SlideShare a Scribd company logo
PANEL III:
SERVICE ASSURANCE FOR NFV
Panel
Mark Newman
Chief Analyst
TMF
James Crawshaw
Senior Analyst
Heavy Reading
Laszlo Bojtos
Solution Architect
Zenoss
Ihab Mahna
Solution Architect
EXFO
Yuval Stein
AVP Product Mgmt
Service Assurance
TEOCO
Ignacio Mas
Senior Expert in
Programmable Networks
Ericsson
Outline
• Operators are currently focused on the near-term challenges of NFV, such
as onboarding VNFs and interoperability
• However, they need to start preparing for the longer-term challenge of
enabling service assurance
• SA is particularly challenging for services delivered over a hybrid of physical
and virtual network functions
• Detailed end-to-end service paths will be needed to relate service
measurements across VNFs and physical devices.
• Problems at the hardware layer (NFVi) will impact the software layer
(VNFs) leading to a multiplicity of alarms and the need for new correlations
to be mapped out.
• This panel will discuss service assurance for NFV and how to deliver on the
promise of closed-loop automation.
Verizon – Service Assurance for Hybrid
• Service Assurance
complexity is higher
• Automated backup?
OpenStack snapshots
• Self-healing? Not if the
license is tied to a VM ID, a
security certificate is
required or there have
been config changes since
last snapshot
• Auto scaling? Depends on
VNF support, licensing and
commercial policy Source: Verizon
NFV a l’Orange
Source: Adapted by Heavy Reading from Future OSS whitepaper, Orange.
NFV Assurance a l’Orange
Operations module:
• Dynamic fault and performance management (VNF/PNF) – intelligent fault diagnosis, localization and impact
analysis using alarm pattern and service impact libraries
• Service desk and workforce management – analytics to set rules to manage tickets and work orders
• Test & diagnosis – to support policy verification, incident resolution and test end-to-end service chain on design or
instantiation.
• Incident management – using dynamic applications and analytics
• Problem management – resolving remaining issues through higher level human skills and cross-department
cooperation
Visualization module:
• Flexible view – if problems cannot be resolved autonomously they need to be represented in an operations view
showing the status of network, fulfillment orders and transactions
• Presentation configuration – to enable different types of view (e.g. dynamic inventory) with required granularity
• Data orientation – data model to support metrics, events, and configuration data
• Analytics notebooks – to share analysis across multiple parties for cooperation
Must correlate between NVFI and VNFM
• How can we tell if a fault is originating in the VNF itself or in the
underlying hardware?
• Shannon and Yates write: “An issue at the hardware layer (cloud
servers) that impacts the software layer (VNF) will alarm at both
layers. Without appropriate intelligence and automation, the
alarming on the hardware and software layers could result in both
the hardware operations team and team managing the VNF to
simultaneously respond to the issues reported and investigate the
root cause in parallel.”
OSM Release 3 Service Assurance
• Monitoring module, which is
described as experimental,
can correlate telemetry [CPU
utilization, read latency, etc.]
related to the VMs and VNFs
to the relevant network
services
• If a VM fails and triggers an
alarm, you don't get a
duplicate alarm on the VNFs
running on that VM, so you
don't waste the time of the
team managing the VNFs.
Only the NFVi team need
respond.
Source: ETSI
Meeting the Challenges of NFV Assurance - 1
Challenges across all layers Solution
Analytics and Reporting for Hybrid Networks
(both PNFs & VNFs)
A unified data model for hybrid networks to abstract any NF
Accurate Root-Cause Analysis in a
dynamically changed topology
Use algorithms that can pinpoint service and network issues
in near real-time to trigger healing as part of closed-loops
Meeting the Challenges of NFV Assurance - 2
Service Management challenges Solution
Automatic onboarding of Assurance
definitions (policies) for new services
Tight Integration with the E2E Orchestrator to be notified on
Service creation and changes (TOSCA)
Accurate Service Impact analysis among
layers (Services, VNFs). To be used as part of
closed-loops.
• Well updated Service-Resource Data Model
• Integration with the E2E Orchestrator to be notified on
Service creation and changes
• Advanced Service Impact Analysis
Integration with legacy OSS e.g. ticketing
(Resource and Service Management)
Open north-bound APIs from SA system
Monitoring SLAs and OLAs in a multi-
operator, multi-vendor business context
(Partner Management)
• Integration with the E2E Orchestrator to be notified on
dynamic changes in resources or services related to
partner management (SLA & Thresholding interfaces).
• Use strong thresholding capabilities
Meeting the Challenges of NFV Assurance - 3
VNF and Virtual Infrastructure Challenges Solution
VNFs are not aware of the NFVI
dependencies (performance/availability of
underlying compute, storage, networking,
hypervisor, OS).
Consolidate the operation of NFV infrastructure and VNFs
under one team
Alarms on NVFI triggers alarms on VNFM SA system must correlate between NVFI and VNFM
The NFVI that supports VNFs changes
dynamically
SA system must keep up with these changes
Difficulty onboarding new VNFs or NFVI SA system must support multiple protocols (SNMP, syslog,
XML, Netconf), and facilitate integration of vendor specific
APIs
Integration with NFVO SA system must receive service models, inventory and other
data from NFVO and automatically send remediation
requests based on problems it identifies
Closed loop assurance
• Lessons learned from early trials indicate that this space is very challenging
for COTS type offerings, with substantial customer adaptation required.
• A key challenge to hybrid orchestration has turned out to be a lack of
reliable inventory information exposing the underlying topology. Siloed
inventory remains a problem most operators have not invested in solving.
• Recent work in the MEF, on TAPI and topology engine concepts is
promising. The concept of the network as an inventory (from years back),
is now becoming more viable with the virtualization of the network, and
the advanced integration capabilities in the virtualized network functions
are enabling this.
• Policy is perhaps the largest issue to solve for Closed Loop Assurance. No
standard way to encapsulate and expose rules is a barrier to
interoperability between responsibility domains, and any master
orchestrator trying to implement closed loop network actions.

More Related Content

What's hot

NFV Security PPT
NFV Security PPTNFV Security PPT
NFV Security PPT
Nisarg Shah
 
NFV Ecosystem Enabler - a well-enabled VNF package catalyst
NFV Ecosystem Enabler - a well-enabled VNF package catalystNFV Ecosystem Enabler - a well-enabled VNF package catalyst
NFV Ecosystem Enabler - a well-enabled VNF package catalyst
Jenny Huang
 
Command Your Data Center - Net Optics/Ixia
Command Your Data Center - Net Optics/IxiaCommand Your Data Center - Net Optics/Ixia
Command Your Data Center - Net Optics/Ixia
Network Performance Channel GmbH
 
Enabling Traffic Management without DPI
Enabling Traffic Management without DPIEnabling Traffic Management without DPI
Enabling Traffic Management without DPI
Dirk Kutscher
 
Method for managing a telecommunication network
Method for managing a telecommunication networkMethod for managing a telecommunication network
Method for managing a telecommunication network
Toscana Open Research
 
Network Function Virtualization - Security Best Practices AtlSecCon 2015
Network Function Virtualization - Security Best Practices AtlSecCon 2015Network Function Virtualization - Security Best Practices AtlSecCon 2015
Network Function Virtualization - Security Best Practices AtlSecCon 2015Winston Morton
 
Open Source Carrier Networking
Open Source Carrier NetworkingOpen Source Carrier Networking
Open Source Carrier Networking
Dirk Kutscher
 
Meaningful and Necessary Operations on Behalf of NFV
Meaningful and Necessary Operations on Behalf of NFVMeaningful and Necessary Operations on Behalf of NFV
Meaningful and Necessary Operations on Behalf of NFV
Michelle Holley
 
Securing your telco cloud
Securing your telco cloud Securing your telco cloud
Securing your telco cloud
OPNFV
 
Network Function Virtualization Orchestration LI
Network Function Virtualization Orchestration LINetwork Function Virtualization Orchestration LI
Network Function Virtualization Orchestration LIKrishnamoorthy Arvind
 
Acronym Soup – NFV, SDN, OVN and VNF
Acronym Soup – NFV, SDN, OVN and VNFAcronym Soup – NFV, SDN, OVN and VNF
Acronym Soup – NFV, SDN, OVN and VNF
Emulex Corporation
 
bringing transparency on networks
bringing transparency on networksbringing transparency on networks
bringing transparency on networks
nerdic
 
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber ThreatsUsing NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
Emulex Corporation
 
NFV Tutorial
NFV TutorialNFV Tutorial
NFV Tutorial
Rashid Mijumbi
 
L7Viewer datasheet
L7Viewer datasheetL7Viewer datasheet
L7Viewer datasheet
L7Viewer
 
Bandit framework for systematic learning in wireless video based face recogni...
Bandit framework for systematic learning in wireless video based face recogni...Bandit framework for systematic learning in wireless video based face recogni...
Bandit framework for systematic learning in wireless video based face recogni...
ieeepondy
 
NFV and OpenStack
NFV and OpenStackNFV and OpenStack
NFV and OpenStack
Marie-Paule Odini
 
Nx ray etisalatnigeria
Nx ray etisalatnigeriaNx ray etisalatnigeria
Nx ray etisalatnigeriaOwoeye Opeyemi
 

What's hot (19)

NFV Security PPT
NFV Security PPTNFV Security PPT
NFV Security PPT
 
NFV Ecosystem Enabler - a well-enabled VNF package catalyst
NFV Ecosystem Enabler - a well-enabled VNF package catalystNFV Ecosystem Enabler - a well-enabled VNF package catalyst
NFV Ecosystem Enabler - a well-enabled VNF package catalyst
 
Command Your Data Center - Net Optics/Ixia
Command Your Data Center - Net Optics/IxiaCommand Your Data Center - Net Optics/Ixia
Command Your Data Center - Net Optics/Ixia
 
Enabling Traffic Management without DPI
Enabling Traffic Management without DPIEnabling Traffic Management without DPI
Enabling Traffic Management without DPI
 
Method for managing a telecommunication network
Method for managing a telecommunication networkMethod for managing a telecommunication network
Method for managing a telecommunication network
 
Network Function Virtualization - Security Best Practices AtlSecCon 2015
Network Function Virtualization - Security Best Practices AtlSecCon 2015Network Function Virtualization - Security Best Practices AtlSecCon 2015
Network Function Virtualization - Security Best Practices AtlSecCon 2015
 
Open Source Carrier Networking
Open Source Carrier NetworkingOpen Source Carrier Networking
Open Source Carrier Networking
 
Meaningful and Necessary Operations on Behalf of NFV
Meaningful and Necessary Operations on Behalf of NFVMeaningful and Necessary Operations on Behalf of NFV
Meaningful and Necessary Operations on Behalf of NFV
 
Securing your telco cloud
Securing your telco cloud Securing your telco cloud
Securing your telco cloud
 
Network Function Virtualization Orchestration LI
Network Function Virtualization Orchestration LINetwork Function Virtualization Orchestration LI
Network Function Virtualization Orchestration LI
 
NFV
NFVNFV
NFV
 
Acronym Soup – NFV, SDN, OVN and VNF
Acronym Soup – NFV, SDN, OVN and VNFAcronym Soup – NFV, SDN, OVN and VNF
Acronym Soup – NFV, SDN, OVN and VNF
 
bringing transparency on networks
bringing transparency on networksbringing transparency on networks
bringing transparency on networks
 
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber ThreatsUsing NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
 
NFV Tutorial
NFV TutorialNFV Tutorial
NFV Tutorial
 
L7Viewer datasheet
L7Viewer datasheetL7Viewer datasheet
L7Viewer datasheet
 
Bandit framework for systematic learning in wireless video based face recogni...
Bandit framework for systematic learning in wireless video based face recogni...Bandit framework for systematic learning in wireless video based face recogni...
Bandit framework for systematic learning in wireless video based face recogni...
 
NFV and OpenStack
NFV and OpenStackNFV and OpenStack
NFV and OpenStack
 
Nx ray etisalatnigeria
Nx ray etisalatnigeriaNx ray etisalatnigeria
Nx ray etisalatnigeria
 

Similar to Service assurance for NFV

Demystifying Network Function Virtualization (NFV) Service Assurance
Demystifying Network Function Virtualization (NFV) Service AssuranceDemystifying Network Function Virtualization (NFV) Service Assurance
Demystifying Network Function Virtualization (NFV) Service Assurance
Zenoss
 
Lessons learned so far in operationalizing NFV
Lessons learned so far in operationalizing NFVLessons learned so far in operationalizing NFV
Lessons learned so far in operationalizing NFV
James Crawshaw
 
Distributed VNF Management - Architecture and Use cases
Distributed VNF Management - Architecture and Use casesDistributed VNF Management - Architecture and Use cases
Distributed VNF Management - Architecture and Use cases
Sridhar Pothuganti
 
Distributed VNF Management - Architecture and Use cases
Distributed VNF Management - Architecture and Use casesDistributed VNF Management - Architecture and Use cases
Distributed VNF Management - Architecture and Use cases
Trinath Somanchi
 
Distributed vnf management architecture and use-cases
Distributed vnf management  architecture and use-casesDistributed vnf management  architecture and use-cases
Distributed vnf management architecture and use-cases
OPNFV
 
Network Function Virtualization - Telkomsel Perspective (SDN NFV Day ITB 2016)
Network Function Virtualization - Telkomsel Perspective (SDN NFV Day ITB 2016)Network Function Virtualization - Telkomsel Perspective (SDN NFV Day ITB 2016)
Network Function Virtualization - Telkomsel Perspective (SDN NFV Day ITB 2016)
SDNRG ITB
 
Network function virtualization
Network function virtualizationNetwork function virtualization
Network function virtualization
Satish Chavan
 
Demystifying OpenStack for NFV
Demystifying OpenStack for NFVDemystifying OpenStack for NFV
Demystifying OpenStack for NFV
Trinath Somanchi
 
IRJET- A Literature Survey on Scaling Approaches for VNF in NFV Monitoring
IRJET- A Literature Survey on Scaling Approaches for VNF in NFV MonitoringIRJET- A Literature Survey on Scaling Approaches for VNF in NFV Monitoring
IRJET- A Literature Survey on Scaling Approaches for VNF in NFV Monitoring
IRJET Journal
 
Network Function Virtualization : Overview
Network Function Virtualization : OverviewNetwork Function Virtualization : Overview
Network Function Virtualization : Overviewsidneel
 
Webinar how to ensure sdn-nfv doesn't break your network
Webinar   how to ensure sdn-nfv doesn't break your networkWebinar   how to ensure sdn-nfv doesn't break your network
Webinar how to ensure sdn-nfv doesn't break your network
Qualitest
 
Considerations for Deploying Virtual Network Functions and Services
Considerations for Deploying Virtual Network Functions and ServicesConsiderations for Deploying Virtual Network Functions and Services
Considerations for Deploying Virtual Network Functions and Services
Open Networking Summit
 
OPNFV Bengaluru Meetup
OPNFV Bengaluru MeetupOPNFV Bengaluru Meetup
OPNFV Bengaluru Meetup
Abhilash S
 
NFV - Telco Transformation Unfolded
NFV - Telco Transformation Unfolded NFV - Telco Transformation Unfolded
NFV - Telco Transformation Unfolded
Bangladesh Network Operators Group
 
Introduction to SDN: Software Defined Networking
Introduction to SDN: Software Defined NetworkingIntroduction to SDN: Software Defined Networking
Introduction to SDN: Software Defined Networking
Ankita Mahajan
 
Ensemble Launches Major Upgrade to NFV Platform
Ensemble Launches Major Upgrade to NFV PlatformEnsemble Launches Major Upgrade to NFV Platform
Ensemble Launches Major Upgrade to NFV Platform
ADVA
 
Network Function Virtualisation
Network Function VirtualisationNetwork Function Virtualisation
Network Function Virtualisation
IJERA Editor
 
NFV foundation/NFV For Dummies
NFV foundation/NFV For DummiesNFV foundation/NFV For Dummies
NFV foundation/NFV For Dummies
anandbajaj
 
Why Network Functions Virtualization sdn?
Why Network Functions Virtualization sdn?Why Network Functions Virtualization sdn?
Why Network Functions Virtualization sdn?
idrajeev
 

Similar to Service assurance for NFV (20)

Demystifying Network Function Virtualization (NFV) Service Assurance
Demystifying Network Function Virtualization (NFV) Service AssuranceDemystifying Network Function Virtualization (NFV) Service Assurance
Demystifying Network Function Virtualization (NFV) Service Assurance
 
Lessons learned so far in operationalizing NFV
Lessons learned so far in operationalizing NFVLessons learned so far in operationalizing NFV
Lessons learned so far in operationalizing NFV
 
Distributed VNF Management - Architecture and Use cases
Distributed VNF Management - Architecture and Use casesDistributed VNF Management - Architecture and Use cases
Distributed VNF Management - Architecture and Use cases
 
Distributed VNF Management - Architecture and Use cases
Distributed VNF Management - Architecture and Use casesDistributed VNF Management - Architecture and Use cases
Distributed VNF Management - Architecture and Use cases
 
Distributed vnf management architecture and use-cases
Distributed vnf management  architecture and use-casesDistributed vnf management  architecture and use-cases
Distributed vnf management architecture and use-cases
 
Network Function Virtualization - Telkomsel Perspective (SDN NFV Day ITB 2016)
Network Function Virtualization - Telkomsel Perspective (SDN NFV Day ITB 2016)Network Function Virtualization - Telkomsel Perspective (SDN NFV Day ITB 2016)
Network Function Virtualization - Telkomsel Perspective (SDN NFV Day ITB 2016)
 
Network function virtualization
Network function virtualizationNetwork function virtualization
Network function virtualization
 
Demystifying OpenStack for NFV
Demystifying OpenStack for NFVDemystifying OpenStack for NFV
Demystifying OpenStack for NFV
 
IRJET- A Literature Survey on Scaling Approaches for VNF in NFV Monitoring
IRJET- A Literature Survey on Scaling Approaches for VNF in NFV MonitoringIRJET- A Literature Survey on Scaling Approaches for VNF in NFV Monitoring
IRJET- A Literature Survey on Scaling Approaches for VNF in NFV Monitoring
 
Network Function Virtualization : Overview
Network Function Virtualization : OverviewNetwork Function Virtualization : Overview
Network Function Virtualization : Overview
 
N fv good
N fv goodN fv good
N fv good
 
Webinar how to ensure sdn-nfv doesn't break your network
Webinar   how to ensure sdn-nfv doesn't break your networkWebinar   how to ensure sdn-nfv doesn't break your network
Webinar how to ensure sdn-nfv doesn't break your network
 
Considerations for Deploying Virtual Network Functions and Services
Considerations for Deploying Virtual Network Functions and ServicesConsiderations for Deploying Virtual Network Functions and Services
Considerations for Deploying Virtual Network Functions and Services
 
OPNFV Bengaluru Meetup
OPNFV Bengaluru MeetupOPNFV Bengaluru Meetup
OPNFV Bengaluru Meetup
 
NFV - Telco Transformation Unfolded
NFV - Telco Transformation Unfolded NFV - Telco Transformation Unfolded
NFV - Telco Transformation Unfolded
 
Introduction to SDN: Software Defined Networking
Introduction to SDN: Software Defined NetworkingIntroduction to SDN: Software Defined Networking
Introduction to SDN: Software Defined Networking
 
Ensemble Launches Major Upgrade to NFV Platform
Ensemble Launches Major Upgrade to NFV PlatformEnsemble Launches Major Upgrade to NFV Platform
Ensemble Launches Major Upgrade to NFV Platform
 
Network Function Virtualisation
Network Function VirtualisationNetwork Function Virtualisation
Network Function Virtualisation
 
NFV foundation/NFV For Dummies
NFV foundation/NFV For DummiesNFV foundation/NFV For Dummies
NFV foundation/NFV For Dummies
 
Why Network Functions Virtualization sdn?
Why Network Functions Virtualization sdn?Why Network Functions Virtualization sdn?
Why Network Functions Virtualization sdn?
 

More from James Crawshaw

Open source for NFV MANO
Open source for NFV MANOOpen source for NFV MANO
Open source for NFV MANO
James Crawshaw
 
Advanced Analytics & AI for Network Operations
Advanced Analytics & AI for Network OperationsAdvanced Analytics & AI for Network Operations
Advanced Analytics & AI for Network Operations
James Crawshaw
 
Software driven operations
Software driven operationsSoftware driven operations
Software driven operations
James Crawshaw
 
Orchestrating the lifecycle of network services
Orchestrating the lifecycle of network servicesOrchestrating the lifecycle of network services
Orchestrating the lifecycle of network services
James Crawshaw
 
Zero Touch Analytics
Zero Touch AnalyticsZero Touch Analytics
Zero Touch Analytics
James Crawshaw
 
How CSPs are Leveraging Open APIs
How CSPs are Leveraging Open APIsHow CSPs are Leveraging Open APIs
How CSPs are Leveraging Open APIs
James Crawshaw
 
Software Defined Operations Research Presentation
Software Defined Operations Research PresentationSoftware Defined Operations Research Presentation
Software Defined Operations Research Presentation
James Crawshaw
 
Enabling the transition from CSP to DSP with B/OSS transformation
Enabling the transition from CSP to DSP with B/OSS transformationEnabling the transition from CSP to DSP with B/OSS transformation
Enabling the transition from CSP to DSP with B/OSS transformation
James Crawshaw
 
Industry progress towards a next gen oss for a virtualized network
Industry progress towards a next gen oss for a virtualized networkIndustry progress towards a next gen oss for a virtualized network
Industry progress towards a next gen oss for a virtualized network
James Crawshaw
 
Industry progress towards a Next Gen OSS for a Virtualized Network
Industry progress towards a Next Gen OSS for a Virtualized NetworkIndustry progress towards a Next Gen OSS for a Virtualized Network
Industry progress towards a Next Gen OSS for a Virtualized Network
James Crawshaw
 
Is your digital transformation driving customer experience?
Is your digital transformation driving customer experience?Is your digital transformation driving customer experience?
Is your digital transformation driving customer experience?
James Crawshaw
 
Automation, Agility and NFV
Automation, Agility and NFVAutomation, Agility and NFV
Automation, Agility and NFV
James Crawshaw
 
Closed Loop Automation for NFV
Closed Loop Automation for NFVClosed Loop Automation for NFV
Closed Loop Automation for NFV
James Crawshaw
 
The Scope for Robotic Process Automation & Machine Learning in Telecom Operat...
The Scope for Robotic Process Automation & Machine Learning in Telecom Operat...The Scope for Robotic Process Automation & Machine Learning in Telecom Operat...
The Scope for Robotic Process Automation & Machine Learning in Telecom Operat...
James Crawshaw
 
Automation Opportunities in Telecom Operations With Intent-Based Networking, ...
Automation Opportunities in Telecom Operations With Intent-Based Networking, ...Automation Opportunities in Telecom Operations With Intent-Based Networking, ...
Automation Opportunities in Telecom Operations With Intent-Based Networking, ...
James Crawshaw
 
The Potential Impact of Robotic Process Automation & Artificial Intelligence ...
The Potential Impact of Robotic Process Automation & Artificial Intelligence ...The Potential Impact of Robotic Process Automation & Artificial Intelligence ...
The Potential Impact of Robotic Process Automation & Artificial Intelligence ...
James Crawshaw
 
Open source reality check
Open source reality checkOpen source reality check
Open source reality check
James Crawshaw
 
Let's get the machines to do it
Let's get the machines to do itLet's get the machines to do it
Let's get the machines to do it
James Crawshaw
 
2020 2017 presentation analyst - james crawshaw
2020 2017 presentation   analyst - james crawshaw2020 2017 presentation   analyst - james crawshaw
2020 2017 presentation analyst - james crawshaw
James Crawshaw
 

More from James Crawshaw (19)

Open source for NFV MANO
Open source for NFV MANOOpen source for NFV MANO
Open source for NFV MANO
 
Advanced Analytics & AI for Network Operations
Advanced Analytics & AI for Network OperationsAdvanced Analytics & AI for Network Operations
Advanced Analytics & AI for Network Operations
 
Software driven operations
Software driven operationsSoftware driven operations
Software driven operations
 
Orchestrating the lifecycle of network services
Orchestrating the lifecycle of network servicesOrchestrating the lifecycle of network services
Orchestrating the lifecycle of network services
 
Zero Touch Analytics
Zero Touch AnalyticsZero Touch Analytics
Zero Touch Analytics
 
How CSPs are Leveraging Open APIs
How CSPs are Leveraging Open APIsHow CSPs are Leveraging Open APIs
How CSPs are Leveraging Open APIs
 
Software Defined Operations Research Presentation
Software Defined Operations Research PresentationSoftware Defined Operations Research Presentation
Software Defined Operations Research Presentation
 
Enabling the transition from CSP to DSP with B/OSS transformation
Enabling the transition from CSP to DSP with B/OSS transformationEnabling the transition from CSP to DSP with B/OSS transformation
Enabling the transition from CSP to DSP with B/OSS transformation
 
Industry progress towards a next gen oss for a virtualized network
Industry progress towards a next gen oss for a virtualized networkIndustry progress towards a next gen oss for a virtualized network
Industry progress towards a next gen oss for a virtualized network
 
Industry progress towards a Next Gen OSS for a Virtualized Network
Industry progress towards a Next Gen OSS for a Virtualized NetworkIndustry progress towards a Next Gen OSS for a Virtualized Network
Industry progress towards a Next Gen OSS for a Virtualized Network
 
Is your digital transformation driving customer experience?
Is your digital transformation driving customer experience?Is your digital transformation driving customer experience?
Is your digital transformation driving customer experience?
 
Automation, Agility and NFV
Automation, Agility and NFVAutomation, Agility and NFV
Automation, Agility and NFV
 
Closed Loop Automation for NFV
Closed Loop Automation for NFVClosed Loop Automation for NFV
Closed Loop Automation for NFV
 
The Scope for Robotic Process Automation & Machine Learning in Telecom Operat...
The Scope for Robotic Process Automation & Machine Learning in Telecom Operat...The Scope for Robotic Process Automation & Machine Learning in Telecom Operat...
The Scope for Robotic Process Automation & Machine Learning in Telecom Operat...
 
Automation Opportunities in Telecom Operations With Intent-Based Networking, ...
Automation Opportunities in Telecom Operations With Intent-Based Networking, ...Automation Opportunities in Telecom Operations With Intent-Based Networking, ...
Automation Opportunities in Telecom Operations With Intent-Based Networking, ...
 
The Potential Impact of Robotic Process Automation & Artificial Intelligence ...
The Potential Impact of Robotic Process Automation & Artificial Intelligence ...The Potential Impact of Robotic Process Automation & Artificial Intelligence ...
The Potential Impact of Robotic Process Automation & Artificial Intelligence ...
 
Open source reality check
Open source reality checkOpen source reality check
Open source reality check
 
Let's get the machines to do it
Let's get the machines to do itLet's get the machines to do it
Let's get the machines to do it
 
2020 2017 presentation analyst - james crawshaw
2020 2017 presentation   analyst - james crawshaw2020 2017 presentation   analyst - james crawshaw
2020 2017 presentation analyst - james crawshaw
 

Recently uploaded

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 

Recently uploaded (20)

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 

Service assurance for NFV

  • 2. Panel Mark Newman Chief Analyst TMF James Crawshaw Senior Analyst Heavy Reading Laszlo Bojtos Solution Architect Zenoss Ihab Mahna Solution Architect EXFO Yuval Stein AVP Product Mgmt Service Assurance TEOCO Ignacio Mas Senior Expert in Programmable Networks Ericsson
  • 3. Outline • Operators are currently focused on the near-term challenges of NFV, such as onboarding VNFs and interoperability • However, they need to start preparing for the longer-term challenge of enabling service assurance • SA is particularly challenging for services delivered over a hybrid of physical and virtual network functions • Detailed end-to-end service paths will be needed to relate service measurements across VNFs and physical devices. • Problems at the hardware layer (NFVi) will impact the software layer (VNFs) leading to a multiplicity of alarms and the need for new correlations to be mapped out. • This panel will discuss service assurance for NFV and how to deliver on the promise of closed-loop automation.
  • 4. Verizon – Service Assurance for Hybrid • Service Assurance complexity is higher • Automated backup? OpenStack snapshots • Self-healing? Not if the license is tied to a VM ID, a security certificate is required or there have been config changes since last snapshot • Auto scaling? Depends on VNF support, licensing and commercial policy Source: Verizon
  • 5. NFV a l’Orange Source: Adapted by Heavy Reading from Future OSS whitepaper, Orange.
  • 6. NFV Assurance a l’Orange Operations module: • Dynamic fault and performance management (VNF/PNF) – intelligent fault diagnosis, localization and impact analysis using alarm pattern and service impact libraries • Service desk and workforce management – analytics to set rules to manage tickets and work orders • Test & diagnosis – to support policy verification, incident resolution and test end-to-end service chain on design or instantiation. • Incident management – using dynamic applications and analytics • Problem management – resolving remaining issues through higher level human skills and cross-department cooperation Visualization module: • Flexible view – if problems cannot be resolved autonomously they need to be represented in an operations view showing the status of network, fulfillment orders and transactions • Presentation configuration – to enable different types of view (e.g. dynamic inventory) with required granularity • Data orientation – data model to support metrics, events, and configuration data • Analytics notebooks – to share analysis across multiple parties for cooperation
  • 7. Must correlate between NVFI and VNFM • How can we tell if a fault is originating in the VNF itself or in the underlying hardware? • Shannon and Yates write: “An issue at the hardware layer (cloud servers) that impacts the software layer (VNF) will alarm at both layers. Without appropriate intelligence and automation, the alarming on the hardware and software layers could result in both the hardware operations team and team managing the VNF to simultaneously respond to the issues reported and investigate the root cause in parallel.”
  • 8. OSM Release 3 Service Assurance • Monitoring module, which is described as experimental, can correlate telemetry [CPU utilization, read latency, etc.] related to the VMs and VNFs to the relevant network services • If a VM fails and triggers an alarm, you don't get a duplicate alarm on the VNFs running on that VM, so you don't waste the time of the team managing the VNFs. Only the NFVi team need respond. Source: ETSI
  • 9. Meeting the Challenges of NFV Assurance - 1 Challenges across all layers Solution Analytics and Reporting for Hybrid Networks (both PNFs & VNFs) A unified data model for hybrid networks to abstract any NF Accurate Root-Cause Analysis in a dynamically changed topology Use algorithms that can pinpoint service and network issues in near real-time to trigger healing as part of closed-loops
  • 10. Meeting the Challenges of NFV Assurance - 2 Service Management challenges Solution Automatic onboarding of Assurance definitions (policies) for new services Tight Integration with the E2E Orchestrator to be notified on Service creation and changes (TOSCA) Accurate Service Impact analysis among layers (Services, VNFs). To be used as part of closed-loops. • Well updated Service-Resource Data Model • Integration with the E2E Orchestrator to be notified on Service creation and changes • Advanced Service Impact Analysis Integration with legacy OSS e.g. ticketing (Resource and Service Management) Open north-bound APIs from SA system Monitoring SLAs and OLAs in a multi- operator, multi-vendor business context (Partner Management) • Integration with the E2E Orchestrator to be notified on dynamic changes in resources or services related to partner management (SLA & Thresholding interfaces). • Use strong thresholding capabilities
  • 11. Meeting the Challenges of NFV Assurance - 3 VNF and Virtual Infrastructure Challenges Solution VNFs are not aware of the NFVI dependencies (performance/availability of underlying compute, storage, networking, hypervisor, OS). Consolidate the operation of NFV infrastructure and VNFs under one team Alarms on NVFI triggers alarms on VNFM SA system must correlate between NVFI and VNFM The NFVI that supports VNFs changes dynamically SA system must keep up with these changes Difficulty onboarding new VNFs or NFVI SA system must support multiple protocols (SNMP, syslog, XML, Netconf), and facilitate integration of vendor specific APIs Integration with NFVO SA system must receive service models, inventory and other data from NFVO and automatically send remediation requests based on problems it identifies
  • 12. Closed loop assurance • Lessons learned from early trials indicate that this space is very challenging for COTS type offerings, with substantial customer adaptation required. • A key challenge to hybrid orchestration has turned out to be a lack of reliable inventory information exposing the underlying topology. Siloed inventory remains a problem most operators have not invested in solving. • Recent work in the MEF, on TAPI and topology engine concepts is promising. The concept of the network as an inventory (from years back), is now becoming more viable with the virtualization of the network, and the advanced integration capabilities in the virtualized network functions are enabling this. • Policy is perhaps the largest issue to solve for Closed Loop Assurance. No standard way to encapsulate and expose rules is a barrier to interoperability between responsibility domains, and any master orchestrator trying to implement closed loop network actions.