Multi-Vendor Service Orchestration & Network automation for today’s networks (. . . and for NFV) Joachim Jerberg Jensen Systems Engineer, Global Service Providers CCIE SP #42403 joajense@cisco.com Confidential 1 From device-centric to network-as-platform … Phase 1 Orchestration NSO Phase 2 Orchestration NSO SDNWAE Controller ODL Centralized service provisioning Work with existing network devices Confidential On Device Minimal but sufficient AN: Autonomic Networking SR: Segment Routing VPN services: eVPN + static PW 2 What is NETCONF? qNETCONF is an IETF network management protocol designed to support management of configuration, including: § Distinction between configuration and state data § Multiple configuration data stores (candidate, running, startup) § Configuration change validations § Configuration change transactions § Selective data retrieval with filtering § Streaming and playback of event notifications § Extensible remote procedure call mechanism qNETCONF server runs on networking device and client runs as part the management application. Confidential Configuration data <get-config>, <edit-config>, <notification> <rpc>, <rpc-reply> BEEP, SSH, SSL, console XML payload, modeled in YANG. <get>, <get-config>, <edit-config>, <copy-config>, <delete-config>, <lock>, <unlock>, <closesession>, <kill-session>, <notification>, <commit>… 3 YANG YANG (RFC6020 etc.) is a data modelling language • • • “Yet Another Next Generation“ – developed after the NG-SNMP fiasco Data modelling for NETCONF protocol, and more: XML conversion, visualization, code generation... NETCONF/YANG‘s ambition is to provide the ultimate multi-vendor R/W element and service management, thus an open standard programmability architecture Example: change an interface IP address ietf-interfaces.yang Example: configure interface IP address YANG vs. SNMP YANG SNMP Framework (definition language) YANG SMI Content (information model) YANG module MIB Payload (encoded data) XML (ASCII) ASN.1 BER (binary) Protocol (remote access) NETCONF, RESTCONF SNMP IOS Yang Support: XR-XML, XR-YANG (5.1.1 LA/SMU), xOS-YANG (5.3-5.4) Confidential container interfacesencoding="UTF-8"?> { <?xml version="1.0" description "Interface configuration parameters.“; <rpc message-id="9” xmlns="urn:ietf:params:xml:ns:netconf:base:1.0"> list interface { key "name“; <edit-config> leaf name { type</target> string; } <target> <candidate/> description { type string; } <configleaf xmlns="urn:ietf:params:xml:ns:netconf:base:1.0”> leaf xmlns="urn:ietf:params:xml:ns:yang:ietf-interfaces"> type { <interfaces type identityref { <interface> base interface-type; <name>GigabitEthernet0/0/0/0</name> } <ipv4 xmlns="urn:ietf:params:xml:ns:yang:ietf-ip”><address> mandatory true; <ip>10.1.1.1</ip> } <prefix-length>24</prefix-length> leaf enabled { </address></ipv4> type boolean; </interface> default "true"; </interfaces> } </config> leaf link-up-down-trap-enable { </edit-config> <commit/>type enumeration { enum enabled { value 1; } </rpc> ... ]]>]]> 4 YANG abstraction example Cisco NSO/Tail-F – Abstraction Capabilities using Modeling language (Netconf/Yang) Abstraction enabled with the decoupling of Service Layer to the Underlying Device/Infrastructure Layer NED 1 Confidential NED 2 5 NED ‘N’ 5 Cisco Orchestration and SDN Strategy for SPs NFV View • Generic Orchestration architecture that spans physical and virtual domains and migration • Generic architecture for different use cases BSS including mobility, vCPE and virtual Managed Services OSS (Prime Service Catalogue, etc.) Network Services Orchestrator NFVO CTCM / ESC VNF Manager(s) VNF3 VNF2 VNF1 Openstack EMS Hypervisor PHYSICAL INFRASTRUCTURE Confidential Virtualized Infrastructure Manager(s) SDN Controller DC Overlay SDN NFV INFRASTRUCTURE 6 Tail-f NSO Confidential (Network Services Orchestrator) 7 Reality: An Ambitious Layer 3 VPN Peering VLAN, subinterface, and eBPG SVI connectivity and highavailability configuration Transit VLAN Tenant A 156.5.5.5 VLAN 801 VM OS EXT 1 ASR 1 ASR 2 AS 64554 EXT 2 VLAN 801 Routes to enterprise networks need to be established Provider Edges Layer 3 IEEE 802.1Q subinterface OpenStack Computing Node Data Center Layer 2 VLAN Tenant Private VRF OpenStack Layer 3 Neutron Confidential 8 Network Orchestration Layer BSS/OSS Network Service Request Service Attributes Network Orchestration Layer Agility : Model-Driven Operations: Network Transactions Minimal Device Configuration New Service Type: 2 days New Device Type: 2 weeks Confidential 9 NSO Overview OSS/BSS Portals Python, REST, Java Network Engineer Network-wide CLI, WebUI Tail-f Network Control System Service Manager Service Models Device Manager Network Element Drivers OpenFlow Device Models Multi-vendor Transactions Model-driven NETCONF, XML, CLI, SNMP… Large Multi-Vendor Networks: Hardware, Virtual, OpenFlow Confidential 10 10 Tail-f NSO Main Features Tail-f NSO Main Features Tail-f NSO • Model-based architecture • Transactional guarantees • In-memory storage of configuration states for all services and all devices • FastMap* algorithm for service-layer CRUD operations • Reactive FastMap* * Patent No.: US 8,533,303 B2 Confidential 11 Tail-f NSO Main Feature 1: Model-Based Architecture BSS Service Models Tail-f NSO Device Models No hard-coded assumptions about: • Network services • Network architecture • Network devices Instead: • Data models written in YANG (RFC 6020) Multivendor Layer 2, Layer 3, and Layer 4-7 Network Confidential 12 Tail-f NSO Main Feature 1: Model-Based Architecture BSS YANG data models for: Service Models Tail-f NSO Device Models • Network services • Network topology • Network devices YANG data models drive: • Northbound APIs • User interfaces • Southbound command sequences Benefits: • Can be used for all types of services and all types of networks Multivendor Layer 2, Layer 3, and Layer 4-7 Network Confidential 13 Tail-f NSO Main Feature 2: Transactional Guarantees BSS Transactional guarantees: Tail-f NSO Transactional Integrity • Help ensure fail-safe operations (automated handling of exceptions) • Keep accurate copy of network configuration state in Tail-f NSO at all times Benefits: • Automation can be based on accurate real-time view of service and network state • Much higher degree of automation possible Multivendor Layer 2, Layer 3, and Layer 4-7 Network Confidential 14 Tail-f NSO Main Feature 3: In-memory Data Store Tail-f NSO Multivendor Layer 2, Layer 3, and Layer 4-7 Network Confidential • Stores both service and device config states • RAM datastore with persistent journaling • Runs as integral part of NSO application (in the same address space) • Native YANG database with compact binary data encoding • 1:N data replication (asynchronous or synchronous) • Subscription notifications with priority level ordering • In-service schema (data model) upgrade • Distributed 2PC transaction manager 15 Tail-f NSO Main Feature 4: FastMap* Algorithm CREATE SERVICE UPDATE SERVICE DELETE SERVICE REDEPLOY SERVICE Tail-f NSO FastMap: • Only the CREATE operation needs to be specified • UPDATE, DELETE and REDEPLOY operations are automatically generated and compute minimal change set needed FastMap* Benefits: • Reduces service implementation code by two orders of magnitude • Supports modifications of services at runtime * Patent No.: US 8,533,303 B2 Confidential Multivendor Layer 2, Layer 3, and Layer 4-7 Network 16 Tail-f NSO Main Feature 5: Reactive FastMap* CREATE SERVICE UPDATE SERVICE DELETE SERVICE Tail-f NSO REDEPLOY SERVICE FastMap* Changed network state triggers service redeploy Benefits: One algorithm supporting: • Provisioning • Orchestration • Elasticity • Virtual machine and VNF mobility • Self-healing network * Patent No.: US 8,533,303 B2 Multivendor Layer 2, Layer 3, and Layer 4-7 Network Confidential 17 NSO Overview, Zoom 3 Network Engineer OSS/BSS NETCONF NSO REST CLI EMS/NMS Web UI SNMP JAVA/Javascri pt Service Models Service Manager Script API AAA Package Manager Mapping Logic Core Engine Templates Fast Map Developer API Alarm Manager Notification Receiver REST Device Models OpenFlow Controllers Network Element Drivers NETCONF SNMP Device Manager CLI WS Openflow Switches Multi-Vendor Network Confidential 18 18 NED Overview • NED’s are created and maintained by Cisco Engineering. • NED’s are classified as either Production or POC grade by Cisco Engineering. • Production Grade • Can be sold as a license • Used in production today and continuously tested towards all active NCS/NSO versions on real equipment (reference hardware and software versions). • Fully supported by the Cisco Support team. • It covers at least the use cases of its current customers and the coverage is continuously expanded. • Messaging to customers: The NEDs you purchase will support all the configuration you require for when you need it • Provided that the customer has support contract, makes available the required configurations in advance. • POC Grade • Can be used for demos or POC’s. • Can be sold if upgraded to Production Grade. • Not tested continuously on real equipment. • Messaging to customers: The NED can show case NCS towards the devices in a POC but for a real deployment, the NED needs to be upgraded to production grade. Confidential 19 Supported Vendors Production Grade Confidential PoC Grade 20 Tail-f NSO Differentiation: Agility and Flexibility Implementation of new service = 2 days How? Data model for MPLS L3 VPN service: 100 lines of YANG Mapping MPLS L3 VPN service model to network of Cisco 7600, Cisco ASR 9K and 3.party devices: 300 lines of XML template Confidential Support for new device type = 2 weeks How? Develop YANG device model Network Element Driver automatically generates sequences of device-specific commands (CLI, REST, SOAP, SNMP, NETCONF, etc). How? How? FASTMAP algorithm NED algorithm 21 21 NSO for Network Engineers – User Interfaces Auto-rendered Web UI with powerful extensibility features Confidential IOS-XR or J-style CLI for networkwide configuration changes 22 Tail-f NSO & NFV Confidential 23 NSO is providing a migration path to NFV BSS Tail-f NSO VNF Virtual Compute VNF VNF Virtual Storage VNF Virtual Network Virtualization Layer Compute Hardware Traditional networking Storage Hardware Network Hardware NFV/SDN Technology migration path Confidential 24 24 End-to-End Service Orchestration with ESP (3) Customer orders new Services from the Catalog: a) service chain for new branch b) IaaS container at DC Portal / Service Catalog (PSC) (0) Customer Orders CPE for a New Site SP OSS/BSS REST API (11) Customer Order (1) CPE Order ESP (13) Push policies to the CPE as necessary CPE Controller (2) Call Home, Zero touch CPE Provisioning done (4) Spin up the Managed Service Chain for the tenant NFV Orch. (DSC) (14) CPE policies modified as per Service request (6) Perform workload (11) Optimize & Perform necessary BW reservation in placement decision as per SLA requirement the WAN (12) Analyze WAN, reoptimize and program new path as necessary Web VM NAT © 2012 Cisco and/or its affiliates. All rights reserved. DB VM FW DC “A” PE vESA DCI Customer Premise (9) Service spin-up as per the tenant’s order DCI NFV POD vCPE CPE Arrives @ Site (10) Program DCI and Propagate new service routes to the DCI MP-BGP Route Propagation vFW (8) Spin-up IaaS + NFV service at the identified DC/POD DC & NFV Orchestration (ACI+DSC) WAN SDN Controller (WAE) (5) Managed Service Chain Spinned up in the NFV POD PE-CE Route Propagation (7) Most optimal DC & POD Identification as per SLA requirement Service Assurance Cross Domain Orchestrator (NSO) (1) CPE Order, Provisioning parameters EPN (15) Perform Service Activation à Notify BSS about Service Activation to Commence Billing. Start Service Assurance / Monitoring DC “B” Service Provider WAN Cisco Confidential 25 Tak Confidential 26