Specifying and Placing Chains of Virtual Network Functions

Similar documents
Lecture 10.1 A real SDN implementation: the Google B4 case. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Performance Considerations of Network Functions Virtualization using Containers

Multiple Virtual Network Function Service Chain Placement and Routing using Column Generation

Evaluating Allocation Heuristics for an Efficient Virtual Network Function Chaining

ALLOCATION OF VIRTUAL FIREWALL FUNCTIONS

Demand-adaptive VNF placement and scheduling in optical datacenter networks. Speaker: Tao Gao 8/10/2018 Group Meeting Presentation

Cost-efficient VNF placement and scheduling in cloud networks. Speaker: Tao Gao 05/18/2018 Group Meeting Presentation

International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.1, January Shin-ichi Kuribayashi

Automated Synthesis of NFV Topology: A Security Requirement-Oriented Design

JASPER: Joint Optimization of Scaling, Placement, and Routing of Virtual Network Services

Joint Optimization of Chain Placement and Request Scheduling for Network Function Virtualization

EndBox: Scalable Middlebox Functions Using Client-Side Trusted Execution

Performance Test Results for ScaleArc for MySQL on Aurora RDS Nov ScaleArc. All Rights Reserved. 1

MONITORING AND MANAGING NETWORK FLOWS IN VMWARE ENVIRONMENTS

Virtual Mobile Core Placement for Metro Area BY ABHISHEK GUPTA FRIDAY GROUP MEETING NOVEMBER 17, 2017

Nokia AirGile cloud-native core: shaping networks to every demand

Virtual-Network-Function Placement For Dynamic Service Chaining In Metro-Area Networks

The Function Placement Problem (FPP)

Virtual Mobile Core Placement for Metro Area BY ABHISHEK GUPTA FRIDAY GROUP MEETING JANUARY 5, 2018

FLEXIBLE VIRTUAL ROUTING FUNCTION DEPLOYMENT IN NFV-BASED NETWORK WITH MINIMUM TOTAL NETWORK COST

Virtual Network Embedding with Substrate Support for Parallelization

Communication System Design Projects

VNF Service Chaining on SAVI SDI

Elastic Virtual Network Function Placement CloudNet 2015

How to Make the Client IP Address Available to the Back-end Server

Application Placement and Demand Distribution in a Global Elastic Cloud: A Unified Approach

Service Function Chaining (SFC)

WHITE PAPER. Applying Software-Defined Security to the Branch Office

From Routing to Traffic Engineering

Online Admission Control and Embedding of Service Chains

Joint Optimization of Scaling and Placement of Virtual Network Services

Outline. Introduction to SFC/NFV SFC and service decomposition SFC orchestration. Performance evaluation Enhancements towards a scalable orchestrator

Deploying Multiple Service Chain (SC) Instances per Service Chain BY ABHISHEK GUPTA FRIDAY GROUP MEETING APRIL 21, 2017

Cisco Designing the Cisco Cloud (CLDDES) Download Full version :

IEEE TRANS. ON NETWORK AND SERVICE MANAGEMENT, SPECIAL ISSUE ON ADVANCES IN MANAGEMENT OF SOFTWARIZED NETWORKS 1

ESCALATOR DESIGN CONSIDERATIONS

Network in the Cloud: a Map-and-Encap Approach

Network Function Virtualization. CSU CS557, Spring 2018 Instructor: Lorenzo De Carli

Juniper JN0-410 Exam. Volume: 65 Questions. Question No: 1 What are two valid service VMs in a service chain? (Choose two.) A.

The Platform as a Service Model for Networking

A Comparison of Performance and Accuracy of Measurement Algorithms in Software

Online Strategies for Intra and Inter Provider Service Migration in Virtual Networks

CLUSTERING HIVEMQ. Building highly available, horizontally scalable MQTT Broker Clusters

Model-Based Load Testing for Performance and Security. Cornel Barna, Mark Shtern, Michael Smit, Marin Litoiu

Casa Systems Axyom Multiservice Router

Application Delivery Using SDN

Casa Systems Axyom Multiservice Router

Yealink VCS Network Deployment Solution

vsphere Networking for the Network Admin Jason Nash, Varrow CTO

Thomas Lin, Naif Tarafdar, Byungchul Park, Paul Chow, and Alberto Leon-Garcia

VNF Chain Allocation and Management at Data Center Scale

Performance and Security Influence of Augmenting IDS using SDN and NFV

Preparing your Business for Virtualization

SafeBricks: Shielding Network Functions in the Cloud

VMware AirWatch Content Gateway Guide for Windows

VCAP5-DCD. Vmware. VMware Certified Advanced Professional 5 - Data Center Design

Coalition Formation towards Energy-Efficient Collaborative Mobile Computing. Liyao Xiang, Baochun Li, Bo Li Aug. 3, 2015

Benefits of SD-WAN to the Distributed Enterprise

FuxiSort. Jiamang Wang, Yongjun Wu, Hua Cai, Zhipeng Tang, Zhiqiang Lv, Bin Lu, Yangyu Tao, Chao Li, Jingren Zhou, Hong Tang Alibaba Group Inc

Increase MPLS and SD-WAN Speeds and Reduce Operating Costs

TrafficDB: HERE s High Performance Shared-Memory Data Store Ricardo Fernandes, Piotr Zaczkowski, Bernd Göttler, Conor Ettinoffe, and Anis Moussa

How to autoprovision a NetScaler VPX on SDX for load balancing OpenStack workloads

Architectural overview Turbonomic accesses Cisco Tetration Analytics data through Representational State Transfer (REST) APIs. It uses telemetry data

VMware AirWatch Content Gateway Guide for Windows

SOLUTION BRIEF NETWORK OPERATIONS AND ANALYTICS. How Can I Predict Network Behavior to Provide for an Exceptional Customer Experience?

More on Testing and Large Scale Web Apps

What To Ask Your SD-WAN Vendor

VMware AirWatch Content Gateway Guide for Windows

Survey of ETSI NFV standardization documents BY ABHISHEK GUPTA FRIDAY GROUP MEETING FEBRUARY 26, 2016

SECURITY SOLUTION FOR KUBERNETES USING CLOUD-NATIVE VIRTUAL NETWORK FUNCTIONS

BlackBerry WorkLife Persona. The Challenge. The Solution. Datasheet

Middleboxes. CSU CS557 - Fall 2017 Instructor: Lorenzo De Carli

Cloudamize Agents FAQ

Rethinking applications: SDN&NFV meet IT services

AWS Solution Architecture Patterns

Intelligent Application Bypass

Distributed applications: A challenge for systems, networks, and application development

Network Functions Virtualization (NFV): Promises and Progress CELTIC Event Monaco, April 23 rd, 2014

Varanus: More-With-Less Fault Localization in Data Centers

FIPS Validated i WLAN

Testing & Assuring Mobile End User Experience Before Production Neotys

Draft Recommendation X.sdnsec-3 Security guideline of Service Function Chain based on software defined network

virtual Evolved Packet Core as a Service (vepcaas) BY ABHISHEK GUPTA FRIDAY GROUP MEETING MARCH 3, 2016

Optimizing Apache Spark with Memory1. July Page 1 of 14

Hadoop Virtualization Extensions on VMware vsphere 5 T E C H N I C A L W H I T E P A P E R

Huawei SD-WAN Solution

Network Security Protection Alternatives for the Cloud

Veeam Cloud Connect. Version 8.0. Administrator Guide

5G ESSENCE. Embedded Network Services for 5G Experiences. Olga E. Segou, PhD R&D Manager Orion Innovations PC

Hillstone CloudEdge For Network Function Virtualization (NFV) Solutions

Master s Thesis. An Evolvable Approach for the Virtual Network Function Placement Problem in Varying Environments

Making Middleboxes Someone Else s Problem: Network Processing as a Cloud Service

WHAT NETWORK VIRTUALIZATION TECHNOLOGY CAN DO FOR YOUR NETWORK TODAY

Deadline Guaranteed Service for Multi- Tenant Cloud Storage Guoxin Liu and Haiying Shen

Recursion: The Beginning

Document Sub Title. Yotpo. Technical Overview 07/18/ Yotpo

WHITE PAPER ULTRA LOW LATENCY MICROWAVE THE NEED FOR SPEED: BEST PRACTICES FOR BUILDING ULTRA-LOW LATENCY MICROWAVE NETWORKS

FPGA Augmented ASICs: The Time Has Come

Introduction. Delivering Management as Agile as the Cloud: Enabling New Architectures with CA Technologies Virtual Network Assurance Solution

Multi-tenancy of network operators and edge cloud services using small cells

Transcription:

Specifying and Placing Chains of Virtual Network Functions Sevil Mehraghdam, Matthias Keller, and Holger Karl 2014 IEEE 3rd International Conference on Cloud Networking (CloudNet) Speaker: Tao Gao 2018-02-16 Group Meeting Presentation

Virtual Network Functions (VNFs) Traditionally, network functions (e.g. load balancers, firewalls, and Intrusion Detection Systems (IDSs)) are implemented on physical middle-boxes. Middle-boxes are based on special purpose hardware platforms that are expensive and difficult to maintain and upgrade. Following the trend of virtualization in large-scale networks, network function that were deployed as middle-boxes are also being replaced by Virtual Network Functions (VNFs). Typically, network flows go through several NFs. This notion is known as network function chaining or network service chaining. NFs can modify the traversing network flows in different ways. There can also be a dependency among a set of NFs that should be applied to the traffic in a network, which requires special attention to the order of traversing the functions in chaining scenarios. 2

Chains of VNFs Depending on how each function in the chain modifies the data rate of the flows, different chaining options can have different impact on the traffic in network links, on application performance, or on latency. There are two challenges in this area. Formalize a request for chaining several NFs together, while considering the possible dependencies among them. Find the best placement for the functions, considering the requirements of individual requests and the overall requirements of all network applications and the combination of requests. 3

Processing Deployment Requests Chaining requests are decomposed into different modules to build VNF graphs. an individual function or a start/end point for the chain optional order module split module parallel module Different modules have different permutation of the set of functions For example, if a chaining request contains one optional order module with 3 different VNFs and one parallel module in which 4 VNFs can be placed with an arbitrary order, a total of 3! 4!=144 combinations of these modules is possible. 4

Processing Deployment Requests Sort the functions in ascending order according to their ratio of outgoing to incoming data rate The function that reduces the data rate of the flows the most is placed before all other functions in the module. Get a VNF graph. Input to be deployed into the operator s network. 5

Placement Of Chained Network Functions Input to the placement step is the capacity of network nodes and links, requirements of different network functions, and the combined VNF graph from the request processing step. f Instance of NF, which is mapped to a node of operator s network. A NF need some data center computational resources or/and switch computational resources; has an limited number of copies; can handle a certain number of requests u A deployment request that require a NF. A VNF graph consists of a set of u, which form different pairs (u,u ). A pair has a data rate requirement. a A start or an end point of a flow. Paths(a, a ) traverse different NFs. A path has a latency requirement. 6

Placement Of Chained Network Functions Constraints 1) Network Function Placement Constraints: Placing functions in network nodes and mapping requests for using instances of network functions to these nodes; 2) Path Creation Constraints: Creating paths between functions; 3) Metrics Calculation Constraints: Collecting metric values, which are used for different objectives. 7

Placement Of Chained Network Functions Objectives 1) Maximizing the remaining data rate on network links: 2) Minimizing the number of used nodes in the network: 3) Minimizing the latency of the created paths: 8

Results Results for different combinations of requests. There is a solution that is optimal in terms of all three metrics (the solution marked by a star). 9

Results Results using Pareto set analysis. The results are obtained based on the trade-off among different objectives (i.e. multi-objective optimization) 10

Analysis 1) Dynamic traffic scenario: Actually, in reality, the set of requests cannot be obtained in advance, how to map requests into to the operator s network one by one; 2) Computational resource model: Computational resources include CPU, memory, storage, etc.; 3) Optimal results: Dividing the problem into two steps may get sub-optimal results. But it is hard to get optimal results since each sub-problem is NP-hard. 11