SlideShare une entreprise Scribd logo
1  sur  34
Security & Transport Performance in 5G
Dr.-Ing. Dirk Kutscher
Chief Researcher Networking
NEC Laboratories Europe
2 © NEC Corporation 2015
Performance and Security Today
User
Equipment
Access
Network
Core/Service
Network
Application
Servers
3 © NEC Corporation 2015
Performance and Security Today
User
Equipment
Access
Network
Core/Service
Network
Application
Servers
TCP Proxies
4 © NEC Corporation 2015
Performance and Security Today
User
Equipment
Access
Network
Core/Service
Network
Application
Servers
TCP Proxies
Traffic Management Systems
5 © NEC Corporation 2015
Performance and Security Today
User
Equipment
Access
Network
Core/Service
Network
Application
Servers
TCP Proxies
Traffic Management Systems
Application (Video) Optimizers
6 © NEC Corporation 2015
Performance and Security Today
User
Equipment
Access
Network
Core/Service
Network
Application
Servers
TCP Proxies
Traffic Management Systems
Application (Video) Optimizers
Mobile
Throughput
Guidance
7 © NEC Corporation 2015
Motivation
▌TCP proxies
Lack of AQM and ECN deployment
Sub-optimal performance: e2e control loop over heterogenous networks
▌Traffic management systems
Lack of AQM and ECN deployment
Lack of incentives for adaptive applications
Perceived need for policing applications depending on access network conditions
▌Application optimizers
Operator resource conservation and performance concerns
Access to user data for analytics
▌Mobile Throughput Guidance
All of the above
8 © NEC Corporation 2015
CDN Today
Mainstream CDN
9 © NEC Corporation 2015
CDN Tomorrow
Mainstream CDN
10 © NEC Corporation 2015
CDN Tomorrow: Silo Danger
Mainstream CDN
VOD CDN
Social Network
CDN
11 © NEC Corporation 2015
Motivation
▌TCP proxies
 Lack of AQM and ECN deployment
 Sub-optimal performance: e2e control loop over heterogenous networks
▌Traffic management systems
 Lack of AQM and ECN deployment
 Lack of incentives for adaptive applications
 Perceived need for policing applications depending on access network conditions
▌Application optimizers
 Operator resource conservation and performance concerns
 Access to user data for analytics
▌Mobile Throughput Guidance
 All of the above
▌CDN
 Network offloading
 QoE improvement through latency reduction
 Moving data and computation closer to the edge
 Application-layer request/content routing policies
12 © NEC Corporation 2015
Observations
▌Significant infrastructure required to make things „only work“ today
Overcoming TCP e2e performance issues in heterogenous networks
▌Caching deemed important for scalable, low-latency data access
Deployment likely going to increase in next generation networks (edge caching)
General CDN and application-specific CDN deployments (new OTT services)
How many different CDN-like overlays will you have to run as an ISP?
▌What does that mean for 5G networks?
13 © NEC Corporation 2015
NGMN 5G Use Cases
Low latency,
local loop communication
Optimized Forwarding
for Heterogenous Access
Decentralized
Communication
Security,
User Privacy
14 © NEC Corporation 2015
NGMN 5G Use Cases
Security,
User Privacy
15 © NEC Corporation 2015
Security & User Privacy
▌HTTP/2 is here to stay
▌Connection-based encryption on transport layer (TLS)
Encrypt connection (and authenticate endpoints)
Encrypted channel for all communication
▌De-facto ubiquitous (client implementations...)
▌No (easy) way for traffic management (based on
flow/application information)
▌Major concerns with network operators
See recent GSMA/IAB workshop on Managing Radio Networks in an
Encrypted World (MaRNEW)
Many of the previously mentioned optimization become
difficult/expensive/impossible
16 © NEC Corporation 2015
TLS and Future Deep CDN
▌CDN and TLS
CDN nodes maintain certificates on keying material on behalf of publishers
Managing those certificates/keys is an important function of any CDN
Protecting those certificates/keys is an important security requirement
▌Scaling CDNs
More attack surfaces
More challenges to
certificate/key management
User-privacy only guaranteed
for connection to CDN proxy
▌Are there better ways?
Object-based security
Generic object caching
& forwarding infrastructure
Mainstream CDN
17 © NEC Corporation 2015
Optimized Forwarding for Heterogenous Access
▌Low latency, high-bandwidth
Fiber, new radios
▌Slow, ad-hoc, unpredictable
Low-power radios, sleep/duty cycles
Constrained devices
▌Massively scalable distribution
Server-push or pub/sub style
Possibly in-network adaptation
▌Variable performance
Dynamically changing network conditions
Disruptions and delays
On-board caching for all applications & protocols
18 © NEC Corporation 2015
Optimized Forwarding for Heterogenous Access
▌Will be difficult to implement with TCP as is
▌Remember: reduced deployment options for
application-layer gateways
▌Network of TCP proxies does not sound convincing
▌Need more powerful forwarding layer and
transport services
Potential for hop-by-hop forwarding strategies
Caching for local retransmissions
User
Equipment
Access
Network
Core/Service
Network
Application
Servers
19 © NEC Corporation 2015
Information-Centric Networking
▌Accessing Named Data Objects (NDOs) in the network
ADUs, chunks, fragments
▌Data-centric security approach
Disentangled means for name-content binding validation, publisher
authentication, confidentiality
▌Name-Content binding validation:
Public-Key and hash-based schemes
▌Publisher authentication
One approach: publishers to sign NDOs, signature part of NDO meta data; trust
model a la PKI
▌Confidentiality and access control
Payload encryption
20 © NEC Corporation 2015
ICN Overview
Requestor 1 Original
Content “XY1”
Owner
“Joe”
Content
Repository
Requestor 2
• Request Response, Receiver-driven
• Pending Interesting Tables
• Forward-by-name (prefix)
• Per-node forwarding strategies
• Object-based security
• Ubiquitous caching
/com/netflix/video/starwars
21 © NEC Corporation 2015
ICN Performance and Resource Management
▌Key ICN properties
Requesting individual Named Data Objects
Ubiquituous Caching
▌Implicit caching
Every router can store NDO – depending on configuration, policy etc.
Even with encrypted traffic, caching can help with local retransmissions, media re-
play etc.
▌Simplified mobility management
Request/Response model – eliminates need for tunnels
▌Flexible multipath communication
Powerful forwarding layer
Every router can make forwarding decisions depending on strategy, network
characteristics, name prefix, policy
▌Easy policing and filtering
Requestors, publishers and requestors see ICN requests and responses
Policing without DPI
Enabling other optimizations: in-network pre-fetching etc.
22 © NEC Corporation 2015
Proof-of-Concept
▌ICN for managing multi-path connectivity in Hybrid Access scenarios
HGW HAG
LTE
DSL
Core Network Internet Cloud Services
▌State of the art
Connection Bundling over IP tunnels (GRE): poor performance with transport
protocols
MPTCP: better from transport perspective, but problematic interaction with CDN
(DNS redirection per interface) and lack of policy control
23 © NEC Corporation 2015
Proof-of-Concept
▌ICN for managing multi-path connectivity in Hybrid Access scenarios
HGW HAG
LTE
DSL
Core Network Internet Cloud Services
▌ICN approach
 Routers have better visibility of interface performance (can continously measure
latency between requests and responses on a name-prefix basis)
 Easy to implement policy based on request prefixes
 Our implementation: prioritizing critical applications by constantly assessing
interface performance and by assigning best interfaces to prioritized applications
 Works with high degree of dynamicity (mobile networks)
▌First results
 Extremely fast response to congestion – on all nodes of a heterogenous path
 Constantly high capacity utilization
 Effective prioritization
/com/netflix/video/starwars
/com/os/updates
24 © NEC Corporation 2015
Other Recent Results
http://www.ietf.org/proceedings/interim/2014/09/27/icnrg/proceedings.html
25 © NEC Corporation 2015
Orange/ALU/SystemX Testbed Measurement Results
http://www.ietf.org/proceedings/interim/2014/09/27/icnrg/proceedings.html
26 © NEC Corporation 2015
5G Blueprint
Ctrl.
HA Load
Balancer
Ctrl.
…Internet
RNC IW3G
WiFi
4G
5G
xDSL
Cable
IW
vPoPs
Transport
Data Center
DB
auth. services
Minimal IPv6 connectivity
Baseline
IP e2e
applications
Mobility-managed, seamless IP connectivity
IM,
server
applications
M2M
applications
In-network
processing
Interactive
real-time
Low-latency, transport-
enhanced service
Caching,
multicast
Video
streaming,
VOD
27 © NEC Corporation 2015
5G Multitenancy
Ctrl.
HA Load
Balancer
Ctrl.
…
Internet
RNC IW3G
WiFi
4G
5G
xDSL
Cable
IW
vPoPs
Transport
Data Center
DB
auth.
services
Minimal IPv6 connectivity
Baseline
IP e2e
applications
Mobility-managed, seamless IP connectivity
IM,
server
applications
M2M
applications
In-network
processing
Interactive
real-time
Low-latency, transport-
enhanced service
Caching,
multicast
Video
streaming,
VOD
Telco
IaaS
ISP
A
Mobile
TV
service
28 © NEC Corporation 2015
Possible 5G ICN Deployment Option
Ctrl.
HA Load
Balancer
Ctrl.
…
Internet
RNC IW3G
WiFi
4G
5G
xDSL
Cable
IW
vPoPs
Transport
Data Center
DB
auth.
services
Minimal IPv6 connectivity
Telco
IaaS
ISP
A Information-Centric Networking
Infrastructure
Mobility-managed,
seamless IP
connectivity
In-network
caching
In-network
execution
Mobile
TV
service
Video
streaming,
VOD
IoT
Service
In-network
IoT
platforms
Interactive
Multi-
media
service
WebRTC
Platform
29 © NEC Corporation 2015
Conclusions: 5G has challenges beyond SDN/NFV
▌Security
User-privacy concerns one of the drivers for HTTP/2 (TLS) adoption
Will reduce leverage for operators for „value-added service“, application-layer
optimizations etc.
Security challenges for TLS and (Deep) CDN
▌Performance
5G has potential for better performance due to new link layers and backhaul
architectures
But: heterogenous access and diverse use cases also imply new challenges
▌Information-Centric Networking
Data-centric communication approach more
suitable for secure and efficient communication
Powerful forwarding layer: node-specific forwarding
strategies thanks to better visibility of forwarding performance
Common infrastructure for different types of
applications: enabling efficient multi-tenancy operation without silos
30 © NEC Corporation 2015
IRTF ICNRG
▌Cross-project research community
Not limited to a specific funding authority, project, protocol
Sharing of research results, new ideas
Documenting ICN scenarios, challenges, state-of-the-art solutions, gaps
Specifying protocols and semantics for ICN
Sharing implementation, experience from experiments
▌ICNRG and standards
Not setting standards...
But: helping to understand what needs to be standardized
And: working on specifications
▌ICNRG Administrivia
Web: http://irtf.org/icnrg
Chairs
• Börje Ohlman (Ericsson Research)
• Dave Oran (Cisco Systems)
• Dirk Kutscher (NEC Laboratories)
31 © NEC Corporation 2015
ICNRG Work Items
▌Scenarios, use cases
 Baseline scenarios (RFC 7476)
 Video distribution
 IoT
 Challenged networks and disaster scenarios
▌Challenges, evaluation
 Research challenges
 Evaluation Methodology
▌Protocol specifications
 CCNx Messages in TLV format
 CCNx Semantics
▌Newly proposed topics
 Manifests, chunking, fragmentation, versioning
 User privacy, access control
 Name resolution
 Named function networking
Documenting use
cases &
opportunities
Evolving research
agenda &
evaluation
approaches
Creating
interoperable
platforms for
experimentation
Evolving ICN
concepts and
technologies
32 © NEC Corporation 2015
Running Code
▌CCNx-1.0 (PARC)
PARC license
Developed by PARC
Implements ccnx-messages
and ccnx-semantics
▌CCN-lite (University of Basel)
Open Source, free to use without restrictions
Implements ccnx protocol
Used by RIOT project
▌NDN NFD (NDN project)
GPL-3.0
Maintained by NDN project
Implemented NDN protocol
Security and Transport Performance in 5G
Security and Transport Performance in 5G

Contenu connexe

Tendances

Fundamentals of 5G Network Slicing
Fundamentals of 5G Network SlicingFundamentals of 5G Network Slicing
Fundamentals of 5G Network Slicing
Tonex
 
iotmaship - Webinos iot and m2m - allott
iotmaship - Webinos iot and m2m - allottiotmaship - Webinos iot and m2m - allott
iotmaship - Webinos iot and m2m - allott
webinos project
 
How To : 5G Network Slicing, Key Principles, Architecture and Implementation ...
How To : 5G Network Slicing, Key Principles, Architecture and Implementation ...How To : 5G Network Slicing, Key Principles, Architecture and Implementation ...
How To : 5G Network Slicing, Key Principles, Architecture and Implementation ...
Bryan Len
 

Tendances (20)

Etsi wp24 mec_deployment_in_4_g_5g_final
Etsi wp24 mec_deployment_in_4_g_5g_finalEtsi wp24 mec_deployment_in_4_g_5g_final
Etsi wp24 mec_deployment_in_4_g_5g_final
 
5G, IoT and AI. Overview strategy for business_Rev20200505
5G, IoT and AI. Overview strategy for business_Rev202005055G, IoT and AI. Overview strategy for business_Rev20200505
5G, IoT and AI. Overview strategy for business_Rev20200505
 
5G SA security: a comprehensive overview of threats, vulnerabilities and rem...
 5G SA security: a comprehensive overview of threats, vulnerabilities and rem... 5G SA security: a comprehensive overview of threats, vulnerabilities and rem...
5G SA security: a comprehensive overview of threats, vulnerabilities and rem...
 
Tcl telecom expertise v 2 00 vs 220812
Tcl telecom expertise v 2 00 vs 220812Tcl telecom expertise v 2 00 vs 220812
Tcl telecom expertise v 2 00 vs 220812
 
Private 5G Seminar Brochure
Private 5G Seminar BrochurePrivate 5G Seminar Brochure
Private 5G Seminar Brochure
 
Fundamentals of 5G Network Slicing
Fundamentals of 5G Network SlicingFundamentals of 5G Network Slicing
Fundamentals of 5G Network Slicing
 
Parallel Wireless Webinar: 5G at #MWC19
Parallel Wireless Webinar: 5G at #MWC19Parallel Wireless Webinar: 5G at #MWC19
Parallel Wireless Webinar: 5G at #MWC19
 
Qualcomm 5g-vision-presentation
Qualcomm 5g-vision-presentationQualcomm 5g-vision-presentation
Qualcomm 5g-vision-presentation
 
Saguna edge computing solution for private enterprise networks
Saguna edge computing solution for private enterprise networksSaguna edge computing solution for private enterprise networks
Saguna edge computing solution for private enterprise networks
 
5G Spectrum Recommendations White Paper
5G Spectrum Recommendations  White Paper5G Spectrum Recommendations  White Paper
5G Spectrum Recommendations White Paper
 
TADSummit Closing Keynote: BYOSpectrum – Why private cellular is a game-changer
TADSummit Closing Keynote: BYOSpectrum – Why private cellular is a game-changerTADSummit Closing Keynote: BYOSpectrum – Why private cellular is a game-changer
TADSummit Closing Keynote: BYOSpectrum – Why private cellular is a game-changer
 
Driving fixed mobile convergence with 5 g 140617 final with notes
Driving fixed mobile convergence with 5 g 140617 final with notesDriving fixed mobile convergence with 5 g 140617 final with notes
Driving fixed mobile convergence with 5 g 140617 final with notes
 
Mavenir: Evolution of Real-Time Machine Learning (RRML) in Core Network Secur...
Mavenir: Evolution of Real-Time Machine Learning (RRML) in Core Network Secur...Mavenir: Evolution of Real-Time Machine Learning (RRML) in Core Network Secur...
Mavenir: Evolution of Real-Time Machine Learning (RRML) in Core Network Secur...
 
Samsung 5g vision white paper
Samsung 5g vision white paperSamsung 5g vision white paper
Samsung 5g vision white paper
 
5g tutorial
5g tutorial5g tutorial
5g tutorial
 
iotmaship - Webinos iot and m2m - allott
iotmaship - Webinos iot and m2m - allottiotmaship - Webinos iot and m2m - allott
iotmaship - Webinos iot and m2m - allott
 
IPLOOK Technologies(E.V)
IPLOOK Technologies(E.V)IPLOOK Technologies(E.V)
IPLOOK Technologies(E.V)
 
How To : 5G Network Slicing, Key Principles, Architecture and Implementation ...
How To : 5G Network Slicing, Key Principles, Architecture and Implementation ...How To : 5G Network Slicing, Key Principles, Architecture and Implementation ...
How To : 5G Network Slicing, Key Principles, Architecture and Implementation ...
 
Matthew Baker Nokia - 5G UK Spectrum Policy Forum
Matthew Baker  Nokia - 5G UK Spectrum Policy Forum Matthew Baker  Nokia - 5G UK Spectrum Policy Forum
Matthew Baker Nokia - 5G UK Spectrum Policy Forum
 
DWSPR19 Sessions plenieres 17042019 - 5G - Thierry BOISNON - Nokia
DWSPR19 Sessions plenieres 17042019 - 5G - Thierry BOISNON - Nokia DWSPR19 Sessions plenieres 17042019 - 5G - Thierry BOISNON - Nokia
DWSPR19 Sessions plenieres 17042019 - 5G - Thierry BOISNON - Nokia
 

En vedette

Rethinking the Telcos business models in the age of 5G - Carlos LOPEZ, Telefó...
Rethinking the Telcos business models in the age of 5G - Carlos LOPEZ, Telefó...Rethinking the Telcos business models in the age of 5G - Carlos LOPEZ, Telefó...
Rethinking the Telcos business models in the age of 5G - Carlos LOPEZ, Telefó...
IDATE DigiWorld
 
4g security presentation
4g security presentation4g security presentation
4g security presentation
Kyle Ly
 
Internet of Things: The story so far
Internet of Things: The story so farInternet of Things: The story so far
Internet of Things: The story so far
PayamBarnaghi
 
4G LTE Presentation Group 9
4G LTE Presentation Group 94G LTE Presentation Group 9
4G LTE Presentation Group 9
eel4514team9
 

En vedette (20)

Lte security solution white paper(20130207)
Lte security solution white paper(20130207)Lte security solution white paper(20130207)
Lte security solution white paper(20130207)
 
Gsm security and encryption
Gsm security and encryptionGsm security and encryption
Gsm security and encryption
 
LTE :Mobile Network Security
LTE :Mobile Network SecurityLTE :Mobile Network Security
LTE :Mobile Network Security
 
IoT and 5G: Opportunities and Challenges, SenZations 2015
IoT and 5G: Opportunities and Challenges, SenZations 2015IoT and 5G: Opportunities and Challenges, SenZations 2015
IoT and 5G: Opportunities and Challenges, SenZations 2015
 
Rethinking the Telcos business models in the age of 5G - Carlos LOPEZ, Telefó...
Rethinking the Telcos business models in the age of 5G - Carlos LOPEZ, Telefó...Rethinking the Telcos business models in the age of 5G - Carlos LOPEZ, Telefó...
Rethinking the Telcos business models in the age of 5G - Carlos LOPEZ, Telefó...
 
5 g business potential ieee 5g summit_110717_a
5 g business potential ieee 5g summit_110717_a5 g business potential ieee 5g summit_110717_a
5 g business potential ieee 5g summit_110717_a
 
Security in GSM(2G) and UMTS(3G) Networks
Security in GSM(2G) and UMTS(3G) NetworksSecurity in GSM(2G) and UMTS(3G) Networks
Security in GSM(2G) and UMTS(3G) Networks
 
Small Cells & 5G IoT champions work item
Small Cells & 5G IoT champions work itemSmall Cells & 5G IoT champions work item
Small Cells & 5G IoT champions work item
 
Gsm security and encryption
Gsm security and encryptionGsm security and encryption
Gsm security and encryption
 
Smart Cities, IoT, SDN, 5G Networks, Cloud Computing… Managing Complexity wit...
Smart Cities, IoT, SDN, 5G Networks, Cloud Computing… Managing Complexity wit...Smart Cities, IoT, SDN, 5G Networks, Cloud Computing… Managing Complexity wit...
Smart Cities, IoT, SDN, 5G Networks, Cloud Computing… Managing Complexity wit...
 
Security In LTE Access Network
Security In LTE Access NetworkSecurity In LTE Access Network
Security In LTE Access Network
 
5G-webinar from 5G-course, Anritsu, adcomm
5G-webinar from 5G-course, Anritsu, adcomm 5G-webinar from 5G-course, Anritsu, adcomm
5G-webinar from 5G-course, Anritsu, adcomm
 
4g security presentation
4g security presentation4g security presentation
4g security presentation
 
Security Testing 4G (LTE) Networks - 44CON 2012
Security Testing 4G (LTE) Networks - 44CON 2012Security Testing 4G (LTE) Networks - 44CON 2012
Security Testing 4G (LTE) Networks - 44CON 2012
 
Internet of Things: The story so far
Internet of Things: The story so farInternet of Things: The story so far
Internet of Things: The story so far
 
Long Term Evolution (LTE) -
Long Term Evolution (LTE) -Long Term Evolution (LTE) -
Long Term Evolution (LTE) -
 
The leadership in the new digital age carved by the fourth industrial revolu...
The leadership in the new digital age carved by  the fourth industrial revolu...The leadership in the new digital age carved by  the fourth industrial revolu...
The leadership in the new digital age carved by the fourth industrial revolu...
 
4G LTE Security - What hackers know?
4G LTE Security - What hackers know?4G LTE Security - What hackers know?
4G LTE Security - What hackers know?
 
4G LTE Presentation Group 9
4G LTE Presentation Group 94G LTE Presentation Group 9
4G LTE Presentation Group 9
 
5G Presentation
5G Presentation5G Presentation
5G Presentation
 

Similaire à Security and Transport Performance in 5G

Similaire à Security and Transport Performance in 5G (20)

Accelerating 5G enterprise networks with edge computing and latency assurance
Accelerating 5G enterprise networks with edge computing and latency assuranceAccelerating 5G enterprise networks with edge computing and latency assurance
Accelerating 5G enterprise networks with edge computing and latency assurance
 
Open Source Carrier Networking
Open Source Carrier NetworkingOpen Source Carrier Networking
Open Source Carrier Networking
 
Network optimisation and management - Guaranteed network quality with less cost
Network optimisation and management - Guaranteed network quality with less costNetwork optimisation and management - Guaranteed network quality with less cost
Network optimisation and management - Guaranteed network quality with less cost
 
Cloud Services: Is the Transport Network a Utility or Differentiator
Cloud Services: Is the Transport Network a Utility or DifferentiatorCloud Services: Is the Transport Network a Utility or Differentiator
Cloud Services: Is the Transport Network a Utility or Differentiator
 
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
 
New world IP traffic, new dimensions for Diameter management
New world IP traffic, new dimensions for Diameter managementNew world IP traffic, new dimensions for Diameter management
New world IP traffic, new dimensions for Diameter management
 
Network Convergence of Mobile, Broadband and Wi-Fi
Network Convergence of Mobile, Broadband and Wi-FiNetwork Convergence of Mobile, Broadband and Wi-Fi
Network Convergence of Mobile, Broadband and Wi-Fi
 
Edge virtualisation for Carrier Networks
Edge virtualisation for Carrier NetworksEdge virtualisation for Carrier Networks
Edge virtualisation for Carrier Networks
 
Network Rightsizing Best Practices Guide
Network Rightsizing Best Practices GuideNetwork Rightsizing Best Practices Guide
Network Rightsizing Best Practices Guide
 
Exhibitor session: Ciena
Exhibitor session: CienaExhibitor session: Ciena
Exhibitor session: Ciena
 
NGN BASICS
NGN BASICSNGN BASICS
NGN BASICS
 
How to use SDN to Innovate, Expand and Deliver for your business
How to use SDN to Innovate, Expand and Deliver for your businessHow to use SDN to Innovate, Expand and Deliver for your business
How to use SDN to Innovate, Expand and Deliver for your business
 
Adoption of SDN: Progress Update
Adoption of SDN: Progress UpdateAdoption of SDN: Progress Update
Adoption of SDN: Progress Update
 
Unleash the power, intelligence, and analytics of your networks with a flexib...
Unleash the power, intelligence, and analytics of your networks with a flexib...Unleash the power, intelligence, and analytics of your networks with a flexib...
Unleash the power, intelligence, and analytics of your networks with a flexib...
 
Implications of 4G Deployments (MEF for MPLS World Congress Ethernet Wholesa...
Implications of 4G Deployments (MEF for MPLS World Congress  Ethernet Wholesa...Implications of 4G Deployments (MEF for MPLS World Congress  Ethernet Wholesa...
Implications of 4G Deployments (MEF for MPLS World Congress Ethernet Wholesa...
 
Putting the M in MANO: Major new Ensemble release delivers NFV management and...
Putting the M in MANO: Major new Ensemble release delivers NFV management and...Putting the M in MANO: Major new Ensemble release delivers NFV management and...
Putting the M in MANO: Major new Ensemble release delivers NFV management and...
 
Telecoms Service Assurance & Service Fulfillment with Neo4j Graph Database
Telecoms Service Assurance & Service Fulfillment with Neo4j Graph DatabaseTelecoms Service Assurance & Service Fulfillment with Neo4j Graph Database
Telecoms Service Assurance & Service Fulfillment with Neo4j Graph Database
 
5G in Brownfield how SDN makes 5G Deployments Work
5G in Brownfield how SDN makes 5G Deployments Work5G in Brownfield how SDN makes 5G Deployments Work
5G in Brownfield how SDN makes 5G Deployments Work
 
New world IP traffic, new dimensions for Diameter management
New world IP traffic, new dimensions for Diameter managementNew world IP traffic, new dimensions for Diameter management
New world IP traffic, new dimensions for Diameter management
 
Simplify and secure your path to the multicloud future
Simplify and secure your path to the multicloud futureSimplify and secure your path to the multicloud future
Simplify and secure your path to the multicloud future
 

Dernier

一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
pxcywzqs
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Monica Sydney
 
PowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxPowerDirector Explination Process...pptx
PowerDirector Explination Process...pptx
galaxypingy
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
gajnagarg
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
ydyuyu
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Monica Sydney
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
ayvbos
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
ayvbos
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
ydyuyu
 

Dernier (20)

20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
Power point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria IuzzolinoPower point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria Iuzzolino
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
PowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxPowerDirector Explination Process...pptx
PowerDirector Explination Process...pptx
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency Dallas
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 

Security and Transport Performance in 5G

  • 1. Security & Transport Performance in 5G Dr.-Ing. Dirk Kutscher Chief Researcher Networking NEC Laboratories Europe
  • 2. 2 © NEC Corporation 2015 Performance and Security Today User Equipment Access Network Core/Service Network Application Servers
  • 3. 3 © NEC Corporation 2015 Performance and Security Today User Equipment Access Network Core/Service Network Application Servers TCP Proxies
  • 4. 4 © NEC Corporation 2015 Performance and Security Today User Equipment Access Network Core/Service Network Application Servers TCP Proxies Traffic Management Systems
  • 5. 5 © NEC Corporation 2015 Performance and Security Today User Equipment Access Network Core/Service Network Application Servers TCP Proxies Traffic Management Systems Application (Video) Optimizers
  • 6. 6 © NEC Corporation 2015 Performance and Security Today User Equipment Access Network Core/Service Network Application Servers TCP Proxies Traffic Management Systems Application (Video) Optimizers Mobile Throughput Guidance
  • 7. 7 © NEC Corporation 2015 Motivation ▌TCP proxies Lack of AQM and ECN deployment Sub-optimal performance: e2e control loop over heterogenous networks ▌Traffic management systems Lack of AQM and ECN deployment Lack of incentives for adaptive applications Perceived need for policing applications depending on access network conditions ▌Application optimizers Operator resource conservation and performance concerns Access to user data for analytics ▌Mobile Throughput Guidance All of the above
  • 8. 8 © NEC Corporation 2015 CDN Today Mainstream CDN
  • 9. 9 © NEC Corporation 2015 CDN Tomorrow Mainstream CDN
  • 10. 10 © NEC Corporation 2015 CDN Tomorrow: Silo Danger Mainstream CDN VOD CDN Social Network CDN
  • 11. 11 © NEC Corporation 2015 Motivation ▌TCP proxies  Lack of AQM and ECN deployment  Sub-optimal performance: e2e control loop over heterogenous networks ▌Traffic management systems  Lack of AQM and ECN deployment  Lack of incentives for adaptive applications  Perceived need for policing applications depending on access network conditions ▌Application optimizers  Operator resource conservation and performance concerns  Access to user data for analytics ▌Mobile Throughput Guidance  All of the above ▌CDN  Network offloading  QoE improvement through latency reduction  Moving data and computation closer to the edge  Application-layer request/content routing policies
  • 12. 12 © NEC Corporation 2015 Observations ▌Significant infrastructure required to make things „only work“ today Overcoming TCP e2e performance issues in heterogenous networks ▌Caching deemed important for scalable, low-latency data access Deployment likely going to increase in next generation networks (edge caching) General CDN and application-specific CDN deployments (new OTT services) How many different CDN-like overlays will you have to run as an ISP? ▌What does that mean for 5G networks?
  • 13. 13 © NEC Corporation 2015 NGMN 5G Use Cases Low latency, local loop communication Optimized Forwarding for Heterogenous Access Decentralized Communication Security, User Privacy
  • 14. 14 © NEC Corporation 2015 NGMN 5G Use Cases Security, User Privacy
  • 15. 15 © NEC Corporation 2015 Security & User Privacy ▌HTTP/2 is here to stay ▌Connection-based encryption on transport layer (TLS) Encrypt connection (and authenticate endpoints) Encrypted channel for all communication ▌De-facto ubiquitous (client implementations...) ▌No (easy) way for traffic management (based on flow/application information) ▌Major concerns with network operators See recent GSMA/IAB workshop on Managing Radio Networks in an Encrypted World (MaRNEW) Many of the previously mentioned optimization become difficult/expensive/impossible
  • 16. 16 © NEC Corporation 2015 TLS and Future Deep CDN ▌CDN and TLS CDN nodes maintain certificates on keying material on behalf of publishers Managing those certificates/keys is an important function of any CDN Protecting those certificates/keys is an important security requirement ▌Scaling CDNs More attack surfaces More challenges to certificate/key management User-privacy only guaranteed for connection to CDN proxy ▌Are there better ways? Object-based security Generic object caching & forwarding infrastructure Mainstream CDN
  • 17. 17 © NEC Corporation 2015 Optimized Forwarding for Heterogenous Access ▌Low latency, high-bandwidth Fiber, new radios ▌Slow, ad-hoc, unpredictable Low-power radios, sleep/duty cycles Constrained devices ▌Massively scalable distribution Server-push or pub/sub style Possibly in-network adaptation ▌Variable performance Dynamically changing network conditions Disruptions and delays On-board caching for all applications & protocols
  • 18. 18 © NEC Corporation 2015 Optimized Forwarding for Heterogenous Access ▌Will be difficult to implement with TCP as is ▌Remember: reduced deployment options for application-layer gateways ▌Network of TCP proxies does not sound convincing ▌Need more powerful forwarding layer and transport services Potential for hop-by-hop forwarding strategies Caching for local retransmissions User Equipment Access Network Core/Service Network Application Servers
  • 19. 19 © NEC Corporation 2015 Information-Centric Networking ▌Accessing Named Data Objects (NDOs) in the network ADUs, chunks, fragments ▌Data-centric security approach Disentangled means for name-content binding validation, publisher authentication, confidentiality ▌Name-Content binding validation: Public-Key and hash-based schemes ▌Publisher authentication One approach: publishers to sign NDOs, signature part of NDO meta data; trust model a la PKI ▌Confidentiality and access control Payload encryption
  • 20. 20 © NEC Corporation 2015 ICN Overview Requestor 1 Original Content “XY1” Owner “Joe” Content Repository Requestor 2 • Request Response, Receiver-driven • Pending Interesting Tables • Forward-by-name (prefix) • Per-node forwarding strategies • Object-based security • Ubiquitous caching /com/netflix/video/starwars
  • 21. 21 © NEC Corporation 2015 ICN Performance and Resource Management ▌Key ICN properties Requesting individual Named Data Objects Ubiquituous Caching ▌Implicit caching Every router can store NDO – depending on configuration, policy etc. Even with encrypted traffic, caching can help with local retransmissions, media re- play etc. ▌Simplified mobility management Request/Response model – eliminates need for tunnels ▌Flexible multipath communication Powerful forwarding layer Every router can make forwarding decisions depending on strategy, network characteristics, name prefix, policy ▌Easy policing and filtering Requestors, publishers and requestors see ICN requests and responses Policing without DPI Enabling other optimizations: in-network pre-fetching etc.
  • 22. 22 © NEC Corporation 2015 Proof-of-Concept ▌ICN for managing multi-path connectivity in Hybrid Access scenarios HGW HAG LTE DSL Core Network Internet Cloud Services ▌State of the art Connection Bundling over IP tunnels (GRE): poor performance with transport protocols MPTCP: better from transport perspective, but problematic interaction with CDN (DNS redirection per interface) and lack of policy control
  • 23. 23 © NEC Corporation 2015 Proof-of-Concept ▌ICN for managing multi-path connectivity in Hybrid Access scenarios HGW HAG LTE DSL Core Network Internet Cloud Services ▌ICN approach  Routers have better visibility of interface performance (can continously measure latency between requests and responses on a name-prefix basis)  Easy to implement policy based on request prefixes  Our implementation: prioritizing critical applications by constantly assessing interface performance and by assigning best interfaces to prioritized applications  Works with high degree of dynamicity (mobile networks) ▌First results  Extremely fast response to congestion – on all nodes of a heterogenous path  Constantly high capacity utilization  Effective prioritization /com/netflix/video/starwars /com/os/updates
  • 24. 24 © NEC Corporation 2015 Other Recent Results http://www.ietf.org/proceedings/interim/2014/09/27/icnrg/proceedings.html
  • 25. 25 © NEC Corporation 2015 Orange/ALU/SystemX Testbed Measurement Results http://www.ietf.org/proceedings/interim/2014/09/27/icnrg/proceedings.html
  • 26. 26 © NEC Corporation 2015 5G Blueprint Ctrl. HA Load Balancer Ctrl. …Internet RNC IW3G WiFi 4G 5G xDSL Cable IW vPoPs Transport Data Center DB auth. services Minimal IPv6 connectivity Baseline IP e2e applications Mobility-managed, seamless IP connectivity IM, server applications M2M applications In-network processing Interactive real-time Low-latency, transport- enhanced service Caching, multicast Video streaming, VOD
  • 27. 27 © NEC Corporation 2015 5G Multitenancy Ctrl. HA Load Balancer Ctrl. … Internet RNC IW3G WiFi 4G 5G xDSL Cable IW vPoPs Transport Data Center DB auth. services Minimal IPv6 connectivity Baseline IP e2e applications Mobility-managed, seamless IP connectivity IM, server applications M2M applications In-network processing Interactive real-time Low-latency, transport- enhanced service Caching, multicast Video streaming, VOD Telco IaaS ISP A Mobile TV service
  • 28. 28 © NEC Corporation 2015 Possible 5G ICN Deployment Option Ctrl. HA Load Balancer Ctrl. … Internet RNC IW3G WiFi 4G 5G xDSL Cable IW vPoPs Transport Data Center DB auth. services Minimal IPv6 connectivity Telco IaaS ISP A Information-Centric Networking Infrastructure Mobility-managed, seamless IP connectivity In-network caching In-network execution Mobile TV service Video streaming, VOD IoT Service In-network IoT platforms Interactive Multi- media service WebRTC Platform
  • 29. 29 © NEC Corporation 2015 Conclusions: 5G has challenges beyond SDN/NFV ▌Security User-privacy concerns one of the drivers for HTTP/2 (TLS) adoption Will reduce leverage for operators for „value-added service“, application-layer optimizations etc. Security challenges for TLS and (Deep) CDN ▌Performance 5G has potential for better performance due to new link layers and backhaul architectures But: heterogenous access and diverse use cases also imply new challenges ▌Information-Centric Networking Data-centric communication approach more suitable for secure and efficient communication Powerful forwarding layer: node-specific forwarding strategies thanks to better visibility of forwarding performance Common infrastructure for different types of applications: enabling efficient multi-tenancy operation without silos
  • 30. 30 © NEC Corporation 2015 IRTF ICNRG ▌Cross-project research community Not limited to a specific funding authority, project, protocol Sharing of research results, new ideas Documenting ICN scenarios, challenges, state-of-the-art solutions, gaps Specifying protocols and semantics for ICN Sharing implementation, experience from experiments ▌ICNRG and standards Not setting standards... But: helping to understand what needs to be standardized And: working on specifications ▌ICNRG Administrivia Web: http://irtf.org/icnrg Chairs • Börje Ohlman (Ericsson Research) • Dave Oran (Cisco Systems) • Dirk Kutscher (NEC Laboratories)
  • 31. 31 © NEC Corporation 2015 ICNRG Work Items ▌Scenarios, use cases  Baseline scenarios (RFC 7476)  Video distribution  IoT  Challenged networks and disaster scenarios ▌Challenges, evaluation  Research challenges  Evaluation Methodology ▌Protocol specifications  CCNx Messages in TLV format  CCNx Semantics ▌Newly proposed topics  Manifests, chunking, fragmentation, versioning  User privacy, access control  Name resolution  Named function networking Documenting use cases & opportunities Evolving research agenda & evaluation approaches Creating interoperable platforms for experimentation Evolving ICN concepts and technologies
  • 32. 32 © NEC Corporation 2015 Running Code ▌CCNx-1.0 (PARC) PARC license Developed by PARC Implements ccnx-messages and ccnx-semantics ▌CCN-lite (University of Basel) Open Source, free to use without restrictions Implements ccnx protocol Used by RIOT project ▌NDN NFD (NDN project) GPL-3.0 Maintained by NDN project Implemented NDN protocol

Notes de l'éditeur

  1. Note: even with TLS, publishers could still decide which transaction require a secure connection – but Security management concerns HTTP/2 client implementations...
  2. #本スライドの活用について NECグループのブランドステートメント「Orchestrating a brighter world」は、ステークホルダーへの約束として、NECグループの企業姿勢、実現したい世界観と、それに対する自らの「行動・能力」を表現したものです。 社外向け発信活動においては、必ず表紙の次ページに本スライドを挿入し、ブランドステートメントとともにどんなストーリーを展開するかを説明するように心掛けてください。 <セリフ例>----- 私たちNECグループは、お客さまや社会と共創して、社会価値を創造していきます。 人が生きる、豊かに生きる、そして明るい未来につなげていくために。 これをブランドステートメント「Orchestrating a brighter world」としました。 NECグループが目指しているこの方向性の中で、本日は、○○○を実現する具体的な取り組み(ソリューション、サービス、技術)についてご説明します。 ----------------- ※そのほか、言葉に込めた意味、マークデザインに込めた意味については、「NEC Brand Principles」で確認してください。