& cplSiteName &

10 Myths About NFV (Mostly) Dispelled

Brian Santo
7/12/2016
100%
0%

The transition toward network functions virtualization (NFV) is in progress and, as with any technology transition, companies are proceeding with caution. The trick is figuring out which anticipated hazards are real, if any of those have already been cleared, and making sure you don't get frozen by hazards you anticipated but which failed to materialize.

Make no mistake, the course ahead is tricky. Evangelists for new technologies can get overly enthusiastic, envisioning everyone at the finish line before anyone has cleared all the technological barriers. And then there are those companies who take off without surveying the course ahead -- they're the ones that bumble into hurdles they could have anticipated if they'd simply prepared better.

At the same time, companies can be too hesitant to explore their options, based on suspicions that appear reasonable but aren't merited by the actual situation.

Based on its experience with customers, Luxoft, which provides development, test and evaluation services to vendors and operators, keeps coming across ten commonly held myths about NFV. This article is adapted from a presentation made by Luxoft executive director Tomy Issa, and comments he made in a subsequent conversation with Light Reading.

Issa has served stints with Allied Telesis, Nortel, and most recently with the operations of Tektronix, Fluke and Arbor Networks that are now owned by Netscout.

MYTH 1: Existing applications become "NFV ready" when the software is ported to run on a virtual machine

"We have heard that from both established vendors and startups," Issa lamented.

Porting code running on some piece of specialized hardware to run on an x86-based virtual machine (VM) is possible, but it emphatically does not automatically make that virtual app NFV ready. Luxoft said it worked with one company that tried to migrate software composed of a few million lines of code to run on a VM, only to find out that the resulting virtual appliance consumed huge amounts of CPU and memory, and was simply not scalable.

The best way to build a carrier-grade virtual network function (VNF) is to take a ground-up approach, starting with a purposefully designed modular architecture that addresses performance, scalability and other important requirements, Luxoft recommends.

Traditional carrier-grade design was rigorous, sometimes including design for manufacturing and design for testability. Successful design of VNFs should adopt those same methodologies and augment them with a new one: design for virtualization.

Design for virtualization includes a new set of design attributes such as:

  • Modularity (re-usable; optimizing memory usage)
  • Multi-threading (optimized for multi-core parallel processing)
  • Multi-Tenancy (optional: for SaaS)
  • Other considerations include

  • Ease of installation and turn-up
  • Real-time performance
  • Time required to allocate resources to scale up or release of assets when scaling down a required service or function
  • A VNF developer who adopts this approach and these methodologies will be able to demonstrate to prospective customers that they will be able to scale up, evolve the VNF, and grow their virtual environments with confidence that interoperability will not be an issue.

    MYTH 2: Virtual appliances cannot perform as well as their physical counterparts

    This is one of those things that seems a reasonable assumption but -- even with the current state of technology -- is not true, Issa asserts.

    He cites several examples, including Brocade Communications Systems Inc. (Nasdaq: BRCD), which recently demonstrated a VNF with 40 Gbit/s throughput. He adds, "I met with a number of startups with virtual appliances, such as carrier-grade NATs and BGCs, that have proven performances comparable to their counterparts in physical appliance world."

    One of the key enablers for the ability to build high-performing virtual applications is the data plane development kit (DPDK), introduced by Intel in 2012. It has become a common acceleration platform for most hypervisors, Issa said.

    There are also several coordinated efforts. One such is Enhanced Platform Awareness (EPA) led by Telefónica , and aimed at building frameworks for end-to-end services comprising multiple virtual appliances with carrier-level SLAs. The early results are "quite encouraging," according to Issa.

    Issa allows that not all network functions can be virtualized. As a rule of thumb, he says, 80% of the services can be performed in an NFV environment while 20% of the services cannot.

    Myth 2 has a natural corollary in Myth 3.

    MYTH 3: Mission-critical network services should still be run only on dedicated physical appliances

    Even if you know that the performance of virtual appliances can match that of dedicated machines, you might still suspect that the performance of virtual appliances cannot be guaranteed.

    Not necessarily so. Even if you have a service that is highly sensitive to packet delay or packet loss, there are toolkits and methodologies available that can be used to bypass the VM to produce a version of the physical machine.

    One of those widely adopted methodologies or techniques is called non-uniform memory access (NUMA), which can achieve sub-millisecond delay performance for real-time use cases.

    "We can identify pools of resources based on some characteristics and group them together, group processors together based of threads, locate and eliminate delay contributors. That requires a good background in software engineering skills, but it is doable," Issa says.

    Another technique is single-route IO virtualization for PCI-X, which allows developers to bypass the host virtual switch and to connect directly to the NIC. In practice, it demonstrates almost 100% of bare metal performance.

    Next page: Making money from NFV and network visibility

    (2)  | 
    Comment  | 
    Print  | 
    Newest First  |  Oldest First  |  Threaded View        ADD A COMMENT
    Elena Yakymchuk
    50%
    50%
    Elena Yakymchuk,
    User Rank: Light Beer
    1/25/2017 | 7:33:17 AM
    SerfCompany

    SerfСompany works in the field of Automation, Mobile Development, Web Development, Custom Software Development. Our knowledge is based on many years of experience. We offer qualified services and solutions for users within a number of different processes. We bring together technology, talent, creativity, functionality and best practices to strengthen key competencies and ensure excellence in the IT-sphere.

    We specialize in automating web applications. Robot applications will help us increase productivity and improve our quality of life through human-robot collaboration. Our expertise covers an impressive list of application knowledge. Using sophisticated technology, our company improves overall quality and productivity and reduces your costs. Use of robotic guidance vision allows tooling development to be simpler, thus cutting costs. It also improves the throughput of your system by allowing the robot to accept and adapt to location deviations.

    We provide a complete spectrum of services in the area of web programming and web-based enterprise solutions with an ability to implement the most complex projects, ensuring best-in-class performance, robustness, scalability and system integration. We deliver high quality enterprise level web projects using the latest open source technologies.

    http://serfcompany.com/

     

    Seniorcl44135
    50%
    50%
    Seniorcl44135,
    User Rank: Light Beer
    11/18/2016 | 3:06:06 PM
    These are myths
    For example: your 40G throughput needs a 40G nic to support. If you vm only has 1G, you have 1G.
    Featured Video
    From The Founder
    The world of virtualization is struggling to wrench itself away from the claws of vendor lock-in, which runs counter to everything that NFV stands for.
    Flash Poll
    Upcoming Live Events
    March 20-22, 2018, Denver Marriott Tech Center
    March 22, 2018, Denver, Colorado | Denver Marriott Tech Center
    March 28, 2018, Kansas City Convention Center
    April 4, 2018, The Westin Dallas Downtown, Dallas
    April 9, 2018, Las Vegas Convention Center
    May 14-16, 2018, Austin Convention Center
    May 14, 2018, Brazos Hall, Austin, Texas
    September 24-26, 2018, Westin Westminster, Denver
    October 9, 2018, The Westin Times Square, New York
    October 23, 2018, Georgia World Congress Centre, Atlanta, GA
    November 8, 2018, The Montcalm by Marble Arch, London
    November 15, 2018, The Westin Times Square, New York
    December 4-6, 2018, Lisbon, Portugal
    All Upcoming Live Events
    Hot Topics
    Has Europe Switched to a Fiber Diet? Not Yet...
    Ray Le Maistre, Editor-in-Chief, 2/15/2018
    5G: The Density Question
    Dan Jones, Mobile Editor, 2/15/2018
    Will China React to Latest US Huawei, ZTE Slapdown?
    Ray Le Maistre, Editor-in-Chief, 2/16/2018
    IBM, Microsoft Duke It Out Over Chief Diversity Hire
    Sarah Thomas, Director, Women in Comms, 2/15/2018
    21st Century Networking? Welcome to the Lock-In
    Steve Saunders, Founder, Light Reading, 2/20/2018
    Animals with Phones
    Live Digital Audio

    A CSP's digital transformation involves so much more than technology. Crucial – and often most challenging – is the cultural transformation that goes along with it. As Sigma's Chief Technology Officer, Catherine Michel has extensive experience with technology as she leads the company's entire product portfolio and strategy. But she's also no stranger to merging technology and culture, having taken a company — Tribold — from inception to acquisition (by Sigma in 2013), and she continues to advise service providers on how to drive their own transformations. This impressive female leader and vocal advocate for other women in the industry will join Women in Comms for a live radio show to discuss all things digital transformation, including the cultural transformation that goes along with it.

    Like Us on Facebook
    Twitter Feed