9.1 Use of ICN for Inter-function transport
In the future IMT-2020 network, where a high degree of network function virtualization is expected either explicitly in NFV or in network slices, the use of an ICN protocol for inter-function communications is an attractive option because it decouples the location of services from the service request. The concept of using ICN in NFV and SDN is studied in several academic works30313233. ICN is well suited for service oriented routing, because each element in a service chain can name the next element in the service chain without the need for an external name resolver or manual configuration.
The initial deployment of virtualized functions inside a network Slice could use ICN technologies immediately, as these are green-field services realized within a provider network34. Initial implementations may require running ICN as a transport protocol over IP due to initial lack of hardware support for native ICN transport, but this would be a transitional situation. Even when running over an IP network layer, ICN services can still provide robust communications and endpoint discovery using common existing IP techniques (e.g. mDNS, DNS SRV records, and distribute rendezvous techniques, among others).
As data-plane programmable equipment enters the marketplace, native ICN slices and transport can offer high-performance ICN/CCNx services. For example, abstracted 5G services in a CCNx slice, such as MME, S-GW, and P-GW, could be implemented in software, in software with hardware assist, or in deep-programmable hardware. In each case, the abstracted Slice service looks the same, though each would offer different performance curves in terms of latency, throughput, and capacity. Likewise, for inter-NFV communications, native wire-speed equipment, which is being demonstrated in 2015 by some manufacturers, would improve throughput and flexibility compared to using an IP-overlay, but should not limit such deployments within the 5G timeframe.
The advantage of using ICN as the inter-function transport protocol, even in a transitional period over IP, is that it positions carriers to move to an ICN native approach, which can discovery, recover, and utilize carrier networks efficiently without centralized bottlenecks or points of failure. ICN approaches also position the carrier for dynamic service mobility and deployment without needing to track an IP underlay.
9.2 Use of ICN function state migration
ICN is a good technology choice for function state migration and execution context migration in future 5G networks . Content Centric Networking (CCNx) facilitates process migration while enabling many desirable features such as strong checkpointing and data de-duplication. Not all migration techniques require strong checkpointing, and in those cases CCNx offers a faster and weaker naming technique that allows pages or blocks to go dirty in a checkpoint.
CCNx offers an intuitive naming of resources that are part of a service or execution context migration and building checkpoints around those resources for consistent state transfer.
De-duplication is a technique where only one copy of data exists and it is shared between multiple instances. CCNx allows resources to be de-duplicated both within and between virtual machine instances. For example, in the previous discussion about using hash names for resources, if two disk blocks, for example, have the same hash value they will refer to the same Content Object. Only the block index in the CCNx manifest will be different.
A VM hypervisor may also share blocks between VMs. When generating the names used to fetch a checkpoint, the source migration agent running in the source hypervisor could use a name like {/nyc/host7, hash = 0x63223…} so any instance or any component can share the same data. Assume that the memory page size and the disk block size are the same. Then that name for hash 0x63223… could be both a disk block and a RAM page of the same data (e.g. a shared library code section). Because the manifest can point to different name prefixes for each hash and can indicate the virtual resource of that hash, we can have the same physical bytes used for many purposes. This approach may also be applied when page and block sizes are not the same by using smaller units of naming.
9.3 Use of ICN for de-abstracting the network
In a traditional IP-based network, the Internet Protocol adds a level of abstraction to communications endpoints by assigning them a location-dependent name. When applications wish to communicate, they must rendezvous those host addresses – such as with DNS or SIP or some other well-known means – before communication can take place. Because the rendezvous is done outside the network layer, the rendezvous protocol must employ its own means to determine locality – such as with ping triangulation – to determine which replica to use. Some applications use IP anycast addressing to move rendezvous back in to the network layer and realize those benefits. CCNx, as an ICN protocol, naturally keeps rendezvous on addresses within the network layer so all applications can benefit from localized services without needing to add on additional rendezvous layers with their own localization protocols.
ICN may be used as a de-abstraction layer for virtualized functions: using direct function naming in ICN means the network can move functions and change routing without needing to update intermediate abstractions of endpoint identification. For example, a single host IP address might hide many virtualized functions, so it may not be possible to directly move an IP address. One would need orchestration to inform components of a new socket endpoint, which could result in service interruption during the time when a function has finished migration and the time when an existing prior service is notified of a new service endpoint. With CCNx, the orchestration does not need to inform prior components of a new service address, it only needs to update the named routing to the new location.
Because CCNx, as an example ICN protocol, is not tied to the P-GW identity – such as for the source endpoint address – it means that CCNx is well suited for multiple P-GW egress. Service frameworks, such as Mobile Edge Computing, could realize significant simplification by using a CCNx approach for multiple P-GW egress without needing to assign the UE multiple identities or using layers of address translation.
9.4 ICN gaps related to Sotwareization
Gaps
-
Use of ICN within a slice would require ICN-aware components in the Slice, such as specialized software or deep-programmable elements to execute the ICN protocol.
-
For ICN to be an effective rendezvous mechanism in the routing plane, the CRAN would need to use the ICN protocol.
10 Identification of gaps
The following ICN gaps were identified. See clause 7.5.1 of the main body of this report of the FG-IMT-2020 focus group for the detailed description.
Gap E.1: Considering ICN as a protocol for IMT-2020 Network
Gap E.2: Robust header compression for air interface (PDCP)
Gap E.3: Mobility anchoring (ICN aware S-GW)
Gap E.4: Mobility (ICN-aware MME)
Gap E.5: ICN Protocol (ICN-aware P-GW operation)
Gap E.6: ICN Protocol Execution (slice)
Gap E.7: Lawful intercept (specify what to capture)
Gap E.8: ICN mobility and routing
Gap E.9: ICN UE provisioning
Gap E.10: ICN managing IMT-2020 Self Organizing Network (SON)
Gap E.11: ICN – Operations and management (common interfaces)
Gap E12: Operations and management (SDN/Openflow)
Gap E.13: Security (authentication and encryption)
Gap E.14: Security (encryption)
Gap E.15: QoS (demand based)
11 Migration from the existing network technology
Editor’s note: This clause is empty.
Contact:
Peter Ashwood-Smith
Huawei Technologies
Email: Peter.AshwoodSmith@huawei.com
Attention: This is not a publication made available to the public, but an internal ITU-T Document intended only for use by the Member States of ITU, by ITU-T Sector Members and Associates, and their respective staff and collaborators in their ITU related work. It shall not be made available to, and used by, any other persons or entities without the prior written consent of ITU-T.
Share with your friends: |