SlideShare une entreprise Scribd logo
1  sur  15
Télécharger pour lire hors ligne
WIGOWIN 2010
Collision avoidance using a wandering
token in the PTP protocol
_____________________________
Augusto Ciuffoletti
PTP?
● PTP stands for Precision Time Protocol
● The nickname for IEEE1588-2008
● It addresses clock synchronization in packet
networks
● Substantially improves the Network Time Protocol
(IETF NTP)
● Addresses converging users (telecom, industrial
plant control)
Clock Synchronization - Why?
● Control of industrial plants requires sub
microsecond coordination.
● Telecom networks need precise synchronization to
manage media playback applications.
● Network monitoring applications need
synchronization preciser than packet delay.
● TDM (Time Division Multiplexing) over IP is a
solution for many problems, but needs synchronized
clocks.
Synchronization over Packet - Why?
● Link level synchronization solutions exist (SONET,
SyncE …)
● Packet based solutions have many advantages:
– Scalability
– Adaptability
– Maintainability
– Interoperability
● Packet based solutions have one (big) problem:
– Sensitive to packet delay variations
The PTP solution
● Messages can travel across layers (UDP/IP, Eth,
DeviceNet)
● One master, many slaves
● The master periodically sends a syntonization
message (Sync)
● Each slave responds after a delay with a Delay_Req
message
● The master replies with a Delay_Resp
PTP - Syntonization
● Sync-Sync protocol:
– Invariant: (t1
-t0
) = (t3
-t2
)
– The slave tunes clock frequency
● Assumption: M-S packet delay is constant (!)
Master
Slave
Sync(t0
) Sync Sync Sync Sync
t0
t1
t2
t3
PTP - Synchronization
● Delay_Req – Delay_Resp protocol
– Invariant: PacketDelay =[(t1
-t0
) – (t3
-t2
)]/2
– The slave compensates time of the day offset
● Assumption: M-S packet delay is symmetric (!)
Master
Slave
Sync(t0
)
Delay_Req(t3
)
Delay_Resp(t1
)
t0
t1
t2
t3
Delay_Req – Delay_Resp
● Delay_Req timing is critical (Delay_Resp is not)
● Delay_Req/Delay_Resp traffic grows with system
size (Sync traffic does not)
● The PTP protocol arranges Delay_Req to be
distributed uniformly on time, but uncoordinated
● Clock synchronization is allocated a small, protected
(virtual) channel
● Packet collisions may occur that disrupt protocol
consistency
Coordinate Delay_Req to avoid
collisions
● PRO:
– Protocol overall more reliable (no collisions)
– Improved network utilization
● Beware of:
– Extra complexity, extra problems (KISS)
– Fault tolerance
– Footprint (traffic, processing)
– Standard boundaries
One token to rule them all
● Token circulation to control the production of a
Delay_Req
● Randomized token circulation from slave to slave to
avoid complex and slow ring maintenance
● Each slave maintains a limited number of neighbors
to choose from
● But:
– How to limit the token return time?
– How to effectively maintain a neighborhood?
– Do we need additional messages to carry the token?
Limit return time
● Introduce some global knowledge in the master
(already a single point of failure) to avoid starvation
● Accumulate global knowledge passively observing
the system (no footprint)
● Activate only when needed (minimize impact of
inconsistencies of global knowledge)
Token passing operation
● Token “bounces”
on the master
● Master learns
slaves timeouts
passively
● Token de-routed
to starving slave
● Master usually
transparent
Source
Selected
destinationStarving
slave
A dynamic neighborhood
● Neighborhood
initially just legal
● Token source
observes token
routing
● Selected destination
swapped with real
destination
Token de-routed
to D
A – B – C
Selected address
is B
A – D – C
Random
neighborhood
of token source
After
token passing
Token passing operation
● The token travels
embedded within
PTP messages
● Delay_Req carries
selected dest
● Delay_Resp
carries final dest
● All slaves observe
Delay_Resp msgs
Source
Final
destination
Delay_req
(unicast)
Delay_resp
(multicast)
Token path PTP messages
Future work
● Implementation using the UDP open source PTP
(sourceforge) (thesis)
● Application to wireless ad-hoc networks
(simulation, experiments with low cost devices)
● Use of the PTP in virtual networking environments
(IEEE803.1Q)
● ...and more...
These slides available at “http://www.slideshare.net/AugustoCiuffoletti”

Contenu connexe

Similaire à Collision avoidance using a wandering token in the PTP protocol

IJSRED-V1I1P2
IJSRED-V1I1P2IJSRED-V1I1P2
IJSRED-V1I1P2IJSRED
 
Simulation-Based Fault Injection as a Verification Oracle for the Engineering...
Simulation-Based Fault Injection as a Verification Oracle for the Engineering...Simulation-Based Fault Injection as a Verification Oracle for the Engineering...
Simulation-Based Fault Injection as a Verification Oracle for the Engineering...RealTime-at-Work (RTaW)
 
Lagopus presentation on 14th Annual ON*VECTOR International Photonics Workshop
Lagopus presentation on 14th Annual ON*VECTOR International Photonics WorkshopLagopus presentation on 14th Annual ON*VECTOR International Photonics Workshop
Lagopus presentation on 14th Annual ON*VECTOR International Photonics WorkshopLagopus SDN/OpenFlow switch
 
Current state of IEEE 802.1 Time-Sensitive Networking Task Group Norman Finn,...
Current state of IEEE 802.1 Time-Sensitive Networking Task Group Norman Finn,...Current state of IEEE 802.1 Time-Sensitive Networking Task Group Norman Finn,...
Current state of IEEE 802.1 Time-Sensitive Networking Task Group Norman Finn,...Jörgen Gade
 
DPDK Summit - 08 Sept 2014 - NTT - High Performance vSwitch
DPDK Summit - 08 Sept 2014 - NTT - High Performance vSwitchDPDK Summit - 08 Sept 2014 - NTT - High Performance vSwitch
DPDK Summit - 08 Sept 2014 - NTT - High Performance vSwitchJim St. Leger
 
Four Ways to Improve Linux Performance IEEE Webinar, R2.0
Four Ways to Improve Linux Performance IEEE Webinar, R2.0Four Ways to Improve Linux Performance IEEE Webinar, R2.0
Four Ways to Improve Linux Performance IEEE Webinar, R2.0Michael Christofferson
 
Protecting Data In Motion with MACsec - Gijs Willemse - Rambus Design Summit ...
Protecting Data In Motion with MACsec - Gijs Willemse - Rambus Design Summit ...Protecting Data In Motion with MACsec - Gijs Willemse - Rambus Design Summit ...
Protecting Data In Motion with MACsec - Gijs Willemse - Rambus Design Summit ...Rambus
 
Precision Time Synchronization
Precision Time SynchronizationPrecision Time Synchronization
Precision Time SynchronizationKrishna Sankar
 
High perf-networking
High perf-networkingHigh perf-networking
High perf-networkingmtimjones
 
TRACK B: Multicores & Network On Chip Architectures/ Oren Hollander
TRACK B: Multicores & Network On Chip Architectures/ Oren HollanderTRACK B: Multicores & Network On Chip Architectures/ Oren Hollander
TRACK B: Multicores & Network On Chip Architectures/ Oren Hollanderchiportal
 
Network-Connected Development with ZeroMQ
Network-Connected Development with ZeroMQNetwork-Connected Development with ZeroMQ
Network-Connected Development with ZeroMQICS
 
PFQ@ 9th Italian Networking Workshop (Courmayeur)
PFQ@ 9th Italian Networking Workshop (Courmayeur)PFQ@ 9th Italian Networking Workshop (Courmayeur)
PFQ@ 9th Italian Networking Workshop (Courmayeur)Nicola Bonelli
 
Designing an 4K/UHD1 HDR OB Truck as 12G-SDI or IP-based
Designing an 4K/UHD1 HDR OB Truck as 12G-SDI or IP-basedDesigning an 4K/UHD1 HDR OB Truck as 12G-SDI or IP-based
Designing an 4K/UHD1 HDR OB Truck as 12G-SDI or IP-basedDr. Mohieddin Moradi
 
Multithreading computer architecture
 Multithreading computer architecture  Multithreading computer architecture
Multithreading computer architecture Haris456
 

Similaire à Collision avoidance using a wandering token in the PTP protocol (20)

SDI to IP 2110 Transition Part 2
SDI to IP 2110 Transition Part 2SDI to IP 2110 Transition Part 2
SDI to IP 2110 Transition Part 2
 
IJSRED-V1I1P2
IJSRED-V1I1P2IJSRED-V1I1P2
IJSRED-V1I1P2
 
Simulation-Based Fault Injection as a Verification Oracle for the Engineering...
Simulation-Based Fault Injection as a Verification Oracle for the Engineering...Simulation-Based Fault Injection as a Verification Oracle for the Engineering...
Simulation-Based Fault Injection as a Verification Oracle for the Engineering...
 
Lagopus presentation on 14th Annual ON*VECTOR International Photonics Workshop
Lagopus presentation on 14th Annual ON*VECTOR International Photonics WorkshopLagopus presentation on 14th Annual ON*VECTOR International Photonics Workshop
Lagopus presentation on 14th Annual ON*VECTOR International Photonics Workshop
 
Current state of IEEE 802.1 Time-Sensitive Networking Task Group Norman Finn,...
Current state of IEEE 802.1 Time-Sensitive Networking Task Group Norman Finn,...Current state of IEEE 802.1 Time-Sensitive Networking Task Group Norman Finn,...
Current state of IEEE 802.1 Time-Sensitive Networking Task Group Norman Finn,...
 
Micro-controllers (PIC) based Application Development
Micro-controllers (PIC) based Application DevelopmentMicro-controllers (PIC) based Application Development
Micro-controllers (PIC) based Application Development
 
Intro to Embedded OS, RTOS and Communication Protocols
Intro to Embedded OS, RTOS and Communication ProtocolsIntro to Embedded OS, RTOS and Communication Protocols
Intro to Embedded OS, RTOS and Communication Protocols
 
Traffic analyzer Ip multicast
Traffic analyzer Ip multicastTraffic analyzer Ip multicast
Traffic analyzer Ip multicast
 
Cat @ scale
Cat @ scaleCat @ scale
Cat @ scale
 
DPDK Summit - 08 Sept 2014 - NTT - High Performance vSwitch
DPDK Summit - 08 Sept 2014 - NTT - High Performance vSwitchDPDK Summit - 08 Sept 2014 - NTT - High Performance vSwitch
DPDK Summit - 08 Sept 2014 - NTT - High Performance vSwitch
 
Four Ways to Improve Linux Performance IEEE Webinar, R2.0
Four Ways to Improve Linux Performance IEEE Webinar, R2.0Four Ways to Improve Linux Performance IEEE Webinar, R2.0
Four Ways to Improve Linux Performance IEEE Webinar, R2.0
 
Protecting Data In Motion with MACsec - Gijs Willemse - Rambus Design Summit ...
Protecting Data In Motion with MACsec - Gijs Willemse - Rambus Design Summit ...Protecting Data In Motion with MACsec - Gijs Willemse - Rambus Design Summit ...
Protecting Data In Motion with MACsec - Gijs Willemse - Rambus Design Summit ...
 
synchonization PTP
synchonization PTP synchonization PTP
synchonization PTP
 
Precision Time Synchronization
Precision Time SynchronizationPrecision Time Synchronization
Precision Time Synchronization
 
High perf-networking
High perf-networkingHigh perf-networking
High perf-networking
 
TRACK B: Multicores & Network On Chip Architectures/ Oren Hollander
TRACK B: Multicores & Network On Chip Architectures/ Oren HollanderTRACK B: Multicores & Network On Chip Architectures/ Oren Hollander
TRACK B: Multicores & Network On Chip Architectures/ Oren Hollander
 
Network-Connected Development with ZeroMQ
Network-Connected Development with ZeroMQNetwork-Connected Development with ZeroMQ
Network-Connected Development with ZeroMQ
 
PFQ@ 9th Italian Networking Workshop (Courmayeur)
PFQ@ 9th Italian Networking Workshop (Courmayeur)PFQ@ 9th Italian Networking Workshop (Courmayeur)
PFQ@ 9th Italian Networking Workshop (Courmayeur)
 
Designing an 4K/UHD1 HDR OB Truck as 12G-SDI or IP-based
Designing an 4K/UHD1 HDR OB Truck as 12G-SDI or IP-basedDesigning an 4K/UHD1 HDR OB Truck as 12G-SDI or IP-based
Designing an 4K/UHD1 HDR OB Truck as 12G-SDI or IP-based
 
Multithreading computer architecture
 Multithreading computer architecture  Multithreading computer architecture
Multithreading computer architecture
 

Plus de Augusto Ciuffoletti

An open-source testbed for IoT systems
An open-source testbed for IoT systemsAn open-source testbed for IoT systems
An open-source testbed for IoT systemsAugusto Ciuffoletti
 
Design and implementation of a low-cost modular sensor
Design and implementation of a low-cost modular sensorDesign and implementation of a low-cost modular sensor
Design and implementation of a low-cost modular sensorAugusto Ciuffoletti
 
Automated deployment of a microservice based monitoring architecture
Automated deployment of a microservice based monitoring architectureAutomated deployment of a microservice based monitoring architecture
Automated deployment of a microservice based monitoring architectureAugusto Ciuffoletti
 
OCCI Monitoring at OGF42 - Concepts and demo
OCCI Monitoring at OGF42 - Concepts and demoOCCI Monitoring at OGF42 - Concepts and demo
OCCI Monitoring at OGF42 - Concepts and demoAugusto Ciuffoletti
 
Extending the OCCI API with monitoring capabilities
Extending the OCCI API with monitoring capabilitiesExtending the OCCI API with monitoring capabilities
Extending the OCCI API with monitoring capabilitiesAugusto Ciuffoletti
 
Monitoring a virtual network infrastructure - An IaaS perspective
Monitoring a virtual network infrastructure - An IaaS perspectiveMonitoring a virtual network infrastructure - An IaaS perspective
Monitoring a virtual network infrastructure - An IaaS perspectiveAugusto Ciuffoletti
 
TIP: a course about IP convergence technology
TIP: a course about IP convergence technologyTIP: a course about IP convergence technology
TIP: a course about IP convergence technologyAugusto Ciuffoletti
 
Design of a secure "Token Passing" protocol
Design of a secure "Token Passing" protocolDesign of a secure "Token Passing" protocol
Design of a secure "Token Passing" protocolAugusto Ciuffoletti
 
Network Monitoring in the age of the Cloud
Network Monitoring in the age of the CloudNetwork Monitoring in the age of the Cloud
Network Monitoring in the age of the CloudAugusto Ciuffoletti
 
Grid Infrastructure Architecture A Modular Approach from CoreGRID
Grid Infrastructure Architecture A Modular Approach from CoreGRIDGrid Infrastructure Architecture A Modular Approach from CoreGRID
Grid Infrastructure Architecture A Modular Approach from CoreGRIDAugusto Ciuffoletti
 
Scalable concurrency control in a dynamic membership
Scalable concurrency control  in a dynamic membershipScalable concurrency control  in a dynamic membership
Scalable concurrency control in a dynamic membershipAugusto Ciuffoletti
 
Prototype Implementation of a Demand Driven Network Monitoring Architecture
Prototype Implementation of a Demand Driven Network Monitoring ArchitecturePrototype Implementation of a Demand Driven Network Monitoring Architecture
Prototype Implementation of a Demand Driven Network Monitoring ArchitectureAugusto Ciuffoletti
 

Plus de Augusto Ciuffoletti (20)

An open-source testbed for IoT systems
An open-source testbed for IoT systemsAn open-source testbed for IoT systems
An open-source testbed for IoT systems
 
0 basic
0 basic0 basic
0 basic
 
Thingspeak: integrazione
Thingspeak: integrazioneThingspeak: integrazione
Thingspeak: integrazione
 
Thingspeak: fondamenti
Thingspeak: fondamentiThingspeak: fondamenti
Thingspeak: fondamenti
 
Design and implementation of a low-cost modular sensor
Design and implementation of a low-cost modular sensorDesign and implementation of a low-cost modular sensor
Design and implementation of a low-cost modular sensor
 
ZHAW 2016 - OCCI for monitoring
ZHAW 2016 - OCCI for monitoringZHAW 2016 - OCCI for monitoring
ZHAW 2016 - OCCI for monitoring
 
Open Cloud Computing Interface
Open Cloud Computing InterfaceOpen Cloud Computing Interface
Open Cloud Computing Interface
 
Laboratorio Openstack
Laboratorio OpenstackLaboratorio Openstack
Laboratorio Openstack
 
Automated deployment of a microservice based monitoring architecture
Automated deployment of a microservice based monitoring architectureAutomated deployment of a microservice based monitoring architecture
Automated deployment of a microservice based monitoring architecture
 
OCCI Monitoring at OGF42 - Concepts and demo
OCCI Monitoring at OGF42 - Concepts and demoOCCI Monitoring at OGF42 - Concepts and demo
OCCI Monitoring at OGF42 - Concepts and demo
 
Extending the OCCI API with monitoring capabilities
Extending the OCCI API with monitoring capabilitiesExtending the OCCI API with monitoring capabilities
Extending the OCCI API with monitoring capabilities
 
2013 03 occi-monitoring
2013 03 occi-monitoring2013 03 occi-monitoring
2013 03 occi-monitoring
 
Monitoring a virtual network infrastructure - An IaaS perspective
Monitoring a virtual network infrastructure - An IaaS perspectiveMonitoring a virtual network infrastructure - An IaaS perspective
Monitoring a virtual network infrastructure - An IaaS perspective
 
TIP: a course about IP convergence technology
TIP: a course about IP convergence technologyTIP: a course about IP convergence technology
TIP: a course about IP convergence technology
 
Design of a secure "Token Passing" protocol
Design of a secure "Token Passing" protocolDesign of a secure "Token Passing" protocol
Design of a secure "Token Passing" protocol
 
The wandering token
The wandering tokenThe wandering token
The wandering token
 
Network Monitoring in the age of the Cloud
Network Monitoring in the age of the CloudNetwork Monitoring in the age of the Cloud
Network Monitoring in the age of the Cloud
 
Grid Infrastructure Architecture A Modular Approach from CoreGRID
Grid Infrastructure Architecture A Modular Approach from CoreGRIDGrid Infrastructure Architecture A Modular Approach from CoreGRID
Grid Infrastructure Architecture A Modular Approach from CoreGRID
 
Scalable concurrency control in a dynamic membership
Scalable concurrency control  in a dynamic membershipScalable concurrency control  in a dynamic membership
Scalable concurrency control in a dynamic membership
 
Prototype Implementation of a Demand Driven Network Monitoring Architecture
Prototype Implementation of a Demand Driven Network Monitoring ArchitecturePrototype Implementation of a Demand Driven Network Monitoring Architecture
Prototype Implementation of a Demand Driven Network Monitoring Architecture
 

Dernier

Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxJennifer Lim
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftshyamraj55
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPTiSEO AI
 
BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptx
BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptxBT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptx
BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptxNeo4j
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...FIDO Alliance
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfFIDO Alliance
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101vincent683379
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGDSC PJATK
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceSamy Fodil
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfFIDO Alliance
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?Mark Billinghurst
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...panagenda
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfFIDO Alliance
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...CzechDreamin
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandIES VE
 

Dernier (20)

Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
 
BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptx
BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptxBT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptx
BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptx
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 

Collision avoidance using a wandering token in the PTP protocol

  • 1. WIGOWIN 2010 Collision avoidance using a wandering token in the PTP protocol _____________________________ Augusto Ciuffoletti
  • 2. PTP? ● PTP stands for Precision Time Protocol ● The nickname for IEEE1588-2008 ● It addresses clock synchronization in packet networks ● Substantially improves the Network Time Protocol (IETF NTP) ● Addresses converging users (telecom, industrial plant control)
  • 3. Clock Synchronization - Why? ● Control of industrial plants requires sub microsecond coordination. ● Telecom networks need precise synchronization to manage media playback applications. ● Network monitoring applications need synchronization preciser than packet delay. ● TDM (Time Division Multiplexing) over IP is a solution for many problems, but needs synchronized clocks.
  • 4. Synchronization over Packet - Why? ● Link level synchronization solutions exist (SONET, SyncE …) ● Packet based solutions have many advantages: – Scalability – Adaptability – Maintainability – Interoperability ● Packet based solutions have one (big) problem: – Sensitive to packet delay variations
  • 5. The PTP solution ● Messages can travel across layers (UDP/IP, Eth, DeviceNet) ● One master, many slaves ● The master periodically sends a syntonization message (Sync) ● Each slave responds after a delay with a Delay_Req message ● The master replies with a Delay_Resp
  • 6. PTP - Syntonization ● Sync-Sync protocol: – Invariant: (t1 -t0 ) = (t3 -t2 ) – The slave tunes clock frequency ● Assumption: M-S packet delay is constant (!) Master Slave Sync(t0 ) Sync Sync Sync Sync t0 t1 t2 t3
  • 7. PTP - Synchronization ● Delay_Req – Delay_Resp protocol – Invariant: PacketDelay =[(t1 -t0 ) – (t3 -t2 )]/2 – The slave compensates time of the day offset ● Assumption: M-S packet delay is symmetric (!) Master Slave Sync(t0 ) Delay_Req(t3 ) Delay_Resp(t1 ) t0 t1 t2 t3
  • 8. Delay_Req – Delay_Resp ● Delay_Req timing is critical (Delay_Resp is not) ● Delay_Req/Delay_Resp traffic grows with system size (Sync traffic does not) ● The PTP protocol arranges Delay_Req to be distributed uniformly on time, but uncoordinated ● Clock synchronization is allocated a small, protected (virtual) channel ● Packet collisions may occur that disrupt protocol consistency
  • 9. Coordinate Delay_Req to avoid collisions ● PRO: – Protocol overall more reliable (no collisions) – Improved network utilization ● Beware of: – Extra complexity, extra problems (KISS) – Fault tolerance – Footprint (traffic, processing) – Standard boundaries
  • 10. One token to rule them all ● Token circulation to control the production of a Delay_Req ● Randomized token circulation from slave to slave to avoid complex and slow ring maintenance ● Each slave maintains a limited number of neighbors to choose from ● But: – How to limit the token return time? – How to effectively maintain a neighborhood? – Do we need additional messages to carry the token?
  • 11. Limit return time ● Introduce some global knowledge in the master (already a single point of failure) to avoid starvation ● Accumulate global knowledge passively observing the system (no footprint) ● Activate only when needed (minimize impact of inconsistencies of global knowledge)
  • 12. Token passing operation ● Token “bounces” on the master ● Master learns slaves timeouts passively ● Token de-routed to starving slave ● Master usually transparent Source Selected destinationStarving slave
  • 13. A dynamic neighborhood ● Neighborhood initially just legal ● Token source observes token routing ● Selected destination swapped with real destination Token de-routed to D A – B – C Selected address is B A – D – C Random neighborhood of token source After token passing
  • 14. Token passing operation ● The token travels embedded within PTP messages ● Delay_Req carries selected dest ● Delay_Resp carries final dest ● All slaves observe Delay_Resp msgs Source Final destination Delay_req (unicast) Delay_resp (multicast) Token path PTP messages
  • 15. Future work ● Implementation using the UDP open source PTP (sourceforge) (thesis) ● Application to wireless ad-hoc networks (simulation, experiments with low cost devices) ● Use of the PTP in virtual networking environments (IEEE803.1Q) ● ...and more... These slides available at “http://www.slideshare.net/AugustoCiuffoletti”