SlideShare a Scribd company logo
@thisNatasha
MaRNEW Workshop
24-25 Sept 2015
Post Workshop Update
Natasha Rooney
@thisNatasha
@thisNatasha
Technical Programme Committee
- Joe Hildebrand, IAB / Cisco, USA
- Stephen Farrell, IETF AD / Trinity College Dublin, Ireland
- Jari Arkko, IETF Chair / Ericsson, Finland
- Natasha Rooney, GSMA, UK
- Spencer Dawkins, IETF AD, USA
- Kathleen Moriarty, IETF AD / EMC, USA
- Barry Leiba, IETF AD / Huawei, USA
- Alia Atlas, IETF AD / Juniper Networks, USA
- Ben Campbell, IETF AD / Oracle, USA
- Karen O’Donoghue, ISOC, USA
- Phil Roberts, ISOC, USA
- Kevin Smith, Vodafone, UK
- Sanjay Mishra, Verizon, USA
- Istvan Lajtos, GSMA, UK
- Salvatore Loreto, Ericsson, Finland
- Diego Lopez, Telefonica, Spain
- Dan Druta, AT&T, USA
- Brian Trammell, ETH Zurich, Switzerland
@thisNatasha
MaRNEW Goals
“Mobile networks have a set of requirements and properties which places a
large emphasis on sophisticated bandwidth optimization. Encryption is
increasing on the internet which is a good thing for consumer and business
privacy and security. Many existing mobile bandwidth optimization
solutions primarily operate on non-encrypted communications; this can
lead to performance issues being amplified on mobile networks. Encryption
on networks will continue to increase; and with this understanding the
workshop aims to understand how we can solve the issues of bandwidth
optimization and performance on radio networks in this encrypted world.”
@thisNatasha
Sessions
@thisNatasha
Session Types:
Scene Setting
Network or Transport Solution
Application Layer
Regulation
@thisNatasha
Scene Setting Sessions
@thisNatasha
Scope
- In discussion we should assume: No broken crypto, Ciphertext increasingly common,
congestion does need to be controlled as do other transport issues and Network
management including efficient use of resources, in RAN and elsewhere, has to work.
- How/why is RAN different for transport; help us understand the complexities of
the RAN and how hard it is to manage and why those matter.
- What are the precise problems caused by more ciphertext.
- Identify players, incl. Users, and resulting tensions and how ciphertext changes those.
- Some solutions will be radically changed by ciphertext, it's ok to talk about that
- As good as possible quality of experience for end user is a goal.
- Our aim for the next two days is to analyse the situation and identify specific
achievable tasks that could be tackled in the IETF or GSMA (or elsewhere?) and that
improve the Internet given the assumptions above.
- We should not delve into:
- Ways of doing interception (legal or not), see RFC2804 for why
- Unpredictable political actions
@thisNatasha
Encryption Deployment Considerations
The Effect of Ubiquitous Encryption
- increased encryption impact
- collection of current security and network management function
impact
Network Management of Encrypted Traffic
- approaches to help manage encrypted traffic, without breaching user
privacy or security
@thisNatasha
Trust Models and User Choice (Privacy)
- 64% of users said concerns over privacy have increased
- 67% would like to do more to protect privacy
Users want privacy, and the web and
internet are responding
- Where does network operators sit in the user experience chain?
- Consent: user, network, endpoints.
- Helping users understand costs and benefits.
@thisNatasha
Network or Transport Solution
Sessions
@thisNatasha
Sending Data Up / Down for
Network Management Benefits
Does it make sense for apps to send data to networks?
Collaborative Frameworks
- Mobile Throughput Guidance
- Meaningful capacity sharing
Transport
- Fix TCP, or use something else?
- TCP feedback to senders and receivers
Solutions?
- Base Station located
- Latency vs. bandwidth, 0 or 1 bit information
Understanding Mobile Networks
- 3GPP defined PCC-QoS mechanism
- Middleboxes treat data differently according to types
@thisNatasha
Transport Layer: Issues, Optimisation and Solutions
Collaboration is essential, and the whole path matters.
Transport Innovations
- Congestion Control
- 0 bit
- 1 bit: how and where
- Traffic Classification
Issues
- Resource Optimisation
- Buffer Bloat
- Meta data schemes can be exploited
Need data and metrics.
16:00 - 17:00: Roundup
@thisNatasha
Application Layer
Session
@thisNatasha
Application Layer Optimisation, Caching and CDNs
Actors: Application providers, Network, Device. Can (and do…
sometimes) work together!
- CDN as a trusted content provider
- Mobile Networks Adhering (or not) to Standards
- Optimisations: network layer or transport layer?
Panelists: One Request?
- Metrics to allow for better Resource Allocation
- Metrics
- Network is calibrated to handle applications best
- Anything that makes it easier for the application to adapt
- Blind cache.
16:00 - 17:00: Roundup
@thisNatasha
Regulation
Session
@thisNatasha
Technical Analysis and Response to
Potential Regulatory Reaction
Understanding
- Typical mobile network regulations
- Penalties
- Effects of Encryption on Regulations
Response
- Differences in IETF and GSMA
- Application Layer
- Scalability
- Transparency reports.
Note: Chatham House Rule.
16:00 - 17:00: Roundup
@thisNatasha
Ideas
@thisNatasha
- Mobile Throughput Guidance
- One bit for latency bandwidth tradeoff
- Small amount of data from network to user
(ECN)
- API for app to query network, or vice versa
- Blind Caching
- Standard approach for operator to offer
services to Content Providers
- Better Collaboration
- Sharing information hop by hop
- Metrics and metric standards
- Testing / Debugging
- Trust model / framework (e.g. for spud)
- Keyless SSL
- Meaningful capacity sharing; reacting
correctly to wireless link layer condition
- 5G
The Ideas
- IETF gain an understanding of RAN
- Reviews and comments on 3GPP perspective
- AQM
- Evolving TCP (or evolving transport)
- Congestion Control
- SPROUT (MIT)
- PCC (Performance & Congestion
Control)
- How to do congestion controlling in RAN
- Base Station
- Controller that can adapt to a radio
environment and provide a better
experience, and preserve E2E
- Identify traffic types via 5-tuple
- Heuristics (for best effort only?)
- CDNs / caches in the network
- CDN improvements
16:00 - 17:00: Roundup
Not confirmed! Just an incomplete list of generated ideas:
@thisNatasha
The Ideas
- Evolving TCP: TCP inadequate for RAN, needs better congestion control.
(CROWN)
- Mobile Throughput Guidance (MTG): IETF draft: mechanism and protocol
elements that allow the cellular network to provide near real-time information on
capacity available to the TCP server. (CROWN)
- (Zero or) One bit for latency bandwidth tradeoff: Test networks with no network
management and then add pieces of metadata to see if network performance
improves. (Research)
- Blind Caching: Allow the transparent caching of encrypted data. (Draft)
- Metrics and metric standards: Proper and standardised metrics to insure new
solutions are providing a better performance for end users. (Research)
- Better Collaboration: between operators and you guys by working through
technical solutions together.
- CANVaS: Controlled Access for Network Validation of Signatures
16:00 - 17:00: Roundup
@thisNatasha
What’s Next?
@thisNatasha
Minutes & Report
- Release minutes (Oct 2015)
- Release report (Dec 2015)
- Take “Generated Ideas List”, distill and plan their
development on mailing lists (now onwards)
- Work on metrics proposals (now)
@thisNatasha
Final Comments...
Main Observations
- Encryption causes solvable issues
- Identified technical items
- Cooperation is key
- Next generation of mobile networks could mean great collaboration
- Customer experience and privacy as highest priorities.
New Items
- Metrics and testing
- Transport
- Caching mechanisms
- Collaborative exchange mechanisms.
16:00 - 17:00: Roundup
@thisNatasha
Thank-you!
- AT&T for providing the location (Dan Druta)
- ISOC for sponsoring (Karen O’Donoghue)
- GSMA for sponsoring (Istvan Lajtos)
- SAAG for the speaking slot
- You guys for listening
- And Cindy Morgan for being awesome.
09:00 - 09:20: Introduction

More Related Content

Similar to MARNEW at IETF 94

Transforming optical networking with AI
Transforming optical networking with AITransforming optical networking with AI
Transforming optical networking with AI
ADVA
 
Dynamic Semantics for Semantics for Dynamic IoT Environments
Dynamic Semantics for Semantics for Dynamic IoT EnvironmentsDynamic Semantics for Semantics for Dynamic IoT Environments
Dynamic Semantics for Semantics for Dynamic IoT Environments
PayamBarnaghi
 
13.) analytics (user experience)
13.) analytics (user experience)13.) analytics (user experience)
13.) analytics (user experience)
Jeff Green
 
TLEN_AWL_LECTURE.pptx
TLEN_AWL_LECTURE.pptxTLEN_AWL_LECTURE.pptx
TLEN_AWL_LECTURE.pptx
Wisman Beb
 
Top Down Network Design - ebrahma.com
Top Down Network Design - ebrahma.comTop Down Network Design - ebrahma.com
Top Down Network Design - ebrahma.com
Pawan Sharma
 
Multi port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniquesMulti port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniques
IJARIIT
 
Big Data Analytics and Advanced Computer Networking Scenarios
Big Data Analytics and Advanced Computer Networking ScenariosBig Data Analytics and Advanced Computer Networking Scenarios
Big Data Analytics and Advanced Computer Networking Scenarios
Stenio Fernandes
 
Monetizing Big Data at Telecom Service Providers
Monetizing Big Data at Telecom Service ProvidersMonetizing Big Data at Telecom Service Providers
Monetizing Big Data at Telecom Service Providers
DataWorks Summit
 
th1330-1410effectenbeurszaal4-3v2-140424180955-phpapp01 (1).pdf
th1330-1410effectenbeurszaal4-3v2-140424180955-phpapp01 (1).pdfth1330-1410effectenbeurszaal4-3v2-140424180955-phpapp01 (1).pdf
th1330-1410effectenbeurszaal4-3v2-140424180955-phpapp01 (1).pdf
TarekHassan840678
 
Monitizing Big Data at Telecom Service Providers
Monitizing Big Data at Telecom Service ProvidersMonitizing Big Data at Telecom Service Providers
Monitizing Big Data at Telecom Service Providers
DataWorks Summit
 
Optimal Rate Allocation and Lost Packet Retransmission in Video Streaming
Optimal Rate Allocation and Lost Packet Retransmission in Video StreamingOptimal Rate Allocation and Lost Packet Retransmission in Video Streaming
Optimal Rate Allocation and Lost Packet Retransmission in Video Streaming
IRJET Journal
 
Cloud-Scale BGP and NetFlow Analysis
Cloud-Scale BGP and NetFlow AnalysisCloud-Scale BGP and NetFlow Analysis
Cloud-Scale BGP and NetFlow Analysis
Alex Henthorn-Iwane
 
PacketsNeverLie
PacketsNeverLiePacketsNeverLie
PacketsNeverLie
Rick Kingsley
 
Tune Up Your Network for the New Year
Tune Up Your Network for the New YearTune Up Your Network for the New Year
Tune Up Your Network for the New Year
Savvius, Inc
 
Proposal for System Analysis and Desing
Proposal for System Analysis and DesingProposal for System Analysis and Desing
Proposal for System Analysis and Desing
Md Khaza Main Uddin
 
Ben Rothke - NBA for The Security Professional
Ben Rothke - NBA for The Security ProfessionalBen Rothke - NBA for The Security Professional
Ben Rothke - NBA for The Security Professional
Ben Rothke
 
DISCUSSION 1The Internet of Things (IoT) is based upon emerging .docx
DISCUSSION 1The Internet of Things (IoT) is based upon emerging .docxDISCUSSION 1The Internet of Things (IoT) is based upon emerging .docx
DISCUSSION 1The Internet of Things (IoT) is based upon emerging .docx
elinoraudley582231
 
Richard Bennett's Presentation at Emerging Communication Conference & Awards ...
Richard Bennett's Presentation at Emerging Communication Conference & Awards ...Richard Bennett's Presentation at Emerging Communication Conference & Awards ...
Richard Bennett's Presentation at Emerging Communication Conference & Awards ...
eCommConf
 
2.2. Case Study #2 DTGOVDTGOV is a public company that was crea.docx
2.2. Case Study #2 DTGOVDTGOV is a public company that was crea.docx2.2. Case Study #2 DTGOVDTGOV is a public company that was crea.docx
2.2. Case Study #2 DTGOVDTGOV is a public company that was crea.docx
eugeniadean34240
 
ION Costa Rica - About the IETF and How to Get Involved
ION Costa Rica - About the IETF and How to Get InvolvedION Costa Rica - About the IETF and How to Get Involved
ION Costa Rica - About the IETF and How to Get Involved
Deploy360 Programme (Internet Society)
 

Similar to MARNEW at IETF 94 (20)

Transforming optical networking with AI
Transforming optical networking with AITransforming optical networking with AI
Transforming optical networking with AI
 
Dynamic Semantics for Semantics for Dynamic IoT Environments
Dynamic Semantics for Semantics for Dynamic IoT EnvironmentsDynamic Semantics for Semantics for Dynamic IoT Environments
Dynamic Semantics for Semantics for Dynamic IoT Environments
 
13.) analytics (user experience)
13.) analytics (user experience)13.) analytics (user experience)
13.) analytics (user experience)
 
TLEN_AWL_LECTURE.pptx
TLEN_AWL_LECTURE.pptxTLEN_AWL_LECTURE.pptx
TLEN_AWL_LECTURE.pptx
 
Top Down Network Design - ebrahma.com
Top Down Network Design - ebrahma.comTop Down Network Design - ebrahma.com
Top Down Network Design - ebrahma.com
 
Multi port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniquesMulti port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniques
 
Big Data Analytics and Advanced Computer Networking Scenarios
Big Data Analytics and Advanced Computer Networking ScenariosBig Data Analytics and Advanced Computer Networking Scenarios
Big Data Analytics and Advanced Computer Networking Scenarios
 
Monetizing Big Data at Telecom Service Providers
Monetizing Big Data at Telecom Service ProvidersMonetizing Big Data at Telecom Service Providers
Monetizing Big Data at Telecom Service Providers
 
th1330-1410effectenbeurszaal4-3v2-140424180955-phpapp01 (1).pdf
th1330-1410effectenbeurszaal4-3v2-140424180955-phpapp01 (1).pdfth1330-1410effectenbeurszaal4-3v2-140424180955-phpapp01 (1).pdf
th1330-1410effectenbeurszaal4-3v2-140424180955-phpapp01 (1).pdf
 
Monitizing Big Data at Telecom Service Providers
Monitizing Big Data at Telecom Service ProvidersMonitizing Big Data at Telecom Service Providers
Monitizing Big Data at Telecom Service Providers
 
Optimal Rate Allocation and Lost Packet Retransmission in Video Streaming
Optimal Rate Allocation and Lost Packet Retransmission in Video StreamingOptimal Rate Allocation and Lost Packet Retransmission in Video Streaming
Optimal Rate Allocation and Lost Packet Retransmission in Video Streaming
 
Cloud-Scale BGP and NetFlow Analysis
Cloud-Scale BGP and NetFlow AnalysisCloud-Scale BGP and NetFlow Analysis
Cloud-Scale BGP and NetFlow Analysis
 
PacketsNeverLie
PacketsNeverLiePacketsNeverLie
PacketsNeverLie
 
Tune Up Your Network for the New Year
Tune Up Your Network for the New YearTune Up Your Network for the New Year
Tune Up Your Network for the New Year
 
Proposal for System Analysis and Desing
Proposal for System Analysis and DesingProposal for System Analysis and Desing
Proposal for System Analysis and Desing
 
Ben Rothke - NBA for The Security Professional
Ben Rothke - NBA for The Security ProfessionalBen Rothke - NBA for The Security Professional
Ben Rothke - NBA for The Security Professional
 
DISCUSSION 1The Internet of Things (IoT) is based upon emerging .docx
DISCUSSION 1The Internet of Things (IoT) is based upon emerging .docxDISCUSSION 1The Internet of Things (IoT) is based upon emerging .docx
DISCUSSION 1The Internet of Things (IoT) is based upon emerging .docx
 
Richard Bennett's Presentation at Emerging Communication Conference & Awards ...
Richard Bennett's Presentation at Emerging Communication Conference & Awards ...Richard Bennett's Presentation at Emerging Communication Conference & Awards ...
Richard Bennett's Presentation at Emerging Communication Conference & Awards ...
 
2.2. Case Study #2 DTGOVDTGOV is a public company that was crea.docx
2.2. Case Study #2 DTGOVDTGOV is a public company that was crea.docx2.2. Case Study #2 DTGOVDTGOV is a public company that was crea.docx
2.2. Case Study #2 DTGOVDTGOV is a public company that was crea.docx
 
ION Costa Rica - About the IETF and How to Get Involved
ION Costa Rica - About the IETF and How to Get InvolvedION Costa Rica - About the IETF and How to Get Involved
ION Costa Rica - About the IETF and How to Get Involved
 

More from Natasha Rooney

Web Authentication: a Future Without Passwords?
Web Authentication: a Future Without Passwords?Web Authentication: a Future Without Passwords?
Web Authentication: a Future Without Passwords?
Natasha Rooney
 
WebAppSec Updates from W3C
WebAppSec Updates from W3CWebAppSec Updates from W3C
WebAppSec Updates from W3C
Natasha Rooney
 
JQuery UK Service Workers Talk
JQuery UK Service Workers TalkJQuery UK Service Workers Talk
JQuery UK Service Workers Talk
Natasha Rooney
 
STV Voting System Explained
STV Voting System ExplainedSTV Voting System Explained
STV Voting System Explained
Natasha Rooney
 
TCP and Mobile Networks Turbulent Relationship
TCP and Mobile Networks Turbulent RelationshipTCP and Mobile Networks Turbulent Relationship
TCP and Mobile Networks Turbulent Relationship
Natasha Rooney
 
Solving HTTP Problems With Code and Protocols
Solving HTTP Problems With Code and ProtocolsSolving HTTP Problems With Code and Protocols
Solving HTTP Problems With Code and Protocols
Natasha Rooney
 
TLS Perf: from three to zero in one spec
TLS Perf:  from three to zero in one specTLS Perf:  from three to zero in one spec
TLS Perf: from three to zero in one spec
Natasha Rooney
 
Evolving HTTP and making things QUIC
Evolving HTTP and making things QUICEvolving HTTP and making things QUIC
Evolving HTTP and making things QUIC
Natasha Rooney
 
JQuery UK February 2015: Service Workers On Vacay
JQuery UK February 2015: Service Workers On VacayJQuery UK February 2015: Service Workers On Vacay
JQuery UK February 2015: Service Workers On Vacay
Natasha Rooney
 
GSMA in W3C
GSMA in W3CGSMA in W3C
GSMA in W3C
Natasha Rooney
 
Making it Work Offline: Current & Future Offline APIs for Web Apps
Making it Work Offline: Current & Future Offline APIs for Web AppsMaking it Work Offline: Current & Future Offline APIs for Web Apps
Making it Work Offline: Current & Future Offline APIs for Web Apps
Natasha Rooney
 
FirefoxOS Meetup - Updates on Offline in HTML5 Web Apps
FirefoxOS Meetup - Updates on Offline in HTML5 Web AppsFirefoxOS Meetup - Updates on Offline in HTML5 Web Apps
FirefoxOS Meetup - Updates on Offline in HTML5 Web Apps
Natasha Rooney
 
Updates on Offline: “My AppCache won’t come back” and “ServiceWorker Tricks ...
Updates on Offline: “My AppCache won’t come back” and  “ServiceWorker Tricks ...Updates on Offline: “My AppCache won’t come back” and  “ServiceWorker Tricks ...
Updates on Offline: “My AppCache won’t come back” and “ServiceWorker Tricks ...
Natasha Rooney
 

More from Natasha Rooney (13)

Web Authentication: a Future Without Passwords?
Web Authentication: a Future Without Passwords?Web Authentication: a Future Without Passwords?
Web Authentication: a Future Without Passwords?
 
WebAppSec Updates from W3C
WebAppSec Updates from W3CWebAppSec Updates from W3C
WebAppSec Updates from W3C
 
JQuery UK Service Workers Talk
JQuery UK Service Workers TalkJQuery UK Service Workers Talk
JQuery UK Service Workers Talk
 
STV Voting System Explained
STV Voting System ExplainedSTV Voting System Explained
STV Voting System Explained
 
TCP and Mobile Networks Turbulent Relationship
TCP and Mobile Networks Turbulent RelationshipTCP and Mobile Networks Turbulent Relationship
TCP and Mobile Networks Turbulent Relationship
 
Solving HTTP Problems With Code and Protocols
Solving HTTP Problems With Code and ProtocolsSolving HTTP Problems With Code and Protocols
Solving HTTP Problems With Code and Protocols
 
TLS Perf: from three to zero in one spec
TLS Perf:  from three to zero in one specTLS Perf:  from three to zero in one spec
TLS Perf: from three to zero in one spec
 
Evolving HTTP and making things QUIC
Evolving HTTP and making things QUICEvolving HTTP and making things QUIC
Evolving HTTP and making things QUIC
 
JQuery UK February 2015: Service Workers On Vacay
JQuery UK February 2015: Service Workers On VacayJQuery UK February 2015: Service Workers On Vacay
JQuery UK February 2015: Service Workers On Vacay
 
GSMA in W3C
GSMA in W3CGSMA in W3C
GSMA in W3C
 
Making it Work Offline: Current & Future Offline APIs for Web Apps
Making it Work Offline: Current & Future Offline APIs for Web AppsMaking it Work Offline: Current & Future Offline APIs for Web Apps
Making it Work Offline: Current & Future Offline APIs for Web Apps
 
FirefoxOS Meetup - Updates on Offline in HTML5 Web Apps
FirefoxOS Meetup - Updates on Offline in HTML5 Web AppsFirefoxOS Meetup - Updates on Offline in HTML5 Web Apps
FirefoxOS Meetup - Updates on Offline in HTML5 Web Apps
 
Updates on Offline: “My AppCache won’t come back” and “ServiceWorker Tricks ...
Updates on Offline: “My AppCache won’t come back” and  “ServiceWorker Tricks ...Updates on Offline: “My AppCache won’t come back” and  “ServiceWorker Tricks ...
Updates on Offline: “My AppCache won’t come back” and “ServiceWorker Tricks ...
 

Recently uploaded

Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 

Recently uploaded (20)

Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 

MARNEW at IETF 94

  • 1. @thisNatasha MaRNEW Workshop 24-25 Sept 2015 Post Workshop Update Natasha Rooney
  • 3. @thisNatasha Technical Programme Committee - Joe Hildebrand, IAB / Cisco, USA - Stephen Farrell, IETF AD / Trinity College Dublin, Ireland - Jari Arkko, IETF Chair / Ericsson, Finland - Natasha Rooney, GSMA, UK - Spencer Dawkins, IETF AD, USA - Kathleen Moriarty, IETF AD / EMC, USA - Barry Leiba, IETF AD / Huawei, USA - Alia Atlas, IETF AD / Juniper Networks, USA - Ben Campbell, IETF AD / Oracle, USA - Karen O’Donoghue, ISOC, USA - Phil Roberts, ISOC, USA - Kevin Smith, Vodafone, UK - Sanjay Mishra, Verizon, USA - Istvan Lajtos, GSMA, UK - Salvatore Loreto, Ericsson, Finland - Diego Lopez, Telefonica, Spain - Dan Druta, AT&T, USA - Brian Trammell, ETH Zurich, Switzerland
  • 4. @thisNatasha MaRNEW Goals “Mobile networks have a set of requirements and properties which places a large emphasis on sophisticated bandwidth optimization. Encryption is increasing on the internet which is a good thing for consumer and business privacy and security. Many existing mobile bandwidth optimization solutions primarily operate on non-encrypted communications; this can lead to performance issues being amplified on mobile networks. Encryption on networks will continue to increase; and with this understanding the workshop aims to understand how we can solve the issues of bandwidth optimization and performance on radio networks in this encrypted world.”
  • 6. @thisNatasha Session Types: Scene Setting Network or Transport Solution Application Layer Regulation
  • 8. @thisNatasha Scope - In discussion we should assume: No broken crypto, Ciphertext increasingly common, congestion does need to be controlled as do other transport issues and Network management including efficient use of resources, in RAN and elsewhere, has to work. - How/why is RAN different for transport; help us understand the complexities of the RAN and how hard it is to manage and why those matter. - What are the precise problems caused by more ciphertext. - Identify players, incl. Users, and resulting tensions and how ciphertext changes those. - Some solutions will be radically changed by ciphertext, it's ok to talk about that - As good as possible quality of experience for end user is a goal. - Our aim for the next two days is to analyse the situation and identify specific achievable tasks that could be tackled in the IETF or GSMA (or elsewhere?) and that improve the Internet given the assumptions above. - We should not delve into: - Ways of doing interception (legal or not), see RFC2804 for why - Unpredictable political actions
  • 9. @thisNatasha Encryption Deployment Considerations The Effect of Ubiquitous Encryption - increased encryption impact - collection of current security and network management function impact Network Management of Encrypted Traffic - approaches to help manage encrypted traffic, without breaching user privacy or security
  • 10. @thisNatasha Trust Models and User Choice (Privacy) - 64% of users said concerns over privacy have increased - 67% would like to do more to protect privacy Users want privacy, and the web and internet are responding - Where does network operators sit in the user experience chain? - Consent: user, network, endpoints. - Helping users understand costs and benefits.
  • 12. @thisNatasha Sending Data Up / Down for Network Management Benefits Does it make sense for apps to send data to networks? Collaborative Frameworks - Mobile Throughput Guidance - Meaningful capacity sharing Transport - Fix TCP, or use something else? - TCP feedback to senders and receivers Solutions? - Base Station located - Latency vs. bandwidth, 0 or 1 bit information Understanding Mobile Networks - 3GPP defined PCC-QoS mechanism - Middleboxes treat data differently according to types
  • 13. @thisNatasha Transport Layer: Issues, Optimisation and Solutions Collaboration is essential, and the whole path matters. Transport Innovations - Congestion Control - 0 bit - 1 bit: how and where - Traffic Classification Issues - Resource Optimisation - Buffer Bloat - Meta data schemes can be exploited Need data and metrics. 16:00 - 17:00: Roundup
  • 15. @thisNatasha Application Layer Optimisation, Caching and CDNs Actors: Application providers, Network, Device. Can (and do… sometimes) work together! - CDN as a trusted content provider - Mobile Networks Adhering (or not) to Standards - Optimisations: network layer or transport layer? Panelists: One Request? - Metrics to allow for better Resource Allocation - Metrics - Network is calibrated to handle applications best - Anything that makes it easier for the application to adapt - Blind cache. 16:00 - 17:00: Roundup
  • 17. @thisNatasha Technical Analysis and Response to Potential Regulatory Reaction Understanding - Typical mobile network regulations - Penalties - Effects of Encryption on Regulations Response - Differences in IETF and GSMA - Application Layer - Scalability - Transparency reports. Note: Chatham House Rule. 16:00 - 17:00: Roundup
  • 19. @thisNatasha - Mobile Throughput Guidance - One bit for latency bandwidth tradeoff - Small amount of data from network to user (ECN) - API for app to query network, or vice versa - Blind Caching - Standard approach for operator to offer services to Content Providers - Better Collaboration - Sharing information hop by hop - Metrics and metric standards - Testing / Debugging - Trust model / framework (e.g. for spud) - Keyless SSL - Meaningful capacity sharing; reacting correctly to wireless link layer condition - 5G The Ideas - IETF gain an understanding of RAN - Reviews and comments on 3GPP perspective - AQM - Evolving TCP (or evolving transport) - Congestion Control - SPROUT (MIT) - PCC (Performance & Congestion Control) - How to do congestion controlling in RAN - Base Station - Controller that can adapt to a radio environment and provide a better experience, and preserve E2E - Identify traffic types via 5-tuple - Heuristics (for best effort only?) - CDNs / caches in the network - CDN improvements 16:00 - 17:00: Roundup Not confirmed! Just an incomplete list of generated ideas:
  • 20. @thisNatasha The Ideas - Evolving TCP: TCP inadequate for RAN, needs better congestion control. (CROWN) - Mobile Throughput Guidance (MTG): IETF draft: mechanism and protocol elements that allow the cellular network to provide near real-time information on capacity available to the TCP server. (CROWN) - (Zero or) One bit for latency bandwidth tradeoff: Test networks with no network management and then add pieces of metadata to see if network performance improves. (Research) - Blind Caching: Allow the transparent caching of encrypted data. (Draft) - Metrics and metric standards: Proper and standardised metrics to insure new solutions are providing a better performance for end users. (Research) - Better Collaboration: between operators and you guys by working through technical solutions together. - CANVaS: Controlled Access for Network Validation of Signatures 16:00 - 17:00: Roundup
  • 22. @thisNatasha Minutes & Report - Release minutes (Oct 2015) - Release report (Dec 2015) - Take “Generated Ideas List”, distill and plan their development on mailing lists (now onwards) - Work on metrics proposals (now)
  • 23. @thisNatasha Final Comments... Main Observations - Encryption causes solvable issues - Identified technical items - Cooperation is key - Next generation of mobile networks could mean great collaboration - Customer experience and privacy as highest priorities. New Items - Metrics and testing - Transport - Caching mechanisms - Collaborative exchange mechanisms. 16:00 - 17:00: Roundup
  • 24. @thisNatasha Thank-you! - AT&T for providing the location (Dan Druta) - ISOC for sponsoring (Karen O’Donoghue) - GSMA for sponsoring (Istvan Lajtos) - SAAG for the speaking slot - You guys for listening - And Cindy Morgan for being awesome. 09:00 - 09:20: Introduction