Project:
|
![]() Figure 1. The main components of a VNF from a vendor perspective : Object diagram
<font color="#29313b">TR255B Specification Requirements for Resource Functions, in its section 7 gives an example of an atomic ResourceFunction, a Firewall, which exposes several Features (modelled as ConfigurationFeatures) that are to be used in an intent-based deployment approach.</font><br/><font color="#29313b">The reader is invited to refer to this document for a detailed analysis. </font><br/><font color="#29313b">The following paragraph is extracted from this document:</font><br/><ul>
<li><font color="#29313b">Features</font></li></ul> - <font color="#29313b">F1: Layer 2 and 3</font><br/> - <font color="#29313b">Can Target: IP destination address(es), IP source address(es), TCP/UDP destination port(s), TCP/UDP source port(s), Ethernet MAC destination address, Ethernet MAC source address, Inbound firewall, Outbound firewall (egress)</font><br/> - <font color="#29313b">F2: Work at OSI Layer 4 (stateful firewall)</font><br/><font color="#29313b"> - F3: Work at OSI Layer 7 (application inspection)</font><br/><font color="#29313b"> - F4: Tarpit</font><br/><font color="#29313b"> - Definition of “Tarpit” from Wikipedia: “A tarpit is a service on a computer system (usually a server) that purposely delays incoming connections. The technique was developed as a defense against a computer worm, and the idea is that network abuses such as spamming or broad scanning are less effective, and therefore less attractive, if they take too long. The concept is analogous with a tarpit, in which animals can get bogged down and slowly sink under the surface, like in a swamp.”</font><br/><font color="#29313b"> - F5: Log</font><br/><font color="#29313b"> - F5.C1: Log size in Gbytes</font><br/><ul> <li><ul> <li></li></ul> </li><br/></ul> <font color="#29313b">Further, the following dependencies apply:</font><br/><ul> <li><font color="#29313b">F3 requires F2</font></li><li><font color="#29313b">F2 requires F1</font></li></ul> In the process of deploying a Firewall RF, the consumer selects the features of his choice.<br/>Once selected, the features are mapped to software deployment units (represented as InstalledSoftware in the model) and associated connectivity among the software deployment units. Further, there needs to be a mapping between the software deployment units and the required compute and storage (HostingPlatformRequirement).<br/><ol> <li><font color="#e0121d"><b>Mapping to Specialized Business Areas</b></font></li></ol> <font color="#29313b">As said above, this proposed model has been generalized and it is expected to be flexible enough to be used for specialized business areas. It can be done in several ways:</font><br/><ol> <li><font color="#29313b">Direct usage of the proposed artefacts, without creating any further derived classes; in that case, it will be <i>instances</i> of the proposed classes of the general model that will directly be created as needed.</font></li><li><font color="#29313b">Create more specialized classes inheriting from the proposed classes of the general model, and then using them to create <i>instances</i> as appropriate.</font></li><li><font color="#29313b">Make reference to an external model (ex: defined by another SDO) and documenting mapping touch points between the requested classes of the external model and the proposed classes of the general model.</font></li><li><font color="#29313b">The <i>instances</i> created will be the ones of the external model, but the mapping touch points rules will be used as guidelines to elaborate appropriate data models (as input to APIs specification).</font></li></ol> <font color="#29313b">Below, we illustrate how the example of the ETSI-NFV vCPE scenario document can be supported by using the first style above (direct creation of instances of the proposed classes of the general model).</font><br/><ol> <li><font color="#29313b"><b>Example: ETSI-NFV vCPE scenario</b></font></li><li><font color="#e0121d"><b>What can be purchased by a SP from a VNF Vendor</b></font></li></ol> <font color="#29313b">The diagram below illustrates the composition of the virtual Gateway used in scenario 1 (VNF1 from Vendor1) of the vCPE Use Case. It represents the Vendor perspective.</font><br/><font color="#29313b">Vendor1 sells a package instance called vGW Secure. This package ultimately contains software used to implement 4 <i>functions</i>: Firewall, IP Routing, NAT and DHCP. The SoftwareInformationUnit in the package contains all the appropriate information and data necessary for the deployment on a virtual infrastructure. The deployment process is driven by the deployment structure using Flavors and VDUs. </font><br/><font color="#29313b">There are two flavors:</font><br/><font color="#29313b">Flavour1 is made of 2 VDUs: </font><br/><ul> <li><font color="#29313b">VDU1 contains at minimum one software image implementing the 3 functions IP Routing, NAT and DHCP</font></li><li><font color="#29313b">(there may be additional software images covering complementary purposes – e.g. tracing or logging features, different versions, etc.…).</font></li><li><font color="#29313b">VDU2 contains at minimum one software image implementing the single function Firewall.</font></li></ul> <font color="#29313b">Flavour2 is made of only 1 VDU: </font><br/><ul> <li><font color="#29313b">VDU3 that contains at minimum one software image implementing the 4 functions IP Routing, NAT, DHCP and Firewall together.</font></li></ul> <font color="#29313b">Additional information will indeed be present, for example: </font><br/><ul> <li><font color="#29313b">to specify the capabilities required by the hosting VM in terms compute/storage/network for each VDU,</font></li><li><font color="#29313b">or to specify the affinity rules between VNFCs (associated to the VDUs).</font></li></ul> <font color="#29313b">Instances of the “HostingPlatformRequirement” class would be used for that purpose. We did not show it in the figure below, in order to keep things readable.</font><br/><font color="#29313b">In terms of SID domains, only Product and Resource are used: the vendor sells a Product which is associated to a Resource.</font><br/><font color="#29313b">(What the vendor will expose in his catalog)</font><br/><font color="#29313b"><i>Note that this exact representation may also be present in the SP system, in the </i><b><i>inventory of</i></b><i> </i><b><i>vendor’s solutions</i></b><i> as acquired, in order to keep track of all the relevant details of the VNF product acquired.</i></font><br/> |