFV: Quick Recap
Traditional
Separate network appliance / function
for each function
 Dedicated hardware for each function
 Unused computing capability
 Separate management systems
 Difficult to introduce new services rapidly
 Higher power consumption and requires more real-
estate
NFV
 Hosted on commodity hardware through virtualization
 Scalable, elastic and efficient usage of resources
 Possibility of unified management and orchestration
of services
 Easily introduce new functions
 Cost-effective
Each function virtualized and
hosted on commodity hardware
4
GWsRouter
Firewall
Load
Balancer
Distribution
Switch IMS
MMEs
IT Application
Proprietary & Confidential. © Aricent 2015
NFV Implementation Challenges
Source: Heavy Reading NFV Multi-Client Study 2014
5
Very concerned short term (within next 2 years)
Scalability of COTS Hardware
Power Consumption
Reliability of COTS hardware
Managing & Interworking various APIs
Cloud Orchestration & Management (Includes
Optimizing Resources)
Network Impact of virtualizing the media plane
Managing Service failover and recovery
Operations & backend integration (OSS Integration)
Packet processing performance (deterministic) in data
plane
Security
KPI Impact related to media-sensitive applications (QoS,
jitter, latency)
Troubleshooting & Service Assurance
NFV Implementation Challenges
How concerned is your company about the following technical challenges related to NFV?
Very concerned longer term (in 2 to 5
years)
Only slightly concerned Not concerned at all
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
Network functions
virtualization is not
just porting legacy
network functions to
commodity hardware
Proprietary & Confidential. © Aricent 2015
Realizing large scale NFV deployments,
replicating & monitoring them
Simplifying networking configuration to
ensure automated service delivery
Legacy network elements are often developed
for peak capacity and not for scaling. Also,
scaling does not necessarily depend on
infrastructure alone
Scaling one element in a chain of services may
require the need to touch / modify several other
elements (including legacy elements)
Monitoring
Service Assurance
Scaling
6
Challenges in Monitoring, Service Assurance and Scaling
Proprietary & Confidential. © Aricent 2015 7
End-to-End Service Monitoring
Proprietary & Confidential. © Aricent 2015 8
End-to-End Service Monitoring in NFV
Orchestration & Monitoring
Service Request Transform
Resource Requests
Resource Deployment
Resource Monitoring Monitoring Generation
Monitoring Collection
Monitoring Aggregation
Service Monitoring
Aggregation
Visualization Actions
Proprietary & Confidential. © Aricent 2015 9
Example
 A deployed VNF chain may contain multiple instances of
VNF application on VMs, Load Balancers, Firewalls, etc.
 They network connectivity is managed by software
switches
 The chain can have instances deployed across compute
nodes and clouds
 Clouds can be interconnected over VPN
 SDN Controllers can create / manage the service chains
 Monitoring data also needed for debugging problems in the
network
 The VNFs can be from different vendors with separate
monitoring & troubleshooting mechanisms
End-to-End Service Monitoring in NFV
Challenges
The health of the end-to-end chained service is necessary for the orchestrators & OSS to
ensure service continuity and to initiate automated actions
FW
VNF
1
Switch
LB
Hypervisors
VNF
2
VNF
1’
VNF
2’
Possible Monitoring Points
Question?
Do we need a new and unified monitoring
model for NFV
Proprietary & Confidential. © Aricent 2015 10
 While scaling an element of a service
chain, we may need to touch/modify the
other elements in the chain
End-to-End Service Monitoring in NFV
Impact to Scalability for a Service Chain
A
C
B
D
Becomes a bottleneck
B
Traffic Path
New Traffic
Path
Scaled Node
Entire Subgraph scaled
Modify
Modify
Scaling
Orchestrators / devices who takes the decision for
scaling needs to evaluate the impact on the subsequent
sub-graph
Becomes a bottleneck
B
New Traffic
Path
Scaled Node
A
C
B
D
Traffic Path
Modify
C D
This could now become a bottleneck
Proprietary & Confidential. © Aricent 2015 11
 What is monitored also can
depend on VNF Execution States
 There can be multiple VNF
execution states like
– Install, Start, Stop, Run, Maintain
 The chain’s state is a derivative of
the individual VNF states
 We may want to monitor different
set of things as and when the
chain state changes
 NFV Orchestrator will take actions
when the chain state changes like
reconfiguring the apps,
configuration etc.
End-to-End Service Monitoring in NFV
Impact of VNF States to Monitoring
B’
VNF States
A
CB D
Modified
Monitoring
RUN RUN RUN RUN
Under upgrade
MAINT
Chain
State
(A,RUN) (B,RUN) (C,RUN) (D,RUN)
Monitoring
State
(Mon A
RUN) (Mon B
RUN) (Mon C
RUN) (Mon D
RUN)
(B’,MAINT)
(Mon B’
RUN)
CH1 CH2
MON1 MON2
Proprietary & Confidential. © Aricent 2015 12
Translation of Forwarding Graph to Resource Requests
A CB E
KPI-1
D
F
KPI-2
KPI-3
KPI-4
Service Request - View
A
D
F
Router
SDN
Controller
C
B
E
SwitchSwitch
Resource
Request(s)
View
 Service Request would consist of a
– Network Forwarding Graph
– Set of Key Performance indicators (or
SLAs) for the service
 The service request should get
decomposed to Resource
requests (example)
– Computing Resource Requests
– Networking Resource requests
– Placement Requests
 The KPI set gets transformed into
parameters for the resource
requests
Proprietary & Confidential. © Aricent 2015 13
Service Creation Model
Service Orchestrator
Controllers
Infrastructure
Managers
Service Request
Resource Decomposition
Resource Requests
 Service Requests are
Characterized by KPIs / SLAs
 Decomposing Service Requests
to Resource Requests
– Configuration Requests
– Computing Requests
– Placement Requests
 Decomposition is driven by the
KPIs
SDN Controller
Networking /
Chaining
Requests
Resource
Manager
• Computing
Requests
• Placement
Requests
Scheduler /
Placement Mgr.
OpenStack Services
(Neutron, Nova, etc..)
Placement
Requests
Resource Reservations
Network
Devices
Networking
Configuration
VNF Manager
VNF Configuration
Resource Instantiate
VNF
 Service performance (adherence to
KPIs / SLAs) requires monitoring of
individual Resource Requests &
VNFs
 Monitoring data acquired at each
layer should be “aggregated” to
determine the service performance
Other
Networking
Devices
Proprietary & Confidential. © Aricent 2015 14
App
2
App
3
App
4App
1
App
5
Compute
Node-1
Compute
Node-2
Service-Aware Monitor
Infrastructure
Monitor
Service Monitoring Engine
Application specific
monitoring data
Infrastructure
monitoring data
Service Orchestration Model and
Implementation
Service
Templates
Should we
standardize these
interfaces???
Application specific
parameters in a container
Infrastructure
statistics
Monitor Service Chains
End-to-End Service Monitoring in NFV
Proprietary & Confidential. © Aricent 2015
Compute
15
Service Aware Monitor
NF3
Collector
NF4
Collector
NF5
Collector
Service Aware Monitor
Message Queue
Networking
NF3 NF4 NF5
API API MA MA MA
Infrastructure
Monitoring
Storage
API
Advanced
Services
MA
AS
Collector
Metrics
Database
Monitoring Initiator & Aggregator
Service
Alarm
KPI Trend
Analysis
Scaling
Decisions
Resource
Reconfigure
Service Self
Healing
Service
Orchestrator
Controllers
Proprietary & Confidential. © Aricent 2015 16
Service Orchestration & Monitoring
Key Conclusions
• Decomposition of Service Requests to Resource Requests
• VNF state aware Monitoring initiation and collection
• Aggregation of Monitoring data
• Possible standardization of Monitoring Initiation and Collection
by VNF vendors and Open Source Community
• Service Aware Placement
• Modularity in Service Orchestrator Architecture
Proprietary & Confidential. © Aricent 2015 17
Cloud-RAN Use Case
Proprietary & Confidential. © Aricent 2015 18
Cloud RAN
Host RT Linux
KVM
Guest
RT Linux
PDCP,
RLC,
MAC
eNB1
Guest
RT Linux
L3
OAM
RRM
VM1 VM2
Guest
RT Linux
PDCP,
RLC,
MAC
eNB2
Guest
RT Linux
L3
OAM
RRM
VM1 VM2
Layer 1
Antenna
Antenna Site
Layer 1
Antenna
Antenna Site
Cloud: Centralized eNB Pool
System View LTE Layer-1 (Baseband
Unit) Processing
Proprietary & Confidential. © Aricent 2015
eNodeB 1 VM
RRM
OAM
eNodeB
L3
eNodeB
L2
S1 AP (192.16.81.53)
GTPU (192.16.81.51)
X2 AP (192.16.81.52)
Guest OS
Fedora
Host OS
Ubuntu
eNB L2 (192.16.81.58)
eNB1
Network
Compute
vEPC
eNB2
S1 AP (172.16.114.124)
GTPU (172.16.114.122)
X2 AP (172.16.114.123)
eNB L2 (172.16.114.120)
Compute
Layer 1
Antenna
Antenna Site
Cloud RAN OpenStack Orchestration
19
Proprietary & Confidential. © Aricent 2015 20
CPU Utilization
 CPU load increases with
throughput and number of
users scheduled
– Move non-real time MAC
scheduling out
 Setup
– 1 vCPU, 2GB Memory VMs
– Intel Core i3 processor
52
58
64
70
74
77
0
10
20
30
40
50
60
70
80
90
10 20 30 40 50 60
CPU Utilization
UL Throughput (Mbps)
Proprietary & Confidential. © Aricent 2015
Cloud RAN OpenStack Orchestration
Key Observations
 Packet Buffering / loss. Solved through PCI pass-through approaches
 Live VM migration of L2 Virtual Machine is a challenge, as MAC scheduler requires 1ms
of processing time
 Scaling: More eNBs realized through launching more eNB VNFs
– If eNB mapped to 3 sectors, L3 layer can be common
– If single S1 interface required for all eNBs then scaling is limited
 Scaling: CPU load increases with throughput and number of users scheduled
– Move non-real time MAC scheduling out
21
Proprietary & Confidential. © Aricent 2015 22
Community Support
Proprietary & Confidential. © Aricent 2015 23
Possible Community Actions
 The tenant today never has any visibility into
its switch which connects the VMs of the
tenant (with OVS)
 In the real world, the user controls its own
switch
 Full control of its own switch would give
possibilities like
– Flexibility in defining service chains through SDN
controller by the tenant
– Defining custom monitoring
– Same network visibility as a dedicated switch
– Security settings like MAC based policies
 Port mirroring is a key enabler for efficient NFV
troubleshooting and monitoring
 Tenant should be able to mirror a port to debug
from the traffic exchanged between two VNFs
 Neutron API may need to be developed to
initiate and terminate port mirroring by tenants
Switch-as-a-Service & Port Mirroring
Proprietary & Confidential. © Aricent 2015 24
Possible Community Actions
 IMS is now widely used by operators to
provide packet-switched voice and other
multimedia services to customers.
 SIP (Session Initiation Protocol) is used in IMS
to setup and teardown real-time voice and
video calls.
 Huge SIP traffic needs to be balanced across a
group of IMS nodes to ensure scalability and
reliability of Telco IMS services.
 To ensure a robust and scalable virtualized
IMS network, SIP LBaaS would be a much
needed service in OpenStack.
Reference: SIP Load-Balancing-as-a-Service
(LBaas). David Waiting
https://etherpad.openstack.org/p/telcowg-
usecase-SIP_LBaaS.
SIP Load Balancing as a Service
Proprietary & Confidential. © Aricent 2015
Headquarters
303 Twin Dolphin Drive
6th Floor
Redwood City, CA 94065
USA
Tel: +1 650 632 4310
Fax: +1 650 551 9901
Thank you.

More Related Content

What's hot

 Network Innovations Driving Business Transformation
 Network Innovations Driving Business Transformation Network Innovations Driving Business Transformation
 Network Innovations Driving Business TransformationCisco Service Provider
 
Cisco Connect Toronto 2018 network-slicing
Cisco Connect Toronto 2018   network-slicingCisco Connect Toronto 2018   network-slicing
Cisco Connect Toronto 2018 network-slicingCisco Canada
 
Enabling MEC as a New Telco Business Opportunity
Enabling MEC as a New Telco Business OpportunityEnabling MEC as a New Telco Business Opportunity
Enabling MEC as a New Telco Business OpportunityMichelle Holley
 
Radisys_Wind River_C-RAN Webinar_June 26_14
Radisys_Wind River_C-RAN Webinar_June 26_14Radisys_Wind River_C-RAN Webinar_June 26_14
Radisys_Wind River_C-RAN Webinar_June 26_14Radisys Corporation
 
Radisys/Orange/Strategy Analytics Webinar 090618
Radisys/Orange/Strategy Analytics Webinar 090618Radisys/Orange/Strategy Analytics Webinar 090618
Radisys/Orange/Strategy Analytics Webinar 090618Radisys Corporation
 
OSN Bay Area Feb 2019 Meetup: ONAP Edge, 5G and Beyond
OSN Bay Area Feb 2019 Meetup: ONAP Edge, 5G and BeyondOSN Bay Area Feb 2019 Meetup: ONAP Edge, 5G and Beyond
OSN Bay Area Feb 2019 Meetup: ONAP Edge, 5G and BeyondLumina Networks
 
Network Function Virtualisation: a tutorial
Network Function Virtualisation: a tutorialNetwork Function Virtualisation: a tutorial
Network Function Virtualisation: a tutorialAPNIC
 
Transforming the Modern City with the Intel-based 5G Smart City Road Side Uni...
Transforming the Modern City with the Intel-based 5G Smart City Road Side Uni...Transforming the Modern City with the Intel-based 5G Smart City Road Side Uni...
Transforming the Modern City with the Intel-based 5G Smart City Road Side Uni...DESMOND YUEN
 
Wireless Network Optimization (2010)
Wireless Network Optimization (2010)Wireless Network Optimization (2010)
Wireless Network Optimization (2010)Marc Jadoul
 
5G Cloud RAN & IoT Architecture
5G Cloud RAN & IoT Architecture5G Cloud RAN & IoT Architecture
5G Cloud RAN & IoT ArchitectureSathiya keerthi
 
D link corporate-presentation_apr. 2014
D link corporate-presentation_apr. 2014D link corporate-presentation_apr. 2014
D link corporate-presentation_apr. 2014Kunal Raul
 
LTE – the Future of IMS
LTE – the Future of IMSLTE – the Future of IMS
LTE – the Future of IMSRADVISION Ltd.
 
Advancing LTE architecture with NFV and SDN
Advancing LTE architecture with NFV and SDNAdvancing LTE architecture with NFV and SDN
Advancing LTE architecture with NFV and SDNAlberto Diez
 
MEF Presto for SDN-enabled service lifecycle automation
MEF Presto for SDN-enabled service lifecycle automationMEF Presto for SDN-enabled service lifecycle automation
MEF Presto for SDN-enabled service lifecycle automationADVA
 
Networking Technology Transformation to SDN and NFV
Networking Technology Transformation to SDN and NFVNetworking Technology Transformation to SDN and NFV
Networking Technology Transformation to SDN and NFVHimawan Nugroho
 
Small cells and C-RAN: can they work together- Mobile World Congress 2014
Small cells and C-RAN: can they work together- Mobile World Congress 2014Small cells and C-RAN: can they work together- Mobile World Congress 2014
Small cells and C-RAN: can they work together- Mobile World Congress 2014Wi-Fi 360
 
Transforming to Enable 5G
Transforming to Enable 5GTransforming to Enable 5G
Transforming to Enable 5GLumina Networks
 
The potential of MEC for high resolution video delivery
The potential of MEC for high resolution video deliveryThe potential of MEC for high resolution video delivery
The potential of MEC for high resolution video deliverySimone Mangiante
 

What's hot (20)

 Network Innovations Driving Business Transformation
 Network Innovations Driving Business Transformation Network Innovations Driving Business Transformation
 Network Innovations Driving Business Transformation
 
Cisco Connect Toronto 2018 network-slicing
Cisco Connect Toronto 2018   network-slicingCisco Connect Toronto 2018   network-slicing
Cisco Connect Toronto 2018 network-slicing
 
Enabling MEC as a New Telco Business Opportunity
Enabling MEC as a New Telco Business OpportunityEnabling MEC as a New Telco Business Opportunity
Enabling MEC as a New Telco Business Opportunity
 
Radisys_Wind River_C-RAN Webinar_June 26_14
Radisys_Wind River_C-RAN Webinar_June 26_14Radisys_Wind River_C-RAN Webinar_June 26_14
Radisys_Wind River_C-RAN Webinar_June 26_14
 
Radisys/Orange/Strategy Analytics Webinar 090618
Radisys/Orange/Strategy Analytics Webinar 090618Radisys/Orange/Strategy Analytics Webinar 090618
Radisys/Orange/Strategy Analytics Webinar 090618
 
OSN Bay Area Feb 2019 Meetup: ONAP Edge, 5G and Beyond
OSN Bay Area Feb 2019 Meetup: ONAP Edge, 5G and BeyondOSN Bay Area Feb 2019 Meetup: ONAP Edge, 5G and Beyond
OSN Bay Area Feb 2019 Meetup: ONAP Edge, 5G and Beyond
 
Network Function Virtualisation: a tutorial
Network Function Virtualisation: a tutorialNetwork Function Virtualisation: a tutorial
Network Function Virtualisation: a tutorial
 
Hp 1015-odini-5 sdn-in_nfv
Hp 1015-odini-5 sdn-in_nfvHp 1015-odini-5 sdn-in_nfv
Hp 1015-odini-5 sdn-in_nfv
 
Transforming the Modern City with the Intel-based 5G Smart City Road Side Uni...
Transforming the Modern City with the Intel-based 5G Smart City Road Side Uni...Transforming the Modern City with the Intel-based 5G Smart City Road Side Uni...
Transforming the Modern City with the Intel-based 5G Smart City Road Side Uni...
 
Wireless Network Optimization (2010)
Wireless Network Optimization (2010)Wireless Network Optimization (2010)
Wireless Network Optimization (2010)
 
5G Cloud RAN & IoT Architecture
5G Cloud RAN & IoT Architecture5G Cloud RAN & IoT Architecture
5G Cloud RAN & IoT Architecture
 
D link corporate-presentation_apr. 2014
D link corporate-presentation_apr. 2014D link corporate-presentation_apr. 2014
D link corporate-presentation_apr. 2014
 
LTE – the Future of IMS
LTE – the Future of IMSLTE – the Future of IMS
LTE – the Future of IMS
 
Advancing LTE architecture with NFV and SDN
Advancing LTE architecture with NFV and SDNAdvancing LTE architecture with NFV and SDN
Advancing LTE architecture with NFV and SDN
 
MEF Presto for SDN-enabled service lifecycle automation
MEF Presto for SDN-enabled service lifecycle automationMEF Presto for SDN-enabled service lifecycle automation
MEF Presto for SDN-enabled service lifecycle automation
 
Networking Technology Transformation to SDN and NFV
Networking Technology Transformation to SDN and NFVNetworking Technology Transformation to SDN and NFV
Networking Technology Transformation to SDN and NFV
 
Small cells and C-RAN: can they work together- Mobile World Congress 2014
Small cells and C-RAN: can they work together- Mobile World Congress 2014Small cells and C-RAN: can they work together- Mobile World Congress 2014
Small cells and C-RAN: can they work together- Mobile World Congress 2014
 
Facebook and Telecom
Facebook and TelecomFacebook and Telecom
Facebook and Telecom
 
Transforming to Enable 5G
Transforming to Enable 5GTransforming to Enable 5G
Transforming to Enable 5G
 
The potential of MEC for high resolution video delivery
The potential of MEC for high resolution video deliveryThe potential of MEC for high resolution video delivery
The potential of MEC for high resolution video delivery
 

Viewers also liked

Monitor OpenStack Environments from the bottom up and front to back
Monitor OpenStack Environments from the bottom up and front to backMonitor OpenStack Environments from the bottom up and front to back
Monitor OpenStack Environments from the bottom up and front to backIcinga
 
Network visibility and control using industry standard sFlow telemetry
Network visibility and control using industry standard sFlow telemetryNetwork visibility and control using industry standard sFlow telemetry
Network visibility and control using industry standard sFlow telemetrypphaal
 
5 g network & technology
5 g network & technology5 g network & technology
5 g network & technologyFrikha Nour
 
大規模環境のOpenStack アップグレードの考え方と実施のコツ
大規模環境のOpenStackアップグレードの考え方と実施のコツ大規模環境のOpenStackアップグレードの考え方と実施のコツ
大規模環境のOpenStack アップグレードの考え方と実施のコツTomoya Hashimoto
 
Using Agilio SmartNICs for OpenStack Networking Acceleration
Using Agilio SmartNICs for OpenStack Networking AccelerationUsing Agilio SmartNICs for OpenStack Networking Acceleration
Using Agilio SmartNICs for OpenStack Networking AccelerationNetronome
 
Treasure Data Cloud Data Platform
Treasure Data Cloud Data PlatformTreasure Data Cloud Data Platform
Treasure Data Cloud Data Platforminside-BigData.com
 
Digdagによる大規模データ処理の自動化とエラー処理
Digdagによる大規模データ処理の自動化とエラー処理Digdagによる大規模データ処理の自動化とエラー処理
Digdagによる大規模データ処理の自動化とエラー処理Sadayuki Furuhashi
 
NFV : Virtual Network Function Architecture
NFV : Virtual Network Function ArchitectureNFV : Virtual Network Function Architecture
NFV : Virtual Network Function Architecturesidneel
 
Cloud Network Virtualization with Juniper Contrail
Cloud Network Virtualization with Juniper ContrailCloud Network Virtualization with Juniper Contrail
Cloud Network Virtualization with Juniper Contrailbuildacloud
 
【AWS初心者向けWebinar】AWSから始める動画配信
【AWS初心者向けWebinar】AWSから始める動画配信【AWS初心者向けWebinar】AWSから始める動画配信
【AWS初心者向けWebinar】AWSから始める動画配信Amazon Web Services Japan
 
Contrail Deep-dive - Cloud Network Services at Scale
Contrail Deep-dive - Cloud Network Services at ScaleContrail Deep-dive - Cloud Network Services at Scale
Contrail Deep-dive - Cloud Network Services at ScaleMarketingArrowECS_CZ
 
ビッグデータ処理データベースの全体像と使い分け
ビッグデータ処理データベースの全体像と使い分けビッグデータ処理データベースの全体像と使い分け
ビッグデータ処理データベースの全体像と使い分けRecruit Technologies
 

Viewers also liked (18)

Monitor OpenStack Environments from the bottom up and front to back
Monitor OpenStack Environments from the bottom up and front to backMonitor OpenStack Environments from the bottom up and front to back
Monitor OpenStack Environments from the bottom up and front to back
 
Network visibility and control using industry standard sFlow telemetry
Network visibility and control using industry standard sFlow telemetryNetwork visibility and control using industry standard sFlow telemetry
Network visibility and control using industry standard sFlow telemetry
 
5 g network & technology
5 g network & technology5 g network & technology
5 g network & technology
 
大規模環境のOpenStack アップグレードの考え方と実施のコツ
大規模環境のOpenStackアップグレードの考え方と実施のコツ大規模環境のOpenStackアップグレードの考え方と実施のコツ
大規模環境のOpenStack アップグレードの考え方と実施のコツ
 
AWS Data Collection & Storage
AWS Data Collection & StorageAWS Data Collection & Storage
AWS Data Collection & Storage
 
NFV Tutorial
NFV TutorialNFV Tutorial
NFV Tutorial
 
NFV and OpenStack
NFV and OpenStackNFV and OpenStack
NFV and OpenStack
 
Using Agilio SmartNICs for OpenStack Networking Acceleration
Using Agilio SmartNICs for OpenStack Networking AccelerationUsing Agilio SmartNICs for OpenStack Networking Acceleration
Using Agilio SmartNICs for OpenStack Networking Acceleration
 
Treasure Data Cloud Data Platform
Treasure Data Cloud Data PlatformTreasure Data Cloud Data Platform
Treasure Data Cloud Data Platform
 
Digdagによる大規模データ処理の自動化とエラー処理
Digdagによる大規模データ処理の自動化とエラー処理Digdagによる大規模データ処理の自動化とエラー処理
Digdagによる大規模データ処理の自動化とエラー処理
 
NFV evolution towards 5G
NFV evolution towards 5GNFV evolution towards 5G
NFV evolution towards 5G
 
NFV : Virtual Network Function Architecture
NFV : Virtual Network Function ArchitectureNFV : Virtual Network Function Architecture
NFV : Virtual Network Function Architecture
 
Design Principles for 5G
Design Principles for 5GDesign Principles for 5G
Design Principles for 5G
 
Cloud Network Virtualization with Juniper Contrail
Cloud Network Virtualization with Juniper ContrailCloud Network Virtualization with Juniper Contrail
Cloud Network Virtualization with Juniper Contrail
 
【AWS初心者向けWebinar】AWSから始める動画配信
【AWS初心者向けWebinar】AWSから始める動画配信【AWS初心者向けWebinar】AWSから始める動画配信
【AWS初心者向けWebinar】AWSから始める動画配信
 
Contrail Deep-dive - Cloud Network Services at Scale
Contrail Deep-dive - Cloud Network Services at ScaleContrail Deep-dive - Cloud Network Services at Scale
Contrail Deep-dive - Cloud Network Services at Scale
 
170827 jtf garafana
170827 jtf garafana170827 jtf garafana
170827 jtf garafana
 
ビッグデータ処理データベースの全体像と使い分け
ビッグデータ処理データベースの全体像と使い分けビッグデータ処理データベースの全体像と使い分け
ビッグデータ処理データベースの全体像と使い分け
 

Similar to Nfv orchestration open stack summit may2015 aricent

Intel Network Builders Summit: Key Lessons from an advanced multi-vendor NFV ...
Intel Network Builders Summit: Key Lessons from an advanced multi-vendor NFV ...Intel Network Builders Summit: Key Lessons from an advanced multi-vendor NFV ...
Intel Network Builders Summit: Key Lessons from an advanced multi-vendor NFV ...Kiran Sirupa
 
Integrated SDN/NFV Framework for Transitioning to Application Delivery Model
Integrated SDN/NFV Framework for Transitioning to Application Delivery ModelIntegrated SDN/NFV Framework for Transitioning to Application Delivery Model
Integrated SDN/NFV Framework for Transitioning to Application Delivery ModelF5 Networks
 
Carrier-Class Environments for NFV Lifecycle Management- Overture & Wind Rive...
Carrier-Class Environments for NFV Lifecycle Management- Overture & Wind Rive...Carrier-Class Environments for NFV Lifecycle Management- Overture & Wind Rive...
Carrier-Class Environments for NFV Lifecycle Management- Overture & Wind Rive...Overture Networks
 
Network Function Virtualization (NFV) BoF
Network Function Virtualization (NFV) BoFNetwork Function Virtualization (NFV) BoF
Network Function Virtualization (NFV) BoFAPNIC
 
RIFT.io_and_Intel_Taking_Virtual_Network_Functions_to_Hyperscale
RIFT.io_and_Intel_Taking_Virtual_Network_Functions_to_HyperscaleRIFT.io_and_Intel_Taking_Virtual_Network_Functions_to_Hyperscale
RIFT.io_and_Intel_Taking_Virtual_Network_Functions_to_Hyperscalevibhorrastogi
 
Next Generation DDoS Services – can we do this with NFV? - CF Chui
Next Generation DDoS Services – can we do this with NFV? - CF ChuiNext Generation DDoS Services – can we do this with NFV? - CF Chui
Next Generation DDoS Services – can we do this with NFV? - CF ChuiMyNOG
 
Summit 16: Programmable Infrastructure Key to Business Transformation
Summit 16: Programmable Infrastructure Key to Business TransformationSummit 16: Programmable Infrastructure Key to Business Transformation
Summit 16: Programmable Infrastructure Key to Business TransformationOPNFV
 
Cloudify: Open vCPE Design Concepts and Multi-Cloud Orchestration
Cloudify: Open vCPE Design Concepts and Multi-Cloud OrchestrationCloudify: Open vCPE Design Concepts and Multi-Cloud Orchestration
Cloudify: Open vCPE Design Concepts and Multi-Cloud OrchestrationCloudify Community
 
Introducing ONAP for OpenStack St Louis Meetup
Introducing ONAP for OpenStack St Louis MeetupIntroducing ONAP for OpenStack St Louis Meetup
Introducing ONAP for OpenStack St Louis Meetupdjzook
 
Webinar how to ensure sdn-nfv doesn't break your network
Webinar   how to ensure sdn-nfv doesn't break your networkWebinar   how to ensure sdn-nfv doesn't break your network
Webinar how to ensure sdn-nfv doesn't break your networkQualitest
 
Technology Primer: Software-Defined Networking and Its Impact on Infrastructu...
Technology Primer: Software-Defined Networking and Its Impact on Infrastructu...Technology Primer: Software-Defined Networking and Its Impact on Infrastructu...
Technology Primer: Software-Defined Networking and Its Impact on Infrastructu...CA Technologies
 
Distributed vnf management architecture and use-cases
Distributed vnf management  architecture and use-casesDistributed vnf management  architecture and use-cases
Distributed vnf management architecture and use-casesOPNFV
 
Distributed VNF Management - Architecture and Use cases
Distributed VNF Management - Architecture and Use casesDistributed VNF Management - Architecture and Use cases
Distributed VNF Management - Architecture and Use casesTrinath Somanchi
 
NFV SDN Summit March 2014 D3 03 bruno_rijsman NFV with OpenContrail
NFV SDN Summit March 2014 D3 03 bruno_rijsman NFV with OpenContrailNFV SDN Summit March 2014 D3 03 bruno_rijsman NFV with OpenContrail
NFV SDN Summit March 2014 D3 03 bruno_rijsman NFV with OpenContrailozkan01
 
Network Functions Virtualization – Our Strategy
Network Functions Virtualization – Our StrategyNetwork Functions Virtualization – Our Strategy
Network Functions Virtualization – Our StrategyADVA
 
Distributed VNF Management - Architecture and Use cases
Distributed VNF Management - Architecture and Use casesDistributed VNF Management - Architecture and Use cases
Distributed VNF Management - Architecture and Use casesSridhar Pothuganti
 
Putting the M in MANO: Major new Ensemble release delivers NFV management and...
Putting the M in MANO: Major new Ensemble release delivers NFV management and...Putting the M in MANO: Major new Ensemble release delivers NFV management and...
Putting the M in MANO: Major new Ensemble release delivers NFV management and...ADVA
 
Demystifying Network Function Virtualization (NFV) Service Assurance
Demystifying Network Function Virtualization (NFV) Service AssuranceDemystifying Network Function Virtualization (NFV) Service Assurance
Demystifying Network Function Virtualization (NFV) Service AssuranceZenoss
 
APAC Webinar: Learn how to maximise the benefits of NFV
APAC Webinar: Learn how to maximise the benefits of NFVAPAC Webinar: Learn how to maximise the benefits of NFV
APAC Webinar: Learn how to maximise the benefits of NFVF5NetworksAPJ
 
Driving Systems Stability & Delivery Agility through DevOps [Decoding DevOps ...
Driving Systems Stability & Delivery Agility through DevOps [Decoding DevOps ...Driving Systems Stability & Delivery Agility through DevOps [Decoding DevOps ...
Driving Systems Stability & Delivery Agility through DevOps [Decoding DevOps ...InfoSeption
 

Similar to Nfv orchestration open stack summit may2015 aricent (20)

Intel Network Builders Summit: Key Lessons from an advanced multi-vendor NFV ...
Intel Network Builders Summit: Key Lessons from an advanced multi-vendor NFV ...Intel Network Builders Summit: Key Lessons from an advanced multi-vendor NFV ...
Intel Network Builders Summit: Key Lessons from an advanced multi-vendor NFV ...
 
Integrated SDN/NFV Framework for Transitioning to Application Delivery Model
Integrated SDN/NFV Framework for Transitioning to Application Delivery ModelIntegrated SDN/NFV Framework for Transitioning to Application Delivery Model
Integrated SDN/NFV Framework for Transitioning to Application Delivery Model
 
Carrier-Class Environments for NFV Lifecycle Management- Overture & Wind Rive...
Carrier-Class Environments for NFV Lifecycle Management- Overture & Wind Rive...Carrier-Class Environments for NFV Lifecycle Management- Overture & Wind Rive...
Carrier-Class Environments for NFV Lifecycle Management- Overture & Wind Rive...
 
Network Function Virtualization (NFV) BoF
Network Function Virtualization (NFV) BoFNetwork Function Virtualization (NFV) BoF
Network Function Virtualization (NFV) BoF
 
RIFT.io_and_Intel_Taking_Virtual_Network_Functions_to_Hyperscale
RIFT.io_and_Intel_Taking_Virtual_Network_Functions_to_HyperscaleRIFT.io_and_Intel_Taking_Virtual_Network_Functions_to_Hyperscale
RIFT.io_and_Intel_Taking_Virtual_Network_Functions_to_Hyperscale
 
Next Generation DDoS Services – can we do this with NFV? - CF Chui
Next Generation DDoS Services – can we do this with NFV? - CF ChuiNext Generation DDoS Services – can we do this with NFV? - CF Chui
Next Generation DDoS Services – can we do this with NFV? - CF Chui
 
Summit 16: Programmable Infrastructure Key to Business Transformation
Summit 16: Programmable Infrastructure Key to Business TransformationSummit 16: Programmable Infrastructure Key to Business Transformation
Summit 16: Programmable Infrastructure Key to Business Transformation
 
Cloudify: Open vCPE Design Concepts and Multi-Cloud Orchestration
Cloudify: Open vCPE Design Concepts and Multi-Cloud OrchestrationCloudify: Open vCPE Design Concepts and Multi-Cloud Orchestration
Cloudify: Open vCPE Design Concepts and Multi-Cloud Orchestration
 
Introducing ONAP for OpenStack St Louis Meetup
Introducing ONAP for OpenStack St Louis MeetupIntroducing ONAP for OpenStack St Louis Meetup
Introducing ONAP for OpenStack St Louis Meetup
 
Webinar how to ensure sdn-nfv doesn't break your network
Webinar   how to ensure sdn-nfv doesn't break your networkWebinar   how to ensure sdn-nfv doesn't break your network
Webinar how to ensure sdn-nfv doesn't break your network
 
Technology Primer: Software-Defined Networking and Its Impact on Infrastructu...
Technology Primer: Software-Defined Networking and Its Impact on Infrastructu...Technology Primer: Software-Defined Networking and Its Impact on Infrastructu...
Technology Primer: Software-Defined Networking and Its Impact on Infrastructu...
 
Distributed vnf management architecture and use-cases
Distributed vnf management  architecture and use-casesDistributed vnf management  architecture and use-cases
Distributed vnf management architecture and use-cases
 
Distributed VNF Management - Architecture and Use cases
Distributed VNF Management - Architecture and Use casesDistributed VNF Management - Architecture and Use cases
Distributed VNF Management - Architecture and Use cases
 
NFV SDN Summit March 2014 D3 03 bruno_rijsman NFV with OpenContrail
NFV SDN Summit March 2014 D3 03 bruno_rijsman NFV with OpenContrailNFV SDN Summit March 2014 D3 03 bruno_rijsman NFV with OpenContrail
NFV SDN Summit March 2014 D3 03 bruno_rijsman NFV with OpenContrail
 
Network Functions Virtualization – Our Strategy
Network Functions Virtualization – Our StrategyNetwork Functions Virtualization – Our Strategy
Network Functions Virtualization – Our Strategy
 
Distributed VNF Management - Architecture and Use cases
Distributed VNF Management - Architecture and Use casesDistributed VNF Management - Architecture and Use cases
Distributed VNF Management - Architecture and Use cases
 
Putting the M in MANO: Major new Ensemble release delivers NFV management and...
Putting the M in MANO: Major new Ensemble release delivers NFV management and...Putting the M in MANO: Major new Ensemble release delivers NFV management and...
Putting the M in MANO: Major new Ensemble release delivers NFV management and...
 
Demystifying Network Function Virtualization (NFV) Service Assurance
Demystifying Network Function Virtualization (NFV) Service AssuranceDemystifying Network Function Virtualization (NFV) Service Assurance
Demystifying Network Function Virtualization (NFV) Service Assurance
 
APAC Webinar: Learn how to maximise the benefits of NFV
APAC Webinar: Learn how to maximise the benefits of NFVAPAC Webinar: Learn how to maximise the benefits of NFV
APAC Webinar: Learn how to maximise the benefits of NFV
 
Driving Systems Stability & Delivery Agility through DevOps [Decoding DevOps ...
Driving Systems Stability & Delivery Agility through DevOps [Decoding DevOps ...Driving Systems Stability & Delivery Agility through DevOps [Decoding DevOps ...
Driving Systems Stability & Delivery Agility through DevOps [Decoding DevOps ...
 

More from Aricent

Aricent Smart Spaces Solution
Aricent Smart Spaces SolutionAricent Smart Spaces Solution
Aricent Smart Spaces SolutionAricent
 
Aricent Highly Automated Vulnerability Assessment Orchestration Containers (H...
Aricent Highly Automated Vulnerability Assessment Orchestration Containers (H...Aricent Highly Automated Vulnerability Assessment Orchestration Containers (H...
Aricent Highly Automated Vulnerability Assessment Orchestration Containers (H...Aricent
 
LTE & Wi-Fi: Options for Uniting Them for a Better User Experience
LTE & Wi-Fi: Options for Uniting Them for a Better User Experience LTE & Wi-Fi: Options for Uniting Them for a Better User Experience
LTE & Wi-Fi: Options for Uniting Them for a Better User Experience Aricent
 
Exploiting the Potential of Augmented Reality
Exploiting the Potential of Augmented RealityExploiting the Potential of Augmented Reality
Exploiting the Potential of Augmented RealityAricent
 
LTE & Wi-Fi: Options for Uniting Them for a Better User Experience
LTE & Wi-Fi: Options for Uniting Them for a Better User ExperienceLTE & Wi-Fi: Options for Uniting Them for a Better User Experience
LTE & Wi-Fi: Options for Uniting Them for a Better User ExperienceAricent
 
WLAN Testing Services
WLAN Testing ServicesWLAN Testing Services
WLAN Testing ServicesAricent
 
Creating a Playbook to Exploit the Long Tail of IoT
Creating a Playbook to Exploit the Long Tail of IoTCreating a Playbook to Exploit the Long Tail of IoT
Creating a Playbook to Exploit the Long Tail of IoTAricent
 
CLOUD RAN- Benefits of Centralization and Virtualization
CLOUD RAN- Benefits of Centralization and VirtualizationCLOUD RAN- Benefits of Centralization and Virtualization
CLOUD RAN- Benefits of Centralization and VirtualizationAricent
 
Aricent Technology Vision 2016
Aricent Technology Vision 2016Aricent Technology Vision 2016
Aricent Technology Vision 2016Aricent
 

More from Aricent (9)

Aricent Smart Spaces Solution
Aricent Smart Spaces SolutionAricent Smart Spaces Solution
Aricent Smart Spaces Solution
 
Aricent Highly Automated Vulnerability Assessment Orchestration Containers (H...
Aricent Highly Automated Vulnerability Assessment Orchestration Containers (H...Aricent Highly Automated Vulnerability Assessment Orchestration Containers (H...
Aricent Highly Automated Vulnerability Assessment Orchestration Containers (H...
 
LTE & Wi-Fi: Options for Uniting Them for a Better User Experience
LTE & Wi-Fi: Options for Uniting Them for a Better User Experience LTE & Wi-Fi: Options for Uniting Them for a Better User Experience
LTE & Wi-Fi: Options for Uniting Them for a Better User Experience
 
Exploiting the Potential of Augmented Reality
Exploiting the Potential of Augmented RealityExploiting the Potential of Augmented Reality
Exploiting the Potential of Augmented Reality
 
LTE & Wi-Fi: Options for Uniting Them for a Better User Experience
LTE & Wi-Fi: Options for Uniting Them for a Better User ExperienceLTE & Wi-Fi: Options for Uniting Them for a Better User Experience
LTE & Wi-Fi: Options for Uniting Them for a Better User Experience
 
WLAN Testing Services
WLAN Testing ServicesWLAN Testing Services
WLAN Testing Services
 
Creating a Playbook to Exploit the Long Tail of IoT
Creating a Playbook to Exploit the Long Tail of IoTCreating a Playbook to Exploit the Long Tail of IoT
Creating a Playbook to Exploit the Long Tail of IoT
 
CLOUD RAN- Benefits of Centralization and Virtualization
CLOUD RAN- Benefits of Centralization and VirtualizationCLOUD RAN- Benefits of Centralization and Virtualization
CLOUD RAN- Benefits of Centralization and Virtualization
 
Aricent Technology Vision 2016
Aricent Technology Vision 2016Aricent Technology Vision 2016
Aricent Technology Vision 2016
 

Recently uploaded

(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...ranjana rawat
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 

Recently uploaded (20)

(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 

Nfv orchestration open stack summit may2015 aricent

  • 1. NFV Orchestration: Challenges in Telecom Deployments Shamik Mishra OpenStack Summit, Vancouver, May 2015
  • 2. Proprietary & Confidential. © Aricent 2015 2 Presenter Shamik Mishra  Senior Engineering Project Manager, Aricent Focus Area: Management and Network Orchestration for NFV  Identifying the requirements for NFV MANO  Specifying extensible, Modular architecture for NFV Service Orchestrator  Identifying possible requirements on the underlying Virtual Infrastructure Manager i.e. OpenStack
  • 3. Proprietary & Confidential. © Aricent 2015 Agenda  NFV Implementation Challenges  End-to-End Service Monitoring of NFV – Service Creation Model – Service Aware Monitor  Cloud-RAN use case  Community Support 3
  • 4. Proprietary & Confidential. © Aricent 2015 NFV: Quick Recap Traditional Separate network appliance / function for each function  Dedicated hardware for each function  Unused computing capability  Separate management systems  Difficult to introduce new services rapidly  Higher power consumption and requires more real- estate NFV  Hosted on commodity hardware through virtualization  Scalable, elastic and efficient usage of resources  Possibility of unified management and orchestration of services  Easily introduce new functions  Cost-effective Each function virtualized and hosted on commodity hardware 4 GWsRouter Firewall Load Balancer Distribution Switch IMS MMEs IT Application
  • 5. Proprietary & Confidential. © Aricent 2015 NFV Implementation Challenges Source: Heavy Reading NFV Multi-Client Study 2014 5 Very concerned short term (within next 2 years) Scalability of COTS Hardware Power Consumption Reliability of COTS hardware Managing & Interworking various APIs Cloud Orchestration & Management (Includes Optimizing Resources) Network Impact of virtualizing the media plane Managing Service failover and recovery Operations & backend integration (OSS Integration) Packet processing performance (deterministic) in data plane Security KPI Impact related to media-sensitive applications (QoS, jitter, latency) Troubleshooting & Service Assurance NFV Implementation Challenges How concerned is your company about the following technical challenges related to NFV? Very concerned longer term (in 2 to 5 years) Only slightly concerned Not concerned at all 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% Network functions virtualization is not just porting legacy network functions to commodity hardware
  • 6. Proprietary & Confidential. © Aricent 2015 Realizing large scale NFV deployments, replicating & monitoring them Simplifying networking configuration to ensure automated service delivery Legacy network elements are often developed for peak capacity and not for scaling. Also, scaling does not necessarily depend on infrastructure alone Scaling one element in a chain of services may require the need to touch / modify several other elements (including legacy elements) Monitoring Service Assurance Scaling 6 Challenges in Monitoring, Service Assurance and Scaling
  • 7. Proprietary & Confidential. © Aricent 2015 7 End-to-End Service Monitoring
  • 8. Proprietary & Confidential. © Aricent 2015 8 End-to-End Service Monitoring in NFV Orchestration & Monitoring Service Request Transform Resource Requests Resource Deployment Resource Monitoring Monitoring Generation Monitoring Collection Monitoring Aggregation Service Monitoring Aggregation Visualization Actions
  • 9. Proprietary & Confidential. © Aricent 2015 9 Example  A deployed VNF chain may contain multiple instances of VNF application on VMs, Load Balancers, Firewalls, etc.  They network connectivity is managed by software switches  The chain can have instances deployed across compute nodes and clouds  Clouds can be interconnected over VPN  SDN Controllers can create / manage the service chains  Monitoring data also needed for debugging problems in the network  The VNFs can be from different vendors with separate monitoring & troubleshooting mechanisms End-to-End Service Monitoring in NFV Challenges The health of the end-to-end chained service is necessary for the orchestrators & OSS to ensure service continuity and to initiate automated actions FW VNF 1 Switch LB Hypervisors VNF 2 VNF 1’ VNF 2’ Possible Monitoring Points Question? Do we need a new and unified monitoring model for NFV
  • 10. Proprietary & Confidential. © Aricent 2015 10  While scaling an element of a service chain, we may need to touch/modify the other elements in the chain End-to-End Service Monitoring in NFV Impact to Scalability for a Service Chain A C B D Becomes a bottleneck B Traffic Path New Traffic Path Scaled Node Entire Subgraph scaled Modify Modify Scaling Orchestrators / devices who takes the decision for scaling needs to evaluate the impact on the subsequent sub-graph Becomes a bottleneck B New Traffic Path Scaled Node A C B D Traffic Path Modify C D This could now become a bottleneck
  • 11. Proprietary & Confidential. © Aricent 2015 11  What is monitored also can depend on VNF Execution States  There can be multiple VNF execution states like – Install, Start, Stop, Run, Maintain  The chain’s state is a derivative of the individual VNF states  We may want to monitor different set of things as and when the chain state changes  NFV Orchestrator will take actions when the chain state changes like reconfiguring the apps, configuration etc. End-to-End Service Monitoring in NFV Impact of VNF States to Monitoring B’ VNF States A CB D Modified Monitoring RUN RUN RUN RUN Under upgrade MAINT Chain State (A,RUN) (B,RUN) (C,RUN) (D,RUN) Monitoring State (Mon A RUN) (Mon B RUN) (Mon C RUN) (Mon D RUN) (B’,MAINT) (Mon B’ RUN) CH1 CH2 MON1 MON2
  • 12. Proprietary & Confidential. © Aricent 2015 12 Translation of Forwarding Graph to Resource Requests A CB E KPI-1 D F KPI-2 KPI-3 KPI-4 Service Request - View A D F Router SDN Controller C B E SwitchSwitch Resource Request(s) View  Service Request would consist of a – Network Forwarding Graph – Set of Key Performance indicators (or SLAs) for the service  The service request should get decomposed to Resource requests (example) – Computing Resource Requests – Networking Resource requests – Placement Requests  The KPI set gets transformed into parameters for the resource requests
  • 13. Proprietary & Confidential. © Aricent 2015 13 Service Creation Model Service Orchestrator Controllers Infrastructure Managers Service Request Resource Decomposition Resource Requests  Service Requests are Characterized by KPIs / SLAs  Decomposing Service Requests to Resource Requests – Configuration Requests – Computing Requests – Placement Requests  Decomposition is driven by the KPIs SDN Controller Networking / Chaining Requests Resource Manager • Computing Requests • Placement Requests Scheduler / Placement Mgr. OpenStack Services (Neutron, Nova, etc..) Placement Requests Resource Reservations Network Devices Networking Configuration VNF Manager VNF Configuration Resource Instantiate VNF  Service performance (adherence to KPIs / SLAs) requires monitoring of individual Resource Requests & VNFs  Monitoring data acquired at each layer should be “aggregated” to determine the service performance Other Networking Devices
  • 14. Proprietary & Confidential. © Aricent 2015 14 App 2 App 3 App 4App 1 App 5 Compute Node-1 Compute Node-2 Service-Aware Monitor Infrastructure Monitor Service Monitoring Engine Application specific monitoring data Infrastructure monitoring data Service Orchestration Model and Implementation Service Templates Should we standardize these interfaces??? Application specific parameters in a container Infrastructure statistics Monitor Service Chains End-to-End Service Monitoring in NFV
  • 15. Proprietary & Confidential. © Aricent 2015 Compute 15 Service Aware Monitor NF3 Collector NF4 Collector NF5 Collector Service Aware Monitor Message Queue Networking NF3 NF4 NF5 API API MA MA MA Infrastructure Monitoring Storage API Advanced Services MA AS Collector Metrics Database Monitoring Initiator & Aggregator Service Alarm KPI Trend Analysis Scaling Decisions Resource Reconfigure Service Self Healing Service Orchestrator Controllers
  • 16. Proprietary & Confidential. © Aricent 2015 16 Service Orchestration & Monitoring Key Conclusions • Decomposition of Service Requests to Resource Requests • VNF state aware Monitoring initiation and collection • Aggregation of Monitoring data • Possible standardization of Monitoring Initiation and Collection by VNF vendors and Open Source Community • Service Aware Placement • Modularity in Service Orchestrator Architecture
  • 17. Proprietary & Confidential. © Aricent 2015 17 Cloud-RAN Use Case
  • 18. Proprietary & Confidential. © Aricent 2015 18 Cloud RAN Host RT Linux KVM Guest RT Linux PDCP, RLC, MAC eNB1 Guest RT Linux L3 OAM RRM VM1 VM2 Guest RT Linux PDCP, RLC, MAC eNB2 Guest RT Linux L3 OAM RRM VM1 VM2 Layer 1 Antenna Antenna Site Layer 1 Antenna Antenna Site Cloud: Centralized eNB Pool System View LTE Layer-1 (Baseband Unit) Processing
  • 19. Proprietary & Confidential. © Aricent 2015 eNodeB 1 VM RRM OAM eNodeB L3 eNodeB L2 S1 AP (192.16.81.53) GTPU (192.16.81.51) X2 AP (192.16.81.52) Guest OS Fedora Host OS Ubuntu eNB L2 (192.16.81.58) eNB1 Network Compute vEPC eNB2 S1 AP (172.16.114.124) GTPU (172.16.114.122) X2 AP (172.16.114.123) eNB L2 (172.16.114.120) Compute Layer 1 Antenna Antenna Site Cloud RAN OpenStack Orchestration 19
  • 20. Proprietary & Confidential. © Aricent 2015 20 CPU Utilization  CPU load increases with throughput and number of users scheduled – Move non-real time MAC scheduling out  Setup – 1 vCPU, 2GB Memory VMs – Intel Core i3 processor 52 58 64 70 74 77 0 10 20 30 40 50 60 70 80 90 10 20 30 40 50 60 CPU Utilization UL Throughput (Mbps)
  • 21. Proprietary & Confidential. © Aricent 2015 Cloud RAN OpenStack Orchestration Key Observations  Packet Buffering / loss. Solved through PCI pass-through approaches  Live VM migration of L2 Virtual Machine is a challenge, as MAC scheduler requires 1ms of processing time  Scaling: More eNBs realized through launching more eNB VNFs – If eNB mapped to 3 sectors, L3 layer can be common – If single S1 interface required for all eNBs then scaling is limited  Scaling: CPU load increases with throughput and number of users scheduled – Move non-real time MAC scheduling out 21
  • 22. Proprietary & Confidential. © Aricent 2015 22 Community Support
  • 23. Proprietary & Confidential. © Aricent 2015 23 Possible Community Actions  The tenant today never has any visibility into its switch which connects the VMs of the tenant (with OVS)  In the real world, the user controls its own switch  Full control of its own switch would give possibilities like – Flexibility in defining service chains through SDN controller by the tenant – Defining custom monitoring – Same network visibility as a dedicated switch – Security settings like MAC based policies  Port mirroring is a key enabler for efficient NFV troubleshooting and monitoring  Tenant should be able to mirror a port to debug from the traffic exchanged between two VNFs  Neutron API may need to be developed to initiate and terminate port mirroring by tenants Switch-as-a-Service & Port Mirroring
  • 24. Proprietary & Confidential. © Aricent 2015 24 Possible Community Actions  IMS is now widely used by operators to provide packet-switched voice and other multimedia services to customers.  SIP (Session Initiation Protocol) is used in IMS to setup and teardown real-time voice and video calls.  Huge SIP traffic needs to be balanced across a group of IMS nodes to ensure scalability and reliability of Telco IMS services.  To ensure a robust and scalable virtualized IMS network, SIP LBaaS would be a much needed service in OpenStack. Reference: SIP Load-Balancing-as-a-Service (LBaas). David Waiting https://etherpad.openstack.org/p/telcowg- usecase-SIP_LBaaS. SIP Load Balancing as a Service
  • 25. Proprietary & Confidential. © Aricent 2015 Headquarters 303 Twin Dolphin Drive 6th Floor Redwood City, CA 94065 USA Tel: +1 650 632 4310 Fax: +1 650 551 9901 Thank you.