1、 ETSI GS NFV-REL 001 V1.1.1 (2015-01) Network Functions Virtualisation (NFV); Resiliency Requirements Disclaimer This document has been produced and approved by the Network Functions Virtualisation (NFV) ETSI Industry Specification Group (ISG) and represents the views of those members who participat
2、ed in this ISG. It does not necessarily represent the views of the entire ETSI membership. GROUP SPECIFICATION ETSI ETSI GS NFV-REL 001 V1.1.1 (2015-01)2Reference DGS/NFV-REL001 Keywords availability, network, network monitoring, reliability, resilience ETSI 650 Route des Lucioles F-06921 Sophia Ant
3、ipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88 Important notice The present document can be downloaded from: http:/www.etsi.org The present document may be m
4、ade available in electronic versions and/or in print. The content of any electronic and/or print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any existing or perceived difference in contents between such versions and/or in print,
5、the only prevailing document is the print of the Portable Document Format (PDF) version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this
6、and other ETSI documents is available at http:/portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: http:/portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may be reproduced or utilized in a
7、ny form or by any means, electronic or mechanical, including photocopying and microfilm except as authorized by written permission of ETSI. The content of the PDF version shall not be modified without the written authorization of ETSI. The copyright and the foregoing restriction extend to reproducti
8、on in all media. European Telecommunications Standards Institute 2015. All rights reserved. DECTTM, PLUGTESTSTM, UMTSTMand the ETSI logo are Trade Marks of ETSI registered for the benefit of its Members. 3GPPTM and LTETMare Trade Marks of ETSI registered for the benefit of its Members and of the 3GP
9、P Organizational Partners. GSM and the GSM logo are Trade Marks registered and owned by the GSM Association. ETSI ETSI GS NFV-REL 001 V1.1.1 (2015-01)3Contents Intellectual Property Rights 6g3Foreword . 6g3Modal verbs terminology 6g31 Scope 7g32 References 7g32.1 Normative references . 7g32.2 Inform
10、ative references 7g33 Definitions abbreviations . 9g33.1 Definitions 9g33.2 Abbreviations . 10g34 Resiliency Problem Description Essential, or potentially Essential, IPRs notified to ETSI in respect of ETSI standards“, which is available from the ETSI Secretariat. Latest updates are available on the
11、 ETSI Web server (http:/ipr.etsi.org). Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web server) which are, or may be,
12、or may become, essential to the present document. Foreword This Group Specification (GS) has been produced by ETSI Industry Specification Group (ISG) Network Functions Virtualisation (NFV). Modal verbs terminology In the present document “shall“, “shall not“, “should“, “should not“, “may“, “may not“
13、, “need“, “need not“, “will“, “will not“, “can“ and “cannot“ are to be interpreted as described in clause 3.2 of the ETSI Drafting Rules (Verbal forms for the expression of provisions). “must“ and “must not“ are NOT allowed in ETSI deliverables except when used in direct citation. ETSI ETSI GS NFV-R
14、EL 001 V1.1.1 (2015-01)71 Scope The present document focuses on unique aspects related to network and service resiliency in a virtualised network environment. The challenges result from failures of virtualised network functions, failures of the underlying hardware and software infrastructure arising
15、 from conditions such as design faults, intrinsic wear out, operational mistakes, or other adverse conditions, e.g. natural disasters, excessive traffic demand, etc. The scope of the present document includes: Usecase analysis for reliability and availability in a virtualised network environment. An
16、alysis of service availability levels. Identification of requirements for maintaining network resiliency and service availability, the focus being additional requirements introduced by virtualisation. The mechanisms to be considered include the following: - Network function migration within and acro
17、ss system boundaries. - Failure detection and reporting at the various layers. - Failure prediction, prevention, and remediation. - State management. - Solving network availability issues caused by overload/call blocking conditions. Engineering and deployment guidelines for maintaining network resil
18、iency and ensuring service availability. 2 References 2.1 Normative references References are either specific (identified by date of publication and/or edition number or version number) or non-specific. For specific references, only the cited version applies. For non-specific references, the latest
19、version of the referenced document (including any amendments) applies. Referenced documents which are not found to be publicly available in the expected location might be found at http:/docbox.etsi.org/Reference. NOTE: While any hyperlinks included in this clause were valid at the time of publicatio
20、n, ETSI cannot guarantee their long term validity. The following referenced documents are necessary for the application of the present document. Not applicable. 2.2 Informative references References are either specific (identified by date of publication and/or edition number or version number) or no
21、n-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the referenced document (including any amendments) applies. NOTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee their lo
22、ng term validity. ETSI ETSI GS NFV-REL 001 V1.1.1 (2015-01)8The following referenced documents are not necessary for the application of the present document but they assist the user with regard to a particular subject area. i.1 ETSI ETSI GS NFV 002 (V1.1.1): “Network Functions Virtualisation (NFV);
23、Architectural Framework“. i.2 ETSI ETSI GS NFV 003 (V1.1.1): “Network Functions Virtualisation (NFV); Terminology for Main Concepts in NFV“. i.3 ETSI GS NFV-SWA 001: “Network Functions Virtualisation (NFV); Virtual Network Function Architecture“. i.4 ETSI GS NFV-MAN 001: “Network Functions Virtualis
24、ation (NFV); Management and Orchestration“. i.5 James P.G. Sterbenz, David Hutchison, Egemen K. etinkaya, Abdul Jabbar, Justin P. Rohrer, Marcus Schller, Paul Smith: “Resilience and Survivability in Communication Networks: Strategies, Principles, and Survey of Disciplines“, Computer Networks: Specia
25、l Issue on Resilient and Survivable Networks (COMNET), vol.54 iss.8, June 2010, pp.1245-1265. i.6 Jean-Claude Laprie (ed.): “Dependability: Basic Concepts and Terminology“, IFIP WG 10.4 - Dependable Computing and Fault Tolerance (draft), Aug. 1994. i.7 Malgorzata Steinder and Adarshpal S. Sethi: “A
26、survey of fault localization techniques in computer networks“, Science of Computer Programming, vol. 53, #2, November 2004, pp. 165-194. i.8 Recommendation ITU-T Y.2171 (2006): “Admission control priority levels in Next Generation Networks“. i.9 Recommendation ITU-T Y.2172 (2007): “Service restorati
27、on priority levels in Next Generation Networks“. i.10 Recommendation ITU-T E.800 (2008): “Terms and definitions related to quality of service and network performance including dependability“. i.11 Recommendation ITU-T E.412 (2003): “Network management controls“. i.12 3GPP TR 32.814: “Telecommunicati
28、on management; UTRAN and GERAN Key Performance Indicators (KPI)“. i.13 ETSI TS 123 060: “General Packet Radio Service (GPRS); Service description; Stage 2“. i.14 Recommendation ITU-T Y.2801 (2006): “Mobility management requirements for NGN“. i.15 ETSI TS 123 207: “End-to-end Quality of Service (QoS)
29、 concept and architecture“. i.16 ETSI TS 102 250-2 (V2.2.1): “Speech and multimedia Transmission Quality (STQ); QoS aspects for popular services in mobile networks; Part 2: Definition of Quality of Service parameters and their computation“. i.17 ETSI TS 102 250-5 (V2.2.1): “Speech and multimedia Tra
30、nsmission Quality Aspects (STQ); QoS aspects for popular services in mobile networks; Part 5: Definition of typical measurement profiles“. i.18 ETSI TS 123 380: “IMS Restoration Procedures“. i.19 T1A1.2 Working Group: “Network survivability performance.“ Technical Report T1A1.2/93-001R3, Alliance fo
31、r Telecommunications Industry Solutions (ATIS), (1993). i.20 IETF RFC 5424 (2009): “The Syslog Protocol“. i.21 IETF RFC 4412 (2006): “Communications Resource Priority for the Session Initiation Protocol (SIP)“. i.22 IETF RFC 4594 (2006): “Configuration Guidelines for DiffServ Service Classes“. ETSI
32、ETSI GS NFV-REL 001 V1.1.1 (2015-01)9i.23 IETF RFC 5865 (2010): “A Differentiated Services Code Point (DSCP) for Capacity-Admitted Traffic“. i.24 IETF RFC 4090 (2005): “Fast Reroute Extensions to RSVP-TE for LSP Tunnels“. i.25 QuEST Forum (2006): “TL 9000 (Telecom Leadership 9000)“. i.26 ETSI NFV-IN
33、F 003: “Network Functions Virtualisation (NFV); Infrastructure; Compute Domain“. 3 Definitions abbreviations 3.1 Definitions For the purposes of the present document, the terms and definitions given in ETSI GS NFV 003 i.2 and the following apply: availability: availability of an item to be in a stat
34、e to perform a required function at a given instant of time or at any instant of time within a given time interval, assuming that the external resources, if required, are provided NOTE: See i.10. challenge: characteristic or condition that may be manifest as an adverse event or condition that impact
35、s the normal operation NOTE: See i.5. error: discrepancy between a computed, observed, or measured value or condition and a true, specified, or theoretically correct value or condition NOTE 1: Error is a consequence of a fault. NOTE 2: See i.7. failure: deviation of the delivered service from fulfil
36、ling the system function NOTE: See i.6. fault: adjudged or hypothesized cause of an error NOTE: See i.6. normal operations: state of the network when there are no adverse conditions present NOTE 1: This loosely corresponds to the conditions for which the system was designed, when the network is not
37、under attack, the vast majority of network infrastructure is operational, and connectivity is relatively strong. NOTE 2: See i.5. reliability: probability that an item can perform a required function under stated conditions for a given time interval ETSI ETSI GS NFV-REL 001 V1.1.1 (2015-01)103.2 Abb
38、reviations For the purposes of the present document, the following abbreviations apply: AAA Authentication, Authorization, Accountability API Application Programming Interface BNA Broad Network Access BSS Business Support SystemCIMS Cloud Infrastructure Management System COTS Commercial-Off-The-Shel
39、f CPU Central Processing Unit CRC Cyclic Redundancy Check CSCF Call Session Control Function DAS Direct Attached Storage DDoS Distributed Denial of Service DIMM Dual In-line Memory Module DNS Domain Name System ECC Error Correcting Code EMS Element Management System ETS Emergency Telecommunication S
40、ervice GERAN GSM Edge Radio Access Network GGSN Gateway GPRS Support Node HA High AvailabilityIMS IP Multimedia Subsystem IO Input/Output IOMMU Input/Output Memory Management Unit IP Internet Protocol IS Information SecurityISMS Information Security Management System ISP Internet Service Provider IT
41、 Information Technologies KPI Key Performance Indicator LAN Local Area Network LDAP Leightweight Directory Access Protocol LSP Label Switsch Path LU Logical Unit MAC Media Access Control MITM Man-in-the-Middle MME Mobility Management Entity MPLS Multi Protocol Label Switching MS Measured Service MTT
42、F Mean Time To Failure MTTR Mean Time To Repair NAS Network Attached Storage NEBS Network Equipment-Building System NF Network Function NFVI Network Function Virtualisation Infrastructure NFVI-PoP Network Function Virtualisation Infrastructure Point of Presence NFV-MANO Network Function Virtualisati
43、on Management and Orchestration NFVO Network Function Virtualisation Orchestrator NGN Next Generation Networks NIC Network Interface Card NIC-ID Network Interface Card Identifier NIST National Institute of Standards and Technology NSD Network Service Descriptor OAM Operation, Administration, and Man
44、agement OI Operational Issues OS Operating SystemOSS Operation Support System OTT Over The Top PGW Packet Data Network Gateway ETSI ETSI GS NFV-REL 001 V1.1.1 (2015-01)11PI Physical Infrastructure PNF Physical Network Function PoP Point of Presence QoS Quality of Service RAID Redundant Array of Inex
45、pensive/Independent Disks RAS Reliability, Availability, and Serviceability RE Rapid Elasticity RNC Radio Network Controller RP Resource Pooling SA Service AvailabilitySAN Storage Area Network SDN Software Defined Networking S-GW Serving Gateway SIP Session Initiation Protocol SLA Service Level Agre
46、ement SMS Short Messaging Service SP Service Provider SQL Structured Query Language SQM Service Quality Metrics SR-IOV Single Root I/O Virtualisation SW Software TV TelevisionUE User Equipment US United StatesUTRAN UMTS Terrestrial Radio Access Network VDU Virtualisation Deployment Unit VIM Virtuali
47、sed Infrastructure Manager VLAN Virtual Local Area Network VM Virtual Machine VN VirtualisationVNF Virtualised Network Function VNFC Virtualised Network Function Component VNFD Virtualised Network Function Descriptor VNF-EMS Virtualised Network Function Element Management System VNF-FG VNF Forwardin
48、g Graph VNFM Virtualised Network Function Manager VoIP Voice over IP VoLTE Voice over LTE VPN Virtual Private Network VS Virtual Storage WAF Web Application Firewall WAN Wide Area Network 4 Resiliency Problem Description alarms or threshold notifications from the NFVI, or instantiation request from
49、NFV-MANO to NFVI. A key tool for resiliency in a multi-vendor environment is explicit storage and transfer of state information, which shall be provided by the NFVI. The VNF selects the information to be stored and the NFVI provides the bare object store for any kind of state information to be stored. There will be performance requirements regarding state availability across physically dispersed NFVI-PoPs, which need to be taken into account during VNF instantiation. 4.2.5 Hybrid Infrastructure VNFs wi