Re: [vnfpool] New VNFPool Charter - for London BoF

LAC Chidung <chidung.lac@orange.com> Tue, 18 February 2014 09:16 UTC

Return-Path: <chidung.lac@orange.com>
X-Original-To: vnfpool@ietfa.amsl.com
Delivered-To: vnfpool@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 11F931A0388 for <vnfpool@ietfa.amsl.com>; Tue, 18 Feb 2014 01:16:49 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.431
X-Spam-Level:
X-Spam-Status: No, score=-1.431 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, HELO_EQ_FR=0.35, HTML_MESSAGE=0.001, RP_MATCHES_RCVD=-0.548, SPF_SOFTFAIL=0.665] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 54ACkrhb1Le8 for <vnfpool@ietfa.amsl.com>; Tue, 18 Feb 2014 01:16:45 -0800 (PST)
Received: from r-mail2.rd.orange.com (r-mail2.rd.orange.com [217.108.152.42]) by ietfa.amsl.com (Postfix) with ESMTP id 747E81A00A6 for <vnfpool@ietf.org>; Tue, 18 Feb 2014 01:16:44 -0800 (PST)
Received: from r-mail2.rd.orange.com (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 9EF2B5D8CB8 for <vnfpool@ietf.org>; Tue, 18 Feb 2014 10:16:40 +0100 (CET)
Received: from ftrdsmtp2.rd.francetelecom.fr (unknown [10.192.128.47]) by r-mail2.rd.orange.com (Postfix) with ESMTP id 8E44E5D8CB7 for <vnfpool@ietf.org>; Tue, 18 Feb 2014 10:16:40 +0100 (CET)
Received: from ftrdmel10.rd.francetelecom.fr ([10.192.128.44]) by ftrdsmtp2.rd.francetelecom.fr with Microsoft SMTPSVC(6.0.3790.4675); Tue, 18 Feb 2014 10:16:41 +0100
Received: from [10.193.115.103] ([10.193.115.103]) by ftrdmel10.rd.francetelecom.fr with Microsoft SMTPSVC(6.0.3790.4675); Tue, 18 Feb 2014 10:16:39 +0100
Message-ID: <530324F4.8010705@orange.com>
Date: Tue, 18 Feb 2014 10:16:36 +0100
From: LAC Chidung <chidung.lac@orange.com>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:24.0) Gecko/20100101 Thunderbird/24.3.0
MIME-Version: 1.0
To: "vnfpool@ietf.org" <vnfpool@ietf.org>
References: <5301D706.2010805@orange.com>
In-Reply-To: <5301D706.2010805@orange.com>
X-Forwarded-Message-Id: <5301D706.2010805@orange.com>
Content-Type: multipart/alternative; boundary="------------020406000203010900090605"
X-OriginalArrivalTime: 18 Feb 2014 09:16:39.0613 (UTC) FILETIME=[217F3ED0:01CF2C8A]
Archived-At: http://mailarchive.ietf.org/arch/msg/vnfpool/pFYvRODwPUFICyYMVDbF7_sx5Cs
Subject: Re: [vnfpool] New VNFPool Charter - for London BoF
X-BeenThere: vnfpool@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Discussion list for virtual network function resource pooling." <vnfpool.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/vnfpool>, <mailto:vnfpool-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/vnfpool/>
List-Post: <mailto:vnfpool@ietf.org>
List-Help: <mailto:vnfpool-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/vnfpool>, <mailto:vnfpool-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Feb 2014 09:16:49 -0000

Sorry for forgetting to include the mailing list's address in my e-mail 
reproduced below.
Chidung

-------- Message original --------
Sujet: 	Re: [vnfpool] New VNFPool Charter - for London BoF
Date : 	Mon, 17 Feb 2014 10:31:50 +0100
De : 	LAC Chidung <chidung.lac@orange.com>
Pour : 	Zongning <zongning@huawei.com>


Hi Ning,
Some comments/suggestions below.
Best,
Chidung

Le 15/02/2014 04:02, Zongning a écrit :
>
> Hi, Folks,
>
> Please see the below new version of VNFPool Charter.
>
> Although the charter will be thoroughly discussed during BoF session, 
> I would encourage all of us to review and start discussion on the list 
> as soon as we could. Early feedback from the community will greatly 
> improve the efficiency and quality of our BoF in London !
>
> =============================================================================================
>
> Network functions such as firewalls, load balancers, and WAN 
> optimizers are conventionally deployed as specialized hardware servers 
> in both network operators' networks and data center networks as the 
> building blocks of the network services. There is a trend to implement 
> such network functions as software instances running on commodity 
> servers, via a virtualization layer (i.e., hypervisors). These 
> virtualized functions are called Virtualized Network Functions (VNFs).
>
> We call a group of VNFs a VNF set. A VNF set can include a single or 
> multiple types of VNF (e.g., virtual firewall, virtual load balancer), 
> where each type of VNF corresponds to a number of VNFs which is also 
> referred to as a VNF pool. A VNF set can be used to build network 
> services. For example, a VNF set can be used as a Service Function 
> Chain (SFC), where the VNFs are sequentially connected (i.e., chained) 
> to build a network service. Generally, a VNF set can be used not only 
> as a SFC, but also merely as a collection of multiple VNFs without 
> specific topological constraint.
>
> *
> CL: What is written above = a VNF set is composed of different VNF 
> pools, e.g., one pool with some (say X) vFWs, one pool with some (say 
> Y) vLBs. We can use this VNF set to realize a SFC. But what seems to 
> be missing is WHY pools of virtual functions ? Actually, to realize a 
> SFC, in the previous example, one vFW and one vLB are enough. I guess 
> the answer is: "We want to build a resilient SFC, i.e., redundancy is 
> needed - pools are thus needed" - if it is the case, we should 
> state/write/say it precisely.
> *
>
> A VNF set and the virtualized functions can introduce additional 
> points of failure beyond those inherent in a single specialized 
> server, and therefore poses additional challenges for the reliability 
> of the provided services. A single VNF would typically not have 
> built-in reliability mechanisms on its host (i.e., commodity server). 
> Instead, there are more factors of risk such as software failure, 
> server overload, and instance scaling and migration that may lead to 
> VNF failures. Existing pooling and other redundancy mechanisms should 
> be investigated and may be applied to address some reliability issues 
> of a single VNF.
>
> *CL:
> (i) How about "**software failure, server overload _due__to_ instance 
> scaling and migration that may lead to VNF failures" ? Actually, in 
> the 'commodity server' framework, software failures already exist - 
> what is new here is scaling and VM migration
> (ii) The use of pooling is mentioned NOW, but it was introduced 
> earlier without justification ... - also, pooling is part of the 
> options to be investigated BUT the use of this technique has already 
> been decided from the start (cf. the name of the "group", i.e., 
> "vnfpool") ...*
>
> However, the complexity of coordinating a growing number of VNFs 
> including stateful and stateless functions, and extending the 
> redundancy within a VNF set (i.e., multiple pools for multiple VNFs) 
> requires further solution development. For example, when a live VNF 
> pool member goes out of service, how do adjacent entities learn which 
> pool member will replace it? How do VNFs learn the states of adjacent 
> VNFs before the failure of an adjacent VNF happens? How are the 
> service states of a VNF held and accessed for efficient 
> synchronization with backup VNFs?
>
> Ideally, the reliability of a VNF set means that the services provided 
> by such a VNF set will continue throughout an interruption within the 
> VNF set, and the outages of one or more VNFs will not be visible to 
> the users of the VNF set. The VNFPool WG focuses on mechanisms 
> supporting the reliability of a VNF set: redundancy within a VNF set, 
> and stateful failover among VNF pool members. Additional mechanisms 
> for reliable VNF set might be included after further gap analysis 
> between identified requirements and existing IETF technologies. The 
> VNFPool WG currently does not work to resolve the service availability 
> issue, although the reliability of VNF set will benefit service 
> availability.
>
> *CL: "after _a_ **further gap analysis between _the_ identified 
> requirements and existing IETF technologies"
>
> *
>
> The overall problem space can be further broken down into the 
> following objectives:
>
> . Signaling between members of a VNF pool, and across different VNF 
> pools for VNF transition (e.g., state change, scaling, moving) 
> notification, and backup advertisement;
>
> . Identification and evaluation of state sharing mechanisms between 
> members of a VNF pool, including distributed shared memory, gossip 
> protocols, pfsync, and state check pointing;
>
> . Exchange of reliability related information between a VNF set and 
> VNF set users, and information between a VNF set and underlying 
> network (e.g., interfacing with ALTO, I2RS);
>
> . Identify and analyze reliable transport characteristics for the 
> aforementioned control plane traffic of VNF pools;
>
> . Analysis of transport security characteristics to provide protection 
> against known threats, and identification of an appropriate trust model;
>
> * CL:
> (i) "**reliability related information**": examples of such info are 
> welcome
> (ii) "trust model_._"*
>
> Initially the VNFPool WG will develop a problem statement, VNF pooling 
> requirements and architecture, use cases, and gap analysis of existing 
> technologies against the architecture and requirements. It is our 
> expectation that we will be able to rely heavily on existing IETF 
> technologies, but that gaps will be found around problems like 
> redundancy mechanisms for a VNF set, state transfer, and 
> trust/security, all of which will need to be considered and addressed. 
> The VNFPool WG will include considerations on the manageability of VNF 
> pools in the requirements and architecture work items. The VNFPool WG 
> will seek re-chartering before adopting any work to develop new, or 
> extend existing, protocols.
>
> Particularly, we will work closely with the SFC WG, as we believe that 
> SFC and VNFPool are independent but complementary. SFC targets on 
> steering packets among VNFs, while VNFPool focuses on the redundancy, 
> e.g., managing active/standby instances, handling failure cases, 
> without caring about how to construct the data path. VNFPool could 
> interact with an SFC control entity to either advertise the status of 
> instance pools, or receive the redundancy requirement from the SFC 
> control entity. VNFPool is not only used in the case of "chained 
> VNFs", but also applicable to other cases where the VNFs are not 
> necessarily sequentially connected.
>
>
> *CL: "**but _is_ also applicable"*
>
> Goals and Milestones:
>
> December 2014 - Submit VNFPool Problem Statement to IESG for 
> publication as Informational
>
> April 2015 - Submit VNFPool Use Cases to IESG for publication as 
> Informational
>
> August 2015 - Submit VNF Pooling Requirements and Architecture 
> including the manageability of VNF pools to IESG for publication as 
> Proposed Standard
>
> August 2015 - Submit Gap Analysis to IESG for publication as Informational
>
> =============================================================================================
>
> Thanks.
>
> Melinda and Ning, as co-chair
>
>
>
> _______________________________________________
> vnfpool mailing list
> vnfpool@ietf.org
> https://www.ietf.org/mailman/listinfo/vnfpool