Professional Documents
Culture Documents
1
Virtual Machine vs. Container Stack
KVM Container-stack
VNF
Libraries VNF
Guest-OS Libraries
Hypervisor Container Engine
Host-OS Host-OS
3
Service Agility/Performance
• Provisioning time: VNF VNF VNF
– Hypervisor configuration Libraries Libraries Libraries
– Spin-up guest OS
Guest-OS Guest-OS Guest-OS
– Align dependencies between Guest-OS
& VNFs Hypervisor
Host-OS
4
Portability/ Elasticity/Scalability
• Porting VNFs require:
– Identifying suitable nodes for new VNF
instances (or re-locating existing
instances). For example, resource types, VNF VNF
available capacity, guest OS images,
Libraries Libraries
hypervisor configs, HW/SW accelerators,
etc.) Guest-OS
Same
Guest-OS
– Allocating required resources for new
Hypervisor
instances Hypervisor
Re-config
– Provisioning configs to components in the Host-OS (vCPU, RAM,
guest OS, libraries and VNF Host-OS
SSL accelerator)
VNF
VNF VNF VNF ✗ If VNF is compromised
Securely recover
with minimal or no Libraries Libraries Libraries (misconfiguration,
downtime etc.), how to securely
Guest-OS Guest-OS Guest-OS
(reschedule VNF) quarantine the VNF,
Hypervisor
but ensure continuity
of other VNFs?
Host-OS
Guarantee complete isolation across Resource hungry VNF can starve the
resource entities (hardware units, shared resources (noisy neighbor
hypervisor, protection of shared effect) that are allocated to other VNFs;
resource, isolation of virtual networks, Need to monitor and cut-off hungry
L3 cache, QPI, etc.) VNF usage
6
Containerized Network Functions
Key Benefits, Challenges and Potential Solutions
7
Service Agility/Performance/Isolation (1)
Key Benefits:
VNF VNF VNF
C B A - Containers can provide better
service agility (e.g. dynamically
Container Engine provision VNFs for offering on-
demand services), and performance
Host-OS as it allows us to run the VNF process
directly in the host environment
Cluster
Management VNF
- Inter-VNF communication latency
VNF
E depends on inter-process
Tool D
communication option (when hosted
Scheduler
Container Engine in the same host)
Host-OS
8
Service Agility/Performance/Isolation (2)
Key Challenges:
- Isolation: Containers create a slice of
VNF VNF VNF the underlying host using techniques
C B A like namespaces, cgroups, chroot etc.;
Container Engine
several other kernel features that are
not completely isolated.
Host-OS - Resource Mgmt: Containers do not
provide a mechanism to quota manage
the resources and hence susceptible to
Cluster the “noisy neighbor” challenge.
Management VNF VNF
Tool D E Potential Solutions:
Container Engine - Kernel Security Modules: SElinux,
Scheduler AppArmor
Host-OS - Resource Mgmt: Kubernetes
- Platform Awareness: ClearLinux
9
Elasticity & Resilience
Key Benefits:
VNF VNF VNF
Pod Pod Pod
- Auto-scaling VNFs or achieving
Container Engine service elasticity in runtime can be
simplified by the use of container
Replication Host-OS
based VNFs due to the lightweight
Controller
resource usage of containers (e.g.
Cluster Mesosphere/Kubernetes)
Management
Tool
VNF
Pod
VNF
Pod
VNF
Pod - Container management solutions
(e.g. Kubernetes) provide self-healing
Scheduler
Container Engine features such as auto-placement,
restart, and replacement by using
Host-OS service discovery and continuous
monitoring
10
Operations & Management
11
Conclusion and Future Work
12
Conclusion and Future Work
• Use of containers for VNFs appears to have significant
advantages compared to using VMs and hypervisors,
especially for efficiency and performance
– “Virtual Customer CPE Container Performance White Paper,”
http://info.ixiacom.com/rs/098-FRB-840/images/Calsoft-Labs-CaseStudy2015.pdf
• Test Setup:
– COTS server with Intel Xeon E5-2680 v2 processor
– Virtual CPE VNFs (Firewall etc.) fast path optimized using Intel DPDK
– Measured L2-L3 TCP traffic throughput per core
• VM (KVM) environment with SRIOV -- 5.8Gbps
• Containers (LXC) environment -- 7.2Gbps
– ~25% PERFROMANCE IMPROVEMENT OVER VMs
• Opportunistic areas for future work
– Distributed micro-service network functions
– VNF Controller discovery/management/etc. standardization
– etc.
13
Call for Action
• Address aforementioned challenges
• Further research to identify currently unknown challenges
• Vendors to consider developing container based solutions –
especially to support proof of concepts and field trials
• Reach consensus on a common framework for use of
containers for NFV
• Field trial container-based VNFs
14