skip to main content
10.1145/3185467.3185495acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
research-article

Probius: Automated Approach for VNF and Service Chain Analysis in Software-Defined NFV

Published:28 March 2018Publication History

ABSTRACT

As the complexity of modern networks increases, virtualization techniques, such as software-defined networking (SDN) and network function virtualization (NFV), get highlighted to achieve various network management and operating requirements. However, those virtualization techniques (specifically, NFV) have a critical issue that the performance of virtualized network functions (VNFs) is easily affected by diverse environmental factors (e.g., various workloads, resource contentions among VNFs), so resulting in unexpected performance degradations - performance uncertainty. Unfortunately, existing approaches mostly provide limited information about a single VNF or the underlying infrastructure (e.g., Xen, KVM), which is deficient in reasoning why the performance uncertainties occur. For such reasons, we first deeply investigate the behaviors of multiple VNFs along service chains in NFV environments, and define a set of critical performance features for each layer in the NFV hierarchical stack. Based on our investigations and findings, we introduce an automated analysis system, Probius, providing the comprehensive view of VNFs and their service chains on the basis of NFV architectural characteristics. Probius collects most possible NFV performance related features efficiently, analyzes the behaviors of NFV, and finally detects abnormal behaviors of NFV - possible reasons of performance uncertainties. To show the effectiveness of Probius, we have deployed 7 open-source VNFs and found 5 interesting performance issues caused by environmental factors.

References

  1. Emerging Threats Open Rulesets. https://rules.emergingthreats.net. (online, 2018. 02.).Google ScholarGoogle Scholar
  2. Ftrace: Linux Kernel Internal Tracer. https://www.kernel.org/doc/Documentation/trace/ftrace.txt. (online, 2018. 02.).Google ScholarGoogle Scholar
  3. GNU Profiler. https://ftp.gnu.org/old-gnu/Manuals/gprof-2.9.1/html_mono/gprof.html. (online, 2018. 02.).Google ScholarGoogle Scholar
  4. iPerf: The TCP, UDP and SCTP Network Bandwidth Measurement Tool. https://iperf.fr. (online, 2018. 02.).Google ScholarGoogle Scholar
  5. Java Profiler. https://www.ej-technologies.com/products/jprofiler/overview.html. (online, 2018. 02.).Google ScholarGoogle Scholar
  6. Linux Perf. https://perf.wiki.kernel.org/index.php/Main_Page. (online, 2018. 02.).Google ScholarGoogle Scholar
  7. Netfilter/iptables Project. https://www.netfilter.org. (online, 2018. 02.).Google ScholarGoogle Scholar
  8. Netsniff-ng: A Free Linux Networking Toolkit. http://netsniff-ng.org. (online, 2018. 02.).Google ScholarGoogle Scholar
  9. NumPy. http://www.numpy.org. (online, 2018. 02.).Google ScholarGoogle Scholar
  10. OpenStack. https://www.openstack.org. (online, 2018. 02.).Google ScholarGoogle Scholar
  11. pandas: Python Data Analysis Library. http://pandas.pydata.org. (online, 2018. 02.).Google ScholarGoogle Scholar
  12. Performance Events in the KVM Kernel Module. http://www.linux-kvm.org/page/Perf_events. (online, 2018. 02.).Google ScholarGoogle Scholar
  13. PSUtil: A Cross-platform Library for Process and System Utilities. https://github.com/giampaolo/psutil. (online, 2018. 02.).Google ScholarGoogle Scholar
  14. Snort: Network Intrusion Detection & Prevention System. https://www.snort.org. (online, 2018. 02.).Google ScholarGoogle Scholar
  15. Snort v2.9 Rules for Registered Users. https://www.snort.org/downloads/#rule-downloads. (online, 2018. 02.).Google ScholarGoogle Scholar
  16. SQLite. https://www.sqlite.org. (online, 2018. 02.).Google ScholarGoogle Scholar
  17. StatsModels: Statistics in Python. http://www.statsmodels.org/stable/index.html. (online, 2018. 02.).Google ScholarGoogle Scholar
  18. Suricata: Open Source IDS / IPS / NSM Engine. https://suricata-ids.org. (online, 2018. 02.).Google ScholarGoogle Scholar
  19. TCPDUMP: A Packet Analyzer. http://www.tcpdump.org. (online, 2018. 02.).Google ScholarGoogle Scholar
  20. Trace-cmd: A User-space Front-end Command-line Tool for Ftrace. https://git.kernel.org/pub/scm/linux/kernel/git/rostedt/trace-cmd.git. (online, 2018. 02.).Google ScholarGoogle Scholar
  21. James W Anderson, Ryan Braud, Rishi Kapoor, George Porter, and Amin Vahdat. 2012. xOMB: Extensible Open Middleboxes with Commodity Servers. In Proceedings of the ACM/IEEE symposium on Architectures for networking and communications systems. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. ATTO Research. Athene: Software-defined Elastic NFV Platform. http://www.atto-research.com/en/solutions/athene. (online, 2018. 02.).Google ScholarGoogle Scholar
  23. Paul Barham, Boris Dragovic, Keir Fraser, Steven Hand, Tim Harris, Alex Ho, Rolf Neugebauer, Ian Pratt, and Andrew Warfield. 2003. Xen and the Art of Virtualization. In ACM SIGOPS Operating Systems Review. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Kenneth A Bollen and Robert W Jackman. 1985. Regression Diagnostics: An Expository Treatment of Outliers and Influential Cases. Sociological Methods & Research (1985).Google ScholarGoogle Scholar
  25. Matthias Bolte, Michael Sievers, Georg Birkenheuer, Oliver Niehörster, and André Brinkmann. 2010. Non-intrusive Virtualization Management using libvirt. In Proceedings of the Conference on Design, Automation and Test in Europe. European Design and Automation Association. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Lianjie Cao, Puneet Sharma, Sonia Fahmy, and Vinay Saxena. 2015. NFV-Vital: A Framework for Characterizing the Performance of Virtual Network Functions. In IEEE Conference on Network Function Virtualization and Software Defined Network. IEEE.Google ScholarGoogle Scholar
  27. R Dennis Cook. 1979. Influential Observations in Linear Regression. J. Amer. Statist. Assoc. (1979).Google ScholarGoogle Scholar
  28. Tiago de Paula Peixoto. graph-tool: Efficient Network Analysis. https://graph-tool.skewed.de. (online, 2018. 02.).Google ScholarGoogle Scholar
  29. Paul Emmerich, Daniel Raumer, Florian Wohlfart, and Georg Carle. 2014. Performance Characteristics of Virtual Switching. In IEEE International Conference on Cloud Networking. IEEE.Google ScholarGoogle Scholar
  30. Michio Honda, Felipe Huici, Giuseppe Lettieri, and Luigi Rizzo. 2015. mSwitch: A Highly-Scalable, Modular Software Switch. In Proceedings of the ACM Symposium on Software Defined Networking Research. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Wei Huang, Jiuxing Liu, Bulent Abali, and Dhabaleswar K Panda. 2006. A Case for High Performance Computing with Virtual Machines. In Proceedings of the Annual International Conference on Supercomputing. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Jinho Hwang, KK Ramakrishnan, and Timothy Wood. 2014. NetVM: High Performance and Flexible Networking using Virtualization on Commodity Platforms. In Proceedings of the USENIX Conference on Networked Systems Design and Implementation. USENIX Association. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Intel. DPDK. http://dpdk.org. (online, 2018. 02.).Google ScholarGoogle Scholar
  34. Avi Kivity, Yaniv Kamay, Dor Laor, Uri Lublin, and Anthony Liguori. 2007. kvm: the Linux Virtual Machine Monitor. In Linux Symposium.Google ScholarGoogle Scholar
  35. Younggyun Koh, Rob Knauerhase, Paul Brett, Mic Bowman, Zhihua Wen, and Calton Pu. 2007. An Analysis of Performance Interference Effects in Virtual Environments. In IEEE International Symposium on Performance Analysis of Systems & Software. IEEE.Google ScholarGoogle Scholar
  36. Eddie Kohler, Robert Morris, Benjie Chen, John Jannotti, and M Frans Kaashoek. 2000. The Click Modular Router. ACM Transactions on Computer Systems (2000). Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. KVM. VhostNet. https://www.linux-kvm.org/page/UsingVhost. (online, 2018. 02.).Google ScholarGoogle Scholar
  38. John Levon and Philippe Elie. Oprofile: A System Profiler for Linux. (2004).Google ScholarGoogle Scholar
  39. Holger Karl Manuel Peuster. 2016. Understand Your Chains: Towards Performance Profile-based Network Service Management. In European Workshop on Software Defined Networks. IEEE.Google ScholarGoogle Scholar
  40. Joao Martins, Mohamed Ahmed, Costin Raiciu, Vladimir Olteanu, Michio Honda, Roberto Bifulco, and Felipe Huici. 2014. ClickOS and the Art of Network Function Virtualization. In Proceedings of the USENIX Conference on Networked Systems Design and Implementation. USENIX Association. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Nick McKeown, Tom Anderson, Hari Balakrishnan, Guru Parulkar, Larry Peterson, Jennifer Rexford, Scott Shenker, and Jonathan Turner. 2008. OpenFlow: Enabling Innovation in Campus Networks. ACM SIGCOMM Computer Communication Review (2008). Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Yiduo Mei, Ling Liu, Xing Pu, Sankaran Sivathanu, and Xiaoshe Dong. 2013. Performance Analysis of Network I/O Workloads in Virtualized Data Centers. IEEE Transactions on Services Computing (2013). Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Priyanka Naik, Dilip Kumar Shaw, and Mythili Vutukuru. {n. d.}. NFVPerf: Online Performance Monitoring and Bottleneck Detection for NFV. ({n. d.}).Google ScholarGoogle Scholar
  44. Ruslan Nikolaev and Godmar Back. 2011. Perfctr-xen: A Framework for Performance Counter Virtualization. In ACM SIGPLAN Notices. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. NTOP. PF_RING. http://www.ntop.org/products/packet-capture/pf_ring. (online, 2017. 2018. 02.).Google ScholarGoogle Scholar
  46. Shoumik Palkar, Chang Lan, Sangjin Han, Keon Jang, Aurojit Panda, Sylvia Ratnasamy, Luigi Rizzo, and Scott Shenker. 2015. E2: A Framework for NFV Applications. In Proceedings of the ACM Symposium on Operating Systems Principles. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Ben Pfaff, Justin Pettit, Teemu Koponen, Ethan J Jackson, Andy Zhou, Jarno Rajahalme, Jesse Gross, Alex Wang, Joe Stringer, Pravin Shelar, et al. 2015. The Design and Implementation of Open vSwitch. In Proceedings of the USENIX Conference on Networked Systems Design and Implementation. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Xing Pu, Ling Liu, Yiduo Mei, Sankaran Sivathanu, Younggyun Koh, Calton Pu, and Yuanda Cao. 2013. Who is your neighbor: Net I/O Performance Interference in Virtualized Clouds. IEEE Transactions on Services Computing (2013). Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Kaushik Kumar Ram, Alan L Cox, Mehul Chadha, Scott Rixner, and TW Barr. 2013. Hyper-Switch: A Scalable Software Virtual Switching Architecture. In USENIX Annual Technical Conference. USENIX Association. Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. Luigi Rizzo. 2012. Netmap: A Novel Framework for Fast Packet I/O. In USENIX Security Symposium. USENIX Association. Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. Luigi Rizzo and Giuseppe Lettieri. 2012. Vale: A Switched Ethernet for Virtual Machines. In Proceedings of the International Conference on Emerging Networking Experiments and Technologies. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. Raphael Vicente Rosa, Christian Esteve Rothenberg, and Robert Szabo. 2015. VBaaS: VNF Benchmark-as-a-service. In European Workshop on Software Defined Networks. IEEE. Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. Rubicon Communications, LLC. pfSense: Open Source Firewall. https://www.pfsense.org. (online, 2018. 02.).Google ScholarGoogle Scholar
  54. Rusty Russell. 2008. virtio: Towards A De-facto Standard for Virtual I/O Devices. ACM SIGOPS Operating Systems Review (2008). Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. SDxCentral. SDN and NFV Market Size and Forecast Report 2015. https://www.sdxcentral.com/reports/sdn-nfv-market-size-forecast-report-2015. (online, 2018. 02.).Google ScholarGoogle Scholar
  56. Vyas Sekar, Norbert Egi, Sylvia Ratnasamy, Michael K Reiter, and Guangyu Shi. 2012. Design and Implementation of a Consolidated Middlebox Architecture. In Proceedings of the USENIX conference on Networked Systems Design and Implementation. USENIX Association. Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. Zhiming Shen, Sethuraman Subbiah, Xiaohui Gu, and John Wilkes. 2011. Cloud-scale: Elastic Resource Scaling for Multi-tenant Cloud Systems. In Proceedings of the ACM Symposium on Cloud Computing. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. VyOS Project. VyOS: An Open Source Router Operating System. https://vyos.io. (online, 2018. 02.).Google ScholarGoogle Scholar
  59. Timothy Wood, Prashant Shenoy, Arun Venkataramani, and Mazin Yousif. 2009. Sandpiper: Black-box and Gray-box Resource Management for Virtual Machines. Computer Networks (2009). Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. Tianlong Yu, Shadi Abdollahian Noghabi, Shachar Raindel, Hongqiang Harry Liu, Jitu Padhye, and Vyas Sekar. 2016. FreeFlow: High Performance Container Networking. In Proceedings of the workshop on Hot topics in Networks. Google ScholarGoogle ScholarDigital LibraryDigital Library
  61. Wei Zhang, Guyue Liu, Wenhui Zhang, Neel Shah, Phillip Lopreiato, Gregoire Todeschi, KK Ramakrishnan, and Timothy Wood. 2016. OpenNetVM: A Platform for High Performance Network Service Chains. In Proceedings of the workshop on Hot topics in Middleboxes and Network Function Virtualization. ACM. Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Probius: Automated Approach for VNF and Service Chain Analysis in Software-Defined NFV

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          SOSR '18: Proceedings of the Symposium on SDN Research
          March 2018
          195 pages
          ISBN:9781450356640
          DOI:10.1145/3185467

          Copyright © 2018 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 28 March 2018

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed limited

          Acceptance Rates

          Overall Acceptance Rate7of43submissions,16%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader