CLUE design team meeting

Slides:



Advertisements
Similar presentations
IVOA Beijing Interop May 15-16, 2007 Apps Messaging Issues.
Advertisements

Non-200 response to PRACK (Due to rejected SDP offer or other reasons) Christer Holmberg
NETW-250 Troubleshooting Last Update Copyright Kenneth M. Chipps Ph.D. 1.
Refresh Interval Independent facility FRR draft-chandra-mpls-enhanced-frr-bypass-01 Chandrasekar Ramachandran Markus.
CLUE protocol CLUE design team meeting 28/10/2014.
Session Initiation Protocol (SIP) By: Zhixin Chen.
1 SIPREC Requirements IETF #80 Authors: K. Rehor, A. Hutton, L. Portman, R. Jain, H. Lam.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Communicating over the Network Network Fundamentals – Chapter 2.
Session-ID Requirements for IETF84 draft-ietf-insipid-session-id-reqts-00 1 August 2012 Paul Jones, Gonzalo Salgueiro, James Polk, Laura Liess, Hadriel.
Chapter 5 outline 5.1 Introduction and services
Draft-romanow-clue-call-flow-02 Allyn Romanow Rob Hansen Arun Krishna.
TCP1 Transmission Control Protocol (TCP). TCP2 Outline Transmission Control Protocol.
A Conference Gateway Supporting Interoperability Between SIP and H.323 Jiann-Min Ho (Presenter) Jia-Cheng Hu Information Networking Institute Peter Steenkiste.
FIMS v1.1 Version numbers in schema Richard Cartwright Quantel July 2013.
Generic Aggregation of Resource Reservation Protocol (RSVP) for IPv4 and IPv6 Reservation over PCN domains Georgios Karagiannis, Anurag Bhargava draft-ietf-tsvwg-rsvp-pcn-01.
MPLS-TP Loopback Draft draft-boutros-mpls-tp-loopback-02.txt Sami Boutros and a Cast of Thousands.
Real-Time Streaming Protocol draft-ietf-mmusic-rfc2326bis-01.txt Magnus Westerlund.
SDP Simple Capability Negotiation (SDP Simcap) draft-andreasen-mmusic-sdp-simcap-reqts-00.txt draft-andreasen-mmusic-sdp-simcap-01.txt 50th IETF - March.
CLUE datamodel & protocol IETF 90 Toronto, July 21 st 2014 Roberta Presta & Simon Romano.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt RTSP draft-ietf-mmusic-rfc2396bis-10 Magnus Westerlund Co-auhtors: Henning Schulzrinne, Rob Lanphier,
CLUE Signaling (draft-kyzivat-clue-signaling-05) Sept 17, 2012 Editor: Paul Kyzivat.
Netconf Event Notifications IETF 66 Sharon Chisholm Hector Trevino
RTP Usage for CLUE IETF 82 – 14 November 2011 Jonathan Lennox Allyn Romanow Paul Witty.
Netconf Schema Query Mark Scott IETF 70 Vancouver December 2007
Title and Bandwidth Capabilities Negotiation in the Session Description Protocol (SDP) Simo Veikkolainen.
CLUE protocol CLUE design team meeting 07/10/ /10/2013.
CLUE Signaling draft-kyzivat-clue-signaling-02 Paul Kyzivat 11-mar-2013.
ANCP Migration Carrier Analysis Thomas Haag; Birgit Witschurke,
SIP wg Items Jonathan Rosenberg dynamicsoft Caller Preferences: Changes Discussion of Redirects –Previous draft only proxy –Nothing different for redirect.
CLUE WG Interim Meeting San Jose, CA Sept , 2012
draft-jounay-pwe3-dynamic-pw-update-00.txt IETF 70 PWE3 Working Group
IP Telephony (VoIP).
PANA Discussion and Open Issues (draft-ietf-pana-pana-01.txt)
CLUE WG Interim Meeting San Jose, CA Sept , 2012
CLUE WG Interim Meeting San Jose, CA Sept , 2012
Virtual Interim CLUE Signalling discussion
draft-ietf-simple-message-sessions-00 Ben Campbell
5. End-to-end protocols (part 1)
21-2 ICMP(Internet control message protocol)
IETF#67 – 5-10 November 2006 FECFRAME requirements (draft-ietf-fecframe-req-01) Mark Watson.
PCEP Extensions For Transporting Traffic Engineering (TE) Data
Options to Transport CLUE Messages draft-wenger-clue-transport-01
Process-to-Process Delivery, TCP and UDP protocols
LMP Behavior Negotiation
Goals of soBGP Verify the origin of advertisements
Chapter 11 - Part 2 Data Link Control.
Process-to-Process Delivery
Byungchul Park ICMP & ICMPv DPNM Lab. Byungchul Park
Issues from telemedical-callflows
Sanjay Wadhwa Juniper Networks
Sharon Chisholm Netconf Phase 2 Musing Sharon Chisholm
CIS 321 Data Communications & Networking
RTCWeb Data Channel Management
Data Link Layer: Data Link Control
Ron Shacham Henning Schulzrinne Srisakul Thakolsri Wolfgang Kellerer
Internet Control Message Protocol Version 4 (ICMPv4)
Chapter 5 TCP Control Flow
NSIS Operation Over IP Tunnels draft-shen-nsis-tunnel-01.txt
Reliable Client-Server Communication
An Update on BGP Support for 4-byte ASN
NSIS Operation Over IP Tunnels draft-ietf-nsis-tunnel-04.txt
RIPE October 2005 Geoff Huston APNIC
Internet Control Message Protocol
EIDE Architecture Overview
EEC 688/788 Secure and Dependable Computing
EEC 688/788 Secure and Dependable Computing
Chapter 5 Peer-to-Peer Protocols and Data Link Layer
Lecture 4 Peer-to-Peer Protocols and Data Link Layer
Transport Layer 9/22/2019.
A RELOAD Usage for Distributed Conference Control (DisCo) – Update
Presentation transcript:

CLUE design team meeting CLUE protocol CLUE design team meeting 29/05/2014

Outline Message structures Versioning and options Discussion about CLUE protocol updates reflecting changes in draft-ietf-clue-signaling draft-ietf-clue-data-channel 29/05/2014

A common basis 29/05/2014

A common basis Each CLUE message extends the basic CLUE message type Common info: protocol: CLUE v: version clueId: the sender’s id within the telepresence system sequenceNr 29/05/2014

Call flow example X Y OPT, sn: Xopt OPT_RES, sn: Yopt OPT_ACK, sn: Xopt+1 ADV, sn: Xmp ADV_ACK, sn: Ymc CONF, sn: Ymc +1 CONF_RES, sn: Xmp+1 X CI Y CR ADV, sn: Ymp X MP Y MC CONF+ACK, sn: Xmc X MC Y MP CONF_RES, sn: Ymp+1 29/05/2014

Sequence numbers Each CLUE endpoint manages 3 local sequence number (SN): 1 for the OPTIONS mechanism (before starting the MP and MC state machines) (Xopt, Yopt) 1 for the MP state machine (Xmp, Ymp) 1 for the MC state machine (Xmc, Ymc) SN are randomly generated and incremented of 1 each time a new message is sent SN can be used to make reference to the corresponding message within a CLUE dialogue (between a MP and a MC) 29/05/2014

Advertisement The configure request can refer to the sequence number of the advertisement. 29/05/2014

Advertisement ACK 29/05/2014

Configure 29/05/2014

Configure Response 29/05/2014

READV A refresh mechanism to retrieve the MP’s current capabilities lastReceivedAdv: the version number of the last correctly received Adv 0, if no ADV has been delivered yet If an ADV is malformed, a NACK comes back to the MP 29/05/2014

READV Response The following CONF will use the READV Response sequence number in place of the ADV sequence number Diff mechanism to be discussed (introduction of a choice section) 29/05/2014

Versioning Imported from the signaling doc: A version has major and minor components, each a non-negative integer. Major version changes denote non-interoperable changes Minor version changes denote schema changes that are backward compatible by ignoring unknown XML elements, or other backward compatible changes. If a common major version cannot be negotiated, then CLUE MUST NOT be used. From Paul’s doc: -Minor versions are always backwards compatible, so support for a minor version implies support for all smaller minor versions 29/05/2014

Options mechanism The Channel Initiator issues the OPTIONS message with A boolean flag telling if it is able to act as a MP <mediaProvider> A boolean flag telling if it is able to act as a MC <mediaConsumer> All the supported versions All the supported options 29/05/2014

OPTIONS 29/05/2014

Options mechanism (2 ways) Current solution: 2 ways The Channel Reveiver issues an OPTIONS response carrying A response code telling if an agreement has been found or not A reason string explaining the response code <mediaProvider> <mediaConsumer> The highest commonly supported version The common options If a common version can be found, the MP/MC state machines start For example, if both parts are able to act only as media providers with each other, the CLUE session should be terminated. Response code and response string signal the error 29/05/2014

OPTIONS Response (2ways) 29/05/2014

Options mechanism (3 ways) Proposal: 3 ways The Channel Reveiver issues an OPTIONS Response carrying <mediaProvider> <mediaConsumer> All the supported versions All the supported options 29/05/2014

OPTIONS Response (3ways) 29/05/2014

Options mechanism (3 ways) Proposal: 3 ways The Channel Initiatior send an OPTIONS ACK carrying A response code telling if the elaboration of the options message is ok or not A reason string explaining the response code The highest commonly supported version The common options If a common version can be found, the MP/MC state machines start If we put all the supported things of the CR in the OPTIONS RESPONSE, the OPTIONS ACK would carry the final agreement 29/05/2014

OPTIONS ACK (3ways) 29/05/2014

Comparison 2 ways: 3 ways: the Channel Initiator will not know all the supported versions and options of the Channel Receiver, but only the common ones The matching is up to the Channel Receiver 3 ways: Both parties know all the capabilities of each other The matching is up to the Channel Initiator One message more 29/05/2014

Some notes There is a need for communication between the CLUE stata machine and the SDP negotiation engine Example: a CLUE endpoint cannot issue a CONF before the SDP info arrives State machines need to be updated considering the dependancy between CLUE and SDP There is no (total) independence 29/05/2014