””Chinese Journal of Computers   Full Text
  TitleNetwork¢šFunction¢šVirtualization¢š¢šTechnology:¢šA¢šSurvey
  AuthorsWANG¢šJin-Wen1)¢š¢šZHANG¢šXiao-Li2),3),4)¢š¢šLI¢šQi2),3)¢š¢šWU¢šJian-Ping1),2),4)¢š¢šJIANG¢šYong1),3)
  Address1)(Tsinghua-Berkeley¢šShenzhen¢šInstitute,¢šTsinghua¢šUniversity,¢šShenzhen,¢šGuangdong¢š¢š518055)

2)(Institute¢šfor¢šNetwork¢šScience¢šand¢šCyberspace,¢šTsinghua¢šUniversity,¢šBeijing¢š¢š100084)

3)(Graduate¢šSchool¢šat¢šShenzhen,¢šTsinghua¢šUniversity,¢šShenzhen,¢šGuangdong¢š¢š518055)

4)(Department¢šof¢šComputer¢šScience¢šand¢šTechnology,¢š¢šTsinghua¢šUniversity,¢šBeijing¢š¢š100084)

  Year2019
  IssueNo.2(415-436)
  Abstract &
  Background
Abstract¢š¢š¢šVarious¢šmiddleboxes¢šhave¢šbeen¢šdeployed¢što¢šenable¢šdiversified¢šfunctionalities¢šin¢šenterprise¢šnetworks.¢šFor¢šexample,¢šFirewalls¢šand¢šIntrusion¢šDetection¢šSystems¢šare¢šused¢što¢šenhance¢šthe¢šsecurity¢šof¢šthe¢šnetwork,¢šand¢šCache¢šProxies¢šand¢šWAN¢šOptimizations¢šare¢šused¢što¢šimprove¢šthe¢šperformance¢šof¢šthe¢šenterprise¢šnetworks.¢šHowever,¢šit¢šis¢špainful¢šfor¢šenterprises¢što¢šdeploy,¢šupdate,¢šor¢šmaintain¢šsuch¢šphysical¢šdevices¢šin¢štheir¢šenterprise¢šnetworks.¢šMoreover,¢šbecause¢šof¢šthe¢šdiscrepancy¢šbetween¢šnetwork¢šfunction¢šdevices¢šof¢šthe¢šdifferent¢šmanufacturers,¢šenterprises¢šneed¢što¢šhire¢šlarge¢šmanagement¢šteams¢šwith¢šextensive¢šknowledge¢što¢šmanage¢šthe¢šnetwork¢šfunctions¢šdevices.¢šBecause¢šof¢šthe¢šfixed¢šlocation¢šand¢šnetwork¢štraffic¢šprocess¢šcapacity¢šof¢šthe¢šhardware¢šnetwork¢šfunction¢šdevices,¢šthe¢šnetwork¢štraffic¢šcongestion¢šalways¢šcauses¢šthe¢šfailure¢šof¢šthe¢šnetwork¢šfunctions.¢šThe¢šoverhead¢šof¢šmiddlebox¢šmanagement,¢šmaintenance¢šand¢šupdate¢šincrease¢šsignificantly¢šas¢šenterprise¢šnetworks¢šgrow.¢šFortunately,¢šthe¢šemerging¢šNetwork¢šFunction¢šVirtualization¢š(NFV)¢štechnology¢šcan¢šaddress¢šthese¢šissues¢šby¢šdecoupling¢šthe¢šphysical¢šnetwork¢šequipment¢šfrom¢šthe¢šnetwork¢šfunctions¢šthat¢šrun¢šon¢šthem.¢šWith¢šthe¢šNFV¢štechnology,¢šan¢šenterprise¢šcan¢šefficiently¢šreduce¢šcomplicated¢šnetwork¢šfunction¢šmanagement¢šand¢šthe¢šcost¢šof¢šdeploying¢šnetwork¢šfunction¢šequipment¢šby¢šdeploying¢šnetwork¢šfunctions¢šin¢šcommercial¢šservers.¢šIt¢šcan¢šalso¢šenable¢šflexible¢šservice¢šdeployment¢šstrategies¢šfor¢šthe¢šenterprises,¢še.g.,¢šdynamically¢šscale¢šin/out.¢šAlthough¢šNFV¢šcan¢šbring¢šsignificant¢šbenefits¢što¢šenterprises,¢šthere¢šare¢šstill¢šmany¢šchallenges¢šin¢šdeveloping¢špractical¢šand¢šefficient¢šNFV.¢šIn¢šorder¢što¢šsolve¢šsuch¢šproblems,¢šresearchers¢šin¢šacademia¢šand¢šindustry¢šhave¢šdevoted¢što¢šthe¢šstudy¢šof¢šthe¢šNFV¢štechnology.¢šThis¢špaper¢špresents¢šthe¢šfirst¢šsystematic¢šstudy¢šof¢šthe¢šliterature¢šof¢šthe¢šNFV¢štechnology.¢šFirstly,¢šwe¢šreview¢šthe¢šstandard¢šarchitecture¢šof¢šNFV¢šestablished¢šby¢šthe¢šEuropean¢šTelecom¢šStandards¢šInstitute¢šIndustry¢šSpecification¢šGroup¢šfor¢šNFV¢š(ETSI¢šISG¢šNFV).¢šWe¢šclassify¢šand¢šsummarize¢šthe¢šproblems¢šand¢šchallenges¢šin¢šthe¢šdeveloping¢šof¢šNFV¢šsystems¢šbased¢šon¢šthe¢šstandard¢šarchitecture¢šof¢šNFV.¢šThe¢šstudy¢šcan¢šbe¢šclassified¢šinto¢šthe¢šfollowing¢šthree¢šcategories:¢šNetwork¢šFunction¢šVirtualization,¢šNetwork¢šFunction¢šVirtualization¢šInfrastructure¢š(NFVI),¢šand¢šManagement¢šAnd¢šNetwork¢šOrchestration¢š(MANO).¢šFurthermore,¢šSoftware¢šDefined¢šNetwork¢š(SDN)¢šis¢ša¢šnew¢štype¢šof¢šnetwork¢šarchitecture¢šwhich¢šare¢šdesigned¢što¢šachieve¢šflexible¢šand¢šintelligent¢šnetwork¢štraffic¢šcontrol¢šby¢šdecoupling¢šthe¢šcontrol¢šplane¢šand¢šdata¢šplane¢šof¢šnetwork¢šdevices,¢šNFV¢šand¢šSDN¢šcan¢šcomplement¢šeach¢šother¢šin¢švarious¢šaspects,¢šwe¢šstudy¢šthe¢šrelationship¢šbetween¢šthe¢šNFV¢šand¢šSDN.¢šSecondly,¢šwe¢šsystematically¢šstudy¢šbuilding¢šblocks¢šof¢šNFV,¢ši.e.,¢švirtual¢šnetwork¢šfunction¢š(VNF)¢šconstruction,¢šand¢šthe¢šrunning¢šenvironment¢šoptimization¢šin¢šNFV,¢šthe¢šdesign¢šof¢šNFV¢šmanagement¢šsystem¢šand¢šits¢šoptimization,¢špolicy¢šenforcement¢šand¢šverification,¢šresource¢šallocation¢šand¢šmigration,¢šload¢šbalance¢šand¢šstate¢šmanagement¢štechnology,¢šand¢šNFV¢šsecurity.¢šThirdly,¢šthe¢šNFV¢štechnology¢šhas¢šbeen¢šdeployed¢šin¢šdifferent¢škinds¢šof¢šindustry¢šfields,¢šwe¢šshow¢šthe¢špractical¢šdeployment¢šissues¢šof¢šNFV¢šby¢šdiscussing¢šthe¢šapplication¢šscenario¢šcases¢šof¢šNFV,¢še.g.¢šin¢šcloud¢šcomputing,¢šmobile¢šcommunication,¢šand¢šhome¢šnetwork.¢šFinally,¢šwe¢šsummarize¢šthe¢šadvantages¢šand¢šshortcomings¢šof¢šNFV¢šby¢šcomparing¢šthe¢šNFV¢štechnology¢šand¢šclassical¢šphysical¢š

network¢šfunction¢šdevices¢šand¢špresent¢šthe¢šfuture¢šresearch¢šdirections¢šof¢šthe¢šNFV¢štechnology¢šfrom¢šsix¢šaspects¢šbased¢šon¢šthe¢šstandard¢šarchitecture¢šof¢šETSI¢šNFV.¢š

Keywords¢š¢š¢šnetwork¢šfunction¢švirtualization¢štechnology;¢šnetwork¢šfunction;¢švirtualization;¢šcloud¢šcomputing;¢šnetwork¢šsecurity

Background¢š¢šEnterprises¢šimprove¢štheir¢šnetwork¢šperformance¢šand¢šsecurities¢šby¢šdeploying¢šdifferent¢škinds¢šof¢šmiddleboxes,¢šsuch¢šas¢šfirewall,¢šIntrusion¢šDetection¢šSystem¢š(IDS),¢šWAN¢šOptimization,¢šetc.¢šHowever,¢šwith¢šthe¢šincrease¢šof¢šthe¢šsize¢šof¢šthe¢šenterprise¢šnetwork,¢šthe¢šcost¢šof¢šmiddleboxes¢šdeployment¢šand¢šmaintenance¢šincreases¢šsignificantly.¢šTo¢šaddress¢šthese¢šproblems,¢šNetwork¢šFunction¢šVirtualization¢š(NFV)¢šhas¢šbeen¢šproposed¢što¢šdeploy¢šthe¢šsoftware¢šnetwork¢šfunctions¢šon¢šthe¢šstandard¢šcommercial¢šserver¢šwith¢šhigh¢šperformance¢što¢šsave¢šthe¢šhardware¢šcost¢šand¢šsimplify¢šthe¢šnetwork¢šfunction¢šmaintenance.¢šIn¢šrecent¢šyears,¢šNFV¢štechnology¢šhas¢šattracted¢šsignificant¢šattention¢šfrom¢šacademic¢šand¢šindustrial¢šcommunities.¢šIn¢šthis¢špaper,¢šwe¢šprovide¢ša¢šcomprehensive¢šsurvey¢šof¢šexisting¢šstudies¢šof¢šNFV¢štechnology.¢š

In¢šthis¢špaper,¢šwe¢šfirst¢šintroduced¢šthe¢šstandard¢šNFV¢šarchitecture¢šproposed¢šby¢šETSI.¢šThen¢šwe¢šclassify¢šthe¢šexisting¢šresearch¢šresults¢šof¢šNFV¢štechnology.¢šAnd¢šwe¢šdiscuss¢šthe¢šresearch¢šworks¢šon¢šNFV¢štechnology¢šfrom¢šfollowing¢šaspects:¢š

building¢šblocks¢šof¢šNFV,¢ši.e.,¢švirtual¢šnetwork¢šfunction¢š(VNF)¢šconstruction,¢šand¢šthe¢šrunning¢šenvironment¢šoptimization¢šin¢šNFV,¢šthe¢šdesign¢šof¢šNFV¢šmanagement¢šsystem¢šand¢šits¢šoptimization,¢špolicy¢šenforcement¢šand¢šverification,¢š¢šresource¢šallocation¢šand¢šmigration,¢šload¢šbalance¢šand¢šstate¢šmanagement¢štechnology,¢šand¢šNFV¢šsecurity.¢šFinally,¢šthis¢špaper¢šsummaries¢šthe¢šadvantages¢šand¢šshortcomings¢šof¢šNFV¢štechnology¢šcompared¢šwith¢štraditional¢šnetwork¢šfunctions,¢šintroduces¢šthe¢šapplication¢šscenario¢šcases¢šof¢šNFV¢šand¢špredicts¢šthe¢šresearch¢šdirections¢šof¢šNFV¢šin¢šthe¢šfuture,¢šaccording¢što¢šthe¢šETSI¢šstandard¢šarchitecture¢šof¢šNFV.