Header Background Image

NFV

CodiLime Glossary

Some common networking terms clearly explained

What does network functions virtualization mean?

Network function virtualization (NFV) is about virtualizing network functions which are normally deployed on dedicated hardware platforms (e.g. routers, load balancers, firewalls, etc.) delivered by specialized telco vendors. The network functions are then run as virtual appliances on commodity hardware (IT servers) instead, often connected with DPDK and SR-IOV. This approach allows telco companies to cut costs. Instead of buying expensive specialized hardware, they can emulate the same hardware functions but in the form of VMs or containers run on much cheaper standard hardware.

NFV architecture

In a conventional network, each proprietary hardware device, such as a router, gateway, firewall, switch or intrusion detection system, carries out specific networking tasks. However, NFV replaces those devices with software applications that can run on virtual machines and perform those networking tasks.

The NFV architecture consists of these main components: 

  1. Network function virtualization infrastructure (NFVI) -  a standardized architecture that provides the infrastructure components, like storage or networking, that are needed to run network applications on hardware. It is essentially the environment in which VNFs run, including physical resources, virtual resources and the virtualization layer. The virtualization layer and hardware resources are meant to be independent components providing NFVI with the desired resource.
  2. Virtual network function (VNF) - software applications that deliver network functions like Edge Devices (BRAS, vCPE, IP Edge), switching, tunneling gateway elements, traffic analysis, and much more. Based on the standardized architecture of NFVI, the VFNs can run on generic hardware. 
  3. Cloud-native network function (CNF) - is a software implementation of a network function, traditionally performed on a physical device (for example a IPv4/v6 router, L2 bridge/switch, VPN gateway, or firewall) but runs inside Linux containers (typically orchestrated by Kubernetes). It is built and deployed in a cloud-native way. 
  4. Management and orchestration (MANO) - provides the framework for managing the NFVI and the life cycle of VNFs. This framework is needed to manage the infrastructure and provision network functionality. 

Benefits of NFV

  • Efficiency -  Using NFV requires much less specialized hardware, which means saving on unnecessary costs. Traditional hardware-based networks require purchasing specific hardware devices and connecting them to build a network. This is time consuming and requires networking expertise. 
  • Simplicity - network configuration and management is simplified by using a virtualized network. NFV eliminates physical topology changes when network requirements are changing. Basic NFV architecture can be quickly updated, using just software, no need for physical device migration. Additionally, scaling the network architecture with virtual machines is quicker and simpler because it does not require buying additional hardware.
  • Flexibility - providers have the flexibility to run VFNs across different servers and move them around virtually as needed. NFV’s flexibility accelerates the delivery of network functions and applications and it improves horizontal and vertical scaling jobs. For example, if there is a network function that needs testing you can just spin up a new VM to perform that function. This creates a faster and more convenient method for testing new functions. 
  • Network functionality - features can be changed or added on demand thanks to networks running on virtual machines that are easily managed. Overall network configuration is simpler with a virtualized network. Easier management of network functions makes the process faster and more efficient.

Risks of NFV 

NFV has a lot of advantages, nevertheless it is important to keep in mind that using network function virtualization comes with a few risks. One of the main concerns can be the fact that security controls are not entirely effective and NFVs are at risk of cyberattacks. By virtualizing network functions we expose them to the dangers of the cyber world, like malware or phishing attacks that do not take place within traditional, physical devices. When using network function virtualization the network traffic can be less transparent, although all of this can be kept under control when managed properly.

NFV vs. SDN 

Network function virtualization (NFV) and software-defined networking (SDN) technologies are similar and can easily be mistaken for one another. NFV’s main goal is to decouple hardware from network functions and move those services into virtual network environments. It is supposed to lower implementation and operational costs and simplify management. Whereas SDN’s purpose is to separate the execution of network functions from configuration control and management, meaning it can hide a low-level configuration from the client. A client is only responsible for deciding what things are connected to each other and does not have to worry about the rest. SDN is especially beneficial in environments where network automation is prioritized. It is possible to use one without another but they are complementary so using both of these technologies together can be beneficial.

Read more:

Thumbnail of an article about Infographic: The NFV MANO model in practice
NETWORKS

Infographic: The NFV MANO model in practice

Please bear in mind that this infographic does not pretend to present a complete and ultimate mapping. It is only our vision based on the specific products. Since it is tough to precisely map the existing solutions, the model itself should be treated as an approximation. The elements presented are only examples and obviously do not show every solution available on the market. We are always eager to discuss this subject and consider different points of view.
Thumbnail of an article about Seamlessly transitioning to CNFs with Tungsten Fabric
NETWORKS

Seamlessly transitioning to CNFs with Tungsten Fabric

Cloud-native Network Functions (CNFs), by all appearances, seem to be the next big trend in network architecture. They are a logical step forward in the evolution of network architecture. Networks were initially based on physical hardware like routers, load balancers and firewalls. Such physical equipment was then replaced by today’s standard, VMs to create Virtualized Network Functions (VNFs). Now, a lot of research is going into moving these functions into containers. In such a scenario, a container orchestration platform would be responsible for hosting CNFs.
Thumbnail of an article about Uncontainerizable VNFs in a CNF environment
NETWORKS

Uncontainerizable VNFs in a CNF environment

Cloud-native network functions (CNFs, for short) are a hot topic in network architecture. CNFs use containers as the base for network functions and thus would replace today’s most widely used standard, Virtual Network Functions (VNFs). In such a scenario, a container orchestration platform--Kubernetes, say--could be responsible not only for orchestrating the containers, but also for directing network traffic to proper pods. While this remains an area under research, it has aroused considerable interest among industry leaders.
Thumbnail of an article about The difference between SDN and NFV — a simple guide
NETWORKS

The difference between SDN and NFV — a simple guide

Network Function Virtualization (NFV) and Software Defined Networking (SDN) technologies are similar and can easily be mistaken for one another. Given their growing popularity of late, it is good to know what SDN and NFV stand for, why they are so popular and what business benefits you can expect from them. In 2016, Cisco published the report “The Zettabyte Era: Trends and Analysis” announcing that by the end of 2016 annual global IP traffic would pass a zettabyte. To be mathematically precise, a zettabyte is a measure of storage capacity equal to 1021 (1,000,000,000,000,000,000,000) bytes.

Get your project estimate

For businesses that need support in their software or network engineering projects, please fill in the form and we’ll get back to you within one business day.

For businesses that need support in their software or network engineering projects, please fill in the form and we’ll get back to you within one business day.

We guarantee 100% privacy.

Trusted by leaders:

Cisco Systems
Palo Alto Services
Equinix
Jupiter Networks
Nutanix