IETF 101, Day 2: A Bit of Rosie Lee (Mobility) Thumbnail
Deploy360 19 March 2018

IETF 101, Day 2: A Bit of Rosie Lee (Mobility)

By Kevin MeynellFormer Senior Manager, Technical and Operational Engagement

This week is IETF 101 in London, and we’re bringing you daily blog posts highlighting the topics of interest to us in the ISOC Internet Technology Team. After a hectic Monday there’s less dashing around needed today, although there’s a few things to highlight, even if you’ll have to choose between them as they’re unfortunately all scheduled at the same time.


NOTE: If you are unable to attend IETF 101 in person, there are multiple ways to participate remotely.


DNSOP starts its first of two sessions at 15.50 GMT/UTC (it continues on Thursday. Several of the drafts under discussion relate to the Root KSK Rollover and how to better automate and monitor key rollovers.

At the same time, DOTS is also meeting and has a bit of a mixed agenda with four drafts up for discussion, implementation reports, and feedback on the Hackathon.

There are two drafts covering the Distributed Denial-of-Service Open Threat Signaling (DOTS) Signal Channel and Data Channel specifications, one that establishes an architecture for establishing and maintaining signalling within and between domains, with the last one presenting use cases describing the interactions expected between DOTS components and messaging exchanges.

Alternatively, DMM has a very busy agenda with no less than thirteen drafts under discussion. A selection of these includes DMM deployment Models and Architectural Considerations, Proxy Mobile IPv6 extensions for Distributed Mobility Management, Segment Routing IPv6 for Mobile User Plane, and Segment Routing IPv6 as Data Plane for 3GPP N9 Interface (still awaiting draft to be published). Worth highlighting too, is the draft on Optimized Mobile User Plane Solutions for 5G.

For more background, please read the Rough Guide to IETF 101 from Olaf, Dan, Andrei, Steve, Karen and myself.

Relevant Working Groups

Disclaimer: Viewpoints expressed in this post are those of the author and may or may not reflect official Internet Society positions.

Related articles

Improving Technical Security 15 March 2019

DNS Privacy Frequently Asked Questions (FAQ)

We previously posted about how the DNS does not inherently employ any mechanisms to provide confidentiality for DNS transactions,...

Improving Technical Security 14 March 2019

Introduction to DNS Privacy

Almost every time we use an Internet application, it starts with a DNS (Domain Name System) transaction to map...

Improving Technical Security 13 March 2019

IPv6 Security for IPv4 Engineers

It is often argued that IPv4 practices should be forgotten when deploying IPv6, as after all IPv6 is a...