Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 12 Next »

Working draft: to be finalized when use cases have been finalized.

The section provides information for hardware and network configuration. ONAP Open Labs are collections of dedicated hardware, generally partitioned into pods with servers. Pods can be used for different testings like development, CI/CD, ONAP platform testing, or E2E testing.  The minimal requirements for each pod are defined in the following.

Hardware Summary

A lab compliant pod provides:

  • 2-8 controller / compute nodes depends on the use case (please refer to Server Pod session)
  • A configured network topology allowing for IPMI, Admin(PXE), Public, Private, and Storage Networks
  • Remote access through VPN
  • Security through a firewall

Server Pod

In the following table, we define 3 types of pod based on the resource usage assumption. Please note in lab and real deployment scenarios, resource can be over subscribed depending on workload. Also we assume that ONAP platform will be deployed in a separate pod from VNFs.

Type of Pod

Compute NodesNumber of Control Nodes


Total Memory(GB)

Total VCPU

Total StorageNumber of Compute Nodes

Large

900GB

180

4TB>=2

3

Medium

200GB

100

2TB>=2

3

Small

40GB

24

1TB>=2

1

Networking

Network Hardware

    • 48 Port TOR Switch
    • NICs - Combination of 1GE and 10GE based on network topology options
    • Connectivity for each data/control network is through a separate NIC port or a shared port. Separate port simplifies switch management however requires more NICs on the server and also more switch ports
    • BMC (Baseboard Management Controller) for lights-out management network using IPMI (Intelligent Platform Management Interface)

Remote Management

    • Developers to access deploy/test environments at aggregate 100Mbps upload and download speed

Basic requirements:

    • SSH sessions can be established (initially on the jump server)
    • Packages can be installed on a system by pulling from an external repo.

Firewall rules accommodate:

    • SSH sessions

Requirement for use cases (to be finalized) not include ONAP:

ONAP itself will need a medium sized server pod.

Use CasesVNFsServer Pod numberNetwork HardwareSoftware
Development or vFW/vDNS demo appsOpen sourced vFW/vDNS1 (Small)NoCloud OS
vCPEvCPE2 (Medium)

WAN/SPTN Router (2)

DC Gateway (2)

TOR (n)

ThinCPE (1)

Cloud OS (for Edge and Core)

WAN/SPTN Controller

DC Controller

Specific VNFM & EMS

VoLTEvIMS/vEPC2 (Large)

WAN/SPTN Router (2)

DC Gateway (2)

TOR (n)

Wireless Access Point (2)

VoLTE Terminal Devices (2)

Cloud OS (for Edge and Core)

WAN/SPTN Controller

DC Controller

Specific VNFM & EMS

  • No labels