Network Functions Virtualization: Challenges and Opportunities For Innovations
Network Functions Virtualization: Challenges and Opportunities For Innovations
Network Functions Virtualization: Challenges and Opportunities For Innovations
Legacy EPC
Optical Backhaul Network Cloud EPC
Cooperative RRHs
long-distance tunnels. With Cloud EPC, cellular carriers can In this section, we discuss some of the research challenges
not only expand their current horizontal market business, but and future directions for NFV, including the network per-
also capitalize on previously untouched vertical markets. formance of virtualization, the placement, instantiation and
migration of virtual appliances and the outsourcing of VNFs.
C. Virtualization of Home Network
A. Network Performance of VNF
Network service providers offer home services through
dedicated Customer Premise Equipment (CPE) supported by The recent effort from the telecommunications industry has
network-located backend systems. Typical CPE devices in- been centered on the software virtualization framework (e.g,.
clude Residential Gateways (RGs) for Internet access and management and orchestration). However, it is challenging to
Set-Top Boxes (STBs) for multimedia services. Under this offer guaranteed network performance for virtual appliances.
architecture, the delivery of time-shifted IPTV services is Wang and Ng [14] measured the end-to-end networking per-
known to be complicated, due to the interactive stream control formance of the Amazon EC2 cloud service. They found that
functions (e.g., rewind and fast-forward) [1]. The emerging the sharing of processors may lead to very unstable TCP/UDP
NFV technology with the availability of high throughput last- throughput, fluctuating between zero and 1 Gbps at the tens of
mile access facilitates the virtualization of home network and milliseconds time granularity, and the delay variations among
brings down the complexity of IPTV services. Amazon EC2 instances can be 100 times larger than most
We depict the architecture of virtualized home networks propagation delays which are smaller than 0.2 ms, even when
in Figure 5. The virtualization targets are STBs and a range the network is not heavily loaded. The unstable networking
of components of RGs, such as firewall, DHCP server, VPN characteristics caused by virtualization can obviously affect
gateway and NAT router. By moving them to data centers, the performance and deployment of virtual appliances.
network and service operators need to provide only low As we mentioned in Section II, it may be possible to lever-
cost devices to customers for physical connectivity with low age Linux NAPI and Intels DPDK to improve the network
maintenance requirements, demonstrated by the three gray performance of VNFs. NAPI is a modification of the packet
boxes at the left hand bottom corner of Figure 5. These devices processing framework in Linux device drivers, aiming at im-
need to provide only the layer 2 functionality for Internet proving the performance of high-speed networking. It achieves
access, as the layer 3 and above functions of RGs are moved this goal by disabling some interrupts when the network traffic
into the operators network. We note that with this virtual load is high and switching to polling the devices instead, and
architecture, it is possible to share some functionalities of thus avoids frequent interruptions sharing the same message
RGs and STBs among customers. The concept of virtualizing that there are lots of packets to process. Another advantage
home network is not actually new. Multiple-System Operators of this polling-based approach is that when the kernel is
(MSOs) have been pushing the Cloud Digital Video Recorder overwhelmed, the packets that cannot be handled in time
(DVR) or Network DVR solutions for several years. Cloud are simply dropped in the device queues (i.e., overwritten in
DVR stores the recorded video programs at the MSOs central the incoming buffer). Intels DPDK is another software-based
location (e.g., the video hub office) instead of the consumers acceleration for high speed networking applications that also
home and relieves the storage requirement on STBs. 6 uses polling to avoid the overhead of interrupt processing.
This virtualized architecture presents numerous advantages Recent work by Hwang et al. [6] extends the DPDK libraries
to network operators and end users. First, it reduces the to provide low latency and high throughput networking in
operating expense by avoiding the constant maintenance and virtualized environments.
6 In terms of the legal considerations, a major MSO in the US won a B. Placement of Virtual Appliances
court battle against content providers regarding the technology of sharing
a stored program in the cloud among multiple users (http://en.wikipedia.org/ Ideally network operators should place VNFs where they
wiki/Cartoon Network, LP v. CSC Holdings, Inc.). will be used most effectively and least expensively. Although
the virtualization of certain network functions is straightfor- However, it is challenging to keep the packet forwarding
ward, there are a number of network functions that have strict uninterrupted and the migration disruptions minimized; while
delay requirements. For example, network functions offered at the same time guarantee the stringent throughput and latency
by middle-boxes usually depend on the network topology and requirements. Another interesting research topic is the design
these boxes are placed on the direct path between two end of a hypervisor [15] that splits the software of control plane
points. When virtualizing these functions and moving their from its state, such as routing information bases.
software implementations into data centers, data traffic may
go through indirect paths, causing a potential delay of packets. D. VNF Outsourcing
Therefore, the placement of VMs that carry VNFs is crucial The end-to-end principle of initial Internet architecture that
to the performance of offered services. For these services, does not modify packets on-the-fly is no longer valid in current
it would be advantageous and efficient to run some network networks with the deployment of a variety of middle-boxes.
functions at the edge of the network [8]. Based on a study of 57 enterprise networks with different sizes,
Using mobile core network as an example, we could place ranging from fewer than 1,000 hosts to more than 100,000
a PGW, which currently sits in the cellular core network, hosts, Sherry et al. [10] found that the number of middle-
right next to an eNodeB, and forward user traffic to the boxes in a typical enterprise is comparable to its number of
Internet as early as possible. However, the co-location of PGW hosted routers. In the last five years, surveyed large networks
and eNodeB will make the mobility management difficult, as had paid more than a million US dollars for their middle-
neighboring eNodeBs will no longer share the same PGW box equipment. Moreover, a network with about 100 middle-
as the anchor point. A possible solution would be to install boxes may need a management team of 100-500 personnel for
virtualized PGWs that handle traffic for a small geographical tasks such as configuration, upgrades, monitoring, diagnostics,
area at the Mobile Telephone Switching Office (MTSO) or training and vendor interaction [10].
some other network points of presence in the metro area. By advocating the split of network functions and their loca-
Future work regarding low latency operation should be based tions, NFV makes the outsourcing of middle-boxes to a third-
on the investigation of the redirection architecture and the party [10] easier, which may release network carriers from
carriers footprint of data centers. some of the cumbersome operation and maintenance tasks.
The placement of virtual appliances, such as VPN gateways, With the help of VNF Service Providers (e.g., cloud service
can also enhance the security features of networking services. providers or their partners), end users and small businesses
Todays VPN gateways are usually installed at locations very may also be able to enjoy more diverse networking services
deep into the core network. By moving virtualized VPN which are previously not affordable due to their associated
gateways to the network edge and closer to end users, we can complexity and costs. However, the charging rules and policy
better isolate VPN traffic from other Internet traffic and reduce interactions between carrier network infrastructure and out-
the complexity of core networks. Clearly this approach may sourced VNFs need to be carefully investigated before taking
lead to the support of more VPN gateways than the current actual actions. Another open question along this direction is to
practice. Thus, there is a need to optimize the number of identify what types of VNFs can be outsourced to third parties
instantiated virtual VPN gateways. and how to do it efficiently.
There are also several other open research issues for NFV.
C. Instantiation and Migration of Virtual Appliances For example, using dedicated hardware appliances, it is rel-
Network infrastructure will become more fluid when de- atively easy to identify which component is malfunctioning
ploying VNFs. To consolidate VNFs running in VMs based and isolate it when a failure occurs. When deploying network
on traffic demand, network operators need to instantiate and functions in software at different locations, troubleshooting
migrate virtual appliances dynamically and efficiently. The and fault isolation become harder. Moreover, as the creation
native solution of running VNFs in Linux or other commodity of VMs is easy, when the number of VNFs increases the so-
OS VMs has a slow instantiation time (around several seconds) called VM Sprawl could happen. There may be a large amount
and a relatively large memory footprint. The carrier-grade of VNFs sprawling across the network even if they are seldom
deployment of VNFs requires a lightweight VM implemen- used. As a result, the same management inefficiency problem
tation. For instance, Martins et al. [9] recently proposed that NFV was proposed to solve may recur. The efficient
ClickOS, a tiny Xen-based VM to facilitate NFV. ClickOS management and orchestration of VNFs, especially in the wide
can be instantiated within around 30 milliseconds and requires area, is another challenging issue.
about 5 MB memory when running. However, optimizing
the performance of this type of lightweight simplified VMs, VII. C ONCLUSION
especially during the wide-area migration, is still an open In this article, we presented an overview of the emerg-
research issue. ing network functions virtualization technology, illustrated
Take virtual routers as an example, by enabling their free its architectural framework, summarized several use cases
movement, carriers can separate the logical configurations and discussed some interesting future research directions.
(e.g., packet-forwarding functions) from physical routers, and NFV extracts the functionality in specialized appliances and
simplify management tasks, such as planned maintenance [15]. replicates it in the virtual form. It is envisioned that NFV,
along with cloud computing and SDN, will become a critical
enabling technology to radically revolutionize the way network
operators architect and monetize their infrastructure. NFV is
prospectively the unifying revolution among the three, offering
more revenue opportunities in the services value chain. We
are looking forward to more initiatives from the networking
research community to tackle various challenging issues intro-
duced by NFV and its widespread and successful adoption.
R EFERENCES
[1] V. Aggarwal, V. Gopalakrishnan, R. Jana, K. K. Ramakrishnan, and
V. A. Vaishampayan. Optimizing Cloud Resources for Delivering IPTV
Services Through Virtualization. IEEE Transactions on Multimedia,
15(4):789801, June 2013.
[2] S. Bhaumik, S. P. Chandrabose, M. K. Jataprolu, G. Kumar, A. Muralid-
har, P. Polakos, V. Srinivasan, and T. Woo. CloudIQ: A Framework for
Processing Base Stations in a Data Center. In Proceedings of MOBICOM
2012, pages 125136, Aug. 2012.
[3] China Mobile Research Institute. C-RAN The Road Towards Green
RAN. China Mobile White Paper, Oct. 2011.
[4] M. Chiosi et al. Network Functions Virtualisation: An Introduction,
Benefits, Enablers, Challenges & Call for Action. ETSI White Paper,
Oct. 2012.
[5] A. Greenberg, J. Hamilton, D. A. Maltz, and P. Patel. The Cost of a
Cloud: Research Problems in Data Center Networks. ACM SIGCOMM
Computer Communication Review, 39(1):6873, Jan. 2009.
[6] J. Hwang, K. K. Ramakrishnan, and T. Wood. NetVM: High Perfor-
mance and Flexible Networking Using Virtualization on Commodity
Platforms. In Proceedings of NSDI 2014, pages 445458, Apr. 2014.
[7] X. Jin, L. E. Li, L. Vanbever, and J. Rexford. SoftCell: Scalable
and Flexible Cellular Core Network Architecture. In Proceedings of
CoNEXT 2013, pages 163174, Dec. 2013.
[8] A. Manzalini, R. Minerva, F. Callegati, W. Cerroni, and A. Campi.
Clouds of Virtual Machines in Edge Networks. IEEE Communications
Magazine, 51(7):6370, July 2013.
[9] J. Martins, M. Ahmed, C. Raiciu, V. Olteanu, M. Honda, R. Bifulco,
and F. Huici. ClickOS and the Art of Network Function Virtualization.
In Proceedings of NSDI 2014, pages 459473, Apr. 2014.
[10] J. Sherry, S. Hasan, C. Scott, A. Krishnamurthy, S. Ratnasamy, and
V. Sekar. Making Middleboxes Someone Elses Problem: Network
Processing as a Cloud Service. In Proceedings of SIGCOMM 2012,
pages 1324, Aug. 2012.
[11] V. Sivaraman, T. Moors, H. H. Gharakheili, D. Ong, J. Matthews,
and C. Russell. Virtualizing the Access Network via Open APIs. In
Proceedings of CoNEXT 2013, pages 3142, Dec. 2013.
[12] The European Telecommunications Standards Institute. Network Func-
tions Virtualisation (NFV); Architectural Framework. GS NFV 002
(V1.1.1), Oct. 2013.
[13] The European Telecommunications Standards Institute. Network Func-
tions Virtualisation (NFV); Use Cases. GS NFV 001 (V1.1.1), Oct.
2013.
[14] G. Wang and T. S. E. Ng. The Impact of Virtualization on Network
Performance of Amazon EC2 Data Center. In Proceedings of INFOCOM
2010, pages 11631171, Mar. 2010.
[15] Y. Wang, E. Keller, B. Biskeborn, J. van der Merwe, and J. Rexford.
Virtual Routers on the Move: Live Router Migration as a Network-
Management Primitive. In Proceedings of SIGCOMM 2008, pages 231
242, Aug. 2008.