Internet Architecture Board

RFC2850

Managing Radio Networks in an Encrypted World (MaRNEW) Workshop 2015

Home»Activities»Workshops»Managing Radio Networks in an Encrypted World (MaRNEW) Workshop 2015

Workshop Details

The MaRNEW Workshop is now over. Thanks to all who attended. Workshop minutes and report are being worked on currently and will be released soon. IETF94 attendees are welcome to attend the SAAG meeting for a workshop overview.

Title: Managing Radio Networks in an Encrypted World (MaRNEW)
Date: Thursday 24th – Friday 25th September, 2015
Place:  AT&T Atlanta, Atlanta, GA (see “Venue” below for more details)
Time: 9am – 6pm both days

Please sign up to the mailing list to receive up to date information about the workshop. To post a message to all the list members, send email to marnew@iab.org.

Workshop Bio

Mobile networks have a set of requirements and properties which places a large emphasis on sophisticated bandwidth optimization. Encryption is increasing on the internet which is a good thing for consumer and business privacy and security. Many existing mobile bandwidth optimization solutions primarily operate on non-encrypted communications; this can lead to performance issues being amplified on mobile networks. Encryption on networks will continue to increase; and with this understanding the workshop aims to understand how we can solve the issues of bandwidth optimization and performance on radio networks in this encrypted world.

Understanding “Bandwidth Optimization”

For the purposes of this workshop, bandwidth optimization encompasses a variety of technical topics related to traffic engineering, prioritisation, optimisation, efficiency enhancements, as well as user-related topics such as specific subscription or billing models. These can include:

  • Caching
  • Prioritisation of interactive traffic over background traffic,
  • Per-user bandwidth limits
  • Business-related topics such as content delivery arrangements with specific content providers.

Many of these functions can continue as they’re performed today, even with more encryption. Others traditionally inspect parts of the communication that are encrypted, and will have to be done differently in a more-encrypted Internet.

Finally, while not strictly speaking traffic management, some networks employ policy-based filtering (e.g., requested parental controls) and all networks support some form of legal interception functionality per applicable laws.

Topics

For this workshop we would like to consider topics that speak to these questions, including the following:

  • Understanding the bandwidth optimization use cases particular to radio networks
  • Understanding existing approaches and how these do not work with encrypted traffic
  • Understanding reasons why the Internet has not standardised support for LI and why mobile networks have
  • Determining how to match traffic types with bandwidth optimization methods
  • Discussing minimal information to be shared to manage networks but ensure user security and privacy
  • Developing new bandwidth optimization techniques and protocols within these new constraints
  • Discussing the appropriate network layer(s) for each management function
  • Cooperative methods of bandwidth optimization and issues associated with these

The outcome of the workshop will be architectural and engineering guidance on future work in the area, published as an IAB workshop report, based on discussion of proposed approaches. We will also explore possible areas for standardization, e.g. new protocols that can aid bandwidth optimization whilst ensuring user security inline with new work in the transport layer.

Position Papers

Workshop Slides

Workshop sessions were run as panels with minimal slides. These slides were either presented or just discussed throughout the sessions.

MarNEW Main Slide Deck, Natasha Rooney
Scene Setting, Stephen Farrell
GSMA Process Background, Natasha Rooney
Security, Privacy, and the Effects of Ubiquitous Encryption, Kathleen Moriarty
Concept for Cooperative Traffic Management, Szilveszter Nadas, Attila Mihaly
Security, Privacy, and Performance Considerations for the Mobile Web, Wendy Seltzer
Mobile Use Cases for Encrypted Traffic, Chunshan Xiong
Enabling Traffic Management without DPI, Mirja Kuhlewind, Dirk Kutscher, Brian Trammell
Optimizing TCP for Radio, Marcus Ihlar
Transport Layer Issues, Optimizations, and Solutions, Spencer Dawkins

Workshop Transcription

A Workshop Transcription will be created after the workshop has finished.

Additional Reading

Agenda

Date Time Description
Thur 24 09:00 – 09:20 Introduction: welcome, introductions and announcements
09:20 – 10:00 Scene Setting: defining goals, layouts and key in and out of cope topics.
10:00 – 11:15 Session 1: Encryption Deployment Considerations
11:15 – 11:45 Coffee Break
11:45 – 13:00 Session 2: Trust Models and User Choice (Privacy)
13:00 – 14:00 Lunch
14:00 – 15:45 Session 3: Sending Data Up for Network Management Benefits
15:45 – 16:15 Break
16:15 – 17:30 Session 4: Sending Data Down for Network Management Benefits
17:30 – 18:00 Day 1 Wrap Up
18:30 Social Dinner, SunDial Restaurant, 210 Peachtree St NW, Atlanta, GA 30303
Fri 25 09:00 – 10:30 Session 5: Application Layer Optimisation, Caching and CDNs
10:30 – 11:00 Break
11:00 – 12:30 Session 6: Transport Layer: Issues, Optimisation and Solutions
12:30 – 13:30 Lunch
13:30 – 14:30 Session 7: Technical Analysis and Response to Potential Regulatory Reaction
14:30 – 15:30 Parking Lot: time to review open questions from the last two days
15:30 – 16:00 Break
16:00 – 17:00 Roundup

Attendees

Rich Salz, Akamai
Aaron Falk, Akamai
Vinay Kanitkar, Akamai
Julien Maisonneuve, Alcatel Lucent
Dan Druta, AT&T
Humberto La Roche, Cisco
Thomas Anderson, Cisco
Paul Polakos, Cisco
Marcus Ihlar, Ericsson
Szilveszter Nadas, Ericsson
John Mattsson, Ericsson
Salvatore Loreto, Ericsson
Blake Matheny, Facebook
Andreas Terzis, Google
Jana Iyengar, Google
Natasha Rooney, GSMA
Istvan Lajtos, GSMA
Emma Wood, GSMA
Jianjie You, Huawei
Chunshan Xiong, Huawei
Russ Housley, IAB
Mary Barnes, IAB
Joe Hildebrand, IAB / Cisco
Ted Hardie, IAB / Google
Robert Sparks, IAB / Oracle
Spencer Dawkins, IETF AD
Benoit Claise, IETF AD / Cisco
Kathleen Moriarty, IETF AD / EMC
Barry Leiba, IETF AD / Huawei
Ben Campbell, IETF AD / Oracle
Stephen Farrell, IETF AD / Trinity College Dublin
Jari Arkko, IETF Chair / Ericsson
Karen O’Donoghue, ISOC
Phil Roberts, ISOC
Olaf Kolkman, ISOC
Christian Huitema, Microsoft
Patrick McManus, Mozilla
Mark Watson, Netflix
Martin Peylo, Nokia
Mohammed Dadas, Orange
Diego Lopez, Telefonica
Matteo Varvello, Telefonica
Zubair Shafiq, The University of Iowa
Vijay Devarapalli, Vasona Networks
Sanjay Mishra, Verizon
Gianpaolo Scassellati, Vimplecom
Kevin Smith, Vodafone
Wendy Seltzer, W3C
Dirk Kutscher, NEC Europe Network Laboratories

Technical Program Committee

  • Joe Hildebrand, IAB / Cisco, USA
  • Stephen Farrell, IETF AD / Trinity College Dublin, Ireland
  • Jari Arkko, IETF Chair / Ericsson, Finland
  • Natasha Rooney, GSMA, UK
  • Spencer Dawkins, IETF AD / Huawei, USA
  • Kathleen Moriarty, IETF AD / EMC, USA
  • Barry Leiba, IETF AD / Huawei, USA
  • Alia Atlas, IETF AD / Juniper Networks, USA
  • Ben Campbell, IETF AD / Oracle, USA
  • Karen O’Donoghue, ISOC, USA
  • Phil Roberts, ISOC, USA
  • Kevin Smith, Vodafone, UK
  • Sanjay Mishra, Verizon, USA
  • Istvan Lajtos, GSMA, UK
  • Salvatore Loreto, Ericsson, Finland
  • Diego Lopez, Telefonica, Spain
  • Dan Druta, AT&T, USA
  • Brian Trammell, ETH Zurich, Switzerland

Sponsored by the Internet Architecture Board, ISOC, AT&T and GSM Association.