Time-Sensitive Networking: When “best effort” isn’t good enough

Michael D. Johas Teener ([email protected])

Senior Technical Director

Broadcom © 2012 Broadcom Corporation. All rights reserved.

Agenda •! What is “best effort” !

"!And why it isn’t always good enough

•! Objectives for time-sensitive networks ! "!A few use cases and examples

•! Providing the foundation

"!IEEE 802.1 AVB layer-2 networking "!Some actual numbers

•! Higher layer services

"!IEEE 1722 and 1722.1 ! direct "!Enhancing IP-based protocols

Broadcom © 2012 Broadcom Corporation. All rights reserved.

1

“Best effort delivery” •! According to Wikipedia:

"!“does not provide any guarantees that data is delivered or that a user is given a guaranteed quality of service level or a certain priority” Hmm ! what is “best” about that?

•! In practice, it really means:

transfer data as quickly as possible •! “best” in this case means “quickest”

Broadcom © 2012 Broadcom Corporation. All rights reserved.

2

“best effort” works! •! In many, many cases, “best effort” is1

"!in lightly loaded networks "!where average delay is the primary metric "!if we can’t, or don’t want to, or it’s too much trouble to differentiate between different classes of traffic

•! But, of course, that’s almost never enough

"!so we have higher layer services like TCP "!or we ignore the problem and have audio and video dropouts

•! And “best effort” isn’t1

"!when the worst case delay is the important metric

1

”best” Broadcom © 2012 Broadcom Corporation. All rights reserved.

3

When time matters •! “Time” means delay

"!the metric is maximum delay, not average "!here’s where we need something better than “best effort”

•! In addition, “time” means time

"!wall clock time, synchronization, coordination, phase locking

•! Both bounded delay and a well-known time are required in time-sensitive networks "!live audio and video streaming "!control and sensor networks

1

”best” Broadcom © 2012 Broadcom Corporation. All rights reserved.

4

Live audio and video networks •! For live audio performances !

"!the maximum delay between a musician doing “something” and hearing that same “something” is 10ms "!delay of sound from monitor speakers to the musician, plus DSP delays, plus mixer delays, plus more DSP delays uses up 8ms ! "!so the network gets 2ms for the musician-to-monitor path

•! For speaker arrays !

"!the maximum synchronization error between speakers must be less than 10us ! "!and, of course, the designers want (and can use) better: down to 1us

Broadcom © 2012 Broadcom Corporation. All rights reserved.

5

Control and sensor networks •! Industrial control systems have fixed control loops

"!loop times from a few milliseconds down to about 100us

•! Sense -> compute -> control

"!bad things happen when the sense->control delay gets too big "!remember your poles and zeros!

Broadcom © 2012 Broadcom Corporation. All rights reserved.

6

How to build a time sensitive network 1.! Provide a network-wide precision clock reference 2.! Limit network delays to a well-known (and hopefully small) value 3.! Keep non-time-sensitive traffic from messing things up •! There are many possible ways to do this, but let’s start by fixing the low-level plumbing, and look at my favorite !.

Broadcom © 2012 Broadcom Corporation. All rights reserved.

7

Building the foundation: IEEE 802.1 AVB •! The IEEE 802.1 Audio Video Bridging Task Group is “responsible for developing standards that enable timesensitive applications over IEEE 802 networks”

"! the IEEE 802.1 Working Group is responsible for bridging (including Ethernet “switches”) between LANS "! interoperability between networks of differing layer 2 technologies

•! The primary projects include:

"! queuing and forwarding of time-sensitive streams,

"! 802.1Qav credit-based shapers, new P802.1Qbu preemption and P802.1Qbv timeaware queuing

"! registration and reservation of time-sensitive streams,

"! 802.1Qat “stream reservation protocol”, to be extended to support preemption and multipath (redundant) streams

"! time synchronization – IEEE Std 802.1AS - and "! overall system architecture – IEEE Std 802.1BA

Broadcom © 2012 Broadcom Corporation. All rights reserved.

8

8

Unified layer 2 quality of service •! Enhance network bridging

"!Define common QoS services and mapping between different layer 2 technologies "!IEEE 802.1 is the common technology

•! Common endpoint interface for QoS

"!“API” for QoS-related services for ALL layer 2 technologies "!Toolkit for higher layers

"! IEEE 1588 time synch and enhanced IP-based streaming (e.g., RTP, SIP, RSVP, etc.)

"!Provide network independence for endpoints without giving up QoS

"! Endpoints don’t have to be aware of the particular link technologies (Ethernet, WiFi, EPON, MoCA, powerline, etc.) ! common API, support for multiple link types in a path

Broadcom © 2012 Broadcom Corporation. All rights reserved.

9

AVB services only in the “AV cloud”

© 2008 Broadcom Broadcom © 2012 Broadcom Corporation. All rights reserved.

10

Precise synchronization (IEEE Std 802.1AS)

•! All AV devices participate in a “native IEEE 802 layer 2 profile” of the IEEE 1588v2 “Precision Time Protocol”

"! much simplified subset of standard 1588v2 for Ethernet

"! Compatible enhancements for much faster clock locking and easier/lower cost filtering at endpoints

"! superset of 1588v2 to support 802.11 WiFi, EPON and “coordinated shared networks”

•! This precise synchronization has two primary purposes:

"! allow multiple streams to be synchronized and "! provide a common time base for sampling data streams at a source device and presenting those streams at the destination device with the same relative timing Broadcom © 2012 Broadcom Corporation. All rights reserved.

11

11

About time stamping •! Time stamping is the detection of the start of a packet and the sampling of a local free-running time value "!a two-part, 80-bit number: seconds[47:0], nanoseconds[31:0]

•! Time stamping is performed as close to the physical medium as possible •! Timestamps may not be inserted directly into messages "!they are included in a follow-up message "!exception: 1588 “one step” processing

12

1

Link delay measurement example (for Ethernet, other LANs are similar)

•! Each node is responsible for making its own link delay measurements

"!each link is independently measured by both link partners

•! Delay measurement is about once per second

"!since media characteristics change slowly over time

•! Delay measurement sequence:

"!Delay request message is transmitted and timestamped by requester (tx) and responder (rx) "!Delay response message is transmitted and timestamped by responder (tx) and requestor (rx) "!The responder delivers its timestamps (delay request rx and delay response tx) in a follow-up message 13

1

Link delay measurement Timestamps known by requester

t1

Requester t1

Responder

delay_re

quest t2

nse o p s e r _ y a

del t1, t4

t4

p Follow-u

t3

(t2, t3)

t1, t2, t3, t4 link_delay = ((t4 - t1) - r(t3 - t2)) / 2 r = neighbor rate ratio (described below) = timestamp event 14

1

Ethernet synchronization overview •! Master transmits periodic sync messages "!8 times per second by default

•! Sync messages are time stamped by master (tx) and slave (rx) "!Uses local crystal clock, no need for expensive time references

•! Slave uses the difference between the timestamps to adjust its clock compensation

15

1

Time-of-day propagation

= timestamp event 16

Neighbor rate ratio •! Uses consecutive sync events to determine clock rate ratios Master

Slave

t1 = 0

Sync t2 = 50,000

10,000 t1’ = 10,000

Sync

10,002 t2’ = 60,002

neighbor rate ratio = =

t1’ = t1 t2’ = t2 10,000 - 0 50,000 - 60,002

= -2000 PPM

17

1

Time distribution •! End-to-end time synchronization

"!Per-hop delays are accumulated in follow-up messages from master to slave "!Per-hop delays consist of: "! Link delay "! residence time (dwell time in bridge from sync rx to sync tx)

"!Residence time is compensated for neighbor rate ratio

•! Grand master clock selection

"!IEEE 802.1AS allows one grand master clock "!IEEE 1588 allows multiple grand master clocks

18

1

Best master clock selection •! All bridges announce the quality of their clock to their neighbors "! The best announcements are propagated

•! Each bridge compares received announcements to their own clock quality "! Quality is comprised of (in decreasing order of importance): "! Priority (configurable) "! Multiple “clock quality” fields "! MAC address

•! If “superior” announce messages are received

"! that bridge ceases to announce and adopts the superior bridge as the grand master

•! If the grand master dies and announce messages cease "! all bridges announce and a new grand master is quickly chosen

19

1

802.1AS test results •! Measurements were made for 0, 1, 2, 3, 4, 5, and 6 bridges between the slave and GM •! Due to limitations in the oscilloscope and software, the longest measurement interval attainable was 2 s Peak-to-peak phase error (ns) for 2 s measurement interval Number of hops No background traffic With background traffic

1

2

3

4

5

6

7

22.4

20.7

20.9

27.4

26.7

30.0

33.5

___

21.1

24.9

26.2

21.6

31.8

43.9

20

2

802.1AS tests results (raw data) 7 hops, with background traffic 30 4 hops, with background traffic

20 15

Phase Error (ns)

Phase Error (ns)

10

5

0

-5

-10

10

0

-10

-15 0.0

0.5

1.0

Time (s)

1.5

2.0

2.5

-20

-30 0.0

0.5

1.0

1.5

2.0

2.5

Time (s)

Broadcom © 2012 Broadcom Corporation. All rights reserved.

21

Time-sensitive queuing and forwarding (IEEE Std 802.1Qav - rev to 802.1Q) •! Devices in AVB network must “shape traffic” •! Schedule transmission of packets to prevent bunching, which causes overloading of network resources Broadcom © 2012 Broadcom Corporation. All rights reserved.

22

22

Admission controls

(IEEE Std 802.1Qat - added to 802.1Q)

•! Priorities and shaping work only if the network resources are available along the entire path from the talker to the listener(s) "!AVB “talkers” guarantee the path to the listener is available and reserve the resources

•! Done via a new 802.1ak “Multiple Registration Protocol” application: SRP (“Stream Reservation Protocol”)

"!Registers streams as a source MAC address combined with a higher level ID (frequently the IP port address) "!Reserves resources for streams based on bandwidth requirements and latency class Broadcom © 2012 Broadcom Corporation. All rights reserved.

23

23

Admission control (1) (creating a path)

•! phase one of a reservation is a “talker advertise” that tests the path and leaves behind a “breadcrumb” trail to the talker Broadcom © 2012 Broadcom Corporation. All rights reserved.

24

24

Admission control (2) (listener ready)

•! phase two of a successful reservation actually locks down the needed resources Broadcom © 2012 Broadcom Corporation. All rights reserved.

25

25

Admission control (3) (failed advertise)

•! if resources are not available, the “talker advertise” is propagated as “failed”

"! no reservation is made, this is done to allow a listener to know that a reservation is not possible now

•! a “listener ready failed” is propagated back towards the talker from the bridge that is unable to make the reservation "! the talker knows that at least one listener cannot get the reservation Broadcom © 2012 Broadcom Corporation. All rights reserved.

26

26

Audio Video Bridging services •! 2 ms bounded latency through 7 Ethernet bridges "! and that’s using 100 Mbit/sec; less at 1 Gbit/sec and higher "! linear relationship with the number of bridges "! delays through cooperating 802.11 systems TBD, but much longer "! community support for defining WiFi extensions to narrow this definition

•! SRP reserves link resources "! For Ethernet, bandwidth is the primary resource "! For coordinated shared networks (e.g., 802.11, G.hn, MoCA) resource management is more complex •! Precise timing and synchronization services for timestamps and media coordination "! < 1#s instantaneous synchronization between devices "! delivered clock can meet the jitter and wander requirements (MTIE mask) for HD-SDI and AES audio streams

Broadcom © 2012 Broadcom Corporation. All rights reserved.

27

27

AVB streaming (IEEE 1722) •! Standardized formats

"! Based on IEC 61883 as used in IEEE 1394 connections "! MPEG transport streams (including H.264), uncompressed audio (based on AES standards), and uncompressed video

•! Media clock reconstruction •! Media clock master selection/management

"! Support multiple media clocks on the same network "! Different 44.1kHz audio sources, 44.1kHz and 48kHz audio, 59.95Hz and 50Hz video, etc.

•! Presentation Time

"! Synchronization of the streams as observed by the listener/viewer

•! Latency normalization

"! Compensation for different delays for different paths through the network Broadcom © 2012 Broadcom Corporation. All rights reserved.

28

1722 media clock embedding 1722 Stream Timestamps

Media clock info embedded in talker’s presentation timestamps

7166667 7333333 ... 8666667

802.1AS Wall Time

8833333 9000000

Media clock (local oscillator)

Data 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0

AVBTP Timestamp Generator A/D

1722 Data

Incoming Analog Data

Broadcom © 2012 Broadcom Corporation. All rights reserved.

29

1722 stream media clock recovery (1) 1722 Stream Timestamps 7166667

Presentation Time Stamps and 802.1AS wall time used to recreate media clock

7333333 ... 8666667 8833333 802.1AS Wall Time

9000000

Data 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0

AVBTP Timestamp Comparator Clock Generator AVBTP timestamps Generated media clock

Outgoing Analog Data

Broadcom © 2012 Broadcom Corporation. All rights reserved.

D/A

30

1722 stream media clock recovery (2)

•! Media clocks are derived from cross-timestamping AVBTP Cross Timerstamp DBC 48khz Word Clock Stereo Samples

L

R

L

Broadcom © 2012 Broadcom Corporation. All rights reserved.

R

L

R

L

R

L

R

L

R

L

R

L

R

L

R

L

R

L

R

L

R

L

R

31

1722 latency normalization Default Presentation Time is 2 mS...

2 Hops

Speaker A

7 Hops

Speaker B

Speaker A buffers audio until Speaker B receives audio and presentation time is reached

Broadcom © 2012 Broadcom Corporation. All rights reserved.

32

Default presentation time is 2 ms! ! but Presentation Time can be dialed down

2 Hops

Talker is responsible for setting delay!

Broadcom © 2012 Broadcom Corporation. All rights reserved.

33

IETF work for IP-based AVB •! New generation RTP to use well-known clock reference

"!older RTP used “NTP”, but no way to tell which NTP nor any way to select a higher quality reference "!new system to select 802.1AS, or 1588, or NTP based on application requirements "!timestamps within RTP packets to be based on common clock selected for stream ... no ambiguity, vastly reduced buffering needed

•! New generation SIP (session initiation protocol) to take advantage of 802.1Q stream reservations "!actually using an updated SDP (session description protocol) format Broadcom © 2012 Broadcom Corporation. All rights reserved.

34

When? •! IEEE standardization process for “Gen 1” complete

"! It’s IEEE Std 802.1Qav-2009 ! both included in 802.1Q-2011 revision "! It’s IEEE Std 802.1Qat-2010 "! It’s IEEE Std 802.1AS-2011, IEEE Std 802.1BA-2011, and IEEE Std 1722-2011 "! wireless interfaces to 802.1AS are a small part of IEEE Std 802.11v-2011

•! Gen 2 AVB in process for industrial control and extremely large networks

"! Improved WLAN interfaces to 802.1Qat/Qav (802.11aa) in final processing "! Lightweight discovery/enumeration/control (IEEE p1722.1) in process "! “Theoretical lowest delay” for real time control "! P802.1Qbu “preemption” and P802.1Qbv “time aware shaper” work together (in managed environments), or preemption alone for unmanaged "! New IEEE 802.3 project for preemption services over Ethernet just getting organized

•! Will follow Ethernet/WiFi-type product curve

"! AVB services automatically take advantage of improvements in PHY and MAC speeds and capabilities "! 100M/1G/10G NIC/Switch all have substantial use cases Broadcom © 2012 Broadcom Corporation. All rights reserved.

35

35

What’s next? •! Now that the plumbing is ready ! "!IEEE 802 and 1722 !

•! the real standardizations are starting "!RTP and SIP mappings "!Linux and Windows drivers

•! but, as usual, somebody is already shipping

"!Mac OS X 10.7 and later support AVB, but only if you know the magic incantations

Broadcom © 2012 Broadcom Corporation. All rights reserved.

36

Thank you!

Broadcom © 2012 Broadcom Corporation. All rights reserved.

37

Time Sensitive Networking.pdf

Time Sensitive Networking.pdf. Time Sensitive Networking.pdf. Open. Extract. Open with. Sign In. Main menu. Displaying Time Sensitive Networking.pdf. Page 1 ...

1MB Sizes 3 Downloads 173 Views

Recommend Documents

Programming Support for Time-sensitive Software Adaptation ... - EWSN
Often, CPS software is also time-sensitive; ... developers to deal with time-sensitive adaptation of control ... ture of the code in the example reflects real imple-.

Microblog Search and Filtering with Time Sensitive ...
in the real-time adhoc search and filtering tasks of TREC 2012 mi- croblog track. ... plus blind (pseudo-relevance) feedback, BM25 plus blind feed- back favoring the .... Microblog streams are in the form of continuous incoming data flows, which ...

Time-Sensitive Topic-Based Communities on Twitter
Laboratory for Systems, Software and Semantics (LS. 3. ),. Ryerson University, Toronto, Canada ... in order to compare our work with the state of the art. This paper is organized as follows: In the next .... our collection of tweets M with concepts d

Programming Support for Time-sensitive Software ...
Abstract. We present programming constructs that allow developers to gain control on the timing aspect when enforcing adap- tation decisions in Cyberphysical System (CPS) software. The operation of CPS often depends on environmental con- ditions; as

Context-Sensitive Consumers
Oct 13, 2017 - present evidence of up-selling in the online retail market for computer parts. .... evidence on down-selling, which mainly associates retailers of ... 8Christina Binkley makes a convincing case for this marketing ...... of rational con

Basket-Sensitive Personalized Item Recommendation
set Bi ∪ {vj} must occur in at least some minimum number .... user ui and a basket Bi, we construct a recommendation list of target ..... Response Time (ms). FM.

Reducing TCB Complexity for Security-Sensitive ... - CiteSeerX
Apr 18, 2006 - mail client), we achieved a considerable reduction in code size and .... functionality and security of the service. The security re- ... window manager uses a few pixels at the top of the screen, ...... Crypto-. Gram Newsletter.

Gender-Sensitive Workplace Models and ... -
First Lady of Turkish Republic of Northern Cyprus – Women Rights Activist. (Waiting for Confirmation). Maja Ivanova. : First Lady of the Republic of Macedonia ...

STRIPING DELAY-SENSITIVE PACKETS OVER ...
the ARQ, the FEC, and the hybrid FEC/ARQ case. 1. ... and retransmissions (ARQ) — to optimize end-to-end packet delivery. Clearly ... for m = 0 and n ≥ 0 n−m. X i=0 p(i)R(m − 1, n − i − 1) for 1 ≤ m ≤ n. (5). We additionaly define r(m

Radiotelephones having contact-sensitive user interfaces and ...
Mar 11, 2005 - numbers or other data for processing by the radiotelephone. A ... display information stored in memory located in the radio telephone.

time time time -
Page 1. time. 0.985. 0.97. 0.015. 0.03. 2.3. 0.04. 0.189. 2.31. 2.89. 2.35. Gma. Gch. Gmo_N2. Gmo_I3. Gmo_I7. Gmo_C7. Bsa time. 0.97. 0.03. 0.037. 0.181. 2.32.

Risk-Sensitive CEO Contracts
risk on stock-based compensation for young managers and for managers with short-selling constraints, respectively. .... paper is related to Tallarini Jr (2000), which highlights the importance of accounting for asset pricing data while .... ecutive i

Radiotelephones having contact-sensitive user interfaces and ...
Mar 11, 2005 - cause the display or the radio-telephone communications transceiver to perform a ..... menu or a list of telephone numbers that are stored in the.

BT134W series E Triacs sensitive gate - GitHub
Aug 2, 1997 - Development ... Customers are responsible for the design and operation of ... for the planned application and use of customer's third.

Reducing TCB Complexity for Security-Sensitive ... - CiteSeerX
Apr 18, 2006 - action client, VPN gateway and digital signatures in an e- mail client), we achieved a considerable reduction in code size and complexity.

Price Sensitive Information to Publish.pdf
Email: [email protected], Website: www.saifpowertecltd.com. P R I C E S E N S I T I V E I N F O R M A T I O N. This is for kind information of all concerned that ...

Privacy beyond Single Sensitive Attribute
Given a bitmap transformed table, for a pair of SAs Ai and Aj, their MI is. I(Ai,Aj) = ∑ v∈Ai ..... ICS, 2007. http://www.ics.uci.edu/˜mlearn/MLRepository.html. 2.

Localized Distance-Sensitive Service Discovery in ...
May 26, 2008 - Service discovery, Localized algorithms, Sensor networks. 1. INTRODUCTION. A wireless sensor network (WSN) is a collection of micro-.

User Simulations for context-sensitive speech ...
1 Introduction. A crucial problem in the design of spoken dia- logue systems (SDS) is to decide for incoming recognition hypotheses whether a system should.