1. CoNFV
- Author
-
Xiaozhe Shao, Lixin Gao, Naveen Kumar Dumpala, Xuzhi Zhang, George Provelengios, and Russell Tessier
- Subjects
General Computer Science ,Network security ,business.industry ,Computer science ,Distributed computing ,Control reconfiguration ,020206 networking & telecommunications ,02 engineering and technology ,Flow network ,020202 computer hardware & architecture ,Resource (project management) ,Global network ,Scalability ,0202 electrical engineering, electronic engineering, information engineering ,Resource allocation ,business ,Virtual network - Abstract
Network function virtualization (NFV) is a powerful networking approach that leverages computing resources to perform a time-varying set of network processing functions. Although microprocessors can be used for this purpose, their performance limitations and lack of specialization present implementation challenges. In this article, we describe a new heterogeneous hardware-software NFV platform called CoNFV that provides scalability and programmability while supporting significant hardware-level parallelism and reconfiguration. Our computing platform takes advantage of both field-programmable gate arrays (FPGAs) and microprocessors to implement numerous virtual network functions (VNF) that can be dynamically customized to specific network flow needs. The most distinctive feature of our system is the use of global network state to coordinate NFV operations. Traffic management and hardware reconfiguration functions are performed by a global coordinator that allows for the rapid sharing of network function states and continuous evaluation of network function needs. With the help of state sharing mechanism offered by the coordinator, customer-defined VNF instances can be easily migrated between heterogeneous middleboxes as the network environment changes. A resource allocation and scheduling algorithm dynamically assesses resource deployments as network flows and conditions are updated. We show that our deployment algorithm can successfully reallocate FPGA and microprocessor resources in a fraction of a second in response to changes in network flow capacity and network security threats including intrusion.
- Published
- 2020