Summary


Alternatives to Content Classification for Operator Resource Deployment

Radio Access Networks (RANs) have historically used content-based classification to associate service descriptions with flows and then allocated radio resources based on those services. The increased deployment of encryption in the Internet forces a re-examination of this method. A naive approach would be to have endpoints directly expose classification metadata to the RAN outside the encryption envelope, but this would hinder the confidentiality provided by encryption and require extensive coordination between application developers and RAN operators. To avoid the disadvantages of that approach, this list will discuss both what specific network treatments need to be elicited for the efficient operation of RANs, if any, and what the minimal communication to elicit those treatments would be.

To contact the list owners, use the following email address: accord-owner@ietf.org

Archives

IETF Mailarchive


Subscription / Unsubscription

To subscribe or unsubscribe from this list, please sign in first. If you have not previously signed in, you may need to set up an account with the appropriate email address.

Sign In


You can also subscribe without creating an account. If you wish to do so, please use the form below.