Subscribe and receive the latest news from the industry.
Join 62,000+ members. Yes it's completely free.
Performance, reliability and security considerations change in a virtual networked world.
September 17, 2014
SANTA CLARA, Calif. -- NFV & the Data Center -- NFV requires operators to find new ways of looking at basic values like performance, reliability and security.
Performance metrics will change in migrating to NFV, from raw performance to performance per cubic meter, or performance per watt. "It's not just about providing raw performance. We wouldn't be going to generic hardware processing if all we were concerned about is maximizing raw performance," Marc Cohen, chairman of the Open Networking Foundation market education committee, said on a panel here.
Performance metrics are just the beginning of the changes. Virtualization will transform many ways of looking at and managing the network.
Figure 1: The panel was so amazing it required a panoramic photo.
Virtualization will drive new ways of using locations. Cities will have multiple data centers, to provide capabilities such redundant failover, Wind River Systems Inc. CTO Gareth Noyes said.
Data centers will come in all sizes, he said. "You'll get mega ones but you'll have a ton of closet-sized data centers as well."
Networks need to be able to use idle resources, which requires being able to discover them, Samir Sharma, solutions architect, Netcracker Technology Corp. , said.
Likewise, security requirements are changing. Security is a process, not a result -- you don't build a product that's secure forever, but instead the product evolves to meet changing threats. That's where open source can help by having many eyes to find vulnerabilities, Noyes said.
Security is an issue for both open and proprietary platforms. "It seems like even the close platforms are insecure," Steve Shaw, product marketing director, SDN, for Juniper Networks Inc. (NYSE: JNPR), said, citing network security threats cropping up recently. Operators are concerned that the cloud won't provide transparency into who is accessing the network and whether those users are protected.
NFV and SDN (which are rarely discussed separately) provide the potential for improved security, to allow policy-based decisions rather than focusing on hardware, Cohn said.
Security "is a scarlet letter that open source and the open platform have," Sharma said. But open systems benefit from the same security processes -- and are vulnerable to the same attacks -- as closed systems. Much of the fear of open systems is really just fear of the unknown. "You're still going to do everything you did before for security, if not more," he said.
Reliability considerations change because hardware "is factored out of the equation," Cohn said. That's how hyperscale operators work -- they design data centers taking hardware failures for granted. They add hardware for scalability rather than reliability.
The "monkey concept" becomes the test for network availability -- the network needs to continue to operate reliably even if a monkey goes through the data center unplugging equipment wantonly and at random, Sharma said.
Separating software from hardware will require new ways to scale and configure networks. You don't want to have the same connectivity problems in the virtual world as in the physical world. "You want the services to flow. We're in the early stages of that with NFV," Shaw said.
Heavy Reading analyst Roz Roseboro agreed. "If all we do is take something that we do on a physical platform and replicate it in software, we miss an opportunity to re-architect," she said.
Need to know more about network functions virtualization and the cloud? Then check out the coverage at our NFV and the Data Center site
Software needs to be based on "micro-services" where "the system can dynamically change based on requests coming in, versus a monolithic version that had to do everything in one bucket," Sharma.
The new network needs require openness, Cohn said. "Openness means a single vendor doesn't control everything." That's different from just having an open interface where a single vendor retains control.
Figure 3: I was so excited I couldn't type straight.
Rather than vertical purchasing, RFPs are becoming horizontal, Shaw said. Instead of buying the whole stack from one vendor, operators build a platform and let services vendors, such as evolved packet core (EPC) and IP Multimedia Subsystem (IMS) providers, compete for the business on top of the platform.
Noyes added that changed purchasing radically disrupts the supply chain, which is part of why virtualization deployments are moving slowly, with active trials today and field deployments anticipated for 2016.
Executive Editor, Light Reading
San Diego-based Mitch Wagner is many things. As well as being "our guy" on the West Coast (of the US, not Scotland, or anywhere else with indifferent meteorological conditions), he's a husband (to his wife), dissatisfied Democrat, American (so he could be President some day), nonobservant Jew, and science fiction fan. Not necessarily in that order.
He's also one half of a special duo, along with Minnie, who is the co-habitor of the West Coast Bureau and Light Reading's primary chewer of sticks, though she is not the only one on the team who regularly munches on bark.
Wagner, whose previous positions include Editor-in-Chief at Internet Evolution and Executive Editor at InformationWeek, will be responsible for tracking and reporting on developments in Silicon Valley and other US West Coast hotspots of communications technology innovation.
Beats: Software-defined networking (SDN), network functions virtualization (NFV), IP networking, and colored foods (such as 'green rice').
You May Also Like
Rethinking AIOPs — It's All About the DataMar 12, 2024
SCTE® LiveLearning for Professionals Webinar™ Series: Fiddling with Fixed WirelessMar 21, 2024
SCTE® LiveLearning for Professionals Webinar™ Series: Cable and 5G: The Odd Couple?Apr 18, 2024
SCTE® LiveLearning for Professionals Webinar™ Series: Delivering the DAA DifferenceMay 16, 2024