论文标题
将虚拟安全功能引入NFV应用程序的延迟感知位置
Introducing Virtual Security Functions into Latency-aware Placement for NFV Applications
论文作者
论文摘要
软件定义的网络和网络功能虚拟化(NFV)的出现触发了向完全虚拟化的网络环境转向的转变。网络服务提供商通过这些技术解锁了巨大的功能,这使他们能够通过通过生成服务功能链(SFC)实时部署其网络服务来动态适应用户需求。但是,NFV仍然面临阻碍其全部潜力的挑战,包括可用性保证,网络安全和其他绩效要求。因此,NFV应用程序的部署仍然至关重要,因为它应该符合不同的服务水平协议,同时确保虚拟化功能的安全性。在本文中,我们通过将虚拟安全功能(VSF)引入NFV应用程序的潜伏期部署来应对确保这些SFC的挑战。这项工作确保了SFC组件的最佳位置,包括安全功能,同时考虑性能限制和VSF的操作规则,例如,功能'联盟,接近性和反性。本文开发了一个混合整数线性编程模型,以最佳地放置所有请求的SFC,同时满足上述约束,并最大程度地减少每个SFC的延迟以及SFC组件之间的互通信延迟。根据虚拟化进化的数据包核心用例中的贪婪算法评估了模拟,并在实现最小延迟的同时显示出了有希望的结果。
The shift towards a completely virtualized networking environment is triggered by the emergence of software defined networking and network function virtualization (NFV). Network service providers have unlocked immense capabilities by these technologies, which have enabled them to dynamically adapt to user needs by deploying their network services in real-time through generating Service Function Chain (SFCs). However, NFV still faces challenges that hinder its full potentials, including availability guarantees, network security, and other performance requirements. For this reason, the deployment of NFV applications remains critical as it should meet different service level agreements while insuring the security of the virtualized functions. In this paper, we tackle the challenge of securing these SFCs by introducing virtual security functions (VSFs) into the latencyaware deployment of NFV applications. This work insures the optimal placement of the SFC components including the security functions while considering the performance constraints and the VSFs' operational rules such as, functions' alliance, proximity, and anti-affinity. This paper develops a mixed integer linear programming model to optimally place all the requested SFCs while satisfying the above constraints and minimizing the latency of every SFC and the intercommunication delay between the SFC components. The simulations are evaluated against a greedy algorithm on the virtualized Evolved Packet Core use case and have shown promising results in maintaining the security rules while achieving minimum delays.