Re: [vnfpool] New VNFPool Charter - for London BoF
LAC Chidung <chidung.lac@orange.com> Tue, 18 February 2014 09:16 UTC
Return-Path: <chidung.lac@orange.com>
X-Original-To: vnfpool@ietfa.amsl.com
Delivered-To: vnfpool@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com
(Postfix) with ESMTP id 11F931A0388 for <vnfpool@ietfa.amsl.com>;
Tue, 18 Feb 2014 01:16:49 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.431
X-Spam-Level:
X-Spam-Status: No,
score=-1.431 tagged_above=-999 required=5 tests=[BAYES_00=-1.9,
FREEMAIL_FROM=0.001, HELO_EQ_FR=0.35, HTML_MESSAGE=0.001,
RP_MATCHES_RCVD=-0.548, SPF_SOFTFAIL=0.665] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com
[127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 54ACkrhb1Le8 for
<vnfpool@ietfa.amsl.com>; Tue, 18 Feb 2014 01:16:45 -0800 (PST)
Received: from r-mail2.rd.orange.com (r-mail2.rd.orange.com [217.108.152.42])
by ietfa.amsl.com (Postfix) with ESMTP id 747E81A00A6 for <vnfpool@ietf.org>;
Tue, 18 Feb 2014 01:16:44 -0800 (PST)
Received: from r-mail2.rd.orange.com (localhost.localdomain [127.0.0.1]) by
localhost (Postfix) with SMTP id 9EF2B5D8CB8 for <vnfpool@ietf.org>;
Tue, 18 Feb 2014 10:16:40 +0100 (CET)
Received: from ftrdsmtp2.rd.francetelecom.fr (unknown [10.192.128.47]) by
r-mail2.rd.orange.com (Postfix) with ESMTP id 8E44E5D8CB7 for
<vnfpool@ietf.org>; Tue, 18 Feb 2014 10:16:40 +0100 (CET)
Received: from ftrdmel10.rd.francetelecom.fr ([10.192.128.44]) by
ftrdsmtp2.rd.francetelecom.fr with Microsoft SMTPSVC(6.0.3790.4675);
Tue, 18 Feb 2014 10:16:41 +0100
Received: from [10.193.115.103] ([10.193.115.103]) by
ftrdmel10.rd.francetelecom.fr with Microsoft SMTPSVC(6.0.3790.4675);
Tue, 18 Feb 2014 10:16:39 +0100
Message-ID: <530324F4.8010705@orange.com>
Date: Tue, 18 Feb 2014 10:16:36 +0100
From: LAC Chidung <chidung.lac@orange.com>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64;
rv:24.0) Gecko/20100101 Thunderbird/24.3.0
MIME-Version: 1.0
To: "vnfpool@ietf.org" <vnfpool@ietf.org>
References: <5301D706.2010805@orange.com>
In-Reply-To: <5301D706.2010805@orange.com>
X-Forwarded-Message-Id: <5301D706.2010805@orange.com>
Content-Type: multipart/alternative;
boundary="------------020406000203010900090605"
X-OriginalArrivalTime: 18 Feb 2014 09:16:39.0613 (UTC)
FILETIME=[217F3ED0:01CF2C8A]
Archived-At: http://mailarchive.ietf.org/arch/msg/vnfpool/pFYvRODwPUFICyYMVDbF7_sx5Cs
Subject: Re: [vnfpool] New VNFPool Charter - for London BoF
X-BeenThere: vnfpool@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Discussion list for virtual network function resource pooling."
<vnfpool.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/vnfpool>,
<mailto:vnfpool-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/vnfpool/>
List-Post: <mailto:vnfpool@ietf.org>
List-Help: <mailto:vnfpool-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/vnfpool>,
<mailto:vnfpool-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Feb 2014 09:16:49 -0000
Sorry for forgetting to include the mailing list's address in my e-mail reproduced below. Chidung -------- Message original -------- Sujet: Re: [vnfpool] New VNFPool Charter - for London BoF Date : Mon, 17 Feb 2014 10:31:50 +0100 De : LAC Chidung <chidung.lac@orange.com> Pour : Zongning <zongning@huawei.com> Hi Ning, Some comments/suggestions below. Best, Chidung Le 15/02/2014 04:02, Zongning a écrit : > > Hi, Folks, > > Please see the below new version of VNFPool Charter. > > Although the charter will be thoroughly discussed during BoF session, > I would encourage all of us to review and start discussion on the list > as soon as we could. Early feedback from the community will greatly > improve the efficiency and quality of our BoF in London ! > > ============================================================================================= > > Network functions such as firewalls, load balancers, and WAN > optimizers are conventionally deployed as specialized hardware servers > in both network operators' networks and data center networks as the > building blocks of the network services. There is a trend to implement > such network functions as software instances running on commodity > servers, via a virtualization layer (i.e., hypervisors). These > virtualized functions are called Virtualized Network Functions (VNFs). > > We call a group of VNFs a VNF set. A VNF set can include a single or > multiple types of VNF (e.g., virtual firewall, virtual load balancer), > where each type of VNF corresponds to a number of VNFs which is also > referred to as a VNF pool. A VNF set can be used to build network > services. For example, a VNF set can be used as a Service Function > Chain (SFC), where the VNFs are sequentially connected (i.e., chained) > to build a network service. Generally, a VNF set can be used not only > as a SFC, but also merely as a collection of multiple VNFs without > specific topological constraint. > > * > CL: What is written above = a VNF set is composed of different VNF > pools, e.g., one pool with some (say X) vFWs, one pool with some (say > Y) vLBs. We can use this VNF set to realize a SFC. But what seems to > be missing is WHY pools of virtual functions ? Actually, to realize a > SFC, in the previous example, one vFW and one vLB are enough. I guess > the answer is: "We want to build a resilient SFC, i.e., redundancy is > needed - pools are thus needed" - if it is the case, we should > state/write/say it precisely. > * > > A VNF set and the virtualized functions can introduce additional > points of failure beyond those inherent in a single specialized > server, and therefore poses additional challenges for the reliability > of the provided services. A single VNF would typically not have > built-in reliability mechanisms on its host (i.e., commodity server). > Instead, there are more factors of risk such as software failure, > server overload, and instance scaling and migration that may lead to > VNF failures. Existing pooling and other redundancy mechanisms should > be investigated and may be applied to address some reliability issues > of a single VNF. > > *CL: > (i) How about "**software failure, server overload _due__to_ instance > scaling and migration that may lead to VNF failures" ? Actually, in > the 'commodity server' framework, software failures already exist - > what is new here is scaling and VM migration > (ii) The use of pooling is mentioned NOW, but it was introduced > earlier without justification ... - also, pooling is part of the > options to be investigated BUT the use of this technique has already > been decided from the start (cf. the name of the "group", i.e., > "vnfpool") ...* > > However, the complexity of coordinating a growing number of VNFs > including stateful and stateless functions, and extending the > redundancy within a VNF set (i.e., multiple pools for multiple VNFs) > requires further solution development. For example, when a live VNF > pool member goes out of service, how do adjacent entities learn which > pool member will replace it? How do VNFs learn the states of adjacent > VNFs before the failure of an adjacent VNF happens? How are the > service states of a VNF held and accessed for efficient > synchronization with backup VNFs? > > Ideally, the reliability of a VNF set means that the services provided > by such a VNF set will continue throughout an interruption within the > VNF set, and the outages of one or more VNFs will not be visible to > the users of the VNF set. The VNFPool WG focuses on mechanisms > supporting the reliability of a VNF set: redundancy within a VNF set, > and stateful failover among VNF pool members. Additional mechanisms > for reliable VNF set might be included after further gap analysis > between identified requirements and existing IETF technologies. The > VNFPool WG currently does not work to resolve the service availability > issue, although the reliability of VNF set will benefit service > availability. > > *CL: "after _a_ **further gap analysis between _the_ identified > requirements and existing IETF technologies" > > * > > The overall problem space can be further broken down into the > following objectives: > > . Signaling between members of a VNF pool, and across different VNF > pools for VNF transition (e.g., state change, scaling, moving) > notification, and backup advertisement; > > . Identification and evaluation of state sharing mechanisms between > members of a VNF pool, including distributed shared memory, gossip > protocols, pfsync, and state check pointing; > > . Exchange of reliability related information between a VNF set and > VNF set users, and information between a VNF set and underlying > network (e.g., interfacing with ALTO, I2RS); > > . Identify and analyze reliable transport characteristics for the > aforementioned control plane traffic of VNF pools; > > . Analysis of transport security characteristics to provide protection > against known threats, and identification of an appropriate trust model; > > * CL: > (i) "**reliability related information**": examples of such info are > welcome > (ii) "trust model_._"* > > Initially the VNFPool WG will develop a problem statement, VNF pooling > requirements and architecture, use cases, and gap analysis of existing > technologies against the architecture and requirements. It is our > expectation that we will be able to rely heavily on existing IETF > technologies, but that gaps will be found around problems like > redundancy mechanisms for a VNF set, state transfer, and > trust/security, all of which will need to be considered and addressed. > The VNFPool WG will include considerations on the manageability of VNF > pools in the requirements and architecture work items. The VNFPool WG > will seek re-chartering before adopting any work to develop new, or > extend existing, protocols. > > Particularly, we will work closely with the SFC WG, as we believe that > SFC and VNFPool are independent but complementary. SFC targets on > steering packets among VNFs, while VNFPool focuses on the redundancy, > e.g., managing active/standby instances, handling failure cases, > without caring about how to construct the data path. VNFPool could > interact with an SFC control entity to either advertise the status of > instance pools, or receive the redundancy requirement from the SFC > control entity. VNFPool is not only used in the case of "chained > VNFs", but also applicable to other cases where the VNFs are not > necessarily sequentially connected. > > > *CL: "**but _is_ also applicable"* > > Goals and Milestones: > > December 2014 - Submit VNFPool Problem Statement to IESG for > publication as Informational > > April 2015 - Submit VNFPool Use Cases to IESG for publication as > Informational > > August 2015 - Submit VNF Pooling Requirements and Architecture > including the manageability of VNF pools to IESG for publication as > Proposed Standard > > August 2015 - Submit Gap Analysis to IESG for publication as Informational > > ============================================================================================= > > Thanks. > > Melinda and Ning, as co-chair > > > > _______________________________________________ > vnfpool mailing list > vnfpool@ietf.org > https://www.ietf.org/mailman/listinfo/vnfpool