@@ -72,6 +72,12 @@ perspective on the problem. We return to the confluence of enterprise,
7272cloud, access technologies later in this chapter, but we start by
7373addressing the terminology challenge.
7474
75+ .. _reading_aether :
76+ .. admonition :: Further Reading
77+
78+ `Aether: 5G-Connected Edge Cloud
79+ <https://opennetworking.org/aether/> `__.
80+
75811.1 Terminology
7682---------------
7783
@@ -107,7 +113,7 @@ terminology.
107113 * **OSS/BSS: ** Another Telco acronym (Operations Support System,
108114 Business Support System), referring to the subsystem that
109115 implements both operational logic (OSS) and business logic
110- (BSS). Usually the top-most component in the overall O&M
116+ (BSS). It is usually the top-most component in the overall O&M
111117 hierarchy.
112118
113119 * **EMS: ** Yet another Telco acronym (Element Management System),
@@ -164,34 +170,34 @@ terminology.
164170 * **Continuous Integration / Continuous Deployment (CI/CD): ** An
165171 approach to Lifecycle Management in which the path from
166172 development (producing new functionality) to testing, integration,
167- and ultimately deployment is an automated pipeline. Typically
168- implies continuously making small incremental changes rather than
169- performing large disruptive upgrades.
173+ and ultimately deployment is an automated pipeline. CI/CD
174+ typically implies continuously making small incremental changes
175+ rather than performing large disruptive upgrades.
170176
171177 * **DevOps: ** An engineering discipline (usually implied by CI/CD)
172178 that balances feature velocity against system stability. It is a
173179 practice typically associated with container-based (also known as
174- *cloud native *) systems, and typified by *Site Reliability
180+ *cloud native *) systems, as typified by *Site Reliability
175181 Engineering (SRE) * practiced by cloud providers like Google.
176182
177183 * **In-Service Software Upgrade (ISSU): ** A requirement that a
178184 component continue running during the deployment of an upgrade,
179185 with minimal disruption to the service delivered to
180- end-users. Generally implies the ability to incrementally roll-out
181- (and roll-back) an upgrade, but is specifically a requirement on
182- individual components (as opposed to the underlying platform used
183- to manage a set of components).
186+ end-users. ISSU generally implies the ability to incrementally
187+ roll-out (and roll-back) an upgrade, but is specifically a
188+ requirement on individual components (as opposed to the underlying
189+ platform used to manage a set of components).
184190
185191* **Monitoring & Logging: ** Collecting data from system components to aid
186192 in management decisions. This includes diagnosing faults, tuning
187193 performance, doing root cause analysis, performing security audits,
188194 and provisioning additional capacity.
189195
190196 * **Analytics: ** A program (often using statistical models) that
191- produces additional insights (value) from raw data. Can be used to
192- close a control loop (i.e., auto-reconfigure a system based on
197+ produces additional insights (value) from raw data. It can be used
198+ to close a control loop (i.e., auto-reconfigure a system based on
193199 these insights), but could also be targeted at a human operator
194- ( that subsequently takes some action) .
200+ that subsequently takes some action.
195201
196202Another way to talk about operations is in terms of stages, leading to
197203a characterization that is common for traditional network devices:
@@ -301,9 +307,9 @@ manageable:
301307 majority of configuration involves initiating software parameters,
302308 which is more readily automated.
303309
304- * Cloud native implies a set best-practices for addressing many of the
305- FCAPS requirements, especially as they relate to availability and
306- performance, both of which are achieved through horizontal
310+ * Cloud native implies a set of best-practices for addressing many of
311+ the FCAPS requirements, especially as they relate to availability
312+ and performance, both of which are achieved through horizontal
307313 scaling. Secure communication is also typically built into cloud RPC
308314 mechanisms.
309315
@@ -319,17 +325,19 @@ monitoring data in a uniform way, and (d) continually integrating and
319325deploying individual microservices as they evolve over time.
320326
321327Finally, because a cloud is infinitely programmable, the system being
322- managed has the potential to change substantially over time.\ [# ]_ This
323- means that the cloud management system must itself be easily extended
324- to support new features (as well as the refactoring of existing
325- features). This is accomplished in part by implementing the cloud
326- management system as a cloud service, but it also points to taking
327- advantage of declarative specifications of how all the disaggregated
328- pieces fit together. These specifications can then be used to generate
329- elements of the management system, rather than having to manually
330- recode them. This is a subtle issue we will return to in later
331- chapters, but ultimately, we want to be able to auto-configure the
332- subsystem responsible for auto-configuring the rest of the system.
328+ managed has the potential to change substantially over time.\ [# ]_
329+ This means that the cloud management system must itself be easily
330+ extended to support new features (as well as the refactoring of
331+ existing features). This is accomplished in part by implementing the
332+ cloud management system as a cloud service, which means we will see a
333+ fair amount of recursive dependencies throughout this book. It also
334+ points to taking advantage of declarative specifications of how all
335+ the disaggregated pieces fit together. These specifications can then
336+ be used to generate elements of the management system, rather than
337+ having to manually recode them. This is a subtle issue we will return
338+ to in later chapters, but ultimately, we want to be able to
339+ auto-configure the subsystem responsible for auto-configuring the rest
340+ of the system.
333341
334342.. [# ] For example, compare the two services Amazon offered ten years
335343 ago (EC2 and S3) with the well over 100 services available on
@@ -371,13 +379,19 @@ identifies the technology we assume.
371379~~~~~~~~~~~~~~~~~~~~~~~
372380
373381The assumed hardware building blocks are straightforward. We start
374- with bare-metal servers and switches, built using merchant
375- silicon . These might, for example, be ARM or x86 processor chips and
382+ with bare-metal servers and switches, built using merchant silicon
383+ chips . These might, for example, be ARM or x86 processor chips and
376384Tomahawk or Tofino switching chips, respectively. The bare-metal boxes
377385also include a bootstrap mechanism (e.g., BIOS for servers and ONIE
378386for switches), and a remote device management interface (e.g., IPMI or
379387Redfish).
380388
389+ .. _reading_redfish :
390+ .. admonition :: Further Reading
391+
392+ Distributed Management Task Force (DMTF) `Redfish
393+ <https://www.dmtf.org/standards/redfish> `__.
394+
381395A physical cloud cluster is then constructed with the hardware
382396building blocks arranged as shown in :numref: `Figure %s <fig-hw >`: one
383397or more racks of servers connected by a leaf-spine switching
@@ -397,11 +411,11 @@ that software running on the servers controls the switches.
397411software components, which we describe next. Collectively, all the
398412hardware and software components shown in the figure form the
399413*platform *. Where we draw the line between what's *in the platform *
400- and what runs *on top of the platform * will become clear in later
401- chapters, but the summary is that different mechanisms will be
402- responsible for (a) bringing up the platform and prepping it to host
403- workloads, and (b) managing the various workloads that need to be
404- deployed on that platform.
414+ and what runs *on top of the platform *, and why it is important, will
415+ become clear in later chapters, but the summary is that different
416+ mechanisms will be responsible for (a) bringing up the platform and
417+ prepping it to host workloads, and (b) managing the various workloads
418+ that need to be deployed on that platform.
405419
406420
4074211.3.2 Server Virtualization
@@ -415,7 +429,7 @@ resources, all running on the commodity processors in the cluster:
4154292. Kubernetes instantiates and interconnects containers.
416430
4174313. Helm charts specify how collections of related containers are
418- interconnected.
432+ interconnected to build applications .
419433
420434These are all well known and ubiquitous, and so we only summarize them
421435here. Links to related information for anyone that is not familiar
0 commit comments