Middleboxes in Cellular Networks

Similar documents
ICN & 5G. Dr.-Ing. Dirk Kutscher Chief Researcher Networking. NEC Laboratories Europe

Native Deployment of ICN in 4G/LTE Mobile Networks

How YouTube Performance is Improved in the T-Mobile Network. Jie Hui, Kevin Lau, Ankur Jain, Andreas Terzis, Jeff Smith T Mobile, Google

IP Mobility vs. Session Mobility

Abstract of the Book

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print,

Proxy server is a server (a computer system or an application program) that acts as an intermediary between for requests from clients seeking

WebRTC: IETF Standards Update September Colin Perkins

Minion: An All-Terrain Packet Packhorse to Jump-Start Stalled Internet Transports

Over-The-Top (OTT) Aggregation Solutions

Lecture 2: Layering & End-to-End

Metering Re-ECN: Performance Evaluation and its Applicability in

OpenADN: A Case for Open Application Delivery Networking

Networking interview questions

WCDMA evolution: HSPA and MBMS

Future Orient High Capacity Nodal Equipment

Square Pegs in a Round Pipe: Wire-Compatible Unordered Delivery In TCP and TLS

Alcatel-Lucent 9500 Microwave Packet Radio (ETSI Markets)

Mobile WiMAX EPL 657. Panayiotis Kolios

Transport Layer TCP & UDP Week 7. Module : Computer Networks Lecturers : Lucy White Office : 324

Building a Profitable Data Future. Monetizing Data Traffic

IEEE : Standard for Optimized Radio Resource Usage in Composite Wireless Networks

Wireless IP for M2M / IoT 101

Designing a Resource Pooling Transport Protocol

Towards a Delay-tolerant Future: Reconsidering some Assumptions in Networking. Reconsidering the Internet Design. Number of layers

Performance Challenge of 3G over Satellite Methods for Increasing Revenue & Quality of Experience. February 2018

WCCPv2 and WCCP Enhancements

Executive Summary...1 Chapter 1: Introduction...1

A passion for performance. The E500 - Delivering Network Performance and Capacity

FEMTOCELL WITH RELAYS TO ENHANCE THE MACROCELL BACKHAUL BANDWIDTH

IEEE C /26. IEEE Working Group on Mobile Broadband Wireless Access <

Hands-On IP Multicasting for Multimedia Distribution Networks

PROTOCOLS FOR HIGH-EFFICIENCY WIRELESS NETWORKS

Ch 1. Mobile Adaptive Computing

Impact of transmission errors on TCP performance. Outline. Random Errors

The Impact of Transport Header Encryption on Operation and Evolution of the Internet. draft-fairhurst-tsvwg-transport-encrypt-04

Need For Protocol Architecture

General requirements for ID/locator separation in NGN

Need For Protocol Architecture

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst

Signaling System 7 (SS7) By : Ali Mustafa

Is it Still Possible to Extend TCP?

A New Internet? RIPE76 - Marseille May Jordi Palet

Configuring WMT Streaming Media Services on Standalone Content Engines

Goals and topics. Verkkomedian perusteet Fundamentals of Network Media T Circuit switching networks. Topics. Packet-switching networks

REAP THE BENEFITS OF 4G OVER SATELLITE

Characteristics of Traffic Type Changes and Their Architectural Implications

Firewalls for Secure Unified Communications

Framework of Vertical Multi-homing in IPv6-based NGN

CCNA 1 Chapter 7 v5.0 Exam Answers 2013

Mobile Edge Computing Presented by Nurit Sprecher (ETSI ISG MEC Chair) Location Based Services Event, June 2-3, 2015, London, UK

Header Compression Capacity Calculations for Wireless Networks

CS 268: Internet Architecture & E2E Arguments. Today s Agenda. Scott Shenker and Ion Stoica (Fall, 2010) Design goals.

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu

HUAWEI USG6000 Series Next-Generation Firewall Technical White Paper VPN HUAWEI TECHNOLOGIES CO., LTD. Issue 1.1. Date

Slide 1. Slide 2. Slide 3. Technological Advantages of Mobile IPv6. Outline of Presentation. Earth with 2 Billion Mobile devices

Tutorial 2 : Networking

1.1 Beyond 3G systems

7/27/2010 LTE-WIMAX BLOG HARISHVADADA.WORDPRESS.COM. QOS over 4G networks Harish Vadada

Evaluation of End-to-End TCP performance over WCDMA

HSPA over Iur RAN Nokia Siemens Networks RU20 Feature Training

Enabling Agile Service Chaining with Service Based Routing

Over Cellular. Jim Weikert Strategic Marketing Manager ProSoft Technology Technical Track

Internet of Things: An Introduction

IJSER. Virtualization Intrusion Detection System in Cloud Environment Ku.Rupali D. Wankhade. Department of Computer Science and Technology

Architectural Principles

Data & Computer Communication

HUGHES Broadband Technology for Ku and Ka bands

Chapter 3: Network Protocols and Communications

Postellation: an Enhanced Delay-Tolerant Network (DTN) Implementation with Video Streaming and Automated Network Attachment

Wireless Access Protocol(WAP) architecture

QoE-Driven Video Streaming and Video Content Caching

Wireless Backhaul Synchronization

Columbia University G. Camarillo Ericsson October 2005

Guaranteeing Video Quality

Internet Architecture. CPS 214 (Nick Feamster) January 14, 2008

Design Principles : Fundamentals of Computer Networks Bill Nace

STATEFUL TCP/UDP traffic generation and analysis

Master Course Computer Networks IN2097

Wireless IP for IoT / M2M 101 The Basics

Techological Advantages of Mobile IPv6

Chapter 12 Network Protocols

A Path Layer for the Internet

Towards Understanding TCP Performance on LTE/EPC Mobile Networks!

Network Requirements

BII - Broadband for Industrial Internet

Convergence of IP and Mobile Communications. Albert Coronel RedLink Communications Co., Ltd. MMNOG, November 21, 2015

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ

Vendor: HP. Exam Code: HP2-Z32. Exam Name: Implementing HP MSM Wireless Networks. Version: Demo

Implementation Guide - VPN Network with Static Routing

ND1009:2002/05 PNO-ISC/SPEC/009

ETSF05/ETSF10 Internet Protocols Network Layer Protocols

Acceleration Systems Technical Overview. September 2014, v1.4

CS 640: Introduction to Computer Networks

An Overview of MAMS (Multiple Access Management Services)

ITU-T. FS-VDSL White Paper. Full-Service VDSL. Focus Group White Paper. FS-VDSL Service Scenarios INTERNATIONAL TELECOMMUNICATION UNION

An In-depth Study of LTE: Effect of Network Protocol and Application Behavior on Performance

Chapter 09 Network Protocols

Advanced Computer Networking. CYBR 230 Jeff Shafer University of the Pacific QUIC

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking

Transcription:

Middleboxes in Cellular Networks Szilveszter Nádas, Salvatore Loreto Ericsson Research, Szilveszter.Nadas@ericsson.com, Salvatore.Loreto@ericsson.com November 4, 2014 Abstract This is a position paper regarding the role of middleboxes and middlebox layer in an evolved protocol stack. The focus of the paper is on the requirement of cellular networks, but the statements are not limited to cellular systems. The paper describes relevant properties of cellular networks and discusses the related roles of the middleboxes. It addresses how a middlebox layer may support these roles. Finally it provides considerations about the incentives of the actors and security questions. 1 Cellular Networks and Mobile Broadband In cellular networks the congestion level of a single flow is more variable than over fixed access. The two main contributors are the variability of air interface channel quality between the radio base station and the user equipment and the fact the resources of a radio cell are shared among all active users in that cell. Sometimes even the Mobile Backhaul connecting the Radio Base Stations to the rest of the network can be such shared bottleneck. Because of this variability and of the cost of the radio resources, optimizing resource sharing among streams is even more important than in case of fixed Internet access. It can be advantageous to optimize resource sharing among the streams of the same user, and also to optimize resource sharing among the streams of different users. We define the term flow as all the packets in both directions an application sends between the same server and client. The flow may contain several streams, which may have different performance demands. In Cellular Networks the Radio Resource Management algorithms [1] are responsible ensuring the high efficiency of the usage of the radio resources, e.g. by waiting for the right channel quality before transmission and to allocate and release radio channels. To ensure high performance, explicit information about the streams is beneficial, such as classification of the stream with respect to packet delay requirement, chattiness of the stream 1

or the Transport Protocol used. The provided information can be used to find the right optimum between waiting for the right channel quality and minimizing delay for the critical applications. Cellular networks often implement similar protocol functions as Transport Protocols do. This redundancy may be costly in overhead or processing. It may also cause unwanted interactions between those protocols. When knowledge about both the Transport Protocol and the cellular network is available this redundancy may be minimized. Two examples for optimization: Reliable transmission is implemented in Radio Link Control Acknowledged Mode (RLC AM). Some transport protocols (e.g. [2]) also propose Forward Error Correction to ensure timely and reliable delivery. In the RLC AM loop this FEC is unnecessary and can be optimized. RLC AM functionality is redundant with TCP reliable transmission. Still, RLC AM reliable transmission is necessary, because even the very small error rate of the lower layer retransmission over the radio channel would cause TCP congestion response and that would make it impossible to reach high enough throughput. 2 Roles of Middleboxes In order to support the abovementioned features we identified the following middlebox roles. Other important roles, e.g. firewall, NAT and parental control are not discussed here. Middleboxes can act as Policy Decision Points: they select domain specific QoS solution of flows, streams or packets based on traffic identification, flow states and/or packet handling information. Traditionally in case of broadband traffic DPI/SPI boxes perform this role. Middleboxes can provide information about the network path (e.g. maximum achievable bitrate, minimum delay, etc.) to aid path selection, for example to help end-point decide which access to use, when there are several alternatives. This information can be static or dynamic, which also describe the state of the network in addition to the optimal/typical capabilities of the network. Middleboxes might send advisory messages to applications to help adaptation. Examples for such advisory messages are to provide an initial congestion window, to help adaptation in case of adaptive media, or to tailor the service directly, based on of the congestion status of the network. Middleboxes can also provide transport protocol enhancement in several layers. They may optimize FEC and retransmission. They may completely replace the used transport protocol to optimize it to the properties of the local domain. 2

Middleboxes can provide application layer optimization, e.g. HTTP proxy, transcoding, caching. This functionality cooperates with the application layer in an end-host. Middleboxes can act as a gateway and translate between application protocols used in the different domains. For example; translate between HTTP2 used in the cellular network with HTTP1.1 used in the Internet. 3 Role of a Middlebox Layer There are several ways to support the abovementioned goals. Middleboxes may act on/replace transport and/or application protocols. While this is a very flexible and versatile approach, it also has the largest impact on end-user privacy. We think that in order to get end-host cooperation, a light-weight approach shall also be possible, with keeping the more versatile approach as an option for more cooperating end-hosts. In order to support the abovementioned goals a middlebox layer may be introduced. A new standalone middlebox layer in the protocol stack has advantages compared to including similar functionalities natively in a Transport Protocol or in the Internet Protocol. The middlebox layer is proposed to be between the IP and Transport Protocol layers. To support deployment in legacy environment it may be over UDP/IP. Because it is a separate layer below the transport protocol it allows the middleboxes to be transport protocol independent and it can be used even for legacy transport protocols. The middlebox layer may have a middlebox header, which has static fields and may also be extended by extension headers. This header may be between the UDP and the Transport Protocol header. For some of the middlebox roles exchange of signaling messages is needed either in-band or using a separate signaling connection. The protocol used for this communication and whether it is to be standardized is outside the scope of this paper. The middlebox layer may use a pre-configuration procedure, which can be executed when a device is connected to a domain. This is especially useful for application layer optimization, because in this case already during the setup of the flow the middlebox can be addressed. 4 End-host Consent, Incentives and Security Clear incentives are needed for the involved actors (OTTs, Network Operators, End-Users, OS developers) to cooperate thorough middleboxes. We believe that such incentives can be found for the above listed middlebox functionalities. We refer to the paper [3] in this area. 3

The need to provide security and confidentiality to the end user is driving a considerable usage of (D)TLS to encrypt the Application Protocol traffic. At same time this need has triggered a discussion and also work in IETF on how to provide security natively in a Transport Protocol. Both those trends are reducing the possibilities for the middleboxes to provide transparent optimizations. A newly introduced middlebox layer might allow some transparent optimization possibilities; for example if the protocols allow the middlebox to understand the traffic characteristics, then the middleboxes may provide Policy Decision without explicit consent of the end-points. When there is a signaling exchange with a middlebox it is an intentional action by one of the end-hosts and thus it cannot be transparent. Information about the network path is also a sensitive data and different network operators may allow different types of information to be communicated towards the end-points. In a collaborative environment, the network operator should also have clear incentives to reveal this information. Therefore middleboxes should have a configurable mechanism in which the middlebox owner decides what type of information that can be exposed outside to internet applications. For example information on the radio network such as congestion level or maximum possible throughput. The security association of end-to-end protocols shall not be available in the middleboxes, unless those protocols are terminated in the middlebox. Therefore any kind of middlebox communication must have separate security association if any. Middleboxes should be identified with a valid certificate, when possible. Handling encryption for signaling messages is relatively straightforward and should be implemented. Header fields and extension headers may also use encryption or authentication. 5 Conclusion This paper discusses issues of cellular systems, which can be optimized by the use of middleboxes: the high variability of congestion, finding the optimum between good radio channel and small delay and redundancy in protocol functions. We introduce middlebox roles: providing traffic identification and network information, exchanging advisory messages and optimizing transport and application protocols. We describe middlebox layer, which provides a light-weight approach to provide or support these roles. Finally we discuss the need for incentives of all involved actors and security aspects. References [1] Dahlman, Parkvall, Skold, Beming: 3G Evolution: HSPA and LTE for Mobile Broadband, 2nd Edition, pp 286, pp527-528 4

[2] http://www.chromium.org/quic, checked 2014-10-29 [3] David D. Clark et all, Tussle in Cyberspace: Defining Tomorrows Internet, IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 13, NO. 3, JUNE 2005, https://impact.asu.edu/cse534fa06/reading/p462- clark.pdf 5