summaryrefslogtreecommitdiffstats
path: root/docs/ecosystem/architecture/index.rst
diff options
context:
space:
mode:
Diffstat (limited to 'docs/ecosystem/architecture/index.rst')
-rw-r--r--docs/ecosystem/architecture/index.rst1180
1 files changed, 1180 insertions, 0 deletions
diff --git a/docs/ecosystem/architecture/index.rst b/docs/ecosystem/architecture/index.rst
new file mode 100644
index 000000000..f9439dee6
--- /dev/null
+++ b/docs/ecosystem/architecture/index.rst
@@ -0,0 +1,1180 @@
+.. This work is licensed under a Creative Commons Attribution
+.. 4.0 International License.
+.. http://creativecommons.org/licenses/by/4.0
+.. Copyright 2017-2018 Huawei Technologies Co., Ltd.
+.. Copyright 2019 ONAP Contributors
+.. Copyright 2020 ONAP Contributors
+.. Copyright 2021 ONAP Contributors
+.. Copyright 2022 ONAP Contributors
+.. Copyright 2023 ONAP Contributors
+.. Copyright 2024 ONAP Contributors
+
+.. _ONAP-architecture:
+
+Architecture
+============
+ONAP is no longer a platform, rather it provides various network automation
+functions, and security reference configuration in LFN.
+
+ONAP provides network automation functions for orchestration, management, and
+automation of network and edge computing services for network operators, cloud
+providers, and enterprises. Real-time, policy-driven orchestration and
+automation of physical, virtual, and cloud native network functions enables
+rapid automation of new services and complete lifecycle management critical for
+5G and next-generation networks, with Intent-based automation and genAI/ML.
+
+The ONAP project addresses the need for automation functions for
+telecommunication, cable, and cloud service providers—and their solution
+providers—to deliver differentiated network services on demand, profitably and
+competitively, while leveraging existing investments.
+
+The challenge that ONAP meets is to help network operators keep up with the
+scale and cost of manual changes required to implement new service offerings,
+from installing new data center equipment to, in some cases, upgrading
+on-premises customer equipment. Many are seeking to exploit SDN and NFV to
+improve service velocity, simplify equipment interoperability and integration,
+and to reduce overall CapEx and OpEx costs. In addition, the current, highly
+fragmented management landscape makes it difficult to monitor and guarantee
+service-level agreements (SLAs).
+
+ONAP is addressing these challenges by developing global and massive scale
+(multi-site and multi-VIM) automation capabilities for physical, virtual, and
+cloud native network elements. It facilitates service agility by supporting
+data models for rapid service and resource deployment and providing a common
+set of northbound REST APIs that are open and interoperable, and by supporting
+model-driven interfaces to the networks. ONAP’s modular and layered nature
+improves interoperability and simplifies integration, allowing it to support
+1) multiple VNF environments by integrating with multiple VIMs, VNFMs, SDN
+Controllers, as well as legacy equipment (PNF) and 2) Cloud Native environments
+by integrating Kubernetes, CNFMs and other controllers. The Service Design &
+Creation (SDC) project also offers seamless orchestration of CNFs. ONAP’s
+consolidated xNF requirements publication enables commercial development of
+ONAP-compliant xNFs. This approach allows network and cloud operators to
+optimize their physical, virtual and cloud native infrastructure for cost and
+performance; at the same time, ONAP’s use of standard models reduces
+integration and deployment costs of heterogeneous equipment. All this is
+achieved while minimizing management fragmentation.
+
+The ONAP allows end-user organizations and their network/cloud providers to
+collaboratively instantiate network elements and services in a rapid and
+dynamic way, together with supporting a closed control loop process that
+supports real-time response to actionable events. In order to design, engineer,
+plan, bill and assure these dynamic services, there are three major
+requirements:
+
+- A robust design framework that allows the specification of the service in all
+ aspects – modeling the resources and relationships that make up the service,
+ specifying the policy rules that guide the service behavior, specifying the
+ applications, analytics and closed control loop events needed for the elastic
+ management of the service
+- An orchestration and control framework (Service Orchestrator and Controllers)
+ that is recipe/ policy-driven to provide an automated instantiation of the
+ service when needed and managing service demands in an elastic manner
+- An analytic framework that closely monitors the service behavior during the
+ service lifecycle based on the specified design, analytics and policies to
+ enable response as required from the control framework, to deal with
+ situations ranging from those that require healing to those that require
+ scaling of the resources to elastically adjust to demand variations.
+
+To achieve this, ONAP decouples the details of specific services and supporting
+technologies from the common information models, core orchestration components,
+and generic management engines (for discovery, provisioning, assurance etc.).
+
+Furthermore, it marries the speed and style of a DevOps/NetOps approach with
+the formal models and processes operators require to introduce new services and
+technologies. It leverages cloud-native technologies including Kubernetes to
+manage and rapidly deploy the ONAP and related components. This is in
+stark contrast to traditional OSS/Management software architectures,
+which hardcoded services and technologies, and required lengthy software
+development and integration cycles to incorporate changes.
+
+The ONAP enables service/resource independent capabilities for design,
+creation and lifecycle management, in accordance with the following
+foundational principles:
+
+- Ability to dynamically introduce full service lifecycle orchestration
+ (design, provisioning and operation) and service API for new services and
+ technologies without the need for new software releases or without
+ affecting operations for the existing services
+- Scalability and distribution to support a large number of services and large
+ networks
+- Metadata-driven and policy-driven architecture to ensure flexible and
+ automated ways in which capabilities are used and delivered
+- The architecture shall enable sourcing best-in-class components
+- Common capabilities are ‘developed’ once and ‘used’ many times
+- Core capabilities shall support many diverse services and infrastructures
+
+Further, ONAP comes with a functional architecture with component definitions
+and interfaces, which provides a force of industry alignment in addition to
+the open source code.
+
+Architecture Overview
+---------------------
+
+The ONAP architecture consists of a design time and run time functions, as well
+as functions for managing ONAP itself.
+
+ Note: Use the interactive features of the below ONAP Architecture Overview.
+ Click to enlarge it. Then hover with your mouse over an element in the
+ figure for a short description. Click the element to get forwarded to a more
+ detailed description.
+
+.. image:: media/onap-architecture-overview-interactive-path.svg
+ :width: 800
+
+**Figure 1: Interactive high-level view of the ONAP architecture with its
+microservices-based components. Click to enlarge and discover.**
+
+The figure below provides a simplified functional view of the architecture,
+which highlights the role of a few key components:
+
+#. ONAP Design time environment provides onboarding services and resources
+ into ONAP and designing required services.
+#. External API provides northbound interoperability for the ONAP.
+#. ONAP Runtime environment provides a model- and policy-driven orchestration
+ and control framework for an automated instantiation and configuration of
+ services and resources. Multi-VIM/Cloud provides cloud interoperability for
+ the ONAP workloads. Analytic framework that closely monitors the service
+ behavior handles closed control loop management for handling healing,
+ scaling and update dynamically.
+#. OOM provides the ability to manage cloud-native installation and deployments
+ to Kubernetes-managed cloud environments.
+#. ONAP Shared Services provides shared capabilities for ONAP modules. The ONAP
+ Optimization Framework (OOF) provides a declarative, policy-driven approach
+ for creating and running optimization applications like Homing/Placement,
+ and Change Management Scheduling Optimization. The Security Framework uses
+ open-source security patterns and tools, such as Istio, Ingress Gateway,
+ oauth2-proxy, and Keycloak. This Security Framework makes ONAP secure
+ external and inter-component communications, authentication and
+ authorization.
+ Logging Framework (reference implementation PoC) supports open-source- and
+ standard-based logging. It separates application log generation from log
+ collection/aggregation/persistence/visualization/analysis; i.e., ONAP
+ applications handle log generation only and the Logging Framework stack will
+ handle the rest. As a result, operators can leverage/extend their own
+ logging stacks.
+#. ONAP shared utilities provide utilities for the support of the ONAP
+ components.
+
+Microservice BUS (MSB) is obsolete from Montreal release. Its function has
+been replaced by Istio Service Mesh, Ingress and IdAM (Keycloak) for secure
+internal and external communications and security authentication and
+authorization.
+
+Information Model and framework utilities continue to evolve to harmonize
+the topology, workflow, and policy models from a number of SDOs including
+ETSI NFV MANO, ETSI/3GPP, O-RAN, TM Forum SID, ONF Core, OASIS TOSCA, IETF,
+and MEF.
+
+|image2|
+
+**Figure 2. Functional view of the ONAP architecture**
+
+Introduction of ONAP Streamlining evolution
+-------------------------------------------
+Rationale
+^^^^^^^^^
+Previously, ONAP as a platform had shown e2e network automation to the
+industry. Operators, vendors and enterprises have learned how service/network
+automation (modeling, orchestration, policy-based closed loop, optimization,
+etc.) works on VM and Cloud-native environments for VNF, PNF, CNF, NS,
+Network/RAN slicing and e2e service thru ONAP.
+In ONAP, there are numerous valuable use cases, that leverage and coordinate
+clusters of ONAP component functions (e.g., SDC, SO, A&AI, DCAE, SDNC, SDNR,
+CPS, CDS...) to achieve objectives, such as:
+
+- E2E Service
+- Network Slicing
+- RAN Slicing
+- Closed Loop
+- ETSI-based NS & VNF orchestration
+- Helm-based CNF orchestration
+- ASD-based (including Helm) CNF orchestration
+
+Now, the operators, vendors and enterprises want to select and apply ONAP
+functions to their portfolio. No one needs to take ONAP as a whole.
+
+Goal
+^^^^
+The goal is to continue to support the current ONAP use cases efficiently for
+use in commercial production environments and portfolio. We expect the industry
+wants to pick and choose desired ONAP component functions, swap some of the
+ONAP functions, and integrate those functions into their portfolio seamlessly,
+without bringing in a whole ONAP platform.
+ONAP Streamlining, which drives individual components and clusters of
+components guided by use cases, will enable the flexible and dynamic function
+adoption by the industry
+
+ONAP Streamlining Transformation
+^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
+Thru ONAP Streamlining, ONAP is no longer a platform, rather it provides
+various network automation functions, and security reference configuration in
+LFN. ONAP enables individual ONAP function build, and component deployment
+thru CD. It will build use cases for repository-based E2E service, NS, CNF and
+CNA onboarding, and CD-based ONAP component triggering mechanism with
+abstracted interfaces for choreography. It will boost standard-based abstracted
+interfaces with declarative APIs, i.e., each component will be autonomous and
+invoked from any level of network automation, by leveraging CD mechanisms, such
+as GitOps and CD readiness.
+
+ONAP will become more intent-based and declarative, and bring in genAI/ML,
+conforming to standards such as 3GPP, TMForum, ETSI, IETF, O-RAN, etc. For
+example, UUI user intent support and AI-based natural language translation, on
+top of that, applying coming 3GPP and TMForum models and APIs. Also, it will
+delegate resource-level orchestration to functions from the external community,
+such as O-RAN SC and Nephio.
+
+For security, ONAP continues to support the Service Mesh, Ingress, OAuth2,
+IdAM-based authentication and authorization, and considers sidecar-less
+solutions for NF security.
+
+|image3|
+
+**Figure 3. ONAP Streamlining evolution**
+
+ONAP Component Design Requirements
+^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
+- ONAP components should be designed not only for ONAP but also non-ONAP
+ consumption.
+- ONAP component dependencies and couplings to other ONAP components should
+ not be in an ONAP-specific way.
+- Making each ONAP component should be 'stand-alone', so potential users can
+ take a single component, without getting involved in the whole of ONAP.
+- ONAP component interactions should be based on standards and extensible to
+ facilitate integration with other systems, especially for non-ONAP.
+- ONAP component Helm charts in OOM should be re-written to build/deploy a
+ component individually.
+- ONAP Security mechanisms should be industry standard/de facto-based to
+ integrate with vendor/operator security and logging.
+- Timelines and cadence of the ONAP release should be flexible for
+ accommodating different release strategies.
+
+ONAP Component Design, Build & Deployment
+^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
+ONAP components are independently deployable pieces of software, built out of
+one more microservices:
+- Modular
+- Autonomous
+- Extensible and substitutional
+
+ONAP Network Automation processes will manage more intent-based operations
+using AI/ML.
+- Manage use and other intents and translations
+- Study on TMForum and 3GPP intent models and APIs
+
+ONAP components conform to the standards and de facto specifications to enable
+plug- and-play and pick-and-choose facilitation.
+
+ONAP repository-based SW management enables smaller imperative actions that
+can be triggered by different events in the orchestration and SW LCM flow.
+Events can trigger different types of deployment automation jobs or chains of
+automation jobs (pipelines).
+
+In Jenkins ONAP OOM build scripts will be used for ONAP component builds and
+will store built ONAP components into the Artifact Repository (e.g., Nexus).
+This can be changed. CD (e.g., ArgoCD, Flux, others) will be used to
+pick-and-choose ONAP components.
+
+|image4|
+
+**Figure 4. ONAP Streamlining Component Build and Deployment**
+
+For more details of ONAP streamlining, see the ONAP Streamlining - The Process
+page, https://wiki.onap.org/display/DW/ONAP+Streamlining+-+The+Process
+
+Microservices Support
+---------------------
+As a cloud-native application that consists of numerous services, ONAP requires
+sophisticated initial deployment as well as post- deployment management.
+
+ONAP is no longer a platform, rather it provides network automation functions,
+and security reference configuration in LFN.
+
+Thru ONAP Streamlining evolution, the ONAP deployment methodology has been
+enhanced, allowing individual ONAP components can be picked up through a chosen
+CD (Continuous Deployment) tool. This enhancement should be flexible enough to
+suit the different scenarios and purposes for various operator environments.
+Users may also want to select a portion of the ONAP components to integrate
+into their own systems. For more details of ONAP Streamlining evolution, see
+the ONAP Streamlining evolution session.
+
+The provided ONAP functions are highly reliable, scalable, extensible, secure
+and easy to manage. To achieve all these goals, ONAP is designed as a
+microservices-based system, with all components released as Docker containers
+following best practice building rules to optimize their image size. Numerous
+optimizations such as shared databases and the use of standardized lightweight
+container operating systems reduce the overall ONAP footprint.
+
+In the spirit of leveraging the microservice capabilities, further steps
+towards increased modularity have been taken. Service Orchestrator (SO) and the
+controllers have increased its level of modularity, by following Microservices.
+
+ONAP Operations Manager (OOM)
+^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
+The ONAP Operations Manager (OOM) is responsible for orchestrating the
+end-to-end lifecycle management and monitoring of ONAP components. OOM uses
+Kubernetes with IPv4 and IPv6 support to provide CPU efficiency and ONAP
+component deployment. In addition, OOM helps enhance ONAP maturity by providing
+scalability and resiliency enhancements to the components it manages.
+
+OOM is the lifecycle manager of the ONAP and uses the Kubernetes
+container management system and Consul to provide the following functionality:
+
+#. Deployment - with built-in component dependency management (including
+ multiple clusters, federated deployments across sites, and anti-affinity
+ rules)
+#. Configuration - unified configuration across all ONAP components
+#. Monitoring - real-time health monitoring feeding to a Consul GUI and
+ Kubernetes
+#. Restart - failed ONAP components are restarted automatically
+#. Clustering and Scaling - cluster ONAP services to enable seamless scaling
+#. Upgrade - change out containers or configuration with little or no service
+ impact
+#. Deletion - clean up individual containers or entire deployments
+
+OOM supports a wide variety of cloud infrastructures to suit your individual
+requirements.
+
+OOM provides Service Mesh-based mTLS (mutual TLS) between ONAP components to
+secure component communications, by leveraging Istio.
+
+In addition to Service Mesh-based mTLS, OOM also provides inter-component
+authentication and authorization, by leveraging Istio Authorizaiton Policy.
+For external secure communication, authentication (including SSO) and
+authorization, OOM configures Ingress, oauth2-proxy, IAM (realized by
+KeyCloak) and IdP.
+
+As the result, Unmaintained AAF functionalities are obsolete and substituted
+by Istio-based Service Mesh and Ingress, as of Montreal release.
+
+|image5|
+
+**Figure 5. Security Framework component architecture**
+
+For OOM enhancements for ONAP Streamlining evolution, see the ONAP Streamlining
+evolution section.
+
+Microservices Bus (MSB)
+^^^^^^^^^^^^^^^^^^^^^^^
+
+.. warning:: The ONAP :strong:`MSB` project is :strong:`deprecated`.
+ As of Release 13 'Montreal' the component is no longer part of the
+ ONAP deployment.
+
+Microservices Bus (MSB) used to support service registration/ discovery,
+external API gateway, internal API gateway, client software development
+kit (SDK), and Swagger SDK. When integrating with OOM, MSB used to have
+a Kube2MSB registrar which can grasp services information from k8s metafile
+and automatically register the services for ONAP components.
+
+In London release, ONAP Security Framework components provide secure
+communication capabilities. This approach is a more Kubernetes-native approach.
+As a result, MSB functions has been replaced by the Security Framework, and MSB
+becomes an optional component.
+
+Portal-NG
+---------
+ONAP had a portal project but this project was terminated and archived.
+Portal-NG is a new component and fills the gap. It provides a state of the art
+web-based GUI that services as the first discovery point for the ONAP, its
+existing web applications and functions.
+Onboard users with an adaptive GUI following a "grow as you go" approach
+covering "playful discovery" up to expert mode. Wherever possible hide
+complexity of network automation by guiding the user.
+The Portal-NG supports new ONAP Security framework for user administration,
+authentication and authorization. For more details, see the Portal-NG section.
+
+Design Time Components
+----------------------
+The design time components are a comprehensive development environment with
+tools, techniques, and repositories for defining/ describing resources,
+services, and products.
+
+The design time components facilitate reuse of models, further improving
+efficiency as more and more models become available. Resources, services,
+products, and their management and control functions can all be modeled using a
+common set of specifications and policies (e.g., rule sets) for controlling
+behavior and process execution. Process specifications automatically sequence
+instantiation, delivery and lifecycle management for resources, services,
+products and the ONAP components themselves. Certain process specifications
+(i.e., ‘recipes’) and policies are geographically distributed to optimize
+performance and maximize autonomous behavior in federated cloud environments.
+
+Service Design and Creation (SDC)
+^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
+Service Design and Creation (SDC) provides tools, techniques, and repositories
+to define/simulate/certify system assets as well as their associated processes
+and policies. Each asset is categorized into one of four asset groups: Resource
+, Services, Products, or Offers. SDC supports the onboarding of Network
+Services packages (ETSI SOL007 with ETSI SOL001), ONAP proprietary CNF packages
+(embedding Helm Chart), ASD-based CNF packages (ETSI SOL004 and embedding Helm
+Chart), VNF packages (Heat or ETSI SOL004) and PNF packages (ETSI SOL004). SDC
+also includes some capabilities to model 5G network slicing using the standard
+properties (Slice Profile, Service Template).
+
+Since Kohn-R11 release, SDC supports the onboarding of another CNF-Modeling
+package, Application Service Description (ASD) package. ASD is a deployment
+descriptor for cloud native applications/functions. It minimizes information
+needed for the CNF orchestrator, by referencing most resource descriptions to
+the cloud native artifacts (e.g., Helm Chart). Its CSAR package adheres to
+ETSI SOL004.
+
+The SDC environment supports diverse users via common services and utilities.
+Using the design studio, product and service designers onboard/extend/retire
+resources, services and products. Operations, Engineers, Customer Experience
+Managers, and Security Experts create workflows, policies and methods to
+implement Closed Control Loop Automation/Control and manage elastic
+scalability.
+
+Vendors can integrate these tools in their CI/CD environments to package VNFs
+and upload them to the validation engine. Once tested, the VNFs can be onboarded
+through SDC. ONAP supports onboarding of CNFs and PNFs as well.
+
+The Policy Creation component deals with policies; these are rules, conditions,
+requirements, constraints, attributes, or needs that must be provided,
+maintained, and/or enforced. At a lower level, Policy involves machine-readable
+rules enabling actions to be taken based on triggers or requests. Policies
+often consider specific conditions in effect (both in terms of triggering
+specific policies when conditions are met, and in selecting specific outcomes
+of the evaluated policies appropriate to the conditions).
+
+Policy allows rapid modification through easily updating rules, thus updating
+technical behaviors of components in which those policies are used, without
+requiring rewrites of their software code. Policy permits simpler
+management / control of complex mechanisms via abstraction.
+
+VNF SDK
+^^^^^^^
+
+.. warning:: The ONAP :strong: 'VNF SDK' project is :strong:'deprecated'.
+
+VNF SDK provides the functionality to create VNF/PNF packages, test VNF
+packages and VNF ONAP compliance and store VNF/PNF packages and upload to/from
+a marketplace.
+
+VVP
+^^^
+
+.. warning:: The ONAP :strong: 'VVP' project is :strong:'deprecated'.
+
+VVP provides validation for the VNF Heat package.
+
+Runtime Components
+------------------
+The runtime execution components execute the rules and policies and other
+models distributed by the design and creation environment.
+
+This allows for the distribution of models and policy among various ONAP
+modules such as the Service Orchestrator (SO), Controllers, Data Collection,
+Analytics and Events (DCAE), Active and Available Inventory (A&AI). These
+components use common services that support security (access control,
+secure communication), logging and configuration data.
+
+Orchestration
+^^^^^^^^^^^^^
+The Service Orchestrator (SO) component executes the specified processes by
+automating sequences of activities, tasks, rules and policies needed for
+on-demand creation, modification or removal of network, application or
+infrastructure services and resources, this includes VNFs, CNFs and PNFs,
+by conforming to industry standards such as ETSI, TMF, 3GPP.
+The SO provides orchestration at a very high level, with an end-to-end view
+of the infrastructure, network, and applications. Examples of this include
+BroadBand Service (BBS) and Cross Domain and Cross Layer VPN (CCVPN).
+The SO is modular and hierarchical to handle services and multi-level
+resources and Network Slicing, by leveraging pluggable adapters and delegating
+orchestration operations to NFVO (SO NFVO, VFC), VNFM, CNF Manager, NSMF
+(Network Slice Management Function), NSSMF (Network Slice Subnet Management
+Function).
+
+Starting from the Guilin release, the SO provides CNF orchestration support
+through integration of CNF adapter and other CNF managers in ONAP. SO:
+
+- Support for provisioning CNFs using an external K8S Manager
+- Support the Helm-based orchestration
+- Leverage the CNF Adapter to interact with the K8S Plugin in MultiCloud, or
+ leverage the CNF Manager to interact with the K8S to control CNFs (e.g., ASD)
+- Bring in the advantage of the K8S orchestrator and
+- Set stage for the Cloud Native scenarios
+
+In London, ONAP SO added ASD-based CNF orchestration support to simplify
+CNF orchestration and to remove redundancies of CNF resource attributes and
+orchestration process.
+
+- Support for onboarding of ASD-based CNF models and packages in runtime
+- Support the SO sub-component 'SO CNFM' for ASD-dedicated CNF orchestration
+ to isolate ASD management from other SO components - separation of concerns
+- Use of ASD for AS LCM, and use of associated Helm Charts for CNF deployment
+ to the selected external K8s Clusters
+- Use of Helm Client to communicate with external K8S clusters for CNF
+ deployment
+- Monitoring deployed K8S resources thru Kubernetes APIs
+
+3GPP (TS 28.801) defines three layer slice management function which include:
+
+- CSMF (Communication Service Management Function)
+- NSMF (Network Slice Management Function)
+- NSSMF (Network Slice Subnet Management Function)
+
+To realize the three layers, CSMF, NSMF and/or NSSMF are realized within ONAP,
+or use the external CSMF, NSMF or NSSMF. For ONAP-based network slice
+management, different choices can be made as follows. Among them, ONAP
+orchestration currently supports options #1 and #4.
+
+|image6|
+
+**Figure 6: ONAP Network Slicing Support Options**
+
+
+Virtual Infrastructure Deployment (VID) - obsolete
+^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
+
+.. warning:: The ONAP :strong:`vid` project is :strong:`deprecated`.
+ As of Release 12 'London' the component is no longer part of the
+ ONAP deployment.
+
+The Virtual Infrastructure Deployment (VID) application enables users to
+instantiate infrastructure services from SDC, along with their associated
+components, and to execute change management operations such as scaling and
+software upgrades to existing VNF instances.
+
+Policy-Driven Workload Optimization
+^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
+
+.. warning:: The ONAP :strong:'OOF' project is :strong:'deprecated'.
+
+The ONAP Optimization Framework (OOF) provides a policy-driven and model-driven
+framework for creating optimization applications for a broad range of use
+cases. OOF Homing and Allocation Service (HAS) is a policy driven workload
+optimization service that enables optimized placement of services across
+multiple sites and multiple clouds, based on a wide variety of policy
+constraints including capacity, location, other service capabilities and
+constraints.
+
+ONAP Multi-VIM/Cloud (MC) and several other ONAP components such as Policy, SO,
+A&AI etc. play an important role in enabling “Policy-driven Performance/
+Security-Aware Adaptive Workload Placement/ Scheduling” across cloud sites
+through OOF-HAS. OOF-HAS uses cloud agnostic Intent capabilities, and real-time
+capacity checks provided by ONAP MC to determine the optimal VIM/Cloud
+instances, which can deliver the required performance SLAs, for workload
+(VNF, etc.) placement and scheduling (Homing). Operators now realize the true
+value of virtualization through fine grained optimization of cloud resources
+while delivering performance and security SLAs.
+
+Controllers
+^^^^^^^^^^^
+Controllers are applications which are coupled with cloud and network services
+and execute the configuration, real-time policies, and control the state of
+distributed components and services. Rather than using a single monolithic
+control layer, operators may choose to use multiple distinct controller types
+that manage resources in the execution environment corresponding to their
+assigned controlled domain such as cloud computing resources (SDN-C).
+The Virtual Function Controller (VF-C) and SO NFVO provide an ETSI NFV
+compliant NFVO function that is responsible for lifecycle management of
+virtual services and the associated physical COTS server infrastructure. VF-C
+provides a generic VNFM capability, and both VF-C and SO NFVO integrate with
+external VNFMs and VIMs as part of an NFV MANO stack.
+
+.. warning:: The ONAP :strong:`appc` project is :strong:`deprecated`.
+ As of Release 12 'London' the component is no longer part of the
+ ONAP deployment.
+.. warning:: The ONAP :strong:'VF-C' project is :strong:'deprecated'.
+
+ONAP used to have two application level configuration and lifecycle management
+modules called SDN-C and App-C. App-C is no longer part of ONAP deployment.
+SDN-C provides controller services (application level configuration using
+NetConf, Chef, Ansible, RestConf, etc.) and lifecycle management functions
+(e.g., stop, resume, health check, etc.).
+SDN-C uses common code from CCSDK repo, and it uses CDS only for onboarding and
+configuration / LCM flow design.
+SDN-C has been used for Layer1-7 network elements. ONAP Controller configures
+and maintains the health of L1-7 Network Function (VNF, PNF, CNF) and network
+services throughout their lifecycle:
+
+- Configures Network Functions (VNF/PNF)
+- Provides programmable network application management:
+
+ - Behavior patterns programmed via models and policies
+ - Standards based models & protocols for multi-vendor implementation
+ - Extensible SB adapters such as Netconf, Ansible, Rest API, etc.
+ - Operation control, version management, software updates, etc.
+- Local source of truth
+ - Manages inventory within its scope
+ - Manages and stores state of NFs
+ - Supports Configuration Audits
+
+Controller Design Studio (CDS)
+^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
+The Controller Design Studio (CDS) community in ONAP has contributed a
+framework to automate the resolution of resources for instantiation and any
+config provisioning operation, such as day0, day1 or day2 configuration. The
+essential function of CDS is to create and populate a controller blueprint,
+create a configuration file from this Controller blueprint, and associate at
+design time this configuration file (configlet) to a PNF/VNF/CNF during the
+design phase. CDS removes dependence on code releases and the delays they cause
+and puts the control of services into the hands of the service providers. Users
+can change a model and its parameters with great flexibility to fetch data from
+external systems (e.g., IPAM) that is required in real deployments. This makes
+service providers more responsive to their customers and able to deliver
+products that more closely match the needs of those customers.
+
+Inventory
+^^^^^^^^^
+Active and Available Inventory (A&AI) provides real-time views of a system’s
+resources, services, products and their relationships with each other, and also
+retains a historical view. The views provided by A&AI relate data managed by
+multiple ONAP instances, Business Support Systems (BSS), Operation Support
+Systems (OSS), and network applications to form a “top to bottom” view ranging
+from the products end users buy, to the resources that form the raw material
+for creating the products. A&AI not only forms a registry of products,
+services, and resources, it also maintains up-to-date views of the
+relationships between these inventory items.
+
+To deliver the promised dynamism of SDN/NFV, A&AI is updated in real time by
+the controllers as they make changes in the network environment. A&AI is
+metadata-driven, allowing new inventory types to be added dynamically and
+quickly via SDC catalog definitions, eliminating the need for lengthy
+development cycles.
+
+Multi Cloud Adaptation
+^^^^^^^^^^^^^^^^^^^^^^
+Multi-VIM/Cloud provides and infrastructure adaptation layer for VIMs/Clouds
+and K8s clusters in exposing advanced cloud agnostic intent capabilities,
+besides standard capabilities, which are used by OOF and other components
+for enhanced cloud selection and SO/VF-C for cloud agnostic workload
+deployment. The K8s plugin is in charge of deploying CNFs on the Kubernetes
+clusters using Kubernetes APIs.
+
+Data Collection Analytics and Events (DCAE)
+^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
+DCAE provides the capability to collect events, and host analytics applications
+(DCAE Services). It gathers performance, usage, and configuration data from
+the managed environment. Data is fed to various analytic applications, and if
+anomalies or significant events are detected, the results trigger appropriate
+actions, such as publishing to other ONAP components such as Policy, SO, or
+Controllers.
+
+- Collect, ingest, transform and store data as necessary for analysis
+- Provide a framework for development of analytics
+
+Policy Framework
+^^^^^^^^^^^^^^^^
+The Policy framework is a comprehensive policy design, deployment,
+and execution environment. The Policy Framework is the decision making
+comopnent in an ONAP system. It allows to specify, deploy, and execute
+the governance of the features and functions in ONAP system, support
+the closed loop, orchestration, or more traditional open loop use case
+implementations.
+
+Since the Istanbul release, the CLAMP is officially integrated into the
+Policy component. CLAMP's functional role to provision Policy has been
+enhanced to support provisioning of policies outside of the context of
+a Control Loop and therefore act as a Policy UI. For CLAMP details, see
+the Policy - CLAMP section.
+
+It supports multiple policy engines and can distribute policies through policy
+design capabilities in SDC, simplifying the design process.
+
+Closed Control Loop Automation Management Platform in Policy (Policy - CLAMP)
+^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
+
+.. warning:: The ONAP :strong:`CLAMP` function is now part of :strong:`Policy`.
+
+Closed loop control is provided by cooperation among a number of design-time
+and run-time elements. The Runtime loop starts with data collectors from Data
+Collection, Analytics and Events (DCAE). ONAP includes the following collectors
+: VES (VNF Event Streaming) for events, HV-VES for high-volume events, SNMP
+for SNMP traps, File Collector to receive files, and RESTCONF Collector to
+collect the notifications. After data collection/verification phase, data move
+through the loop of micro-services like Homes for event detection, Policy
+for determining actions, and finally, controllers and orchestrators to
+implement actions. The Policy framework is also used to monitor the loops
+themselves and manage their lifecycle. DCAE also includes a number of
+specialized micro-services to support some use-cases such as the Slice Analysis
+or SON-Handler. Some dedicated event processor modules transform collected data
+(SNMP, 3GPP XML, RESTCONF) to VES format and push the various data into data
+lake. CLAMP, Policy and DCAE all have design time aspects to support the
+creation of the loops.
+
+We refer to this automation pattern as “Closed Control loop automation” in that
+it provides the necessary automation to proactively respond to network and
+service conditions without human intervention. A high-level schematic of the
+“Closed control loop automation” and the various phases within the service
+lifecycle using the automation is depicted in Figure 4.
+
+Closed control loop control is provided by Data Collection, Analytics and
+Events (DCAE) and one or more of the other ONAP runtime components.
+Collectively, they provide FCAPS (Fault Configuration Accounting Performance
+Security) functionality. DCAE collects performance, usage, and configuration
+data; provides computation of analytics; aids in troubleshooting; and publishes
+events, data and analytics (e.g., to policy, orchestration, and the data lake).
+Another component, Holmes, connects to DCAE and provides alarm correlation
+for ONAP, new data collection capabilities with High Volume VES, and bulk
+performance management support.
+
+Working with the Policy Framework (and embedded CLAMP), these components
+detect problems in the network and identify the appropriate remediation.
+In some cases, the action will be automatic, and they will notify the
+Service Orchestrator or one of the controllers to take action.
+In other cases, as configured by the operator, they will raise an alarm
+but require human intervention before executing the change. The policy
+framework is extended to support additional policy decision capabilities
+with the introduction of adaptive policy execution.
+
+Starting with the Honolulu-R8 and concluding in the Istanbul-R9 release, the
+CLAMP component was successfully integrated into the Policy component initially
+as a PoC in the Honolulu-R8 release and then as a fully integrated component
+within the Policy component in Istanbul-R9 release.
+CLAMP's functional role to provision Policy has been enhanced to support
+provisioning of policies outside of the context of a Control Loop and therefore
+act as a Policy UI. In the Istanbul release the CLAMP integration was
+officially released.
+
+|image7|
+
+**Figure 7: ONAP Closed Control Loop Automation**
+
+Virtual Function Controller (VFC)
+^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
+
+ .. warning:: The ONAP :strong:'VFC' project is :strong:'deprecated'.
+
+VFC provides the NFVO capability to manage the lifecycle of network service and
+VNFs, by conforming to ETSI NFV specification.
+
+Data Movement as a Platform (DMaaP)
+^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
+
+ .. warning:: The ONAP :strong:'DMaaP MR' project is :strong:'deprecated'.
+
+DMaaP provides data movement services that transports and process data from
+any source to any target. Its message routing is deprecated in New Delhi release
+and replaced by Strimzi and Kafka. The data routing is still part of New
+Delhi release, but it will be deprecated in Oslo release.
+
+Use Case UI (UUI)
+^^^^^^^^^^^^^^^^^
+UUI provides the capability to instantiate the blueprint User Cases and
+visualize the state. UUI is an application portal which provides the ability
+to manage ONAP service instances. It allows customers to create/delete/update
+service instances, as well as monitoring, alarms and performance of
+these instances.
+
+The component supports the following functionalities:
+- Customer Management
+- Package Management (including IBN packages)
+- Service Management (including CCVPN, 5G Slicing, Intent-based automation)
+- Network Topology
+
+UUI contains the following sub-components:
+- UUI GUI
+- UUI Server
+- UUI NLP Server (since Istanbul release)
+- UUI INTENT ANALYSIS server (since Kohn release)
+
+See UUI Component Architecture,
+
+|image8|
+
+**Figure 8. UUI Component Architecture**
+
+CLI
+^^^
+
+.. warning:: The ONAP :strong:'CLI' project is :strong:'deprecated'.
+
+ONAP CLI provides a command line interface for access to ONAP.
+
+External APIs
+^^^^^^^^^^^^^
+
+.. warning:: The ONAP :strong:`externalapi` project is :strong:`unmaintained`.
+
+External APIs provide services to expose the capability of ONAP.
+
+Shared Services
+---------------
+
+.. warning:: The ONAP :strong:'Logging Framework' project is a reference
+ implementation PoC.
+
+ONAP provides a set of operational services for all ONAP components including
+activity logging, reporting, common data layer, configuration, persistence,
+access control, secret and credential management, resiliency, and software
+lifecycle management.
+
+ONAP Shared Services provide shared capabilities for ONAP modules. These
+services handle access management and security enforcement, data backup,
+configuration persistence, restoration and recovery. They support standardized
+VNF interfaces and guidelines.
+
+Optimization Framework (OOF)
+^^^^^^^^^^^^^^^^^^^^^^^^^^^^
+
+.. warning:: The ONAP :strong:'OOF' project is :strong:'deprecated'.
+
+OOF provides a declarative, policy-driven approach for creating and running
+optimization applications like Homing/Placement, and Change Management
+Scheduling Optimization.
+
+Security Framework
+^^^^^^^^^^^^^^^^^^
+The Security Framework uses open-source security patterns and tools, such as
+Istio, Ingress Gateway, oauth2-proxy, and KeyCloak. This Security Framework
+provides secure external and inter-component communications, authentication,
+and authorization.
+
+For more details, see the Figure 5.
+
+Logging Framework (PoC)
+^^^^^^^^^^^^^^^^^^^^^^^
+
+.. warning:: The ONAP :strong:`Logging Framework` project is a reference
+ implementation :strong:`PoC`.
+
+Logging Framework supports open-source and standard-based logging. It separates
+the application log generation from the log collection/aggregation/persistence/
+visualization/analysis; i.e., ONAP applications handle log generation only, and
+the Logging Framework stack will handle the rest. As a result, operators can
+leverage/extend their own logging stacks.
+
+Configuration Persistence Service (CPS)
+^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
+The Configuration Persistence Service (CPS) provides storage for real-time
+run-time configuration and operational parameters that need to be used by ONAP.
+Several services ranging from SDN-C, DCAE and the network slicing use case
+utilize CPS for these purposes. In Montreal release, a CPS sub-component CPS-
+Temporal is removed because its function is no longer needed.
+Its details in :ref:`CPS - Configuration Persistence Service<onap-cps:architecture>`.
+
+ONAP Modeling
+-------------
+
+.. warning:: The ONAP :strong:'ONAP Modeling' project is :strong:'deprecated'.
+
+ONAP provides models to assist with service design, the development of ONAP
+service components, and with the improvement of standards interoperability.
+Models are an essential part for the design time and runtime framework
+development. The ONAP modeling project leverages the experience of member
+companies, standard organizations and other open source projects to produce
+models which are simple, extensible, and reusable. The goal is to fulfill the
+requirements of various use cases, guide the development and bring consistency
+among ONAP components and explore a common model to improve the
+interoperability of ONAP.
+
+ONAP supports various models detailed in the Modeling documentation.
+
+A new CNF modeling descriptor, Application Service Description (ASD), has been
+added to ONAP since the Kohn release. It is to simplify CNF modeling and
+orchestration by delegating resource modeling to Kubernetes-based resource
+descriptors (e.g., Helm Chart).
+
+The modeling project includes the ETSI catalog component, which provides the
+parser functionalities, as well as additional package management
+functionalities.
+
+Industry Alignment
+------------------
+ONAP support and collaboration with other standards and open source communities
+is evident in the architecture.
+
+- MEF and TMF interfaces are used in the External APIs
+- In addition to the ETSI-NFV defined VNFD and NSD models mentioned above, ONAP
+ supports the NFVO interfaces (SOL005 between the SO and VFC, SOL003 from
+ either the SO or VFC to an external VNFM).
+- Further collaboration includes 5G/ORAN & 3GPP Harmonization, Acumos DCAE
+ Integration, and CNCF Telecom User Group (TUG).
+
+Read this whitepaper for more information:
+`The Progress of ONAP: Harmonizing Open Source and Standards <https://www.onap.org/wp-content/uploads/sites/20/2019/04/ONAP_HarmonizingOpenSourceStandards_032719.pdf>`_
+
+ONAP Blueprints
+---------------
+ONAP can support an unlimited number of use cases, within reason. However, to
+provide concrete examples of how to use ONAP to solve real-world problems, the
+community has created a set of blueprints. In addition to helping users rapidly
+adopt the ONAP through end-to-end solutions, these blueprints also
+help the community prioritize their work.
+
+5G Blueprint
+^^^^^^^^^^^^
+The 5G blueprint is a multi-release effort, with five key initiatives around
+end-to-end service orchestration, network slicing, PNF/VNF lifecycle management
+, PNF integration, and network optimization. The combination of eMBB that
+promises peak data rates of 20 Mbps, uRLLC that guarantees sub-millisecond
+response times, MMTC that can support 0.92 devices per sq. ft., and network
+slicing brings with it some unique requirements. First ONAP needs to manage the
+lifecycle of a network slice from initial creation/activation all the way to
+deactivation/termination. Next, ONAP needs to optimize the network around real
+time and bulk analytics, place VNFs on the correct edge cloud, scale and heal
+services, and provide edge automation. ONAP also provides self organizing
+network (SON) services such as physical cell ID allocation for new RAN sites.
+These requirements have led to the five above-listed initiatives and have been
+developed in close cooperation with other standards and open source
+organizations such as 3GPP, TM Forum, ETSI, and O-RAN Software Community.
+
+|image9|
+
+**Figure 9. End-to-end 5G Service**
+
+Read the `5G Blueprint <https://www.onap.org/wp-content/uploads/sites/20/2019/07/ONAP_CaseSolution_5G_062519.pdf>`_
+to learn more.
+
+A related activity outside of ONAP is called the 5G Super Blueprint where
+multiple Linux Foundation projects are collaborating to demonstrate an
+end-to-end 5G network. In the short-term, this blueprint will showcase
+three major projects: ONAP, Anuket (K8S NFVI), and Magma (LTE/5GC).
+
+|image10|
+
+**Figure 10. 5G Super Blueprint Initial Integration Activity**
+
+In the long-term, the 5G Super Blueprint will integrate O-RAN-SC and LF Edge
+projects as well.
+
+Residential Connectivity Blueprints
+^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
+Two ONAP blueprints (vCPE and BBS) address the residential connectivity use
+case.
+
+Virtual CPE (vCPE)
+""""""""""""""""""
+Currently, services offered to a subscriber are restricted to what is designed
+into the broadband residential gateway. In the blueprint, the customer has a
+slimmed down physical CPE (pCPE) attached to a traditional broadband network
+such as DSL, DOCSIS, or PON (Figure 6). A tunnel is established to a data
+center hosting various VNFs providing a much larger set of services to the
+subscriber at a significantly lower cost to the operator. In this blueprint,
+ONAP supports complex orchestration and management of open source VNFs and both
+virtual and underlay connectivity.
+
+|image11|
+
+**Figure 11. ONAP vCPE Architecture**
+
+Read the `Residential vCPE Use Case with ONAP blueprint <https://www.onap.org/wp-content/uploads/sites/20/2018/11/ONAP_CaseSolution_vCPE_112918FNL.pdf>`_
+to learn more.
+
+Broadband Service (BBS)
+"""""""""""""""""""""""
+This blueprint provides multi-gigabit residential internet connectivity
+services based on PON (Passive Optical Network) access technology. A key
+element of this blueprint is to show automatic re-registration of an ONT
+(Optical Network Terminal) once the subscriber moves (nomadic ONT) as well as
+service subscription plan changes. This blueprint uses ONAP for the design,
+deployment, lifecycle management, and service assurance of broadband services.
+It further shows how ONAP can orchestrate services across different locations
+(e.g. Central Office, Core) and technology domains (e.g. Access, Edge).
+
+|image12|
+
+**Figure 12. ONAP BBS Architecture**
+
+Read the `Residential Connectivity Blueprint <https://www.onap.org/wp-content/uploads/sites/20/2019/07/ONAP_CaseSolution_BBS_062519.pdf>`_
+to learn more.
+
+Voice over LTE (VoLTE) Blueprint
+^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
+This blueprint uses ONAP to orchestrate a Voice over LTE service. The VoLTE
+blueprint incorporates commercial VNFs to create and manage the underlying
+vEPC and vIMS services by interworking with vendor-specific components,
+including VNFMs, EMSs, VIMs and SDN controllers, across Edge Data Centers and
+a Core Data Center. ONAP supports the VoLTE use case with several key
+components: SO, VF-C, SDN-C, and Multi-VIM/ Cloud. In this blueprint, SO is
+responsible for VoLTE end-to-end service orchestration working in collaboration
+with VF-C and SDN-C. SDN-C establishes network connectivity, then the VF-C
+component completes the Network Services and VNF lifecycle management
+(including service initiation, termination and manual scaling) and FCAPS
+(fault, configuration, accounting, performance, security) management. This
+blueprint also shows advanced functionality such as scaling and change
+management.
+
+|image13|
+
+**Figure 13. ONAP VoLTE Architecture Open Network Automation**
+
+Read the `VoLTE Blueprint <https://www.onap.org/wp-content/uploads/sites/20/2018/11/ONAP_CaseSolution_VoLTE_112918FNL.pdf>`_
+to learn more.
+
+Optical Transport Networking (OTN)
+^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
+Two ONAP blueprints (CCVPN and MDONS) address the OTN use case. CCVPN addresses
+Layers 2 and 3, while MDONS addresses Layers 0 and 1.
+
+CCVPN (Cross Domain and Cross Layer VPN) Blueprint
+""""""""""""""""""""""""""""""""""""""""""""""""""
+CSPs, such as CMCC and Vodafone, see a strong demand for high-bandwidth, flat,
+high-speed OTN (Optical Transport Networks) across carrier networks. They also
+want to provide a high-speed, flexible and intelligent service for high-value
+customers, and an instant and flexible VPN service for SMB companies.
+
+|image14|
+
+**Figure 14. ONAP CCVPN Architecture**
+
+The CCVPN (Cross Domain and Cross Layer VPN) blueprint is a combination of SOTN
+(Super high-speed Optical Transport Network) and ONAP, which takes advantage of
+the orchestration ability of ONAP, to realize a unified management and
+scheduling of resources and services. It achieves cross-domain orchestration
+and ONAP peering across service providers. In this blueprint, SO is responsible
+for CCVPN end-to-end service orchestration working in collaboration with VF-C
+and SDN-C. SDN-C establishes network connectivity, then the VF-C component
+completes the Network Services and VNF lifecycle management. ONAP peering
+across CSPs uses an east-west API which is being aligned with the MEF Interlude
+API. CCVPN, in conjunction with the IBN use case, offers intent based cloud
+leased line service. The key innovations in this use case are physical network
+discovery and modeling, cross-domain orchestration across multiple physical
+networks, cross operator end-to-end service provisioning, close-loop reroute
+for cross-domain service, dynamic changes (branch sites, VNFs) and intelligent
+service optimization (including AI/ML).
+
+Read the `CCVPN Blueprint <https://www.onap.org/wp-content/uploads/sites/20/2019/07/ONAP_CaseSolution_CCVPN_062519.pdf>`_
+to learn more.
+
+MDONS (Multi-Domain Optical Network Service) Blueprint
+""""""""""""""""""""""""""""""""""""""""""""""""""""""
+While CCVPN addresses the automation of networking layers 2 and 3, it does not
+address layers 0 and 1. Automating these layers is equally important because
+providing an end-to-end service to their customers often requires a manual and
+complex negotiation between CSPs that includes both the business arrangement
+and the actual service design and activation. CSPs may also be structured such
+that they operate multiple networks independently and require similar
+transactions among their own networks and business units in order to provide an
+end-to-end service. The MDONS blueprint created by AT&T, Orange, and Fujitsu
+solves the above problem. MDONS and CCVPN used together can solve the OTN
+automation problem in a comprehensive manner.
+
+|image15|
+
+**Figure 15. ONAP MDONS Architecture**
+
+Intent Based Network (IBN) Use Case
+^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
+Intent technology can reduce the complexity of management without getting into
+the intricate details of the underlying network infrastructure and contribute
+to efficient network management. This use case performs a valuable business
+function that can further reduce the operating expenses (OPEX) of network
+management by shifting the paradigm from complex procedural operations to
+declarative intent-driven operations.
+
+|image16|
+
+**Figure 16. ONAP Intent-Based Networking Use Case**
+
+3GPP 28.812, Intent driven Management Service (Intent driven MnS), defines
+some key concepts that are used by this initiative. The Intent Based Networking
+(IBN) use case includes the development of an intent decision making. This use
+case has initially been shown for a smart warehouse, where the intent is to
+increase the output volume of automated guided vehicles (AVG) and the network
+simply scales in response. The intent UI is implemented in UUI and the
+components of the intent framework interact with many components of ONAP
+including SO, A&AI, Policy, DCAE and CDS.
+
+vFW/vDNS Blueprint
+^^^^^^^^^^^^^^^^^^
+The virtual firewall, virtual DNS blueprint is a basic demo to verify that ONAP
+has been correctly installed and to get a basic introduction to ONAP. The
+blueprint consists of 5 VNFs: vFW, vPacketGenerator, vDataSink, vDNS and
+vLoadBalancer. The blueprint exercises most aspects of ONAP, showing VNF
+onboarding, network service creation, service deployment and closed-loop
+automation. The key components involved are SDC, CLAMP, SO, APP-C, DCAE and
+Policy. In the recent releases, the vFW blueprint has been demonstrated by
+using a mix of a CNF and VNF and entirely using CNFs.
+
+Verified end to end tests
+-------------------------
+Use cases
+^^^^^^^^^
+Various use cases have been tested for the Release. Use case examples are
+listed below. See detailed information on use cases, functional requirements,
+and automated use cases can be found here:
+:doc:`Verified Use Cases<onap-integration:docs_usecases_release>`.
+
+- E2E Network Slicing
+- 5G OOF (ONAP Optimization Framework) SON (Self-Organized Network)
+- CCVPN-Transport Slicing
+
+Functional requirements
+^^^^^^^^^^^^^^^^^^^^^^^
+Various functional requirements have been tested for the Release. Detailed
+information can be found in the
+:doc:`Verified Use Cases<onap-integration:docs_usecases_release>`.
+
+- xNF Integration
+
+ - ONAP CNF orchestration - Enhancements
+ - ONAP ASD-based CNF orchestration
+ - PNF PreOnboarding
+ - PNF Plug & Play
+
+- Lifecycle Management
+
+ - Policy Based Filtering
+ - Bulk PM / PM Data Control Extension
+ - Support xNF Software Upgrade in association to schema updates
+ - Configuration & Persistency Service
+
+- Security
+
+ - CMPv2 Enhancements
+
+- Standard alignment
+
+ - ETSI-Alignment for Guilin
+ - ONAP/3GPP & O-RAN Alignment-Standards Defined Notifications over VES
+ - Extend ORAN A1 Adapter and add A1 Policy Management
+
+- NFV testing Automation
+
+ - Support for Test Result Auto Analysis & Certification
+ - Support for Test Task Auto Execution
+ - Support for Test Environment Auto Deploy
+ - Support for Test Topology Auto Design
+
+Conclusion
+----------
+The ONAP provides a comprehensive functions for real-time, policy-
+driven orchestration and automation of physical and virtual network functions
+that will enable software, network, IT and cloud providers and developers to
+rapidly automate new services and support complete lifecycle management.
+
+By unifying member resources, ONAP will accelerate the development of a vibrant
+ecosystem around a globally shared architecture and implementation for network
+automation —with an open standards focus— faster than any one product could on
+its own.
+
+Resources
+---------
+See the Resources page on `ONAP.org <https://www.onap.org/resources>`_
+
+.. |image1| image:: media/ONAP-architecture.png
+ :width: 800px
+.. |image2| image:: media/ONAP-fncview.png
+ :width: 800px
+.. |image3| image:: media/ONAP-Streamlining-Build-Deployment.png
+ :width: 800px
+.. |image4| image:: media/ONAP-Streamlining-Build-Deployment.png
+ :width: 800px
+.. |image5| image:: media/ONAP-securityFramework.png
+ :width: 800px
+.. |image6| image:: media/ONAP-NetworkSlicingOptions.png
+ :width: 800px
+.. |image7| image:: media/ONAP-closedloop.png
+ :width: 800px
+.. |image8| image:: media/UUI-Component-Architecture.png
+ :width: 800px
+.. |image9| image:: media/ONAP-5G.png
+ :width: 800px
+.. |image10| image:: media/ONAP-5GSuperBP-Integration.png
+ :width: 800px
+.. |image11| image:: media/ONAP-vcpe.png
+ :width: 800px
+.. |image12| image:: media/ONAP-bbs.png
+ :width: 800px
+.. |image13| image:: media/ONAP-volte.png
+ :width: 800px
+.. |image14| image:: media/ONAP-ccvpn.png
+ :width: 800px
+.. |image15| image:: media/ONAP-mdons.png
+ :width: 800px
+.. |image16| image:: media/ONAP-IntentBasedNetworking.png
+ :width: 800px