ImageVerifierCode 换一换
格式:PDF , 页数:81 ,大小:2.32MB ,
资源ID:733200      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-733200.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(ETSI GR NFV 001-2017 Network Functions Virtualisation (NFV) Use Cases (V1 2 1).pdf)为本站会员(priceawful190)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

ETSI GR NFV 001-2017 Network Functions Virtualisation (NFV) Use Cases (V1 2 1).pdf

1、 ETSI GR NFV 001 V1.2.1 (2017-05) Network Functions Virtualisation (NFV); Use Cases Disclaimer The present document has been produced and approved by the Network Functions Virtualisation (NFV) ETSI Industry Specification Group (ISG) and represents the views of those members who participated in this

2、ISG. It does not necessarily represent the views of the entire ETSI membership. GROUP REPORT ETSI ETSI GR NFV 001 V1.2.1 (2017-05)2 Reference RGR/NFV-001ed121 Keywords NFV, use case ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Sir

3、et N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88 Important notice The present document can be downloaded from: http:/www.etsi.org/standards-search The present document may be made available in electronic versions and/or in print. T

4、he content of any electronic and/or print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any existing or perceived difference in contents between such versions and/or in print, the only prevailing document is the print of the Portab

5、le Document Format (PDF) version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at https:/portal.

6、etsi.org/TB/ETSIDeliverableStatus.aspx If you find errors in the present document, please send your comment to one of the following services: https:/portal.etsi.org/People/CommiteeSupportStaff.aspx Copyright Notification No part may be reproduced or utilized in any form or by any means, electronic o

7、r mechanical, including photocopying and microfilm except as authorized by written permission of ETSI. The content of the PDF version shall not be modified without the written authorization of ETSI. The copyright and the foregoing restriction extend to reproduction in all media. European Telecommuni

8、cations Standards Institute 2017. All rights reserved. DECTTM, PLUGTESTSTM, UMTSTMand the ETSI logo are Trade Marks of ETSI registered for the benefit of its Members. 3GPPTM and LTE are Trade Marks of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners. oneM2M logo

9、 is protected for the benefit of its Members GSM and the GSM logo are Trade Marks registered and owned by the GSM Association. ETSI ETSI GR NFV 001 V1.2.1 (2017-05)3 Contents Intellectual Property Rights 8g3Foreword . 8g3Modal verbs terminology 8g31 Scope 9g32 References 9g32.1 Normative references

10、. 9g32.2 Informative references 9g33 Abbreviations . 10g34 Overview 12g35 Roles . 13g36 Use Case #1: Network Function Virtualisation Infrastructure as a Service (NFVIaaS) 14g36.1 Motivation 14g36.2 Detailed User Story #1 - Compute Service Instantiation 17g36.2.1 Summary . 17g36.2.2 Actor(s). 17g36.2

11、.3 Pre-Conditions 17g36.2.4 Begins When . 17g36.2.5 Description 17g36.2.6 End When . 17g36.2.7 Post-Conditions . 17g36.2.8 Exceptions. 17g36.3 Detailed User Story #2 - Storage Service Instantiation 18g36.3.1 Summary . 18g36.3.2 Actor(s). 18g36.3.3 Pre-Conditions 18g36.3.4 Begins When . 18g36.3.5 Des

12、cription 18g36.3.6 End When . 18g36.3.7 Post-Conditions . 18g36.3.8 Exceptions. 18g36.4 Detailed User Story #3 - Network Service Instantiation 19g36.4.1 Summary . 19g36.4.2 Actor(s). 19g36.4.3 Pre-Conditions 19g36.4.4 Begins When . 19g36.4.5 Description 19g36.4.6 End When . 19g36.4.7 Post-Conditions

13、 . 19g36.4.8 Exceptions. 19g36.5 Virtualisation Target. 20g36.6 Coexistence of Virtualised and Non-Virtualised Network Functions 21g36.7 Problem description/Issues . 21g37 Use Case #2: VNF Forwarding Graphs 21g37.1 Motivation 21g37.2 Detailed User Story 22g37.2.1 Summary . 22g37.2.2 Actor(s). 25g37.

14、2.3 Pre-Conditions 25g37.2.4 Begins When . 25g37.2.5 Description 26g37.2.6 End When . 26g37.2.7 Post-Conditions . 26g3ETSI ETSI GR NFV 001 V1.2.1 (2017-05)4 7.2.8 Exceptions. 26g37.2.9 Virtualisation Target . 26g37.3 Coexistence of Virtualised and Non-Virtualised Network Functions 27g37.4 Problem de

15、scription/Issues . 27g38 Use Case #3: Virtualisation of Mobile Core Network and IMS. 28g38.1 Motivation 28g38.2 Detailed User Story 28g38.2.1 Summary . 28g38.2.2 Actor(s). 28g38.2.3 Pre-Conditions 29g38.2.4 Begins When . 29g38.2.5 Description 29g38.2.6 End When . 29g38.2.7 Post-Conditions . 29g38.2.

16、8 Exceptions. 29g38.2.9 Virtualisation Target . 29g38.3 Coexistence of Virtualised and Non-Virtualised Network Functions 29g38.4 Problem description/Issues . 31g39 Use Case #4: Virtualisation of Mobile base station . 32g39.1 Motivation 32g39.2 Detailed User Story 32g39.2.1 Summary . 32g39.2.2 Actor(

17、s). 32g39.2.3 Pre-Conditions 32g39.2.4 Begins When . 32g39.2.5 Description 33g39.2.6 End When . 33g39.2.7 Post-Conditions . 33g39.2.8 Exceptions. 33g39.2.9 Virtualisation Target . 33g39.3 Coexistence of Virtualised and Non-Virtualised Network Functions 34g39.4 Problem description/Issues . 34g310 Use

18、 Case #5: Virtualisation of the Home Environment . 35g310.1 Motivation 35g310.2 Detailed User Story 36g310.2.1 Summary . 36g310.2.2 Actor(s) . 37g310.2.3 Pre-Conditions 37g310.2.4 Begins When . 37g310.2.5 Description 38g310.2.6 End When . 38g310.2.7 Post-Conditions . 38g310.2.8 Exceptions. 38g310.2.

19、9 Virtualisation Target . 38g310.3 Coexistence of Virtualised and Non-Virtualised Network Functions 39g310.4 Problem description/Issues . 41g311 Use Case #6: Virtual Content Delivery Network (vCDN) - Fulfilment . 42g311.1 Motivation 42g311.2 Detailed User Story 43g311.2.1 Summary . 43g311.2.2 Actor(

20、s) . 43g311.2.3 Pre-Conditions 44g311.2.4 Begins When . 44g311.2.5 Description 44g311.2.6 End When . 45g311.2.7 Post-Conditions . 45g311.2.8 Exceptions. 45g311.2.9 Virtualisation Target . 45g311.3 Coexistence of Virtualised and Non-Virtualised Network Functions 46g3ETSI ETSI GR NFV 001 V1.2.1 (2017-

21、05)5 11.4 Problem description/Issues . 46g312 Use Case #7: Fixed Access Network Functions Virtualisation 46g312.1 Motivation 46g312.2 Detailed User Story 47g312.2.1 Summary . 47g312.2.2 Actor(s) . 47g312.2.3 Pre-Conditions 48g312.2.4 Begins When . 48g312.2.5 Description 48g312.2.6 End When . 50g312.

22、2.7 Post-Conditions . 50g312.2.8 Exceptions. 50g312.3 Coexistence of Virtualised and Non-virtualised Network Functions . 51g312.4 Problem description/Issues . 52g313 Use Case #8: Crypto as a Service (CaaS) . 53g313.1 Motivation 53g313.2 Detailed User Story 53g313.2.1 Summary . 53g313.2.2 Actor(s) .

23、53g313.2.3 Pre-Conditions 53g313.2.4 Begins When . 53g313.2.5 Description 53g313.2.6 End When . 54g313.2.7 Post-Conditions . 54g313.2.8 Exceptions. 54g313.2.9 Virtualisation Target . 54g313.3 Coexistence of Virtualised and Non-Virtualised Network Functions 55g313.4 Problem description/Issues . 56g31

24、4 Use Case #9: Network Slicing 56g314.1 Motivation 56g314.2 Detailed User Story 58g314.2.1 Summary . 58g314.2.2 Actor(s) . 59g314.2.3 Pre-Conditions 59g314.2.4 Begins When . 60g314.2.5 Description 60g314.2.6 End When . 60g314.2.7 Post-Conditions . 60g314.2.8 Exceptions. 60g314.2.9 Virtualisation Tar

25、get . 60g314.3 Coexistence of Virtualised and Non-Virtualised Network Functions 61g315 Use Case #10: Virtualisation of Internet of Things (IoT) 61g315.1 Motivation 61g315.2 Detailed User Story 62g315.2.1 Summary . 62g315.2.2 Actor(s) . 63g315.2.3 Pre-Conditions 63g315.2.4 Begins When . 64g315.2.5 De

26、scription 64g315.2.6 End When . 64g315.2.7 Post-Conditions . 64g315.2.8 Exceptions. 64g315.2.9 Virtualisation target 65g315.3 Coexistence of Virtualised and Non-Virtualised Network Functions 65g315.4 Problem description/Issues . 65g316 Use Case #11: Rapid Service Deployment . 65g316.1 Motivation 65g

27、316.2 Detailed User Story 65g316.2.1 Summary . 65g3ETSI ETSI GR NFV 001 V1.2.1 (2017-05)6 16.2.2 Actor(s) . 66g316.2.3 Pre-Conditions 66g316.2.4 Begins When . 66g316.2.5 Description 66g316.2.6 End When . 66g316.2.7 Post-Conditions . 66g316.2.8 Exceptions. 66g316.2.9 Virtualisation Target . 67g316.3

28、Coexistence of Virtualised and Non-Virtualised Network Functions 67g316.4 Problem description/Issues . 67g317 Use Case #12: Devops/CI/CD 67g317.1 Motivation 67g317.2 Detailed User Story 67g317.2.1 Summary . 67g317.2.2 Actor(s) . 68g317.2.3 Pre-Conditions 68g317.2.4 Begins When . 68g317.2.5 Descripti

29、on 68g317.2.6 End When . 68g317.2.7 Post-Conditions . 68g317.2.8 Exceptions. 69g317.2.9 Virtualisation Target . 69g317.3 Coexistence of Virtualised and Non-Virtualised Network Functions 69g317.4 Problem description/Issues . 69g318 Use Case #13: A/B testing 69g318.1 Motivation 69g318.2 Detailed User

30、Story 69g318.2.1 Summary . 69g318.2.2 Actor(s) . 70g318.2.3 Pre-Conditions 70g318.2.4 Begins When . 70g318.2.5 Description 70g318.2.6 End When . 70g318.2.7 Post-Conditions . 71g318.2.8 Exceptions. 71g318.2.9 Virtualisation Target . 71g318.3 Coexistence of Virtualised and Non-Virtualised Network Func

31、tions 71g318.4 Problem description/Issues . 71g319 Use Case #14: VNF composition across multiple administrative domains 71g319.1 Motivation 71g319.2 Detailed User Story 72g319.2.1 Summary . 72g319.2.2 Actor(s) . 72g319.2.3 Pre-Conditions 73g319.2.4 Begins When . 73g319.2.5 Description 73g319.2.6 End

32、s When 74g319.2.7 Post-Conditions . 74g319.2.8 Exceptions. 74g319.2.9 Virtualisation Target . 74g319.3 Coexistence of Virtualised and Non-Virtualised Network Functions 74g319.4 Problem description/Issues . 74g320 Use Case #15: Security as a Service (SecaaS) . 75g320.1 Motivation 75g320.2 Detailed Us

33、er Story 75g320.2.1 Summary . 75g320.2.2 Actor(s) . 76g320.2.3 Pre-Conditions 77g320.2.4 Begins When . 77g3ETSI ETSI GR NFV 001 V1.2.1 (2017-05)7 20.2.5 Description 77g320.2.6 Ends When 78g320.2.7 Post-Conditions . 78g320.2.8 Exceptions. 78g320.2.9 Virtualisation Target . 78g320.3 Coexistence of Vir

34、tualised and Non-Virtualised Network Functions 78g320.4 Problem description/Issues . 79g3Annex A: Change History . 80g3History 81g3ETSI ETSI GR NFV 001 V1.2.1 (2017-05)8 Intellectual Property Rights Essential patents IPRs essential or potentially essential to the present document may have been decla

35、red to ETSI. The information pertaining to these essential IPRs, if any, is publicly available for ETSI members and non-members, and can be found in ETSI SR 000 314: “Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to ETSI in respect of ETSI standards“, which

36、is available from the ETSI Secretariat. Latest updates are available on the ETSI Web server (https:/ipr.etsi.org/). Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee can be given as to the existence of other IPRs not referenced in E

37、TSI SR 000 314 (or the updates on the ETSI Web server) which are, or may be, or may become, essential to the present document. Trademarks The present document may include trademarks and/or tradenames which are asserted and/or registered by their owners. ETSI claims no ownership of these except for a

38、ny which are indicated as being the property of ETSI, and conveys no right to use or reproduce any trademark and/or tradename. Mention of those trademarks in the present document does not constitute an endorsement by ETSI of products, services or organizations associated with those trademarks. Forew

39、ord This Group Report (GR) has been produced by ETSI Industry Specification Group (ISG) Network Functions Virtualisation (NFV). Modal verbs terminology In the present document “should“, “should not“, “may“, “need not“, “will“, “will not“, “can“ and “cannot“ are to be interpreted as described in clau

40、se 3.2 of the ETSI Drafting Rules (Verbal forms for the expression of provisions). “must“ and “must not“ are NOT allowed in ETSI deliverables except when used in direct citation. ETSI ETSI GR NFV 001 V1.2.1 (2017-05)9 1 Scope The scope of the present document is to describe use cases of interest for

41、 Network Functions Virtualisation (NFV). It updates and extends ETSI GS NFV 001 V1.1.1 i.15. 2 References 2.1 Normative references Normative references are not applicable in the present document. 2.2 Informative references References are either specific (identified by date of publication and/or edit

42、ion number or version number) or non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the referenced document (including any amendments) applies. NOTE: While any hyperlinks included in this clause were valid at the time of publicat

43、ion, ETSI cannot guarantee their long term validity. The following referenced documents are not necessary for the application of the present document but they assist the user with regard to a particular subject area. i.1 ETSI GS NFV 003: “Network Functions Virtualisation (NFV); Terminology for Main

44、Concepts in NFV“. i.2 ETSI GS NFV-REL 005: “Network Functions Virtualisation (NFV); Accountability; Report on Quality Accountability Framework“. i.3 ISO/IEC 17788 (First edition) (2014-10-15): “Information technology - Cloud computing - Overview and vocabulary“. NOTE: Available at http:/standards.is

45、o.org/ittf/PubliclyAvailableStandards/c060544_ISO_IEC_17788_2014.zip. i.4 ISO/IEC 17789 (First edition) (2014-10-15): “Information Technology - Cloud Computing - Reference Architecture“. NOTE: http:/standards.iso.org/ittf/PubliclyAvailableStandards/c060545_ISO_IEC_17789_2014.zip. i.5 NGMN 5G White P

46、aper. i.6 NGMN Description of Network Slicing Concept. i.7 IMT 2020 5G Network Topology Architecture. i.8 NFV White paper: “Network Functions Virtualisation, An Introduction, Benefits, Enablers, Challenges Use Cases“. i.16 BBF Technical Report TR-317: “Network Enhanced Residential Gateway“. 3 Abbrev

47、iations For the purposes of the present document, the following abbreviations apply: AAA Authentication, Authorization and Accounting ADC Application Delivery Control AN Access Node API Application Programming Interface AR Access Router ARPU Average Revenue Per User AS Application Server BBF BroadBa

48、nd ForumBBU Base Band Unit BGP Border Gateway Protocol BNG Broadband Network Gateway BS Base Station BSS Business Support System CAPEX Capital Expenses CDN Content Delivery Network CI/CD Continuous Integration/Continuous Deployment CMTS Cable Modem Termination System CO Central Office COTS Custom Of

49、f The Shelf CP Connection PointCPE Customer Premises Equipment CPU Central Processing Unit C-RAN Cloud Radio Access Network CRM Customer Relationship Management CSC Cloud Service Customer CSCF Call Session Control Function CSP Cloud Service Provider CSP:NP Cloud Service Provider:Network Provider DARE Data Analysis and Remediation Engine DBA Dynamic Bandwidth Allocation DC Data Centre DHCP Dynamic Host Configuration Protocol DLNA Digital Living Network Alliance DPI Deep Packet Inspection DPU Distribution Point Unit DRA Diameter Routing AgentDSL Digital

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1