ETSI GS NFV-REL 005-2016 Network Functions Virtualisation (NFV) Accountability Report on Quality Accountability Framework (V1 1 1)《网络功能虚拟化(NFV) 问责 质量问责框架报告(V1 1 1)》.pdf

上传人:ownview251 文档编号:733373 上传时间:2019-01-08 格式:PDF 页数:40 大小:2.34MB
下载 相关 举报
ETSI GS NFV-REL 005-2016 Network Functions Virtualisation (NFV) Accountability Report on Quality Accountability Framework (V1 1 1)《网络功能虚拟化(NFV) 问责 质量问责框架报告(V1 1 1)》.pdf_第1页
第1页 / 共40页
ETSI GS NFV-REL 005-2016 Network Functions Virtualisation (NFV) Accountability Report on Quality Accountability Framework (V1 1 1)《网络功能虚拟化(NFV) 问责 质量问责框架报告(V1 1 1)》.pdf_第2页
第2页 / 共40页
ETSI GS NFV-REL 005-2016 Network Functions Virtualisation (NFV) Accountability Report on Quality Accountability Framework (V1 1 1)《网络功能虚拟化(NFV) 问责 质量问责框架报告(V1 1 1)》.pdf_第3页
第3页 / 共40页
ETSI GS NFV-REL 005-2016 Network Functions Virtualisation (NFV) Accountability Report on Quality Accountability Framework (V1 1 1)《网络功能虚拟化(NFV) 问责 质量问责框架报告(V1 1 1)》.pdf_第4页
第4页 / 共40页
ETSI GS NFV-REL 005-2016 Network Functions Virtualisation (NFV) Accountability Report on Quality Accountability Framework (V1 1 1)《网络功能虚拟化(NFV) 问责 质量问责框架报告(V1 1 1)》.pdf_第5页
第5页 / 共40页
点击查看更多>>
资源描述

1、 ETSI GS NFV-REL 005 V1.1.1 (2016-01) Network Functions Virtualisation (NFV); Accountability; Report on Quality Accountability Framework Disclaimer This document has been produced and approved by the Network Functions Virtualisation (NFV) ETSI Industry Specification Group (ISG) and represents the vi

2、ews of those members who participated in this ISG. It does not necessarily represent the views of the entire ETSI membership. GROUP SPECIFICATION ETSI ETSI GS NFV-REL 005 V1.1.1 (2016-01)2 Reference DGS/NFV-REL005 Keywords NFV, quality ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRA

3、NCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88 Important notice The present document can be downloaded from: http:/www.etsi.org/standards-search The present document may be ma

4、de available in electronic versions and/or in print. The content of any electronic and/or print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any existing or perceived difference in contents between such versions and/or in print, t

5、he only prevailing document is the print of the Portable Document Format (PDF) version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this a

6、nd other ETSI documents is available at http:/portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: https:/portal.etsi.org/People/CommiteeSupportStaff.aspx Copyright Notification No part may be reproduced or utiliz

7、ed in any form or by any means, electronic or mechanical, including photocopying and microfilm except as authorized by written permission of ETSI. The content of the PDF version shall not be modified without the written authorization of ETSI. The copyright and the foregoing restriction extend to rep

8、roduction in all media. European Telecommunications Standards Institute 2016. All rights reserved. DECTTM, PLUGTESTSTM, UMTSTMand the ETSI logo are Trade Marks of ETSI registered for the benefit of its Members. 3GPPTM and LTE are Trade Marks of ETSI registered for the benefit of its Members and of t

9、he 3GPP Organizational Partners. GSM and the GSM logo are Trade Marks registered and owned by the GSM Association. ETSI ETSI GS NFV-REL 005 V1.1.1 (2016-01)3 Contents Intellectual Property Rights 5g3Foreword . 5g3Modal verbs terminology 5g3Introduction 5g31 Scope 6g32 References 6g32.1 Normative ref

10、erences . 6g32.2 Informative references 6g33 Definitions and abbreviations . 7g33.1 Definitions 7g33.2 Abbreviations . 9g34 Roles in the NFV Ecosystem 10g34.1 NFV Service Delivery Relationships . 10g34.2 Role: Cloud Service User . 11g34.3 Role: Cloud Service Customer . 11g34.4 Role: Cloud Service Pr

11、ovider . 12g34.5 Role: VNF Supplier 13g34.6 Role: Service Integrator 13g34.7 Role: Cloud Auditor . 13g34.8 Role: Cloud Service Broker 14g34.9 Illustrative Example . 14g35 Responsibilities by Role . 16g35.1 Traditional (PNF) Responsibilities . 16g35.2 VNF Supplier Responsibilities . 16g35.3 Service I

12、ntegrator Responsibilities . 17g35.4 Cloud Service Provider: NFV Infrastructure 17g35.5 Cloud Service Provider: NFV Management and Orchestration . 18g35.6 Cloud Service Provider: Functional Component Offered as-a-Service 19g35.7 Cloud Service Customer . 19g35.8 CSP: Network Provider 20g36 Responsibi

13、lities for Key Cloud Characteristics 20g36.1 Key Cloud Computing Characteristics . 20g36.2 Broad Network Access . 20g36.3 Measured Service . 20g36.4 Multi-Tenancy 20g36.5 On-Demand Self Service 21g36.6 Rapid Elasticity and Scalability 21g36.7 Resource Pooling 21g37 Quality Measurement Framework 22g3

14、7.1 Overview 22g37.1 VNF Software Quality Measurements . 22g37.2 Function Components Offered as-a-Service Quality Measurements 23g37.3 Automated Lifecycle Management Quality Measurements . 23g37.4 Failure Notification Quality Measurements . 23g37.5 Virtual Infrastructure Quality Measurements . 24g3A

15、nnex A (informative): Sample Cloud Service Customer SLAs 25g3Annex B (informative): Use Case Scenario: . 28g3B.0 Introduction 28g3B.1 Service Outage Downtime 28g3ETSI ETSI GS NFV-REL 005 V1.1.1 (2016-01)4 B.2 Automated Lifecycle Management Action Failures . 29g3B.3 VM Failure Rate . 31g3B.4 Virtual

16、Network Impairments 31g3B.5 Virtual Machine Scheduling Latency . 31g3B.6 Virtual Machine Stall Time 32g3B.7 Functional Components Offered as-a-Service 33g3B.8 Placement Policy Compliance 34g3B.9 Resource Promise Violations . 34g3B.10 VNF Scaling . 34g3Annex C (informative): Overview of TMForum and Q

17、uEST Forum Roles . 36g3Annex D (informative): Administrative Domains and Accountable Parties . 37g3Annex E (informative): Authors Essential, or potentially Essential, IPRs notified to ETSI in respect of ETSI standards“, which is available from the ETSI Secretariat. Latest updates are available on th

18、e ETSI Web server (http:/ipr.etsi.org). Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web server) which are, or may be,

19、 or may become, essential to the present document. Foreword This Group Specification (GS) has been produced by ETSI Industry Specification Group (ISG) Network Functions Virtualisation (NFV). The present document deals with specific aspects of Service Quality Accountability in the context of Network

20、Function Virtualisation. Modal verbs terminology In the present document “shall“, “shall not“, “should“, “should not“, “may“, “need not“, “will“, “will not“, “can“ and “cannot“ are to be interpreted as described in clause 3.2 of the ETSI Drafting Rules (Verbal forms for the expression of provisions)

21、. “must“ and “must not“ are NOT allowed in ETSI deliverables except when used in direct citation. Introduction The NFV Quality Accountability Framework supports the quality management principles of customer focus (i.7 principle 0.2.a), mutually beneficial supplier relationships (i.7 principle 0.2.h)

22、 and factual approach to decision making (i.7 principle 0.2.g) to enable continual improvement (i.7 principle 0.2.f). Clearly defining roles, responsibilities and demarcations is a quality management best practice because it clarifies accountabilities which permit any quality impairments to be rapid

23、ly localized, root causes to be identified and appropriate corrective actions to be agreed to promptly restore service and drive continuous quality improvement. This informative document defines key roles including NFV cloud service customer, provider(s) of NFV management, orchestration and/or infra

24、structure services, and their VNF suppliers and Integrators. The document lays out the responsibilities for each role based on both extrapolating traditional responsibilities and considering responsibilities for each of the six essential characteristics of cloud computing. As objective and quantitat

25、ive measurement is necessary to enable methodical quality assurance and management, the present document offers a quality measurement framework that connects standard metrics and measurements with roles, and an annex that offers sample service quality SLAs for a cloud service customer. A second anne

26、x offers use case scenarios illustrating how the quality accountability framework applies to several quality impairment scenarios. This framework uses principles of ISO/IEC 17788 “Cloud computing - Overview and vocabulary“ i.1 and ISO/IEC 17789 “Cloud Computing - Reference Architecture“ i.2 to the E

27、TSI NFV architecture i.12 to enable quality measurements consistent with both “TL 9000 Quality Management System Measurements Handbook“ and “Network Functions Virtualisation (NFV); Service Quality Metrics“ and SLA management consistent with TM Forums “SLA Management Guidebook“ and “Enabling End-to-E

28、nd Cloud SLA Management.“ ETSI ETSI GS NFV-REL 005 V1.1.1 (2016-01)6 1 Scope The present document describes a quality accountability framework for NFV. This release focuses on service quality management of network services, VNFs, NFV infrastructure, management and orchestration elements. The present

29、 document describes the following aspects of the Quality Accountability Framework: 1) Roles, covered in clause 4 Roles in the NFV Ecosystem. 2) Responsibilities, covered in clauses 5 Responsibilities by Role and 6 Responsibilities for Key Cloud Characteristics. 3) Service quality measurements and de

30、marcation points, covered in clause 7 Quality Measurement Framework. 2 References 2.1 Normative references References are either specific (identified by date of publication and/or edition number or version number) or non-specific. For specific references, only the cited version applies. For non-spec

31、ific references, the latest version of the referenced document (including any amendments) applies. Referenced documents which are not found to be publicly available in the expected location might be found at http:/docbox.etsi.org/Reference. NOTE: While any hyperlinks included in this clause were val

32、id at the time of publication, ETSI cannot guarantee their long term validity. The following referenced documents are necessary for the application of the present document. Not applicable. 2.2 Informative references References are either specific (identified by date of publication and/or edition num

33、ber or version number) or non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the referenced document (including any amendments) applies. NOTE: While any hyperlinks included in this clause were valid at the time of publication, ET

34、SI cannot guarantee their long term validity. The following referenced documents are not necessary for the application of the present document but they assist the user with regard to a particular subject area. i.1 ISO/IEC 17788 (First edition) (2014-10-15): “Information technology - Cloud computing

35、- Overview and vocabulary“. NOTE: Available at http:/standards.iso.org/ittf/PubliclyAvailableStandards/c060544_ISO_IEC_17788_2014.zip. i.2 ISO/IEC 17789 (First edition) (2014-10-15): “Information Technology - Cloud Computing - Reference Architecture“. NOTE: http:/standards.iso.org/ittf/PubliclyAvail

36、ableStandards/c060545_ISO_IEC_17789_2014.zip. i.3 TM Forum, TR 178 (V2.0.2) (October 2014): “Enabling End-to-End Cloud SLA Management“, Framework Release 14. NOTE: https:/www.tmforum.org/resources/technical-report-best-practice/tr178-enabling-end-to-end-cloud-sla-management-v2-0-2/. ETSI ETSI GS NFV

37、-REL 005 V1.1.1 (2016-01)7 i.4 TM Forum Guidebook GB917 (July 2012): “SLA Management Guidebook, Release 3.1“. NOTE: https:/www.tmforum.org/resources/standard/gb917-sla-management-handbook-release-3-1/. i.5 QuestForum (Release 5.0, July 2012): “TL 9000 Measurements Handbook“. NOTE: Available at http:

38、/www.tl9000.org/handbooks/measurements_handbook.html. i.6 ETSI GS NFV-INF 010 (V1.1.1) (12-2014): “Network Functions Virtualisation (NFV); Service Quality Metrics“. i.7 ISO 9000 (Third Edition) (September 2005): “Quality Management Systems - Fundamentals and Vocabulary“. i.8 “Quality Measurement of

39、Automated Lifecycle Management Actions“, 1.0, August 18th, 2015, QuEST Forum. NOTE: http:/www.tl9000.org/resources/documents/QuEST_Forum_ALMA_Quality_Measurement_150819.pdf. i.9 ETSI GS NFV-MAN 001 (V1.1.1) (12-2014): “Network Functions Virtualisation (NFV); Management and Orchestration“. i.10 ETSI

40、GS NFV 003 (V1.2.1) (12-2014): “Network Functions Virtualisation (NFV); Terminology for Main Concepts in NFV“. i.11 ETSI GS NFV-REL 004 (09-2015): “Network Functions Virtualisation (NFV); Active monitoring Architectural Framework“. i.13 ISO 9001:2015: “Quality management systems - Requirements“. i.1

41、4 ISO 14001:2015: “Environmental management systems - Requirements with guidance for use“. i.15 ISO 27729:2012: “Information and documentation - International standard name identifier (ISNI)“. i.16 ISO/IEC 27001:2013: “Information technology - Security techniques - Information security management sy

42、stems - Requirements“. 3 Definitions and abbreviations 3.1 Definitions For the purposes of the present document, the terms and definitions given in ETSI GS NFV 003 i.10 and the following apply: audit: systematic, independent and documented process for obtaining audit evidence and evaluating it objec

43、tively to determine the extent to which audit criteria are fulfilled NOTE 1: Internal audits, sometimes called first-party audits, are conducted by, or on behalf of, the organization itself for management review and other internal purposes, and may form the basis for an organizations declaration of

44、conformity. In many cases, particularly in smaller organizations, independence can be demonstrated by the freedom from responsibility for the activity being audited. NOTE 2: External audits include those generally termed second- and third-party audits. Second-party audits are conducted by parties ha

45、ving an interest in the organization, such as customers, or by other persons on their behalf. Third-party audits are conducted by external, independent auditing organizations, such as those providing certification/registration of conformity to ISO 9001 i.13 or ISO 14001 i.14. NOTE 3: This definition

46、 is from i.7, clause 3.9.1. ETSI ETSI GS NFV-REL 005 V1.1.1 (2016-01)8 cloud auditor: cloud service partner with the responsibility to conduct an audit of the provision and use of cloud services NOTE: This definition is from i.1, clause 3.2.3. cloud computing: paradigm for enabling network access to

47、 a scalable and elastic pool of shareable physical or virtual resources with self-service provisioning and administration on-demand NOTE 1: Examples of resources include servers, operating systems, networks, software, applications, and storage equipment. NOTE 2: This definition is from i.1, clause 3

48、.2.5. cloud service: one or more capabilities offered via cloud computing invoked using a defined interface NOTE: This definition is from i.1, clause 3.2.8. cloud service broker: cloud service partner that negotiates relationships between cloud service customers and cloud service providers NOTE: Thi

49、s definition is from i.1, clause 3.2.9. cloud service customer: party which is in a business relationship for the purpose of using cloud service NOTE1: A business relationship does not necessarily imply financial agreements. NOTE 2: This definition is from i.1, clause 3.2.11. cloud service developer: sub-role of cloud service partner which is responsible for designing, developing, testing and maintaining the implementation of a cloud service NOTE 1: This can involve composing the service implemen

展开阅读全文
相关资源
猜你喜欢
  • CNS 14380-1-1999 Banking - Key management (retail) - Part1 Introduction to key management《银行业-零售式金钥管理-第1部:金钥管理导论》.pdf CNS 14380-1-1999 Banking - Key management (retail) - Part1 Introduction to key management《银行业-零售式金钥管理-第1部:金钥管理导论》.pdf
  • CNS 14380-2-1999 Banking - Key management (retail) - Part 2 Key management techniques for symmetric ciphers《银行业-零售式金钥管理-第2部:对称密码系统之金钥管理技术》.pdf CNS 14380-2-1999 Banking - Key management (retail) - Part 2 Key management techniques for symmetric ciphers《银行业-零售式金钥管理-第2部:对称密码系统之金钥管理技术》.pdf
  • CNS 14380-3-1999 Banking - Key management (retail) - Part 3 Key life cycle for symmetric ciphers《银行业-零售式金钥管理-第3部:对称密码系统之金钥生命周期》.pdf CNS 14380-3-1999 Banking - Key management (retail) - Part 3 Key life cycle for symmetric ciphers《银行业-零售式金钥管理-第3部:对称密码系统之金钥生命周期》.pdf
  • CNS 14381-1-2007 Information technology - Security techniques - Key management-Part 1  Framework《信息技术-安全技术-金钥管理-第1部:框架》.pdf CNS 14381-1-2007 Information technology - Security techniques - Key management-Part 1 Framework《信息技术-安全技术-金钥管理-第1部:框架》.pdf
  • CNS 14381-2-1999 Information technology-Security techniques - Key management - Part 2 Mechanisms using symmetric techniques《信息技术-安全技术-金钥管理-第2部:使用对称技术的机制》.pdf CNS 14381-2-1999 Information technology-Security techniques - Key management - Part 2 Mechanisms using symmetric techniques《信息技术-安全技术-金钥管理-第2部:使用对称技术的机制》.pdf
  • CNS 14381-3-2007 Information technology - Security techniques - Key management - Part 3  Mechanism using asymmetric techniques《信息技术-安全技术-金钥管理-第3部:使用非对称技术的机制》.pdf CNS 14381-3-2007 Information technology - Security techniques - Key management - Part 3 Mechanism using asymmetric techniques《信息技术-安全技术-金钥管理-第3部:使用非对称技术的机制》.pdf
  • CNS 14382-1999 General requirements for protective gloves《防护手套一般要求》.pdf CNS 14382-1999 General requirements for protective gloves《防护手套一般要求》.pdf
  • CNS 14383-1999 Method of test for high-resolution gamma-ray spectrometry of water《水样之高分辨率加马能谱测定法》.pdf CNS 14383-1999 Method of test for high-resolution gamma-ray spectrometry of water《水样之高分辨率加马能谱测定法》.pdf
  • CNS 14384-1-1999 Protective gloves against chemicals and micro-organisms - Part 1 Terminology and performance requirements《化学药品及微生物防护手套-用语及性能要求》.pdf CNS 14384-1-1999 Protective gloves against chemicals and micro-organisms - Part 1 Terminology and performance requirements《化学药品及微生物防护手套-用语及性能要求》.pdf
  • 相关搜索

    当前位置:首页 > 标准规范 > 国际标准 > 其他

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1