Characteristics of Traffic Type Changes and Their Architectural Implications

Similar documents
IETF Topics and Internet Evolution

SaaS Providers. ThousandEyes for. Summary

Accelerate Your Enterprise Private Cloud Initiative

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise

Middleboxes in Cellular Networks

Update on 5G Work & The IETF. Jari Arkko & Jeff Tantsura IAB Retreat, May 2017

MPEG's Dynamic Adaptive Streaming over HTTP - An Enabling Standard for Internet TV. Thomas Stockhammer Qualcomm Incorporated

VMworld 2015 Track Names and Descriptions

The Top Five Reasons to Deploy Software-Defined Networks and Network Functions Virtualization

The Impact of Transport Header Encryption on Operation and Evolution of the Internet. draft-fairhurst-tsvwg-transport-encrypt-04

How Cisco IT Improves Commerce User Experience by Securely Sharing Internal Business Services with Partners

GET CLOUD EMPOWERED. SEE HOW THE CLOUD CAN TRANSFORM YOUR BUSINESS.

THE STATE OF MEDIA SECURITY HOW MEDIA COMPANIES ARE SECURING THEIR ONLINE PROPERTIES

VMworld 2015 Track Names and Descriptions

MASERGY S MANAGED SD-WAN

Q2 TLS 1.0 Disablement Frequently Asked Questions 12/4/17

Load Balancing 101: Nuts and Bolts

ThousandEyes for. Application Delivery White Paper

Cisco Wide Area Application Services and Cisco Nexus Family Switches: Enable the Intelligent Data Center

The F5 Application Services Reference Architecture

Load Balancing 101: Nuts and Bolts

5G Readiness Survey 2017

I D C T E C H N O L O G Y S P O T L I G H T. V i r t u a l and Cloud D a t a Center Management

Connected vehicle cloud Commercial presentation

Tiny COAP Sensors. Ericsson Research. draft-arkko-core-sleepy-sensors

Revolutionising mobile networks with SDN and NFV

System Analysis & design

SDN HAS ARRIVED, BUT NEEDS COMPLEMENTARY MANAGEMENT TOOLS

Multi-Domain Service Optimization

Why the end-to-end principle matters for privacy

STATE OF STORAGE IN VIRTUALIZED ENVIRONMENTS INSIGHTS FROM THE MIDMARKET

THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS

Internet Architecture & Low-Latency Communications! Jari Arkko and Jeff Tantsura! May 2017!

Complex Interactions in Content Distribution Ecosystem and QoE

Introduction. Delivering Management as Agile as the Cloud: Enabling New Architectures with CA Technologies Virtual Network Assurance Solution

An Architecture. What the MEC? for 5G

Cloud Computing and Its Impact on Software Licensing

MPLS vs SDWAN.

Part I: Future Internet Foundations: Architectural Issues

Transformation Through Innovation

SDN meets the real world part two: SDN rewrites the WAN manual

NEXT GENERATION SECURITY OPERATIONS CENTER

SDN, SD-WAN, NFV, VNF I m confused!

SEVEN Networks Open Channel Traffic Optimization

SOLUTION BRIEF RSA NETWITNESS EVOLVED SIEM

Modernizing Healthcare IT for the Data-driven Cognitive Era Storage and Software-Defined Infrastructure

Protecting Mission-Critical Workloads with VMware Fault Tolerance W H I T E P A P E R

Enterprise Cloud Computing. Eddie Toh Platform Marketing Manager, APAC Data Centre Group Cisco Summit 2010, Kuala Lumpur

Securing Office 365 with MobileIron

Networking for a dynamic infrastructure: getting it right.

November 2017 WebRTC for Live Media and Broadcast Second screen and CDN traffic optimization. Author: Jesús Oliva Founder & Media Lead Architect

WIRELESS INTERNET ACCESS: 3G VS.Wifi?

Why Converged Infrastructure?

The Emerging Role of a CDN in Facilitating Secure Cloud Deployments

Cyber Threat Landscape April 2013

Preparing your network for the next wave of innovation

Future Shifts in Enterprise Architecture Evolution. IPMA Marlyn Zelkowitz, SAP Industry Business Solutions May 22 nd, 2013

Verasys Enterprise Security and IT Guide

IPv6 Deployment in Africa

Cisco 5G Vision Series: Vertical Value Creation

AVAYA SDN Fx HEALTHCARE SOLUTION BRIEF

Achieving Digital Transformation: FOUR MUST-HAVES FOR A MODERN VIRTUALIZATION PLATFORM WHITE PAPER

Acceleration Performance Tests for IBM Rational ClearTeam Explorer

Cisco APIC Enterprise Module Simplifies Network Operations

THE IMPLICATIONS OF PERFORMANCE, SECURITY, AND RESOURCE CONSTRAINTS IN DIGITAL TRANSFORMATION

Making the case for SD-WAN

What s the magic of real-time video streaming with hyper-low latency?

NFV PM Thought Experiments Yaakov (J) Stein

Evolution For Enterprises In A Cloud World

Current Challenges in Internet Technology

Workshop on the IPv6 development in Saudi Arabia 8 February 2009; Riyadh - KSA

CloudSwyft Learning-as-a-Service Course Catalog 2018 (Individual LaaS Course Catalog List)

Paper. Delivering Strong Security in a Hyperconverged Data Center Environment

HOW NEWNODE WORKS. Efficient and Inefficient Networks NEWNODE. And Who Needs a Content Distribution Network Anyway?

SMART CONTENT INBOUND TRAINING DAY WORKBOOK. Angela Hicks HubSpot Academy

Continuous Integration & Continuous Deployment (CI/CD) with a Cloud Delivery Platform

Security improvement in IOT based on Software

Introduction to Cloud Computing. [thoughtsoncloud.com] 1

SD-WAN Solution How to Make the Best Choice for Your Business

Remodel. New server deployment time is reduced from weeks to minutes

Seven Criteria for a Sound Investment in WAN Optimization

Cisco Digital Media System: Simply Compelling Communications

A BETTER PATH: Security Enlightened. Security s Shift to the Cloud

Efficient Data Center Virtualization Requires All-flash Storage

The Top 6 WAF Essentials to Achieve Application Security Efficacy

Complying with PCI DSS 3.0

Griffith University IPv6 Guidelines. IPv6 Guidelines

ATA DRIVEN GLOBAL VISION CLOUD PLATFORM STRATEG N POWERFUL RELEVANT PERFORMANCE SOLUTION CLO IRTUAL BIG DATA SOLUTION ROI FLEXIBLE DATA DRIVEN V

Integrated Access Management Solutions. Access Televentures

ATA DRIVEN GLOBAL VISION CLOUD PLATFORM STRATEG N POWERFUL RELEVANT PERFORMANCE SOLUTION CLO IRTUAL BIG DATA SOLUTION ROI FLEXIBLE DATA DRIVEN V

Three Key Challenges Facing ISPs and Their Enterprise Clients

21ST century enterprise. HCL Technologies Presents. Roadmap for Data Center Transformation

Small Cells as a Service rethinking the mobile operator business

BUILDING the VIRtUAL enterprise

trend micro smart Protection suites


Using the Network to Optimize a Virtualized Data Center

OpFlex: An Open Policy Protocol

Developing Microsoft Azure Solutions

The SD-WAN security guide

Transcription:

Characteristics of Traffic Type Changes and Their Architectural Implications Jari Arkko, Ericsson Research (jari.arkko@piuha.net) Göran Eriksson, Ericsson Research (goran.ap.eriksson@ericsson.com) Abstract: This paper summarizes the reasons for the recent evolution in Internet traffic patterns, focusing on the increased encrypted content and the evolution of the web protocols in particular. These changes and factors enabling them have some interesting characteristics that can perhaps help us understand these and the upcoming changes better. The paper highlights some of the implications, and suggests some potential directions for work that seem fruitful for dealing with the traffic evolution. Introduction This paper summarizes the reasons for the recent evolution in Internet traffic patterns, focusing on the increased encrypted content and the evolution of the web protocols in particular. These changes and factors enabling them have some interesting characteristics that can perhaps help us understand these and the upcoming changes better. The paper highlights some of the implications of the characteristics for Internet architecture, and suggests some directions for work that seem fruitful for dealing with the traffic evolution. Characteristics One characteristic is that there are both long-term and fasterpaced changes in Internet evolution. When long-term evolution brings fundamental new capabilities, sudden changes in actual traffic patterns become possible.

One example of this is the availability of secure web communications in browsers, servers, and other systems. This underlying capability can develop but be in limited use, until a service provider finds a reason for employing this capability. Given some highly popular Internet services, even a single service provider may have a big impact on the global traffic patterns, if they find such a reason. If such reasons appear on the global scale for many providers, they together will have an even more pronounced effect. In the case of secure web communications, the capabilities for doing this have been broadly available in browsers for a long time, and a growing number of server farms have been set up to provide that capability as well. The use of these capabilities is now growing relatively rapidly, and has for the last several years. The reasons for the use of these capabilities are varied, ranging from basic need to protect end-user accounts in open networks, privacy protection in a broad sense, to securing control of the service delivery or other business reasons. This phenomenon has also been seen with IPv6 deployment, where the development of IPv6-capable devices and content services has created a latent capability. When IPv6 connectivity becomes available through an operator s network, the swing to using IPv6 in those content services can be quick. The home country of one of the authors, Finland, recently experienced this as IPv6 take-up rate increased from 0.5% to 8% in a matter of weeks, merely because one large access provider turned their IPv6 networking on. Latent capabilities in the rest of the ecosystem devices and content providers, enabled that change to lead to quick changes in traffic patterns. There is also one fundamental latent capability that can drive other capability improvements: automatic software updates. While there are of course many systems (such as small IOT devices) that unfortunately do not update themselves automatically, many other systems today do.

Analysis The evolution in secure web communications and IPv6 are just examples of the kinds of effects that we may see. It is very likely that further evolution in web and transport protocols will follow similar paths. Also, the mobile device markets and associated content and application services are a relatively consolidated market. This implies that there are cases where some large entities find it easy to evolve both ends of the communication, such as the browser and content service including origin servers and deep network caches. This makes evolution faster than if a broad change within the overall Internet community would be needed first. Implications These swings in traffic can have impacts on the operators carrying the traffic. This is not merely a question of managing traffic, but can go to the core questions of the amount of traffic, the direction of traffic flows, and who the communicating parties are. When we look at the increased encryption, we should not prepare ourselves to merely deal with its effects. We need to prepare for a period of increasingly fast evolution in the Internet traffic patterns and technology. Such evolution may include new transport solutions, HTTP version 3 and beyond, the introduction of new parties (such as caching, CDN, or P2P entities), new types of security (such as content-based security), and other things that we cannot foresee at this point. Indeed, many of these changes are already being discussed, prototyped, or even deployed. There are several architectural implications of this. Traffic management tools dealing with pure IP transport and traffic patterns continue to have significance. Perhaps even more than they have had for a while back to basics. But without the ability to peek into what the applications are doing, there may be some opportunities for end-points, such as user devices, to provide more information to the network regarding the traffic characteristics.

Application-level operations (such as deep packet inspection) in the network become difficult or need to evolve into different types of practices. One potential aspect of such evolution is that current network management tasks are often done standalone by an operator. End-to-end security will likely increase co-operative management operations, such as contracted CDN operations. These operations are less easy to deploy due to the need for the agreements, and may not be setup in all networks. Finally, if the evolution is about fundamentally increased flexibility rather than the specific issue of encryption, networks need to deal with that flexibility. The ability to evolve network services on a fastpaced timeline will be crucial, be it about reacting to traffic pattern changes or building those co-operative network components that were mentioned above. Many of the current trends in networking are largely about addressing this need: automation, softwaredefined networking, virtualization of network functions, and cloud services, for instance. But at the same time it is important to understand the distinction between pure networking services and application-level operations. Even with highly flexible tools, the latter operations will likely need to operate in co-operative fashion, because access to application-level information may not be available otherwise. The ability of networking services to make decisions with limited information can be improved by opening APIs where some information can be exposed, without compromising the user s privacy or other reasons behind the use of end-to-end security. The difficulty in doing this lies mostly in our ability to provide interfaces that actually get deployed both in networks that offer the interfaces and applications that use the interfaces. Some of the potential interface developments have issues with deployment incentives or with the incentives for the parties to not lie or misrepresent themselves through those interface. For instance, it is necessary to prevent a situation where everyone will claim all traffic as high priority, to get better treatment in the network. The development of such interfaces may also lead to potentially complex processes in operating them, by both network operators

and service providers. This is a problem that should be considered when designing collaborative interfaces. Here careful, minimalistic designs as well as standardized technologies, such as data models, and allowing for semi-automation seem fruitful to consider. The designs should also be such that they respond to broad, general needs rather than specific issues with current technology, to be useful in a quickly changing environment. Conclusions All access network management techniques need to be thought in light of quickly changing environment, where not all information may be accessible, and the protocol mechanisms carrying the information can change rapidly. Pure IP transport based management techniques, co-operative management techniques, and new network interfaces are some of the tools to deal with this situation. Acknowledgements The author would like to thank Natasha Rooney, John Mattsson, Iuniana Oprescu, Salvatore Loreto, Gonzalo Camarillo, Joel Halpern, Stephen Farrell, Kathleen Moriarty, and members of the IAB for interesting discussions in this problem space.