network tokens
play

Network Tokens A DPI-alternative to deploy network services ONF - PowerPoint PPT Presentation

Network Tokens A DPI-alternative to deploy network services ONF Spotlight: 5G Transformation with Open Source Yiannis Yiakoumis, Co-Founder & CEO, Selfie Networks Work with Nick McKeown (Stanford), Frode Sorensen (NKOM)


  1. Network Tokens A DPI-alternative to deploy network services ONF Spotlight: 5G Transformation with Open Source Yiannis Yiakoumis, Co-Founder & CEO, Selfie Networks Work with Nick McKeown (Stanford), Frode Sorensen (NKOM) https://networktokens.org | yiannis@selfienetworks.com

  2. Overview 2 1. Network traffic differentiation is at a tipping point 2. Why we need a DPI alternative 3. Network Tokens

  3. Network Services are at a tipping point 2010 2020 2025 bandwidth zero-rating 5G slicing IoT, entertainment, enterprise market validation market growth no demand technology sucks technology…? $0 [*] GSMA Network Slicing Usecase Requirements

  4. Network Services are at a tipping point 2010 2020 2025 bandwidth zero-rating 5G slicing IoT, entertainment, enterprise market validation market growth no demand technology sucks technology…? $2B $0

  5. Network Services are at a tipping point 2010 2020 2025 $300B* bandwidth zero-rating 5G slicing IoT, entertainment, enterprise market validation market growth no demand technology sucks technology…? $2B $0 [*] GSMA Network Slicing Usecase Requirements

  6. DPI/traffic classification can’t support expected growth Low Level Mechanism High-level Policy / Enforcement 5QI, DiffServ, QCI, bearers Traffic Classification / DPI (application signatures) In conflict with Expensive Onboarding is hard encryption, privacy, High overhead Poor adoption net neutrality

  7. DPI/traffic classification can’t support expected growth Each datapath service can be a $100M+ opportunity. Exposing them through DPI means: Poor user and partner adoption ● High cost and time-to-market to deploy and operate ● Regulatory risk to be banned/restricted ● Obsolete with new encryption schemes (ESNI, DOH) ● 100+ 15% 9+ months integrations success rate onboarding on integration time

  8. Can we do any better? 8 How can we expose and access traffic differentiation services in a way that ... 1. is easy for operators to deploy and operate 2. is easy for end-users and app providers to access 3. Works with privacy and net neutrality 4. works with encryption and modern infrastructure (ESNI, multi-cloud, 3rd-party APIs)

  9. “ Traffic Classification / DPI → Access Management

  10. Network Tokens 10 » Explicit and secure coordination between end-users/apps and the network » They replace heuristics and application signatures/DPI with deterministic mechanism » Heavily influenced by Json Web Tokens (JWT), access tokens, and OAUTH2 workflows

  11. Network Tokens 11 Tokens carry simple claims (e.g., “I need low latency” , “I am Skype” ) ● Encrypted and/or signed based on trust relationships and requirements ● Provisions against replay and spoofing attacks (expiration, binding, revocation) ● Represented as JWT, CWT, Custom Formats ● Inserted as extensions/attributes in existing protocols (e.g. IPv6, TLS, STUN) ●

  12. Network Tokens 12 Tokens are policy agnostic. Policy dictated by token distribution, crypto functions, E2E workflows User-centric, application agnostic token (e.g. for QoS service) ● App-specific token (e.g., firewall whitelist, zero-rating) ●

  13. Sample workflow: user-centric, application-agnostic tokens 13

  14. Sample workflow: user-centric, application-agnostic tokens 14 1 Application asks user-permission to access premium network quality service

  15. Sample workflow: user-centric, application-agnostic tokens 15 2 Client agent fetches premium quality token with user’s credentials 1 Application asks user-permission to access premium network quality service

  16. Sample workflow: user-centric, application-agnostic tokens 16 2 Client agent fetches premium quality token with user’s credentials 1 3 Application asks user-permission to Application attaches token access premium network quality service to flows of interest

  17. Sample workflow: user-centric, application-agnostic tokens 17 4 Network detects tokens and provides service 2 Client agent fetches premium quality token with user’s credentials 1 3 Application asks user-permission to Application attaches token access premium network quality service to flows of interest

  18. DEMO Premium network quality for video calls

  19. DEMO

  20. Current Status with DPI privacy-invasive, no user control Manual, expensive, error-prone 1000+ apps Proprietary app signatures

  21. How it works with Network Tokens User-centric, application driven, application-agnostic, multi-network Automated and self-serve control logic Simple, fast, stable dataplane

  22. Network Tokens: Standardization and Open-Source 22 https://github.com/network-tokens ● Apache 2 License ○ Integrated or stand-alone ○ Integrated with ONFs OMEC ○ IETF: Network tokens as interface between network and apps/end-users ● 3GPP : How do network tokens fit in 3GPP architecture? ● Integrate through existing 4G/5G TDF interfaces (Gy, Gw, Sd, …) ○

  23. Access Management Ecosystem ID access mgmt Low-level JWT, ID & access mechanism tokens Open-Source Standards SSO, OAUTH2, Workflows scopes/permissions Okta, Auth0, IBM, Open-Source Solutions Microsoft, ... Proprietary

  24. Access Management Ecosystem ID access mgmt Network access mgmt Low-level JWT, ID & access Network Tokens mechanism tokens Open-Source Standards SSO, OAUTH2, User Centric, App Centric, Workflows scopes/permissions Custom, Multi-network Okta, Auth0, IBM, Open-Source Solutions , ... Microsoft, ... Proprietary

  25. Get Involved! 25 » https://networktokens.org | network-tokens@ietf.org » https://github.com/network-tokens » Try it with ONF’s infrastructure Thank you! yiannis@selfienetworks.com

  26. Get involved! https://networktokens.org yiannis@selfienetworks.com

  27. Appendix

  28. Premium Network Quality tailored for voice and video LTE Bearer VoLTE Network Core QoS 5G slicing Control Plane Application + Driver + OS ⇅ priority + low latency priority + low latency

  29. Net Neutrality Controversy and consensus 29 Traffic differentiation is controversial, but there is common ground and consensus on specific use cases. QoS: User-centric, application-agnostic, privacy-aware Zero-Rating: Category-based, inclusive, money-free agreements Enterprise/Firewall Whitelist: do what you want

Recommend


More recommend