SlideShare a Scribd company logo
1 of 31
Download to read offline
Fundamental Approaches to NFV
Deployment
Presented by:
Mohamed Elmosaly, B.Eng., MBA
Product Marketing Manager
melmosaly@fonex.com
Agenda
Network Function Virtualization
• What is it?
• Benefits
• Market Drivers
NFV Deployment Models
NFV Implementations
Challenges
Summary
Network Functions Virtualization
Service provider networking functions
performed by software hosted on
standard computer servers, replacing
vendor-specific hardware
Strong interest in NFV among service providers
NFV/SDN market to reach $11 billion by 20181
NFV addresses challenges of automated and speedy service
delivery
1. Infonetics Research
CPE and Value-Added Services: Today
Adding new network functionality or capabilities
• Upgrade the CPE/NID device, or
• Replace with an enhanced model, or
• Add a new physical appliance
CPE/NID CPE/NID
CPE/NID
VPN
Network
Branch Office
Branch Office
Customer
Network
Customer
Network
Customer
Network
Enabled by NFV
Adding new functionality and capabilities with Virtualized Network
Functions (VNF) – SW running on a compute infrastructure
VPN
Network
Branch Office HQ
Branch Office
vCPE vCPE
vCPE
Customer
Network
Customer
Network
Customer
Network
NFV Market Drivers
NFV Benefits
Improve agility and customer satisfaction
• Reduce expensive churn by improving TTM for new services that more
immediately address customers requirements by delivering capabilities
“at the speed of software”
• Service providers will be able to define new services independently of
equipment providers. They will be able to construct a new service from
virtualized network functions provided by independent software vendors
or even create them internally.
NFV Benefits
Boost average service revenue per customer (ARPU)
• Promote new and faster service adoption with low-risk “Try-before-you-
buy” offering
• Flexible “Pay-as-you-grow” service packaging so customer don’t need to
buy and maintain expensive appliances.
Reduce cost
• Define and deploy new services without installing or replacing network
elements.
• Eliminate truck rolls for new service introduction and upgrades.
• Reduce CAPEX by deploying open-source or lower cost virtual network
functions (VNFs) instead of physical appliances.
NFV Deployment Models
VNFs located in the network
All virtual functions located at the data center
Basic switch/router at the customer premises
Heavy reliability on the cloud and network performance
Customer
Network
Internet
Intranet
Customer Premises
All virtualized functionality centralized in Data Centers
Centralized
Centralized
Network
VNFs located at the customer edge
All virtual functions located at the customer premises
No VNFs at the data center
Facilitates traffic handling and offloading to hardware-based
processing
Customer
Network
Internet
Intranet
Customer Premises
Customer
Network
All virtualized functionality de-centralized to Customer Premise
VNFs between network and customer sites
Virtual functions distributed between network and customer sites
VNFs placed wherever performance and cost are optimal
Can be dynamically ordered, configured and chained to meet
customer business needs
Customer
Network
Internet
Intranet
Customer Premises
Distributed
Network
Virtualized functions distributed between DC and Customer Premise
Factors Affecting VNF Placement
Bandwidth Efficiency
Security
Survivability
Performance
Driver for NFV at the customer edge
QoS, PM
CPE Router
Appliance
Firewall
Appliance
Customer
Network
Provider
Network
Customer Location
Customer Location
Dumb Pipe
OTT Vendors:
Provider
Network
Customer
Network
CPE
Basic Scenario
• No Service differentiation
• No Value Added Services
More advanced Scenario
• Value Added Services, but
– High Cost Appliances
– Complex to Manage
– No dynamics to Modify
and Add New services
Driver for NFV at the customer edge
QoS, PM
Customer
Network
Provider
Network
Customer Location
Customer Location
Dumb Pipe
OTT Vendors:
Provider
Network
Customer
Network
CPE
Basic Scenario
• No Service differentiation
• No Value Added Services
NFV at Customer
• Dynamic
• Reduce costs
• Faster TTM vCPE
Why VNFs at Customer Edge?
Some functions MUST run at
the customer premises,
e.g., end-to-end encryption
and WAN optimization
Feasibility Performance
Economics Policy
Dictated by regulations
and policies
Tradeoff between network
and IT cost
Some applications are more
effective at the customer
premises
e.g., end-to-end QoS
VNF applications at the customer edge
Loopbacks – Verification of connectivity to customer site
End-to-End QoS – More accurate measurements
Security – Encryption end-to-end
Firewall – Added security
IP-PBX – Local connectivity regardless of WAN connectivity
VNF Deployment Models at the Customer Edge
Hardware-based NID
Integrated x86 server
Wire-speed switching and routing
NID/Router functions may be
virtualized
COTS server, vendor-agnostic
Running software VNFs
Requires customization
NID/Router functions must be
virtualized
Hybrid (vCPE) Whitebox (uCPE)
Hybrid vs Whitebox
Hybrid platform
OAM
L2/L3 FWD
QOS
Loopback
SAT
SLA Monitoring
Shaping
Policing
UNI NNI
VNF VNF VNF VNF
FPGA
x86
Transport and OAM in HW means:
• Reliable Transport
• Reliable, accelerated OAM
• Accurate policing/shaping
• Full Rate Service Activation Tests
Transport
Services
White box platform
Will Virtualization of OAM and Transport work?
• Main challenge: Operation
What is Operational Cost when not working?
• Is problem Transport or Service?
• How to troubleshoot?
UNI
VNF VNF VNF? VNF
Linux?
NNI
x86
OVS?
Transport
Services
Hybrid vs Whitebox CPE
Hardware-based NID functionality, such as
accurate and scalable SAT, PM and traffic mgt.
SW-based NID utilizes general purpose
CPU that compromises NID functionality
No disruption to established network operational
procedures and server module can easily be added
or upgraded w/o reinstalling NID/Router
Potential cost savings using COTS server
(assuming underlying switch fabric is
cheaper than underlying FPGA fabric)
HW-Based NFVI PM and fault Mgt. tools (VNF
delay, loss, jitter, throughput,..)
SW-based NFVI monitoring tools depend
on same CPU resources
Reduction of size, power and cost by consolidating devices when offering NFV based services
Support for rapid service innovation without costly truck rolls
Whitebox with Pluggable NID
Add HW functions to COTS server
Conserves server CPU cores for additional VNFs
HW-based OAM (accurate PM and wire-speed SAT)
Provider
Network
Combining Physical and
Virtualized Functions
PNFs
Policing
Loops OAM Diagnostic
VNFs
vRouter
AAw Load Bal.
What does NFV mean for service providers?
New Service Capabilities
• Increase service value and revenue streams
Lower Implementation Costs
• Lower cost than traditional way
• Download of desired functions to L2/L3 NID without truck rolls, new
equipment, on-site installation or energy costs
Lower Networking Costs
• NFV at customer edge - Lower networking costs compared to placing
functions at a central location requiring higher bandwidth and more
stringent network SLA
Easier New Service Introduction
• “Try & Buy” approach
Possible NFV Implementations
Hosted Services
Target market
• Enterprise customers that prefer keeping control on routing using own
router, and/or
• Enterprise customers that needs high speed connectivity
Currently the enterprise customer buys
• Ethernet VPN services with Ethernet NIDs from SP
• A Router appliance from HW vendor and manages it himself
The service provider gets no revenues related to the Router (or other
appliances)
Ethernet NID
Ethernet VPN
Network
Branch Office HQ
Customer
Network
CPE Router
Ethernet NID
Customer
Network
CPE Router
Service provider revenue span
Hosted Services with VNFs
The Ethernet service provider supplies also routing VNFs
• A new value-added service for the same target market
• Increase customer stickiness and reduce churn
Responsibilities
• Ethernet service provider: Instantiates and actives the VNFs
• Enterprise customer: self-manages its overlay IP network (same as with a router
appliance)
Benefit to the enterprise customer
• Move from Capex to Opex business model, while maintaining self-management
of the IP layer
Next step: Ethernet service provider can supply additional VNFs for value-added
services (eg Firewall, Encryption, IT services)
Ethernet NID
Ethernet VPN
Network
Branch Office
Customer
Network
Ethernet NID
Customer
Network
Router
VNF
Router
VNF
Service provider revenue span
HQ
Business, Education, Health and Wholesale
SP
Network
Smart demarcation device with NFVI
Virtual functions: Routing, diagnostic, application-awareness
Value-added apps: Firewall, Encryption, WAN optimization, IP-PBX
Utilities, Transportation and Government
Reduce number of physical devices for better reliability and simpler
operation
SP
Network
NFV Challenges
Organizational structure change
• Combining expertise of network and IT
teams
Ensure proper orchestration of the
VNFs
• Gradual D-NFV deployment minimizes
risks and reduces upfront investment
• Open source and manage 3rd party legacy
Assurance of service level agreements
• SLA complexity in a virtualized
environment involving service chaining
and multiple network segments
Summary
Customer
Network
Internet
Intranet
Customer Premises
All virtualized functionality centralized in Data Centers
Centralized
Centralized
Network
Virtualized functions distributed between DC and Customer Premise
Customer
Network
Internet
Intranet
Customer Premises
Distributed
Network
Customer
Network
Internet
Intranet
Customer Premises
All virtualized functionality de-centralized to Customer Premise
Customer
Network
Summary
NFV creates value for service providers and their customers
Faster time to market for business and consumer services
• Rapid deployment
• Faster time to upgrade services
Increased Revenues
• Enhancing existing and creating value-added services
Improved economics and simplified operations
• Combining multiple network functions on a single platform
Flexible relocation of network functionalities
Mohamed Elmosaly
melmosaly@fonex.com
Product Marketing Manager
Innovative Telecom Solutions
Thank you for your attention

More Related Content

Similar to 1-11-FONEX-What-are-the-3-Fundamental-Approaches-to-NFV-Deployment.pdf

uCPE and VNFs Explained
uCPE and VNFs ExplaineduCPE and VNFs Explained
uCPE and VNFs ExplainedAlan Percy
 
Enea NFV Access Customer Case
Enea NFV Access Customer CaseEnea NFV Access Customer Case
Enea NFV Access Customer CaseEnea Software AB
 
Anuta Networks at Networking Field Day 14
Anuta  Networks at Networking Field Day 14Anuta  Networks at Networking Field Day 14
Anuta Networks at Networking Field Day 14Kiran Sirupa
 
Intel Network Builders Summit: Key Lessons from an advanced multi-vendor NFV ...
Intel Network Builders Summit: Key Lessons from an advanced multi-vendor NFV ...Intel Network Builders Summit: Key Lessons from an advanced multi-vendor NFV ...
Intel Network Builders Summit: Key Lessons from an advanced multi-vendor NFV ...Kiran Sirupa
 
What is Network Function Virtualisation (NFV)?
What is Network Function Virtualisation (NFV)?What is Network Function Virtualisation (NFV)?
What is Network Function Virtualisation (NFV)?Karri Huhtanen
 
Carrier-Class Environments for NFV Lifecycle Management- Overture & Wind Rive...
Carrier-Class Environments for NFV Lifecycle Management- Overture & Wind Rive...Carrier-Class Environments for NFV Lifecycle Management- Overture & Wind Rive...
Carrier-Class Environments for NFV Lifecycle Management- Overture & Wind Rive...Overture Networks
 
Service Provider Architectures for Tomorrow by Chow Khay Kid
Service Provider Architectures for Tomorrow by Chow Khay KidService Provider Architectures for Tomorrow by Chow Khay Kid
Service Provider Architectures for Tomorrow by Chow Khay KidMyNOG
 
Five Ways Virtual CPE Reduces Costs and Enables Innovative Enterprise Services
Five Ways Virtual CPE Reduces Costs and Enables Innovative Enterprise ServicesFive Ways Virtual CPE Reduces Costs and Enables Innovative Enterprise Services
Five Ways Virtual CPE Reduces Costs and Enables Innovative Enterprise ServicesGCC Computers
 
Net-Ace - Vendor-Agnostic Service Orchestration platform
Net-Ace - Vendor-Agnostic Service Orchestration platformNet-Ace - Vendor-Agnostic Service Orchestration platform
Net-Ace - Vendor-Agnostic Service Orchestration platformyurid79
 
Research Challenges and Opportunities in the Era of the Internet of Everythin...
Research Challenges and Opportunities in the Era of the Internet of Everythin...Research Challenges and Opportunities in the Era of the Internet of Everythin...
Research Challenges and Opportunities in the Era of the Internet of Everythin...Stenio Fernandes
 
High Scalability Network Monitoring for Communications Service Providers
High Scalability Network Monitoring for Communications Service ProvidersHigh Scalability Network Monitoring for Communications Service Providers
High Scalability Network Monitoring for Communications Service ProvidersCA Technologies
 
Cloudify: Open vCPE Design Concepts and Multi-Cloud Orchestration
Cloudify: Open vCPE Design Concepts and Multi-Cloud OrchestrationCloudify: Open vCPE Design Concepts and Multi-Cloud Orchestration
Cloudify: Open vCPE Design Concepts and Multi-Cloud OrchestrationCloudify Community
 
PLNOG15: NFV: Lessons learned from production deployments and current observa...
PLNOG15: NFV: Lessons learned from production deployments and current observa...PLNOG15: NFV: Lessons learned from production deployments and current observa...
PLNOG15: NFV: Lessons learned from production deployments and current observa...PROIDEA
 
BT Group: Use of Graph in VENA (a smart broadcast network)
BT Group: Use of Graph in VENA (a smart broadcast network)BT Group: Use of Graph in VENA (a smart broadcast network)
BT Group: Use of Graph in VENA (a smart broadcast network)Neo4j
 
Nub8 & Federated Wireless.pptx
Nub8 & Federated Wireless.pptxNub8 & Federated Wireless.pptx
Nub8 & Federated Wireless.pptxOrlando F. Delgado
 
Ensemble Launches Major Upgrade to NFV Platform
Ensemble Launches Major Upgrade to NFV PlatformEnsemble Launches Major Upgrade to NFV Platform
Ensemble Launches Major Upgrade to NFV PlatformADVA
 

Similar to 1-11-FONEX-What-are-the-3-Fundamental-Approaches-to-NFV-Deployment.pdf (20)

uCPE and VNFs Explained
uCPE and VNFs ExplaineduCPE and VNFs Explained
uCPE and VNFs Explained
 
uCPE and VNFs Explained
uCPE and VNFs ExplaineduCPE and VNFs Explained
uCPE and VNFs Explained
 
Enea NFV Access Customer Case
Enea NFV Access Customer CaseEnea NFV Access Customer Case
Enea NFV Access Customer Case
 
Colt Network On Demand
Colt Network On DemandColt Network On Demand
Colt Network On Demand
 
Anuta Networks at Networking Field Day 14
Anuta  Networks at Networking Field Day 14Anuta  Networks at Networking Field Day 14
Anuta Networks at Networking Field Day 14
 
Intel Network Builders Summit: Key Lessons from an advanced multi-vendor NFV ...
Intel Network Builders Summit: Key Lessons from an advanced multi-vendor NFV ...Intel Network Builders Summit: Key Lessons from an advanced multi-vendor NFV ...
Intel Network Builders Summit: Key Lessons from an advanced multi-vendor NFV ...
 
What is Network Function Virtualisation (NFV)?
What is Network Function Virtualisation (NFV)?What is Network Function Virtualisation (NFV)?
What is Network Function Virtualisation (NFV)?
 
Carrier-Class Environments for NFV Lifecycle Management- Overture & Wind Rive...
Carrier-Class Environments for NFV Lifecycle Management- Overture & Wind Rive...Carrier-Class Environments for NFV Lifecycle Management- Overture & Wind Rive...
Carrier-Class Environments for NFV Lifecycle Management- Overture & Wind Rive...
 
Service Provider Architectures for Tomorrow by Chow Khay Kid
Service Provider Architectures for Tomorrow by Chow Khay KidService Provider Architectures for Tomorrow by Chow Khay Kid
Service Provider Architectures for Tomorrow by Chow Khay Kid
 
Five Ways Virtual CPE Reduces Costs and Enables Innovative Enterprise Services
Five Ways Virtual CPE Reduces Costs and Enables Innovative Enterprise ServicesFive Ways Virtual CPE Reduces Costs and Enables Innovative Enterprise Services
Five Ways Virtual CPE Reduces Costs and Enables Innovative Enterprise Services
 
Net-Ace - Vendor-Agnostic Service Orchestration platform
Net-Ace - Vendor-Agnostic Service Orchestration platformNet-Ace - Vendor-Agnostic Service Orchestration platform
Net-Ace - Vendor-Agnostic Service Orchestration platform
 
Research Challenges and Opportunities in the Era of the Internet of Everythin...
Research Challenges and Opportunities in the Era of the Internet of Everythin...Research Challenges and Opportunities in the Era of the Internet of Everythin...
Research Challenges and Opportunities in the Era of the Internet of Everythin...
 
NFV and OpenStack
NFV and OpenStackNFV and OpenStack
NFV and OpenStack
 
High Scalability Network Monitoring for Communications Service Providers
High Scalability Network Monitoring for Communications Service ProvidersHigh Scalability Network Monitoring for Communications Service Providers
High Scalability Network Monitoring for Communications Service Providers
 
Cloudify: Open vCPE Design Concepts and Multi-Cloud Orchestration
Cloudify: Open vCPE Design Concepts and Multi-Cloud OrchestrationCloudify: Open vCPE Design Concepts and Multi-Cloud Orchestration
Cloudify: Open vCPE Design Concepts and Multi-Cloud Orchestration
 
PLNOG15: NFV: Lessons learned from production deployments and current observa...
PLNOG15: NFV: Lessons learned from production deployments and current observa...PLNOG15: NFV: Lessons learned from production deployments and current observa...
PLNOG15: NFV: Lessons learned from production deployments and current observa...
 
BT Group: Use of Graph in VENA (a smart broadcast network)
BT Group: Use of Graph in VENA (a smart broadcast network)BT Group: Use of Graph in VENA (a smart broadcast network)
BT Group: Use of Graph in VENA (a smart broadcast network)
 
Nub8 & Federated Wireless.pptx
Nub8 & Federated Wireless.pptxNub8 & Federated Wireless.pptx
Nub8 & Federated Wireless.pptx
 
HP NFV ezine v2 dec 2014
HP NFV ezine v2 dec 2014HP NFV ezine v2 dec 2014
HP NFV ezine v2 dec 2014
 
Ensemble Launches Major Upgrade to NFV Platform
Ensemble Launches Major Upgrade to NFV PlatformEnsemble Launches Major Upgrade to NFV Platform
Ensemble Launches Major Upgrade to NFV Platform
 

Recently uploaded

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

1-11-FONEX-What-are-the-3-Fundamental-Approaches-to-NFV-Deployment.pdf

  • 1. Fundamental Approaches to NFV Deployment Presented by: Mohamed Elmosaly, B.Eng., MBA Product Marketing Manager melmosaly@fonex.com
  • 2. Agenda Network Function Virtualization • What is it? • Benefits • Market Drivers NFV Deployment Models NFV Implementations Challenges Summary
  • 3. Network Functions Virtualization Service provider networking functions performed by software hosted on standard computer servers, replacing vendor-specific hardware Strong interest in NFV among service providers NFV/SDN market to reach $11 billion by 20181 NFV addresses challenges of automated and speedy service delivery 1. Infonetics Research
  • 4. CPE and Value-Added Services: Today Adding new network functionality or capabilities • Upgrade the CPE/NID device, or • Replace with an enhanced model, or • Add a new physical appliance CPE/NID CPE/NID CPE/NID VPN Network Branch Office Branch Office Customer Network Customer Network Customer Network
  • 5. Enabled by NFV Adding new functionality and capabilities with Virtualized Network Functions (VNF) – SW running on a compute infrastructure VPN Network Branch Office HQ Branch Office vCPE vCPE vCPE Customer Network Customer Network Customer Network
  • 7. NFV Benefits Improve agility and customer satisfaction • Reduce expensive churn by improving TTM for new services that more immediately address customers requirements by delivering capabilities “at the speed of software” • Service providers will be able to define new services independently of equipment providers. They will be able to construct a new service from virtualized network functions provided by independent software vendors or even create them internally.
  • 8. NFV Benefits Boost average service revenue per customer (ARPU) • Promote new and faster service adoption with low-risk “Try-before-you- buy” offering • Flexible “Pay-as-you-grow” service packaging so customer don’t need to buy and maintain expensive appliances. Reduce cost • Define and deploy new services without installing or replacing network elements. • Eliminate truck rolls for new service introduction and upgrades. • Reduce CAPEX by deploying open-source or lower cost virtual network functions (VNFs) instead of physical appliances.
  • 10. VNFs located in the network All virtual functions located at the data center Basic switch/router at the customer premises Heavy reliability on the cloud and network performance Customer Network Internet Intranet Customer Premises All virtualized functionality centralized in Data Centers Centralized Centralized Network
  • 11. VNFs located at the customer edge All virtual functions located at the customer premises No VNFs at the data center Facilitates traffic handling and offloading to hardware-based processing Customer Network Internet Intranet Customer Premises Customer Network All virtualized functionality de-centralized to Customer Premise
  • 12. VNFs between network and customer sites Virtual functions distributed between network and customer sites VNFs placed wherever performance and cost are optimal Can be dynamically ordered, configured and chained to meet customer business needs Customer Network Internet Intranet Customer Premises Distributed Network Virtualized functions distributed between DC and Customer Premise
  • 13. Factors Affecting VNF Placement Bandwidth Efficiency Security Survivability Performance
  • 14. Driver for NFV at the customer edge QoS, PM CPE Router Appliance Firewall Appliance Customer Network Provider Network Customer Location Customer Location Dumb Pipe OTT Vendors: Provider Network Customer Network CPE Basic Scenario • No Service differentiation • No Value Added Services More advanced Scenario • Value Added Services, but – High Cost Appliances – Complex to Manage – No dynamics to Modify and Add New services
  • 15. Driver for NFV at the customer edge QoS, PM Customer Network Provider Network Customer Location Customer Location Dumb Pipe OTT Vendors: Provider Network Customer Network CPE Basic Scenario • No Service differentiation • No Value Added Services NFV at Customer • Dynamic • Reduce costs • Faster TTM vCPE
  • 16. Why VNFs at Customer Edge? Some functions MUST run at the customer premises, e.g., end-to-end encryption and WAN optimization Feasibility Performance Economics Policy Dictated by regulations and policies Tradeoff between network and IT cost Some applications are more effective at the customer premises e.g., end-to-end QoS
  • 17. VNF applications at the customer edge Loopbacks – Verification of connectivity to customer site End-to-End QoS – More accurate measurements Security – Encryption end-to-end Firewall – Added security IP-PBX – Local connectivity regardless of WAN connectivity
  • 18. VNF Deployment Models at the Customer Edge Hardware-based NID Integrated x86 server Wire-speed switching and routing NID/Router functions may be virtualized COTS server, vendor-agnostic Running software VNFs Requires customization NID/Router functions must be virtualized Hybrid (vCPE) Whitebox (uCPE)
  • 19. Hybrid vs Whitebox Hybrid platform OAM L2/L3 FWD QOS Loopback SAT SLA Monitoring Shaping Policing UNI NNI VNF VNF VNF VNF FPGA x86 Transport and OAM in HW means: • Reliable Transport • Reliable, accelerated OAM • Accurate policing/shaping • Full Rate Service Activation Tests Transport Services White box platform Will Virtualization of OAM and Transport work? • Main challenge: Operation What is Operational Cost when not working? • Is problem Transport or Service? • How to troubleshoot? UNI VNF VNF VNF? VNF Linux? NNI x86 OVS? Transport Services
  • 20. Hybrid vs Whitebox CPE Hardware-based NID functionality, such as accurate and scalable SAT, PM and traffic mgt. SW-based NID utilizes general purpose CPU that compromises NID functionality No disruption to established network operational procedures and server module can easily be added or upgraded w/o reinstalling NID/Router Potential cost savings using COTS server (assuming underlying switch fabric is cheaper than underlying FPGA fabric) HW-Based NFVI PM and fault Mgt. tools (VNF delay, loss, jitter, throughput,..) SW-based NFVI monitoring tools depend on same CPU resources Reduction of size, power and cost by consolidating devices when offering NFV based services Support for rapid service innovation without costly truck rolls
  • 21. Whitebox with Pluggable NID Add HW functions to COTS server Conserves server CPU cores for additional VNFs HW-based OAM (accurate PM and wire-speed SAT) Provider Network Combining Physical and Virtualized Functions PNFs Policing Loops OAM Diagnostic VNFs vRouter AAw Load Bal.
  • 22. What does NFV mean for service providers? New Service Capabilities • Increase service value and revenue streams Lower Implementation Costs • Lower cost than traditional way • Download of desired functions to L2/L3 NID without truck rolls, new equipment, on-site installation or energy costs Lower Networking Costs • NFV at customer edge - Lower networking costs compared to placing functions at a central location requiring higher bandwidth and more stringent network SLA Easier New Service Introduction • “Try & Buy” approach
  • 24. Hosted Services Target market • Enterprise customers that prefer keeping control on routing using own router, and/or • Enterprise customers that needs high speed connectivity Currently the enterprise customer buys • Ethernet VPN services with Ethernet NIDs from SP • A Router appliance from HW vendor and manages it himself The service provider gets no revenues related to the Router (or other appliances) Ethernet NID Ethernet VPN Network Branch Office HQ Customer Network CPE Router Ethernet NID Customer Network CPE Router Service provider revenue span
  • 25. Hosted Services with VNFs The Ethernet service provider supplies also routing VNFs • A new value-added service for the same target market • Increase customer stickiness and reduce churn Responsibilities • Ethernet service provider: Instantiates and actives the VNFs • Enterprise customer: self-manages its overlay IP network (same as with a router appliance) Benefit to the enterprise customer • Move from Capex to Opex business model, while maintaining self-management of the IP layer Next step: Ethernet service provider can supply additional VNFs for value-added services (eg Firewall, Encryption, IT services) Ethernet NID Ethernet VPN Network Branch Office Customer Network Ethernet NID Customer Network Router VNF Router VNF Service provider revenue span HQ
  • 26. Business, Education, Health and Wholesale SP Network Smart demarcation device with NFVI Virtual functions: Routing, diagnostic, application-awareness Value-added apps: Firewall, Encryption, WAN optimization, IP-PBX
  • 27. Utilities, Transportation and Government Reduce number of physical devices for better reliability and simpler operation SP Network
  • 28. NFV Challenges Organizational structure change • Combining expertise of network and IT teams Ensure proper orchestration of the VNFs • Gradual D-NFV deployment minimizes risks and reduces upfront investment • Open source and manage 3rd party legacy Assurance of service level agreements • SLA complexity in a virtualized environment involving service chaining and multiple network segments
  • 29. Summary Customer Network Internet Intranet Customer Premises All virtualized functionality centralized in Data Centers Centralized Centralized Network Virtualized functions distributed between DC and Customer Premise Customer Network Internet Intranet Customer Premises Distributed Network Customer Network Internet Intranet Customer Premises All virtualized functionality de-centralized to Customer Premise Customer Network
  • 30. Summary NFV creates value for service providers and their customers Faster time to market for business and consumer services • Rapid deployment • Faster time to upgrade services Increased Revenues • Enhancing existing and creating value-added services Improved economics and simplified operations • Combining multiple network functions on a single platform Flexible relocation of network functionalities
  • 31. Mohamed Elmosaly melmosaly@fonex.com Product Marketing Manager Innovative Telecom Solutions Thank you for your attention