5G-PPP SoftNets WG Whitepaper v20
5G-PPP SoftNets WG Whitepaper v20
1
White Paper – Software Networks WG
Table of Contents
1 Introduction .......................................................................................................................... 3
2 NFV and SDN and 5G ............................................................................................................. 4
3 Terminology .......................................................................................................................... 5
4 Combining NFV and SDN: architectural trends and existing gaps ........................................ 7
4.1 Introduction: early steps combining NFV and SDN ....................................................... 7
4.2 An architecture proposal to integrate NFV and SDN for 5G ......................................... 9
4.3 Some examples of software network features and scenarios .................................... 10
4.3.1 Cloud RAN............................................................................................................ 10
4.3.2 Mobile Edge Computing ...................................................................................... 11
4.3.3 Multi-domain/Multi-provider Orchestration ...................................................... 13
4.3.4 Network Programmability ................................................................................... 16
4.3.5 Network slicing .................................................................................................... 19
5 Relevant standardization activities ..................................................................................... 22
5.1 NFV ............................................................................................................................. 22
5.1.1 ETSI .................................................................................................................... 22
5.1.2 IETF/IRTF........................................................................................................... 24
5.1.3 OASIS TOSCA ................................................................................................... 24
5.1.4 TM Forum ZOOM .............................................................................................. 25
5.1.5 Small Cell Forum ................................................................................................ 25
5.2 SDN ............................................................................................................................. 25
5.2.1 ITU-T .................................................................................................................. 25
5.2.2 ONF ..................................................................................................................... 26
5.2.3 IEEE .................................................................................................................... 26
5.2.4 MEF..................................................................................................................... 27
6 Relevant open source activities .......................................................................................... 28
6.1 SDN Controllers ........................................................................................................... 28
6.2 Network Service Automation Software ...................................................................... 29
6.3 Remarks associated to SDN and NFV frameworks usage ........................................... 32
7 Conclusions ......................................................................................................................... 34
8 References ........................................................................................................................... 35
9 Editors ................................................................................................................................. 38
2
White Paper – Software Networks WG
1 Introduction
5G PPP vision is that in a decade from now, telecom and IT will be integrated towards a
common very high capacity ubiquitous infrastructure, with converging capabilities for both
fixed and mobile accesses [1]. 5G will not only be an evolution of mobile broadband networks
but will bring new unique network and service capabilities. 5G will integrate networking,
computing and storage resources into one programmable and unified infrastructure. This
unification will allow for an optimized and more dynamic usage of all distributed resources, and
the convergence of fixed, mobile and broadcast services.
The 5G PPP European research programme is structured in three phases running and linking to
mobile industry 3GPP specification process and other SDO like ETSI. Their proposed
specifications are finally submitted to the International Telecommunications Union (ITU) that
releases the final standard.
Nineteen projects of first
phase of 5G PPP were
selected in 2015 and are
currently working under
same collaboration umbrella
agreement addressing
multiple technological and
business angles of 5G
networks evolution [2].
In the 2nd phase of 5G PPP
projects starting in 2017
there is a special focus on
vertical industrial
involvement for enabling 5G
scenarios. This is a crucial Figure 1: 5G PPP general phases and SDO timing
step towards the 5G trial
programme phase 3 as indicated in the 5G manifesto and the announced 5G Action Plan for
Europe September 2016 [3]. This will lead to the EU trial roadmap for implementation with
end-to-end 5G platforms from 2018 and beyond integrating multiple technologies that will be
operated in a pre-competitive environment showcasing several vertical-sector cases (eHealth,
Manufacturing, Media, Automotive, etc)
Software Network Working Group (WG) of 5G PPP aims at analysing and addressing
unification and applicability of key research topics related to Software Networking including
software defined concepts, infrastructures, systems and components for Wire and- Wireless
Networks, including Networked Clouds, IoT and Services, integrated SDN/NFV vision as
developed and promoted by the 5G PPP projects and also aligned with the Architecture WG [4].
Software Networks is a significant area of research and innovation. Software Defined Networks
(SDN) and Network Function Virtualization (NFV) are essential to support many aspects of the
anticipated functionality offered by next generation 5G Networks in 2020+. This is a technical
paper that gathers the contribution of projects to the specific point of combining SDN and NFV
technologies. The contributing projects have been; 5GEx, 5G-Crosshaul, 5G-Xhaul,
CHARISMA, COHERENT, SELFNET, SESAME, SONATA, SUPERFLUIDITY,
VIRTUWIND.
3
White Paper – Software Networks WG
4
White Paper – Software Networks WG
3 Terminology
Many different terms are currently being used in the area of software networks. In order to align
a bit the terminology (since it is not always the case that different actors understand the same
from a given term), we provide next an agreed view of the most widely used terms:
Abstraction: a representation of an entity in terms of selected characteristics. An abstraction
hides or summarizes characteristics irrelevant to the selection criteria.
Application Plane (AP): the collection of applications and services that program network
behaviour.
Control Plane (CP): the collection of functions responsible for controlling one or more
network devices. CP instructs network devices with respect to how to process and forward
packets. The control plane interacts primarily with the forwarding plane and, to a lesser extent,
with the management plane.
Forwarding Plane (FP): the collection of resources across all network devices responsible for
forwarding traffic.
Management Plane (MP): the collection of functions responsible for monitoring, configuring,
and maintaining one or more network devices or parts of network devices.
Network Function (NF): A functional building block within a network infrastructure, which
has well-defined external interfaces and a well-defined functional behaviour. In practical terms,
a Network Function is today a network node or physical appliance.
NF Forwarding Graph: a graph of logical links connecting NF nodes for the purpose of
describing traffic flow between these network functions.
NF Set: a collection of NFs with unspecified connectivity between them.
NFV Infrastructure (NFVI): the totality of all hardware and software components (e.g.
hypervisor, excluding VM/VNF according to ETSI) which build up the environment in which
VNF are deployed. The NFV Infrastructure can span across several locations, i.e., multiple
Network PoPs. The network providing connectivity between these locations is regarded to be
part of the NFV Infrastructure or can be controlled together.
NFV Management and Orchestration (NFV-MANO): functions collectively provided by
NFVO, VNFM, and VIM.
NFV Orchestrator (NFVO): functional block that manages the Network Service (NS) lifecycle
and coordinates the management of NS lifecycle, VNF lifecycle (supported by the VNFM) and
NFVI resources (supported by the VIM) to ensure an optimized allocation of the necessary
resources and connectivity. The NFV Orchestrator is in charge of the network wide
orchestration and management of NFV (infrastructure and software) resources, and realizing
NFV service topology on the NFVI. The NFV Orchestrator manages and automates the
distributed NFV Infrastructure. The NFV Orchestrator has control and visibility of all VNFs
running inside the NFVI. The NFV Orchestrator provides GUI and external NFV-Interfaces to
the outside world (i.e. BSS/OSS). The NFV Orchestrator makes extensive use of the NFV lower
stack to perform cloud operation and automation, thus extend the basic capabilities of the NFV-
Operating System and provides much richer environment.
5
White Paper – Software Networks WG
6
White Paper – Software Networks WG
7
White Paper – Software Networks WG
whatever semantics are related to the network service and that might be controlled by means of
the SDN paradigm, through a programmatic, logically centralized control of the data forwarding
plane. The network services at this layer are suitable to be managed according to the SDN
paradigm, and that is the proposed role of the tenant controller.
Out of the various locations of SDN resources, SDN controller(s) and SDN applications
explored in the report, the illustration of Figure 2 consolidates and summarizes the majority of
the scenarios. The particular illustration is also aligned with the SDN controller interfaces:
In terms of design patterns, ETSI envisions that SDN can be used to fulfil broad use cases for:
8
White Paper – Software Networks WG
To specify the integration and interactions between SDN and NFV, it is necessary to clarify the
various types of network functions. To this end, network functions can be classified based on
the different levels of their compatibility with either NFV or SDN implementations. For
backwards-compatibility of legacy network functions, Physical Network Functions (PNFs, e.g.,
4G/5G base stations such as eNodeBs) and Physical Network Elements (PNEs, e.g., physical
switches based on Open vSwitches/OVS or OpenFlow) are those that cannot be virtualised,
although the latter can be possibly controlled with SDN. Note that there are VNFs– referred to
as Non-SDN-enabled Virtual Network Functions, NSC-VNFs, in the figure – that cannot be
controlled with SDN, even though they are virtualized. In addition, Data Network Functions
(DNFs, e.g., virtual DPIs without the control plane) refer to those VNFs that contain data plane
functions only, following a separation of the control and data planes in certain SDN
implementations.
Architecturally, from the bottom up, the Infrastructure Layer provisions both physical and
virtualized resources and the operation environment for the various VNFs. The Control Layer is
broken down to a SDN Controller sublayer and a SDN Control Plane sublayer on top of it.
These two sublayers and the underlying Data Plane sublayer can be conceptually mapped to the
9
White Paper – Software Networks WG
ONF’s three-layer SDN model. Specifically, the Data Plane sublayer is largely controlled by the
SDN Controllers sublayer, where a pool of SDN Controllers may be deployed for scalability
and wide-area deployment considerations. The architectural organization and physical locations
of these SDN Controllers should be optimized to allow high cost-efficiency and high
performance of running the dynamically deployed VNFs on demand. On top of the SDN
Controllers, various SDN Applications (Apps) in the SDN Control Plane provide the control
logic to the SDN Controllers, based on various business application requirements from the
upper Application Layer. In parallel to this stack, a vertical Orchestration and Management
Layer manages the Infrastructure, Data Network and Control layers through the Virtualized
Infrastructure Management, VNF Management and Orchestration sublayers. This architecture is
compliant with the ETSI NFV’s Management and Orchestration (MANO) framework.
This architectural proposal represents an initial step towards effectively integrating SDN/NFV.
Next section goes into several examples where software networks (will) play a significant role,
identifying specific SDN/NFV integration aspects that have not yet properly addressed.
This approach has multiple advantages: 1) it brings resource isolation for C-RAN functions that
are now software defined and can be deployed and scale using commodity hardware and off-
the-shelf standards components; 2) it reduces the cost per deployed cell, which is an important
10
White Paper – Software Networks WG
aspect, as next mobile generations will reduce the cell coverage (and therefore increase the
number of cells) as a way to increase bandwidth; 3) by centralizing BBUs in a local DC, the
required amount of resources is lower than for traditional scenarios, as today cell-sites are
provided with processing power for peak hours; 4) X2 interfaces (i.e., the one defined among
eNBs) become internal links in top of the rack DC network, reducing latency times on mobility
situations; 5) it leverages C-RAN SDN controllers [27] to improve network capacity and
flexibility by providing dynamic control, fine grained resource allocation and better latency
control to meet QoS requirements.
Proximity
Ultra low latency
High bandwidth
Real-time access to radio network information
Location awareness
MEC provides a set of services that can be consumed by applications running on the MEC
platform. These services can expose information such as real time network data e.g., radio
conditions, network statistics etc. and the location of connected devices to consuming
applications. Exposing these types of information can be used to create context for applications
and services with the potential to enable a new ecosystem of use cases, such as location
services, big data, multimedia services and many more, with a significantly improved user
experience.
MEC can take advantage of NFV deployments, due to the complimentary use of cloud
infrastructure, virtualization layers and management and orchestration components. Operators
are increasingly looking at virtualization of their mobile networks and, in particular, C-RAN. In
this context, operators will have to create small DC infrastructures at the edge, in order to
support RAN processing requirements. Having IT infrastructures on the edge, will enable
operators to use unused resources to support 3rd parties to deploy applications in an edge
computing environment, without having to invest on additional resources, especially for that
purpose. As a consequence, mobile edge computing becomes cheaper, making it more appealing
to network operators, content providers and developers.
11
White Paper – Software Networks WG
The same concept can be applied to fixed networks, where virtualization is being adopted. In
fact, for network providers with mobile and fixed operations, traditional central offices can be
used to concentrate both mobile and fixed access, making those places good candidates to
provide edge computing applications for all customers. Figure 5 outlines this vision.
The edge computing architecture includes the MEC platform as the central point. This platform
allows 3rd party applications to register and get authenticated/authorized, in order to access a set
of services, available via the respective APIs Using the APIs, applications can request the
platform to activate traffic offload (TOF) to serve customers from the edge, or enable access to
other information provided by the operator.
The NFVI and VIM defined by the NFV are essentially reused to provide a virtual environment,
this time for the MEC applications. The same applies to the management and orchestration
layer, which can be used to manage the applications lifecycle and orchestrate them according to
the best interests of end users and application providers. In the management layer, an additional
manager is introduced, which is dedicated to managing the MEC platform itself, including its
services and respective APIs. Figure 6 shows the proposed architecture for MEC.
12
White Paper – Software Networks WG
13
White Paper – Software Networks WG
substantial amount of effort, expertise, and time. The associated costs are paid by both network
operators and vendors alike, who need to design equipment and develop complex integration
features. In addition to technology domains, there are other reasons for having multiple domains
within an operator, such as, different geographies, different performance characteristics,
scalability, policy or simply historic (e.g., result of a merge or an acquisition). Multiple domains
in a network are a necessary and permanent feature. However, these should not be a roadblock
towards service development and provisioning, which should be fast and efficient.
A solution is needed to deal with both the multi-operator collaboration issue, and address the
multi-domain problem within a single network operator. While these two problems are quite
different, they also share a lot of common aspects and can benefit from having a number of
common tools to solve them. In order to implement Network Service and resource orchestration
across multiple administrative domains, which may belong to different infrastructure operators
or service providers, hereby referred as “providers”, the ETSI MANO NFV management and
orchestration framework needs to be extended. One potential approach is presented next.
For multi-provider Network Service orchestration, a multi-domain orchestrator (MdO) offers
Network Services by exposing an OSS/BSS – NFVO interface to other multi-domain
orchestrators belonging to other providers. For multi-provider resource orchestration, a multi
domain orchestrator presents a VIM-like view and exposes an extended NFVO – VIM interface
to other multi domain orchestrators.
Figure 7 shows the different functional blocks responsible for service orchestration (SO) and
resource orchestration (RO) as defined by the ETSI Open Source MANO (OSM). Resource
orchestration is provided by the NFV Management and Orchestration, together with Network
Service orchestration. On the other hand, service orchestration, which among others is
responsible for configuring parameters within VNFs e.g. via Element Managers, is implemented
by an OSS/BSS system.
14
White Paper – Software Networks WG
The framework also considers third party MdO service providers, which do not own resource
domains but operate a multi-domain orchestrator level to trade resources and services from
other providers (the ones actually owning such resources).
This approach allows for a clear separation between the multi-domain elements and the local
elements, while still ensuring the flexibility to handle both multi-technology and keeping local
infrastructure details confidential. The multi-domain orchestrator is in charge of abstracting the
underlying infrastructure before it announces what utility and functions the operator is capable
of to its neighbouring operators. Using such an inter-working architecture for multi-domain
orchestration will make possible use-cases that are nowadays hard to tackle due to the
interactions of multiple heterogeneous actors and technologies.
15
White Paper – Software Networks WG
connectivity. Intermediate providers should verify that an incoming connectivity request has the
corresponding orchestration state/policy that confirms that the connectivity request is accepted.
Such an orchestration state may a priori exist or it may need to be established by the inter
provider NFVO.
Alternatively, the inter-provider NFVO may configure directly the connectivity data plane along
the principles of ONF SDN for OpenFlow controlled administrative domains. In this case
coordination for ENNI data plane resource orchestration must be implemented by the inter
provider NFVO.
Based on the following, it is evident that multi-provider, multi-domain orchestration requires
tight integration between NFV and SDN, since data plane connectivity within each
provider/domain and between providers/domains might involve SDN control coupled with VNF
management and orchestration to provide a given end-to-end service.
5G PPP Projects such as 5G EX and SELFNET are contributing to these topics.
We next provide some additional details for each of the functional blocks:
Catalogues: for storing static information regarding network functions and services, like
code, executables, configuration data, and specific management requirements and
preferences. Contents, location, organization, and implementation of catalogues for
different artifacts can vary considerably. However, users of these catalogues need to deal
with them in a consistent fashion and the differences across different catalogues need to be
16
White Paper – Software Networks WG
Service Development Kit (SDK): The SDK supports service developers by providing a
service programming model and a development tool-chain Figure 10 shows an overview of
the foreseen SDK components. SDK design allows developers to define and test complex
services consisting of multiple network functions, with tools that facilitate custom
implementations of individual network functions. The implemented artifacts are stored in
the developer's private catalogues. Moreover, service components can easily be obtained
from external catalogues using the foreseen interfaces. The obtained artifacts can be directly
used in a service or after being modified and tested using the SDK development tools. The
service components and all the information necessary for deployment and execution of a
service are bundled together into a package. The service package can be handed over to a
service platform for actual deployment and for testing, debugging, and profiling purposes.
17
White Paper – Software Networks WG
Service Platform: As shown in Figure 12, an entry point (called gatekeeper module) in the
service platform is responsible for processing the incoming and outgoing requests. The
service platform receives the service packages implemented and created with the help of
SDK part and is responsible for placing, deploying, provisioning, scaling, and managing the
services on existing cloud infrastructures. It can also provide direct feedback about the
deployed services to the SDK, for example, monitoring data about a service or its
components. Service platforms are designed with full customization possibility, providing
flexibility and control to operators and developers at the same time. The service developer
can ship the service package to the service platform together with service- or function-
specific lifecycle management requirements and preferences, called Service-Specific
Managers (SSM) and Function-Specific Managers (FSM), respectively. SSMs and FSMs
can influence the Service and VNF lifecycle management operations, e.g., by specifying
desired placement or scaling behavior. By virtue of a modular design in the Management
and Orchestration Framework of the service platform, the service platform operator can
customize it, e.g., by replacing the conflict resolution or information management modules.
Underlying Infrastructure: The infrastructure needs to host and execute the actual
network functions of a service, e.g., as a virtual machine. The service platform sends
necessary information and instructions for execution and lifecycle management of services
to the infrastructure. The infrastructure may belong to the service platform operator, or to a
third-party infrastructure operator. The interaction between the service platform and the
infrastructure is done through a VIM, e.g., OpenStack, which provides an abstract view on
different infrastructure resources. This description is based on the assumption that a service
platform runs directly on top of an actual NFV Infrastructure. However, the telecom system
designs also enable a recursive deployment model, where a service platform can act as an
abstraction to the underlying infrastructure for another service platform, creating a
recursive, hierarchical service platform. While the service platform deals with service- and
18
White Paper – Software Networks WG
function-level functionality, the infrastructure deals with the resource level. It is here that
service-level requirements have to be translated into resource-level requirements. The
infrastructure management also takes care of infrastructure-level management functions.
19
White Paper – Software Networks WG
Note that Network Slicing is closely related to the concept of RAN Sharing for multi-service
offering. For the evolved LTE 3GPP has defined and ratified different kinds of architectures
with varying degrees of sharing (see 3GPP TS 23.251 specification). By means of mobile
network resource sharing actually three dimensions of the problem exist, as also presented in
Figure 13 .
• Sharing the Processing/Network/Storage Infrastructure: The switch fabric and the core
network/system (cpu, storage, memory) are virtualized and shared between tenants, for the
deployment of physical or virtual network elements (e.g. SP-GW, MME, HSS).
• Sharing the base station resources: Different sharing schemes and scenarios exist where the
focus stays on the way the Physical Resource Blocks (PRBs) in frequency/time/space domain,
are shared in the MAC layer to provide isolation, while maintaining the multiplexing gain.
• Sharing the Spectrum resources: The spectrum sharing problem is not related to MAC layer
operations. It is related to the band of operation or activation of a component carrier. If multiple
operators can share bands, the band of operation can be dynamically adjusted. Cognitive radio
techniques fall under this category.
Network slicing techniques can also allow dedicating resources for even more specific use cases
within the major 5G categories. For example, within the major IoT category, which is perhaps
the most disrupting one, some autonomous IoT devices will have very low throughput, will
have much longer sleep cycles (and therefore high latency), and a battery life thousands of times
longer compared to smart phones or some other connected IoT devices that will have almost
continuous control and data communications. Hence, it is envisioned that a single virtual core
network could be used by slicing separate resources to dedicated radio access networks (RANs)
that are better suited for specific use cases.
Note that there is no single design available for a unified framework that supports the Network
Slicing concept and at the same time is able to:
efficiently capture the need for integrated network programmability and SDN control,
support service orchestration and NFV techniques in multi-domain RAN,
provision for concepts like the Cloud-RAN and the Mobile Edge Computing (MEC).
Network slicing is also a key for introducing new actors in existing market at low cost -- by
letting new players rent "blocks" of capacity, if this new market provides performance that are
20
White Paper – Software Networks WG
adequate with the application needs (e.g., broadcasting updates to many sensors with satellite
broadcasting capabilities). However, more work needs to be done to define how network slicing
will impact existing architectures like ETSI NFV, and to define the impacts of network slicing
to guaranteeing quality-of-service.
21
White Paper – Software Networks WG
5.1 NFV
5.1.1 ETSI
The ETSI NFV ISG (Industry Specification Group) is probably the most relevant
standardisation initiative so far arisen in the Network Function Virtualisation domain. Initially
incepted by a group of top telecommunication operators at the end of 2012, has rapidly grown
up since incorporating other operators, network vendors, ICT vendors and service providers.
The ETSI NFV specifications define the functional characteristics of each module, their
respective interfaces, and the underlying data model. The data model is basically made up by
static and dynamic descriptors for both VNFs (Virtual Network Functions) and Network
Services. These latter are defined as compositions of individual VNFs, interconnected by a
specified network forwarding graph, and wrapped inside a service.
The ETSI NFV roadmap foresaw two major phases. The first one was completed at the end of
2014, covering functional specification, data models, PoC description, etc. The second phase is
closing in the current timeframe, and will release the expected final version of the ETSI NFV
specification documents. The currently acting specification of the ETSI NFV architecture
released in December 2014 and revisited later with security perspective. The informative
reference document for the second release is available per [55]. For the forthcoming period (i.e.
2017-2018) the third release is planned. Already decided topics are:
22
White Paper – Software Networks WG
The ETSI NFV architecture supports multi-PoP configurations, where an NFVI-PoP is defined
as the physical location where a network function is instantiated. A NFVI-PoP can be mapped
to a datacentre or a datacentre segmentation isolated from the rest of world. Supporting multi-
PoP configurations pertaining to different administrative domains is one of the gaps of the ETSI
NFV architecture
Mobile Edge Computing (MEC) capabilities deployed in the edge of the mobile network can
facilitate the efficient and dynamic provision of services to mobile users. The ETSI ISG MEC
working group, operative from end of 2014, intends to specify an open environment for
integrating MEC capabilities with service providers’ networks, including also applications from
3rd parties. These distributed computing capabilities will make available IT infrastructure as in
a cloud environment for the deployment of functions in mobile access networks. It can be seen
then as a complement to both NFV and SDN. There are several aspects, such as MEC
federation, that have not been tackled yet in MEC and can be considered as a potential gap not
only in MEC.
ETSI NVF Security Working Group. The NFV SEC Working Group comprises computer,
network and Cloud security experts, representing network operators, equipment vendors and
law enforcement agencies. The working group’s main objectives, as presented in [61], are to
advice the NFV ISG on all matters of the relevant security technologies and develop a wide
range of industry specifications that:
Identify both the NFV-specific security problems, as well as the technological advantages of
the NFV environment that can be harnessed to improve the security of the network
operators’ services
Provide specific guidance on various aspects of the NFV security in a systematic, holistic
manner, building trust from secure hardware modules to software and covering identity
management, authentication, authorization and secure attestation, as well as the means of
global monitoring of the whole NFV environment and decisive operational security actions
in response to security breaches
Address in detail the security of the present Open Source-based platforms (such as
OpenStack)
Contribute to solving the problem of implementing Lawful Interception (LI) in the NFV
environment
Work in close collaboration with other ETSI NFV WGs, PoCs, as well as external
organisations (ETSI TC Cyber, ETSI TC LI, Trusted Computing Group and contributing
members of OpenStack)
The group was initially created as an expert group in Phase I in 2012 with the objective to
establish the NFV security problem statement and advise all other working groups. In Phase 2, it
grown to a full working group with 18 active participants, regular meetings and a steady stream
of contributions. For the NFV SEC Working Group, the NFV technology presents unique
opportunities for addressing security problems. It can improve the security properties of
network functions, facilitate agile provision of secure services by the carrier and provide better
protection of the carrier cloud.
A list of the current ETSI NFV SEC WG work items is available here [62]. This covers a set
public documents that addresses multiple aspects such as: a thorough assessment of potential
new security concerns related to NFV, security problem statement (ETSI GS NFV-SEC 001), a
review of security features in open source management software in NFV (with focus on open
stack), security and trust guidance related to NFV development, architecture and operation
(NFV-SEC 003), privacy and regulatory aspects (NFV-SEC 004 and NFV-SEC 006) and
23
White Paper – Software Networks WG
certification deployment scenarios (NFV-SEC 005) and use cases and technical approaches for
multi-layer host administration (NFV-SEC 009).
5.1.2 IETF/IRTF
In the Internet Engineering Task Force (IETF) – and in the sibling organisation, the Internet
Research Task Force (IRTF) – there are distinct working groups addressing topics of interest for
5GPPP project partners, both from the research perspective (IRTF) and from the normalisation
perspective (IETF). Some of the activities of interest are the following:
IRTF NFV RG. The NFV Research group explores issues around NFV. A recent
contribution [15] has been released to analyse the gaps about handling of multiple
administrative domains in NFV environments. 5GEx and 5G-Crosshaul are contributing to
this RG.
IRTF SDN Research Group. This group adopted a document exploring the separation
between Service and Transport concerns in SDN [14]. It addresseed problems such as
unclear responsibilities for service provisioning, complicated reuse of components,
monolithical control architectures, and complex network diagnosis and troubleshooting by a
cooperating layered architecture for SDN (CLAS). CLAS consists of two strata, a Service
Stratum for service provisioning and providing capabilities to external applications, and a
Transport Stratum for connecting service end nodes building the end-to-end service
requested by applications on top.
The IETF/IRTF is becoming a very active and relevant venue in the area of software networks.
In addition to the two IRTF research groups mentioned above, there are many WGs addressing
some virtualization aspects. An overview of these efforts as well as relevant gaps is reported in
a “live” document (officially adopted by the IRTF NFVRG, driven by 5GPPP project partners)
[16]. For brevity, we do not include here all the analysis, but just cite a few as examples:
Redundancy and reliability mechanisms are currently not dealt with by the Service Function
Chaining (SFC) or any other WG in the IETF. While there was a main driver for forming a
new WG on this topic (VNFpool), no WG is hosting this as this time.
It would be worthwhile to see if some of the specific approaches developed in the NVO3
WG (e.g. overlays, traffic isolation, VM migration) can be applied outside the Data Center
(DC) environment, and specifically if they can be applicable to network virtualization.
These approaches would be most relevant to the NFVI and the VIM part of the MANO part
of the ETSI NFV architecture.
1
https://www.oasis-open.org/committees/tc_home.php?wg_abbrev=tosca
24
White Paper – Software Networks WG
5.2 SDN
5.2.1 ITU-T
ITU-T Study Group 132 is the lead study group of SDN in ITU-T and develops the SDN
framework, including SDN terminology, as baseline of ITU-T SDN standardization activities.
ITU-T Study Group 153 defines technologies and architectures of long-haul optical transport
networks enabling; fibre- or copper-based access networks; and home networks. The study
group is working on two new recommendations on “Common control aspects” and
“Architecture for SDN control of transport networks”. It intends to descript concepts common
to both SDN controller and ASON (automatically switched optical networks) control
approaches. It investigates also potential interaction among ASON control, SDN controllers,
management functions, and transport resources.
2
http://www.itu.int/en/ITU-T/studygroups/2013-2016/13
3
http://www.itu.int/en/ITU-T/studygroups/2013-2016/15
25
White Paper – Software Networks WG
5.2.2 ONF
The Open Networking Foundation4 (ONF) is a member-driven organisation promoting the
adoption of SDN through the development of the OpenFlow protocol as open standard for the
communication between the controller and the data forwarding network elements. Apart from
OpenFlow specifications development, ONF is very active in the definition of architectures
around SDN, independent of the protocol to be used for accessing and configuring the
equipment (the so called South Bound Interface from the controller perspective). A number of
ONF relevant initiatives are listed as follows:
The Architecture WG releases architectural specifications for SDN. The two main
specifications are [11] and [13], providing insight on SDN architectural matters, with
emphasis on the controller capabilities and the interfaces with the other elements in the
architecture (applications on top, devices below).
OpenFlow definition. Two standards are defined to control the forwarding behaviour (OF-
switch) and to configure and manage the switches (OF-config). 5G-Crosshaul is
participating in ongoing activities to define extensions for optical switches and for
microwave transmission [60]. OF-switch is actively developed further, seeking to keep a
balance between increasing functionality without increasing the amount of protocol headers
that can be used for matching packets.
APIs between layers. There are a number of initiatives in ONF exploring APIs between
layers in the SDN architecture. The Transport API (T-API) specifies an API for the
following transport network controller services: topology, connectivity, path computation,
virtual network, and notification. On the other hand, the North Bound Interface (NBI) group
is working on Intent based NBIs. An Intent NBI expresses what a network service-
consuming agent (i.e., an application or operator) requires from a network (i.e., it defines a
requested network service) but it does not specify or constrain how that service may or
should be delivered by the network.
The Carrier Grade SDN WG is working on a framework document where a number of
requirements are identified to accomplish a truly operational SDN from the perspective of
network operators and service providers. Aspects like the ability to deliver managed
services end-to-end, SLA compliance, Service Operations and Maintenance capabilities, etc.
are highlighted as core of an SDN Carrier Design. The Carrier Grade SDN framework
document also describes some of these issues considering Inter-Carrier interoperability and
Interoperability/co-existence between SDN and Legacy networks. The 5GEx project is cited
in such document as exemplary project analysing the multi-domain aspects.
Slicing for 5G. The Mobile WG has started to produce a report for the application of SDN
to 5G slicing. The idea is to describe how key functional aspects of the SDN architecture
apply for 5G enablement, including the business-driven concept of network slicing. Ideas
like the one proposed in [14] are also being considered in this group.
5.2.3 IEEE
The IEEE has created an SDN initiative5 without creating new standards so far. The
recommended practice 802.1CF specifies how terminals can connect to access routers using
IEEE 802 technologies. This recommended practice defines an access network reference model
relevant entities, and reference points for communication among these entities.
4
https://www.opennetworking.org/
5
http://sdn.ieee.org/
26
White Paper – Software Networks WG
The IEEE P1903 WG6 develops specifications for Next Generation Service Overlay Networks
(NGSON). It is currently working on the specification of service enabling functions, which can
be provided as Virtualized Network Functions (VNFs) to support NFV applications.
Relevant to consider also IEEE 1903-2011 “Functional Architecture of Next Generation Service
Overlay Networks” describes a framework of Internet Protocol (IP)-based service overlay
networks and specifies self-organizing networking capabilities, including routing and
forwarding schemes, which are independent of underlying transport networks.
5.2.4 MEF
The Metro Ethernet Forum7 (MEF) defined Carrier Ethernet or Ethernet connectivity as a
service. Basically Ethernet services with different topologies, E-Line, E-LAN, and E-Tree, are
defined among User-Network-Interfaces (UNI) with defined service level agreements (SLA).
As such, these Ethernet services can be used as an abstraction of connectivity among different
nodes. MEF has also defined how Ethernet services could be stitched together at Network-
Network-Interfaces (NNI) and how data centers could be connected.
The MEF has started specification work on lifecycle orchestration (LSO), providing a reference
architecture and framework (MEF-55). This framework defines requirements on APIs, but the
definition and implementation of the APIs is still pending.
6
http://standards.ieee.org/develop/wg/1903_WG.html
7
https://www.mef.net
27
White Paper – Software Networks WG
28
White Paper – Software Networks WG
Weave [49] was created by Zett.io, in order to address the Docker's networking issue. It
provides a single virtual network abstraction for Docker containers deployed across multiple
hosts. Weave single switch network representation allows to multiple containers, an access to,
and abstracted overlay of the same physical resources (file systems, databases, etc). Similarly,
Flannel [50] provides an overlay network view based on IP addresses and VXLAN solution.
Each host running a Docker container, has assigned a unique IP addresses from a given set of
subnets addresses to enable inter-container communication. Flannel uses etcd to store mappings
between the virtual IP and host addresses. A flanneld daemon runs on each host and is
responsible for watching information in etcd and routing the packets.
29
White Paper – Software Networks WG
its own official project. The Tacker project takes the TOSCA Simple Profile for NFV as the
basis of its VNF descriptors and then converts this into an appropriate Heat Orchestration
Template (HOT) . Tacker is currently considering how to implement SFC (service Function
Chain). Tacker has a general purpose monitoring framework that can be leveraged within the
TOSCA-NFV descriptors. The delineation of Tacker to OPNFV is seen such that Tacker can
present its VNFMs to be managed by OPNFV.
OpenMANO [42] was an open source project integrated under OSM hosted under ETSI NFV
WG that aims to provide a practical implementation of the reference architecture for NFV
management and orchestration proposed by ETSI NFV ISG, and being enhanced to address
wider service orchestration functions. The project is available under the Apache 2.0 license, it
was first released in early 2015 and it is currently under active development. The OpenMANO
framework is essentially focused on resource orchestration for NFV and consists of three major
components: openvim, openmano, and openmano-gui. The first component is essentially
focused on the resource infrastructure orchestration, implementing express EPA (Enhanced
Platform Awareness) requirements to provide the functionality of a Virtual Infrastructure
Manager (VIM) optimized for virtual network functions and high and predictable performance.
Although openvim is comparable to other VIMs, like OpenStack, it provides a set of features
such as direct control over SDN controllers by means of specific plugins (currently available for
Floodlight and OpenDaylight), aiming at high performance data plane connectivity. In addition,
openvim supports a northbound API available to the functional resource orchestration
component openmano to allocate resources from the underlying infrastructure, by direct
requests for the creation, deletion and management of images, flavours, instances and networks.
Openvim comes with a lightweight design that does not require additional agents to be installed
on the managed infrastructural nodes. The functional resource orchestration component itself is
controlled by a northbound API, which are currently suitable to be used directly by network
administrators via a web-based interface (openmano-gui) or by a command line interface (CLI)
that eases integration in heterogeneous infrastructures and with legacy network management
systems. The functional resource orchestrator is able to manage entire function chains that are
called network scenarios and that correspond to what ETSI NFV calls network services. These
network scenarios consist of several interconnected VNFs and are specified by the
function/service developer by means of easy-to-manage YAML/JSON descriptors. It currently
supports a basic life-cycle for VNF or scenarios (supporting the following events:
define/start/stop/undefine). The OpenMANO framework includes catalogues for both
predefined VNFs and entire network scenarios, and infrastructure descriptions carrying
Enhanced Platform Awareness (EPA) information.
OpenMANO along with Canonical’s Juju and Rift.io, figures as key technical components in
ETSI’s announced Open Source MANO (OSM). Release ONE announcement took place in
fall 2016. The approach taken in OSM is to split responsibility of resource and service
orchestration, carried out by OpenMANO and Rift.io, respectively. OSM has its founding
members as BT, Canonical, Intel, Mirantis, Rift.io, Telefonica, Telekom Austria and Telenor.
OSM’s motivation is for to become a reference implementation for the specification work
happening through ETSI and aims at making 6-monthly releases of their ETSI compliant NFV-
MANO framework. The architecture from a layered perspective has a GUI at the top which
interacts with the Network Service Orchestrator (implemented by Rift.io) that oversees the
management of requests to the Resource Orchestrator (provided by openmano) and VNF
Configuration (provided by Juju). This all eventually results in virtual infrastructure instances
running on the Virtual Infrastructure Manager (OpenMANO’s openvim or OpenStack).
30
White Paper – Software Networks WG
Open-O [54] is a project under Linux Foundation to develop an open source software
framework and orchestrator to enable agile software-defined networking (SDN) and network
function virtualization (NFV) operations. Open-O is supported by multiple organization such as
Brocade, China Mobile, China telecom, GigaSpaces, Huawei, Intel, Red Hat or ZTE. Open-O
first release called “SUN,” has been released in November 2016. With an end-to-end service
approach, the open-o project aims to accelerate multi-vendor integration, service innovation and
improve agility across network operations. It provides an open orchestrator to bridge the gap
between virtualized functions and connectivity services.
It is also relevant to mention here the ECOMP [63] (Enhanced Control, Orchestration,
Management & Policy) platform pushed by US AT&T since from July 2016 announced the
intention to create an open source group to work with the community under Linux foundation in
2017 [64]. ECOMP includes SDN controller part, NFV orchestrator, service perspective and
associated procedures impacting the OSS. AT&T has established partnerships with Bell Canada
and Orange Europe to test and deploy ECOMP framework in order to reach more mature
operational level. However Linux Foundation has not yet announced ECOMP as an official
project probably because there is already the Open-O project hosted under its umbrella. In this
sense, both ECOMP and Open-O encompass more than MANO with the global service vision
and we may see a future collaborations and contributions under Open-O.
Hurtle [44] is an ETSI NFV compatible Network Function Orchestrator. Hurtle was part of the
Mobile Cloud Networking FP7 project [47]. It's been developed over the past three and a half
years of the project and is also used in other projects. The key goal of hurtle is to deliver any
software as a service, on-demand and given the trend of bringing software-based approaches
seen in cloud computing within the networking sphere, hurtle has shown to be able to deliver
networking software (for example OpenEPC [49], OpenAirInterface [50]) as a service specific
to a tenant’s needs. One of the key features of hurtle is the ability to deliver multi-domain, and
multi-service composed services. Hurtle supports a number of VIMs including OpenStack,
CloudStack and Joyent's Triton. Given Hurtle's service focus, placement logic is focused and
specific to those characteristics of services, typically cost and latency. Hurtle can deploy a
composed service across a set of data centres (sometime referred to as PoPs) and also data
centres where no peering-like agreements exist. All components within Hurtle can be part of
continuous integration and deployment processes. Hurtle is very extensible, allowing for
integration to other NFVOs, for example there existing integration between it and OpenBaton.
Hurtle also has billing services available to it from Cyclops [48]. Hurtle delivers tenant's service
instances through the Service Manager and creates these service instances through the Service
Orchestrator. The SO has the capability to automatically monitor and react to events (scaling- or
fault-related) generated by the resources that provide the service instance.
OpenBaton [40] is an ETSI NFV compliant Network Function Virtualization Orchestrator
(NFVO). OpenBaton was part of the OpenSDNCore project [40] started almost three years ago
by Fraunhofer FOKUS with the objective of providing a compliant implementation of the ETSI
NFV specification. OpenBaton is easily extensible. It integrates with OpenStack, and provides a
plugin mechanism for supporting additional VIM types. It supports Network Service
management either using a generic VNFM or interoperating with VNF-specific VNFM. It uses
different mechanisms (REST or PUB/SUB) for interoperating with the VNFMs. The
orchestrator implements the key functionalities of the MANO architecture. Specifically, it: i)
currently uses the OpenStack as first integrated NFV PoP VIM; ii) maintains an overview on the
infrastructure, supporting dynamic registration of NFV PoPs; iii) receives virtual network
function packages from the different users including VNF images and virtual network functions
descriptors (VNFDs); iv) deploys on-demand the VNFs on top of an infrastructure consisting of
31
White Paper – Software Networks WG
multiple data center instances (NFV PoPs); and v)deploys in parallel multiple slices one for
each tenant, consisting of one or multiple VNFs. OpenBaton’s initial focus was to provide the
main functionalities for provisioning and managing Network Services. However, today, a
number of advanced features is supported, such as mechanisms for increasing the automation in
NS management, including auto-scaling (in/out), monitoring, fault management, TOSCA, etc.
FP7 T-NOVA [45] designed and implemented a management/orchestration platform named
TeNOR [46] for the automated provisioning, configuration, monitoring and optimization of
Network Functions-as-a-Service (NFaaS) over virtualized Network/IT infrastructures. TeNOR
is one of the core components of the T- NOVA architecture and being used in some 5G PPP
projects. It is responsible for network services and VNFs lifecycle management operations over
distributed and virtualized network/IT infrastructures. In essence, TeNOR is focused on
addressing two of the most critical issues related to NFV operational environments: (i)
automated deployment and configuration of services composed of virtualized functions; and (ii)
management and optimization of networking and IT resources for VNF hosting. Additionally, it
is responsible for the identification and allocation of resources to network services, Service
Level Agreement (SLA) fulfilment and resource usage optimization. The TeNOR orchestration
platform includes the implementation of an algorithm to map services jointly into the network
and cloud infrastructure, choosing the optimal resources to deploy the service and scales and
migrate according to the monitoring data received. Both external and internal interfaces of
TeNOR are REST/JSON, in a micro-service oriented architecture, which was selected to ensure
a lean and modular implementation and operation of the system. TeNOR provides a “generic”
VNF Manager, while allowing 'specific' VNF Managers to be provided together with a (set of)
VNFs (with an authentication/authorization scheme to control which functions should or
shouldn't be delegated to those 'specific' VNF Managers. VIM implementation is based on an
integration of OpenStack and ODL for the realization of the NFVI-PoPs, in which OpenStack
Cloud Controller and ODL comprise the VIM for the management of the infrastructure.
32
White Paper – Software Networks WG
There are frameworks that usually target the IT domain that have been shown to provide
capabilities described by ETSI NFV and although they do not quite fit the bill a suitable
mapping and relevance can be established to the ETSI NFV model. This is very well
demonstrated by the Rift.io, Cloudify and Hurtle projects, which although can be considered as
service delivery enablers can also be used effectively in the NFV sphere. Should those
considering OSS to enable their NFV deployments, considering projects that also target IT
service delivery is a wise move.
33
White Paper – Software Networks WG
7 Conclusions
This whitepaper is the first outcome of the 5G-PPP Software Network WG, which aims at
analyzing and addressing unification and applicability of key research topics related to Software
Networking including SDN and NFV, integrating the vision as developed and promoted by the
5G PPP projects and also aligned with the 5G-PPP Architecture WG.
SDN and NFV are core technologies in the transformation of networks towards 5G. This
transformation trend is quite visible now in several Industries, through the use of
”softwarization" on general computing platforms to optimize operational processes and in
bringing rapidly and efficiently new values in infrastructures.
This document conveys a first converged vision on the challenging research issue of combining
SDN and NFV technologies. It firstly introduces early attempts and steps to achieve this
combination by main standardization organizations, to then provide a first architectural proposal
to integrate NFV and SDN for 5G. This architectural proposal represents an initial step towards
effectively integrating SDN/NFV, which we plan to further evolve (by including more results
from the work conducted within the framework of the contributing projects) in a future white
paper. After introducing this conceptual architecture, we enumerate several examples where
software networks (will) play a significant role, identifying specific SDN/NFV integration
aspects that have not yet properly addressed. Last, but not least, we provide a survey of existing
relevant standardization and open source activities, with a two-folded goal: (i) get familiar with
existing efforts, and (ii) identify open gaps that need to be tackled.
There is a high competition concerning open source SDN / NFV frameworks as seen in previous
section. This should not be necessarily considered as a negative fragmentation but potential
implementation alternatives. The OS initiatives and 5G projects should work on exploring
advance functionalities (i.e. multi-domain slicing, recursiveness, multi-provider, etc) to enable
future scenarios ensuring the consistency in the information/data models, compatibility of
network service descriptors and open APIs.
Reviewing on-going 5G PPP 1st phase projects, the SN working group has gathered the OS
frameworks that are being used. There is a wide adoption of openstack (nova, neutron) as
baseline VIM, being docker/kubernetes the second most prominent option. The most popular
SDN/NFV OS frameworks are: OpenDayLight as SDN Controller (with ONOS in 2nd place)
and TeNOR as NFV orchestrator (used in at least four projects) and also OSM framework if we
consider not only the adoption but the established links and expected impact. It should be noted
that these 5G PPP projects are running in parallel to the OS community developments which
were not available when the projects started (first stable releases of OSM or Open-O date from
fall 2016 while 5G PPP projects were already in implementation phase). Another interesting
find is that Open-O or ECOMP do not appear in the adoption radar of EU R&D 1st phase 5G
PPP which is should be corrected in 2nd phase. The first wave of 5G PPP projects is delivering
pieces to OS initiatives since there is not an OS R&D EU community established. Thus the
projects are influencing OS developments or creating complementary solutions while
researching advance functionalities. Some new MANO platforms, SDN controller extensions,
developer toolsets (SDK) and Service Platforms are being released by 5G PPP projects.
We believe this whitepaper represents a first solid step towards getting a harmonized SDN/NFV
combined architecture from the main 5G-PPP phase I projects working in the area of SDN and
NFV. This will serve as basis for subsequent work on further specification of this architecture
and its interfaces.
34
White Paper – Software Networks WG
8 References
[1] 5G PPP vision document - https://5g-ppp.eu/wp-content/uploads/2015/02/5G-Vision-
Brochure-v1.pdf
[2] https://5g-ppp.eu/5g-ppp-phase-1-projects/
[3] 5G Action Plan for Europe https://ec.europa.eu/transparency/regdoc/rep/1/2016/EN/1-2016-
588-EN-F1-1.PDF
[4] https://5g-ppp.eu/wp-content/uploads/2014/02/5G-PPP-5G-Architecture-WP-July-2016.pdf
[5] Open Networking Foundation, TR-502, “SDN Architecture”, Issue 1.0, June 2014, available at
https://www.opennetworking.org/images/stories/downloads/sdn-resources/technical-
reports/TR_SDN_ARCH_1.0_06062014.pdf
[6] https://www.sdxcentral.com/5g/definitions/what-is-5g/
[7] Open Networking Foundation, TR-521, “SDN Architecture”, Issue 1.1, January 2016,
available at https://www.opennetworking.org/images/stories/downloads/sdn-
resources/technical-reports/TR-521_SDN_Architecture_issue_1.1.pdf
[8] ETSI, GS NFV-EVE 005 (V1.1.1) - (12-2015), “Network Functions Virtualisation (NFV);
Ecosystem; Report on SDN Usage in NFV Architectural Framework”, available at
http://www.etsi.org/deliver/etsi_gs/NFV-EVE/001_099/005/01.01.01_60/gs_NFV-
EVE005v010101p.pdf
[9] ITU, Recommendation ITU-T Y.3300 (06-2014), "Framework of software-defined
networking".
[10] IETF, RFC 7426 (January 2015), "Software-Defined Networking (SDN): Layers and
Architecture Terminology".
[11] View on 5G Architecture, 5G PPP Architecture Working Group, Version 1.0, July 2016,
available at https://5g-ppp.eu/wp-content/uploads/2014/02/5G-PPP-5G-Architecture-WP-July-
2016.pdf
[12] Open Networking Foundation, “SDN Architecture – Issue 1” TR-502, June 2014, available at
https://www.opennetworking.org/images/stories/downloads/sdn-resources/technical-
reports/TR_SDN_ARCH_1.0_06062014.pdf
[13] Open Networking Foundation, “SDN Architecture – Issue 1.1” TR-521, January 2016,
available at https://www.opennetworking.org/images/stories/downloads/sdn-
resources/technical-reports/TR-521_SDN_Architecture_issue_1.1.pdf
[14] Luis M. Contreras, Carlos J. Bernardos, Diego López, M. Boucadair, P. Iovanna,
“Cooperating Layered Architecture for SDN”, draft-irtf-sdnrg-layered-sdn-00, work-in-
progress, March 2016.
[15] C.J. Bernardos, L.M. Contreras, “Multi-domain Network Virtualization”, draft-bernardos-
nfvrg-multidomain-00 (work in progress), March 2016.
[16] 5G-PPP Pre-standards-WG Issues Paper, https://5g-ppp.eu/wp-content/uploads/2014/02/5G-
PPP-Pre-standards-WG-Issues-Paper-for-20-Oct-15-WS_final-edited.pdf
[17] C.J. Bernardos, A. Rahman, JC. Zúñiga, L.M. Contreras, P. Aranda, “Gap Analysis on
Network Virtualization Activities”, draft-irtf-nfvrg-gaps-network-virtualization-00 (work in
progress), March 2016.
[18] NOXREPO.org. NOX. NOXREPO.org. [Online] 2016. www.noxrepo.org.
[19] Beacon Openflow. [Online] 2016. https://openflow.stanford.edu/display/Beacon/Home.
35
White Paper – Software Networks WG
[20] Maestro Platform -A scalable control platform writen in Java which supports OpenFlow
switches. code.google.com. [Online] 2016. https://code.google.com/p/maestro-platform/
[21] Project Floodlight. Project Floodlight - Open Source Software for Building Software-Defined
Networks Project Floodlight - Open Source Software for Building Software Defined
Networks. Project Floodlight. [Online] 2016. www.projectfloodlight.org/floodlight.
[22] Juniper Networks. OpenContrail. OpenContrail. [Online] 2016. http://opencontrail.org/.
[23] OpenDaylight.org. OpenDaylight. OpenDaylight. [Online] 2016. www.opendaylight.org.
[24] Weave. [Online] 2016. http://www.infoworld.com/article/2608941/application-
virtualization/weave-project-knits-together-networks-for-docker-containers.html
[25] Flannel. [Online] 2016. https://coreos.com/blog/introducing-rudder/
[26] OpenBaton. [Online] 2016. http://openbaton.github.io/
[27] OpenSDNCore. Online 2016. http://www.opensdncore.org/
[28] OpenMANO. Online 2016. https://github.com/nfvlabs/openmano
[29] Hurtle, Online 2016, http://hurtle.it
[30] http://www.itu.int/en/ITU-T/jca/sdn/Documents/deliverable/Free-download-sdn-
roadmap.docx
[31] NOXREPO.org. NOX. NOXREPO.org. [Online] 2016. www.noxrepo.org
[32] Beacon Openflow. [Online] 2016. https://openflow.stanford.edu/display/Beacon/Home.
[33] Maestro Platform -A scalable control platform written in Java which supports OpenFlow
switches. code.google.com. [Online] 2016. https://code.google.com/p/maestro-platform/
[34] http://onosproject.org/ https://code.google.com/p/maestro-platform/
[35] Project Floodlight. Project Floodlight - Open Source Software for Building Software-Defined
Networks Project Floodlight - Open Source Software for Building Software Defined
Networks. Project Floodlight. [Online] 2016. www.projectfloodlight.org/floodlight.
[36] Juniper Networks. OpenContrail. OpenContrail. [Online] 2016. http://opencontrail.org/.
[37] OpenDaylight.org. OpenDaylight. OpenDaylight. [Online] 2016. www.opendaylight.org.
[38] Weave. [Online] 2016. http://www.infoworld.com/article/2608941/application-
virtualization/weave-project-knits-together-networks-for-docker-
containers.htmlhttp://www.infoworld.com/article/2608941/application-virtualization/weave-
project-knits-together-networks-for-docker-containers.html
[39] Flannel. [Online] 2016. https://coreos.com/blog/introducing-rudder/
[40] OpenBaton. [Online] 2016. http://openbaton.github.io/
[41] https://www.tmforum.org/zoom/
[42] OpenMANO. Online 2016. https://github.com/nfvlabs/openmano
[43] Tacker project https://wiki.openstack.org/wiki/Tacker
[44] Hurtle, Online 2016, http://hurtle.it
[45] FP7 T-NOVA project. [Online] 2016. http://www.t-nova.eu/
[46] TeNOR Orchestrator. [Online] 2016. https://github.com/T-NOVA/TeNOR
[47] FP7 Mobile Cloud Networking Project. [Online] 2016. http://mobile-cloud-networking.eu
[48] Cyclops: Rating-Charging-Billing Solution for Cloud providers. [Online] 2016
36
White Paper – Software Networks WG
http://icclab.github.io/cyclops/
[49] OpenEPC: Open Evolved Packet Core. [Online] http://www.openepc.com
[50] OpenAirInterface. [Online] http://www.openairinterface.org
[51] OPNFV: Open Platform for NFV. [Online] http://opnfv.org
[52] OPNFV: An Open Platform to Accelerate NFV, Linux Foundation Whitepaper,
https://www.opnfv.org/sites/opnfv/files/pages/files/opnfv_whitepaper_092914.pdf
[53] OPNFV Wiki. [Online] https://wiki.opnfv.org/display/PROJ/Approved+Projects
[54] https://www.open-o.org/news/announcement/2016/11/open-o-bridges-gap-between-sdn-and-
nfv-release-10
[55] NFV Release 2 Description. [Online]
https://docbox.etsi.org/ISG/NFV/Open/Other/NFV(16)000274r3_NFV%20Release%202%20
Description%20v10.pdf
[56] SCF 159.06.02 “Small Cell Virtualization: Functional Splits and Use Cases”, January, 2016.
[57] SCF 083.05.01 “SON API for small cells”, March, 2015.
[58] SCF 106.06.01 “Virtualization for Small Cells: Overview”, June, 2015.
[59] SCF 154.05.01.02 “Virtualization in small cell networks. Translating NFV Concepts to SCN
Functions”, June, 2015.
[60] Microwave Information Model (December 2016 | TR-532),
https://www.opennetworking.org/images/stories/downloads/sdn-resources/technical-
reports/TR-532-Microwave-Information-Model-V1.pdf
[61] Igor Faynberg, WG SEC Chairman - Presentation of the ETSI NFV SEC Working Group -
Online: https://www.youtube.com/watch?v=uuwnovW92vI
[62] ETSI NFV SEC Working Group - ETSI Portal - Online:
https://portal.etsi.org/tb.aspx?tbid=799&SubTB=799
[63] http://about.att.com/content/dam/snrdocs/ecomp.pdf
[64] https://www.sdxcentral.com/articles/news/att-will-launch-ecomp-open-source-2017/2016/10/
37
White Paper – Software Networks WG
9 Editors
Name Organisation Country Project
Overall Editors (WG co-chairs)
Josep Martrat Atos Spain SONATA
Carlos Jesus UC3M Spain 5GEX
Bernardos
Contributors and reviewers
Chen Tao VTT Finland COHERENT
Navid Nikaein EURECOM France COHERENT
Kostas Katsalis EURECOM France COHERENT
Thomas Deiss Nokia Germany 5G-Crosshaul
Qing Wei Huawei Germany 5G-XHAUL
Paris Flegkas CERTH/University of Greece 5G-XHAUL
Thessaly
Eleni Trouva NCSR Demokritos Greece CHARISMA
Jose M. Alcaraz University of the West of UK SELFNET
Calero Scotland
Qi Wang University of the West of UK SELFNET
Scotland
Andy Edmonds Zürich University Switzerland SESAME
Pouria Sayyad i2cat Spain SESAME
Khodashenas
George Xilouris NCSR Demokritos Greece SONATA
Aurora Ramos Atos Spain SONATA
George Tsolis Citrix Systems Greece SUPERFLUIDITY
Vivek Kulkarni Siemens Germany VIRTUWIND
George Petropoulos Intracom Greece VIRTUWIND
38