Network Working Group                                             L. Xia
Internet-Draft                                                     Q. Wu
Intended status: Standards Track                                  Huawei
Expires: April 24, 2014                                          D. King
                                                    Lancaster University
                                                               H. Yokota
                                                                KDDI Lab
                                                        October 21, 2013


  Use cases and Requirements for Virtual Service Node Pool Management
                draft-xia-vsnpool-management-use-case-01

Abstract

   Network edge appliances such as subscriber termination, firewalls,
   tunnel switching, intrusion detection, and routing are currently
   provided using dedicated network function hardware.  As network
   function is migrated from dedicated hardware platforms into a
   virtualized environment, a set of use cases with application specific
   requirements begin to emerge.  These use cases and requirements cover
   a broad range of capability and objectives, which will require
   detailed investigation and documentation in order to identify
   relevant architecture, protocol and procedure solutions.

   This document provides an analysis of the key management requirements
   for applications that may be hosted within a virtualized environment.
   These engineering requirements are based on a variety of uses cases
   and goals , which include: virtual application security, reliability,
   scalability, performance, operation and automation.

   Note that this document is not intended to provide or recommend
   protocol solutions.

Status of this Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at http://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."



Xia, et al.              Expires April 24, 2014                 [Page 1]


Internet-Draft                   VSNPool                    October 2013


   This Internet-Draft will expire on April 24, 2014.

Copyright Notice

   Copyright (c) 2013 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.



































Xia, et al.              Expires April 24, 2014                 [Page 2]


Internet-Draft                   VSNPool                    October 2013


Table of Contents

   1.  Introduction . . . . . . . . . . . . . . . . . . . . . . . . .  4
   2.  Terminology  . . . . . . . . . . . . . . . . . . . . . . . . .  6
   3.  Virtual Service Node (VSN) Overview  . . . . . . . . . . . . .  7
     3.1.  Reliability of VSN, VServer, VSNP  . . . . . . . . . . . .  8
     3.2.  Reliability of Network Connectivity  . . . . . . . . . . .  9
   4.  Use Cases  . . . . . . . . . . . . . . . . . . . . . . . . . . 10
     4.1.  Virtualized Mobile Core Network and Service Systems  . . . 10
     4.2.  Resilience for Stateful Service  . . . . . . . . . . . . . 11
     4.3.  Auto Scale of Virtual Network Function Instances . . . . . 12
     4.4.  Reliable Network Connectivity between Network Nodes  . . . 14
     4.5.  Existing Operating Virtual Network Function Instance
           Replacement  . . . . . . . . . . . . . . . . . . . . . . . 15
     4.6.  Reliable vCDN  . . . . . . . . . . . . . . . . . . . . . . 16
     4.7.  VSN Cluster  . . . . . . . . . . . . . . . . . . . . . . . 16
     4.8.  VSN Resilience Classes . . . . . . . . . . . . . . . . . . 18
     4.9.  Reliable Traffic Steering  . . . . . . . . . . . . . . . . 18
   5.  IANA Considerations  . . . . . . . . . . . . . . . . . . . . . 21
   6.  Security Considerations  . . . . . . . . . . . . . . . . . . . 22
   7.  References . . . . . . . . . . . . . . . . . . . . . . . . . . 23
     7.1.  Normative References . . . . . . . . . . . . . . . . . . . 23
     7.2.  Informative References . . . . . . . . . . . . . . . . . . 23
   Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 24



























Xia, et al.              Expires April 24, 2014                 [Page 3]


Internet-Draft                   VSNPool                    October 2013


1.  Introduction

   Network virtualization technologies are finding increasing support
   among network and Data Center (DC) operators.  This is due to
   demonstrable capital cost reduction and operational energy savings,
   simplification of service management, potential for increased network
   and service resiliency, and service and traffic elasticity.

   Within traditional DC networks, varied middleware boxes including FW
   (Fire Wall), NAT (Network Address Translation), LB (Load Balancers),
   WoC (Wan Optimization Controller), etc., are being used to provide
   network applications (services), traffic control and optimization.
   Each function is an essential part of the entire operator and DC
   network, and overall service chain (required traffic path for users)
   Combined these functions and capabilities can be termed as service
   nodes.

   In terms of virtualizing network functions, a significant amount of
   service nodes and function instances within the service nodes can be
   migrated into virtualized environments, in essence the middleware
   capability is implemented in software on commodity hardware using
   well defined industry standard servers.  Thus allowing the creation,
   scaling, migration, modification, and deletion of single or groups of
   functions, across few or many service nodes.

   These virtual service nodes may be location independent, i.e., they
   may exist across distributed or centralized DC hardware.  This
   architecture will pose new issues and great challenges to the
   automated provisioning across the DC network, while maintaining high
   availability, fault-tolerant, load balancing, and plethora of other
   requirements some of which are technology and policy based.

   Today, architecture and protocol mechanisms exist for the management
   and operation of server hardware supporting applications, these
   hardware resources are known as server node pools, which may be
   accessed by other servers and clients.  These server node pools have
   a well-established set of requirements related to management,
   availability, scalability and performance.  Within this document we
   refer to virtualization of server node pools as Virtual Service Node
   Pool (VSNP).

   [VNF-PS] provides an overview of the problem space related to service
   node reliability.  This document provides an analysis of the key
   applications that may be hosted within a virtualized environment.
   These engineering requirements are based on a variety of objectives
   related to virtual application security, reliability, scalability,
   performance, operation and automation.




Xia, et al.              Expires April 24, 2014                 [Page 4]


Internet-Draft                   VSNPool                    October 2013


   This document is not intended to provide or recommend solutions.  The
   intention of this document is to present an agreed set of objectives
   and use cases for VSNPs, identify requirements and present
   architecture framing.















































Xia, et al.              Expires April 24, 2014                 [Page 5]


Internet-Draft                   VSNPool                    October 2013


2.  Terminology

   Broadband Network Gateway (BNG):  IP Edge Route where bandwidth and
      QoS policies may be applied, to support multi-service delivery
      [TR-101].

   Call Session Control Function (CSCF):  A function that is used to
      manage the mobile IP Multimedia Subsystem (IMS) signaling from
      users to services and network gateways.

   Hypervisor:  Software running on a server that allows multiple VMs to
      run on the same physical server.  The hypervisor manages and
      provide network connectivity to Virtual machines [NVO3-FWK].

   IP Multimedia Subsystem (IMS):  The IP Multimedia Subsystem used
      within mobile core networks.

   Network Functions Virtualization (NFV):  Moving network function from
      dedicated hardware platforms onto industry standard high volume
      servers, switches and storage.

   Residential Gateway (RGW):  A device located in the home network
      performing gateway function.

   Set-top Box (STB):  This device contains audio and video decoders and
      is intended to connects to a variety of home user devices media
      servers and televisions.

   Virtual Machine (VM):  Software abstraction of underlying hardware.

   Virtualized Server (VServer):  A virtualized server runs a hypervisor
      supporting one or more VMs [NVO3-FWK].

   Virtualized Service Node (VSN):  A virtualized network function
      instance implemented in software on Virtualized Server.

   Virtual Service Node Pool (VSNP):  Virtualized Server resources
      supporting a variety of network functions..













Xia, et al.              Expires April 24, 2014                 [Page 6]


Internet-Draft                   VSNPool                    October 2013


3.  Virtual Service Node (VSN) Overview

   Shifting towards virtualization of hardware function presents a
   number of challenges and requirements, this document focuses on those
   related to network function availability and reliability.  In large
   DC environments, a Virtual Service Node (VSN) may need to deal with
   traffic from millions of hosts.  This represents a significant
   scaling challenge for VSN operation.

                       +----------------------+
                       |                      |
                       |  network application |
                       |                      |
                       +---------/-\----------+
                               //   \\
                             //       \\
                            /           \\
         +-------------+  //              \\  +-------------+
         |    VSNP     |//                  \\|    VSNP     |
         |  manager    +----------------------+   manager   |
         |             |                      |             |
         +---/-\-------+                      +-----/-\-----+
            /   \                                  /   \
           /     \                                /     \
          /       \                             /        \
        -/-----                              ------------ \
      //           \\                   //---            ---\\
    // +--+-+ +----+\\              ///                      \\\
   /   |vSN1| |vSN2|  \           //                            \\
  |    +----+ +----+   |        //                                \\
  |    +----+ ------+  |       /+----+ +----+   +----- +----+  +----\
 |     |VM1 | | VM2 |   |     | |vSN3| |vSN4|   |vSN5| |vSN6|  |vSN7||
 |     +----+ +-----+   |    |  +----+ +----+   +----+ +----+  +----+ |
 |     +------------+   |    |  +------------+  +-------------------+ |
  |    |            |  |    |   |    VM3     |  |        VM4        |  |
  |    |   vServer1 |  |    |   +------------+  +-------------------+  |
   \   |            | /      |  +------------+  +-------------------+ |
    \\ |------------//       |  |            |  |                   | |
      \\- VSNP    -//          | |   vServer2 |  |      vServer3     |
         --------              \|            |  |                   /
                                \\-----------+  +-----------------//+
                                  \\                            //
                                    \\\      VSNP             ///
                                       \\---            ---//
                                            ------------






Xia, et al.              Expires April 24, 2014                 [Page 7]


Internet-Draft                   VSNPool                    October 2013


                  Figure 1: Overall Architecture of VSNP

   As shown in Figure 1, the overall architecture of VSNP includes VS,
   VSN, VSNP, VSNP manager and the connectivity between any two VSs, and
   the connectivity between VSN and VSNP manager.  Rserpool [RFC5351]
   has the similar architecture to provide high-availability and load
   balancing, However Rserpool are only used to manage physical servers
   and can not deal with virtualized function instance when it was
   designed.

   Note that VSNP and VSNP manager also can be used to manage
   traditional service node.

3.1.  Reliability of VSN, VServer, VSNP

   The VSN, VServer and VSNP components are implemented in different
   network layers and should be considered as different hardware or
   logical elements.

   Multiple VSNs can be provided on one or more VServers for increased
   reliability.  If a VServer detects the failure of the VSNs, it should
   take the appropriate action for failover and ensures the service
   continuity.

   In order to manage server virtualization across a set of VServers and
   provide fault tolerant and load sharing across VServers, the VSNPs
   may be initiated and established as logical element(e.g., a set of
   VSN providing the same service type), facilitating the migration of a
   large number of VSNs running on different hypervisors and belonging
   to different VServers to register into and deregister out.  In case
   of VSN failure or VServer overloading, such VSNPs can be used to
   support both traditional and virtualized service node replacement or
   service node adding.  However when VSNPs is used to support the
   operation of traditional service nodes, this doesn't scale very well.

   Considering the reliability requirements, VSNP architecture should
   support several key points detailed below:

   o  Application resource monitoring and health checking;

   o  Automatic detection of application failure;

   o  Failover to another VServer or VSNP;

   o  Transparency to other VSNs, VServers or VSNPs;

   o  Isolation and reporting of failures;




Xia, et al.              Expires April 24, 2014                 [Page 8]


Internet-Draft                   VSNPool                    October 2013


   o  Replication of state for active/standby network functions.

3.2.  Reliability of Network Connectivity

   The other category of reliability requirements concerns the network
   connectivity between any two VSNs,or any two VSNP managers and the
   network connectivity between VSN and VSN manager.

   The connectivity between VSNs is used to deliver service through a
   set of VSNs to meet the service requirements.

   The connectivity between VSNP manager and VSN is used by the VSNP
   manager to provide registry service to the VSN belonging to different
   VServer and provide failover of the VSN.  A set of VSNP managers can
   be configured to provide reliable registration.  When one VSN cannot
   obtain a register response from one VSNP manager, it can go to
   another VSNP manager for registration.  This connectivity can also be
   used by VSNP to monitor the work status of VSNs periodically.

   The connectivity between VSNP managers is used to maintain
   synchronization of data between VSNs located in different VSNP.  This
   allows every VSNP to acquire and maintain overall information of all
   VSNs and provide protection for each other.

   For all types of network connectivity discussed previously, the key
   key reliability requirements stay consistant and include:

   o  Automatic detection of link failure;

   o  Failover to another usable link;

   o  Automated routing recovery.



















Xia, et al.              Expires April 24, 2014                 [Page 9]


Internet-Draft                   VSNPool                    October 2013


4.  Use Cases

4.1.  Virtualized Mobile Core Network and Service Systems

   A key use case for NFV is the virtualization of key mobile core
   network functions.  The ETSI NFV use case [NFV-ISG-UC] describes
   requirements for server and packet gateways (S/P-GW) used for Packet
   Data Network (PDN) connections and IMS session (see Figure 2:
   Virtualized mobile core network and IMS).  These services are
   typically time dependent and may require a large number of computing
   resources in proportion to the number of users and/or service
   requests.  Therefore it is desirable to scale them according to their
   specific computing requirements.  The virtualization can be applied
   to the Evolved Packet Core (EPC) and the IMS to provide end to end
   service with service availability and resilience.  When those
   virtualized service nodes(e.g., virtualized S/P-GW and IMS functions)
   are failed or overloaded, dynamic relocation of those VSNs can be
   performed, the relocation of the managed sessions and/or connections
   must be accordingly managed.  It also should be noted in [NFV-REL-
   REQ]that the traffic in the original VSN must be routed to the new
   location and it is desirable that the movement of the VSN is
   transparent to other VSN and or physical network entities such as
   client application on the UE.  That is to say the other VSNs don't
   require to take any special action to this movement.

      +----------------+   +---------------------------------+
      | vEPC           |   |    vIMS                         |
      |                |   |                                 |
      |  +---------+   |   |                 +----------+    |
      |  |         |   |   |                 |          |    |
      |  | vP/SGW  +---+-+-|              +--+ vS-CSCF  |    |
      |  |         |   | | |              |  |          |    |
      |  +---------+   | | | +--------+   |  +----------+    |
      |Overload/Failure| |-+-|        +---| Overload/Failure |
      |                |   | | P-CSCF |                      |
      |                | ++++|        +++++                  |
      |  +---------+   | + | +--------+   +  +----------+    |
      |  |         |   | + |              +  |          |    |
      |  | vP/SGW  +++++++ |              +++| vS-CSCF  |    |
      |  |         |   |   |                 |          |    |
      |  +---------+   |   |                 +----------+    |
      |                |   |                                 |
      |  PDN Connection|   |      IMS Session                |
      +----------------+   +---------------------------------+

             Figure 2: Virtualized Mobile Core Network and IMS

   In this use case, the following requirements need to be satisfied:



Xia, et al.              Expires April 24, 2014                [Page 10]


Internet-Draft                   VSNPool                    October 2013


   o  Resource scaling - elastic service aware resource allocation to
      network functions;

   o  State maintenance - network and network function state management
      during VSN relocation, replication, and resource scaling;

   o  Monitoring/fault detection/diagnosis/recovery - appropriate
      mechanism for monitoring/fault detection/diagnosis/recovery of all
      components and their states after virtualization, e.g.  VNF,
      hardware, hypervisor;

   o  Service Availability - achieving the same level of service
      availability for the end-to-end virtualized mobile core network as
      in non-virtualized networks with reduced cost;

   o  Minimum impact on other relevant functions.

   [More detailed description needs to be discussed.]

4.2.  Resilience for Stateful Service

   In the service continuity use case provided by the European
   Telecommunications Standards Institute (ETSI) Network Function
   Virtualization (NFV) Industry Specification Group (ISG) [NFV-REL-REQ]
   , which describes virtual middlebox appliances providing layer-3 to
   layer-7 services may require maintaining stateful information, e.g.,
   stateful vFW.  In case of hardware failure or processing overload of
   VSN, in addition to the replacement of VSN, it is necessary to move
   its key status information to new VSN for service continuity.  See
   Figure 3 (Resilience for Stateful Service) for clarification.

   In case of multiple vFws on one VM and not enough resources are
   available at the time of failure, two strategies can be taken: one is
   to move as many vFws as possible to a new place according to the
   available resources, and the other is to suspend one or more running
   VSNs in the new place and move all vFws on the failed hardware to it.















Xia, et al.              Expires April 24, 2014                [Page 11]


Internet-Draft                   VSNPool                    October 2013


                   MAC, IP, VLAN,
                   Session id, Sequence No, ...
          +-----------------+-----------------+
          |     *************************************
          |     *           |     |Limited    |     *        |
          |     *           |     |Resource   |     * Suspend|
          |     *           |     V           |     *        V
       +--+-+ +-*--+     +--V-+ +----+     +--V-+ +-V--+  +----+
       |vFw1| |vFw1|     |vFw1| |vFw2|     |vFw1| |vFw1|  |vFw3|
       +----+ +----+     +----+ +----+     +----+ +----+  +----+
       +------------+    +------------+    +-------------------+
       |    VM      |    |    VM      |    |        VM         |
       +------------+    +------------+    +-------------------+
       +------------+    +------------+    +-------------------+
     /-\            |    |            |    |                   |
    |  ||  vServer  |    |   vServer  |    |      vServer      |
     \-/            |    |            |    |                   |
       +------------+    +------------+    +-------------------+
    Hardware
    Failure

                 Figure 3: Resilience for Stateful Service

   In both scenarios, the following requirements need to be satisfied:

   o  Supporting status information maintaining;

   o  Supporting status information moving;

   o  Supporting VSN moving from one VM to another VM;

   o  Supporting partial VSNs moving;

   o  Seamless switching user traffic to alternative VMs and VSNs.

4.3.  Auto Scale of Virtual Network Function Instances

   Adjusting resource to achieve dynamic scaling of VMs described in the
   ETSI [NFV-INF-UC] use case and [NFV-REL-REQ].  As shown in Figure 4,
   if more service requests come to a VSN than one physical node can
   accommodate, processing overload occurs.  In this case, the movement
   of the VSN to another physical node with the same resource
   constraints will create a similar overload situation.  A more
   desirable approach is to replicate the VSN and distribute service
   node instances ones to one or more new VSNs and at the same time
   distribute the incoming requests to those nodes.

   In a scenario where a particular VSN requires increased resource



Xia, et al.              Expires April 24, 2014                [Page 12]


Internet-Draft                   VSNPool                    October 2013


   allocation to improve overall application performance, the network
   function might be distributed across multiple VMs.  To guarantee
   performance improvement, the hypervisor dynamically adjusts (scaling
   up or scaling down) resources to each VSNs in line with the current
   or predicted performance needs.

                            +--------------+
    +-------------------+   |              |
    |                   |   |Management and|
    |                   <===>Orchestration |
    |    +---------+    |   |    Entity    |
    |    |   #1    |    |   +--------------+
    |  --| vIPS/IDS|--  |           /\
    |  | +---------+ |  |           ||         +---------+
    |  |             |--|--         ||      <--|End User1|
    |  |    VM #1    |  | |         ||         +---------+
    |  +-------------+  | |    +----\/---+
    |                   | |    |         |     +---------+
    |    +---------+    | |    |         |  <--|End User2|
    |    |   #2    |    | |    |         |     +---------+
    |  --| vIPS/IDS|--  | |    |         |
    |  | +---------+ |  | |    |         |     +---------+
    |  |             ---|------- Service |  <--|End User3|
    |  |    VM #2    |  | |    | Router  |     +---------+
    |  +-------------+  | |    |         |     +---------+
    |                   | |    |         |  <--|End User4|
    |    +---------+    | |    |         |     +---------+
    |    |   #3    |    | |    |         |     +---------+
    |  --| vIPS/IDS|--  | |    |         |  <--|End User5|
    |  | +---------+ |  | |    +---------+     +---------+
    |  |             ---|--                        :
    |  |    VM #3    |  |
    |  +-------------+  |                          :
    |                   |
    +-------------------+

       Figure 4: Auto Scaling of Virtual network Function Instances

   In this case, the following requirements need to be satisfied:

   o  Monitoring/fault detection/diagnosis/recovery - appropriate
      mechanism for monitoring/fault detection/diagnosis/recovery of all
      components and their states after virtualization, e.g.  VNF,
      hardware, hypervisor;

   o  Resource scaling - elastic service aware resource allocation to
      network functions.




Xia, et al.              Expires April 24, 2014                [Page 13]


Internet-Draft                   VSNPool                    October 2013


4.4.  Reliable Network Connectivity between Network Nodes

   In the reliable network connectivity between network nodes use case
   provided by ETSI [NFV-INF-UC], the management and orchestration
   entities must be informed of changes in network connectivity
   resources between network nodes.  For example, Some network
   connectivity resources may be temporarily put in power savings mode
   when resources are not in use.  This change is not desirable since it
   may have great impact on reachability and topology.  Another example,
   some network connectivity resource may be temporarily in a fault
   state and comes back into an active state, however some other network
   connectivity resource becomes permanent in a fault state and is not
   available for use.

       +-----------+
       |Ochestrator|
       +-----------+

                         Web
            vDPI       vCache      vFW         vNATPT

          +--------+ +--------+  +--------+ +--------+
          | +----+ | | +----+ |  | +-++-+ | | +----+ |
     |------|    ------|    -------| || | ----|    |<-----
     |    | |    | | | |    | |  | | || | | | |    | |   |
     |    | +----+ | | +----+ |  | +-++-+ | | +----+ |   |
     |    |        | |        |  |        | |        |   |
   +----+ |        | | +----+ |  | +-++-+ | |        |   V| ,--,--,--.
   |    | |        | | |    | |  | | || | | |        |  ,-'          `-.
   |    |<->---------- |    |----- | || |-----------<-->    Internet   )
   |    | |        | | +----+ |  | +-++-+ | |        |  `-.          ,-'
   +-|--+ |        | |        |  |        | |        |   A `--'--'--'
     |    | +----+ | |        |  | +-++-+ | | +----+ |   |
     |    | |    ------------------| || ------|    |<----|
     --------    | | |        |  | | || | | | |    | |
          | +----+ | |        |  | +-++-+ | | +----+ |
          +--------+ +--------+  +--------+ +--------+

                  Figure 5: Reliable Network connectivity

   In this case, the following requirements need to be satisfied:

   o  Quick detection of link failures;

   o  Adding network node instances, compute node instances and/or
      hypervisor instances;





Xia, et al.              Expires April 24, 2014                [Page 14]


Internet-Draft                   VSNPool                    October 2013


   o  Removing network node instances, compute node instances and/or
      hypervisor instances;

   o  Adding or removing network links between nodes.

4.5.  Existing Operating Virtual Network Function Instance Replacement

   In the Replacement of existing operating VNF instance use case
   provided by ETSI [NFV-INF-UC] use case, the Management and
   Orchestration entity may be configured to support virtualized network
   function replacement.  For example, the Network Service Provider has
   a virtual firewall that is operating.  When the operating vFW
   overloads or fails, the Management and Orchestration entity
   determines that this vFW instance needs to be replaced by another vFW
   instance.

                              Direct flow to new    |   |
             +------------+        vFW              |   |
             |Orchestrator|---------------|         |   |
             +-|---------|+               |       +-V---V+
               |         |                --------|,--,--|/
    Create and launch    | Report Statist    ,-'  +------+`-.
        new vFW          | (Traffic,CPU     (               ')
               |         |   Failure..)      `-. +-------+,-'
               |         |                      `|  APP  |
      +--------|---+  +--|---------+             | Server|
      |Host2       |  |Host1       |             +-------+
      |            |  |            |
      | +---++---+ |  | +---++---+ |
      | |vFW||vFW| |  | |vFW||vFW| |
      | +---++---+ |  | +---++---+ |
      | +---++---+ |  | +---++---+ |
      | |vFW||vFW| |  | |vFW||vFW| |
      | +---++---+ |  | +---++---+ |
      +------------+  +------------+

                    Figure 6: Existing vFW replacement

   In this case, the following requirements need to be satisfied:

   o  Verifying if capacity is available for a new instance of the VSN
      at some location;

   o  Instantiating the new instance of VSN at the location;

   o  Transferring the traffic input and output connections from the old
      instance to the new instance.  This may require transfer of state
      between the instances, and reconfiguration of redundancy



Xia, et al.              Expires April 24, 2014                [Page 15]


Internet-Draft                   VSNPool                    October 2013


      mechanisms;

   o  Pausing or deleting the old VSN instance.

4.6.  Reliable vCDN

   Virtualization of CDNs in the ETSI [NFV-ISG-UC] use case described
   the CDN controller (a centralized component such as Global Load-
   Balancer(GLB)) selects a Cache Node(CN), or a pool of CNs, to
   redirect the proper CN which will deliver user request's content.
   The CDN Controller and CNs may be virtualized so that the resources
   for the vCDN can be scaled up and down according to the volume of
   user requests.  Then, content placed closer to the user is delivered
   for providing cost-effective resource utilization and network
   bandwidth savings.

   In this case, the following requirements need to be satisfied:

   o  Resource scaling (elastic virtual CN allocation according to the
      number of requests, proximity, etc);

   o  Acceleration of network I/O (I/O centric application needs to
      overcome the network I/O degradation on the virtualized
      environment);

   o  Performance monitoring (vCDN should be monitored in terms of the
      number of sessions, load balancing, storage usage, network
      throughput, etc);

   o  Interoperating 3rd party DC infra (3rd party DC infra can be
      utilized to enhance vCDN coverage globally and to reduce infra
      cost for delivering the short-term international event);

   o  Flexibility to fulfill specific storage density requirements, e.g.
      to cache a large catalog of popular content;

   o  Ability of cache nodes to comply with main monitoring and
      reporting requirements (e.g., SNMP, syslog, etc. so that operator
      shall be able to manage different types of cache node for a
      Delivery Service).

   [More description is needed.]

4.7.  VSN Cluster

   VSN cluster is a set of VSNs which assemble together to support load
   balancing and high availability.  It tends to be a common case in
   virtual networks for the following reasons:



Xia, et al.              Expires April 24, 2014                [Page 16]


Internet-Draft                   VSNPool                    October 2013


   o  The performance of VSN is usually not as good as the appliances on
      dedicated hardware (e.g., physical FW, LB, etc) for VSN is
      realized mainly depending on software, not on dedicated hardware.
      VSN cluster should be supported to achieve the same performance as
      hardware appliance;

   o  New requirements of network virtualization as well as multi-tenant
      support result in a large number of virtual DC network and a large
      amount of traffic going through them.  VSN cluster can be a good
      choice to deal with this challenge.

   There may be multiple different types of VSN clusters in one network.
   A large number of VSNs dispersed in the network brings difficulty to
   connect part of them and assemble them as an integrated network
   function.  Also, there should be a flexible load balancing policy
   between all VSNs in one cluster to achieve good performance.  At
   last, synchronization of status information between lots of VSNs in
   one or more clusters is more complicated than before and needs more
   consideration.

                              ---------------
                     /--------               --------\
                /////    +----------+       +----------+\\\
            ////         |+---++---+|       |+---++---+|   \\\\
         ///             ||vFw||vFw||       ||vLB||vLB||       \\\
       //                |+---++---+|       |+---++---+|          \\
      |                 /||vFw||vFw||       ||vLB||vLB||            |
    ||                // |+---++---+|       |+---++---+|             ||
   |                //   +----------+       +--/-------+               |
   |              //                         //                        |
  |         +----/------+            +------/------+                   |
  |         |           |            |             |                   |
 -+---------+   SBR     +----...-----+    SBR      +--------...        |
   |        |           |            |             |                   |
    |       +-----------+            +-------------+                  |
     |                                                               |
      |                                                             |
       \\                                                         //
         \\\                                                   ///
            \\\\                                           ////
                \\\\\                                 /////
                     \--------               --------/
                              ---------------

                          Figure 10: VSNs cluster

   As shown in Figure 10, two VSNs clusters are in network, each one
   consists of 4 VSNs to provide the FW and LB function in a tenant



Xia, et al.              Expires April 24, 2014                [Page 17]


Internet-Draft                   VSNPool                    October 2013


   network.  The service border routers connecting to them distribute
   different flows to each VSN for load balancing.

   In this case, the following requirements must be satisfied:

   o  Supporting the integration of all connecting VSNs in one cluster
      to provide one network function for services;

   o  Improving performance by providing flexible load balancing policy
      between VSNs in one cluster;

   o  Supporting the synchronization of status information between lots
      of VSNs in one or more clusters while minimizing the complication
      and impaction of signaling traffic.

4.8.  VSN Resilience Classes

   Different end-to-end services(e.g., Web, Video, financial backend,
   etc) have different classes of resilience requirement for the VNFs.
   The use of class-based resiliency to achieve service resiliency SLAs,
   without "building to peak" is critical for operators.

   VSN resilience classes can be specified by some attributes and
   metrics as followed:

   o  Does VSN need status synchronization;

   o  Fault Detection and Restoration Time Objective (e.g., real-time,
      near-real time, non-realtime) and metrics;

   o  Service availability metrics;

   o  Service Quality metrics;

   o  Service reliability;

   o  Service Latency metrics for components.

   [More description is needed.]

4.9.  Reliable Traffic Steering

   The characteristics shared by aggregation and mobile-backhaul
   networks, include a large number of nodes, middlebox appliances and
   applications providing layer-3 to layer-7 services.  Connections are
   relatively static tunnel, that provide traffic multiplexing for many
   flows (see Figure 11: Reliable Traffic Steering).  These networks are
   also known for their stringent requirements with regard to



Xia, et al.              Expires April 24, 2014                [Page 18]


Internet-Draft                   VSNPool                    October 2013


   reliability and short recovery times.  The virtualization of the
   aggregation network will provide optimization of resource allocation
   and improved traffic forwarding.

   Within the aforementioned networks subscriber traffic may be steered
   through more than one appliances or bypass some appliances
   completely.  For example, traffic may pass through virtualized DPI
   and FW functions, However, once the type of the flow has been
   determined by the virtualized DPI function, the operator may decide
   to modify the services applied to it.  For example, if the flow is an
   internet video stream, it may no longer need to pass the FW service,
   reducing traffic load on it.  Furthermore, in order to reduce traffic
   load on some appliances or isolate fault on some appliances, after
   the service type has been detected, the subsequent packets of the
   same flow may no longer need to pass the LB service either; hence the
   path of the flow can be updated.

                           --,--.,--,--,--.--,--.
                        ,-'                      `-.
                    ,                              -
          Home     (     -------                  | |  -
        Enviroment (   +-|--+ +-|-++----++----+ +----+  )
      +-----------+(   |vDPI| |vLB||vFW1||vNAT| |vFW2|  )
      |           |(   +----+ +---++----++----+ +----+  )
      |  +----+   |(     \      |                /  /   )
      |  |STB |\  |(      \     |               /  /    )
      |  +----+  \|--`       \  /       /-------/  /    )
      |           |(  \    +---+ ,--,+---+_._ _ _ /    -)
      |  +----+   |(   --- |   |----'|SBR|-- .          )
      |  |PC  |++++++++++++|SBR|     +---+  |')         )
      |  +----+   |(------ |   |+        +---+          )
      |  +----+  /|(       +---+ ++++'++'|   |-------   )
      |  |iPad|/  |(                     |SBR|          )
      |  +----+   |(                     |   |++++++-   )
      |           |(                     +---+          )
      +-----------+ .                                   )
                     `-  SBR-Service Border Router   ,-'
                       `-.  --,--.,--,--,--.--,- ,

                   Figure 11: Reliable traffic steering

   In this case, the following requirements need to be satisfied:

   o  Dynamic steering traffic through a set of virtual service nodes
      with each providing the same or different service [BBF-FSC-UC];

   o  Dynamic changes to the data path for a given traffic session/flow
      [BBF-FSC-UC];



Xia, et al.              Expires April 24, 2014                [Page 19]


Internet-Draft                   VSNPool                    October 2013


   o  Virtualization transparency to services - services using a network
      function need not know whether it's a virtual function or a non-
      virtualized;

   o  Virtualization transparency to network control and management -
      network control and management plane need not be aware whether a
      function is virtualized or not;

   o  Traffic control mechanism - data and management traffic
      identification/separation for non-virtualized and virtualized
      mobile core networks.








































Xia, et al.              Expires April 24, 2014                [Page 20]


Internet-Draft                   VSNPool                    October 2013


5.  IANA Considerations

   This document has no actions for IANA.
















































Xia, et al.              Expires April 24, 2014                [Page 21]


Internet-Draft                   VSNPool                    October 2013


6.  Security Considerations

   TBD.
















































Xia, et al.              Expires April 24, 2014                [Page 22]


Internet-Draft                   VSNPool                    October 2013


7.  References

7.1.  Normative References

   [BBF-FSC-UC]
              Broadband Forum, "Flexible Service Chaining", 2013.

   [NFV-INF-UC]
              "Network Functions Virtualisation Infrastructure
              Architecture Part 2: Use Cases", ISG INF Use Case,
              June 2013.

   [NFV-ISG-UC]
              "Network Function Virtualisation; Use Cases;", ISG NFV Use
              Case, June 2013.

   [RFC5351]  Lei, P., Ong, L., Tuexen, M., and T. Dreibholz, "An
              Overview of Reliable Server Pooling Protocols", May 2008.

   [RFC6707]  Niven-Jenkins, B., "Content Distribution Network
              Interconnection (CDNI) Problem Statement", September 2012.

   [TR-101]   Broadband Forum, "Migration to Ethernet-Based DSL
              Aggregation", 2006.

   [WT-317]   Broadband Forum, "Network Enhanced Residential Gateway",
              2013.

7.2.  Informative References

   [NFV-REL-REQ]
              "Network Function Virtualisation Resiliency Requirements",
              ISG REL Requirements, June 2013.

   [NVO3-FWK]
              Lasserre, M., "Framework for DC Network Virtualization",
              ID draft-ietf-nvo3-framework-00, September 2012.

   [VNF-PS]   Zong, N., "Problem Statement for Reliable Virtualized
              Network Function (VNF) Pool", July 2013.











Xia, et al.              Expires April 24, 2014                [Page 23]


Internet-Draft                   VSNPool                    October 2013


Authors' Addresses

   Liang Xia
   Huawei
   101 Software Avenue, Yuhua District
   Nanjing, Jiangsu  210012
   China

   Email: frank.xialiang@huawei.com


   Qin Wu
   Huawei
   101 Software Avenue, Yuhua District
   Nanjing, Jiangsu  210012
   China

   Email: bill.wu@huawei.com


   Daniel King
   Lancaster University
   UK

   Email: d.king@lancaster.ac.uk


   Hidetoshi Yokota
   KDDI Lab
   Japan

   Email: yokota@kddilabs.jp



















Xia, et al.              Expires April 24, 2014                [Page 24]