IZO Private Cloud Service

Tata Communications has launched IZO Private Cloud service, giving direct control to organizations hosting the service over their critical data. Genius Wong, President for Global Network Services, Cloud and Data Center Services at Tata Communications has commented, “IZO Private Cloud is the next step on our mission to harness our partnerships, global network and data centre infrastructure. The new service puts the CIO back in control of their cloud and data center estate.”  This new services will be available in a total of 12 countries around the world, including cities such India, Hong Kong, Singapore, UK, & the US.

The service will allows users to access software on a pay per use basis, so that they do not have to purchase the entire product. In certain industries, companies prefer to maintain a private cloud over a public cloud so that their information is secure. Srinivasan CR, Vice President for Global Product Management at Tata Communications has also stated, “Most of the times customers are worried about security on public cloud, our private cloud offering takes that security concern out.”

The IZO Private Cloud service is a part of the companies’ network platform, which currently has over 20 service providers. These providers cover countries accounting for roughly eighty-five per cent of the world’s GDP. Tata Communications has partnered with the likes of Microsoft Azure, Amazon Web Service, and Salesforce to offer cloud services.

The post IZO Private Cloud Service appeared first on Cloud News Daily.

CORD: The telco central office rearchitected as a data centre

(c)iStock.com/Danil Melekhin

The landscape

Network operators are in the throes of unprecedented challenges. The proliferation of video traffic, mobile devices, and OTT services has pushed operator networks into uncharted territory. According to Krish Prabhu, CTO of AT&T Labs, for example, data traffic has increased 100,000% in the last eight years, and looking forward, plans are now underway to roll out ultra-fast fiber and access to 100 cities across the US.

Network operators want to make their networks efficient, programmable, elastic and agile to meet the challenges of user bandwidth demands, as well as to create new revenue streams with innovative services. They want to benefit from both the economies of scale (infrastructure constructed from a few commodity building blocks) and the agility (the ability to rapidly deploy and elastically scale services) that cloud providers enjoy today.

These cloud-inspired benefits are especially needed at the edge of operator network: in the Telco Central Office (CO). These facilities contain a diverse collection of purpose-built devices, assembled over 50 years (standards-based architecture with vendor proprietary). This makes them both a source of significant CAPEX and OPEX and a potential barrier to rapid innovation. Moreover, large service providers operate thousands of such COs, each serving tens of thousands of residential, mobile, and enterprise customers.

In response to these challenges, network operators are re-inventing their networks to better leverage best practices in cloud elasticity and agility, software defined networking (SDN), and network function virtualisation (NFV). One such effort, CORD, is a collaborative effort between AT&T and the Open Networking Lab.

Introducing CORD

CORD re-architects the Central Office as a data centre. The basic approach centers on unifying the following three related but distinct threads:

  • The first is SDN, which is about separating the network’s control and data planes. This makes the control plane open and programmable, and that can lead to increased innovation. It also allows for simplification of forwarding devices that can be built using merchant silicon, resulting in less expensive white-box switches.
  • The second is NFV, which is about moving the data plane from hardware appliances to virtual machines. This reduces CAPEX costs (through server consolidation and replacing high-margin devices with commodity hardware) and OPEX costs (through software-based orchestration). It also has the potential to improve operator agility and increases the opportunity for innovation.
  • The third is the cloud, which defines the state-of-the-art in building scalable services—leveraging software-based solutions, micro-service architecture, virtualised commodity platforms, elastic scaling, and service composition, to enable network operators to rapidly innovate.

The goal of CORD is not only to replace today’s purpose-built hardware devices with their more agile software-based counterparts, but also to make the CO an integral part of every telco’s larger cloud strategy and to enable them to support more attractive and meaningful networking services.

Commodity hardware

The target hardware for CORD consists of a collection of commodity servers and storage, interconnected by a leaf-spine fabric constructed from white-box switches. An illustrative example is shown in Figure 1.

Although similar in design (albeit on a smaller scale) to a conventional data centre, there are two unique aspects to this hardware configuration:

  • The switching fabric—organised as a leaf-spine topology—is optimised for traffic flowing east-to-west, between the access network that connects customers to the CO and the upstream links that connects the CO to the operator’s backbone. There is no north-south traffic in the conventional sense.
  • The racks of GPON OLT MACS commoditise connectivity to the access network. They replace proprietary and closed hardware that connects millions of subscribers to the Internet with an open, software-defined solution. (GPON is the example access technology in the reference implementation of CORD, but the same argument applies to other access technologies as well.)

Software building blocks

Regarding software, our reference implementation of CORD exploits three open source projects:

  • OpenStack is the cluster management platform. It provides the core IaaS capability, and is responsible for creating and provisioning virtual machines (VMs) and virtual networks (VNs).
  • ONOS is the network operating system that manages the underlying white-box switching fabric. It also hosts a collection of control applications that implement services on behalf of Telco subscribers. ONOS is also responsible for embedding virtual networks in the underlying fabric, which is in turn accessed via OpenStack’s Neutron API.
  • XOS is a service abstraction layer that unifies infrastructure services (provided by OpenStack), control plane services (provided by ONOS.  It provides explicit support for multi-tenant services, making it possible to create, name, operationalise, manage and compose services as first-class operations.

Virtualising legacy devices

The first step is to virtualise the existing hardware devices, transforming each device into its software service counterpart and running it on commodity hardware. In the process, functionality is likely disaggregated and re-packaged in new ways. Figure 2 shows the devices that CORD virtualises. They include Optical Line Termination (OLT), Customer Premises Equipment (CPE), and Broadband Network Gateways (BNG).

Due to space limitations, this overview focuses on GPON technology and virtualising the OLT to produce vOLT; there are also virtualised counterparts to the CPE (vCPE) and BNG (vBNG).

The first challenge is to create a commodity I/O Blade. AT&T has developed an open specification for a GPON MAC 1RU “pizza box,” as shown in Figure 3. This board includes the essential GPON Media Access Control (MAC) chip under control of a remote control program via OpenFlow. This replaces an existing closed and proprietary OLT chassis (not shown) that integrates this GPON MAC chip with GPON protocol management, 802.1ad-compliant VLAN bridge, and Ethernet MAC functions.

The end result is to bring the access network interface under the same SDN-based control paradigm as the white-box based switching fabric. In other words, virtual OLT (vOLT), is implemented as a combination of: (1) Merchant Silicon (i.e., commodity GPON interface boards) and (2) an SDN control function that sets up and manages control plane functions of an OLT (e.g., 802.1X, IGMP Snooping, and OAM).

The vOLT control application running on top of ONOS facilitates attachment and authentication (AAA), establishes and manages VLANs connecting consumer devices (see next section) and the CO switching fabric on a per-subscriber basis, and manages other control plane functions of the OLT.

Service orchestration

Replacing hardware devices with software running in virtual machines is a necessary first step, but is not by itself sufficient. Just as all the devices in a hardware-based CO must be wired together in a meaningful way, their software counterparts must also be managed as a collective. This process is often called service orchestration, but if network operators are to enjoy the same agility as cloud providers, the abstractions that underlie the orchestration framework must fully embrace (1) the elastic scale-out of the resulting virtualised functionality, and (2) the composition of the resulting disaggregated (unbundled) functionality. A model that simply “chains” VMs together as though it is operating on their hardware-based counterparts will not achieve either goal.

Our approach is to adopt everything as a service (XaaS) as a unifying principle. This brings the disparate functionality introduced by virtualising the hardware devices under a single coherent model. The control functions run as scalable services (these functions run on top of ONOS), the data plane functions run as scalable services (these functions scale across a set of VMs), the commodity infrastructure is itself managed as a service (commonly known by the generic name IaaS), and various other global cloud services running in the CO are also managed as scalable services. No matter the role it plays in the overall CORD architecture, each service is structured in exactly the same way: it supports a logically centralised interface, called a service controller; it is elastically scale across a set of service instances (corresponding to VMs and OpenFlow switches); and it is multi-tenant with an associated tenant abstraction.

While vOLT, vCPE, and vBNG refer to the virtualised counterpart of the three physical devices, they are not complete and “pluggable” elements in CORD until they are packaged as services—each includes a multi-tenant service controller, and each scales independently across a set of service instances. Because, the new architecture no longer requires functionality to be bundled along the same boundaries as before, it is more intuitive to think of the virtualisation process as resulting in three generic, multi-tenant services:

  • Access as a service (ACCaaS): Implemented by a vOLT control application running on ONOS, where each tenant corresponds to a Subscriber VLAN.
  • Subscriber as a service (SUBaaS): Implemented by a vCPE data plane function scaled across a set of containers, where each tenant corresponds to a Subscriber Bundle.
  • Internet as a Service (INTaaS): Implemented by a vBNG control application running on ONOS, where each tenant corresponds to a Routable Subnet.

If a content distribution network (CDN)—itself a scalable cloud service deployed throughout the operator’s network, including caches in the CO—is added to these three new services, we have an example of the three kinds of services outlined in the Introduction: a cloud service (CDN), a data plane service (subscriber as a service), and two control plane services (access as a service, Internet as a service). This results in the legacy CO depicted in Figure 2 being re-architected into the data centre version shown in Figure 4.

Path to real world deployment

CORD is a significant milestone in bringing cost effectiveness and agility to Telco Central Offices. The plan is to build a fully functional reference implementation, followed by validating the architecture through lab trials and eventually field trials, and hardening the system along the way based on trial data. Taken as a whole, the goal is to bring CORD close to readiness for commercial deployments in operator networks.

Migrating from JavaScript to TypeScript | @CloudExpo #DevOps #Microservices

To let other TypeScript libraries use your library, you need to create a .d.ts file to declare all your public APIs of your library with the typing information. The enforce to clearly list all your public APIs for each libraries you are developing. We found it serves as a quick and accurate reference for all your APIs.
Refer to https://github.com/borisyankov/DefinitelyTyped for TypeScript definition files created for large amounts of JavaScript libraries.

read more

The Missing Link: Why the Cloud Is the Network | @CloudExpo #Microservices

Applications, compute, storage and security have moved to the cloud. Even so, enterprises are still saddled with historical wide area networks that connect branches and data centers to one another, but do little to help with cloud services. The network has become the weakest link.
In his session at 17th Cloud Expo, Ajit Mayya, VP of Engineering and co-founder of VeloCloud, will share a brief history of cloud services and discuss why the cloud is the network. He will talk about the problems created by legacy networks, the solution necessary to address these problems and how to implement a cloud network.

read more

IoT and Cross-Channel Marketing | @CloudExpo @Adobe #IoT #M2M

In his General Session at 17th Cloud Expo, Bruce Swann, Senior Product Marketing Manager for Adobe Campaign, will explore the key ingredients of cross-channel marketing in a digital world.
Learn how the Adobe Marketing Cloud can help marketers embrace opportunities for personalized, relevant and real-time customer engagement across offline (direct mail, point of sale, call center) and digital (email, website, SMS, mobile apps, social networks, connected objects).

read more

Big Data, Analytics and WebRTC | @ThingsExpo #IoT #RTC #BigData #WebRTC

WebRTC: together these advances have created a perfect storm of technologies that are disrupting and transforming classic communications models and ecosystems. In his session at WebRTC Summit, Cary Bran, VP of Innovation and New Ventures at Plantronics and PLT Labs, will provide an overview of this technological shift, including associated business and consumer communications impacts, and opportunities it may enable, complement or entirely transform.

read more

Big Data’s Potential to Secure the IoT | @ThingsExpo #IoT #M2M #API #BigData

The security devil is always in the details of the attack: the ones you’ve endured, the ones you prepare yourself to fend off, and the ones that, you fear, will catch you completely unaware and defenseless. The Internet of Things (IoT) is nothing if not an endless proliferation of details. It’s the vision of a world in which continuous Internet connectivity and addressability is embedded into a growing range of human artifacts, into the natural world, and even into our smartphones, appliances, and physical persons.
In the IoT vision, every new “thing” – sensor, actuator, data source, data consumer, routing intermediary, etc., is a new security-relevant detail that stirs up a wide range of collateral security issues. In other words, every new networked IoT endpoint is a new potential attack vector or launching point that the baddies can exploit. Potentially, every time you plug in a new IoT-networked device that is infected with malware or simply open to unauthorized third-party exploitation, the vulnerabilities start. Someone somewhere might exploit the new access point to gain illicit access to sensitive secrets (business, consumer, government, etc.), to damage software and data, and to wage distributed denial of service attacks.

read more