欢迎来到麦多课文档分享! | 帮助中心 海量文档,免费浏览,给你所需,享你所想!
麦多课文档分享
全部分类
  • 标准规范>
  • 教学课件>
  • 考试资料>
  • 办公文档>
  • 学术论文>
  • 行业资料>
  • 易语言源码>
  • ImageVerifierCode 换一换
    首页 麦多课文档分享 > 资源分类 > PDF文档下载
    分享到微信 分享到微博 分享到QQ空间

    ETSI GS NFV-REL 002-2015 Network Functions Virtualisation (NFV) Reliability Report on Scalable Architectures for Reliability Management (V1 1 1)《网络虚拟化技术 (NFV) 可靠性 可靠性管理的可扩展架构报告 (V1.pdf

    • 资源ID:733370       资源大小:1,004.61KB        全文页数:32页
    • 资源格式: PDF        下载积分:10000积分
    快捷下载 游客一键下载
    账号登录下载
    微信登录下载
    二维码
    微信扫一扫登录
    下载资源需要10000积分(如需开发票,请勿充值!)
    邮箱/手机:
    温馨提示:
    如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如需开发票,请勿充值!如填写123,账号就是123,密码也是123。
    支付方式: 支付宝扫码支付    微信扫码支付   
    验证码:   换一换

    加入VIP,交流精品资源
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    ETSI GS NFV-REL 002-2015 Network Functions Virtualisation (NFV) Reliability Report on Scalable Architectures for Reliability Management (V1 1 1)《网络虚拟化技术 (NFV) 可靠性 可靠性管理的可扩展架构报告 (V1.pdf

    1、 ETSI GS NFV-REL 002 V1.1.1 (2015-09) Network Functions Virtualisation (NFV); Reliability; Report on Scalable Architectures for Reliability Management Disclaimer This document has been produced and approved by the Network Functions Virtualisation (NFV) ETSI Industry Specification Group (ISG) and rep

    2、resents the views of those members who participated in this ISG. It does not necessarily represent the views of the entire ETSI membership. GROUP SPECIFICATION ETSI ETSI GS NFV-REL 002 V1.1.1 (2015-09)2 Reference DGS/NFV-REL002 Keywords architecture, NFV, reliability ETSI 650 Route des Lucioles F-06

    3、921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88 Important notice The present document can be downloaded from: http:/www.etsi.org/standards-searc

    4、h The present document may be made available in electronic versions and/or in print. The content of any electronic and/or print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any existing or perceived difference in contents between

    5、such versions and/or in print, the only prevailing document is the print of the Portable Document Format (PDF) version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information

    6、 on the current status of this and other ETSI documents is available at http:/portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: https:/portal.etsi.org/People/CommiteeSupportStaff.aspx Copyright Notification No

    7、part may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm except as authorized by written permission of ETSI. The content of the PDF version shall not be modified without the written authorization of ETSI. The copyright and the for

    8、egoing restriction extend to reproduction in all media. European Telecommunications Standards Institute 2015. All rights reserved. DECTTM, PLUGTESTSTM, UMTSTMand the ETSI logo are Trade Marks of ETSI registered for the benefit of its Members. 3GPPTM and LTE are Trade Marks of ETSI registered for the

    9、 benefit of its Members and of the 3GPP Organizational Partners. GSM and the GSM logo are Trade Marks registered and owned by the GSM Association. ETSI ETSI GS NFV-REL 002 V1.1.1 (2015-09)3 Contents Intellectual Property Rights 4g3Foreword . 4g3Modal verbs terminology 4g31 Scope 5g32 References 5g32

    10、.1 Normative references . 5g32.2 Informative references 6g33 Definitions and abbreviations . 7g33.1 Definitions 7g33.2 Abbreviations . 7g34 Scalable Architecture and NFV 8g34.1 Introduction 8g34.2 Overview of Current Adoption in Cloud Data Centres 9g34.3 Applicability to NFV 9g35 Scaling State . 10g

    11、35.1 Context . 10g35.2 Categories of Dynamic State 13g35.3 Challenges 14g36 Methods for Achieving High Availability 15g36.1 High Availability Scenarios . 15g36.2 Dynamic Scaling with Migration Avoidance . 16g36.3 Lightweight Rollback Recovery . 20g36.3.1 Overview 20g36.3.2 Checkpointing . 21g36.3.3

    12、Checkpointing with Buffering 22g36.3.4 Checkpointing with Replay 23g36.3.5 Summary Trade-offs of Rollback Approaches . 24g37 Recommendations 24g37.1 Conclusion 24g37.2 Guidelines for Scalable Architecture Components . 24g37.3 Future Work . 25g3Annex A (informative): Experimental Results . 26g3A.1 Mi

    13、gration Avoidance Results . 26g3A.2 Lightweight Rollback Recovery Results 27g3A.2.1 Introduction 27g3A.2.2 Latency . 28g3A.2.3 Throughput . 29g3A.2.4 Replay Time . 29g3A.2.5 Conclusion 30g3Annex B (informative): Authors Essential, or potentially Essential, IPRs notified to ETSI in respect of ETSI st

    14、andards“, which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web server (http:/ipr.etsi.org). Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee can be given as to the existence of other IPRs not r

    15、eferenced in ETSI SR 000 314 (or the updates on the ETSI Web server) which are, or may be, or may become, essential to the present document. Foreword This Group Specification (GS) has been produced by ETSI Industry Specification Group (ISG) Network Functions Virtualisation (NFV). Modal verbs termino

    16、logy In the present document “shall“, “shall not“, “should“, “should not“, “may“, “need not“, “will“, “will not“, “can“ and “cannot“ are to be interpreted as described in clause 3.2 of the ETSI Drafting Rules (Verbal forms for the expression of provisions). “must“ and “must not“ are NOT allowed in E

    17、TSI deliverables except when used in direct citation. ETSI ETSI GS NFV-REL 002 V1.1.1 (2015-09)5 1 Scope The present document describes a study of how todays Cloud/Data Centre techniques can be adapted to achieve scalability, efficiency, and reliability in NFV environments. These techniques are desi

    18、gned for managing shared processing state with low-latency and high-availability requirements. They are shown to be application-independent that can be applied generally, rather than have each VNF use its own idiosyncratic method for meeting these goals. Although an individual VNF could manage its o

    19、wn scale and replication, the techniques described here require a single coherent manager, such as an orchestrator, to manage the scale and capacity of many disparate VNFs. Todays IT/Cloud Data Centres exhibit very high availability levels by limiting the amount of unique state in a single element a

    20、nd creating a virtual network function from a number of small replicated components whose functional capacity can be scaled in and out by adjusting the running number of components. Reliability and availability for these type of VNFs is provided by a number of small replicated components. When an in

    21、dividual component fails, little state is lost and the overall VNF experiences minimal change in functional capacity. Capacity failures can be recovered by instantiating additional components. The present document considers a variety of use cases, involving differing levels of shared state and diffe

    22、rent reliability requirements; each case is explored for application-independent ways to manage state, react to failures, and respond to increased load. The intent of the present document is to demonstrate the feasibility of these techniques for achieving high availability for VNFs and provide guida

    23、nce on Best Practices for scale out system architectures for the management of reliability. As such, the architectures described in the present document are strictly illustrative in nature. Accordingly, the scope of the present document is stated as follows: Provide an overview of how such architect

    24、ures are currently deployed in Cloud/Data Centres. Describe various categories of state and how scaling state can be managed. Describe scale-out techniques for instantiating new VNFs in a single location where failures have occurred or unexpected traffic surges have been experienced. Scale-out may b

    25、e done over multiple servers within a location or in a server in the same rack or cluster within any given location. Scaling out over servers in multiple locations can be investigated in follow-up studies. Develop guidelines for monitoring state such that suitable requirements for controlling elemen

    26、ts (e.g. orchestrator) can be formalized in follow-up studies. 2 References 2.1 Normative references References are either specific (identified by date of publication and/or edition number or version number) or non-specific. For specific references, only the cited version applies. For non-specific r

    27、eferences, the latest version of the referenced document (including any amendments) applies. Referenced documents which are not found to be publicly available in the expected location might be found at http:/docbox.etsi.org/Reference. NOTE: While any hyperlinks included in this clause were valid at

    28、the time of publication, ETSI cannot guarantee their long term validity. The following referenced documents are necessary for the application of the present document. Not applicable. ETSI ETSI GS NFV-REL 002 V1.1.1 (2015-09)6 2.2 Informative references References are either specific (identified by d

    29、ate of publication and/or edition number or version number) or non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the referenced document (including any amendments) applies. NOTE: While any hyperlinks included in this clause were

    30、 valid at the time of publication, ETSI cannot guarantee their long term validity. The following referenced documents are not necessary for the application of the present document but they assist the user with regard to a particular subject area. i.1 R. Strom and S. Yemini: “Optimistic Recovery in D

    31、istributed Systems“, ACM Transactions on Computer Systems, 3(3):204-226, August 1985. i.2 Sangjin Han, Keon Jang, Dongsu Han and Sylvia Ratnasamy: “A Software NIC to Augment Hardware“, in Submission to 25thACM Symposium on Operating Systems Principles (2015). i.3 E.N. Elnozahy, Lorenzo Alvisi, Yi-Mi

    32、n Wang, David Johnson: “A Survey of Rollback-Recovery Protocols in Message-Passing Systems“, ACM Computing Surveys, Vol. 34, Issue 3, September 2002, pages 375-408. i.4 B. Cully, G. Lefebvre, D. Meyer, M. Feeley, N. Hutchinson and A. Warfield: “Remus: High Availability via Asynchronous Virtual Machi

    33、ne Replication“. In Proceedings USENIX NSDI, 2008. i.5 Kemari Project. NOTE: Available at http:/ i.6 J. Sherry, P. Gao, S. Basu, A. Panda, A. Krishnamurthy, C. Macciocco, M. Manesh, J. Martins, S. Ratnasamy, L. Rizzo and S. Shenker: “Rollback Recovery for Middleboxes“, Proceedings of the ACM, SIGCOM

    34、M, 2015. i.7 ETSI NFV Reliability Working Group Work Item DGS/NFV-REL004 (V0.0.5), June 2015: “Report on active Monitoring and Failure Detection in NFV Environments“. i.8 OPNFV Wiki: “Project: Fault Management (Doctor)“. NOTE: Available at https:/wiki.opnfv.org/doctor. i.9 E. Kohler et al.: “Click M

    35、odular Router“, ACM Transactions on Computer Systems, August 2000. i.10 “Riverbed Completes Acquisition of Mazu Networks“. NOTE: Available at: http:/ i.11 Digital Corpora: “2009-M57-Patents packet trace“. i.12 S. Rajagopalan et al.: “Pico Replication: A High Availability Framework for Middleboxes“,

    36、Proceedings of ACM SoCC, 2013. i.13 Remus PV domU Requirements. NOTE: Available at http:/wiki.xen.org/wiki/Remus_PV_domU_requirements. i.14 B. Cully et al.: “Remus: High Availability via Asynchronous Virtual Machine Replication“, Proceedings USENIX NSDI, 2008. i.15 Lee D. and Brownlee N.: “Passive M

    37、easurement of One-way and Two-way Flow Lifetimes“, ACM SIGCOMM Computer Communications Review 37, 3 (November 2007). ETSI ETSI GS NFV-REL 002 V1.1.1 (2015-09)7 3 Definitions and abbreviations 3.1 Definitions For the purposes of the present document, the following terms and definitions apply: affinit

    38、y: for the purposes of the present document, property whereby a flow is always directed to the VNF instance that maintains the state needed to process that flow checkpoint: snapshot consisting of all state belonging to a VNF; required to make an identical “copy“ of the running VNF on another system

    39、NOTE: One way to generate a checkpoint is by using memory snapshotting built in to the hypervisor. core: independent processing unit within a CPU which executes program instructions correct recovery: A system recovers correctly if its internal state after a failure is consistent with the observable

    40、behaviour of the system before the failure. NOTE: See i.1 for further details. flow: sequence of packets that share the same 5-tuple: source port and IP address, destination port and IP address, and protocol non-determinism: A program is non-deterministic if two executions of the same code over the

    41、same inputs may generate different outputs. NOTE: Programs which when given the same input are always guaranteed to produce the same output are called deterministic. stable storage: memory, SSD, or disk storage whose failure conditions are independent of the failure condition of the VNF; stable stor

    42、age should provide the guarantee that even if the VNF fails, the stable storage will remain available state: contents of all memory required to execute the VNF, e.g. counters, timers, tables, protocol state machines thread: concurrent unit of execution, e.g. p-threads or process.h threads 3.2 Abbrev

    43、iations For the purposes of the present document, the following abbreviations apply: CDF Cumulative Distribution Function CPU Central Processing Unit DDoS Distributed Denial of Service DHCP Dynamic Host Configuration Protocol DPDK Data Plane Development Kit DPI Deep Packet Inspection FTMB Fault Tole

    44、rant MiddleBox Gbps Giga bits per second HA High AvailabilityIDS Intrusion Detection System IP Internet Protocol Kpps Kilo packets per second Mpps Mega packets per second NAT Network Address Translation NFV Network Function Virtualisation NFVI Network Function Virtualisation Infrastructure NIC Netwo

    45、rk Interface Controller NUMA Non Uniform Memory Access QoS Quality of Service TCP Transmission Control Protocol VF Virtual FunctionVM Virtual Machine ETSI ETSI GS NFV-REL 002 V1.1.1 (2015-09)8 VNF Virtualised Network Function VPN Virtual Private Network WAN Wide Area Network 4 Scalable Architecture

    46、and NFV 4.1 Introduction Traditional reliability management in telecommunications networks typically depends on a variety of redundancy schemes. For example, spare resources may be designated in some form of standby mode; these resources are activated in the event of network failures such that servi

    47、ce outages are minimized. Alternately, over-provisioning of resources may also be considered (active-active mode) such that if one resource fails, the remaining resources can still process traffic loads. The advent of Network Functions Virtualisation (NFV) ushered in an environment where the focus o

    48、f telecommunications network operations shifted from specialized and sophisticated hardware with potentially proprietary software functions residing on them towards commoditized and commercially available servers and standardized software that can be loaded up on them on an as needed basis. In such

    49、an environment, Service Providers can enable dynamic loading of Virtual Network Functions (VNF) to readily available servers as and when needed - this is referred to as “scaling out“ (see note). Traffic loads can vary with bursts and spikes of traffic due to external events; alternately network resource failures may reduce the available resources to process existing load adequately. The management of high a


    注意事项

    本文(ETSI GS NFV-REL 002-2015 Network Functions Virtualisation (NFV) Reliability Report on Scalable Architectures for Reliability Management (V1 1 1)《网络虚拟化技术 (NFV) 可靠性 可靠性管理的可扩展架构报告 (V1.pdf)为本站会员(diecharacter305)主动上传,麦多课文档分享仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文档分享(点击联系客服),我们立即给予删除!




    关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1 

    收起
    展开