Re: [gaia] What if all phones were always on the Internet?

"Psaras, Ioannis" <i.psaras@ucl.ac.uk> Fri, 27 November 2015 13:56 UTC

Return-Path: <i.psaras@ucl.ac.uk>
X-Original-To: gaia@ietfa.amsl.com
Delivered-To: gaia@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 651471A1A9B for <gaia@ietfa.amsl.com>; Fri, 27 Nov 2015 05:56:52 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, SPF_HELO_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bTGTyZ8GYJyf for <gaia@ietfa.amsl.com>; Fri, 27 Nov 2015 05:56:49 -0800 (PST)
Received: from emea01-am1-obe.outbound.protection.outlook.com (mail-am1on0798.outbound.protection.outlook.com [IPv6:2a01:111:f400:fe00::798]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 241FE1A1A99 for <gaia@irtf.org>; Fri, 27 Nov 2015 05:56:49 -0800 (PST)
Received: from AM3PR01MB1188.eurprd01.prod.exchangelabs.com (10.163.10.26) by AM3PR01MB1186.eurprd01.prod.exchangelabs.com (10.163.10.24) with Microsoft SMTP Server (TLS) id 15.1.331.20; Fri, 27 Nov 2015 13:56:29 +0000
Received: from AM3PR01MB1188.eurprd01.prod.exchangelabs.com ([10.163.10.26]) by AM3PR01MB1188.eurprd01.prod.exchangelabs.com ([10.163.10.26]) with mapi id 15.01.0331.023; Fri, 27 Nov 2015 13:56:29 +0000
From: "Psaras, Ioannis" <i.psaras@ucl.ac.uk>
To: Dirk Kutscher <Dirk.Kutscher@neclab.eu>
Thread-Topic: [gaia] What if all phones were always on the Internet?
Thread-Index: AQHRKFhVrFCD7/u25k+u7SMnwBe2Ip6utwQAgAAMB4CAAE0zAIAAgKmAgABVPIA=
Date: Fri, 27 Nov 2015 13:56:29 +0000
Message-ID: <7C848165-5210-4444-83A4-195DBE5C3507@live.ucl.ac.uk>
References: <CAD_CWO34dYnp0-_4FL1Rot8EGdg_vzPqH9Ougin83j=fXQHXHw@mail.gmail.com> <EE158BCE-E669-4C60-8616-357D185A6D17@mac.com> <46EEEEA2-E848-4CB9-80D2-1761C40CDDC2@neclab.eu> <5657ADA0.1030209@cs.tcd.ie> <82AB329A76E2484D934BBCA77E9F5249A67B2DD5@PALLENE.office.hd>
In-Reply-To: <82AB329A76E2484D934BBCA77E9F5249A67B2DD5@PALLENE.office.hd>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=i.psaras@ucl.ac.uk;
x-ms-exchange-messagesentrepresentingtype: 1
x-originating-ip: [144.82.191.162]
x-microsoft-exchange-diagnostics: 1; AM3PR01MB1186; 5:iSfMp1l0cmwjhy+H13/G5UU1MVuGO7c9XD8QMvBG1XzlW3P4zfMMjC1TF4bA4n91BvOza02lJNKcOW7/rZJAZn7bx6TrnGGs2In9KK6zX4s8PJqTh1FJ07Ilg9tVNnsRoHUaLRVBGRQ7Y0RL2588IQ==; 24:MRd9kPopMOCSVPjNodZVd4fTqPUrbSwOH/ou4XIPOnlDBD2pma9GhbBXhsxIW9mmm1/FmjxnH7BOA/NBK0jXvY0Jo7cBbh66aRlRUZsmX5Y=
x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:AM3PR01MB1186;
x-ucllive-sclrule: HASRUN
x-microsoft-antispam-prvs: <AM3PR01MB11863A5FF016A95FCFCAD639D9030@AM3PR01MB1186.eurprd01.prod.exchangelabs.com>
x-exchange-antispam-report-test: UriScan:(57025502571588);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(601004)(2401047)(8121501046)(5005006)(520078)(10201501046)(3002001); SRVR:AM3PR01MB1186; BCL:0; PCL:0; RULEID:; SRVR:AM3PR01MB1186;
x-forefront-prvs: 0773BB46AC
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(51444003)(164054003)(189002)(243025005)(24454002)(199003)(1096002)(122556002)(5001960100002)(81156007)(106356001)(19580405001)(586003)(40100003)(189998001)(3846002)(2900100001)(92566002)(10400500002)(6116002)(97736004)(76176999)(82746002)(5002640100001)(102836003)(105586002)(110136002)(86362001)(74482002)(5004730100002)(33656002)(2950100001)(93886004)(106116001)(19617315012)(5008740100001)(15975445007)(87936001)(101416001)(11100500001)(50986999)(83716003)(16236675004)(54356999)(66066001)(19580395003)(77096005)(1220700001)(7059030)(104396002); DIR:OUT; SFP:1102; SCL:1; SRVR:AM3PR01MB1186; H:AM3PR01MB1188.eurprd01.prod.exchangelabs.com; FPR:; SPF:None; PTR:InfoNoRecords; MX:1; A:1; LANG:en;
received-spf: None (protection.outlook.com: ucl.ac.uk does not designate permitted sender hosts)
spamdiagnosticoutput: 1:23
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_7C8481655210444483A4195DBE5C3507liveuclacuk_"
MIME-Version: 1.0
X-OriginatorOrg: ucl.ac.uk
X-MS-Exchange-CrossTenant-originalarrivaltime: 27 Nov 2015 13:56:29.7528 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 1faf88fe-a998-4c5b-93c9-210a11d9a5c2
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM3PR01MB1186
Archived-At: <http://mailarchive.ietf.org/arch/msg/gaia/k70NIHTZAUtHe5wSTV2eKbxTRZQ>
Cc: gaia <gaia@irtf.org>, Steve Song <stevesong@nsrc.org>, Jim Forster <jrforster@mac.com>, Stephen Farrell <stephen.farrell@cs.tcd.ie>
Subject: Re: [gaia] What if all phones were always on the Internet?
X-BeenThere: gaia@irtf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Global Access to the Internet for All <gaia.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/gaia>, <mailto:gaia-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/gaia/>
List-Post: <mailto:gaia@irtf.org>
List-Help: <mailto:gaia-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/gaia>, <mailto:gaia-request@irtf.org?subject=subscribe>
X-List-Received-Date: Fri, 27 Nov 2015 13:56:52 -0000

Very interesting thoughts Dirk.

Another keyword is transport performance (related to the transport encryption discussion): with heterogeneous access, and especially with low-bitrate, unreliable secondary access, you want to have a more powerful forwarding plane that can react to changing link layer characteristics locally and that can employ in-network storage for reacting to disruption/delay. Today, mobile network operators are trying to address some of these issues with TCP proxies and application-layer proxies (the latter will probably become more expensive in the future because of encryption, see below).

A pointer on this is our recent work on In-Network Resource Pooling (in ACM HotNets 2014): http://www.ee.ucl.ac.uk/~uceeips/files/inrpp-hotnets14-ipsaras.pdf

According to this framework, in-network storage is utilised to temporarily store/cache data *mid-path* when some link along the path is broken or very slow/congested. Then transmission resumes when conditions get back to normal. It sounds like a good fit for low-bitrate, unreliable links.

Thanks,
Yiannis.

On 27 Nov 2015, at 08:51, Dirk Kutscher <Dirk.Kutscher@neclab.eu<mailto:Dirk.Kutscher@neclab.eu>> wrote:

How would that best be progressed? I think there are good ideas here (adding
delay-tolerant features to mainstream protocols) but I'm not sure how to get
those ingrained in e.g. 5g stuff.

In Europe, review and have your say on what's happening here: https://5g-ppp.eu/

There is a second phase of projects in preparation -- that should ideally cater for topics like this, but people need to speak up.

Technically, I think that ICN as a concept has good potential as a network infrastructure technology that can span both well-connected traditional type of networks as well as less conventional ones, including uni-directional and disruption-prone networks.

One of the keywords is access network heterogeneity, e.g., "hybrid access" in the current IP access world. It's obvious that TCP/IP (even MPTCP) with DNS/CDN has issues in even the simple hybrid access home gateway scenario.

Another keyword is transport performance (related to the transport encryption discussion): with heterogeneous access, and especially with low-bitrate, unreliable secondary access, you want to have a more powerful forwarding plane that can react to changing link layer characteristics locally and that can employ in-network storage for reacting to disruption/delay. Today, mobile network operators are trying to address some of these issues with TCP proxies and application-layer proxies (the latter will probably become more expensive in the future because of encryption, see below).

Finally, security: I see two things happening:

1) HTTP/2 and TLS => ubiquitous encryption
2) CDN extending into core and access networks => many vulnerable platforms that manage keys and certificates on behalf of original data owners and service providers to maintain connection-based encryption

This does not look very promising to me. We ought to figure object-based security and fine-granular access control based on that.

With virtualization extending to all parts of the network, it now becomes feasible to prototype and evaluate such systems, e.g., as a slice in a virtualized mobile network.

There is some interesting work going on, just a few pointers:

http://conferences2.sigcomm.org/acm-icn/2015/proceedings/p189-auge.pdf

http://conferences2.sigcomm.org/acm-icn/2015/proceedings/p137-schneider.pdf

http://conferences2.sigcomm.org/acm-icn/2015/proceedings/p177-yu.pdf


Cheers,
Dirk
_______________________________________________
gaia mailing list
gaia@irtf.org
https://www.irtf.org/mailman/listinfo/gaia