[Nfvrg] NFVRG meeting at IETF 91 -- call for presentations and drafts

ramki Krishnan <ramk@Brocade.com> Wed, 01 October 2014 14:51 UTC

Return-Path: <ramk@Brocade.com>
X-Original-To: nfvrg@ietfa.amsl.com
Delivered-To: nfvrg@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CEDF71ACE2D for <nfvrg@ietfa.amsl.com>; Wed, 1 Oct 2014 07:51:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VDWVAbPmsV4L for <nfvrg@ietfa.amsl.com>; Wed, 1 Oct 2014 07:51:53 -0700 (PDT)
Received: from mx0b-000f0801.pphosted.com (mx0b-000f0801.pphosted.com [IPv6:2620:100:9005:71::1]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9A1B51ACE21 for <Nfvrg@irtf.org>; Wed, 1 Oct 2014 07:51:52 -0700 (PDT)
Received: from pps.filterd (m0000700 [127.0.0.1]) by mx0b-000f0801.pphosted.com (8.14.5/8.14.5) with SMTP id s91EZo3Q005955; Wed, 1 Oct 2014 07:51:47 -0700
Received: from hq1wp-exchub01.corp.brocade.com ([144.49.131.13]) by mx0b-000f0801.pphosted.com with ESMTP id 1prckv0wv1-1 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NOT); Wed, 01 Oct 2014 07:51:46 -0700
Received: from HQ1WP-EXHUB01.corp.brocade.com (10.70.36.14) by HQ1WP-EXCHUB01.corp.brocade.com (10.70.36.99) with Microsoft SMTP Server (TLS) id 14.3.123.3; Wed, 1 Oct 2014 07:51:45 -0700
Received: from HQ1-EXCH01.corp.brocade.com ([fe80::90ed:fc42:a7bb:9406]) by HQ1WP-EXHUB01.corp.brocade.com ([fe80::55ee:533:4b9d:a097%12]) with mapi; Wed, 1 Oct 2014 07:51:42 -0700
From: ramki Krishnan <ramk@Brocade.com>
To: "Nfvrg@irtf.org" <Nfvrg@irtf.org>
Date: Wed, 01 Oct 2014 07:51:43 -0700
Thread-Topic: NFVRG meeting at IETF 91 -- call for presentations and drafts
Thread-Index: Ac/c2lIpyWrD0wXcQomEgfpfcMvPJQArDmowAAAZs/A=
Message-ID: <C7634EB63EFD984A978DFB46EA5174F2C1523BA8AD@HQ1-EXCH01.corp.brocade.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_C7634EB63EFD984A978DFB46EA5174F2C1523BA8ADHQ1EXCH01corp_"
MIME-Version: 1.0
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:5.12.52, 1.0.28, 0.0.0000 definitions=2014-10-01_06:2014-10-01,2014-10-01,1970-01-01 signatures=0
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 spamscore=0 suspectscore=0 phishscore=0 adultscore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=7.0.1-1402240000 definitions=main-1410010147
Archived-At: http://mailarchive.ietf.org/arch/msg/nfvrg/HYxQRoSlBFkgnHvBp4ZNEdJ0OaI
Cc: "DIEGO LOPEZ GARCIA (diego.r.lopez@telefonica.com)" <diego.r.lopez@telefonica.com>, "'dilikris@in.ibm.com'" <dilikris@in.ibm.com>
Subject: [Nfvrg] NFVRG meeting at IETF 91 -- call for presentations and drafts
X-BeenThere: nfvrg@irtf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Network Function Virtualization Research Group \(NFVRG\) discussion list" <nfvrg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/nfvrg>, <mailto:nfvrg-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/nfvrg/>
List-Post: <mailto:nfvrg@irtf.org>
List-Help: <mailto:nfvrg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/nfvrg>, <mailto:nfvrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Wed, 01 Oct 2014 14:51:56 -0000

Dear All,

The proposed Network Functions Virtualization Research Group (NFVRG) will hold its next meeting in conjunction with IETF 91,  November 9-14 in Honolulu, Hawaii. The NFVRG Program Committee is now
seeking proposals for presentations and drafts for the IETF 91 agenda, details are below.

For presentations please contact Ram (Ramki) Krishnan (Brocade - ​ramk@brocade.com<mailto:ramk@brocade.com>), Dilip Krishnaswamy (IBM Research - ​dilikris@in.ibm.com<mailto:dilikris@in.ibm.com>), Diego Lopez (Telefonica - ​diego.r.lopez@telefonica.com<mailto:diego.r.lopez@telefonica.com>)
For drafts, please post them to the NFVRG mailing list ​(nfvrg@irtf.org<mailto:nfvrg@irtf.org>). An exemplary NFVRG draft is -- http://tools.ietf.org/html/draft-krishnan-nfvrg-open-nfv-virality-00.
Call for Presentations -- Areas of Interest (from http://trac.tools.ietf.org/group/irtf/trac/wiki/nfvrg)
• Network and service function chaining: architecture and implementation (e.g. automation of service chain building)
• Autonomous service orchestration and optimization
• New operational aspects of network and service virtualization, as well as new operational models required by virtualization
• Infrastructure and service function description and programming (languages, APIs, frameworks for combined processing, network and storage programming)
• Virtualized network economics and business modeling
• Security, trust and service verification
• Real-time big data analytics and data-centric management of virtualized infrastructure
• New application domains enabled by virtualized infrastructure and services
• System wide optimization of compute, storage, network and energy efficiency
• Explore infrastructure and service abstractions enabled by virtualization
• Autonomic and real-time orchestration enabled by network function virtualization
Call for Drafts -- Based on Near Term Charter (from http://trac.tools.ietf.org/group/irtf/trac/wiki/nfvrg)
For each of the near term charter areas mentioned below, the goal is to explore system architecture and optimization with open interfaces across components and explore research through simulations and/or real-world implementations.
Policy based Resource Management: NFV DCs are often constrained in compute and storage capacity. Since practically all NFV DCs are foreseen to be distributed, inter-DC network capacity is also a constraint. Additionally, energy is also a constraint, both as a general concern for NFV operators, and for specific-purpose NFV DCs such as those in mobile base stations, enterprise branch offices that often have power limitations. Hence, optimized resource management and workload distribution based on policy is a relevant area to focus on.
Analytics for Visibility and Orchestration: Network functions should be supportable on general purpose commodity hardware. Real-time analytics providing insight into various components such as compute (e.g. dynamic CPU utilization), storage (e.g. dynamic capacity usage), network (e.g. dynamic bandwidth utilization), energy (e.g. dynamic power consumption) is key to not only providing visibility into the NFV infrastructure but also optimizing resource usage for the purposes of orchestration. This is a relevant area to focus on.
Virtual Network Function (VNF) Performance Modelling to facilitate transition to NFV: While migrating from hardware network appliances, which are typically custom and monolithic, to virtualized software appliances running on commodity hardware a challenge which is often faced is to come up with an equivalence model especially in terms of performance. This is a relevant area to focus on.
Security and Service Verification: NFV configuration is expected to be dynamic especially in the edge NFV DCs where capacity is limited; a very good example is handling a viral event such as mobile gaming application. While autonomic networking techniques could be used to automate the configuration process including modular updates, it is important to take into account that incomplete and/or inconsistent configuration may lead to security issues. Additionally, events such as distributed denial of service (DDoS) attacks could be an additional source of compromise with additional implications due to the dependency of NFV on a distributed infrastructure. Finally, elasticity of VNFs entails dynamic scale up/down/out with awareness of the resiliency considerations, completely different with the approach of monolithic implementations. Security issues and relevant solutions related to the elastic nature of VNFs is a potential area to consider.
Thanks,
Ramki (on behalf of the co-chairs)