DocumentCode :
710566
Title :
Cost-based placement of vDPI functions in NFV infrastructures
Author :
Bouet, Mathieu ; Leguay, Jeremie ; Conan, Vania
Author_Institution :
Commun. & Security, Thales, Gennevilliers, France
fYear :
2015
fDate :
13-17 April 2015
Firstpage :
1
Lastpage :
9
Abstract :
Network Functions Virtualization (NFV) is transforming how networks are architected and network services delivered. The network is more flexible and adaptable, it can scale with traffic demands. To manage video traffic in the network, or get protection from cyber-attacks, Deep Packet Inspection is increasingly deployed at specific locations in the network. The virtual Deep Packet Inspection (vDPI) engines can be dynamically deployed as software on commodity servers within emerging NFV infrastructures. For a network operator, deploying a set of vDPIs over the network is a matter of finding the appropriate placement that meets the traffic management or cyber-security targets (such as the number of inspected flows) and operational cost constraints (license fees, network efficiency or power consumption). In this work, we formulate the vDPI placement problem as a cost minimization problem. The cost captures the different objectives the operator is pursuing. A placement of vDPIs on the network nodes realizes a trade-off between these possibly conflicting goals. We cast the problem as a multi-commodity flow problem and solve it as an Integer Linear Program (ILP). We then devise a centrality-based greedy algorithm and assess its validity by comparing it with the ILP optimal solution on a real data set (GEANT network with 22 nodes and real traffic matrix). We further analyze the scalability of the heuristic by applying it to larger random networks of up to 100 nodes. The results show the network structure and the costs strongly influence time performance. They also show that after a size limit (between 40 to 80 nodes in our case), the execution time increases exponentially due to combinatorial issues. Finally, they demonstrate that the heuristic well approximate the optimal on smaller problem instances.
Keywords :
combinatorial mathematics; greedy algorithms; integer programming; linear programming; minimisation; telecommunication power management; telecommunication traffic; virtualisation; GEANT network; ILP; NFV infrastructures; centrality-based greedy algorithm; commodity servers; cost minimization problem; cost-based placement; cyber-attacks; cyber-security targets; execution time; integer linear program; license fees; multicommodity flow problem; network efficiency; network function virtualization; network operator; network services; operational cost constraints; power consumption; real traffic matrix; traffic demands; traffic management; vDPI functions; vDPI placement problem; video traffic; virtual deep packet inspection engines; Bandwidth; Engines; Greedy algorithms; Licenses; Monitoring; Probes; Software;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Network Softwarization (NetSoft), 2015 1st IEEE Conference on
Conference_Location :
London
Type :
conf
DOI :
10.1109/NETSOFT.2015.7116121
Filename :
7116121
Link To Document :
بازگشت