Académique Documents
Professionnel Documents
Culture Documents
Network Functions
Virtualization
Hewlett Packard Enterprise
Special Edition
by Balamurali Thekkedath
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Network Functions Virtualization For Dummies, Hewlett Packard Enterprise Special Edition
Published by
John Wiley & Sons, Inc.
111 River St.
Hoboken, NJ 070305774
www.wiley.com
Copyright 2016 by John Wiley & Sons, Inc., Hoboken, New Jersey
No part of this publication may be reproduced, stored in a retrieval system or transmitted in any
form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise,
except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without the
prior written permission of the Publisher. Requests to the Publisher for permission should be
addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ
07030, (201) 7486011, fax (201) 7486008, or online at http://www.wiley.com/go/permissions.
Trademarks: Wiley, For Dummies, the Dummies Man logo, The Dummies Way, Dummies.com,
Making Everything Easier, and related trade dress are trademarks or registered trademarks of John
Wiley & Sons, Inc. and/or its affiliates in the United States and other countries, and may not be used
without written permission. All other trademarks are the property of their respective owners. John
Wiley & Sons, Inc., is not associated with any product or vendor mentioned in this book.
LIMIT OF LIABILITY/DISCLAIMER OF WARRANTY: THE PUBLISHER AND THE AUTHOR MAKE
NO REPRESENTATIONS OR WARRANTIES WITH RESPECT TO THE ACCURACY OR
COMPLETENESS OF THE CONTENTS OF THIS WORK AND SPECIFICALLY DISCLAIM ALL
WARRANTIES, INCLUDING WITHOUT LIMITATION WARRANTIES OF FITNESS FOR A
PARTICULAR PURPOSE. NO WARRANTY MAY BE CREATED OR EXTENDED BY SALES OR
PROMOTIONAL MATERIALS. THE ADVICE AND STRATEGIES CONTAINED HEREIN MAY NOT BE
SUITABLE FOR EVERY SITUATION. THIS WORK IS SOLD WITH THE UNDERSTANDING THAT THE
PUBLISHER IS NOT ENGAGED IN RENDERING LEGAL, ACCOUNTING, OR OTHER PROFESSIONAL
SERVICES. IF PROFESSIONAL ASSISTANCE IS REQUIRED, THE SERVICES OF A COMPETENT
PROFESSIONAL PERSON SHOULD BE SOUGHT. NEITHER THE PUBLISHER NOR THE AUTHOR
SHALL BE LIABLE FOR DAMAGES ARISING HEREFROM. THE FACT THAT AN ORGANIZATION
OR WEBSITE IS REFERRED TO IN THIS WORK AS A CITATION AND/OR A POTENTIAL SOURCE
OF FURTHER INFORMATION DOES NOT MEAN THAT THE AUTHOR OR THE PUBLISHER
ENDORSES THE INFORMATION THE ORGANIZATION OR WEBSITE MAY PROVIDE OR
RECOMMENDATIONS IT MAY MAKE. FURTHER, READERS SHOULD BE AWARE THAT INTERNET
WEBSITES LISTED IN THIS WORK MAY HAVE CHANGED OR DISAPPEARED BETWEEN WHEN
THIS WORK WAS WRITTEN AND WHEN IT IS READ.
ISBN 9781119149927 (pbk); ISBN 9781119149934 (ebk)
Manufactured in the United States of America
10 9 8 7 6 5 4 3 2 1
For general information on our other products and services, or how to create a custom For
Dummies book for your business or organization, please contact our Business Development
Department in the U.S. at 8774094177, contact info@dummies.biz, or visit www.wiley.com/
go/custompub. For information about licensing the For Dummies brand for products or s ervices,
contact BrandedRights&Licenses@Wiley.com.
Publishers Acknowledgments
Some of the people who helped bring this book to market include the following:
Development Editor: Elizabeth Kuball
Copy Editor: Elizabeth Kuball
Acquisitions Editor: Katie Mohr
Editorial Manager: Rev Mengle
Business Development Representative:
Karen Hattan
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Table of Contents
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
About This Book......................................................................... 1
Foolish Assumptions.................................................................. 2
Icons Used in This Book............................................................. 2
Beyond the Book......................................................................... 3
Where to Go from Here.............................................................. 3
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
iv
Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Introduction
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Foolish Assumptions
It has been said that most assumptions have outlived their
uselessness, but I assume a few things nonetheless:
You work in the telecommunications industry. Perhaps
you work for a CSP, a network equipment provider
(NEP), an independent software vendor (ISV), or a
service integrator (SI). As such, youre broadly familiar
with telecommunications and networking concepts,
fundamentals, and terminology.
Youre somewhat familiar with virtualization technology. You dont experience anxiety attacks and hyperventilate when someone starts talking about hypervisors.
Youre a business or technical decision maker in your
organization and youre interested in learning about
NFV. If thats the case, then this is the book for you!
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Introduction
Thank you for reading. Hope you enjoy the book. Please take
care of your writers! Seriously, this icon points out helpful
suggestions and useful nuggets of information.
Proceed at your own risk...well, okay its actually nothing
that hazardous. These useful alerts offer practical advice to
help you avoid making potentially costly mistakes.
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter1
Telecommunications
Industry Challenges
andOpportunities
In This Chapter
Recognizing current challenges and opportunities
Looking back at NFVs beginnings
Industry Challenges
andOpportunities
We are living in an increasingly hyperconnected world
and its not just humans that are connected anymore
the Internet of Things (IoT) is creating new connectivity
requirements and scenarios for our world! The CSPs who
are responsible for providing this connectivity are facing
anexponential rise in traffic and the number of subscribers
on their networks. Today, CSPs are facing challenges on multiple fronts:
Exploding demand: Analysis Mason forecasts that global
mobile data traffic will reach 60,427 petabytes (PB) in
2016, an increase of 54 percent from 2015. The rapid
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
switches, and storage. NFV ensures that CSPs will automatically benefit from any major advances and disruptive innovations that appear in IT.
NFV enables significant benefits through deployment of
virtualized network functions and applications on a shared
infrastructure:
Creating new revenue opportunities: New applications
that target specific market needs or specific market segments can be quickly tested and deployed at the scale
required. With NFV, the CSP network can become a platform on which an ecosystem of independent software
vendors can quickly bring new applications and innovations to market.
Increasing flexibility and agility with cloud-style fulfillment models: Applications and services can be readily
updated and deployed without unnecessary delays,
speeding timetomarket.
Simplifying the planning and scaling of the network:
New hardware can be quickly added, allowing CSPs to
add or delete application or service capacity on demand
to meet the elastic needs of the traffic, without long network equipment procurement cycles.
Reducing CAPEX and OPEX: Improved utilization of
equipment and wider adoption of industry standard
servers for core telecom applications in a shared
compute/storage infrastructure enable significant CAPEX
savings. CSPs can run their networks more efficiently,
with a high level of automation, and reuse a shared pool
of compute/storage resources for various functions.
Additionally, having a uniform infrastructure produces
operational savings by reducing management complexity
and its associated cost. This frees up valuable resources
to innovate and create truly differentiated service offerings for consumers and businesses.
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter2
What Is NFV?
In This Chapter
Understanding NFV
Building a framework for NFV
Recognizing NFV business goals and challenges
n this chapter, you learn about network functions virtualization (NFV) what it is, how the different architectural
components work together, how its used, and how organizations can benefit from NFV.
NFV Defined
Todays telecom networks are primarily built using specialized,
often proprietary, equipment. (In the telecom industry,
proprietary often means a technology or solution that is owned
by a single company.) Some examples of typical telecom
equipment are routers, switches, base stations, firewalls,
voice gateways, and IMS and Mobile Packet Core. These types
of equipment are typically monolithic in design; that is, they
consist of hardware, software, and associated management
systems.
This type of architecture often leads to silos of operations,
vendor lock-in, and the inability to respond to changing
demands in an agile way.
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
10
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
11
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
12
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
13
NFV challenges
Although NFV offers many benefits for service providers, it
will impact future organizations and create challenges for
operations and operations support systems (OSS). Unless
addressed appropriately, these challenges can impact a
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
14
Infrastructure challenges
The infrastructure challenges with NFV transformation come
from the introduction of new types of components in the
network, originating from the IT world and based on industry
standard platforms. These components need to provide
telcograde availability and high performance, and meet the
stringent SLAs that are typical in the CSP world.
Additionally, there is large installed base of legacy telco
equipment. Although much of this current infrastructure will
eventually be replaced by virtualized entities, either through
an NFV transformation initiative or normal lifecycle management, a hybrid environment will always exist. Virtualization
of certain telco equipment wont necessarily be feasible or
desirable in every deployment situation.
Operations challenges
A significant operational challenge of the NFV transformation
is how to maintain the customer and services views that are
tied to the underlying infrastructure. This requires integration
within existing OSS/business support systems (BSS) environments and endtoend automation to enable agility and faster
service velocity.
NFV, by decoupling functions from the infrastructure, warrants new procedures for testing/validation/acceptance and
troubleshooting. Purchasing and planning processes and competencies also need to change to be more oriented to the way
the IT domain works.
Another important operational challenge is to manage operations costs while deploying NFV. Factors contributing to this
challenge include the following:
Complexity associated with managing a hybrid environment of virtualized and legacy equipment
Complexity of managing functions implemented by a
distributed set of software entities
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
15
Service challenges
The transformation to NFV (and SDN) will eventually create
a CSP infrastructure that is programmable in realtime and
highly automated. In order to take full advantage of the
investments in the infrastructure, CSPs will have to revamp
the way they offer services to their customers. The existing
models of a fixed number of service offerings that are ordered
from a catalog and need time to be deployed will have to
be transformed into a model that allows customers to have
selfcare portals from which they will be able to personalize
their service offers. This transformation to a personalized,
ondemand service delivery will require changes in the way
services are created and billed. The catalog of services that
can be offered to a customer will need to be dynamic and
policy based. The challenges in the service domain will mainly
be in the area of managing a dynamic service offering and
its integration to the underlying infrastructure and realtime
analytics.
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
16
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter3
n this chapter, you learn the basics of the NFVI. The NFVI
is the infrastructure on which the VNFs are hosted and
executed. This infrastructure consists of hardware (compute,
storage, and networking) and software resources (like the
virtualization layer or the hypervisor that creates virtual
compute, storage, and networking resources).
Hardware Resources
Hardware that comprise the NFVI include compute, storage,
and network resources (see Figure31). These are the shared
resources that a VNF uses (through a virtualization layer) for its
processing, storage, and connectivity needs. Commercially available servers form most of the computing hardware. Storage can
either be directattached storage in the servers or shared network
attached storage (NAS) and storage area networks (SANs).
Network resources include switching functions, such as routers
and wired (or wireless) links. Together, they can form an
NFVI point-ofpresence (NFVI PoP). An NFVI PoP is defined as
a location where a VNF can be deployed. An NFVI PoP n
etwork
interconnects the compute and storage resources within a
NFVI PoP.
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
18
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
19
The virtualization layer (commonly referred to as a hypervisor) decouples the hardware resources of the NFVI from the
VNFs so that different software can be deployed across the
pooled hardware resources.
Virtualization technology emulates physical compute, storage,
and network resources.
A hypervisor allows one or more VMs to run on a single
host. The VM runs on the host operating system (OS) and is
allocated resources by the hypervisor.
The virtualization layer is responsible for abstracting the
underlying physical resources (compute, storage, and
network) and presenting them to the VNFs as independent
resources.
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
20
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter4
NFV Components:
VNF and EMS
In This Chapter
Virtualizing physical network devices and functions
Managing network elements
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
22
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
23
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
24
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter5
NFV Components:
Management and
Orchestration (MANO)
In This Chapter
Managing resources and data with the Virtualized Infrastructure
Manager
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
26
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
27
Resource management and allocation in a virtualized environment is a complex task. Given the nature of the architecture,
all resources are shared between multiple tenants or applications, and the VIM needs to take care of the competing
requests and constraints in realtime.
VNF Manager
The Virtual Network Function Manager (VNFM) is the
entity that manages the virtualized network functions (see
Figure52). Traditionally, the management component
of a network function focuses on Fault Management,
Configuration Management, Accounting Management,
Performance Management, and Security Management (FCAPS).
With the introduction of virtualization, additional aspects
of managing the lifecycle of the VNF become a key function
of the management component. The VNFM and the Element
Management System (EMS) are closely aligned in providing
overall management support for the VNF.
28
NFV Orchestration
While the VNF Manager is responsible for the management
and operation of individual VNFs, the NFV Orchestrator is
responsible for managing network services that span multiple
VNFs (see Figure53). The NFVO is responsible for creating
endtoend services across multiple VNFs. The NFVO is also
responsible for managing the lifecycle of Network Services (NS).
The key activities in VNF lifecycle management include the
following:
Onboarding an NS for example, registering an NS in
the service catalog (the inventory of services that can be
used to create a product offering to the customers), and
ensuring that all the required parameters and associated
rules are registered as well.
Instantiating an NS for example, creating an NS using
the predetermined parameters or templates.
Scaling up or scaling down an NS for example, growing
or reducing the capacity of the NS.
Updating an NS by supporting configuration changes,
such as changing interVNF connectivity or the VNF
instances that are part of the service.
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
29
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
30
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter6
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
32
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
33
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
34
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter7
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
36
NFVIaaS
Many CSPs today offer both cloud computing and network
services to their customers. The NFVIasaService (NFVIaaS)
use case is a scenario in which a service provider can offer
its NFVI resources (such as physical compute, network, and
storage) as a service on which other CSPs can run their VNFs.
In an NFVIaaS model, the tenant CSP is responsible for installing, configuring and maintaining its VNFs running on the service providers virtualized infrastructure.
Running VNF instances inside an NFVI operated by another
service provider is one way that service providers can meet
the servicelevel agreements (SLAs) and regulatory requirements of their global enterprise customers, without actually
maintaining a physical presence around the globe.
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
37
VNFaaS
VNFasaService (VNFaaS) is a model in which CSPs can
provide network functions as a service to their enterprise
without having to ship them a physical appliance.
The two most common examples of VNFaaS are Enterprise
virtualized Customer Premises Equipment (vCPE) and virtualized Provider Edge (vPE) routers.
Modern enterprises are migrating ever more services and
applications to their data centers and to the public cloud
in order to support branch offices and remote locations,
enterprise mobility, and bringyourowndevice (BYOD) policies. Standalone purposebuilt appliances installed at branch
offices are cost prohibitive, slow to deploy, and difficult to
maintain. At the opposite end of the spectrum, allinone
devices provide severely limited functionality. Neither of
these solutions provides enterprises with the flexibility and
agility they require. In an enterprise vCPE model, the CSP can
offer the enterprise a basic connectivity device on premises
and offer all the valueadded network functions (like firewalls
and load balancers) as a service, hosted on the CSP cloud.
vPE is an example where routing functions in a PE can
be implemented as virtual functions and offered to other
applications (like virtual private network [VPN] services) in
an asaService model.
In a SaaS model, the customer typically has little to no control
of the underlying infrastructure, operating system, databases,
or middleware. SaaS providers typically offer their customers a
specialized cloudbased application, such as ADP or Salesforce.
VNFaaS extends the SaaS model to virtualized network functions, but unlike physical CPE and PE routers, customers will
typically not have full control or visibility of CPE or PE routers
in a VNFaaS.
VNPaaS
NFV enables opportunities like Virtual Network Platform as a
Service (VNPaaS) for the CSP to make available to its enterprise customers a suite of infrastructure and applications as
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
38
Virtualization of Mobile
Base Station
Large numbers of radio access network (RAN) nodes in
mobile networks account for a significant portion of a mobile
operators capital and operating expenses. RAN nodes, including the base stations that connect directly to subscribers
mobile devices, are typically built on proprietary hardware
and have long development, deployment, and operational
lifecycles. By virtualizing at least some part of the RAN nodes
onto industry standard IT servers, storage, and switches,
mobile operators can achieve a lower footprint and lower
energy costs. In addition, softwarebased implementation can
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
39
Virtualization of Content
Delivery Networks
The everincreasing demand for rich multimedia content,
such as ondemand video, streaming (highdefinition) audio
and video, and Internet Protocol television (IPTV), creates
major bandwidth and storage challenges for communications service providers. Integrating content delivery network
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
40
FixedAccess NFV
Broadband digital subscriber line (DSL) access is widely
deployed today for residential and smalltomedium business
(SMB) Internet service. However, hybrid fiberDSL and very
highbitrate DSL 2 (VDSL2) access technologies are quickly
replacing these deployments. Fixed access NFV addresses the
high costs and bottlenecks often associated with broadband
network access.
Newer access technologies require equipment to be placed in
remote street cabinets or in multioccupancy buildings. These
systems need to be highly energy efficient and need to be as
simple as possible to have a long service life. Virtualization
addresses these issues by moving complex processing to
the head end instead of the remote nodes. Current access
network equipment is usually owned and operated by a
single entity. Virtualization allows multitenant operation
of this infrastructure and enables new business models.
Virtualization of fixed access network elements also enables
synergies from colocation of wireless access assets on a
common NFVI pointofpresence (PoP) or platform.
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
41
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
42
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter8
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
44
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
45
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
46
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
47
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
48
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
49
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
50
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
51
Telco cloud
NFV orchestration
Virtual evolved packet core (vEPC)
Multiservice proxy (MSP)
Virtualized customer premise equipment (vCPE)
Virtualized IP Multimedia Subsystem (IMS)
Transformation Services
NFV deployments are a step in the CSP journey to a cloud
based infrastructure (Telco Cloud). As with any transformation, there are multiple paths to reach the final desired state
and there are multiple aspects to be evaluated.
1. Evaluate your business priorities.
2. Decide on an approach that aligns with the organizations goals.
3. Evaluate all aspects (if possible).
These include
Technology
Application
Organization and processes
4. Adapt, execute, and govern.
HPE offers a comprehensive transformation offering that
covers evaluation of strategic choices and planning, executing,
and lifecycle management of the entire process.
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
52
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
53
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
54
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter9
Things to Consider
WhenTransforming to
an NFVEnabled CSP
Infrastructure
In This Chapter
Looking at financial and business considerations
Identifying technology and architecture considerations
Considering operations and processes
Weighing organizational considerations
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
56
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
57
Organization
Last but not the least is the organizational consideration
when moving to an NFVbased architecture. NFV drives the
CSP infrastructure to be more open, more virtualized, and
more ITcentric. This has profound impact on the competence
required for the personnel who operate and manage this
infrastructure.
The expertise for managing the different parts of the network
in this new architecture may reside in different organizations.
For example, the NFVI layer in the new network architecture
will be highly influenced by the CSPs cloud and datacenter
strategies and the organizations within the CSPs that manage
it, while the competence and expertise for most of the VNF
layers may reside in the network operations team.
One of the key considerations in NFV deployment is to rethink
the best way to design organizations so that the processes
associated with running the new infrastructure are optimized.
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
58
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Glossary
3GPP: See 3rd Generation Partnership Project (3GPP).
3rd Generation Partnership Project (3GPP): The standards
organization for defining the network architecture and network
function specifications for mobile and converged networks.
ABE: See Aggregate Business Entity (ABE).
Access Point Name (APN): The name of a gateway between
a carriers GPRS, 3G, or 4G mobile network and another network, such as the Internet.
Aggregate Business Entity (ABE): A welldefined set of information that characterizes a highly cohesive set of business
entities that are loosely coupled with entities in other ABEs.
Alliance for Telecommunications Industry Solutions (ATIS):
A standards organization that develops technical and operational standards and solutions for the information and communications technology industry.
APN: See Access Point Name (APN).
ATIS: See Alliance for Telecommunications Indusry
Solutions(ATIS).
BRAS: See broadband remote access server (BRAS).
broadband remote access server (BRAS): A device that
routes traffic to and from broadband remote access devices
such as digital subscriber line access multiplexers (DSLAMs)
on an Internet service providers network.
bring your own device (BYOD): A policy in which employees
are permitted to use their personal mobile devices, such as
smartphones and tablets, in the workplace for both work
related and personal business.
BSS: See business support system (BSS).
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
60
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Glossary
61
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
62
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Glossary
63
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
64
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Glossary
65
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
66
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Glossary
67
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
68
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
These materials are 2016 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.