BSS/OSS Academy
7.820 min read

NFVI & Telco Cloud Vendors

NFVI & Telco Cloud Vendors

Section 7.7 introduced NFVI as the infrastructure layer beneath MANO — the compute, storage, and networking platform that VNFs and CNFs actually run on. This section goes deeper: a comprehensive, vendor-neutral assessment of the NFVI and telco cloud vendor landscape — who builds these platforms, what each offers, and how to choose between them.

Cross-Reference: Section 7.7
Section 7.7 (MANO & Network Orchestration Vendors) covers the MANO layer that sits above NFVI — including ONAP, OSM, Cisco NSO, and the SOM → MANO → VIM → NFVI stack. Read 7.7 first if you need context on how MANO and NFVI relate.
Vendor-Neutral Assessment
As with all vendor sections in this module, the following assessments are factual and vendor-neutral. Strengths and limitations are based on publicly available product information and typical deployment patterns. Actual capability varies by release version and operator configuration.

Two Generations of NFVI

The telco NFVI landscape is defined by a generational shift. Gen 1 NFVI virtualised network functions as VMs on OpenStack or VMware. Gen 2 containerises them as CNFs on Kubernetes. Most operators today run both generations simultaneously — and will do so for 5-10 years.

Gen 1 vs Gen 2 NFVI

DimensionGen 1: VM-Based NFVIGen 2: Cloud-Native CaaS
Era2015-2020 deployments2020+ deployments
PlatformOpenStack or VMware vSphereKubernetes (OpenShift, Rancher, upstream K8s)
Workload TypeVNFs (Virtual Network Functions)CNFs (Cloud-Native Network Functions)
NetworkingOVS, SR-IOV, DPDK on VMsMultus, SR-IOV CNI, DPDK in pods, eBPF
Lifecycle MgmtETSI MANO (SOL003/SOL005)Helm charts, Operators, GitOps, Nephio (emerging)
Scaling ModelVertical (bigger VMs) + horizontalHorizontal-first, auto-scaling native
Upgrade PatternBlue-green VM replacementRolling updates, canary deployments
StatusProduction (majority of running NFs)Growing (5G core, vRAN, edge-first)
The Migration Reality
Gen 1 is not going away quickly. Operators have hundreds of certified VNFs running on OpenStack or VMware with contractual support agreements, performance baselines, and operational runbooks. Migrating a VNF to a CNF requires the NF vendor to re-architect their product — the operator cannot simply "containerise" a VNF. This means Gen 1 and Gen 2 coexist for years, and NFVI strategy must account for both.
Intermediate

Why Two Generations Coexist

The transition from Gen 1 (VM-based) to Gen 2 (cloud-native) NFVI takes 5-10 years because it depends on NF vendors re-architecting their products, not just operators upgrading infrastructure.

An operator can deploy Kubernetes tomorrow, but their existing VNFs (vEPC, vIMS, vFirewall) cannot run on it without the NF vendor rebuilding them as CNFs. This is why operators must maintain dual-stack NFVI: OpenStack/VMware for existing VNFs alongside Kubernetes for new CNF deployments (5G core, O-RAN DU/CU, edge workloads). The NFVI vendor strategy must support both generations with a credible migration path.

Typical Operator NFVI Stack

Three-Layer NFVI Stack

1
MANO / Orchestration Layer
MANO (NFVO + VNFM)

ONAP, OSM, Ericsson Orchestrator, or vendor-specific MANO. Manages VNF/CNF lifecycle: instantiate, scale, heal, terminate. Calls the VIM/CaaS layer below via SOL003/SOL005 or Kubernetes API.

2
VIM / CaaS Layer
VIM / CaaS

OpenStack (Nova, Neutron, Cinder) for VMs or Kubernetes (API server, kubelet, CNI) for containers. This is the resource management layer that allocates compute, network, and storage to workloads. This is where NFVI platform vendors compete.

3
Bare Metal / Hardware Layer
Bare Metal Infrastructure

Physical servers (HPE ProLiant, Dell PowerEdge, Supermicro), NICs (Intel, Mellanox/NVIDIA), switches (spine-leaf fabric), and storage. Hardware vendors provide the foundation but are increasingly commoditised — the differentiation is in the platform layer above.

The Certification Chain
NFVI platform choice creates a certification chain: NF vendors certify their VNFs/CNFs on specific NFVI platforms (e.g., "Ericsson 5G Core certified on Red Hat OpenShift 4.14 on HPE ProLiant DL380"). Changing any layer — platform, hardware, or NF version — can break certification and require re-validation. This certification chain is a major source of vendor lock-in in practice.

Infrastructure Platform Vendors

These are the vendors that provide the VIM/CaaS platform layer — the OpenStack distributions, Kubernetes distributions, and integrated cloud platforms that operators deploy NFVI on. This is the most competitive and consequential layer of the NFVI stack.

Red Hat at a Glance
Products: Red Hat OpenStack Platform (RHOSP) for VNFs + Red Hat OpenShift for CNFs | License: Commercial (Red Hat / IBM) | Gen 1: RHOSP (OpenStack) | Gen 2: OpenShift (Kubernetes) | Market Position: Strongest dual-stack vendor — credible in both Gen 1 and Gen 2 | Telco Focus: OpenShift with telco-specific features (real-time kernel, PTP, SR-IOV, DPDK)
  • Strengths: Only vendor with production-grade offerings in both Gen 1 (RHOSP) and Gen 2 (OpenShift) — single vendor for the transition
  • Strengths: OpenShift is the most widely deployed Kubernetes platform in telco — certified by all major NF vendors (Ericsson, Nokia, Samsung)
  • Strengths: Telco-specific OpenShift features: real-time kernel, PTP (Precision Time Protocol), SR-IOV, DPDK, huge pages, NUMA-aware scheduling
  • Strengths: Strong open-source heritage — upstream contributions to OpenStack, Kubernetes, and OKD
  • Strengths: Comprehensive lifecycle management and long-term support (4+ year ELS cycles)
  • Limitations: RHOSP is in maintenance mode — Red Hat is strategically shifting to OpenShift, so Gen 1 investment is declining
  • Limitations: OpenShift subscription costs are significant at telco scale (hundreds to thousands of nodes)
  • Limitations: OpenShift adds complexity over upstream Kubernetes — operators must learn Red Hat-specific tooling (OperatorHub, MachineConfig, etc.)
  • Limitations: IBM ownership creates strategic uncertainty for some operators
Best For
Operators seeking a single-vendor NFVI platform covering both Gen 1 VNFs and Gen 2 CNFs with a managed migration path. Particularly strong for 5G core and O-RAN deployments where NF vendors certify on OpenShift first.

Cisco NFVIS: Edge and uCPE

Cisco NFVIS — Not a Core Telco Cloud
Cisco NFVIS (NFV Infrastructure Software) is a purpose-built edge platform for running VNFs on Cisco hardware (ENCS 5000 series, Catalyst 8000v, ISR 4000 with UCS-E blades). It is designed for uCPE (universal Customer Premises Equipment) and branch deployments, NOT for central data centre NFVI. It competes with dedicated branch appliances, not with OpenStack or Kubernetes.

NFVIS runs a lightweight Linux-based hypervisor on Cisco edge hardware, hosting VNFs like virtual routers, firewalls, SD-WAN edges, and WAN optimisers at customer premises or branch sites. It is managed by Cisco DNA Center, vManage (SD-WAN), or NSO. Think of it as "VMware for branch boxes" — a way to consolidate multiple physical appliances into a single Cisco platform running multiple VNFs.

  • Strengths: Purpose-built for edge/branch VNF hosting on Cisco hardware — simple, tested, stable
  • Strengths: Integrates with Cisco SD-WAN (vManage), DNA Center, and NSO for lifecycle management
  • Strengths: Consolidates multiple branch appliances (router, firewall, WAN optimiser) into a single platform
  • Strengths: Zero-touch provisioning for remote branch deployments
  • Limitations: Cisco hardware only — not a general-purpose NFVI for any server
  • Limitations: Limited to edge/branch use cases — not suitable for central data centre or core network VNFs
  • Limitations: Small VNF capacity (2-4 VNFs per box typically) — not scalable like OpenStack/K8s
  • Limitations: Vendor lock-in to Cisco hardware and management ecosystem
  • Limitations: VNFs hosted on NFVIS must be Cisco-certified — limited third-party VNF support

Telco-Specific Cloud Vendors

The major Network Equipment Manufacturers (NEMs) — Ericsson, Nokia, and Samsung — each offer their own NFVI/cloud platforms, optimised for hosting their own network functions. These are not general-purpose NFVI — they are tightly integrated, pre-validated environments designed to simplify deployment of that vendor's NFs.

Ericsson Cloud Infrastructure at a Glance
Products: CCD (Cloud Container Distribution — Kubernetes) + CEE (Cloud Execution Environment — OpenStack) | Gen 1: CEE (OpenStack-based, for VNFs) | Gen 2: CCD (Kubernetes-based, for 5G core CNFs) | Integration: Tightly integrated with Ericsson 5G Core (AMF, SMF, UPF), Cloud RAN, and Packet Core | Licensing: Bundled with Ericsson NF contracts
  • Strengths: Pre-validated with Ericsson NFs — reduces integration and certification effort
  • Strengths: CCD provides Kubernetes optimised for Ericsson 5G Core CNFs with telco-grade reliability
  • Strengths: Single-vendor support model: NF + cloud platform from one vendor
  • Strengths: Automated lifecycle management integrated with Ericsson Orchestrator
  • Limitations: Optimised for Ericsson NFs — hosting non-Ericsson VNFs/CNFs is technically possible but not the primary use case
  • Limitations: Creates deep vendor lock-in: Ericsson cloud + Ericsson NFs + Ericsson orchestration
  • Limitations: Smaller community than Red Hat OpenShift or upstream Kubernetes — operational knowledge is Ericsson-specific
  • Limitations: CEE (OpenStack) is legacy — Ericsson is steering customers toward CCD (Kubernetes)
Best For
Operators heavily invested in Ericsson RAN and 5G Core who want a pre-validated, single-vendor infrastructure stack. Accept the lock-in trade-off in exchange for reduced integration risk.
NEM Cloud vs General NFVI: The Trade-off
Using a NEM's own cloud (Ericsson CCD, Nokia NCS, Samsung SCP) reduces integration risk for that vendor's NFs but increases lock-in. A general-purpose NFVI (Red Hat OpenShift, Wind River) can host NFs from multiple vendors, giving the operator more flexibility — but requires more integration and certification work. Most Tier 1 operators end up with both: NEM clouds for core network functions and general-purpose NFVI for shared or multi-vendor workloads.

Hyperscalers Entering Telco

The major public cloud providers — AWS, Microsoft Azure, and Google Cloud — are all actively pursuing the telco NFVI market with edge-focused, operator-targeted offerings. These are not traditional NFVI — they bring the hyperscaler model (managed services, consumption billing, global reach) to telco infrastructure.

AWS for Telco at a Glance
Products: AWS Wavelength (edge compute at telco sites), AWS Outposts (on-prem AWS), EKS Anywhere | Partnerships: Dish/EchoStar 5G core on AWS, various MEC deployments | Model: Managed services — AWS operates the infrastructure, operator consumes it | Focus: Edge compute (MEC), 5G core hosting, and network function workloads
  • Strengths: Massive ecosystem of managed services (compute, storage, AI/ML, analytics) available alongside NFVI workloads
  • Strengths: AWS Wavelength provides ultra-low-latency edge compute within operator networks
  • Strengths: Proven at scale with Dish/EchoStar 5G core deployment (first cloud-native 5G network on public cloud)
  • Strengths: EKS Anywhere enables consistent Kubernetes across on-prem, edge, and cloud
  • Limitations: Operator loses control of infrastructure — AWS manages the platform
  • Limitations: Data sovereignty and regulatory concerns for core network functions on public cloud
  • Limitations: Consumption-based pricing can be unpredictable at telco scale
  • Limitations: NF vendor certification on AWS is still maturing compared to on-prem NFVI
Hyperscaler Lock-in Risk
Hyperscalers offer compelling managed services but create a different kind of lock-in: dependency on a cloud provider's APIs, tooling, and operational model for mission-critical network infrastructure. If an operator runs its 5G core on AWS, migrating to another platform requires re-architecture, not just re-deployment. Evaluate hyperscaler NFVI with the same lock-in scrutiny applied to traditional vendors.

NFVI Vendor Comparison Matrix

NFVI Vendors — Capability Comparison

Vendor / PlatformCategoryGen 1 (VM)Gen 2 (K8s)License ModelEdge SupportMulti-Vendor NF Support
Red Hat (RHOSP + OpenShift)General-PurposeYes (RHOSP)Yes (OpenShift)SubscriptionYes (SNO, MicroShift)Strong (broadest K8s certifications)
VMware / BroadcomGeneral-PurposeYes (vSphere) — dominantPartial (Tanzu)Subscription (bundled)LimitedStrong (broadest VM certifications)
Wind River (StarlingX)Edge-OptimisedYes (integrated OpenStack)Yes (integrated K8s)Open source + CommercialExcellent (purpose-built)Moderate
CanonicalGeneral-PurposeYes (Charmed OpenStack)Yes (Charmed K8s)Open source + CommercialYes (MicroK8s)Growing
SUSE / RancherGeneral-Purpose (K8s focus)Partial (Harvester HCI)Yes (Rancher K8s)Open source + CommercialYes (K3s, Rancher)Growing
HPE / DellHardware + PlatformVia partner platformVia partner platformHardware + optional platformYes (edge servers)N/A (platform-dependent)
Cisco NFVISEdge OnlyYes (lightweight hypervisor)NoCommercial (Cisco HW only)Edge-only (uCPE)Limited (Cisco-certified VNFs)
Ericsson (CCD/CEE)NEM Telco CloudYes (CEE)Yes (CCD)Bundled with NF contractsVia CCDEricsson NFs primarily
Nokia (CBIS/NCS)NEM Telco CloudYes (CBIS)Yes (NCS)Bundled with NF contractsVia NCSNokia NFs primarily
Samsung (SCP)NEM Telco CloudLimitedYes (cloud-native-first)Bundled with NF contractsYesSamsung NFs primarily
AWS (Wavelength, Outposts)HyperscalerVia EC2Yes (EKS)Consumption-basedYes (Wavelength)Growing certifications
Microsoft Azure (Operator Nexus)HyperscalerVia Azure VMsYes (AKS)Consumption-basedYes (Azure Stack Edge)Growing + owns NFs
Google Cloud (GDC Edge)HyperscalerMinimalYes (GKE/Anthos)Consumption-basedYes (GDC Edge)Growing certifications

NFVI Decision Guide by Operator Profile

Operator ProfileRecommended NFVI ApproachReasoning
Tier 1, multi-vendor NFs, strategic flexibilityRed Hat OpenShift (Gen 2) + RHOSP or VMware (Gen 1 legacy)Broadest NF certifications, dual-stack capability, managed migration path from VMs to containers
Single-NEM operator (Ericsson-heavy)Ericsson CCD/CEE for core NFs + OpenShift for shared workloadsPre-validated Ericsson stack for core, general-purpose NFVI for multi-vendor or non-NF workloads
Edge-first / distributed (O-RAN, MEC)Wind River Studio (StarlingX) or OpenShift SNOPurpose-built for edge: low footprint, dual-stack, distributed management
Cost-sensitive / mid-tier operatorCanonical (Charmed OpenStack/K8s) or SUSE (Rancher)Lower subscription costs, open-source foundation, good enough for smaller NF portfolios
VMware migration in progressRed Hat OpenShift (target) + VMware vSphere (legacy, time-limited)Migrate NFs to OpenShift as vendors re-certify; maintain VMware for remaining VNFs until migration complete
Cloud-first / greenfield 5GHyperscaler (AWS/Azure) or NEM cloud (Ericsson CCD)Greenfield operators can bet on cloud-native-only; no Gen 1 legacy to maintain

Section 7.8 Key Takeaways

  • NFVI is defined by a generational shift: Gen 1 (OpenStack/VMware VMs) coexists with Gen 2 (Kubernetes containers) for 5-10 years — strategy must cover both
  • Red Hat is the strongest dual-stack vendor with RHOSP (Gen 1) and OpenShift (Gen 2) — broadest NF vendor certifications in the Kubernetes era
  • VMware/Broadcom remains the largest Gen 1 installed base but the Broadcom acquisition has driven aggressive migration planning industry-wide
  • Wind River (StarlingX) is purpose-built for distributed edge deployments — the go-to for far-edge, O-RAN, and MEC where full OpenStack/K8s is over-engineered
  • NEM clouds (Ericsson CCD, Nokia NCS, Samsung SCP) reduce integration risk for their own NFs but create deep vendor lock-in — most Tier 1 operators use both NEM clouds and general-purpose NFVI
  • Cisco NFVIS is an edge/uCPE platform, not a core telco cloud — do not conflate it with data centre NFVI
  • Hyperscalers (AWS, Azure, Google) are entering telco NFVI with managed services, edge compute, and (in Microsoft's case) their own NFs — evaluate with the same lock-in scrutiny as traditional vendors
  • The certification chain (NF → platform → hardware) is the primary source of practical lock-in — changing any layer requires re-validation across the stack
  • There is no single "best" NFVI platform — the right choice depends on operator profile, existing NF portfolio, edge vs core requirements, and strategic flexibility goals