Toward An SDN-Enabled NFV Architecture: Etwork and Ervice Irtualization

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

MATIAS_LAYOUT_Author Layout 3/31/15 2:58 PM Page 187

NETWORK AND SERVICE VIRTUALIZATION

Toward an SDN-Enabled NFV Architecture


Jon Matias, Jokin Garay, Nerea Toledo, Juanjo Unzilla, and Eduardo Jacob

ABSTRACT migrate them to other locations due to its depen-


dence on the physical appliances.
This article presents the progressive evolution NFV has been proposed to innovate in the
of NFV from the initial SDN-agnostic initiative service delivery arena by using standard comput-
to a fully SDN-enabled NFV solution, where ing virtualization technology to consolidate in
SDN is not only used as infrastructure support commodity hardware (i.e., standard high volume
but also influences how virtual network functions servers, storage, and switches) the functions pre-
(VNFs) are designed. In the latest approach, viously performed by specific hardware appli-
when possible, stateless processing in the VNF ances. Virtualized network functions (VNFs),
shifts from the computing element to the net- which compose the service chain, are the basic
working element. To support these claims, the elements to achieve the complete virtualization
article presents the implementation of a flow- of service delivery and are commonly based on
based network access control solution, with an computing resources. The interconnection of
SDN-enabled VNF built on IEEE 802.1x, which VNFs, or traffic steering, is a challenging goal
establishes services as sets of flow definitions for the underlying network infrastructure. The
that are authorized as the result of an end user migration of VNFs and dynamic composition of
authentication process. Enforcing the access to services make this task even harder than in lega-
the network is done at the network element, cy networks.
while the authentication and authorization state SDN and NFV are complementary technolo-
is maintained at the compute element. The gies, and each one can leverage off the other to
application of this proposal allows the perfor- improve the flexibility and simplicity of networks
mance to be enhanced, while traffic in the con- and service delivery over them. For this aim,
trol channel is reduced to a minimum. The new architectures and interfaces between them
SDN-enabled NFV approach sets the foundation are needed, and several proposals are emerging.
to increase the areas of application of NFV, in In this article we try to clarify the evolution of
particular in those areas where massive stateless their relationship in the context of service provi-
processing of packets is expected. sioning. We explain the evolution of the NFV
architectures from an SDN-agnostic approach to
INTRODUCTION a fully SDN-enabled architecture, a step forward
in this evolution that exposes the programmabili-
The design, management, and operation of net- ty of the underlying network to build VNFs,
work infrastructure have evolved during the last enriching their architecture and improving their
few years, leveraging on innovative technologies performance.
and architectures. On top of this innovation, the Adapting the use of resources to the actual
service delivery has also progressed. Software- demand is one of the main outcomes from a vir-
defined networking (SDN) and network func- tualized infrastructure, providing elasticity of
tions virtualization (NFV) are key enablers for resources instead of overprovisioning. However,
this evolution. the trade-off between flexibility and performance
SDN has been one of the pillars of innova- must be considered when designing the solution.
tion in network infrastructures, allowing the The evolution of the NFV architecture present-
decoupling of the control and data planes ed in this article contributes to overcoming this
through an open and standard interface that limitation.
enables the programmability of the network. A real example, FlowNAC [1], is presented
OpenFlow, ForCES, and I2RS are some exam- to illustrate the applicability of NFV using dif-
ples of SDN technology. SDN has also con- ferent architectures and the advantages offered
tributed to the virtualization of the network by the SDN-enabled NFV approach in service
infrastructure, providing the foundation to provisioning scenarios. The main idea behind
isolate, abstract, and share the network FlowNAC is to achieve fine-grained control of
resources. which traffic from the user is granted access to
Service provisioning is often based on propri- the network. The users are authenticated and
etary hardware appliances, which imposes some authorized on a per service basis. All the incom-
restrictions when trying to deploy new network ing traffic from the user is independently evalu-
The authors are with the services, such as capacity and availability. In this ated and categorized in a specific service or
University of the Basque scenario, the network infrastructure is not flexi- none at the data plane. Then a basic allow or
Country (UPV/EHU). ble enough to accommodate new services or deny decision is enforced for each frame

IEEE Communications Magazine • April 2015 0163-6804/15/$25.00 © 2015 IEEE 187


MATIAS_LAYOUT_Author Layout 3/31/15 2:58 PM Page 188

depending on the associated service being troller and proposes its combination with SDN.
SDN and NFV are authorized or not. Similar to FlowNAC, there are also other efforts
The depicted scenario is challenging in sever- that aim at demonstrating the integration of
complementary tech- al aspects, and some topics are still open. The NFV and SDN. Reference [10] presents the
nologies, and each article concludes presenting the main challenges implementation of a routing function virtualiza-
can leverage off the introduced by the SDN-enabled NFV architec- tion based on NFV concepts that leverages on
ture and relates them to the current efforts to OpenFlow, although from the architectural
other to improve the bring the NFV proposal to fulfill the expected standpoint this work is not related to the archi-
flexibility and simplic- benefits. tecture proposed by ETSI. Other SDN technolo-
gies, like ForCES, have also positioned
ity of networks and themselves to demonstrate their applicability to
service delivery over
RELATED WORK NFV [11] and how the networking resources
them. For this aim, Major standardization efforts of the emerging could be exposed to the VNFs.
NFV technology are being led by the European From the related work, we can conclude that
new architectures Telecommunications Standards Institute (ETSI), currently there is a clear momentum for exploit-
and interfaces where the NFV Industry Specification Group ing networking innovation in the light of SDN
(ISG) has recently published 11 NFV specifica- and NFV. Moreover, open issues arise as a step
between them are tions, including the NFV architecture [2]. The forward is achieved; thus, work should continue
needed, and several defined architecture focuses on the aspects to bring us closer to a dynamic and flexible net-
proposals are unique to virtualization, such as the transforma- working infrastructure.
tion of the management and orchestration of
emerging. VNFs, rather than common challenges to both
physical and virtualized NFs, such as the control TOWARD AN SDN-ENABLED
and operation of the end-to-end network service.
Moreover, the NFV ISG is also coordinating and
NETWORK FUNCTION
promoting public demonstrations of proofs of VIRTUALIZATION ARCHITECTURE
concept (PoCs) [3] that illustrate key aspects of
NFVs, such as scalability, multi-tenancy, and The scenario to enable the dynamic deployment
migration issues. of VNFs is challenging from the networking
The Open Networking Foundation (ONF) point of view. It must support multi-tenancy,
has also been active in the NFV arena and has multiple service chains sharing the same physical
proposed “A Flexible NFV Networking Solu- resources, and traffic steering between the VNFs
tion” [4], outlining the benefits for the NFV to develop the service chain. In this context, the
deployment of an OpenFlow-enabled SDN traffic must be isolated not only among service
approach to deal with the dynamic provisioning chains but between the NFs that compose the
of networking services. service as well. SDN is a perfect complement to
Recently, the Internet Research Task Force deal with these requirements and with the
has published RFC 7426 [5], which proposes a dynamicity imposed to the network resources.
common terminology for SDN layering and Although the interaction between NFV and
architecture based on significant related work SDN is complementary, there is space for inno-
from the SDN research community. In this vation in this area, and their relationship can
regard, the work presented in this article mainly evolve beyond providing a network infrastructure
focuses on the separation between the control with enhanced capabilities to significantly
and forwarding planes, and is compatible with improve how the VNFs are designed. Next, we
this RFC, but narrows down the scope to multi- present a vision on the evolution of the NFV
tenancy and NFV-related implementation architecture from an SDN-agnostic approach to
aspects. a fully SDN-enabled architecture, also represent-
The work done by ETSI and ONF is relevant ed in Fig. 1.
as a reference to the two first steps of the NFV
architecture evolution, presented later. SDN-AGNOSTIC NFV ARCHITECTURE
As a contribution to progress in NFV Before the appearance of NFV, NFs were built
research, European Commission funded projects as a closed combination of software and hard-
like T-NOVA [6] and UNIFY [7]. The T-NOVA ware from vendors. NFV is a step forward for
project has the goal of designing a framework the provisioning of network functions and
for providing NFs as a service for all the stake- enables the decoupling of software from hard-
holders, while the UNIFY project seeks to open ware. This decomposition relies on the virtual-
up all the potential of virtualization and automa- ization layer, which exposes virtual resources
tion across the whole networking and cloud (i.e., computing, storage, and network) that
infrastructure. The work presented in this article become the building blocks for NFs. Moreover,
is related to the latter. the deployment of NFs becomes more flexible as
Some other works are also related to the evo- they are based on software and not attached to
lution of the NFV architecture and FlowNAC specific hardware. As the NF turns into instan-
proposal. Reference [8] demonstrates the appli- tiable software (VNF), it provides more flexibili-
cability of the ETSI architecture to deploy VNFs ty to scale up/down with finer granularity
in a resilient and scalable manner. The SIP-PBX according to the actual traffic and NF perfor-
service proposed is similar to FlowNAC in the mance.
sense that the control and data planes are clearly The NFV architecture promoted by ETSI
separated. Reference [9] introduces an ETSI- leverages on compute, storage, and network vir-
based architecture that ensures high availability tual resources, and NFs are virtualized and
and scalability for a virtual session border con- encapsulated as a software package, like a virtu-

188 IEEE Communications Magazine • April 2015


MATIAS_LAYOUT_Author Layout 3/31/15 2:58 PM Page 189

VNF VNF VNF processing


Compute processing processing deployed over
infrastructure deployed deployed Stateful both compute
over compute over compute processing and network
infrastructure infrastructure infrastructure

Stateless SDN network


SDN network processing infrastructure
Network infrastructure provides both
Network infrastructure provides connectivity with
infrastructure provides connectivity enhanced
connectivity with enhanced capabilities
capabilities and support to
VNF processing

SDN-agnostic SDN-enabled SDN-enabled


NFV NFV NFV

Figure 1. NFV architecture evolution.

al machine (VM), that relies on these compo- infrastructures by using a common interface. As
nents. The underlying network infrastructure, part of this contribution, the ONF depicts a pos-
included in the NFV infrastructure (NFVI), is sible interaction between the NFV Orchestration
abstracted to realize virtualized network paths component and the OpenFlow Controller, which
that provide connectivity to support the inter- is based on a northbound interface exposed by
connection between VNFs and with the end- the latter.
points [2]. Therefore, the VNFs are software Further pursuing this approach, the latest
boxes running on commodity servers to process documents from ETSI [13] integrate SDN with
the frames coming from the underlying network, the defined architecture and reference points for
and consequently, compute resources are the NFVI. However, the contributions of SDN
main architectural component to build the NFs. remain in the infrastructure network domain of
In this regard, virtual network resources are lim- the NFVI, focused on providing connectivity ser-
ited to providing an interface to the underlying vices; and despite being a perfect complement
network resources, which are mostly considered for NFV, it does not tackle the compute-based
just for providing connectivity service. design of VNFs. Since the main difference from
Some examples proposed by ETSI that can the previous approach lies only in the network
benefit from this approach are vBNG, vCPE, infrastructure, the same examples apply here.
vRouter, CG-NAT, software-based DPI, and The main idea is that the compute resources
mobile network nodes [12]. (e.g., the CG-NAT) must process all the data
traffic. The network infrastructure still only pro-
SDN-AWARE NFV ARCHITECTURE vides connectivity services, albeit more dynamic
Since the initial proposal of the NFV concept and programmable.
[12], its relationship with SDN was argued to be
complementary and potentially of added value SDN-ENABLED NFV ARCHITECTURE
when both technologies are combined. The sepa- This last step in the evolution of NFV toward a
ration of data forwarding from the control plane fully SDN-enabled architecture means a valu-
improves the flexibility of the network and sim- able advance in the way the VNFs are designed
plifies the dynamic deployment and operation of and implemented. As explained in the previous
resources. In addition, the usage of commodity section, the synergies between both technologies
servers and switches, avoiding specific hardware- advocate for deploying NFV over an SDN net-
based components provided by vendors, is a work infrastructure. Based on this programma-
shared objective between NFV and SDN. More- bility already in place, the proposal is to explore
over, some of the networking challenges of the the possibility of exploiting the network infra-
NFV architecture to be addressed match the structure layer to implement part of the VNF
design goals of SDN, such as dynamic control functionality. At this point, it must be highlight-
and configuration of network nodes and auto- ed that current SDN datapath implementations
mated management of the network. Others, like are mostly stateless, since there is no (or limit-
elastic and fine-grained scalability adapted to the ed) state associated with the flow entries. In
actual needs, seamless mobility of resources, and general, previously matched frames do not
efficient multi-tenancy support, can be built on affect subsequent frames, meaning that no state
SDN capabilities. is associated (e.g., a stateless firewall or load
Thus, even if the first ETSI architecture [2] balancer). However, some limited or lightweight
did not explicitly mention SDN as part of the state can be kept in the data path, such as flow-
NFVI, the ONF [4] quickly published the envi- level counters, timers for flow expiration, and
sioned scenario of cooperation between SDN queue-level counters for QoS support. As a con-
and NFV, which contributed to simplify the inte- sequence, the networking devices, which are
gration of both physical and virtual networking supposed to be optimized for data plane pro-

IEEE Communications Magazine • April 2015 189


MATIAS_LAYOUT_Author Layout 3/31/15 2:58 PM Page 190

creation of the GTP-U tunnels and statistics col-


lection (and further actions) can be implement-
ed on the compute resources (stateful).
Stateful Reference [11] proposes a ForCES-based imple-
processing mentation of the PGW.
(VM) The interfaces between the stateful and state-
less components must be clearly defined to
describe the new architecture. There are two dif-
CTRL DATA ferent planes that can be used to interact
(stateful) between the mentioned components: the control
plane and data plane. The control plane inter-
face is used to configure and update the behav-
Stateless ior of the stateless datapath processing
IN processing OUT component as a result of logic executed in the
(SDN switch) stateful component. The data plane interface is
used when some portion of the traffic needs
stateful processing and must be redirected to the
Figure 2. SDN-based component decomposition of the VNF. stateful network function component.
Considering this new approach, the proposed
NFV architecture opens up the supported design
cessing, can be used to perform the stateless alternatives for VNFs: solely with compute
processing of data traffic. resources (option 1); solely with network
The aforementioned proposal has an impact resources (option 2); or splitting the design fol-
on the way VNFs are designed, and also on the lowing the aforementioned separation of stateful
NFV architecture, enabling a new framework for and stateless components (option 3). Each of the
further innovation. There are several factors that options is best suited for a different scenario, and
justify this approach, including data traffic per- the selection criteria would include the require-
formance improvements; a wider placement ments of the service related to data processing
scope (e.g., a VNF functionality to be performed (low vs. high speed) and the complexity of the
in the first element in the datapath); better state to be kept (stateless, lightweight state, or
resource utilization, to avoid traffic going up to stateful), as represented in Table 1 and Fig. 3.
and down from a VM to process the frames; and The main benefits from the decoupled VNF
so on. The network devices are the basic sub- design are the efficient data processing achieved
strate for building the service chains, which by optimized hardware, optimization of
means that they must be crossed anyway, and resources by means of avoiding data traffic going
their availability as a resource is more up/down to/from a VM, and independent scala-
widespread. On the contrary, the commodity bility of each component. This independence is
servers can be limited to specific locations, such fundamental when the stateless and stateful pro-
as data center infrastructures, thus requiring cessing is unbalanced. In this case, the most
more complicated traffic steering and possibly demanding processing can increase its assigned
imposing some delay due to the longer path the resources independently and optimize the
traffic must traverse. resource utilization.

VNF DESIGN CONSIDERATIONS


The proposed evolution for the NFV architec- FLOWNAC:
ture and the VNF design approach distinguishes
between two components: the stateful network
A REAL EXPERIENCE EXPLORING
function component and the stateless data path NOVEL NFV ARCHITECTURES
processing component, as shown in Fig. 2. The
stateful component is based on virtual compute This section illustrates the applicability of NFV
resources (e.g., VMs) to keep the state associat- architectures described above with a real exam-
ed with the VNF, since software packages are ple, FlowNAC, a flow-based network access con-
good at managing state machines. The stateless trol (NAC) [1]. This solution has already been
component makes use of SDN datapath deployed over the OpenFlow-based EHU-OEF
resources to perform data traffic processing effi- infrastructure [14] and demonstrated at several
ciently. The separation between these two com- conferences like IEEE GLOBECOM 2013. The
ponents is inspired by SDN decoupling of the following analysis performed over the FlowNAC
data and control planes. The main idea is to example focuses on one hand on SDN-agnostic
keep data processing in hardware as much as and SDN-aware NFV architectures, as both
possible, and only forward the data traffic to the share the same compute-based approach for
stateful component when the processing is also VNF design, and on the other hand SDN-
stateful. enabled NFV architecture, which are compared
An example to illustrate this separation is the in Fig. 4.
Evolved Packet Core (EPC), where the packet FlowNAC is a NAC system for services that
gateway (PGW) component can be implemented can be identified as flows, inspired by the IEEE
following this design approach. In this case, the 802.1X port-based NAC, which is a basic NAC
GTP-U tunneling endpoint performing the solution enforcing the access control at the port
(de)encapsulation (stateless) and gathering asso- level (i.e., the physical port of the network node).
ciated statistics (lightweight state) can be imple- The main difference between both approaches is
mented in the SDN datapath, whereas the the granularity of each solution: port vs. flow.

190 IEEE Communications Magazine • April 2015


MATIAS_LAYOUT_Author Layout 3/31/15 2:58 PM Page 191

The traffic originated in the user can be clas-


Data performance
sified in three categories: Complexity of State Best alternative
requirements
a-type: Authentication and authorization
(AA) traffic that must be processed by the
High-speed Option 3: VNF with split
FlowNAC VNF to keep the state associated Stateful
processing design
with each AA process. Being related to the
AA process, it will be limited in time and
High-speed Stateless/ Option 2: VNF designed
volume.
processing lightweight state with network resources
b-type: Data traffic for the authorized services
that must be granted access to the network.
Medium-/low-speed Option 1: VNF designed
It will depend on the actual service provid- Stateful
processing with compute resources
ed, which can be bandwidth-intensive (e.g.,
multimedia services) or time-sensitive. This
Medium-/low-speed Stateless/
traffic must be evaluated by the FlowNAC Option 1 or 2
processing lightweight state
VNF to enforce the access control function-
ality. Table 1. VNF design alternative selection criteria.
c-type: Data traffic for non-authorized ser-
vices (the remaining traffic generated by
the user), which must be denied access to
the network. This traffic completely The overall resource utilization also becomes
depends on the user and its operating sys- an issue. All the traffic from the user must be
tem, running applications, viruses, and so redirected to a location with computing
on. Similar to b-type traffic, the FlowNAC resources. Then all the traffic must be processed
VNF must enforce the access control, but by the VM, and finally, the authorized data traf-
in this case to prevent these frames access- fic must be redirected to the following step
ing the resources. toward the service, as shown in Fig. 4. This
Following the compute-based design of the approach has a negative impact on the band-
first two approaches to the NFV architecture width occupation as all the aggregate traffic
(SDN-agnostic and SDN-aware NFV architec- entering the network must effectively reach a
tures), FlowNAC can be implemented as a soft- VM.
ware package running on a single VM. It could Following the proposed approach (SDN-
also be decomposed into different lower-level enabled NFV architecture), a FlowNAC VNF is
functions running on separated VMs, but for designed separated into two functional blocks:
simplicity we assume just one element. the AA block, which keeps the state of the AA
In this approach, all the traffic from users processes currently executed; and the access con-
must be redirected to the VM by the network trol enforcing block, which limits the access only
infrastructure. The AA traffic is processed, to already authorized services and does not
authorized data traffic is allowed back into the require any state. Regarding its implementation,
network to reach the authorized service, and the AA process relies on computing resources,
non-authorized data traffic is dropped, as shown and the access control is enforced by the net-
on the left side of Fig. 4. working devices. This separation permits redi-
This approach has several benefits like its recting each type of traffic to the appropriate
ease of implementation and deployment, as the resource, as shown on the right side of Fig. 4.
FlowNAC VNF relies solely on computing Only the AA traffic is sent to the VM to be pro-
resources and is deployed by simply instantiating cessed, and depending on the result of the AA
one VM and redirecting all the traffic from the process, the SDN switch is configured to allow
user to it. Migration of the FlowNAC VNF is the authorized services. In our implementation,
also straightforward as it is based on legacy com- this interface is realized using OpenFlow, and
puting virtualization technology with well-known the FlowNAC VNF includes an SDN controller
interfaces, and the functions are completely iso- that sends the appropriate instructions to the
lated from the underlying infrastructures. SDN switch to allow the flows associated with
On the other hand, this architecture also has the authorized service. Authorized and unautho-
several drawbacks. As with any other VNF, the rized data traffic is processed by the SDN switch,
scalability is improved by virtualization tech- and only the authorized traffic is allowed, while
niques, which allow more or fewer computation the unauthorized data traffic is dropped.
resources to adapt the processing capacity to the A FlowNAC VNF benefits significantly from
actual demand. However, the scalability would this approach. First, the scalability requirements
be limited by the availability of computing of the AA and access control enforcing blocks
resources. are very different. The computing resources used
The performance of data processing is one of for the AA block could scale slower as AA traf-
the main limitations of this approach. Although fic is expected to be less demanding, and the
there are some benchmarks that claim high offloading of processing would make them
throughput when traffic crosses the VM, the lighter and easier to move and scale. The net-
underlying hardware devices are expected to working resources used for the access control
achieve better performance [15]. As a conse- enforcing block would require more data pro-
quence, the data traffic processing in virtual cessing capacity as the traffic associated with the
compute resources is worse than in hardware- services increases. Moreover, it must also be
based networking devices, which impacts autho- considered that unauthorized data traffic, which
rized service data traffic that must be processed must be dropped, could also demand increasing
by the VM. the data processing capacity.

IEEE Communications Magazine • April 2015 191


MATIAS_LAYOUT_Author Layout 3/31/15 2:58 PM Page 192

to determine if the performance gain overcomes


Option 1 the effort involved in the redesign process. Also,
VNF designed Option 3 the functionalities are supported by the SDN data
with compute VNF with split
design path condition in which part of the VNF process-
resources ing can be offloaded to the network elements. As
Stateful Option 2 Stateful services are designed and deployed over NFV
(VM) VNF designed (VM) architectures, emerging best practices in design of
with network
resources VNFs should provide guidance in these issues.
VNFs designed also employing network ele-
ments add complexity to the optimal placement
decision. The NFV framework must now orches-
trate an additional type of resource with its own
Stateless
(SDN switch) constraints (e.g., the rule insertion performance
or flow table size). Research on orchestrators is
a hot topic in the NFV field, so significant
Stateless improvement is expected in this area, which
(SDN switch) should also allow limiting the impact of the
increased complexity.
Figure 3. VNF design alternatives in SDN-enabled NFV architecture. The effective use of compute and network vir-
tual resources requires the virtualization layer to
provide the necessary interfaces and allow equiva-
lent flexibility and dynamicity in deployment and
Second, the data processing performance of migration over both of them, as well as enforcing
the VNF is improved, as specialized hardware the required isolation among the virtual resources
processes authorized and unauthorized data traf- of different tenants sharing the same physical
fic, which is expected to be the most intensive resources. Progress in this area is also expected in
and bandwidth consuming. The AA traffic, which order to provide a full and high-performance car-
is less intensive and requires stateful processing, rier grade virtualization of service delivery.
is redirected to the computing resources. Dual use of the infrastructure, for traffic
Finally, the availability of networking steering and stateless NF processing, implies
resources, as part of the underlying connectivity that the underlying network infrastructure must
substrate, provides the possibility to ingress only guarantee isolation between both functionalities,
the authorized traffic data and drop the unau- and also between the processing of different
thorized data at the first node, reducing general NFs, not only in the data plane but also in the
network utilization. Moreover, it also opens the control plane, as the VNFs influence the behav-
way to better utilization of resources, as the net- ior of the SDN data path. Performance isolation
work must be traversed anyway, and the network is also required to avoid VNF functionality hin-
node does not process the authorized data traffic dering the correct behavior of the NFV architec-
twice, to and from the VM. ture. In any case, in the future any expectations
will undoubtedly be met.
ISSUES AND CHALLENGES
The proposed approach to an SDN-based NFV
CONCLUSIONS
architecture, discussed previously, brings up a The NFV concept is probably one of the major
series of challenges stemming from the two recent revolutions on the information technology
major changes depicted in Fig. 1: on one hand, landscape. From a chronological point of view it
the VNF must be designed splitting the compo- was more or less coetaneous with SDN, but at
nents to be deployed over compute and network that time, NFV just did not take into account
resources; on the other hand, the network infra- this last technology or possible relationship.
structure must support a dual role for traffic As SDN technology matures and NFV
steering and VNF processing. becomes a real technological trend, the conver-
In order to achieve the performance gain the gence of both technologies was something to be
split design allows, the services must be carefully expected. And this is happening: both ONF and
redesigned. Thus, each service must be analyzed ETSI NFV ISG are already proposing a SDN-

SDN-agnostic NFV / SDN-aware NFV SDN-enabled NFV


AA block
-State of AuthN/AuthZ (stateful)
FlowNAC
VNF

FlowNAC Slow path access control Access control enforcing block


VNF All traffic pass through the VM VM
-Stateless AC rules
-All the traffic pass through the
SDN switch

Switch SDN switch

Client Service Client Service


(a)-type traffic: AuthN/AuthZ CTRL (b)-type traffic: DATA (accepted)
(b)/(c)-type traffic: DATA (all) NFV to SDN interface

Figure 4. FlowNAC VNF alternatives.

192 IEEE Communications Magazine • April 2015


MATIAS_LAYOUT_Author Layout 3/31/15 2:58 PM Page 193

aware NFV, which offers the network the [9] G. Monteleone and P. Paglierani, “Session Border Controller
Virtualization towards Service-Defined Networks Based on
dynamicity to support new network-aware ser- NFV and SDN,” Proc. Int’l. Conf. IEEE SDN for Future Net- Several challenges
vice provisioning paradigms. works and Services ’13, Trento, Italy, 11–13 Nov.
In this article we propose a taxonomy of the [10] J. Batall et al., “On the Implementation of NFV over an
still need to be
evolution of the NFV/SDN relationship. In the OpenFlow infrastructure: Routing Function Virtualiza- addressed to fully
tion,” Proc. Int’l Conf. IEEE SDN for Future Networks
latest approach, the processing of network pack- and Services ’13, Trento, Italy, 11–13 Nov. attain the benefits of
ets is partially offloaded to the network element [11] E. Haleplidis et al., “ForCES Applicability to SDN-
(the SDN switch) while maintaining the stateful enhanced NFV,” Proc. Euro. Wksp. Software Defined this approach. But
processing of the VNF on the compute element. Networks, Budapest, Hungary, 2014.
[12] ETSI ISG for NFV, NFV White paper: “Network Func-
overall, we consider
This effectively means that the VNF logically tions Virtualisation, An Introduction, Benefits, Enablers,
extends to the networking element. that there are many
Challenges & Call for Action. Issue 1,” http://portal.etsi.
To demonstrate the validity of the concept, a org/NFV/NFV_White_Paper.pdf; accessed 15 Jan. 2015. reasons to believe
real implemented use case that shows the suitabil- [13] ETSI ISG for NFV, ETSI GS NFV-INF 001, “Network
Functions Virtualisation (NFV); Infrastructure Overview;” that an SDN-enabled
ity is presented: an access control virtualized net- http://www.etsi.org/deliver/etsi_gs/NFV-INF/
work function (FlowNAC VNF) using FlowNAC, 001_099/001/01.01.01_60/gs_nfv-inf001v010101p.pdf;
NFV will boost the
our own flow-based network access control. accessed 15 Jan. 2015. NFV deployment to
Several challenges still need to be addressed [14] J. Matias et al., “The EHU-OEF: An OpenFlow-Based Layer-
to fully attain the benefits of this approach. But 2 Experimental Facility,” Computer Networks, vol. 63, Spe- support new efficient
cial Issue on Future Internet Testbeds, 2013, pp. 101–27.
overall, we consider that there are many reasons [15] C. Rotsos et al., “OFLOPS: An Open Framework for and cost effective
to believe that SDN-enabled NFV will boost OpenFlow Switch Evaluation,” Proc. Passive and Active
services.
NFV deployment to support new efficient and Measurement, Vienna, Austria, 2012.
cost-effective services.
BIOGRAPHIES
ACKNOWLEDGMENTS JON MATIAS received his B.S. and M.S. degrees in telecom-
This research was partly funded by the Spanish munication engineering from the University of the Basque
Ministry of Economy and Competitiveness under Country (UPV/EHU) in 2003. He currently works as a
researcher at the Communications Engineering Department
the “Secure deployment of services over SDN of the same university and is pursuing a Ph.D. degree
and NFV based networks” project S&N-SEC focused on access networks and security. His research
TEC2013-47960-C4-3-P and by the European interests include software defined networking, network
Commission under the FP7 UNIFY (Unifying functions virtualization, broadband access networks, and
security.
Cloud and Carrier Networks) project CNECT-
ICT-619609. This has been produced within the JOKIN GARAY received his B.S. and M.S. degrees in telecom-
Training and Research Unit UFI11/16 supported munication engineering in 2003 from UPV/EHU. After a
by the UPV/EHU. period in the private sector, he came back to the university
to pursue a Ph.D.. His research interests include software
defined networking, network functions virtualisation, and
REFERENCES cloud computing.
[1] J. Matias et al., “FlowNAC: Flow-Based Network Access N EREA T OLEDO received her B.Sc. and M.Sc. degrees in
Control,” Proc. Euro. Wksp. Software Defined Net- telecommunications engineering in 2007 from UPV/EHU
works, Budapest, Hungary, 2014. and her Ph.D. degree from the same university in 2012.
[2] ETSI ISG for NFV, “ETSI GS NFV 002: Network Functions Since 2008 she has been an assistant professor at UPV/EHU
Virtualisation (NFV); Architectural Framework,” and as a researcher in the I2T lab (http://i2t.ehu.es). She
http://www.etsi.org/deliver/etsi_gs/NFV/001_099/002/01. has been a visiting researcher at Institut Telecom-Telecom
02.01_60/gs_NFV002v010201p.pdf; accessed 15 Jan- Bretagne. Her current research interests include SDN, wire-
uary 2015. less networking, and security.
[3] ETSI ISG for NFV, “NFV Proofs of Concept,”
http://www.etsi.org/technologies-clusters/technologies/ J UANJO U NZILLA holds B.S., M.S. (1990), and Ph.D. (1999)
nfv/nfv-poc; accessed 15 Jan. 2015. degrees in communications engineering, and is a professor
[4] ONF, “OpenFlow-Enabled SDN and Network Functions in the Communications Engineering Department at
Virtualization,” https://www.opennetworking.org/ UPV/EHU where he teaches subjects related to telecommu-
images/stories/downloads/sdn-resources/solution- nications networks and services. He is part of the I2T
briefs/sb-sdn-nvf-solution.pdf; accessed 15 Jan. 2015. Research Group, where he participates in several national
[5] E. Haleplidis et al., “Software-Defined Networking (SDN): and European R&D projects. His research interests include
Layers and Architecture Terminology,” RFC 7426, Jan. SDN and NFV, network security, and techno-economic
2015; http://tools.ietf.org/search/rfc7426; accessed 01 Feb. models for access networks. Other interests are models
2015. and metrics for knowledge transfer from universities to
[6] G. Xilouris et al., “T-NOVA: A Marketplace for Viortual- enterprises.
ized Network Functions,” Proc. Euro. Conf. Networks
and Commun., Bologna, Italy, 2014. EDUARDO JACOB [SM], after spending a few years in the pri-
[7] P. Skoldstrom et al., “Towards Unified Programmability vate sector, first as a network manager and an R&D project
of Cloud and Carrier Networks,” Proc. Euro. Wksp. leader later, came back to UPV/EHU. He is a professor and
Software Defined Networks, Budapest, Hungary, 2014. leads a research group at his university that is participating
[8] M. Schöller et al., “Resilient Deployment of Virtual Net- in several national and European R&D projects. Other inter-
work Functions,” Proc. Int’l. Congress on Ultra Modern ests are industrial applications of SDN and NFV for resilien-
Telecommunications and Control Systems and Wksps. cy, experimental network infrastructures, and cyber
’13, Almaty, Kazajistan, 10–13 Sept. physical systems.

IEEE Communications Magazine • April 2015 193

You might also like