<< Back

Overview

Initially organized early in 2019, the Cloud iNfrastructure Telco Taskforce (CNTT) was created in response to rapid changes in how networking applications are being designed, built and managed, plus a growing recognition of a perceived functional gap between the previous standard infrastructure models and the architectures needed to support Network Function Virtualisation (NFV) applications. Organizationally, the Cloud iNfrastructure Telco Taskforce, jointly hosted by GSMA and the Linux Foundation, operates as an open committee responsible for creating and documenting an industry aligned Common Cloud Infrastructure Framework. The CNTT was created with the intent that it would create the cloud infrastructure framework, and eventually morph into an on-going project under the auspices of the GSMA and the Linux Foundation umbrellas. The final on-going operational form of the Taskforce will be determined as the project evolves.

Terminology and Glossary

The definition and intent of the terminology used throughout the documents is defined in the Glossary .

Problem Statement

Based on informal conversations with many operators and developers, there is a realisation that there are significant technical, operational and business challenges to the development and deployment of VNF/CNF applications related to the lack of a common cloud infrastructure platform. These include but are not limited to the following:

  • Higher development costs due to the need to develop Virtual Network Functions (VNF) on multiple custom platforms for each operator
  • Increased complexities due to the need to maintain multiple versions of applications to support each custom environment
  • Lack of testing and validation commonalities, leading to inefficiencies and increased time to market. While the operators will still do internal testing, but using an industry driven verification program based on a common cloud infrastructure would provide a head start.
  • Slower adoption of cloud-native applications and architectures. A Common Telco Cloud may provide an easier path to methodologies that will drive faster cloud-native development.
  • Increased operational overhead due to the need for operators to integrate diverse and sometime conflicting cloud platform requirements.

One of major challenges holding back the more rapid and widespread adoption of VNF is that the traditional telecom ecosystem vendors, while building or designing their virtualised services (whether it be Voice over LTE (VoLTE), Evolved Packet Core (EPC), or popular customer facing enterprise services such as SD-WAN (Software Defined Wide Area Network), are making their own infrastructure assumptions and requirements, often with custom design parameters. This leaves the operators being forced to build complex integrations of various vendor/function specific silos which are incompatible with each other and might possibly have different and conflicting operating models. In addition, this makes the onboarding and conformance processes of VNFs/CNFs (coming from different vendors) hard to automate and standardise.

To put this effort into perspective, over the past few years, the telecom industry has been going through a massive technology revolution by embracing software defined networking and cloud architecture principles, in pursuit of the goal of achieving more flexibility, agility and operational efficiency. At a high level, the main objective of NFV (Network Function Virtualisation) is the ability to use general purpose standard COTS (Commercial off the Shelf) compute, memory and storage hardware platforms to run multiple Virtualised Network Functions. Earlier common infrastructure models built on the previous assumption that networking applications are typically built on discrete hardware, do not offer the level of flexibility and agility needed for the support of newer networking technologies such as 5G, intelligent networks and Edge computing. By running network applications as software rather than on purpose-built hardware, as it has been done since the early 1990’s, the operators aspire to realize operational efficiencies, and capital expense savings. These Software Defined Network (SDN) applications are increasingly being used by telecom operators to support their internal and customer facing network infrastructures. The need for a common model across the industry to facilitate more rapid adoption is clear.

Project Goals and Purpose

The goal of the task force is to develop a robust infrastructure model and a limited discrete set of architectures built on that model that can be validated for use across the entire member community. The community, which is made up of a cross section of global operators and supporting vendors alike, was created to support the development, deployment and management of NFV applications faster and more easily.

All of this had led to a growing awareness of the need to develop more open models and validation mechanisms to bring the most value to telco operators as well as vendors, by agreeing on a standard set of infrastructure profiles to use for the underlying infrastructure to support VNF/CNF applications across the industry and telecom community at large. To achieve this goal, the cloud environment needs to be fully abstracted via APIs and other mechanisms to the VNFs/CNFs so that both developers of the VNF/CNF applications and the operators managing the environments can benefit from the flexibility that the disaggregation of the underlying infrastructure offers.

The next step after the Reference Model has been identified and developed is to take the general model, which is purposely designed to be able to be applied to a number of technologies, and apply it to a discrete number of concrete and ultimately deployable Reference Architecture platforms. The intention is to choose the reference architectures carefully so that there will only be a small set of architectures that meets the specific requirements for supporting NFV and Telecom specific applications. Per the principles laid out later in this document, the Reference Architectures need to meet the following criteria as much as is practical:

  • Initially should be based on widely established technology and systems used in the Telecom Industry. This will help ensure a faster adoption rate because the operators are already familiar with the technology and might even have systems in production. Another advantage to this approach is a project faster development cycle.
  • Subsequent architectures should be based on either additional established or promising emerging technologies that are chosen by the community members.

Common Cloud Infrastructure Benefits

By providing a pre-defined environment with common capabilities, applications are able to be developed and deployed more rapidly. In addition, the common infrastructure can be optimized for various workloads, such as IT (Information Technology), VNF, AI (Artificial Intelligence), and other future workload types as new technologies emerge. The benefits of this approach are:

  • Configuration automation over customisation
    • By abstracting the infrastructure capabilities as much as possible, operators are able to use common infrastructure platforms across all VNF/CNF vendors.
    • Maintaining a consistent infrastructure allows for higher levels of automation due to a reduced need for customisation of the various components.
    • Overall, the intention is to reduce the total cost of ownership for operators and development costs for vendors
  • Onboarding and conformance
    • By defining abstracted infrastructure capabilities, and the metrics by which they are measured, the onboarding and conformance process for both cloud infrastructure and VNFs/CNFs can be standardized, reducing development time for the VNF/CNF developers and deployment and operational management costs for the operators standing up the cloud environments.
    • Supply chain, procurement and assurance teams can then use these metrics to more accurately assess the most efficient / best value vendor for a given environment and network services requirement.
  • Better utilisation
    • Properly mapping VNFs/CNFs to flavours to the underlying infrastructure, brings the potential for more efficient utilisation, than needing to create specific configurations for each type of application in the infrastructure.

In conclusion, to serve the stated objective building a common cloud infrastructure that is able to take advantage of true cloud models for the more rapid development and deployment of SDN NFV applications, the CNTT is documentation of a reference model, a select set of architectures, a set of reference implementations, and a set of conformance suites, so that there is a more consistent model infrastructure for developers and vendors of SDN software and applications to build to.

Principles

Any specification work created within CNTT must conform to the following principles:

Overall Principles

  1. A top-level objective is to build a single, overarching Reference Model with the smallest number of Reference Architectures tied to it as is practical. Two principles are introduced in support of these objectives:

    • Minimise Architecture proliferation by stipulating compatible features be contained within a single Architecture as much as possible:

      • Features which are compatible, meaning they are not mutually exclusive and can coexist in the same cloud infrastructure instance, shall be incorporated into the same Reference Architecture. For example, IPv4 and IPv6 should be captured in the same Architecture, because they don’t interfere with each other
      • Focus on the commonalities of the features over the perceived differences. Seek an approach that allows small differences to be handled at either the low-level design or implementation stage. For example, assume the use of existing common APIs over new ones.
    • Create an additional Architecture only when incompatible elements are unavoidable:

      • Creating additional Architectures is limited to when incompatible elements are desired by Taskforce members. For example, if one member desires KVM be used as the hypervisor, and another desires ESXi be used as the hypervisor, and no compromise or mitigation* can be negotiated, the Architecture could be forked, subject to community consensus, such that one Architecture would be KVM-based and the other would be ESXi-based.

        *Depending on the relationships and substitutability of the component(s) in question, it may be possible to mitigate component incompatibility by creating annexes to a single Architecture, rather than creating an additional Architecture. With this approach, the infrastructure architecture designers might implement the Architecture as described in the reference document, however when there is a potential for incompatibility for particular component, they would select their preferred option from one of the relevant annexes. For example, if one member wanted to use Software-Defined storage (SDS) as CEPH, and another member wanted to use Storage Attached Network(SAN), assuming the components are equally compatible with the rest of the Architecture, there could be one annex for the CEPH implementation and one annex for the SAN implementation.

  2. Cloud Infrastructure provides abstract and physical resources corresponding to:

    • Compute resources
    • Storage resources
    • Memory resources
    • Networking resources (Limited to connectivity services only)
    • Acceleration resources
  3. Vendor independence of Cloud Infrastructure exposed resources .

  4. Cloud Infrastructure Application Programming Interfaces (APIs) ensure Interoperability (multi-vendor, components substitution), drive Simplification, and open source implementations that have an open governance model (e.g. come from Open Communities or Standards Development Organisations). • These APIs support, for example, cloud infrastructure resources discovery, monitoring by management entities, configuration on behalf of workloads and consumption by workloads

  5. Workloads are modular and designed to utilise the minimum resources required for the service.

  6. Workloads consume only the resources, capabilities and features provided by the Cloud infrastructure.

  7. Workload functional capabilities independence from Cloud Infrastructure (hardware and software) accelerations.

  8. Workload independence from Cloud Infrastructure (hardware and software) hardware-dependent software

    • This is in support of workload abstraction, enabling portability across the Infra and simplification of workload design
    • Use of critical features in this category are governed by technology specific policies and exceptions in the RA specifications.
  9. Abstraction of specific internal hardware details above the Infrastructure Cloud Management layers unless managed through Hardware Infrastructure Manager

    • This is in support of workload abstraction, enabling portability across the Infra and simplification of workload design
    • Use of critical features in this category are governed by technology specific policies and exceptions in the RA specifications.

Requirements Principles

The agreed upon rules and recommendations to which a compliant workload or cloud infrastructure must adhere.

  • All requirements will be hosted and maintained in the RM or relevant RA
  • All requirements must be assigned a requirements ID and not be embedded in narrative text. This is to ensure that readers do not have to infer if a requirement exists and is applicable
  • Requirements must have a unique ID for tracking and reference purposes
  • The requirement ID should include a prefix to delineate the source project
  • Requirements must state the level of compliance (ex: MUST, SHOULD, MAY) per RFC 2119[2]
  • Mandatory requirements must be defined in such a way that they are unambiguously verifiable via automated testing
  • Requirements should be publishable or extractable into a machine readable format such as JSON
  • Requirements should include information about the impact of non-conformance and the rationale for their existence

Architectural Principles

Following are a number of key architectural principles that apply to all Reference Architectures produced by CNTT:

  1. Open source preference: To ensure, by building on technology available in open source projects, that suppliers’ and operators’ investment have a tangible pathway towards a standard and production ready Cloud Infrastructure solution portfolio.
  2. Open APIs: To enable interoperability and component substitution, and minimize integration efforts by using openly published API definitions.
  3. Separation of concerns: To promote lifecycle independence of different architectural layers and modules (e.g. disaggregation of software from hardware).
  4. Automated lifecycle management: To minimize costs of the end-to-end lifecycle, maintenance downtime (target zero downtime), avoid errors and discrepancies resulting from manual processes.
  5. Automated scalability: To minimize costs and operational impacts through automated policy-driven scaling of workloads by enabling automated horizontal scalability of workloads.
  6. Automated closed loop assurance: To minimize operational costs and simplify Cloud Infrastructure platform operations by using automated fault resolution and performance optimization.
  7. Cloud nativeness: To optimise the utilization of resources and enable operational efficiencies.
  8. Security compliance: To ensure the architecture follows the industry best security practices and is at all levels compliant to relevant security regulations.
  9. Resilience and Availability: To allow High Availability and Resilience for hosted VNFs, and to avoid Single Point of Failure.

Scope

Within the framework of the common Telecom cloud infrastructure vision, there are four levels of documents needed to describe the components, realize the practical application of the systems and qualify the resulting cloud infrastructure. They are, as highlighted in Figure 1 : Reference Model , Reference Architecture , Reference Implementation , and Reference Conformance .

scope

Figure 1: Documentation Scope of CNTT

Functional Scope

In terms of the functional scope of the CNTT documentation, in order to target the project goals as described above, we are focussed on:

  • Functional capabilities of the cloud infrastructure and the infrastructure management
  • Functional interfaces between infrastructure and infrastructure management
  • Functional interfaces between workloads and workload management

Due to the close alignment with ETSI GR NFV 002[3], those ETSI interfaces that are considered relevant (with notes where required) are included in the figure below.

scope

Figure 2: Functional Scope of CNTT

Out of Scope Components

While the nature of the CNTT might seem quite broad, the following areas are not at this time part of the scope of this effort.

  • Hardware specifications: beyond the abstracted high-level CPU, memory, network interface and storage elements. The intention is to write the documents so they are general enough that any vendor hardware can be used in a conformant implementation without making significant changes to the model.
  • Workload specifications: Other than the API interfaces when they directly need to touch the workloads themselves, the intention is to assume the workload application is a black box that the cloud infrastructure is providing resources to. The majority of interactions for lifecycle management of the workloads will be through the cloud infrastructure whenever possible.
  • Lifecycle Management of the CaaS Clusters: whilst a complete NFV-MANO solution would need to provide lifecycle management for the Kubernetes clusters it is using to deploy its CNFs, the CNTT doesn’t describe the NFVO and VNFM parts, and therefore the management of the cluster(s) is not in scope, while the VIM and the lifecycle management of containers (by Kubernetes) is in scope.
  • Company specific requirements: The CNTT documents are designed to be general enough that most operators and others in the Open Source communities will be able to adapt and extend them to their own non-functional requirements.

Specification Types

  • Reference Model (RM) : focuses on the Infrastructure Abstraction and how services and resources are exposed to VNFs/CNFs. It needs to be written at a high enough level that as new Reference Architectures and Reference Implementations are added, the model document should require few or no changes. Additionally, the Reference Model is intended to be neutral towards VMs or Containers.
  • Reference Architecture (RA) : Reference Architectures defines all infrastructure components and properties which have effect on the VNF/CNF run time, deployment time, and design time. It is expected that at least one, but not more than a few Reference Architectures will be created, and they will conform to the Reference Model. The intention is, whenever possible, to use existing elements, rather than specify entirely new architectures in support of the high-level goals specified in the Reference Model .
  • Reference Implementation (RI) : Builds on the requirements and specifications developed in RM, RAs and adds details so that it can be implemented. Each Reference Architecture is expected to be implemented by at least one Reference Implementation.
  • Reference Conformance (RC) : Builds on the requirements and specifications developed in the other documents and adds details on how an implementation will be verified, tested and certified. Both infrastructure verification and conformance as well as VNFs/CNFs verifications and conformance will be covered.

Figure 2 below illustrates how each type of specifications relate to different element of a typical cloud platform stack.

scope

Figure 3: Documentation Scope of CNTT

Below is a diagram of the different artefacts that will need to be created to support the implementation of the abstract concepts presented in the Reference Model , which are then applied to create the Reference Architecture that will be deployed using the requirements spelled out in the Reference Implementation .

scope

Figure 4: Description of the possible different levels of CNTT artefacts

Relationship to other industry projects

The CNTT work is not done in a vacuum. The intention from the beginning was to utilize the work from other Open Source and standards bodies within the industry. Some of the projects, but by no means all, that are related in some way to the CNTT efforts include:

  • ETSi NFV ISG
  • OpenStack
  • OPNFV
  • ONAP
  • CNCF
  • MEF
  • TM Forum
  • OSM (ETSi Open Source MANO project)
  • ODIM (Open Distributed Infrastructure Management)
  • VMware (While not an Open Source project, VMware is a commonly used platform used for VNF deployments in the telecom industry)

Relationship to ETSI-NFV

The ETSI NFV ISG is very closely related to the CNTT, in that it is a group that is working on supporting technologies for NFV applications ( Figure 5 illustrates the scope of ETSI-NFV). To facilitate more collaboration as the project matures, the CNTT scope ( Figure 2 above) purposely references certain ETSI NFV reference points, as specified by ETSI GR NFV 002[3].

scope

Figure 5: Scope ETSI NFV.

Relationship to OPNFV and OVP

The CNTT is also closely aligned with OVP, an open source, community-led compliance and verification program that demonstrates the readiness and availability of commercial NFV products and services including Vendor’s Implementation (VI) of cloud infrastructure and VNFs, using OPNFV. OVP combines open source-based automated compliance and verification testing for multiple parts of the NFV stack specifications established by ONAP, multiple SDOs such as ETSI and GSMA, and the LF Networking End User Advisory Group (EUAG).

Once the CNTT specifications are on place, OPNFV is expected to create a reference implementation that is adherent to requirements set in CNTT ( Reference Implementations ). Additionally, Commercial products adhering to CNTT specifications will be able to undergo an enhanced OVP’s program (based on CNTT Reference Conformance specification) using OPNFV testing framework and tools. Figure 6 below illustrates the relationship with OPNFV and OVP in more details (specific to OpenStack based specifications)

scope

Figure 6: CNTT Relationship with OPNFV and OVP.

As can be seen from the above figure, roles and responsibilities are as follows:

  • CNTT specifies lab requirements in the Reference Implementation document which will be used by OPNFV to define what labs can be used within the community for the purpose of installing and testing CNTT conformant cloud infrastructure implementations.
  • CNTT includes a lab Playbook in its Reference Implementation detailing available suitable labs to run and test cloud infrastructure implementations with access details and processes.
  • CNTT specifies installer requirements in the Reference Implementation document will be used by OPNFV to determine a suitable installer to be used to install a Reference Implementation of cloud infrastructure that are conformant to CNTT specifications.
  • CNTT includes an installation Playbook in it’s Reference Implementation detailing instructions of how to install an OPNFV reference implementation using community installers. The Reference Implementation created by OPNFV is expected to be fully conformant to CNTT specifications and must pass all test suites defined in the CNTT Reference Conformance document.
  • CNTT specifies testing framework requirements in the Reference Conformance document will be used by OPNFV to determine a suitable testing framework and portals to be used for the purpose of running test suites and tools, and carry out badging processes.
  • CNTT defines high level test cases in the Reference Conformance document that relates to requirements coming from both the Reference Model and Reference Architecture to be used by OPNFV to determine what testing projects within the community are suitable to deliver those tests and convert them into low level test cases that can be implemented within those OPNFV testing Projects.
  • CNTT includes a traceability matrix in its Reference Conformance document detailing every test case (or group of test cases) available in the community and map them to the high level test case definition and the requirements they are fulfilling.
  • CNTT includes a testing Playbook in its Reference Conformance document detailing instructions of how to run OPNFV testing framework and test cases against commercial NFV products (infrastructure and workload) to check conformance to CNTT specifications. CNTT testing Playbook will also details instructions of how to submit testing results for the OVP badging process.

Relationship to CNCF

A close relationship between CNTT and CNCF is maintained around the contents development for RA-2, RI-2, and RC-2.

Relationship to other communities

The CNTT collaborates with relevant API workgroups of SDOs (such as MEF, TM Forum, 3GPP, TIP, etc) where applicable to align with their specification work and utilise their efforts.

Abbreviations

Please refer to Abbreviations for a full list.

References

Please refer to References for a full list.