Skip to main content

Carrier-Grade virtualized Network Requirements


If your are a Head of IT department or you are managing your CSP's private cloud computing, a lot of questions, requests are coming for you soon.

Many Telco vendors are deploying their applications on top of  X86 platforms and they announced even  supporting virtualized  environment.

In most of Telecom operators, IT and Telco network are separated activities, dedicated budget and  teams.

Telecom vendors use to offer the entire solution from hardware to software to service.
Most of work was about integration new service within existing platforms, configuration and do planning and dimensioning of your network.

With the huge decline of Telco revenue and the success of OTT business model, many CSPs are thinking about reducing CAPEX and OPEX and trying to be me more efficient, innovative and more faster to reach a better time to market.

On the other hand, Cloud Computing is demonstrating a good success on IT domain.
One decade was enough to bring IT on top of resource revenue for big companies.
His elasticity, agility and Pay-as-You-Go model had demonstrated a new efficient way of doing business.

Many OTT players have adopted a Cloud based solution and have made a very good figure.

Even virtualized, these Telco applications have a specific requirements to consider when designing and preparing virtualized environment for them.

For IT managers and engineers, I invite you to  take a deep look on ETSI initiative for NFV.
You will heard a lot about ETSI NFV and the right way is to understand the standard before starting any design for Telco applications.

NFV, VIM, VNFM, MANO, NFVI, EMS are words that will made your day.
ETSI web site (link) explains all of these standards.

There are  specific requirements to get the virtualized network to carrier grade capability.
  •  Availability: Telco domain require at least five 9s of even six which means only few seconds of planned or unplanned downtime per year. Most of IT entreprise are about three 9s of availability.
  •  Performance: a large number of transactions happening in parallel.A large amount of throughput and lower latency are required by Telco applications. Hypervisor should  handle a huge number of real time transaction without impacting quality of service.
  •  Security: Consumers should feel secure when they are transmitting their Data running on top of shared infrastructure.
  • Serviceability: The network life cycle should be more longer that on IT domain. Network should be serviceable over a long of time, maybe more than 8 years.
  • Service Continuity:  Carrier want to built geo redundant network to assure disaster recovery and business continuity of network service in case of disaster or incident.
 
To satisfy theses requirements, many Telecom vendors have started leverage their own cloud platform based mainly on Openstack framework. Many feature have been evolved to reach the Telco requirements and many of them are related to hypervisor. Latency, jitter parameters have been proved to much application real time requests. Same amelioration are related to virtual switch and throughput. Some applications require 40G of throughput between virtualized components located on the same enclosure.Some others across different racks on the same location.
Real time applications need determinism almost the time.

Multi-tenancy and isolation are mandatory on your your virtualized Telco enviornment.
The NFV component VNFM is responsible of applications lifecyle management in term of intstantiation and auto-sacling feature. This component is dealing with your Virtual infrastructure Management VIM to assure that. Isolation and Multi-tenancy are the unique guaranty of boundaries between all of this applications coming from different vendors.

This amelioration done at the hypervisor layer to support carrier-grade applications made a lot of trade-offs:
  • It's hard to jointly optimize for latency, throughput, availibility and efficent.
  • Difficult to maintain virtualization benefits while optimize performance.
Many requirements from Telecom domain are different from their at the IT side.
Some customization may also impact virtualization operational mode.
A lot of challenges are coming with the virtualization of the Telco network functions.
Service chanining, orchestration and Software defined network are other features that will help us  reaching  a Telco Cloud domain.

  






   

Comments

Popular posts from this blog

What You Must Know Before Establishing a Recovery Plan ?

In today's rapidly evolving digital landscape, organizations are increasingly adopting the zero trust model, primarily due to the expanding attack surface that leaves critical systems and data exposed. This shift is also fueled by the heightened sophistication of cyber-attacks, which have become more complex and harder to detect, surpassing traditional security measures. Additionally, the existing operating models within organizations are often inconsistent, typically characterized by distributed and siloed environments.    This fragmentation creates vulnerabilities and makes it challenging to implement uniform security protocols. The zero trust model addresses these challenges by assuming that threats exist both inside and outside the network, necessitating continuous verification of all users and devices. Its adoption represents a proactive stance in the ongoing battle against cyber threats, ensuring a more robust and resilient organizational security posture. The Evolution ...

A comprehensive guide to ransomware distribution in VMware environments

In a virtualized on-premises environment based on VMware, ransomware distribution scenarios can be somewhat unique due to the nature of virtualization technology. However, many of the traditional attack vectors still apply. Here are some ransomware distribution scenarios specific to a VMware-based virtualized environment: Phishing Attacks Targeting Administrators: Administrators with access to the VMware environment might receive phishing emails. If they fall for these and their credentials are compromised, attackers can gain access to the virtualized environment. Exploiting Vulnerabilities in VMware Software: If VMware software or the underlying operating system is not kept up-to-date with security patches, vulnerabilities can be exploited by attackers to deliver ransomware into the virtualized environment. Compromised Remote Management Tools: Tools used for remote management of the virtualized environment, such as vSphere, can be a target. If these tools are compromised, attackers ca...

Edge Computing Demystified Book

After a while I'm back and pleased  to share in this post my first book around Edge computing Technologies. Edge computing has been a very hot and interesting topic nowadays for communication service provider and Enterprise so far. Augmented Reality / Virtual Reality, Smart cities, Healthcare, industrial IoT and many others use cases require a change in the way we operate and host application in the cloud.  IA, Big Data and analytics are often used today to understand the behavior of the customer and even the health of services. Real-time and high throughput demand are the characteristic of the new business services. Edge computing technology promises to resolve different challenges and brings compute, storage and bandwidth close to the data source. I tried in ‘the Edge Computing Demystified’ book to explain Edge computing technology referring to different use cases from communication service provider and enterprise industry. I h...