NFV Guide - Ixia
NFV Guide - Ixia
NFV Guide - Ixia
NFV
IN CARRIER NETWORKS
Pierre Lynch, Michael Haugh, Liza Kurtz, & Joseph Zeto. (1st ed.)
Demystifying NFV
in Carrier Networks:
A Definitive Guide to
Successful Migrations
Table of Contents
Preface 1
Why Read This Book?
About Ixia
6
10
10
17
18
20
21
22
24
25
27
28
30
31
35
43
44
47
48
49
Table of Contents
53
5.1 Hardware
53
54
55
5.4 VM Manager
56
57
58
58
60
60
64
68
69
71
71
73
76
77
80
80
83
84
Table of Contents
Preface
Network Functions Virtualization (NFV) is one of the most profound
paradigm shifts the networking industry has faced to date. Proven
functions such as routing, policy, firewall, DPI, and many others will
move from running on dedicated hardware appliances to running
on unproven virtualized server platforms in the hope of achieving
massive efficiencies.
While carriers agree on the need and vision for NFV, many are
struggling to quantify the benefits, understand the practical
migration steps, and measure success:
How
How
Does
Preface
Reduced
Vendor
Lock-In
Elasticity
Agility
Service
without
Impact
Cost
Savings
Promises
Reality
Expertise
Performance
Security
Visibility
Reliability
The promises of NFV are vast and enduring, but operators face many
diverse challenges in ensuring the same or better performance,
reliability, and security achieved by traditional infrastructures.
Preface
Virtualization
Benefits
of adopting NFV
Deployment
challenges
Evolving
High-level
About Ixia
Ixia is an active participant in the European Telecommunications
Standards Institute (ETSI) Industry Specification Groups (ISG) for
NFV, a chair on the Open Networking Foundation, and remains
involved in other leading industry organizations focused on
virtualization. We continue to work with equipment manufacturers
and service providers at the forefront of virtualization to define best
practices for a smooth and profitable migration.
Preface
Preface
Introduction
Radio
5G
Introduction
Improving
Adopt
Invest
Leverage
1 http://www.mindcommerce.com/Publications/NFV_BusCaseMarketAnalysisForecasts_2014-2019.php
Introduction
Measuring
Simulating
security attacks
Monitoring
Introduction
What is NFV?
Abstracting
Flexibly
Creating
10
VNF
VNF
VNF
VNF
Virtual Storage
Virtual Network
NFV Management
and Orchestration
Virtualization Layer
Compute
Storage
Network
Hardware Resources
11
VNF
VNF
VNF
VNF
VNF
Endpoint
Virtualization Layer
NFVI-PoP
Virtualization
Physical Link
Logical Link
Example of an end-to-end network service with VNFs and nested forwarding graphs
13
14
Industry experts resoundingly agree that NFV and SDN are highly
complementary strategies, though services can be built directly
using NFV without SDN, or be built using SDN without migrating
functions to the cloud. Combining the two stands to deliver
compounded benefits, however, as SDN can be used to provision
network connectivity to VNFs, allowing end-to-end services to be
built with enhanced virtualized functions.
Several top use cases for OpenFlow-enabled SDN and NFV
can be seen in the Open Networking Foundation document
OpenFlow-enabled SDN and Network Functions Virtualization
(February 17.2014).1
Big Picture View of NFV with SDN and Management
Apps
Orchestration
Controller(s)
Controller(s)
Data Center
Wireless
Network
Storage
WAN
Network
Access
Network
Optical
Network
DC Network
Fabric
Virtual
Storage
Server
Virtual Machine
Virtual Machine
Server
Virtual Machine
Virtual Machine
Source: Alcatel-Lucent2
1 https://www.opennetworking.org/images/stories/
downloads/sdn-resources/solution-briefs/sb-sdn-nvf-solution.pdf.
2 Network Functions Virtualizations: Challenges and Solutions, Alcatel-Lucent, 2013.
15
Operations Evolution
Automated
Lifecycle
Management
Fully
Automated
Cloud
Auto-Optimization
Cloud
Virtualized
Infrastructure Evolution
Source: ALU
16
The
Doyle
www.mindcommerce.com/Publications/NFV_BusCaseMarketAnalysisForecasts_2014-2019.php
www.sdncentral.com/news/nfv-market-size-2b-first-guess/2014/04/
www.lightreading.com/forecasting-the-nfv-opportunity/a/d-id/705403
2014 SDN and NFV Strategies: Global Service Provider Survey. Survey of worldwide service providers
controlling more than 50% of global telecom capex and 47% of revenue
17
Cisco
18
Hewlett-Packard
Huawei
Intel
Juniper
NECs
Wind
19
British
20
Colt,
Deutsche
NTT
21
3
Steps per Year
Source: Radisys7
22
Increased
Cost-savings
24
Adds
Increases
Enables
Requires
25
Allows
86%
69%
Drivers
62%
59%
Multi-tenancy
45%
34%
26
Reduced
Use
Reduced
Reduced
27
Virualization Benefits
Media Servers
and CDN
High
Automation Gain
Media Gateways
Network Apps
Packet Gateways
Radio Access
Network
Control Plane
Functions
Charging
Applications
Analytics
Platforms
NFV/SDN
Control
EMS/NMS
Edge
Routers
Core Routers and
Ethernet Switches
CPE
Network
Appliances
OSS/BSS
Automation and Optimization
Elastic scale
Resource pooling
Rapid deployment
Location optimization
Cost (TCO)
CAPEX
OPEX
Low
Less
Cost Gain
More
Source: ALU2
28
NFV Risks
and Challenges
30
31
How
will it scale?
32
Features
Virtualized
appliance on
COTS/SHV
server
Migration to
COTS/SHV
server
Current
network
applications
Time
Source: HP1
Should
33
How
Should
Where
Who
34
35
Will
Will
3.2.2 Speed
Will software be fast enough even with continuing advances in
CPU technology? The new Intel Xeon E5 v2 reportedly achieves
speeds up to 250Mpps, theoretically sufficient for most networking
36
37
3.2.5 Multi-tenancy
Multi-tenancy becomes a challenge as the cloud-based approach
evolves. Operators must be able to manage policies for individual
services and flows as functions are decoupled from physical devices.
38
3.2.6 Scalability
NFV needs to be massively scalable to support large numbers of
data centers and millions of subscribers. In addition, the scalability
of resources will be far more dynamic in a virtualized environment.
The major advantage here is elasticity as VNFs can be created,
adjusted, and destroyed in real time, and on demand. When network
triggers are reached, capacity can be dynamically added or removed
from the overall network such that capacity and performance can
constantly change to reflect the current demand.
Networks must be capable of being reconfigured rapidly to
achieve the desired elasticity. Virtualized functions will need to be
dynamically updated as a result of scaling resources. For example,
the domain name system (DNS) service, which can be responsible
for load balancing between VNFs providing the same service, must
be instantly made aware of new elements being brought online as a
result of scaling.
3.2.8 Visibility
In a virtual environment, real-time visibility into the end-to-end
architecture becomes even more critical to guaranteeing service
availability and QoE. When things happen unexpectedly in either
the test lab or the live network, operators can leverage virtualized
taps (vTaps) and other monitoring tools to find bottlenecks, pinpoint
performance issues, and test varying configurations.
NFV and SDN will give rise to new monitoring challenges and
strategies requiring new visibility architectures and performance
metrics for components such as hypervisors and VMs, as well as
the performance of VNFs themselves.
Well take a closer look at evolving strategies for visibility in Chapter 7.
3.2.9 Robustness
Robustness is a broad challenge that refers to the ability of the
virtualized network to perform fault detection and invoke the
associated diagnosis and recovery mechanisms if a fault is detected.
This also means that the entire state of the faulty VNF must be
maintained as it is transferred and recovered elsewhere.
For example, if a particular VNF is found to be having problems, a
new instance of that VNF could be instantiated elsewhere in order
to replace it, but all the sessions within the first VNF would have to
be transferred to the new one. In some cases, it may be necessary
to fall back to a non-virtualized function from a faulty virtualized
function. This should be supported transparently.
40
3.2.10 Security
While virtualizing firewalls and load balancing functionality may
enable more flexible, nimble defenses, NFV also introduces new
elements, like hypervisors, that represent new targets for attackers.
The more nebulous boundaries of the cloud and increased
distribution of VMs across multiple geographic locations further
complicate defense strategies.
New configurations, devices, and defense strategies must be
validated prior to implementation and as networks evolve and scale
up and down.
41
Validation Strategies
43
Migration Phases
Start
Finish
Baseline
Confirm
Test
Assess
Test
Assess
Rapid
Automated
Validation
Remote
44
Precise
Development
Resource
45
Test
Deployment
Visibility.
VM2
IxVM
Test Agent
VM3
IxVM
Test Agent
VMn
IxVM
Test Agent
vSwitch
IxVM
Console
Ixias IxVM provides a software-based version of traditional hardware test ports
46
High-precision performance
measurements
47
Capacity
Control-plane
End-to-end
Service
Critical
performance
QoS
validation
support features (charging and policy, DNS, DRA,
security, etc.)
Total
Total
Session
Dedicated
Handover
latency
48
For
For
49
Orchestration
Fail-over
Legacy
Portability:
Flexible
50
Design:
Quality:
Security:
Deployment:
Visibility:
5.1 Hardware
Server features and performance characteristics will vary from
vendor to vendor. The obvious parameters are CPU brand and type,
memory amount, etc. Additionally, support for specific software
optimization APIs within the hardware can have a significant impact
on performance. The performance level of NICs can make or break
the entire system as well.
53
Virtual
Machine
Virtual
Machine
VNF
VNF
Communication Bottleneck
Hypervisor
2 Virtual Switch Bottleneck
Virtual Switch
Server Platform
55
They also provide the ability to start, stop, and snapshot a VM,
which enables backup and re-provisioning, or moving from the lab to
the network.
Hypervisors have common feature-sets, providing the ability to
virtualize the underlying server hardware and provision VMs, but they
also have unique features and performance. In selecting a provider,
its important to look at both the overall performance of each potential
hypervisor, and the requirements and impact of its unique feature set.
The ability of its underlying hardware layer (L1) to communicate with
upper layers should also be evaluated.
5.4 VM Manager
57
Lets take a closer look now at some specific test cases for common
migration scenarios.
58
The
Broadband
access networks
Well also take a close look at how virtualized network elements work
in concert with legacy physical elements. The test cases described
here are performed in a lab setup designed to mirror an operators
production network. Individual VNFs can be evaluated as well as
multiple VNFs working together as a system under test (SUT).
The
60
VNF/Virtual
Appliance
VNF/Virtual
Appliance
vSwitch
Hypervisor
Generalized Server Hardware
Physical
Test System
NIC 0
61
NIC 1
Control-plane
Multi-protocol/multi-dimensional
testing
Determining
Instantiation
Termination
of a service
On-the-fly
Moving
62
Virtual
Tester
VNF/Virtual
Appliance
Virtual
Tester
vSwitch
Hypervisor
Generalized Server Hardware
Testing
Testing
Isolating
Development,
The
NFV
63
Control-plane
QoS
Policy
64
SUT
vEPC
vHSS
vPCRF
eNodeB
Internet
vSGW
vMME
vPGW
Emulated Subscribers
and Applications
vSwitch
Hypervisor
Generalized Server Hardware
65
Multi-tenancy.
When
66
The figure below shows the basic test setup, using physical test
appliances. With the test equipment simulating both the RAN and
the IMS, as well as possibly a foreign EPC, the following test cases
should be attempted:
Handovers
Inter-system
foreign EPC
Simulation
Physical Tester
eNodeB
HSS
PCRF
Internet
Emulation of Subscribers
and Applications
MME
SGW
PGW
Physical
Virtual
Virtual EPC
HSS
MME
67
PCRF
SGW
PGW
MME
PGW
SGW
Emulated EPC
Physical
Virtual
SUT
vHSS
vPCRF
Virtualized Functions
vHSS
and vPCRF Tested Using Virtual Simulations
Testing Individual VNFs by Simulating the EPC
SUT
vHSS
Virtual Tester
vPCRF
vMME
vSGW
vPGW
vSwitch
Hypervisor
Generalized Server Hardware
68
Identifying
bottlenecks
Obtaining
69
Physical IMS
UEs
PSTN
IMS
Apps
Physical
Virtual
vIMS
Apps
IMS
The suite of tests to be run in this case should encompass the ability
to exercise and measure the following:
VoLTE
Latency:
Capacity:
70
Physical Tester
Internet
Physical
SUT
vBRAS
vBRAS
Virtual
vBRAS
71
Maintaining Visibility
Blind
73
74
SPAN
Maintaining
Load
Complexity.
75
Enable
Integrate
Support
76
VNF3
Phantom vTap
vSwitch
VNF4
Blade Backbone
VNF1
Hypervisor
VNF5
VNF6
Phantom vTap
vSwitch
LAN
Network
Monitoring
Tools
77
78
Software-based
A
traffic generation
Consistent,
easy-to-use applications
Testing
80
8.1.1 IxNetwork
Service providers worldwide rely on IxNetwork to test routers,
switches, and other L 2-3 devices. Testing features high-load
traffic-generation at rates up 100GE, and supports a wide variety of
protocols including: IPv4/v6 routing, bridging, broadband, multicast,
MPLS, Carrier Ethernet, and SDN.
8.1.2 IxLoad
Ixias IxLoad L4-7 test solution emulates and validates the delivery
of voice, video and other application traffic, as well as malicious
traffic generated during security attacks. Delivering multiplay
service emulation in a single application, IxLoad provides ultra-high
performance and realism, including flexible subscriber-modeling in
evolving service provider networks.
81
8.1.3 IxVM
The virtual version of IxNetwork, called IxNetwork/VM, verifies
protocol functionality and validates SDN deployments. Similarly,
IxLoad/VM measures application performance in virtualized network
environments by providing stateful load testing of VM-based
services and I/O performance testing.
Generic Test Setup for Testing a Virtualized
Network Using Virtualized Test Systems
Virtual
Tester
VNF/Virtual
Appliance
VNF/Virtual
Appliance
Virtual
Tester
vSwitch
Hypervisor
Generalized Server Hardware
82
Speed
Implement
83
Application Server
BRAS:
BSS:
CDN:
COTS: Commercial-off-the-Shelf
CSCF:
DNS:
DPI:
DRA:
DUT:
eNodeB:
Evolved Node B
EPC:
ETSI:
HSS:
IaaS:
Infrastructure as a Service
IMS:
IP Multimedia System
ISG:
IT:
Information Technology
KPI:
LTE:
Long-term Evolution
M&O:
MME:
MOS:
NF:
Network Function
84
NFV:
NFVI:
NIC:
OCS:
OFCS:
OSS:
PaaS:
Platform as a Service
PCRF:
PDN:
PoC:
Proof of Concept
PSTN:
QoE:
Quality of Experience
QoS:
Quality of Service
RAN:
SaaS:
Software as a Service
SDN:
SDN:
SLA:
S/P-GW:
SUT:
TCO:
VM:
Virtual Machine
VNF:
VoLTE:
x-CSCF:
85