0% found this document useful (0 votes)
23 views51 pages

20 Introduction To SDN and NFV

The document provides an overview of Software Defined Networking (SDN) and Network Functions Virtualization (NFV), highlighting their importance in the transformation of the network industry. It outlines the objectives of a course designed to educate engineers on SDN and NFV, including understanding their development, principles, and Huawei's solutions. Additionally, it discusses the evolution of network architecture, the challenges faced by typical networks, and the essential requirements and benefits of SDN.

Uploaded by

Rwakas JB Bosco
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views51 pages

20 Introduction To SDN and NFV

The document provides an overview of Software Defined Networking (SDN) and Network Functions Virtualization (NFV), highlighting their importance in the transformation of the network industry. It outlines the objectives of a course designed to educate engineers on SDN and NFV, including understanding their development, principles, and Huawei's solutions. Additionally, it discusses the evolution of network architecture, the challenges faced by typical networks, and the essential requirements and benefits of SDN.

Uploaded by

Rwakas JB Bosco
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 51

SDN and NFV Overview

age 2 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Forewor
d

The open ecosystem of the computing industry brings booming development
of multiple fields, such as Commercial Off-the-Shelf (COTS), operating
system, virtualization, middleware, cloud computing, and software
applications. The network industry is also seeking transformation and
development. Software Defined Networking (SDN) and Network Functions
Virtualization (NFV) are mainly used.

This course aims to help engineers understand the development of SDN and
NFV and introduce Huawei SDN and NFV solutions.

age 3 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Objective
s

Upon completion of this course, you will be able to:
▫ Describe the development of SDN and NFV.

▫ Understand basic principles of OpenFlow.

▫ Understand Huawei SDN solution.

▫ Understand the standard NFV architecture.

▫ Understand Huawei NFV solution.

age 4 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Content
s
1. SDN Overview
2. NFV Overview

age 5 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Evolution of the Computer Era
Mainframe PC (compatible)

App

Dedicated Open interface


application
Windows Mac
(OS)
or Linux or OS
Dedicated OS

Dedicated Open interface


hardware
Microprocessorr

Vertical integration and closed interfaces Horizontal integration and open interfaces
Small-scale industry applications Large-scale application across industries

age 6 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Network Industry Development:
Implications from the IT Industry

The transformation of the IT industry has triggered the thinking of the network industry. The industry has
proposed the SDN concept and has made attempts to put SDN into commercial use, aiming to make
networks more open, flexible, and simple.
Computing Industry Openness Promotes Ecosystem What About Network Industry
Development Changes

Cloud service Comprehensive


ECS EVS cloud services
Database
Various
Middleware virtualization …

technologies,
OS operating systems,
FusionSphere Network application
middleware,
Virtualization database software, …

etc. SDN controller


Server, Storage array PC…
Hardware network
storage x86/ARM server
device
device, PC …

Universal • Does the network industry build a


hardware Memory Hard … hierarchical and open ecosystem
x86/ARM chip disk according to the computing
industry?
age 7 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Current Situation of the Network
Industry: Typical IP Network -

Distributed Network
The typical IP network is a distributed network with peer-to-peer control. Each network device has
independent forwarding, control, and management planes. The control plane of a network device
exchanges packets of a routing protocol to generate an independent data plane to guide packet
 forwarding.
The advantage of a typical IP network is that network devices
Control Management
are decoupled from protocols, devices from different vendors plane plane

are compatible with each other, and network convergence is Forwarding plane

ensured in fault scenarios. Router-A

Forwarding table,

Configuration commands
Management plane
protocol, and algorithm

Control plane

Unknown Forwarding Control Management Control Management


data frame behavior plane plane plane plane

Data forwarding Forwarding plane Forwarding plane

Forwarding plane Router-B Router-C

Receive frames
Send frames

age 8 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Thinking in the Network Field:
Problems Faced by Typical Networks

Frequent network Complex network


congestion technologies

?
Difficult O&M Slow service deployment

age 9 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Frequent
Complex Difficult Slow Service
Network
Technologies O&M Deployment
Congestion

Frequent Network Congestion


Problem and Solution of Bandwidth-based Problem and Solution of Tunnel Establishment Based on
Route Selection Fixed Sequence
Tunnels are established in sequence: 1. A-E; 2. A-G; 3. C-H. Tunnel
A B 3 fails to be established due to insufficient bandwidth.
1G/5G 2 3
B C D
2G/10G

C A F G H E
6G/5G 1
Used bandwidth/Total D E Global path calculation and optimal tunnel path adjustment:
bandwidth

The network computes forwarding paths based on


2
bandwidth. The link from router C to router D is the B C D
shortest forwarding path. The volume of service
traffic from router C to router D exceeds the 3
bandwidth, causing packet loss. Although other links
A 1 F G H E
are idle, the algorithm still selects the shortest path
for forwarding. The optimal traffic forwarding path is
C-A-D.
age 10 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Complex
Frequent Network Difficult Slow Service
Technologie
Congestion O&M Deployment
s

Complex Network Technologies


Many network protocols: Network Difficult network configuration: To be
technology experts need to learn many RFCs familiar with devices of a specific vendor, you
related to network devices. Understanding the need to master tens of thousands of
RFCs takes a long time, and the number of commands. Additionally, the number of
RFCs is still increasing. commands is still increasing.
RFC increase trends
10
242 00
212 205 185 0

152 129
124 150
79

005 006 007 008 009 010 011 012 013


2 2 2 2 2 2 2 2 2

age 11 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Frequent Network Complex Difficult Slow Service
Congestion Technologies O&M Deployment

Difficulty in Locating and Analyzing


Network Faults
Difficult to Spot Faults Difficult to Locate Faults

Manual packet Abnormal flows account for 3.65% of all flows on the
Manual fault Manual fault
obtaining for
identification
locating faults
diagnosis network.

The network
faults that are
found upon user
complaints are
just the tip of
the iceberg.

• Traditional O&M networks rely on manual fault • Traditional O&M only monitors device indicators.
identification, location, and diagnosis. Some indicators are normal, but user experience is
• More than 85% of network faults are found only poor. There is no correlated analysis of users and
after service complaints. Problems cannot be networks.
proactively identified or analyzed. • According to data center network (DCN) statistics, it
takes 76 minutes to locate a fault on average.

age 12 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Slow
Frequent Network Complex Difficult
Service
Congestion Technologies O&M
Deployment

Slow Network Service Deployment


Network policy
Complex and inflexible network policy changes:
Network policies cannot be defined by user. Policy
Acces Bandwid changes are complex and cannot be flexibly adjusted.
QoS Other
s th …
policy policies IP address-based, fixed
policy policy
location, and CLI-based
configuration

Service network
Long service deployment period:
New service deployment involves E2E device
VN for configuration modification.
VN for office VN for video
scientific
purposes surveillance
research End-to-end configuration
using commands

Physical
network Low physical network deployment efficiency:
The physical network does not support zero touch
provisioning (ZTP).

Command line-based
configuration by device

age 13 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
SDN Origin

SDN was developed by the Clean Slate Program at Stanford University as an innovative new network
architecture. The core of SDN is to separate the control plane from the data plane of network devices to
implement centralized control of the network control plane and provide good support for network
application innovation.

SDN has three characteristics in initial phase: forwarding-control separation, centralized control, and open
programmable interfaces. SDN application

The control plane functions are


provided by the controller.
Control
OpenFlow controller
plane
Control
plane OpenFlow
OpenFlow interconnection
Forwarding
plane
Forwardin
g plane
OpenFlow switches
OpenFlow switches have only the data plane.

age 14 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Basic Concepts of OpenFlow

OpenFlow is an SBI protocol between a controller and a switch. It defines three types of
messages: Controller-to-Switch, Asynchronous, and Symmetric. Each message contains more
subtypes. Controller-to-Switch
OpenFlow Controller
This message is sent by the controller. It is used to
manage and query switch information.

Asynchronous

OpenFlow This message is initiated by a switch. When the status


of the switch changes, the switch sends this message
to notify the controller of the status change.

Symmetric
This message can be initiated by a switch or controller.
Symmetric messages include Hello, Echo, and Error
OpenFlow switches messages.

age 15 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Flow Table Overview

OpenFlow switches forward packets based on flow tables.

Each flow entry includes the Match Fields, Priority, Counters, Instructions, Timeouts, Cookie,
and Flags. The Match Fields and Instructions are key fields for packet forwarding.
▫ The Match Fields is a field against which a packet is matched and can be customized.

▫ The Instructions field indicates OpenFlow processing when a packet matches a flow entry.

Match Counter Instruction Timeout


Priority Cookie Flags
Fields s s s

Flow table fields can be customized.


The following table is an example.
Ingress Ether Ether Ether VLAN TCP TCP
VLAN ID IP Src IP Dst
Port Source Dst Type Priority Src Port Dst Port
3 MAC1 MAC2 0x8100 10 7 IP1 IP2 5321 8080

age 17 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Comparison Between Forwarding
Modes
Typical Routing Protocol: OpenFlow:
Packet Forwarding Based on Routing Tables Packet Forwarding Based on Flow Tables
OpenFlow controller
Routing protocol
10.0.0.0/30 10.0.0.0/30
1.1.1.1 1.1.1.2

G0/0/1
Flow table
matching
process:
Table 0 Table 1 … Table N
Routing Destination Protoc Outbound
Next Hop
table Network ol Interface
Flow Match Priorit Instruction Timeout
Counters Cookie
10.0.0.0/30 OSPF 1.1.1.2 G0/0/1 table Fields y s s

• In typical cases, network devices query routing tables • OpenFlow is a network protocol. Switches running
to guide traffic forwarding. OpenFlow forward traffic based on flow tables.
• Entries in a routing table are calculated by running a • Flow tables are calculated by the OpenFlow controller and
routing protocol between network devices. then delivered to switches.
• The length of the routing table is fixed. Network • A flow table has variable length and defines various
devices forward packets based on the longest match matching and forwarding rules. A network device has
rule. A network device has only one routing table. multiple flow tables.

age 18 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Essential Requirements of SDN

The essence of SDN is to make networks more open, flexible, and simple. It builds a
centralized brain for a network and implements fast service deployment, traffic optimization,
or network service openness through centralized control in the global view.

SDN has the following benefits:
▫ Provides centralized management, simplifying network management and O&M.

▫ Shields technical differences, simplifies network configuration, and reduces O&M costs.

▫ Offers automatic optimization, improving network utilization.

▫ Deploys services rapidly, shortening the service rollout time.

▫ Builds an open network, supporting open and programmable third-party applications.

SDN transforms network architecture.

age 19 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
SDN Network Architecture

The SDN network architecture consists of the orchestration application layer, controller layer, and device
layer. Different layers are connected through open interfaces. From the perspective of the controller layer,
SBIs oriented to the device layer and NBIs oriented to the orchestration application layer are
distinguished. OpenFlow is one of SBI protocols.
Service
Orchestration application layer App collaborati
on

NBI

Service
Controller layer orchestrati
on
SBI

Device layer Data


forwarding

age 20 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Huawei SDN Network Architecture

Huawei SDN network architecture supports various SBIs and NBIs, including OpenFlow, OVSDB, NETCONF,
PCEP, RESTful, SNMP, BGP, JSON-RPC, and RESTCONF interfaces.
Network
Cloud
Application EMS Orchestration Apps
platfor
s m
NBI plane RESTful SNMP MTOSI/CORBA Kafka/SFTP RESTCONF

Open NBI

Open SBI
PCEP NETCONF OpenFlow BGP-LS OVSDB SNMP BGP Json-RPC
Telemetry
Interface Interface Interface Interface Interface Interface Interface Interface

Forwarding Security
AP Switch CPE Router VNF
device gateway

age 21 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Huawei SDN Solution - Integrating
Management, Control, and Analysis to Build an
Intent-Driven Network
Application Cloud Self- Mobile Third-party …
layer platfor help app app
m portal

Network
manageme
nt and
control Manager Controller Analyzer
layer

AP AP
DC Fabric

Campus Campus
CPE CPE
Network
WAN/DCI WAN/DCI
layer

DC Fabric

Branch SD-WAN
CPE Branch
CPE

age 22 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Introduction to iMaster NCE

Huawei iMaster NCE is the industry intelligent network automation platform that integrates
management, control, analysis, and AI capabilities.
SDN-based automatic service Unified data base Full lifecycle management
configuration/deployment Detection, location, and Simulation verification and
AI-based intelligent analysis, troubleshooting monitoring optimization
prediction, and troubleshooting Planning +
Automation + Manager + Controller + Construction +
Intelligence Analyzer Maintenance +
Optimization

2 3 4

Autonomous Driving
NMS Controller Analyzer Network System

Network
=

age 23 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
iMaster NCE Application

DC iMaster NCE-Fabric *

Enterprise
iMaster NCE-Campus *
campus

SD-WAN iMaster NCE-WAN

IP WAN iMaster NCE-IP

WAN
transmissi iMaster NCE-T
on

* iMaster NCE-Fabric and iMaster


NCE-Campus are introduced in this
document.

age 24 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Enterprise
DC
Campus

Huawei CloudFabric DCN Autonomous


Driving Network Solution

Based on iMaster NCE-Fabric, DCNs provide full-lifecycle services from planning, construction, O&M, to
optimization.
Service Intent/Strategy
Integrated planning and construction:
• The planning tool interconnects with iMaster NCE-Fabric to
Simplification elements
implement integrated planning and construction.
• Zero Touch Provisioning (ZTP)

Analyzer
Simplified deployment
• Service intent self-understanding and conversion
+AI • Network change simulation and evaluation, eliminating human
Controller Manager errors

Intelligent O&M:
• Rapid fault detection and location based on knowledge graph and
expert experience
• Fast fault rectification based on expert experiences and simulation
Telemetry & ERSPAN analysis
NETCONF & SNMP
Real-time optimization:
• AI-Fabric-oriented local traffic inference and online model training
and optimization
VM VM VM
VM VM VM
• User behavior prediction and resource optimization suggestions
VM VM VM

age 25 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Enterprise
DC
Campus

Simplified ZTP Deployment

Network administrator ZTP deployment process:


1. The network administrator clicks the icon on iMaster NCE to
1
start the ZTP task.

2. A device automatically obtains an IP address to access


5
iMaster NCE.

3. iMaster NCE determines the device role (spine or leaf


2 3 4 node), delivers configurations such as the management IP
address, SNMP configuration, and NETCONF configuration
to online devices, and manages the devices through the
Spine
management IP address.

4. iMaster NCE globally delivers interconnection


VXLAN configurations as well as OSPF or BGP configurations.

5. The device goes online successfully, and the administrator


Leaf
views network-wide information on iMaster NCE.

Note: The DC uses the spine-leaf architecture.


age 26 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Enterprise
DC
Campus

Network Intent Self-understanding


and Fast Service Deployment
Network Configuration Service
design delivery verification
2 to 3 10 minutes 1 to 2
days days

iMaster NCE-Fabric
Verification result
analysis
Intent Simulation Network
Network design
conversion verification configuration

Work order
Built-in model:
Intent model  ACL deployment
10
 Network provisioning
minutes

Huawei iMaster NCE-Fabric supports automatic and fast deployment of virtualization, cloud
computing, and container networks.
age 27 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Enterprise
DC
Campus

Network Change Simulation and


Change Risk Prediction

Configuration to
be changed
Resource
sufficiency
Live network
configuration Access
Live network
connectivity
topology information
Impact on
Network Formal verification original
Live network
modeling algorithm
resource information services

Data Modeling and Verification


collection/upload • Computing
Establish physical, logical, and • result
Check whether resources on the live
application network models. network are sufficient and whether the
• Use the formal verification network is connected.
algorithm for computing. • Analyze and display the impact of
changes on original services.

age 28 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Enterprise
DC
Campus

AI-powered Intelligent O&M for DCNs


Collection Analysis Decision

Intelligent analysis engine


Knowledge BGP OSPF
flapping Interface
flapping
Huawei's 30+ inference flapping

years of O&M engine IS-IS


expert Router ID
flapping BFD
flapping
Manual
conflict
experience rectification
Exception
detection Intent-
Continuous
learning and Root cause based loop
training analysis closing
Knowledge Knowledge Knowledg Knowledg
based on real site e e

faults Risk prediction


Recommended
Model application emergency plan:
DC holographic • Port isolation
data
Service flow
Data cleaning
AI exception Network object • Configuration
data/Telemetry data identification modeling rollback
• Capacity expansion
recommendation

age 29 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Enterprise
DC
Campus

Huawei CloudCampus Autonomous


Driving Network Solution
Fast network deployment, improving deployment efficiency by
Analyzer One-stop
600%
management
platform • Device plug-and-play: simplified device deployment, scenario
navigation, and template-based configuration
Manager Controller
• Simplified network deployment: Network resource pooling, multi-
purpose network, and automatic service provisioning
Design Deployment Policy

Fast service provisioning, improving user experience by 100%


• Free mobility: GUI-based policy configuration, allowing users to
access the network anytime and anywhere without changing the
NETCONF/YANG roaming permission and user experience
Large- or Small- or
medium-sized medium-sized • Intelligent terminal identification: Anti-spoofing for terminal access,
campus Campus campus with an intelligent terminal identification accuracy of over 95%
interconnection
• Intelligent HQoS: Application-based scheduling and shaping, and
refined bandwidth management, ensuring service experience of key
VN for office purposes users
WAN/
Internet Fast intelligent O&M, improving network performance by over 50%
VN for R&D
• Real-time experience visualization: Telemetry-based network
experience visualization at each moment, for each user, and in each
area
VN for • Precise fault analysis: Proactively identifying 85% of typical network
office
Security Security Security issues and providing suggestions, and comparing and analyzing real-
group 1 group 2 group 3 • Access control
services time data to predict faults
policy • Intelligent network optimization: Predictive optimization of wireless
VN for R&D Security Security • Bandwidth networks based on historical data, improving network-wide
services group 4 group 5
performance by over 50% (Source: Tolly Certification)
• Priority

age 30 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Enterprise
DC
Campus

Device Plug-and-Play
Deployment by Scanning Bar Deployment Through the
DHCP-based Deployment
Codes Registration Query Center

1 1 1 2
Registration
query center

4 4 3 5
3 4

DHCP server
3

2 2

1. Pre-configuration
1. Pre-configuration
1. Pre-configuration 2. Information synchronization
2. Obtaining registration information through
2. Deployment by scanning bar codes 3. Obtaining registration information through
the DHCP server
3. Automatic device registration and login the registration query center
3. Automatic device registration and login
4. Automatic configuration delivery 4. Automatic device registration and login
4. Automatic configuration delivery
5. Automatic configuration delivery

age 31 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Free Mobility:
Enterprise
DC
Campus

Policy Management Based on Security


Groups

Free mobility: Enables users to have consistent network rights and security policies regardless
of their locations and IP addresses.
Security group
1 Use security groups. A security
Security group Security group
for server group is a group of users for which
for sales users for R&D users
resources the same security policy is used.

2 Define security group-based permission


Right policy Experience policy
control policies and user experience
Deliver security policies
policies and deliver the policies to
network devices.
3 A security group is authorized to a user
after the user passes access
Campus authentication.
network After user traffic enters a network,
4
network devices enforce policies based
on the source and destination security
Access Access Access groups of the traffic.
authentication authentication authentication
User A User B User C

age 32 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Enterprise
DC
Campus

Wired and Wireless Convergence


WLAN Construction Mode 1: Standalone AC WLAN Construction Mode 2: AC Card
• This mode poses a
wireless traffic bottleneck
and increases faulty AC Card
Independent nodes. • An AC card is installed on a
AC switch to provide AC
• Wired and wireless
management is functions.
independent. • Hardware-level convergence.
• Wired and wireless
authentication points are
separated.
Wired and wireless authentication point separation, distributed policy control, separation of control and data traffic forwarding, and
troubleshooting and management difficulties.

Wired and Wireless Convergence (Native AC)

Native
The switch integrates the AC function, eliminating wireless traffic forwarding bottlenecks and
AC reducing fault nodes. Wired and wireless devices are centrally managed.
• Unified management and converged forwarding of wired and wireless services
• Converged management for wired and wireless users and gateway convergence
• Converged authentication points for wired and wireless access
• Unified wired and wireless policy execution

age 33 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Enterprise
DC
campus

Intelligent Terminal Identification,


Ensuring Secure Access
Requirements
Huawei supports
and identification of 1000+ office
Challenges or IoT terminals.
A university
Built-in
terminal
50+ types of smart terminals fingerprint
library
Terminal information is
collected by IT
departments of >>
colleges:
MAC address collection
is difficult and error- >
An enterprise
prone.
>
100+ authentication
faults reported per day Terminal-type-based Terminal-type-based Terminal-type-based

It is difficult to locate Automatic authentication Automatic Spoofing detection


Printer authorization IP phone and PC
access spoofing. • MAC address authentication, • Report a terminal spoofing
Camera
without entering any MAC • Is automatically added to alarm.
address the video surveillance
group.
• Is configured as the VIP
age 34 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved. user.
Enterprise
DC
campus

HQoS: User- and Application-based QoS


Policy
ser- and application-based QoS policies ensure experience of high-priority users and applicatio
Requirements
and Challenges 1

Traditional QoS 1. Define VIP users and


common users, and
policies are
application priorities.
invalid for video 3 2. Schedule users and
services. application queues based
on priorities of users and
(Example) Building >

Co us
2 applications.

m ers
surveillance >

m
3. Support native AC or

on
scenario: independent AC
Wireless video deployment.

...
services of common

...
users increase,
us V I P
1
er

occupying a large
number of network
resources and VIP Common
causing network user Camer users
Video Mobile phone and
congestion. s a surveillance tablet

age 35 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Enterprise
DC
campus

AI-Powered Intelligent O&M of Campus


Networks
As-Is: Device-Centered Network To-Be: User Experience-Centered AI-Powered
Management Intelligent O&M

Intelligent network analyzer


NMS • Visualized user experience
Traditional • Topology management
NMS management • User journey playback
• Performance Telemetry • Potential fault identification
SNMP management Second-level • Root cause identification
Minute-level network • Predictive network
• Alarm management network data
optimization
data collection • Configuration collection
management

Experience visualization: Telemetry-based second-level data collection,


visualized experience of each user and each application in real time
• Device-centric O&M method: User experience Minute-level potential fault identification and root cause
cannot be detected. location
• Fault-triggered responses: Potential faults cannot • Identify potential faults based on dynamic baselines and big data
be identified. correlation analysis.
• Accurately locate root causes of faults through KPI association analysis
• Rely on professional engineers to locate faults
and protocol tracing.
onsite.
Predictive network optimization: AI is used to intelligently analyze
the AP load trend and implement predictive optimization on the wireless
The efficiency is improved by using algorithms. With network. continuous learning and expert experience,
scenario-based
intelligent O&M frees O&M personnel from complex alarms and noises, making O&M more automated and intelligent.

age 36 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Enterprise
DC
campus

AI-Powered Intelligent Radio


Calibration
Traditional radio
Tested and verified by
calibration cannot AI-powered authoritative organizations
achieve intelligent radio
expected results
Phase 1: Manual Calibration calibration Average downlink rate per terminal:
Based on engineers' experience,
the calibration is time-consuming 198 Mbit/s
58%
and error-prone, and the 125 Mbit/s
calibration result is unstable.

Radio calibration Real-time and


simulation historical data
> collection Before radioAfter AI-powered
calibration smart radio
> Smart radio
calibration
Calibration calibration and Counter
Phase 2: Automatic closed-loop Average Wi-Fi channel interference
Calibration
Calibration based on real-time 5.5%
Single-user performance
radio interference does not 49%
consider device load changes, Number of users 2.8%

Objects
Power adjustment
Optimal channel

and the calibration result cannot


bandwidth
Frequency
selection

selection

Channel usage
be ensured. Time
Signal interference ratio
Channel/Frequency Before After AI-powered
bandwidth/Power radio smart radio
calibration calibration

age 37 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Content
s
1. SDN Overview
2. NFV Overview

age 38 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
NFV Background: Thinking from IT
Industry Transformation

The IT industry transformation brings thinking on network architecture and device
architecture in the network industry. The network architecture layer involves the SDN
controller and the device architecture layer involves the device deployment mode.
IT Industry Transformation
• In recent years, IT technologies such as Network
virtualization and cloud computing have been ?
booming, and applications deployed on hardware
have been gradually migrated to the cloud.
Applications are deployed on private clouds, public
clouds, or hybrid clouds as software. • Thinking about the network industry: Can
App App
network applications be deployed in a software-
OS OS based manner?
App
Virtualizatio • In the context, Network Functions Virtualization
n/ VM VM
Cloudificatio
(NFV) is introduced.
OS n

age 39 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Origin of NFV

In October 2012, 13 top carriers (including AT&T, Verizon, VDF, DT, T-Mobile, BT, and
Telefonica) released the first version of NFV White Paper at the SDN and OpenFlow World
Congress. In addition, the Industry Specification Group (ISG) was founded to promote the
definition of network virtualization requirements and the formulation of the system
architecture.

In 2013, the ETSI NFV ISG conducted the first phase of research and completed the
formulation of related standards. The ETSI NFV ISG defined NFV requirements and
architecture and sorts out the standardization processes of different interfaces.

age 40 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
NFV Value

NFV aims to address issues such as complex deployment and O&M and service
innovation difficulties due to large numbers of telecom network hardware devices.
NFV brings the following benefits to carriers while reconstructing telecom networks:
▫ Shortened service rollout time

▫ Reduced network construction cost

▫ Improved network O&M efficiency

▫ Open ecosystem

age 41 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Key NFV Technologies: Virtualization

Virtualization is the foundation of NFV, and cloudification is the key.

On traditional telecom networks, each NE is implemented by dedicated hardware, resulting in high costs
and difficult O&M. Virtualization features partition, isolation, encapsulation, and independence from
hardware, which can meet NFV requirements. Carriers use virtualization to run software-based NEs on
universal infrastructures. Partition Isolation

Multiple VMs can concurrently VMs that run on the same server
run on a single physical server. are isolated from each other.

Encapsulation Hardware independence

All data of a VM is saved in files. A VMs can run on any servers without
VM can be moved and replicated by any modifications.
moving and replicating the files.

age 42 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Key NFV Technology: Cloudification

As defined by the National Institute of Standards and Technology (NIST), cloud computing is a model that
allows users to obtain resources (for example, networks, servers, storage devices, applications, services)
in a shared compute resource pool based on their needs anytime, anywhere. This model enables fast
resource provisioning and release, and minimizes the resource management workload and interactions
with service providers.

Cloud computing has many advantages. Cloudification of network functions on carriers' networks mainly
Characteristics of Cloud Computing
uses resource pooling and rapid elastic scaling.
1 On-demand self-service 2 Broad network access 3 Resource pooling 4 Rapid elasticity 5 Measured service

Buy

age 43 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Introduction to the NFV Architecture

The NFV architecture includes the network functions virtualization infrastructure (NFVI), a virtualized
network function (VNF), and management and orchestration (MANO). In addition, the NFV architecture
needs to support the existing business support system (BSS) or operations support system (OSS).

OSS/BSS: is an existing operation/O&M support


system.

MANO:
VNF: uses cloud resources to construct software
Provides functions
NEs.
such as service
orchestration,
service
management, and
NFVI: provides cloud-based resource pools. resource
management.

age 44 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Standard NFV Architecture

ETSI defines the standard NFV architecture, which consists of the NFVI, VNF, and MANO. The NFVI includes
the universal hardware layer and virtualization layer. The VNF is implemented using software, and the
MANO implements management and orchestration of an NFV architecture.
NFV Management and Orchestration

MANO
Os-Ma
OSS/BSS NFV
Orchestrator

VNF Or-Vnfm
EM 1 EM 2 EM 3 Ve-Vnfm Service, VNF, and
VNF Infrastructure
VNF 1 VNF 2 VNF 3 Manager(s)
Description
Vn-Nf
NFV Vi-Vnfm
I Virtualization Layer
Virtual Virtual Virtual Nf-Vi Virtualized
Computing Network Or-Vi
Storage Infrastructure
Vi-Ha Manager(s)
Hardware
Computing Storage Network

Execution reference point Other reference point Main NFV reference points

age 45 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Functional Modules of the NFV
Architecture

Main functional modules defined in the standard NFV architecture:

OSS or Management system for a service provider. It is not a functional component in the NFV architecture, but the
BSS MANO must provide an interface for interoperation with the OSS or BSS.

MANO NFV management and orchestration. The MANO includes the VIM, VNFM, and NFVO, and provides unified
management and orchestration for VNFs and the NFVI.
• VIM: NFVI management module that runs on an infrastructure site. The VIM provides functions such as
resource discovery, virtual resource management and allocation, and fault handling.
• VNFM: It controls the VNF lifecycle (including instantiation, configuration, and shutdown).
• NFVO: It orchestrates and manages all the software resources and network services on an NFV network.

VNF VNFs refer to VMs as well as service NEs and network function software deployed on the VMs.

NFVI NFV infrastructure, including required hardware and software. The NFVI provides a running environment
for VNFs.
• Hardware layer: includes hardware devices that provide compute, network, and storage resources.
• Virtualization layer: abstracts hardware resources to form virtual resources, such as virtual compute,
storage, and network resources. The virtualization function is implemented by Hypervisor [1].

age 46 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
NFV Architecture Interfaces

Main interfaces of the standard NFV architecture:
Interface Description
Is used between the virtualization layer and hardware layer. The virtualization layer meets basic hardware
Vi-Ha compatibility requirements.
Is used between a VM and the NFVI. It ensures that VMs can be deployed on the NFVI to meet performance,
Vn-Nf reliability, and scalability requirements. The NFVI meets VMs' OS compatibility requirements.

Is used between the virtualization layer management software and NFVI. It provides management of virtual
Nf-Vi computing, storage, and network systems of NFVI, virtual infrastructure configuration and connections, as well as
system usage, performance monitoring, and fault management.

Is used between the VNFM and a VNF, implementing VNF lifecycle management, VNF configuration, VNF
Ve-Vnfm performance, and fault management.

OS-Ma Manages lifecycles of network services and VNFs.

Is used for interaction between the service application management system or service orchestration system and
Vi-Vnfm virtualization layer management software.
Sends configuration information to the VNFM, configures the VNFM, and connects the orchestrator and VNFM. It
Or-Vnfm exchanges information with the NFVI resources allocated to VNFs and information between VNFs.

Is used to send resource reservation and resource allocation requests required by the orchestrator and exchange
Or-Vi virtual hardware resource configurations and status information.

age 47 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Huawei's NFV Solution

In the Huawei NFV architecture, functions of the virtualization layer and VIM are implemented by the
HUAWEI CLOUD Stack NFVI platform. HUAWEI CLOUD Stack can virtualize compute, storage, and network
resources and centrally manage, monitor, and optimize physical virtualization resources.

Huawei provides cloud-based solutions for carriers' wireless networks, bearer networks, transport
networks, access networks, and core networks.
VNF MANO
Cloud CloudOpera
CloudBB CloudEdg CloudCor 5G Core
DSL/OLT NFVO
e e
VNFM
NFVI
HUAWEI CLOUD Stack
FusionSphere
FusionCompute FusionStorage FusionNetwork OpenStack + OM

Hardware
Computing Storage Network

age 48 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
FAQ

Q1: What is the relationship between SDN and NFV in the industry?

A: Both SDN and NFV involve network transformation and the NFV concept was
proposed at the SDN and OpenFlow World Congress. However, they are independent
of each other. SDN mainly affects the network architecture, and NFV mainly affects
the NE deployment mode.


Q2: What is the relationship between SDN and NFV in Huawei solutions?

A: Huawei provides different solutions for SDN and NFV, but they are associated.
Huawei NFVI solution is provided by HUAWEI CLOUD Stack.

age 49 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Quiz
1. (Multiple) Which of the following statements about Huawei SDN solution are true?
( )
A. The solution supports various SBI protocols, such as RESTful, NETCONF, and OVSDB.

B. OpenFlow can be used as the SBI protocol.

C. The solution integrates management, control, and analysis to build a simplified network.

D. The solution provides open and programmable network interfaces to support third-party
application development and system interconnection.

2. Please briefly describe the benefits of NFV.

age 50 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Summar
y

With the transformation and development of the network industry, SDN and
NFV are proposed.

SDN is an innovation of network architecture. It uses a controller to make
networks more open, flexible, and simple.

NFV is an innovation in the deployment of telecom network devices. Based
on virtualization and cloud computing, NFV helps reconstruct telecom
networks.

age 51 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
More Information

For more information about OpenFlow, visit https://www.opennetworking.org/
.

For more information about Huawei SDN solution, see the HCIP course.

age 52 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Thank You
www.huawei.com

age 53 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.

You might also like