<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2975524&amp;fmt=gif">
BLOG

What Is Network Functions Virtualization (NFV)?

February 1, 2018

Image of young woman doctor. Concept of modern technology

It’s been more than 5 years since the European Telecommunications Standards Institute (ETSI) introduced network functions virtualization (NFV) to the world. And yet, so much of the IT industry is still trying to come to grips with what NFV really is.

Part of the problem is that conversations about NFV inevitably involve discussions about virtual network functions (VNFs) and software-defined networking (SDN).

It’s a mess of acronyms that’s only made more confusing by vague vendor terminology when you’re actually trying to purchase technology to transform your networking.

If you’re struggling to get a real understanding of NFV, you’re not alone. Here’s an introduction to the topic for anyone ready to make their network more agile and dynamic.

The Basics of Network Functions Virtualization

Simply put, NFV is the process of separating network functions from the dedicated hardware devices they’ve traditionally run on. 

Your typical functions—firewalls, load balancers, WAN accelerators, intrusion detection devices, etc.—run on large hardware appliances in the center of the network. The central appliance is then shared throughout the organization by many tenants and applications.

Commercial off-the-shelf x86 servers are more powerful than ever and complete virtualization is more accessible. The combination makes it possible to replace specialized hardware with software running on virtual server hosts.

>> Download Now: Visibility Architecture in SDN & NFV Environments [Free whitepaper]



There are many benefits of abstracting network functions from hardware appliances, including:
 

  • Limiting Points of Failure: Centralized appliances that support many tenants are points of failure across much of your organization. Redesigning for NFV reduces failure to individual containers where the functions exist. And when NFV is architected with the right TAPs, you can limit points of failure even further.
  • Greater IT Agility: Because you don’t have to configure hardware appliances manually throughout the network, NFV helps you deploy new services faster.
  • Potentially Reduced Costs: NFV helps you reduce power consumption throughout the network, lower the amount of physical space you need for network functions, and manage your resources more efficiently. All of these benefits combine to help reduce operational and capital expenditures when NFV is implemented properly.

The benefits are attractive and the definition may seem simple, but there’s more to implementing NFV than meets the eye.

 

The 3 Components of Network Functions Virtualization

Once you have a handle on the high-level definition of NFV, you can focus on these 3 components that make up the concept.

  1. Virtual Network Functions

Not to be confused with NFV, VNFs are the individual tasks that you’ve moved from proprietary hardware to software on commodity servers.

Your various VNFs can be chained together at the edge more efficiently than with many hardware-based appliances. However, simply virtualizing a firewall and other network elements and chaining them together won’t yield the NFV benefits you expect. VNFs must be managed by your NFV infrastructure and orchestration layer.

  1. Network Functions Virtualization Infrastructure

The NFV infrastructure (NFVI) is the higher-level environment in which various VNFs run.

Your NFVI is a combination of virtual compute, storage, and network resources, physical compute, storage, and network resources, as well as the virtualization layer of your network.

Explaining the virtualization layer warrants its own post. However, it’s important to note the inclusion of a hypervisor. The hypervisor is the NFVI element that actually separates software from hardware to make your VNFs work independently from hardware.

  1. The NFV Orchestrator

When you look one level higher than the NFVI, you see the NFV orchestrator. This is where there could be some confusion between NFV and SDN. Software-defined networks separate the control and data planes in your network to centralize control and programmability.

The NFV orchestrator doesn’t have the same universal focus of SDN. Instead, your NFV orchestrator manages connections between various VNFs that may come from different vendors. The NFV orchestrator enables service chaining, driving the benefits you expect from virtualized network functions. 

Setting Yourself Up for NFV Success

It’s important to change the conversation from “should we focus on SDN or NFV?” to “how can we set ourselves up to take advantage of both SDN and NFV?”

The key starting point for SDN and NFV is ensuring you have 100% visibility no matter how your network evolves.

Looking to add visibility to your SDN deployment, but not sure where to start? Join us for a brief network Design-IT consultation or demo. No obligation - it’s what we love to do!

SDN and NFV environment visibility architecture

See Everything. Secure Everything.

Contact us now to secure and optimized your network operations

Heartbeats Packets Inside the Bypass TAP

If the inline security tool goes off-line, the TAP will bypass the tool and automatically keep the link flowing. The Bypass TAP does this by sending heartbeat packets to the inline security tool. As long as the inline security tool is on-line, the heartbeat packets will be returned to the TAP, and the link traffic will continue to flow through the inline security tool.

If the heartbeat packets are not returned to the TAP (indicating that the inline security tool has gone off-line), the TAP will automatically 'bypass' the inline security tool and keep the link traffic flowing. The TAP also removes the heartbeat packets before sending the network traffic back onto the critical link.

While the TAP is in bypass mode, it continues to send heartbeat packets out to the inline security tool so that once the tool is back on-line, it will begin returning the heartbeat packets back to the TAP indicating that the tool is ready to go back to work. The TAP will then direct the network traffic back through the inline security tool along with the heartbeat packets placing the tool back inline.

Some of you may have noticed a flaw in the logic behind this solution!  You say, “What if the TAP should fail because it is also in-line? Then the link will also fail!” The TAP would now be considered a point of failure. That is a good catch – but in our blog on Bypass vs. Failsafe, I explained that if a TAP were to fail or lose power, it must provide failsafe protection to the link it is attached to. So our network TAP will go into Failsafe mode keeping the link flowing.

Glossary

  1. Single point of failure: a risk to an IT network if one part of the system brings down a larger part of the entire system.

  2. Heartbeat packet: a soft detection technology that monitors the health of inline appliances. Read the heartbeat packet blog here.

  3. Critical link: the connection between two or more network devices or appliances that if the connection fails then the network is disrupted.

NETWORK MANAGEMENT | THE 101 SERIES