0% found this document useful (0 votes)
123 views

20 Introduction To SDN and NFV

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
123 views

20 Introduction To SDN and NFV

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 53

Revision Record Do Not Print this Page

Course Code Product Product Version Course Version

Author/ID Date Reviewer/ID New/ Update

Wan Changli/wwx408647 2020.2.17

Page 0 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
SDN and NFV Overview

Page 1 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Foreword
● The open ecosystem of the computing industry brings booming development of multiple
fields, such as Commercial Off-the-Shelf (COTS), operating system, virtualization,
middleware, cloud computing, and software applications. The network industry is also
seeking transformation and development. Software Defined Networking (SDN) and
Network Functions Virtualization (NFV) are mainly used.

● This course aims to help engineers understand the development of SDN and NFV and
introduce Huawei SDN and NFV solutions.

Page 2 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Objectives
● Upon completion of this course, you will be able to:
▫ Describe the development of SDN and NFV.

▫ Understand basic principles of OpenFlow.

▫ Understand Huawei SDN solution.

▫ Understand the standard NFV architecture.

▫ Understand Huawei NFV solution.

Page 3 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. SDN Overview
2. NFV Overview

Page 4 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Evolution of the Computer Era
Mainframe PC (compatible)

App

Open interface
Dedicated application

Windows Mac
or Linux or
Dedicated OS (OS) OS

Dedicated hardware Open interface

Microprocessorr

Vertical integration and closed interfaces Horizontal integration and open interfaces
Small-scale industry applications Large-scale application across industries

Page 5 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Network Industry Development: Implications
from the IT Industry
● The transformation of the IT industry has triggered the thinking of the network industry. The industry has proposed the
SDN concept and has made attempts to put SDN into commercial use, aiming to make networks more open, flexible,
and simple.
Computing Industry Openness Promotes Ecosystem Development What About Network Industry Changes

Cloud service Comprehensive cloud


ECS EVS services
Database
Various virtualization
Middleware technologies, …

operating systems,
OS middleware, database
FusionSphere Network application
software, etc.
Virtualization …

SDN controller
Server, storage Storage array PC …
device, PC x86/ARM server Hardware network device

Universal • Does the network industry build a


hardware Memory Hard disk … hierarchical and open ecosystem
x86/ARM chip according to the computing industry?

Page 6 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Current Situation of the Network Industry:
Typical IP Network - Distributed Network
● The typical IP network is a distributed network with peer-to-peer control. Each network device has independent
forwarding, control, and management planes. The control plane of a network device exchanges packets of a routing
protocol to generate an independent data plane to guide packet forwarding.

● The advantage of a typical IP network is that network devices are


decoupled from protocols, devices from different vendors are compatible Management
Control plane
plane
with each other, and network convergence is ensured in fault scenarios. Forwarding plane

Router-A

Forwarding table, protocol,


and algorithm

Management plane

Configuration commands
Control plane

Unknown data Forwarding Management Management


Control plane Control plane
frame behavior plane plane

Data forwarding Forwarding plane Forwarding plane

Forwarding plane Router-B Router-C

Receive frames
Send frames

Page 7 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Thinking in the Network Field: Problems
Faced by Typical Networks

Frequent network congestion Complex network technologies

?
Difficult O&M Slow service deployment

Page 8 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Frequent Network Complex Slow Service
Difficult O&M
Congestion Technologies Deployment

Frequent Network Congestion


Problem and Solution of Bandwidth-based Route Problem and Solution of Tunnel Establishment Based on Fixed
Selection Sequence
Tunnels are established in sequence: 1. A-E; 2. A-G; 3. C-H. Tunnel 3 fails
A B to be established due to insufficient bandwidth.
1G/5G 2 3
B C D
2G/10G

C A F G H E
6G/5G 1
Used bandwidth/Total D E
bandwidth
Global path calculation and optimal tunnel path adjustment:

The network computes forwarding paths based on


2
bandwidth. The link from router C to router D is the shortest B C D
forwarding path. The volume of service traffic from router C
to router D exceeds the bandwidth, causing packet loss. 3
Although other links are idle, the algorithm still selects the
A 1 F G H E
shortest path for forwarding. The optimal traffic forwarding
path is C-A-D.

Page 9 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Frequent Network Complex Slow Service
Difficult O&M
Congestion Technologies Deployment

Complex Network Technologies


Many network protocols: Network technology Difficult network configuration: To be familiar with
experts need to learn many RFCs related to network devices of a specific vendor, you need to master
devices. Understanding the RFCs takes a long time, tens of thousands of commands. Additionally, the
and the number of RFCs is still increasing. number of commands is still increasing.

10
00
0

Page 10 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Frequent Network Complex Difficult Slow Service
Congestion Technologies O&M Deployment

Difficulty in Locating and Analyzing Network


Faults
Difficult to Spot Faults Difficult to Locate Faults

Manual packet Abnormal flows account for 3.65% of all flows on the network.
Manual fault
obtaining for locating Manual fault diagnosis
identification
faults

The network faults


that are found
upon user
complaints are just
the tip of the
iceberg.

• Traditional O&M networks rely on manual fault • Traditional O&M only monitors device indicators. Some
identification, location, and diagnosis. indicators are normal, but user experience is poor. There is
• More than 85% of network faults are found only after no correlated analysis of users and networks.
service complaints. Problems cannot be proactively • According to data center network (DCN) statistics, it takes 76
identified or analyzed. minutes to locate a fault on average.

Page 11 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Frequent Network Complex Slow Service
Difficult O&M
Congestion Technologies Deployment

Slow Network Service Deployment


Network policy
Complex and inflexible network policy changes:
Network policies cannot be defined by user. Policy changes
are complex and cannot be flexibly adjusted.
Access Bandwidth QoS Other

policy policy policy policies
IP address-based, fixed location,
and CLI-based configuration

Service network
Long service deployment period:
New service deployment involves E2E device configuration
VN for office VN for scientific VN for video modification.
purposes research surveillance
End-to-end configuration using
commands

Physical network
Low physical network deployment efficiency:
The physical network does not support zero touch
provisioning (ZTP).

Command line-based
configuration by device

Page 12 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
SDN Origin
● SDN was developed by the Clean Slate Program at Stanford University as an innovative new network architecture. The
core of SDN is to separate the control plane from the data plane of network devices to implement centralized control of
the network control plane and provide good support for network application innovation.

● SDN has three characteristics in initial phase: forwarding-control separation, centralized control, and open
programmable interfaces.

SDN application

The control plane functions are


provided by the controller.
Control
OpenFlow controller
plane
Control
plane OpenFlow
OpenFlow interconnection
Forwarding
plane
Forwarding
plane
OpenFlow switches
OpenFlow switches have only the data plane.

Page 13 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Basic Concepts of OpenFlow
● OpenFlow is an SBI protocol between a controller and a switch. It defines three types of messages:
Controller-to-Switch, Asynchronous, and Symmetric. Each message contains more subtypes.

Controller-to-Switch
OpenFlow Controller
This message is sent by the controller. It is used to manage
and query switch information.

Asynchronous

OpenFlow This message is initiated by a switch. When the status of the


switch changes, the switch sends this message to notify the
controller of the status change.

Symmetric
This message can be initiated by a switch or controller.
Symmetric messages include Hello, Echo, and Error
OpenFlow switches messages.

Page 14 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Flow Table Overview
● OpenFlow switches forward packets based on flow tables.

● Each flow entry includes the Match Fields, Priority, Counters, Instructions, Timeouts, Cookie, and Flags.
The Match Fields and Instructions are key fields for packet forwarding.
▫ The Match Fields is a field against which a packet is matched and can be customized.

▫ The Instructions field indicates OpenFlow processing when a packet matches a flow entry.

Match
Priority Counters Instructions Timeouts Cookie Flags
Fields

Flow table fields can be customized. The


following table is an example.
Ingress Ether Ether Ether VLAN TCP TCP
VLAN ID IP Src IP Dst
Port Source Dst Type Priority Src Port Dst Port
3 MAC1 MAC2 0x8100 10 7 IP1 IP2 5321 8080

Page 16 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Comparison Between Forwarding Modes
Typical Routing Protocol: OpenFlow:
Packet Forwarding Based on Routing Tables Packet Forwarding Based on Flow Tables
OpenFlow controller
Routing protocol
10.0.0.0/30 10.0.0.0/30
1.1.1.1 1.1.1.2

G0/0/1
Flow table
matching
process:
Table 0 Table 1 … Table N
Routing Destination Outbound
Protocol Next Hop
table Network Interface
Flow Match
Priority Counters Instructions Timeouts Cookie
10.0.0.0/30 OSPF 1.1.1.2 G0/0/1 table Fields

• In typical cases, network devices query routing tables to guide • OpenFlow is a network protocol. Switches running OpenFlow
traffic forwarding. forward traffic based on flow tables.
• Entries in a routing table are calculated by running a routing • Flow tables are calculated by the OpenFlow controller and then
protocol between network devices. delivered to switches.
• The length of the routing table is fixed. Network devices • A flow table has variable length and defines various matching and
forward packets based on the longest match rule. A network forwarding rules. A network device has multiple flow tables.
device has only one routing table.

Page 17 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Essential Requirements of SDN
● The essence of SDN is to make networks more open, flexible, and simple. It builds a centralized brain for a
network and implements fast service deployment, traffic optimization, or network service openness through
centralized control in the global view.

● SDN has the following benefits:


▫ Provides centralized management, simplifying network management and O&M.

▫ Shields technical differences, simplifies network configuration, and reduces O&M costs.

▫ Offers automatic optimization, improving network utilization.

▫ Deploys services rapidly, shortening the service rollout time.

▫ Builds an open network, supporting open and programmable third-party applications.

SDN transforms network architecture.

Page 18 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
SDN Network Architecture
● The SDN network architecture consists of the orchestration application layer, controller layer, and device layer. Different
layers are connected through open interfaces. From the perspective of the controller layer, SBIs oriented to the device
layer and NBIs oriented to the orchestration application layer are distinguished. OpenFlow is one of SBI protocols.

Orchestration application layer Service


App collaboration

NBI

Service
Controller layer
orchestration

SB
I
Device layer Data
forwarding

Page 19 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Huawei SDN Network Architecture
● Huawei SDN network architecture supports various SBIs and NBIs, including OpenFlow, OVSDB, NETCONF, PCEP,
RESTful, SNMP, BGP, JSON-RPC, and RESTCONF interfaces.

Network Cloud
EMS Orchestration Apps
Applications platform

NBI plane RESTful SNMP MTOSI/CORBA Kafka/SFTP RESTCONF

Open NBI

Open SBI
PCEP NETCONF OpenFlow BGP-LS OVSDB SNMP BGP Json-RPC
Telemetry
Interface Interface Interface Interface Interface Interface Interface Interface

Forwarding Security
AP Switch CPE Router VNF
device gateway

Page 20 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Huawei SDN Solution - Integrating Management, Control,
and Analysis to Build an Intent-Driven Network

Application Cloud Self-help Mobile Third-party …


layer platform portal app app

Network
management
and control Manager Controller Analyzer
layer

AP AP
DC Fabric

Campus Campus
CPE CPE

Network layer WAN/DCI WAN/DCI

DC Fabric

Branch SD-WAN
CPE Branch
CPE

Page 21 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Introduction to iMaster NCE
● Huawei iMaster NCE is the industry intelligent network automation platform that integrates management,
control, analysis, and AI capabilities.
SDN-based automatic service Unified data base Full lifecycle management
configuration/deployment Detection, location, and Simulation verification and
AI-based intelligent analysis, prediction, troubleshooting monitoring optimization
and troubleshooting
Planning + Construction +
Automation + Intelligence Manager + Controller + Analyzer
Maintenance + Optimization

2 3 4

Autonomous Driving Network


NMS Controller Analyzer System
Network
=

Page 22 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
iMaster NCE Application

DC iMaster NCE-Fabric *

Enterprise
iMaster NCE-Campus *
campus

SD-WAN iMaster NCE-WAN

IP WAN iMaster NCE-IP

WAN
iMaster NCE-T
transmission

* iMaster NCE-Fabric and iMaster


NCE-Campus are introduced in this
document.

Page 23 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Enterprise
DC
Campus

Huawei CloudFabric DCN Autonomous


Driving Network Solution
● Based on iMaster NCE-Fabric, DCNs provide full-lifecycle services from planning, construction, O&M, to optimization.

Service Intent/Strategy
Integrated planning and construction:
• The planning tool interconnects with iMaster NCE-Fabric to implement
Simplification elements
integrated planning and construction.
• Zero Touch Provisioning (ZTP)

Analyzer
Simplified deployment
• Service intent self-understanding and conversion
+AI • Network change simulation and evaluation, eliminating human errors
Controller Manager

Intelligent O&M:
• Rapid fault detection and location based on knowledge graph and expert
experience
Telemetry & ERSPAN • Fast fault rectification based on expert experiences and simulation analysis
NETCONF & SNMP
Real-time optimization:
• AI-Fabric-oriented local traffic inference and online model training and
optimization
VM VM VM
VM VM VM
• User behavior prediction and resource optimization suggestions
VM VM VM

Page 24 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Enterprise
DC
Campus

Simplified ZTP Deployment


ZTP deployment process:
Network administrator
1. The network administrator clicks the icon on iMaster NCE to start
1
the ZTP task.

2. A device automatically obtains an IP address to access iMaster


5 NCE.

3. iMaster NCE determines the device role (spine or leaf node),


2 3 4 delivers configurations such as the management IP address, SNMP
configuration, and NETCONF configuration to online devices, and
manages the devices through the management IP address.
Spine
4. iMaster NCE globally delivers interconnection configurations as well
as OSPF or BGP configurations.
VXLAN
5. The device goes online successfully, and the administrator views
network-wide information on iMaster NCE.
Leaf

Note: The DC uses the spine-leaf architecture.

Page 25 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Enterprise
DC
Campus

Network Intent Self-understanding and Fast


Service Deployment
Network design Configuration delivery Service verification

2 to 3 days 10 minutes 1 to 2 days

iMaster NCE-Fabric
Verification result analysis

Intent conversion Network design Simulation verification Network configuration

Work order
Built-in model:
✔ ACL deployment 10 minutes
Intent model
✔ Network provisioning

Huawei iMaster NCE-Fabric supports automatic and fast deployment of virtualization, cloud computing,
and container networks.
Page 26 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Enterprise
DC
Campus

Network Change Simulation and Change Risk


Prediction

Configuration to be
Resource
changed
sufficiency
Live network
configuration Access
connectivity
Live network topology
information
Network Formal verification Impact on original
Live network resource modeling algorithm services
information

Data collection/upload Modeling and Computing Verification result


• Establish physical, logical, and • Check whether resources on the live network
application network models. are sufficient and whether the network is
• Use the formal verification algorithm connected.
for computing. • Analyze and display the impact of changes
on original services.

Page 27 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Enterprise
DC
Campus

AI-powered Intelligent O&M for DCNs


Collection Analysis Decision

Intelligent analysis engine


Knowledge BGP OSPF
flapping Interface
flapping
Huawei's 30+ years inference engine flapping

of O&M IS-IS
expert experience Router ID
flapping BFD
flapping
Manual
conflict
rectification
Exception
detection Intent-based
Continuous learning
and training Root cause loop closing
based on real site analysis
Knowledge Knowledge Knowledge Knowledge
faults
Risk prediction
Recommended
Model application emergency plan:
DC holographic data • Port isolation
Service flow
Data cleaning
AI exception Network object • Configuration rollback
data/Telemetry data identification modeling • Capacity expansion
recommendation

Page 28 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Enterprise
DC
Campus

Huawei CloudCampus Autonomous Driving


Network Solution
Fast network deployment, improving deployment efficiency by 600%
Analyzer One-stop management
platform • Device plug-and-play: simplified device deployment, scenario navigation, and
template-based configuration
Manager Controller
• Simplified network deployment: Network resource pooling, multi-purpose
network, and automatic service provisioning
Deploy
Design Policy
ment

Fast service provisioning, improving user experience by 100%

• Free mobility: GUI-based policy configuration, allowing users to access the


NETCONF/YANG network anytime and anywhere without changing the roaming permission and
Large- or Small- or user experience
medium-sized medium-sized
campus Campus campus
• Intelligent terminal identification: Anti-spoofing for terminal access, with an
interconnection intelligent terminal identification accuracy of over 95%
• Intelligent HQoS: Application-based scheduling and shaping, and refined
VN for office bandwidth management, ensuring service experience of key users
purposes WAN/
Internet Fast intelligent O&M, improving network performance by over 50%
VN for R&D

• Real-time experience visualization: Telemetry-based network experience


visualization at each moment, for each user, and in each area
• Precise fault analysis: Proactively identifying 85% of typical network issues and
VN for office Security Security Security providing suggestions, and comparing and analyzing real-time data to predict
group 1 group 2 group 3 • Access control policy
services faults
• Bandwidth • Intelligent network optimization: Predictive optimization of wireless networks
VN for R&D Security Security based on historical data, improving network-wide performance by over 50%
services group 4 group 5 • Priority (Source: Tolly Certification)

Page 29 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Enterprise
DC
Campus

Device Plug-and-Play
Deployment Through the Registration
Deployment by Scanning Bar Codes DHCP-based Deployment
Query Center

1 1 1 2
Registration
query center

4 4 3 5
3 4

DHCP server
3

2 2

1. Pre-configuration
1. Pre-configuration
1. Pre-configuration 2. Information synchronization
2. Obtaining registration information through the
2. Deployment by scanning bar codes 3. Obtaining registration information through the
DHCP server
3. Automatic device registration and login registration query center
3. Automatic device registration and login
4. Automatic configuration delivery 4. Automatic device registration and login
4. Automatic configuration delivery
5. Automatic configuration delivery

Page 30 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Enterprise
DC
Campus

Free Mobility:
Policy Management Based on Security Groups
● Free mobility: Enables users to have consistent network rights and security policies regardless of their
locations and IP addresses.

Security group Use security groups. A security group is


Security group Security group 1
for server a group of users for which the same
for sales users for R&D users
resources security policy is used.

2 Define security group-based permission


Right policy Experience policy
control policies and user experience policies
Deliver security policies
and deliver the policies to network devices.

3 A security group is authorized to a user after


the user passes access authentication.
Campus
network After user traffic enters a network, network
4
devices enforce policies based on the source
and destination security groups of the traffic.
Access authentication Access authentication Access authentication

User A User B User C

Page 31 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Enterprise
DC
Campus

Wired and Wireless Convergence


WLAN Construction Mode 1: Standalone AC WLAN Construction Mode 2: AC Card
• This mode poses a wireless
traffic bottleneck and
increases faulty nodes. AC Card

• Wired and wireless • An AC card is installed on a


Independent AC
management is independent. switch to provide AC functions.

• Wired and wireless • Hardware-level convergence.


authentication points are
separated.

Wired and wireless authentication point separation, distributed policy control, separation of control and data traffic forwarding, and troubleshooting and
management difficulties.

Wired and Wireless Convergence (Native AC)

The switch integrates the AC function, eliminating wireless traffic forwarding bottlenecks and reducing fault
Native AC nodes. Wired and wireless devices are centrally managed.
• Unified management and converged forwarding of wired and wireless services
• Converged management for wired and wireless users and gateway convergence
• Converged authentication points for wired and wireless access
• Unified wired and wireless policy execution

Page 32 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Enterprise
DC
campus

Intelligent Terminal Identification,


Ensuring Secure Access
Requirements
and Challenges Huawei supports identification of
1000+ office or IoT terminals.
A university
Built-in terminal
50+ types of smart terminals fingerprint library

Terminal information is
collected by IT
departments of colleges: >>
MAC address collection is
difficult and error-prone.

An enterprise >>
100+ authentication faults
reported per day Terminal-type-based Terminal-type-based Terminal-type-based

It is difficult to locate Automatic authentication Automatic authorization Spoofing detection


Printer Camera IP phone and PC
access spoofing. • MAC address authentication, without • Is automatically added to the • Report a terminal spoofing alarm.
entering any MAC address video surveillance group.
• Is configured as the VIP user.

Page 33 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Enterprise
DC
campus

HQoS: User- and Application-based QoS Policy


User- and application-based QoS policies ensure experience of high-priority users and applications
Requirements and
Challenges 1

Traditional QoS 1. Define VIP users and


common users, and
policies are invalid
application priorities.
for video services. 3 2. Schedule users and
application queues based on
priorities of users and
(Example) Building >>

C use
applications.

om r
2
surveillance scenario:

m s
on
3. Support native AC or
Wireless video services independent AC deployment.
of common users

..
.

..
increase, occupying a

.
large number of network
us IP
1
V
er

resources and causing


network congestion.
VIP Common
user users
s Camera
Video surveillance Mobile phone and tablet

Page 34 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Enterprise
DC
campus

AI-Powered Intelligent O&M of Campus Networks


As-Is: Device-Centered Network Management To-Be: User Experience-Centered AI-Powered Intelligent O&M

Intelligent network analyzer


NMS • Visualized user experience
Traditional • Topology management management
NMS • Performance • User journey playback
management Telemetry • Potential fault identification
SNMP • Alarm management Second-level network • Root cause identification
Minute-level network • Predictive network optimization
• Configuration data collection
data collection management

Experience visualization: Telemetry-based second-level data collection, visualized


experience of each user and each application in real time
• Device-centric O&M method: User experience cannot be Minute-level potential fault identification and root cause location
detected. • Identify potential faults based on dynamic baselines and big data correlation analysis.
• Fault-triggered responses: Potential faults cannot be • Accurately locate root causes of faults through KPI association analysis and protocol
tracing.
identified.
Predictive network optimization: AI is used to intelligently analyze the AP load
• Rely on professional engineers to locate faults onsite.
trend and implement predictive optimization on the wireless network.

The efficiency is improved by using algorithms. With scenario-based continuous learning and expert experience, intelligent O&M frees O&M
personnel from complex alarms and noises, making O&M more automated and intelligent.

Page 35 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Enterprise
DC
campus

AI-Powered Intelligent Radio Calibration


Traditional radio calibration
Tested and verified by
cannot achieve AI-powered authoritative organizations
expected results intelligent radio
Phase 1: Manual Calibration calibration Average downlink rate per terminal:
Based on engineers' experience, the
calibration is time-consuming and 58% 198 Mbit/s
error-prone, and the calibration result 125 Mbit/s
is unstable.

Radio calibration Real-time and historical


simulation data collection
Before radio After AI-powered
>> calibration smart radio
calibration
Smart radio
Calibration calibration and Counter
Phase 2: Automatic Calibration closed-loop Average Wi-Fi channel interference
Calibration based on real-time radio
interference does not consider device 5.5%
Single-user performance
load changes, and the calibration 49%
result cannot be ensured. Number of users 2.8%

Objects
Optimal channel

Frequency
bandwidth

adjustment
selection

selection

Channel usage
Power

Time
Signal interference ratio
Channel/Frequency Before radio After AI-powered
bandwidth/Power calibration smart radio
calibration

Page 36 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. SDN Overview
2. NFV Overview

Page 37 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
NFV Background: Thinking from IT Industry
Transformation
● The IT industry transformation brings thinking on network architecture and device architecture in the
network industry. The network architecture layer involves the SDN controller and the device architecture
layer involves the device deployment mode.

IT Industry Transformation
• In recent years, IT technologies such as virtualization and
Network?
cloud computing have been booming, and applications
deployed on hardware have been gradually migrated to
the cloud. Applications are deployed on private clouds,
public clouds, or hybrid clouds as software.
• Thinking about the network industry: Can network
App App applications be deployed in a software-based manner?
OS OS • In the context, Network Functions Virtualization (NFV)
App
is introduced.
Virtualization/ VM VM
Cloudification
OS

Page 38 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Origin of NFV
● In October 2012, 13 top carriers (including AT&T, Verizon, VDF, DT, T-Mobile, BT, and Telefonica) released
the first version of NFV White Paper at the SDN and OpenFlow World Congress. In addition, the Industry
Specification Group (ISG) was founded to promote the definition of network virtualization requirements and
the formulation of the system architecture.

● In 2013, the ETSI NFV ISG conducted the first phase of research and completed the formulation of related
standards. The ETSI NFV ISG defined NFV requirements and architecture and sorts out the
standardization processes of different interfaces.

Page 39 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
NFV Value
● NFV aims to address issues such as complex deployment and O&M and service innovation
difficulties due to large numbers of telecom network hardware devices. NFV brings the following
benefits to carriers while reconstructing telecom networks:
▫ Shortened service rollout time

▫ Reduced network construction cost

▫ Improved network O&M efficiency

▫ Open ecosystem

Page 40 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Key NFV Technologies: Virtualization
● Virtualization is the foundation of NFV, and cloudification is the key.

● On traditional telecom networks, each NE is implemented by dedicated hardware, resulting in high costs and difficult
O&M. Virtualization features partition, isolation, encapsulation, and independence from hardware, which can meet NFV
requirements. Carriers use virtualization to run software-based NEs on universal infrastructures.

Partition Isolation

Multiple VMs can concurrently run on VMs that run on the same server are
a single physical server. isolated from each other.

Encapsulation Hardware independence

All data of a VM is saved in files. A VM VMs can run on any servers without any
can be moved and replicated by moving modifications.
and replicating the files.

Page 41 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Key NFV Technology: Cloudification
● As defined by the National Institute of Standards and Technology (NIST), cloud computing is a model that allows users to
obtain resources (for example, networks, servers, storage devices, applications, services) in a shared compute resource
pool based on their needs anytime, anywhere. This model enables fast resource provisioning and release, and
minimizes the resource management workload and interactions with service providers.

● Cloud computing has many advantages. Cloudification of network functions on carriers' networks mainly uses resource
pooling and rapid elastic scaling.
Characteristics of Cloud Computing
1 On-demand self-service 2 Broad network access 3 Resource pooling 4 Rapid elasticity 5 Measured service

Buy

Page 42 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Introduction to the NFV Architecture
● The NFV architecture includes the network functions virtualization infrastructure (NFVI), a virtualized network function
(VNF), and management and orchestration (MANO). In addition, the NFV architecture needs to support the existing
business support system (BSS) or operations support system (OSS).

OSS/BSS: is an existing operation/O&M support


system.

MANO:
VNF: uses cloud resources to construct software NEs. Provides functions
such as service
orchestration, service
management, and
resource
NFVI: provides cloud-based resource pools. management.

Page 43 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Standard NFV Architecture
● ETSI defines the standard NFV architecture, which consists of the NFVI, VNF, and MANO. The NFVI includes the
universal hardware layer and virtualization layer. The VNF is implemented using software, and the MANO implements
management and orchestration of an NFV architecture.
NFV Management and Orchestration

MANO
Os-Ma
OSS/BSS NFV
Orchestrator

VNF Or-Vnfm
EM 1 EM 2 EM 3 Ve-Vnfm Service, VNF, and
VNF Infrastructure
VNF 1 VNF 2 VNF 3 Manager(s)
Description
Vn-Nf
NFVI Vi-Vnfm
Virtualization Layer
Virtual Virtual Virtual Nf-Vi Virtualized
Computing Network Or-Vi
Storage Infrastructure
Vi-Ha Manager(s)
Hardware
Computing Storage Network

Execution reference point Other reference point Main NFV reference points

Page 44 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Functional Modules of the NFV Architecture
● Main functional modules defined in the standard NFV architecture:

OSS or Management system for a service provider. It is not a functional component in the NFV architecture, but the MANO must
BSS provide an interface for interoperation with the OSS or BSS.

MANO NFV management and orchestration. The MANO includes the VIM, VNFM, and NFVO, and provides unified management and
orchestration for VNFs and the NFVI.
• VIM: NFVI management module that runs on an infrastructure site. The VIM provides functions such as resource discovery,
virtual resource management and allocation, and fault handling.
• VNFM: It controls the VNF lifecycle (including instantiation, configuration, and shutdown).
• NFVO: It orchestrates and manages all the software resources and network services on an NFV network.

VNF VNFs refer to VMs as well as service NEs and network function software deployed on the VMs.

NFVI NFV infrastructure, including required hardware and software. The NFVI provides a running environment for VNFs.
• Hardware layer: includes hardware devices that provide compute, network, and storage resources.
• Virtualization layer: abstracts hardware resources to form virtual resources, such as virtual compute, storage, and
network resources. The virtualization function is implemented by Hypervisor[1].

Page 45 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
NFV Architecture Interfaces
● Main interfaces of the standard NFV architecture:

Interface Description
Is used between the virtualization layer and hardware layer. The virtualization layer meets basic hardware compatibility
Vi-Ha requirements.
Is used between a VM and the NFVI. It ensures that VMs can be deployed on the NFVI to meet performance, reliability, and
Vn-Nf scalability requirements. The NFVI meets VMs' OS compatibility requirements.

Is used between the virtualization layer management software and NFVI. It provides management of virtual computing, storage,
Nf-Vi and network systems of NFVI, virtual infrastructure configuration and connections, as well as system usage, performance
monitoring, and fault management.

Is used between the VNFM and a VNF, implementing VNF lifecycle management, VNF configuration, VNF performance, and fault
Ve-Vnfm management.

OS-Ma Manages lifecycles of network services and VNFs.

Is used for interaction between the service application management system or service orchestration system and virtualization layer
Vi-Vnfm management software.
Sends configuration information to the VNFM, configures the VNFM, and connects the orchestrator and VNFM. It exchanges
Or-Vnfm information with the NFVI resources allocated to VNFs and information between VNFs.

Is used to send resource reservation and resource allocation requests required by the orchestrator and exchange virtual hardware
Or-Vi resource configurations and status information.

Page 46 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Huawei's NFV Solution
● In the Huawei NFV architecture, functions of the virtualization layer and VIM are implemented by the HUAWEI CLOUD
Stack NFVI platform. HUAWEI CLOUD Stack can virtualize compute, storage, and network resources and centrally
manage, monitor, and optimize physical virtualization resources.

● Huawei provides cloud-based solutions for carriers' wireless networks, bearer networks, transport networks, access
networks, and core networks.

VNF MANO
Cloud CloudOpera
CloudBB CloudEdge CloudCore 5G Core
DSL/OLT NFVO

VNFM
NFVI
HUAWEI CLOUD Stack
FusionSphere
FusionCompute FusionStorage FusionNetwork OpenStack + OM

Hardware
Computing Storage Network

Page 47 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
FAQ
● Q1: What is the relationship between SDN and NFV in the industry?

● A: Both SDN and NFV involve network transformation and the NFV concept was proposed at the
SDN and OpenFlow World Congress. However, they are independent of each other. SDN mainly
affects the network architecture, and NFV mainly affects the NE deployment mode.

● Q2: What is the relationship between SDN and NFV in Huawei solutions?

● A: Huawei provides different solutions for SDN and NFV, but they are associated. Huawei NFVI
solution is provided by HUAWEI CLOUD Stack.

Page 48 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Quiz
1. (Multiple) Which of the following statements about Huawei SDN solution are true? ( )
A. The solution supports various SBI protocols, such as RESTful, NETCONF, and OVSDB.

B. OpenFlow can be used as the SBI protocol.

C. The solution integrates management, control, and analysis to build a simplified network.

D. The solution provides open and programmable network interfaces to support third-party application
development and system interconnection.

2. Please briefly describe the benefits of NFV.

Page 49 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Summary
● With the transformation and development of the network industry, SDN and NFV are
proposed.

● SDN is an innovation of network architecture. It uses a controller to make networks


more open, flexible, and simple.

● NFV is an innovation in the deployment of telecom network devices. Based on


virtualization and cloud computing, NFV helps reconstruct telecom networks.

Page 50 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
More Information
● For more information about OpenFlow, visit https://www.opennetworking.org/ .

● For more information about Huawei SDN solution, see the HCIP course.

Page 51 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Thank You
www.huawei.com

Page 52 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.

You might also like