SlideShare a Scribd company logo
Security & Transport Performance in 5G
Dr.-Ing. Dirk Kutscher
Chief Researcher Networking
NEC Laboratories Europe
2 © NEC Corporation 2015
Performance and Security Today
User
Equipment
Access
Network
Core/Service
Network
Application
Servers
3 © NEC Corporation 2015
Performance and Security Today
User
Equipment
Access
Network
Core/Service
Network
Application
Servers
TCP Proxies
4 © NEC Corporation 2015
Performance and Security Today
User
Equipment
Access
Network
Core/Service
Network
Application
Servers
TCP Proxies
Traffic Management Systems
5 © NEC Corporation 2015
Performance and Security Today
User
Equipment
Access
Network
Core/Service
Network
Application
Servers
TCP Proxies
Traffic Management Systems
Application (Video) Optimizers
6 © NEC Corporation 2015
Performance and Security Today
User
Equipment
Access
Network
Core/Service
Network
Application
Servers
TCP Proxies
Traffic Management Systems
Application (Video) Optimizers
Mobile
Throughput
Guidance
7 © NEC Corporation 2015
Motivation
▌TCP proxies
Lack of AQM and ECN deployment
Sub-optimal performance: e2e control loop over heterogenous networks
▌Traffic management systems
Lack of AQM and ECN deployment
Lack of incentives for adaptive applications
Perceived need for policing applications depending on access network conditions
▌Application optimizers
Operator resource conservation and performance concerns
Access to user data for analytics
▌Mobile Throughput Guidance
All of the above
8 © NEC Corporation 2015
CDN Today
Mainstream CDN
9 © NEC Corporation 2015
CDN Tomorrow
Mainstream CDN
10 © NEC Corporation 2015
CDN Tomorrow: Silo Danger
Mainstream CDN
VOD CDN
Social Network
CDN
11 © NEC Corporation 2015
Motivation
▌TCP proxies
 Lack of AQM and ECN deployment
 Sub-optimal performance: e2e control loop over heterogenous networks
▌Traffic management systems
 Lack of AQM and ECN deployment
 Lack of incentives for adaptive applications
 Perceived need for policing applications depending on access network conditions
▌Application optimizers
 Operator resource conservation and performance concerns
 Access to user data for analytics
▌Mobile Throughput Guidance
 All of the above
▌CDN
 Network offloading
 QoE improvement through latency reduction
 Moving data and computation closer to the edge
 Application-layer request/content routing policies
12 © NEC Corporation 2015
Observations
▌Significant infrastructure required to make things „only work“ today
Overcoming TCP e2e performance issues in heterogenous networks
▌Caching deemed important for scalable, low-latency data access
Deployment likely going to increase in next generation networks (edge caching)
General CDN and application-specific CDN deployments (new OTT services)
How many different CDN-like overlays will you have to run as an ISP?
▌What does that mean for 5G networks?
13 © NEC Corporation 2015
NGMN 5G Use Cases
Low latency,
local loop communication
Optimized Forwarding
for Heterogenous Access
Decentralized
Communication
Security,
User Privacy
14 © NEC Corporation 2015
NGMN 5G Use Cases
Security,
User Privacy
15 © NEC Corporation 2015
Security & User Privacy
▌HTTP/2 is here to stay
▌Connection-based encryption on transport layer (TLS)
Encrypt connection (and authenticate endpoints)
Encrypted channel for all communication
▌De-facto ubiquitous (client implementations...)
▌No (easy) way for traffic management (based on
flow/application information)
▌Major concerns with network operators
See recent GSMA/IAB workshop on Managing Radio Networks in an
Encrypted World (MaRNEW)
Many of the previously mentioned optimization become
difficult/expensive/impossible
16 © NEC Corporation 2015
TLS and Future Deep CDN
▌CDN and TLS
CDN nodes maintain certificates on keying material on behalf of publishers
Managing those certificates/keys is an important function of any CDN
Protecting those certificates/keys is an important security requirement
▌Scaling CDNs
More attack surfaces
More challenges to
certificate/key management
User-privacy only guaranteed
for connection to CDN proxy
▌Are there better ways?
Object-based security
Generic object caching
& forwarding infrastructure
Mainstream CDN
17 © NEC Corporation 2015
Optimized Forwarding for Heterogenous Access
▌Low latency, high-bandwidth
Fiber, new radios
▌Slow, ad-hoc, unpredictable
Low-power radios, sleep/duty cycles
Constrained devices
▌Massively scalable distribution
Server-push or pub/sub style
Possibly in-network adaptation
▌Variable performance
Dynamically changing network conditions
Disruptions and delays
On-board caching for all applications & protocols
18 © NEC Corporation 2015
Optimized Forwarding for Heterogenous Access
▌Will be difficult to implement with TCP as is
▌Remember: reduced deployment options for
application-layer gateways
▌Network of TCP proxies does not sound convincing
▌Need more powerful forwarding layer and
transport services
Potential for hop-by-hop forwarding strategies
Caching for local retransmissions
User
Equipment
Access
Network
Core/Service
Network
Application
Servers
19 © NEC Corporation 2015
Information-Centric Networking
▌Accessing Named Data Objects (NDOs) in the network
ADUs, chunks, fragments
▌Data-centric security approach
Disentangled means for name-content binding validation, publisher
authentication, confidentiality
▌Name-Content binding validation:
Public-Key and hash-based schemes
▌Publisher authentication
One approach: publishers to sign NDOs, signature part of NDO meta data; trust
model a la PKI
▌Confidentiality and access control
Payload encryption
20 © NEC Corporation 2015
ICN Overview
Requestor 1 Original
Content “XY1”
Owner
“Joe”
Content
Repository
Requestor 2
• Request Response, Receiver-driven
• Pending Interesting Tables
• Forward-by-name (prefix)
• Per-node forwarding strategies
• Object-based security
• Ubiquitous caching
/com/netflix/video/starwars
21 © NEC Corporation 2015
ICN Performance and Resource Management
▌Key ICN properties
Requesting individual Named Data Objects
Ubiquituous Caching
▌Implicit caching
Every router can store NDO – depending on configuration, policy etc.
Even with encrypted traffic, caching can help with local retransmissions, media re-
play etc.
▌Simplified mobility management
Request/Response model – eliminates need for tunnels
▌Flexible multipath communication
Powerful forwarding layer
Every router can make forwarding decisions depending on strategy, network
characteristics, name prefix, policy
▌Easy policing and filtering
Requestors, publishers and requestors see ICN requests and responses
Policing without DPI
Enabling other optimizations: in-network pre-fetching etc.
22 © NEC Corporation 2015
Proof-of-Concept
▌ICN for managing multi-path connectivity in Hybrid Access scenarios
HGW HAG
LTE
DSL
Core Network Internet Cloud Services
▌State of the art
Connection Bundling over IP tunnels (GRE): poor performance with transport
protocols
MPTCP: better from transport perspective, but problematic interaction with CDN
(DNS redirection per interface) and lack of policy control
23 © NEC Corporation 2015
Proof-of-Concept
▌ICN for managing multi-path connectivity in Hybrid Access scenarios
HGW HAG
LTE
DSL
Core Network Internet Cloud Services
▌ICN approach
 Routers have better visibility of interface performance (can continously measure
latency between requests and responses on a name-prefix basis)
 Easy to implement policy based on request prefixes
 Our implementation: prioritizing critical applications by constantly assessing
interface performance and by assigning best interfaces to prioritized applications
 Works with high degree of dynamicity (mobile networks)
▌First results
 Extremely fast response to congestion – on all nodes of a heterogenous path
 Constantly high capacity utilization
 Effective prioritization
/com/netflix/video/starwars
/com/os/updates
24 © NEC Corporation 2015
Other Recent Results
http://www.ietf.org/proceedings/interim/2014/09/27/icnrg/proceedings.html
25 © NEC Corporation 2015
Orange/ALU/SystemX Testbed Measurement Results
http://www.ietf.org/proceedings/interim/2014/09/27/icnrg/proceedings.html
26 © NEC Corporation 2015
5G Blueprint
Ctrl.
HA Load
Balancer
Ctrl.
…Internet
RNC IW3G
WiFi
4G
5G
xDSL
Cable
IW
vPoPs
Transport
Data Center
DB
auth. services
Minimal IPv6 connectivity
Baseline
IP e2e
applications
Mobility-managed, seamless IP connectivity
IM,
server
applications
M2M
applications
In-network
processing
Interactive
real-time
Low-latency, transport-
enhanced service
Caching,
multicast
Video
streaming,
VOD
27 © NEC Corporation 2015
5G Multitenancy
Ctrl.
HA Load
Balancer
Ctrl.
…
Internet
RNC IW3G
WiFi
4G
5G
xDSL
Cable
IW
vPoPs
Transport
Data Center
DB
auth.
services
Minimal IPv6 connectivity
Baseline
IP e2e
applications
Mobility-managed, seamless IP connectivity
IM,
server
applications
M2M
applications
In-network
processing
Interactive
real-time
Low-latency, transport-
enhanced service
Caching,
multicast
Video
streaming,
VOD
Telco
IaaS
ISP
A
Mobile
TV
service
28 © NEC Corporation 2015
Possible 5G ICN Deployment Option
Ctrl.
HA Load
Balancer
Ctrl.
…
Internet
RNC IW3G
WiFi
4G
5G
xDSL
Cable
IW
vPoPs
Transport
Data Center
DB
auth.
services
Minimal IPv6 connectivity
Telco
IaaS
ISP
A Information-Centric Networking
Infrastructure
Mobility-managed,
seamless IP
connectivity
In-network
caching
In-network
execution
Mobile
TV
service
Video
streaming,
VOD
IoT
Service
In-network
IoT
platforms
Interactive
Multi-
media
service
WebRTC
Platform
29 © NEC Corporation 2015
Conclusions: 5G has challenges beyond SDN/NFV
▌Security
User-privacy concerns one of the drivers for HTTP/2 (TLS) adoption
Will reduce leverage for operators for „value-added service“, application-layer
optimizations etc.
Security challenges for TLS and (Deep) CDN
▌Performance
5G has potential for better performance due to new link layers and backhaul
architectures
But: heterogenous access and diverse use cases also imply new challenges
▌Information-Centric Networking
Data-centric communication approach more
suitable for secure and efficient communication
Powerful forwarding layer: node-specific forwarding
strategies thanks to better visibility of forwarding performance
Common infrastructure for different types of
applications: enabling efficient multi-tenancy operation without silos
30 © NEC Corporation 2015
IRTF ICNRG
▌Cross-project research community
Not limited to a specific funding authority, project, protocol
Sharing of research results, new ideas
Documenting ICN scenarios, challenges, state-of-the-art solutions, gaps
Specifying protocols and semantics for ICN
Sharing implementation, experience from experiments
▌ICNRG and standards
Not setting standards...
But: helping to understand what needs to be standardized
And: working on specifications
▌ICNRG Administrivia
Web: http://irtf.org/icnrg
Chairs
• Börje Ohlman (Ericsson Research)
• Dave Oran (Cisco Systems)
• Dirk Kutscher (NEC Laboratories)
31 © NEC Corporation 2015
ICNRG Work Items
▌Scenarios, use cases
 Baseline scenarios (RFC 7476)
 Video distribution
 IoT
 Challenged networks and disaster scenarios
▌Challenges, evaluation
 Research challenges
 Evaluation Methodology
▌Protocol specifications
 CCNx Messages in TLV format
 CCNx Semantics
▌Newly proposed topics
 Manifests, chunking, fragmentation, versioning
 User privacy, access control
 Name resolution
 Named function networking
Documenting use
cases &
opportunities
Evolving research
agenda &
evaluation
approaches
Creating
interoperable
platforms for
experimentation
Evolving ICN
concepts and
technologies
32 © NEC Corporation 2015
Running Code
▌CCNx-1.0 (PARC)
PARC license
Developed by PARC
Implements ccnx-messages
and ccnx-semantics
▌CCN-lite (University of Basel)
Open Source, free to use without restrictions
Implements ccnx protocol
Used by RIOT project
▌NDN NFD (NDN project)
GPL-3.0
Maintained by NDN project
Implemented NDN protocol
Security and Transport Performance in 5G
Security and Transport Performance in 5G

More Related Content

PDF
Aviation 5G/5G in Aviation
PDF
Mavenir: Why and How Private LTE & 5G Networks Are Rapidly Evolving for Enter...
PDF
5G Technology
PDF
Securing 4G and LTE systems with Deep Learning and Virtualization
PPTX
Take Most Advanced "5G Training" From Tonex Training
PPTX
From broadband to 5G
PPTX
5G Technology Strategy: Next-Generation Mobile Networking
PDF
Alcatel Wimax Whitepaper (quantumwimax.com)
Aviation 5G/5G in Aviation
Mavenir: Why and How Private LTE & 5G Networks Are Rapidly Evolving for Enter...
5G Technology
Securing 4G and LTE systems with Deep Learning and Virtualization
Take Most Advanced "5G Training" From Tonex Training
From broadband to 5G
5G Technology Strategy: Next-Generation Mobile Networking
Alcatel Wimax Whitepaper (quantumwimax.com)

What's hot (20)

PDF
Etsi wp24 mec_deployment_in_4_g_5g_final
PDF
5G, IoT and AI. Overview strategy for business_Rev20200505
PPTX
5G SA security: a comprehensive overview of threats, vulnerabilities and rem...
PDF
Tcl telecom expertise v 2 00 vs 220812
PDF
Private 5G Seminar Brochure
PPTX
Fundamentals of 5G Network Slicing
PDF
Parallel Wireless Webinar: 5G at #MWC19
PDF
Qualcomm 5g-vision-presentation
PPTX
Saguna edge computing solution for private enterprise networks
PDF
5G Spectrum Recommendations White Paper
PPTX
TADSummit Closing Keynote: BYOSpectrum – Why private cellular is a game-changer
PDF
Driving fixed mobile convergence with 5 g 140617 final with notes
PPTX
Mavenir: Evolution of Real-Time Machine Learning (RRML) in Core Network Secur...
PDF
Samsung 5g vision white paper
PDF
5g tutorial
PPTX
iotmaship - Webinos iot and m2m - allott
PDF
IPLOOK Technologies(E.V)
PPTX
How To : 5G Network Slicing, Key Principles, Architecture and Implementation ...
PDF
DWSPR19 Sessions plenieres 17042019 - 5G - Thierry BOISNON - Nokia
PPTX
Jisc's Vision for 5G - Digital Catapult Future of 5G Summit
Etsi wp24 mec_deployment_in_4_g_5g_final
5G, IoT and AI. Overview strategy for business_Rev20200505
5G SA security: a comprehensive overview of threats, vulnerabilities and rem...
Tcl telecom expertise v 2 00 vs 220812
Private 5G Seminar Brochure
Fundamentals of 5G Network Slicing
Parallel Wireless Webinar: 5G at #MWC19
Qualcomm 5g-vision-presentation
Saguna edge computing solution for private enterprise networks
5G Spectrum Recommendations White Paper
TADSummit Closing Keynote: BYOSpectrum – Why private cellular is a game-changer
Driving fixed mobile convergence with 5 g 140617 final with notes
Mavenir: Evolution of Real-Time Machine Learning (RRML) in Core Network Secur...
Samsung 5g vision white paper
5g tutorial
iotmaship - Webinos iot and m2m - allott
IPLOOK Technologies(E.V)
How To : 5G Network Slicing, Key Principles, Architecture and Implementation ...
DWSPR19 Sessions plenieres 17042019 - 5G - Thierry BOISNON - Nokia
Jisc's Vision for 5G - Digital Catapult Future of 5G Summit
Ad

Viewers also liked (20)

DOCX
Lte security solution white paper(20130207)
PPTX
Gsm security and encryption
PDF
LTE :Mobile Network Security
PDF
IoT and 5G: Opportunities and Challenges, SenZations 2015
PPTX
Rethinking the Telcos business models in the age of 5G - Carlos LOPEZ, Telefó...
PDF
5 g business potential ieee 5g summit_110717_a
PPT
Security in GSM(2G) and UMTS(3G) Networks
PDF
Small Cells & 5G IoT champions work item
DOCX
Gsm security and encryption
PDF
Smart Cities, IoT, SDN, 5G Networks, Cloud Computing… Managing Complexity wit...
PDF
Security In LTE Access Network
PDF
5G-webinar from 5G-course, Anritsu, adcomm
PPT
4g security presentation
PDF
Security Testing 4G (LTE) Networks - 44CON 2012
PPT
Internet of Things: The story so far
PPT
Long Term Evolution (LTE) -
PDF
The leadership in the new digital age carved by the fourth industrial revolu...
PDF
4G LTE Security - What hackers know?
PPTX
4G LTE Presentation Group 9
PPT
5G Presentation
Lte security solution white paper(20130207)
Gsm security and encryption
LTE :Mobile Network Security
IoT and 5G: Opportunities and Challenges, SenZations 2015
Rethinking the Telcos business models in the age of 5G - Carlos LOPEZ, Telefó...
5 g business potential ieee 5g summit_110717_a
Security in GSM(2G) and UMTS(3G) Networks
Small Cells & 5G IoT champions work item
Gsm security and encryption
Smart Cities, IoT, SDN, 5G Networks, Cloud Computing… Managing Complexity wit...
Security In LTE Access Network
5G-webinar from 5G-course, Anritsu, adcomm
4g security presentation
Security Testing 4G (LTE) Networks - 44CON 2012
Internet of Things: The story so far
Long Term Evolution (LTE) -
The leadership in the new digital age carved by the fourth industrial revolu...
4G LTE Security - What hackers know?
4G LTE Presentation Group 9
5G Presentation
Ad

Similar to Security and Transport Performance in 5G (20)

PDF
Accelerating 5G enterprise networks with edge computing and latency assurance
PPTX
Open Source Carrier Networking
PDF
Network optimisation and management - Guaranteed network quality with less cost
PDF
Cloud Services: Is the Transport Network a Utility or Differentiator
PDF
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
PPTX
New world IP traffic, new dimensions for Diameter management
PDF
Network Convergence of Mobile, Broadband and Wi-Fi
PPTX
Mobile Network communications presentation
PDF
Edge virtualisation for Carrier Networks
PDF
Network Rightsizing Best Practices Guide
PPTX
Exhibitor session: Ciena
PPT
NGN BASICS
PPTX
How to use SDN to Innovate, Expand and Deliver for your business
PPT
52892794-Ngn-Presentation.ppt......................
PDF
Adoption of SDN: Progress Update
PDF
Unleash the power, intelligence, and analytics of your networks with a flexib...
PDF
Implications of 4G Deployments (MEF for MPLS World Congress Ethernet Wholesa...
PDF
Putting the M in MANO: Major new Ensemble release delivers NFV management and...
PPTX
Telecoms Service Assurance & Service Fulfillment with Neo4j Graph Database
PDF
5G in Brownfield how SDN makes 5G Deployments Work
Accelerating 5G enterprise networks with edge computing and latency assurance
Open Source Carrier Networking
Network optimisation and management - Guaranteed network quality with less cost
Cloud Services: Is the Transport Network a Utility or Differentiator
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
New world IP traffic, new dimensions for Diameter management
Network Convergence of Mobile, Broadband and Wi-Fi
Mobile Network communications presentation
Edge virtualisation for Carrier Networks
Network Rightsizing Best Practices Guide
Exhibitor session: Ciena
NGN BASICS
How to use SDN to Innovate, Expand and Deliver for your business
52892794-Ngn-Presentation.ppt......................
Adoption of SDN: Progress Update
Unleash the power, intelligence, and analytics of your networks with a flexib...
Implications of 4G Deployments (MEF for MPLS World Congress Ethernet Wholesa...
Putting the M in MANO: Major new Ensemble release delivers NFV management and...
Telecoms Service Assurance & Service Fulfillment with Neo4j Graph Database
5G in Brownfield how SDN makes 5G Deployments Work

Recently uploaded (20)

DOCX
Unit-3 cyber security network security of internet system
PPTX
Internet___Basics___Styled_ presentation
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PDF
Cloud-Scale Log Monitoring _ Datadog.pdf
PDF
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
PDF
RPKI Status Update, presented by Makito Lay at IDNOG 10
PPT
tcp ip networks nd ip layering assotred slides
PPTX
Job_Card_System_Styled_lorem_ipsum_.pptx
PPTX
international classification of diseases ICD-10 review PPT.pptx
PPTX
Module 1 - Cyber Law and Ethics 101.pptx
PDF
WebRTC in SignalWire - troubleshooting media negotiation
PDF
The Internet -By the Numbers, Sri Lanka Edition
PPTX
artificial intelligence overview of it and more
PPTX
Introuction about WHO-FIC in ICD-10.pptx
PPTX
SAP Ariba Sourcing PPT for learning material
PDF
Triggering QUIC, presented by Geoff Huston at IETF 123
PPTX
Introduction to Information and Communication Technology
PDF
Paper PDF World Game (s) Great Redesign.pdf
PDF
An introduction to the IFRS (ISSB) Stndards.pdf
PPTX
Digital Literacy And Online Safety on internet
Unit-3 cyber security network security of internet system
Internet___Basics___Styled_ presentation
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
Cloud-Scale Log Monitoring _ Datadog.pdf
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
RPKI Status Update, presented by Makito Lay at IDNOG 10
tcp ip networks nd ip layering assotred slides
Job_Card_System_Styled_lorem_ipsum_.pptx
international classification of diseases ICD-10 review PPT.pptx
Module 1 - Cyber Law and Ethics 101.pptx
WebRTC in SignalWire - troubleshooting media negotiation
The Internet -By the Numbers, Sri Lanka Edition
artificial intelligence overview of it and more
Introuction about WHO-FIC in ICD-10.pptx
SAP Ariba Sourcing PPT for learning material
Triggering QUIC, presented by Geoff Huston at IETF 123
Introduction to Information and Communication Technology
Paper PDF World Game (s) Great Redesign.pdf
An introduction to the IFRS (ISSB) Stndards.pdf
Digital Literacy And Online Safety on internet

Security and Transport Performance in 5G

  • 1. Security & Transport Performance in 5G Dr.-Ing. Dirk Kutscher Chief Researcher Networking NEC Laboratories Europe
  • 2. 2 © NEC Corporation 2015 Performance and Security Today User Equipment Access Network Core/Service Network Application Servers
  • 3. 3 © NEC Corporation 2015 Performance and Security Today User Equipment Access Network Core/Service Network Application Servers TCP Proxies
  • 4. 4 © NEC Corporation 2015 Performance and Security Today User Equipment Access Network Core/Service Network Application Servers TCP Proxies Traffic Management Systems
  • 5. 5 © NEC Corporation 2015 Performance and Security Today User Equipment Access Network Core/Service Network Application Servers TCP Proxies Traffic Management Systems Application (Video) Optimizers
  • 6. 6 © NEC Corporation 2015 Performance and Security Today User Equipment Access Network Core/Service Network Application Servers TCP Proxies Traffic Management Systems Application (Video) Optimizers Mobile Throughput Guidance
  • 7. 7 © NEC Corporation 2015 Motivation ▌TCP proxies Lack of AQM and ECN deployment Sub-optimal performance: e2e control loop over heterogenous networks ▌Traffic management systems Lack of AQM and ECN deployment Lack of incentives for adaptive applications Perceived need for policing applications depending on access network conditions ▌Application optimizers Operator resource conservation and performance concerns Access to user data for analytics ▌Mobile Throughput Guidance All of the above
  • 8. 8 © NEC Corporation 2015 CDN Today Mainstream CDN
  • 9. 9 © NEC Corporation 2015 CDN Tomorrow Mainstream CDN
  • 10. 10 © NEC Corporation 2015 CDN Tomorrow: Silo Danger Mainstream CDN VOD CDN Social Network CDN
  • 11. 11 © NEC Corporation 2015 Motivation ▌TCP proxies  Lack of AQM and ECN deployment  Sub-optimal performance: e2e control loop over heterogenous networks ▌Traffic management systems  Lack of AQM and ECN deployment  Lack of incentives for adaptive applications  Perceived need for policing applications depending on access network conditions ▌Application optimizers  Operator resource conservation and performance concerns  Access to user data for analytics ▌Mobile Throughput Guidance  All of the above ▌CDN  Network offloading  QoE improvement through latency reduction  Moving data and computation closer to the edge  Application-layer request/content routing policies
  • 12. 12 © NEC Corporation 2015 Observations ▌Significant infrastructure required to make things „only work“ today Overcoming TCP e2e performance issues in heterogenous networks ▌Caching deemed important for scalable, low-latency data access Deployment likely going to increase in next generation networks (edge caching) General CDN and application-specific CDN deployments (new OTT services) How many different CDN-like overlays will you have to run as an ISP? ▌What does that mean for 5G networks?
  • 13. 13 © NEC Corporation 2015 NGMN 5G Use Cases Low latency, local loop communication Optimized Forwarding for Heterogenous Access Decentralized Communication Security, User Privacy
  • 14. 14 © NEC Corporation 2015 NGMN 5G Use Cases Security, User Privacy
  • 15. 15 © NEC Corporation 2015 Security & User Privacy ▌HTTP/2 is here to stay ▌Connection-based encryption on transport layer (TLS) Encrypt connection (and authenticate endpoints) Encrypted channel for all communication ▌De-facto ubiquitous (client implementations...) ▌No (easy) way for traffic management (based on flow/application information) ▌Major concerns with network operators See recent GSMA/IAB workshop on Managing Radio Networks in an Encrypted World (MaRNEW) Many of the previously mentioned optimization become difficult/expensive/impossible
  • 16. 16 © NEC Corporation 2015 TLS and Future Deep CDN ▌CDN and TLS CDN nodes maintain certificates on keying material on behalf of publishers Managing those certificates/keys is an important function of any CDN Protecting those certificates/keys is an important security requirement ▌Scaling CDNs More attack surfaces More challenges to certificate/key management User-privacy only guaranteed for connection to CDN proxy ▌Are there better ways? Object-based security Generic object caching & forwarding infrastructure Mainstream CDN
  • 17. 17 © NEC Corporation 2015 Optimized Forwarding for Heterogenous Access ▌Low latency, high-bandwidth Fiber, new radios ▌Slow, ad-hoc, unpredictable Low-power radios, sleep/duty cycles Constrained devices ▌Massively scalable distribution Server-push or pub/sub style Possibly in-network adaptation ▌Variable performance Dynamically changing network conditions Disruptions and delays On-board caching for all applications & protocols
  • 18. 18 © NEC Corporation 2015 Optimized Forwarding for Heterogenous Access ▌Will be difficult to implement with TCP as is ▌Remember: reduced deployment options for application-layer gateways ▌Network of TCP proxies does not sound convincing ▌Need more powerful forwarding layer and transport services Potential for hop-by-hop forwarding strategies Caching for local retransmissions User Equipment Access Network Core/Service Network Application Servers
  • 19. 19 © NEC Corporation 2015 Information-Centric Networking ▌Accessing Named Data Objects (NDOs) in the network ADUs, chunks, fragments ▌Data-centric security approach Disentangled means for name-content binding validation, publisher authentication, confidentiality ▌Name-Content binding validation: Public-Key and hash-based schemes ▌Publisher authentication One approach: publishers to sign NDOs, signature part of NDO meta data; trust model a la PKI ▌Confidentiality and access control Payload encryption
  • 20. 20 © NEC Corporation 2015 ICN Overview Requestor 1 Original Content “XY1” Owner “Joe” Content Repository Requestor 2 • Request Response, Receiver-driven • Pending Interesting Tables • Forward-by-name (prefix) • Per-node forwarding strategies • Object-based security • Ubiquitous caching /com/netflix/video/starwars
  • 21. 21 © NEC Corporation 2015 ICN Performance and Resource Management ▌Key ICN properties Requesting individual Named Data Objects Ubiquituous Caching ▌Implicit caching Every router can store NDO – depending on configuration, policy etc. Even with encrypted traffic, caching can help with local retransmissions, media re- play etc. ▌Simplified mobility management Request/Response model – eliminates need for tunnels ▌Flexible multipath communication Powerful forwarding layer Every router can make forwarding decisions depending on strategy, network characteristics, name prefix, policy ▌Easy policing and filtering Requestors, publishers and requestors see ICN requests and responses Policing without DPI Enabling other optimizations: in-network pre-fetching etc.
  • 22. 22 © NEC Corporation 2015 Proof-of-Concept ▌ICN for managing multi-path connectivity in Hybrid Access scenarios HGW HAG LTE DSL Core Network Internet Cloud Services ▌State of the art Connection Bundling over IP tunnels (GRE): poor performance with transport protocols MPTCP: better from transport perspective, but problematic interaction with CDN (DNS redirection per interface) and lack of policy control
  • 23. 23 © NEC Corporation 2015 Proof-of-Concept ▌ICN for managing multi-path connectivity in Hybrid Access scenarios HGW HAG LTE DSL Core Network Internet Cloud Services ▌ICN approach  Routers have better visibility of interface performance (can continously measure latency between requests and responses on a name-prefix basis)  Easy to implement policy based on request prefixes  Our implementation: prioritizing critical applications by constantly assessing interface performance and by assigning best interfaces to prioritized applications  Works with high degree of dynamicity (mobile networks) ▌First results  Extremely fast response to congestion – on all nodes of a heterogenous path  Constantly high capacity utilization  Effective prioritization /com/netflix/video/starwars /com/os/updates
  • 24. 24 © NEC Corporation 2015 Other Recent Results http://www.ietf.org/proceedings/interim/2014/09/27/icnrg/proceedings.html
  • 25. 25 © NEC Corporation 2015 Orange/ALU/SystemX Testbed Measurement Results http://www.ietf.org/proceedings/interim/2014/09/27/icnrg/proceedings.html
  • 26. 26 © NEC Corporation 2015 5G Blueprint Ctrl. HA Load Balancer Ctrl. …Internet RNC IW3G WiFi 4G 5G xDSL Cable IW vPoPs Transport Data Center DB auth. services Minimal IPv6 connectivity Baseline IP e2e applications Mobility-managed, seamless IP connectivity IM, server applications M2M applications In-network processing Interactive real-time Low-latency, transport- enhanced service Caching, multicast Video streaming, VOD
  • 27. 27 © NEC Corporation 2015 5G Multitenancy Ctrl. HA Load Balancer Ctrl. … Internet RNC IW3G WiFi 4G 5G xDSL Cable IW vPoPs Transport Data Center DB auth. services Minimal IPv6 connectivity Baseline IP e2e applications Mobility-managed, seamless IP connectivity IM, server applications M2M applications In-network processing Interactive real-time Low-latency, transport- enhanced service Caching, multicast Video streaming, VOD Telco IaaS ISP A Mobile TV service
  • 28. 28 © NEC Corporation 2015 Possible 5G ICN Deployment Option Ctrl. HA Load Balancer Ctrl. … Internet RNC IW3G WiFi 4G 5G xDSL Cable IW vPoPs Transport Data Center DB auth. services Minimal IPv6 connectivity Telco IaaS ISP A Information-Centric Networking Infrastructure Mobility-managed, seamless IP connectivity In-network caching In-network execution Mobile TV service Video streaming, VOD IoT Service In-network IoT platforms Interactive Multi- media service WebRTC Platform
  • 29. 29 © NEC Corporation 2015 Conclusions: 5G has challenges beyond SDN/NFV ▌Security User-privacy concerns one of the drivers for HTTP/2 (TLS) adoption Will reduce leverage for operators for „value-added service“, application-layer optimizations etc. Security challenges for TLS and (Deep) CDN ▌Performance 5G has potential for better performance due to new link layers and backhaul architectures But: heterogenous access and diverse use cases also imply new challenges ▌Information-Centric Networking Data-centric communication approach more suitable for secure and efficient communication Powerful forwarding layer: node-specific forwarding strategies thanks to better visibility of forwarding performance Common infrastructure for different types of applications: enabling efficient multi-tenancy operation without silos
  • 30. 30 © NEC Corporation 2015 IRTF ICNRG ▌Cross-project research community Not limited to a specific funding authority, project, protocol Sharing of research results, new ideas Documenting ICN scenarios, challenges, state-of-the-art solutions, gaps Specifying protocols and semantics for ICN Sharing implementation, experience from experiments ▌ICNRG and standards Not setting standards... But: helping to understand what needs to be standardized And: working on specifications ▌ICNRG Administrivia Web: http://irtf.org/icnrg Chairs • Börje Ohlman (Ericsson Research) • Dave Oran (Cisco Systems) • Dirk Kutscher (NEC Laboratories)
  • 31. 31 © NEC Corporation 2015 ICNRG Work Items ▌Scenarios, use cases  Baseline scenarios (RFC 7476)  Video distribution  IoT  Challenged networks and disaster scenarios ▌Challenges, evaluation  Research challenges  Evaluation Methodology ▌Protocol specifications  CCNx Messages in TLV format  CCNx Semantics ▌Newly proposed topics  Manifests, chunking, fragmentation, versioning  User privacy, access control  Name resolution  Named function networking Documenting use cases & opportunities Evolving research agenda & evaluation approaches Creating interoperable platforms for experimentation Evolving ICN concepts and technologies
  • 32. 32 © NEC Corporation 2015 Running Code ▌CCNx-1.0 (PARC) PARC license Developed by PARC Implements ccnx-messages and ccnx-semantics ▌CCN-lite (University of Basel) Open Source, free to use without restrictions Implements ccnx protocol Used by RIOT project ▌NDN NFD (NDN project) GPL-3.0 Maintained by NDN project Implemented NDN protocol

Editor's Notes

  • #16: Note: even with TLS, publishers could still decide which transaction require a secure connection – but Security management concerns HTTP/2 client implementations...
  • #34: #本スライドの活用について NECグループのブランドステートメント「Orchestrating a brighter world」は、ステークホルダーへの約束として、NECグループの企業姿勢、実現したい世界観と、それに対する自らの「行動・能力」を表現したものです。 社外向け発信活動においては、必ず表紙の次ページに本スライドを挿入し、ブランドステートメントとともにどんなストーリーを展開するかを説明するように心掛けてください。 <セリフ例>----- 私たちNECグループは、お客さまや社会と共創して、社会価値を創造していきます。 人が生きる、豊かに生きる、そして明るい未来につなげていくために。 これをブランドステートメント「Orchestrating a brighter world」としました。 NECグループが目指しているこの方向性の中で、本日は、○○○を実現する具体的な取り組み(ソリューション、サービス、技術)についてご説明します。 ----------------- ※そのほか、言葉に込めた意味、マークデザインに込めた意味については、「NEC Brand Principles」で確認してください。