From cd49d4c4724e7cd2c5329847b3e82caf0888646d Mon Sep 17 00:00:00 2001 From: Andrew Sergeev Date: Fri, 12 Feb 2016 20:40:10 +0200 Subject: editorial only Change-Id: I5117b6db6e9fbfa3227b43142e66272e1dec3f04 --- docs/requirements/01-intro.rst | 14 ++++++-------- 1 file changed, 6 insertions(+), 8 deletions(-) (limited to 'docs/requirements/01-intro.rst') diff --git a/docs/requirements/01-intro.rst b/docs/requirements/01-intro.rst index 86fcd7f..5b2d12b 100644 --- a/docs/requirements/01-intro.rst +++ b/docs/requirements/01-intro.rst @@ -1,8 +1,8 @@ Introduction ============ -The purpose of this Requirements Project is to articulate the capabilities -and behaviours needed in Edge NFV platforms, and how they interact with +The purpose of this Requirements Project is to articulate the capabilities +and behaviours needed in Edge NFV platforms, and how they interact with centralized NFVI and MANO components of NFV solutions. @@ -13,14 +13,12 @@ Edge NFVI location has certain specific requirements related to: 1. Appropriate Tunneling for User Traffic across WAN (Ethernet, IP/MPLS) links #. Appropriate Tunneling for Management Traffic across WAN links -#. Including reachability requirements to the compute platform (‘eth0’ resilience, +#. Including reachability requirements to the compute platform (‘eth0’ resilience, this also include backup path through other media e.g. 4G/5G) #. Extending Multi-DC management to address many small "DC" locations #. Monitoring Capabilities required for a remote Compute Node #. Squaring Bare Metal with remote survivability and whether IaaS is more appropriate for remote locations -#. Security.As demarcation technology is operated in an un-trusted environment (CSP perspective) - additional means need to be implemented. Similarly, the enterprise might have concerns if - the security architecture is impacted as VNFs provide functions at different locations than +#. Security.As demarcation technology is operated in an un-trusted environment (CSP perspective) + additional means need to be implemented. Similarly, the enterprise might have concerns if + the security architecture is impacted as VNFs provide functions at different locations than the precious hardware; topics like authentication, authorization, securing the traffic. - - -- cgit 1.2.3-korg