| < draft-irtf-nfvrg-gaps-network-virtualization-08.txt | draft-irtf-nfvrg-gaps-network-virtualization-09.txt > | |||
|---|---|---|---|---|
| NFVRG CJ. Bernardos | NFVRG CJ. Bernardos | |||
| Internet-Draft UC3M | Internet-Draft UC3M | |||
| Intended status: Informational A. Rahman | Intended status: Informational A. Rahman | |||
| Expires: June 2, 2018 InterDigital | Expires: September 1, 2018 InterDigital | |||
| JC. Zuniga | JC. Zuniga | |||
| SIGFOX | SIGFOX | |||
| LM. Contreras | LM. Contreras | |||
| TID | TID | |||
| P. Aranda | P. Aranda | |||
| UC3M | UC3M | |||
| P. Lynch | P. Lynch | |||
| Ixia | Ixia | |||
| November 29, 2017 | February 28, 2018 | |||
| Network Virtualization Research Challenges | Network Virtualization Research Challenges | |||
| draft-irtf-nfvrg-gaps-network-virtualization-08 | draft-irtf-nfvrg-gaps-network-virtualization-09 | |||
| Abstract | Abstract | |||
| This document describes open research challenges for network | This document describes open research challenges for network | |||
| virtualization. Network virtualization is following a similar path | virtualization. Network virtualization is following a similar path | |||
| as previously taken by cloud computing. Specifically, cloud | as previously taken by cloud computing. Specifically, cloud | |||
| computing popularized migration of computing functions (e.g., | computing popularized migration of computing functions (e.g., | |||
| applications) and storage from local, dedicated, physical resources | applications) and storage from local, dedicated, physical resources | |||
| to remote virtual functions accessible through the Internet. In a | to remote virtual functions accessible through the Internet. In a | |||
| similar manner, network virtualization is encouraging migration of | similar manner, network virtualization is encouraging migration of | |||
| skipping to change at page 1, line 40 ¶ | skipping to change at page 1, line 40 ¶ | |||
| virtualized pool of resources. However, network virtualization can | virtualized pool of resources. However, network virtualization can | |||
| be considered to be a more complex problem than cloud computing as it | be considered to be a more complex problem than cloud computing as it | |||
| not only involves virtualization of computing and storage functions | not only involves virtualization of computing and storage functions | |||
| but also involves abstraction of the network itself. This document | but also involves abstraction of the network itself. This document | |||
| describes current research and engineering challenges in network | describes current research and engineering challenges in network | |||
| virtualization including guaranteeing quality-of-service, performance | virtualization including guaranteeing quality-of-service, performance | |||
| improvement, supporting multiple domains, network slicing, service | improvement, supporting multiple domains, network slicing, service | |||
| composition, device virtualization, privacy and security, separation | composition, device virtualization, privacy and security, separation | |||
| of control concerns, network function placement and testing. In | of control concerns, network function placement and testing. In | |||
| addition, some proposals are made for new activities in IETF/IRTF | addition, some proposals are made for new activities in IETF/IRTF | |||
| that could address some of these challenges. | that could address some of these challenges. This document is a | |||
| product of the Network Function Virtualization Research Group | ||||
| (NFVRG). | ||||
| Status of This Memo | Status of This Memo | |||
| This Internet-Draft is submitted in full conformance with the | This Internet-Draft is submitted in full conformance with the | |||
| provisions of BCP 78 and BCP 79. | provisions of BCP 78 and BCP 79. | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
| working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
| Drafts is at http://datatracker.ietf.org/drafts/current/. | Drafts is at https://datatracker.ietf.org/drafts/current/. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| This Internet-Draft will expire on June 2, 2018. | This Internet-Draft will expire on September 1, 2018. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2017 IETF Trust and the persons identified as the | Copyright (c) 2018 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
| (http://trustee.ietf.org/license-info) in effect on the date of | (https://trustee.ietf.org/license-info) in effect on the date of | |||
| publication of this document. Please review these documents | publication of this document. Please review these documents | |||
| carefully, as they describe your rights and restrictions with respect | carefully, as they describe your rights and restrictions with respect | |||
| to this document. Code Components extracted from this document must | to this document. Code Components extracted from this document must | |||
| include Simplified BSD License text as described in Section 4.e of | include Simplified BSD License text as described in Section 4.e of | |||
| the Trust Legal Provisions and are provided without warranty as | the Trust Legal Provisions and are provided without warranty as | |||
| described in the Simplified BSD License. | described in the Simplified BSD License. | |||
| Table of Contents | Table of Contents | |||
| 1. Introduction and scope . . . . . . . . . . . . . . . . . . . 3 | 1. Introduction and scope . . . . . . . . . . . . . . . . . . . 3 | |||
| skipping to change at page 4, line 5 ¶ | skipping to change at page 4, line 5 ¶ | |||
| dimensioning, and dynamic energy policies to reduce the electricity | dimensioning, and dynamic energy policies to reduce the electricity | |||
| consumption. | consumption. | |||
| This document presents research and engineering challenges in network | This document presents research and engineering challenges in network | |||
| virtualization that need to be addressed in order to achieve these | virtualization that need to be addressed in order to achieve these | |||
| goals, spanning from pure research and engineering/standards space. | goals, spanning from pure research and engineering/standards space. | |||
| The objective of this memo is to document the technical challenges | The objective of this memo is to document the technical challenges | |||
| and corresponding current approaches and to expose requirements that | and corresponding current approaches and to expose requirements that | |||
| should be addressed by future research and standards work. | should be addressed by future research and standards work. | |||
| This document represents the consensus of the NFV Research Group. It | ||||
| has been reviewed by the Research Group members active in the | ||||
| specific areas of work covered by the document. | ||||
| 2. Terminology | 2. Terminology | |||
| The following terms used in this document are defined by the ETSI | The following terms used in this document are defined by the ETSI | |||
| Network Function Virtualization (NVF) Industrial Study Group (ISG) | Network Function Virtualization (NVF) Industrial Study Group (ISG) | |||
| [etsi_gs_nfv_003], the ONF [onf_tr_521] and the IETF [RFC7426] | [etsi_gs_nfv_003], the ONF [onf_tr_521] and the IETF [RFC7426] | |||
| [RFC7665]: | [RFC7665]: | |||
| Application Plane - The collection of applications and services | Application Plane - The collection of applications and services | |||
| that program network behavior. | that program network behavior. | |||
| skipping to change at page 21, line 45 ¶ | skipping to change at page 21, line 45 ¶ | |||
| disrupting one, some autonomous IoT devices will have very low | disrupting one, some autonomous IoT devices will have very low | |||
| throughput, will have much longer sleep cycles (and therefore high | throughput, will have much longer sleep cycles (and therefore high | |||
| latency), and a battery life time exceeding by a factor of thousands | latency), and a battery life time exceeding by a factor of thousands | |||
| that of smart phones or some other devices that will have almost | that of smart phones or some other devices that will have almost | |||
| continuous control and data communications. Hence, it is envisioned | continuous control and data communications. Hence, it is envisioned | |||
| that a customized network slice will have to be stitched together | that a customized network slice will have to be stitched together | |||
| from virtual resources or sub-slices to meet these requirements. | from virtual resources or sub-slices to meet these requirements. | |||
| The actual definition of network slice from an IP infrastructure | The actual definition of network slice from an IP infrastructure | |||
| viewpoint is currently undergoing intense debate | viewpoint is currently undergoing intense debate | |||
| [I-D.galis-netslices-revised-problem-statement] | [I-D.geng-coms-problem-statement] [I-D.gdmb-netslices-intro-and-ps] | |||
| [I-D.gdmb-netslices-intro-and-ps] | ||||
| [I-D.defoy-netslices-3gpp-network-slicing] [ngmn_5G_whitepaper]. | [I-D.defoy-netslices-3gpp-network-slicing] [ngmn_5G_whitepaper]. | |||
| Network slicing is a key for introducing new actors in existing | Network slicing is a key for introducing new actors in existing | |||
| market at low cost -- by letting new players rent "blocks" of | market at low cost -- by letting new players rent "blocks" of | |||
| capacity, if the new business model enables performance that meets | capacity, if the new business model enables performance that meets | |||
| the application needs (e.g., broadcasting updates to many sensors | the application needs (e.g., broadcasting updates to many sensors | |||
| with satellite broadcasting capabilities). However, more work needs | with satellite broadcasting capabilities). However, more work needs | |||
| to be done to define the basic architectural approach of how network | to be done to define the basic architectural approach of how network | |||
| slices will be defined and formed. For example, is it mostly a | slices will be defined and formed. For example, is it mostly a | |||
| matter of defining the appropriate network models (e.g. YANG) to | matter of defining the appropriate network models (e.g. YANG) to | |||
| stitch the network slice from existing components. Or do end-to-end | stitch the network slice from existing components. Or do end-to-end | |||
| skipping to change at page 26, line 15 ¶ | skipping to change at page 26, line 15 ¶ | |||
| clone in the networking infrastructure). This is, for example, being | clone in the networking infrastructure). This is, for example, being | |||
| explored by the European H2020 ICIRRUS project (www.icirrus- | explored by the European H2020 ICIRRUS project (www.icirrus- | |||
| 5gnet.eu). | 5gnet.eu). | |||
| 4.8. Security and Privacy | 4.8. Security and Privacy | |||
| Similar to any other situation where resources are shared, security | Similar to any other situation where resources are shared, security | |||
| and privacy are two important aspects that need to be taken into | and privacy are two important aspects that need to be taken into | |||
| account. | account. | |||
| In the case of security, there are situations where multiple vendors | In the case of security, there are situations where multiple service | |||
| will need to coexist in a virtual or hybrid physical/virtual | providers will need to coexist in a virtual or hybrid physical/ | |||
| environment. This requires attestation procedures amongst different | virtual environment. This requires attestation procedures amongst | |||
| virtual/physical functions and resources, as well as ongoing external | different virtual/physical functions and resources, as well as | |||
| monitoring. Similarly, different network slices operating on the | ongoing external monitoring. Similarly, different network slices | |||
| same infrastructure can present security problems, for instance if | operating on the same infrastructure can present security problems, | |||
| one slice running critical applications (e.g. support for a safety | for instance if one slice running critical applications (e.g. support | |||
| system) is affected by another slice running a less critical | for a safety system) is affected by another slice running a less | |||
| application. In general, the minimum common denominator for security | critical application. In general, the minimum common denominator for | |||
| measures on a shared system should be equal or higher than the one | security measures on a shared system should be equal or higher than | |||
| required by the most critical application. Multiple and continuous | the one required by the most critical application. Multiple and | |||
| threat model analysis, as well as DevOps model are required to | continuous threat model analysis, as well as DevOps model are | |||
| maintain a certain level of security in an NFV system. | required to maintain a certain level of security in an NFV system. | |||
| Simplistically, DevOps is a process that combines multiple functions | Simplistically, DevOps is a process that combines multiple functions | |||
| into single cohesive teams in order to quickly produce quality | into single cohesive teams in order to quickly produce quality | |||
| software. It typically relies on also applying the Agile development | software. It typically relies on also applying the Agile development | |||
| process, which focuses on (among many things) dividing large features | process, which focuses on (among many things) dividing large features | |||
| into multiple, smaller deliveries. One part of this is to | into multiple, smaller deliveries. One part of this is to | |||
| immediately test the new smaller features in order to get immediate | immediately test the new smaller features in order to get immediate | |||
| feedback on errors so that if present, they can be immediately fixed | feedback on errors so that if present, they can be immediately fixed | |||
| and redeployed. | and redeployed. | |||
| On the other hand, privacy in its strictest interpretation refers to | On the other hand, privacy refers to concerns about the control of | |||
| concerns about exposing users of the system to individual threats | personal data and the decision of what to reveal to whom. In this | |||
| such as surveillance, identification, stored data compromise, | case, the storage, transmission, collection, and potential | |||
| secondary use, intrusion, etc. In this case, the storage, | correlation of information in the NFV system, for purposes not | |||
| transmission, collection, and potential correlation of information in | originally intended or not known by the user, should be avoided. | |||
| the NFV system, for purposes not originally intended or not known by | This is particularly challenging, as future intentions and threats | |||
| the user, should be avoided. This is particularly challenging, as | cannot be easily predicted, and still can be applied on data | |||
| future intentions and threats cannot be easily predicted, and still | collected in the past. Therefore, well-known techniques such as data | |||
| can be applied on data collected in the past. Therefore, well-known | minimization, using privacy features as default, and allowing users | |||
| techniques such as data minimization, using privacy features as | to opt in/out should be used to prevent potential privacy issues. | |||
| default, and allowing users to opt in/out should be used to prevent | ||||
| potential privacy issues. | ||||
| Compared to traditional networks, NFV will result in networks that | Compared to traditional networks, NFV will result in networks that | |||
| are much more dynamic (in function distribution and topology) and | are much more dynamic (in function distribution and topology) and | |||
| elastic (in size and boundaries). NFV will thus require network | elastic (in size and boundaries). NFV will thus require network | |||
| operators to evolve their operational and administrative security | operators to evolve their operational and administrative security | |||
| solutions to work in this new environment. For example, in NFV the | solutions to work in this new environment. For example, in NFV the | |||
| network orchestrator will become a key node to provide security | network orchestrator will become a key node to provide security | |||
| policy orchestration across the different physical and virtual | policy orchestration across the different physical and virtual | |||
| components of the virtualized network. For highly confidential data, | components of the virtualized network. For highly confidential data, | |||
| for example, the network orchestrator should take into account if | for example, the network orchestrator should take into account if | |||
| skipping to change at page 27, line 29 ¶ | skipping to change at page 27, line 27 ¶ | |||
| be run by a different operator and/or cloud service provider (see | be run by a different operator and/or cloud service provider (see | |||
| also Section 4.4). Thus, there will be multiple administrative | also Section 4.4). Thus, there will be multiple administrative | |||
| domains involved, making security policy coordination more complex. | domains involved, making security policy coordination more complex. | |||
| For example, who will be in charge of provisioning and maintaining | For example, who will be in charge of provisioning and maintaining | |||
| security credentials such as public and private keys? Also, should | security credentials such as public and private keys? Also, should | |||
| private keys be allowed to be replicated across the NFV for | private keys be allowed to be replicated across the NFV for | |||
| redundancy reasons? Alternatively, it can be investigated how to | redundancy reasons? Alternatively, it can be investigated how to | |||
| develop a mechanism that avoid such a security policy coordination, | develop a mechanism that avoid such a security policy coordination, | |||
| this making the system more robust. | this making the system more robust. | |||
| On a positive note, NFV will may better defense against Denial of | On a positive note, NFV may better defense against Denial of Service | |||
| Service (DoS) attacks because of the distributed nature of the | (DoS) attacks because of the distributed nature of the network (i.e. | |||
| network (i.e. no single point of failure) and the ability to steer | no single point of failure) and the ability to steer (undesirable) | |||
| (undesirable) traffic quickly [etsi_gs_nfv_sec_001]. Also, NFVs | traffic quickly [etsi_gs_nfv_sec_001]. Also, NFVs which have | |||
| which have physical HW which is distributed across multiple data | physical HW which is distributed across multiple data centers will | |||
| centers will also provide better fault isolation environments. This | also provide better fault isolation environments. This holds true in | |||
| holds true in particular if each data center is protected separately | particular if each data center is protected separately via firewalls, | |||
| via firewalls, DMZs and other network protection techniques. | DMZs and other network protection techniques. | |||
| SDN can also be used to help improve security by facilitating the | SDN can also be used to help improve security by facilitating the | |||
| operation of existing protocols, such as Authentication, | operation of existing protocols, such as Authentication, | |||
| Authorization and Accounting (AAA). The management of AAA | Authorization and Accounting (AAA). The management of AAA | |||
| infrastructures, namely the management of AAA routing and the | infrastructures, namely the management of AAA routing and the | |||
| establishment of security associations between AAA entities, can be | establishment of security associations between AAA entities, can be | |||
| performed using SDN, as analyzed in [I-D.marin-sdnrg-sdn-aaa-mng]. | performed using SDN, as analyzed in [I-D.marin-sdnrg-sdn-aaa-mng]. | |||
| 4.9. Separation of control concerns | 4.9. Separation of control concerns | |||
| skipping to change at page 34, line 34 ¶ | skipping to change at page 34, line 34 ¶ | |||
| NFV/001_099/003/01.02.01_60/gs_NFV003v010201p.pdf>. | NFV/001_099/003/01.02.01_60/gs_NFV003v010201p.pdf>. | |||
| [etsi_gs_nfv_eve005] | [etsi_gs_nfv_eve005] | |||
| ETSI NFV ISG, "Network Functions Virtualisation (NFV); | ETSI NFV ISG, "Network Functions Virtualisation (NFV); | |||
| Ecosystem; Report on SDN Usage in NFV Architectural | Ecosystem; Report on SDN Usage in NFV Architectural | |||
| Framework", ETSI GS NFV-EVE 005 V1.1.1 NFV-EVE 005, | Framework", ETSI GS NFV-EVE 005 V1.1.1 NFV-EVE 005, | |||
| December 2015, <http://www.etsi.org/deliver/etsi_gs/NFV- | December 2015, <http://www.etsi.org/deliver/etsi_gs/NFV- | |||
| EVE/001_099/005/01.01.01_60/gs_NFV-EVE005v010101p.pdf>. | EVE/001_099/005/01.01.01_60/gs_NFV-EVE005v010101p.pdf>. | |||
| [etsi_gs_nfv_per_001] | [etsi_gs_nfv_per_001] | |||
| ETSI GS NFV-PER 001 V1.1.2, , "Network Functions | ETSI GS NFV-PER 001 V1.1.2, "Network Functions | |||
| Virtualisation (NFV); NFV Performance & Portability Best | Virtualisation (NFV); NFV Performance & Portability Best | |||
| Practises", ETSI GS NFV-PER 001 V1.1.2 NFV-PER 001, | Practises", ETSI GS NFV-PER 001 V1.1.2 NFV-PER 001, | |||
| December 2014, <http://www.etsi.org/deliver/etsi_gs/NFV- | December 2014, <http://www.etsi.org/deliver/etsi_gs/NFV- | |||
| PER/001_099/001/01.01.02_60/gs_NFV-PER001v010102p.pdf>. | PER/001_099/001/01.01.02_60/gs_NFV-PER001v010102p.pdf>. | |||
| [etsi_gs_nfv_sec_001] | [etsi_gs_nfv_sec_001] | |||
| ETSI GS NFV-SEC 001 V1.1.1, , "Network Functions | ETSI GS NFV-SEC 001 V1.1.1, "Network Functions | |||
| Virtualisation (NFV); NFV Security; Problem Statement", | Virtualisation (NFV); NFV Security; Problem Statement", | |||
| ETSI GS NFV-SEC 001 V1.1.1 NFV-SEC 001, October 2014, | ETSI GS NFV-SEC 001 V1.1.1 NFV-SEC 001, October 2014, | |||
| <http://www.etsi.org/deliver/etsi_gs/NFV- | <http://www.etsi.org/deliver/etsi_gs/NFV- | |||
| SEC/001_099/001/01.01.01_60/gs_NFV-SEC001v010101p.pdf>. | SEC/001_099/001/01.01.01_60/gs_NFV-SEC001v010101p.pdf>. | |||
| [etsi_nvf_whitepaper_3] | [etsi_nvf_whitepaper_3] | |||
| "Network Functions Virtualisation (NFV). White Paper 3", | "Network Functions Virtualisation (NFV). White Paper 3", | |||
| October 2014. | October 2014. | |||
| [google_sdn_wan] | [google_sdn_wan] | |||
| Sushant Jain et al., , "B4: experience with a globally- | Sushant Jain et al., "B4: experience with a globally- | |||
| deployed Software Defined WAN", Proceedings of the ACM | deployed Software Defined WAN", Proceedings of the ACM | |||
| SIGCOMM 2013 , August 2013. | SIGCOMM 2013 , August 2013. | |||
| [I-D.bagnulo-nfvrg-topology] | [I-D.bagnulo-nfvrg-topology] | |||
| Bagnulo, M. and D. Dolson, "NFVI PoP Network Topology: | Bagnulo, M. and D. Dolson, "NFVI PoP Network Topology: | |||
| Problem Statement", draft-bagnulo-nfvrg-topology-01 (work | Problem Statement", draft-bagnulo-nfvrg-topology-01 (work | |||
| in progress), March 2016. | in progress), March 2016. | |||
| [I-D.bernardos-nfvrg-multidomain] | [I-D.bernardos-nfvrg-multidomain] | |||
| Bernardos, C., Contreras, L., Vaishnavi, I., and R. Szabo, | Bernardos, C., Contreras, L., Vaishnavi, I., and R. Szabo, | |||
| "Multi-domain Network Virtualization", draft-bernardos- | "Multi-domain Network Virtualization", draft-bernardos- | |||
| nfvrg-multidomain-03 (work in progress), September 2017. | nfvrg-multidomain-03 (work in progress), September 2017. | |||
| [I-D.defoy-netslices-3gpp-network-slicing] | [I-D.defoy-netslices-3gpp-network-slicing] | |||
| Foy, X. and A. Rahman, "Network Slicing - 3GPP Use Case", | Foy, X. and A. Rahman, "Network Slicing - 3GPP Use Case", | |||
| draft-defoy-netslices-3gpp-network-slicing-02 (work in | draft-defoy-netslices-3gpp-network-slicing-02 (work in | |||
| progress), October 2017. | progress), October 2017. | |||
| [I-D.galis-netslices-revised-problem-statement] | ||||
| Galis, A., "Network Slicing - Revised Problem Statement", | ||||
| draft-galis-netslices-revised-problem-statement-01 (work | ||||
| in progress), July 2017. | ||||
| [I-D.gdmb-netslices-intro-and-ps] | [I-D.gdmb-netslices-intro-and-ps] | |||
| Galis, A., Dong, J., kiran.makhijani@huawei.com, k., | Galis, A., Dong, J., kiran.makhijani@huawei.com, k., | |||
| Bryant, S., Boucadair, M., and P. Martinez-Julia, "Network | Bryant, S., Boucadair, M., and P. Martinez-Julia, "Network | |||
| Slicing - Introductory Document and Revised Problem | Slicing - Introductory Document and Revised Problem | |||
| Statement", draft-gdmb-netslices-intro-and-ps-02 (work in | Statement", draft-gdmb-netslices-intro-and-ps-02 (work in | |||
| progress), February 2017. | progress), February 2017. | |||
| [I-D.geng-coms-problem-statement] | ||||
| 67, 4., Wang, L., Slawomir, S., Qiang, L., Matsushima, S., | ||||
| Galis, A., and L. Contreras, "Problem Statement of | ||||
| Supervised Heterogeneous Network Slicing", draft-geng- | ||||
| coms-problem-statement-01 (work in progress), October | ||||
| 2017. | ||||
| [I-D.irtf-sdnrg-layered-sdn] | [I-D.irtf-sdnrg-layered-sdn] | |||
| Contreras, L., Bernardos, C., Lopez, D., Boucadair, M., | Contreras, L., Bernardos, C., Lopez, D., Boucadair, M., | |||
| and P. Iovanna, "Cooperating Layered Architecture for | and P. Iovanna, "Cooperating Layered Architecture for | |||
| SDN", draft-irtf-sdnrg-layered-sdn-01 (work in progress), | SDN", draft-irtf-sdnrg-layered-sdn-01 (work in progress), | |||
| October 2016. | October 2016. | |||
| [I-D.marin-sdnrg-sdn-aaa-mng] | [I-D.marin-sdnrg-sdn-aaa-mng] | |||
| Lopez, R. and G. Lopez-Millan, "Software-Defined | Lopez, R. and G. Lopez-Millan, "Software-Defined | |||
| Networking (SDN)-based AAA Infrastructures Management", | Networking (SDN)-based AAA Infrastructures Management", | |||
| draft-marin-sdnrg-sdn-aaa-mng-00 (work in progress), | draft-marin-sdnrg-sdn-aaa-mng-00 (work in progress), | |||
| skipping to change at page 37, line 22 ¶ | skipping to change at page 37, line 22 ¶ | |||
| [nfv_sota_research_challenges] | [nfv_sota_research_challenges] | |||
| Mijumbi, R., Serrat, J., Gorricho, J-L., Bouten, N., De | Mijumbi, R., Serrat, J., Gorricho, J-L., Bouten, N., De | |||
| Turck, F., and R. Boutaba, "Network Function | Turck, F., and R. Boutaba, "Network Function | |||
| Virtualization: State-of-the-art and Research Challenges", | Virtualization: State-of-the-art and Research Challenges", | |||
| IEEE Communications Surveys & Tutorials Volume: 18, Issue: | IEEE Communications Surveys & Tutorials Volume: 18, Issue: | |||
| 1, September 2015. | 1, September 2015. | |||
| [ngmn_5G_whitepaper] | [ngmn_5G_whitepaper] | |||
| "NGMN 5G. White Paper", February 2015. | "NGMN 5G. White Paper", February 2015. | |||
| [omniran] 802.1cf, Draft 0.4, , "802.1CF Network Reference Model and | [omniran] IEEE 802.1CF, "Recommended Practice for Network Reference | |||
| Functional Description of IEEE 802 Access Network", | Model and Functional Description of IEEE 802 Access | |||
| 802.1cf, Draft 0.4 802.1cf, February 2017. | Network", Draft 1.0 , December 2017. | |||
| [onf_tr_521] | [onf_tr_521] | |||
| ONF, "SDN Architecture, Issue 1.1", ONF TR-521 TR-521, | ONF, "SDN Architecture, Issue 1.1", ONF TR-521 TR-521, | |||
| February 2016, | February 2016, | |||
| <https://www.opennetworking.org/images/stories/downloads/ | <https://www.opennetworking.org/images/stories/downloads/ | |||
| sdn-resources/technical-reports/TR- | sdn-resources/technical-reports/ | |||
| 521_SDN_Architecture_issue_1.1.pdf>. | TR-521_SDN_Architecture_issue_1.1.pdf>. | |||
| [openmano_dataplane] | [openmano_dataplane] | |||
| Lopez, D., "OpenMANO: The Dataplane Ready Open Source NFV | Lopez, D., "OpenMANO: The Dataplane Ready Open Source NFV | |||
| MANO Stack", March 2015, | MANO Stack", March 2015, | |||
| <https://www.ietf.org/proceedings/92/slides/slides-92- | <https://www.ietf.org/proceedings/92/slides/ | |||
| nfvrg-7.pdf>. | slides-92-nfvrg-7.pdf>. | |||
| [RFC5810] Doria, A., Ed., Hadi Salim, J., Ed., Haas, R., Ed., | [RFC5810] Doria, A., Ed., Hadi Salim, J., Ed., Haas, R., Ed., | |||
| Khosravi, H., Ed., Wang, W., Ed., Dong, L., Gopal, R., and | Khosravi, H., Ed., Wang, W., Ed., Dong, L., Gopal, R., and | |||
| J. Halpern, "Forwarding and Control Element Separation | J. Halpern, "Forwarding and Control Element Separation | |||
| (ForCES) Protocol Specification", RFC 5810, | (ForCES) Protocol Specification", RFC 5810, | |||
| DOI 10.17487/RFC5810, March 2010, <https://www.rfc- | DOI 10.17487/RFC5810, March 2010, | |||
| editor.org/info/rfc5810>. | <https://www.rfc-editor.org/info/rfc5810>. | |||
| [RFC6241] Enns, R., Ed., Bjorklund, M., Ed., Schoenwaelder, J., Ed., | [RFC6241] Enns, R., Ed., Bjorklund, M., Ed., Schoenwaelder, J., Ed., | |||
| and A. Bierman, Ed., "Network Configuration Protocol | and A. Bierman, Ed., "Network Configuration Protocol | |||
| (NETCONF)", RFC 6241, DOI 10.17487/RFC6241, June 2011, | (NETCONF)", RFC 6241, DOI 10.17487/RFC6241, June 2011, | |||
| <https://www.rfc-editor.org/info/rfc6241>. | <https://www.rfc-editor.org/info/rfc6241>. | |||
| [RFC7252] Shelby, Z., Hartke, K., and C. Bormann, "The Constrained | [RFC7252] Shelby, Z., Hartke, K., and C. Bormann, "The Constrained | |||
| Application Protocol (CoAP)", RFC 7252, | Application Protocol (CoAP)", RFC 7252, | |||
| DOI 10.17487/RFC7252, June 2014, <https://www.rfc- | DOI 10.17487/RFC7252, June 2014, | |||
| editor.org/info/rfc7252>. | <https://www.rfc-editor.org/info/rfc7252>. | |||
| [RFC7426] Haleplidis, E., Ed., Pentikousis, K., Ed., Denazis, S., | [RFC7426] Haleplidis, E., Ed., Pentikousis, K., Ed., Denazis, S., | |||
| Hadi Salim, J., Meyer, D., and O. Koufopavlou, "Software- | Hadi Salim, J., Meyer, D., and O. Koufopavlou, "Software- | |||
| Defined Networking (SDN): Layers and Architecture | Defined Networking (SDN): Layers and Architecture | |||
| Terminology", RFC 7426, DOI 10.17487/RFC7426, January | Terminology", RFC 7426, DOI 10.17487/RFC7426, January | |||
| 2015, <https://www.rfc-editor.org/info/rfc7426>. | 2015, <https://www.rfc-editor.org/info/rfc7426>. | |||
| [RFC7498] Quinn, P., Ed. and T. Nadeau, Ed., "Problem Statement for | [RFC7498] Quinn, P., Ed. and T. Nadeau, Ed., "Problem Statement for | |||
| Service Function Chaining", RFC 7498, | Service Function Chaining", RFC 7498, | |||
| DOI 10.17487/RFC7498, April 2015, <https://www.rfc- | DOI 10.17487/RFC7498, April 2015, | |||
| editor.org/info/rfc7498>. | <https://www.rfc-editor.org/info/rfc7498>. | |||
| [RFC7665] Halpern, J., Ed. and C. Pignataro, Ed., "Service Function | [RFC7665] Halpern, J., Ed. and C. Pignataro, Ed., "Service Function | |||
| Chaining (SFC) Architecture", RFC 7665, | Chaining (SFC) Architecture", RFC 7665, | |||
| DOI 10.17487/RFC7665, October 2015, <https://www.rfc- | DOI 10.17487/RFC7665, October 2015, | |||
| editor.org/info/rfc7665>. | <https://www.rfc-editor.org/info/rfc7665>. | |||
| [RFC8030] Thomson, M., Damaggio, E., and B. Raymor, Ed., "Generic | [RFC8030] Thomson, M., Damaggio, E., and B. Raymor, Ed., "Generic | |||
| Event Delivery Using HTTP Push", RFC 8030, | Event Delivery Using HTTP Push", RFC 8030, | |||
| DOI 10.17487/RFC8030, December 2016, <https://www.rfc- | DOI 10.17487/RFC8030, December 2016, | |||
| editor.org/info/rfc8030>. | <https://www.rfc-editor.org/info/rfc8030>. | |||
| [RFC8040] Bierman, A., Bjorklund, M., and K. Watsen, "RESTCONF | [RFC8040] Bierman, A., Bjorklund, M., and K. Watsen, "RESTCONF | |||
| Protocol", RFC 8040, DOI 10.17487/RFC8040, January 2017, | Protocol", RFC 8040, DOI 10.17487/RFC8040, January 2017, | |||
| <https://www.rfc-editor.org/info/rfc8040>. | <https://www.rfc-editor.org/info/rfc8040>. | |||
| [RFC8172] Morton, A., "Considerations for Benchmarking Virtual | [RFC8172] Morton, A., "Considerations for Benchmarking Virtual | |||
| Network Functions and Their Infrastructure", RFC 8172, | Network Functions and Their Infrastructure", RFC 8172, | |||
| DOI 10.17487/RFC8172, July 2017, <https://www.rfc- | DOI 10.17487/RFC8172, July 2017, | |||
| editor.org/info/rfc8172>. | <https://www.rfc-editor.org/info/rfc8172>. | |||
| [sfc_challenges] | [sfc_challenges] | |||
| Medhat, A., Taleb, T., Elmangoush, A., Carella, G., | Medhat, A., Taleb, T., Elmangoush, A., Carella, G., | |||
| Covaci, S., and T. Magedanz, "Service Function Chaining in | Covaci, S., and T. Magedanz, "Service Function Chaining in | |||
| Next Generation Networks: State of the Art and Research | Next Generation Networks: State of the Art and Research | |||
| Challenges", IEEE Communications Magazine vol. 55, no. 2, | Challenges", IEEE Communications Magazine vol. 55, no. 2, | |||
| pp. 216-223, February 2017. | pp. 216-223, February 2017. | |||
| [virtualization_mobile_device] | [virtualization_mobile_device] | |||
| William D. Sproule, , "Virtualization of Mobile Device | William D. Sproule, "Virtualization of Mobile Device User | |||
| User Experience", Patent US 9.542.062 B2 , January 2017. | Experience", Patent US 9.542.062 B2 , January 2017. | |||
| [vnf-p] Moens, H. and Filip De Turck, "VNF-P: A model for | [vnf-p] Moens, H. and Filip De Turck, "VNF-P: A model for | |||
| efficient placement of virtualized network functions", | efficient placement of virtualized network functions", | |||
| 10th International Conference on Network and Service | 10th International Conference on Network and Service | |||
| Management (CNSM) and Workshop pp. 418-423, 2014. | Management (CNSM) and Workshop pp. 418-423, 2014. | |||
| [vnf_benchmarking] | [vnf_benchmarking] | |||
| Rosa, R., Rothenberg, C., and R. Szabo, "A VNF Testing | Rosa, R., Rothenberg, C., and R. Szabo, "A VNF Testing | |||
| Framework Design, Implementation and Partial Results", | Framework Design, Implementation and Partial Results", | |||
| November 2016, | November 2016, | |||
| <https://www.ietf.org/proceedings/97/slides/slides-97- | <https://www.ietf.org/proceedings/97/slides/ | |||
| nfvrg-06-vnf-benchmarking-00.pdf>. | slides-97-nfvrg-06-vnf-benchmarking-00.pdf>. | |||
| Authors' Addresses | Authors' Addresses | |||
| Carlos J. Bernardos | Carlos J. Bernardos | |||
| Universidad Carlos III de Madrid | Universidad Carlos III de Madrid | |||
| Av. Universidad, 30 | Av. Universidad, 30 | |||
| Leganes, Madrid 28911 | Leganes, Madrid 28911 | |||
| Spain | Spain | |||
| Phone: +34 91624 6236 | Phone: +34 91624 6236 | |||
| End of changes. 29 change blocks. | ||||
| 74 lines changed or deleted | 79 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||