As IP traffic grows by leaps and bounds, networking services become an increasingly expensive proposition. Many network operators are exploring network functions virtualization (NFV) as a way to effectively scale services so revenue from data consumption is not outpaced by a the cost of handling increased traffic. A new white paper from Spirent explores NFV use cases and benefits, validation of NFV environments, and the role testing plays in successful deployments.
The white paper, “Testing Methodologies for Validating NFV Environments,” focuses on the importance of testing virtualized functions, virtual environments, and end-to-end networks prior to deployment. Widespread NFV deployment faces many challenges, from the cost of replacing routers and appliances to new pricing and revenue models. The white paper argues thorough testing of NFV is critical to the technology’s fast adoption, as it is essential to minimizing network outages post-deployment.
The Spirent white paper, which you can access below, describes different methodologies to address the most common testing challenges:
- Functional and performance testing of network functions: ensuring that the performance of virtual environments is equivalent to that of the corresponding physical environment
- Validating network services’ reliability: making sure that node, link, and service failures are detected within milliseconds and that corrective action is taken promptly without service degradation
- Ensuring portability of VMs and stability of NFV environments: assigning new VMs the appropriate number of compute cores and storage without degrading existing services
- Active and passive monitoring of virtual networks: providing performance visibility across the entire footprint of service-provider and data-center networks to ensure end customers’ services adhere to established SLAs.
The white paper examines and explains different physical and virtual solutions for functional and performance testing of virtualized Layer 2 and Layer 3 network functions, application security functions, and evolved packet core (EPC) functions. The paper is complimentary for those who fill out the form below.