diff options
author | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
---|---|---|
committer | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
commit | 4bfd864f10b68b71482b35c818559068ef8d5797 (patch) | |
tree | e3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc6597.txt | |
parent | ea76e11061bda059ae9f9ad130a9895cc85607db (diff) |
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc6597.txt')
-rw-r--r-- | doc/rfc/rfc6597.txt | 731 |
1 files changed, 731 insertions, 0 deletions
diff --git a/doc/rfc/rfc6597.txt b/doc/rfc/rfc6597.txt new file mode 100644 index 0000000..5686d21 --- /dev/null +++ b/doc/rfc/rfc6597.txt @@ -0,0 +1,731 @@ + + + + + + +Internet Engineering Task Force (IETF) J. Downs, Ed. +Request for Comments: 6597 PAR Government Systems Corp. +Category: Standards Track J. Arbeiter, Ed. +ISSN: 2070-1721 April 2012 + + + RTP Payload Format for + Society of Motion Picture and Television Engineers (SMPTE) + ST 336 Encoded Data + +Abstract + + This document specifies the payload format for packetization of KLV + (Key-Length-Value) Encoded Data, as defined by the Society of Motion + Picture and Television Engineers (SMPTE) in SMPTE ST 336, into the + Real-time Transport Protocol (RTP). + +Status of This Memo + + This is an Internet Standards Track document. + + This document is a product of the Internet Engineering Task Force + (IETF). It represents the consensus of the IETF community. It has + received public review and has been approved for publication by the + Internet Engineering Steering Group (IESG). Further information on + Internet Standards is available in Section 2 of RFC 5741. + + Information about the current status of this document, any errata, + and how to provide feedback on it may be obtained at + http://www.rfc-editor.org/info/rfc6597. + +Copyright Notice + + Copyright (c) 2012 IETF Trust and the persons identified as the + document authors. All rights reserved. + + This document is subject to BCP 78 and the IETF Trust's Legal + Provisions Relating to IETF Documents + (http://trustee.ietf.org/license-info) in effect on the date of + publication of this document. Please review these documents + carefully, as they describe your rights and restrictions with respect + to this document. Code Components extracted from this document must + include Simplified BSD License text as described in Section 4.e of + the Trust Legal Provisions and are provided without warranty as + described in the Simplified BSD License. + + + + + + +Downs & Arbeiter Standards Track [Page 1] + +RFC 6597 RTP Format for SMPTE ST 336 Data April 2012 + + +Table of Contents + + 1. Introduction ....................................................2 + 2. Conventions, Definitions, and Acronyms ..........................3 + 3. Media Format Background .........................................3 + 4. Payload Format ..................................................4 + 4.1. RTP Header Usage ...........................................5 + 4.2. Payload Data ...............................................5 + 4.2.1. The KLVunit .........................................5 + 4.2.2. KLVunit Mapping to RTP Packet Payload ...............6 + 4.3. Implementation Considerations ..............................6 + 4.3.1. Loss of Data ........................................6 + 4.3.1.1. Damaged KLVunits ...........................7 + 4.3.1.2. Treatment of Damaged KLVunits ..............9 + 5. Congestion Control ..............................................9 + 6. Payload Format Parameters .......................................9 + 6.1. Media Type Definition ......................................9 + 6.2. Mapping to SDP ............................................10 + 6.2.1. Offer/Answer Model and Declarative Considerations ..10 + 7. IANA Considerations ............................................11 + 8. Security Considerations ........................................11 + 9. References .....................................................12 + 9.1. Normative References ......................................12 + 9.2. Informative References ....................................12 + +1. Introduction + + This document specifies the payload format for packetization of KLV + (Key-Length-Value) Encoded Data, as defined by the Society of Motion + Picture and Television Engineers (SMPTE) in [SMPTE-ST336], into the + Real-time Transport Protocol (RTP) [RFC3550]. + + The payload format is defined in such a way that arbitrary KLV data + can be carried. No restrictions are placed on which KLV data keys + can be used. + + A brief description of SMPTE ST 336, "Data Encoding Protocol Using + Key-Length-Value", is given. The payload format itself, including + use of the RTP header fields, is specified in Section 4. The media + type and IANA considerations are also described. This document + concludes with security considerations relevant to this payload + format. + + + + + + + + + +Downs & Arbeiter Standards Track [Page 2] + +RFC 6597 RTP Format for SMPTE ST 336 Data April 2012 + + +2. Conventions, Definitions, and Acronyms + + The term "Universal Label Key" is used in this document to refer to a + fixed-length, 16-byte SMPTE-administered Universal Label (see + [SMPTE-ST298]) that is used as an identifying key in a KLV item. + + The term "KLV item" is used in this document to refer to one single + Universal Label Key, length, and value triplet encoded as described + in [SMPTE-ST336]. + + The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", + "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this + document are to be interpreted as described in [RFC2119]. + +3. Media Format Background + + [SMPTE-ST336], "Data Encoding Protocol Using Key-Length-Value", + defines a byte-level data encoding protocol for representing data + items and data groups. This encoding protocol definition is + independent of the application or transportation method used. + + SMPTE ST 336 data encoding can be applied to a wide variety of binary + data. This encoding has been used to provide diverse and rich + metadata sets that describe or enhance associated video + presentations. Use of SMPTE ST 336 encoded metadata in conjunction + with video has enabled improvements in multimedia presentations, + content management and distribution, archival and retrieval, and + production workflow. + + The SMPTE ST 336 standard defines a KLV triplet as a data interchange + protocol for data items or data groups where the Key identifies the + data, the Length specifies the length of the data, and the Value is + the data itself. The KLV protocol provides a common interchange + point for all compliant applications irrespective of the method of + implementation or transport. + + The Key of a KLV triplet (a Universal Label Key) is coded using a + fixed-length 16-byte SMPTE-administered Universal Label. + [SMPTE-ST298] further details the structure of 16-byte SMPTE- + administered Universal Labels. Universal Label Keys are maintained + in registries published by SMPTE (see, for example, [SMPTE-ST335] and + [SMPTE-RP210]). + + + + + + + + + +Downs & Arbeiter Standards Track [Page 3] + +RFC 6597 RTP Format for SMPTE ST 336 Data April 2012 + + + The standard also provides methods for combining associated KLV + triplets in data sets where the set of KLV triplets is itself coded + with the KLV data coding protocol. Such sets can be coded in either + full form (Universal Sets) or one of four increasingly bit-efficient + forms (Global Sets, Local Sets, Variable Length Packs, and Defined + Length Packs). The standard provides a definition of each of these + data constructs. + + Additionally, the standard defines the use of KLV coding to provide a + means to carry information that is registered with a non-SMPTE + external agency. + +4. Payload Format + + The main goal of the payload format design for SMPTE ST 336 data is + to provide carriage of SMPTE ST 336 data over RTP in a simple, yet + robust manner. All forms of SMPTE ST 336 data can be carried by the + payload format. The payload format maintains simplicity by using + only the standard RTP headers and not defining any payload headers. + + SMPTE ST 336 KLV data is broken into KLVunits. A KLVunit is simply a + logical grouping of otherwise unframed KLV data, grouped based on + source data timing (see Section 4.2.1). Each KLVunit is then placed + into one or more RTP packet payloads. The RTP header marker bit is + used to assist receivers in locating the boundaries of KLVunits. + + + + + + + + + + + + + + + + + + + + + + + + + + +Downs & Arbeiter Standards Track [Page 4] + +RFC 6597 RTP Format for SMPTE ST 336 Data April 2012 + + +4.1. RTP Header Usage + + This payload format uses the RTP packet header fields as described in + the table below: + + +-----------+-------------------------------------------------------+ + | Field | Usage | + +-----------+-------------------------------------------------------+ + | Timestamp | The RTP Timestamp encodes the instant along a | + | | presentation timeline that the entire KLVunit encoded | + | | in the packet payload is to be presented. When one | + | | KLVunit is placed in multiple RTP packets, the RTP | + | | timestamp of all packets comprising that KLVunit MUST | + | | be the same. The timestamp clock frequency is | + | | defined as a parameter to the payload format | + | | (Section 6). | + | | | + | M-bit | The RTP header marker bit (M) is used to demarcate | + | | KLVunits. Senders MUST set the marker bit to '1' for | + | | any RTP packet that contains the final byte of a | + | | KLVunit. For all other packets, senders MUST set the | + | | RTP header marker bit to '0'. This allows receivers | + | | to pass a KLVunit for parsing/decoding immediately | + | | upon receipt of the last RTP packet comprising the | + | | KLVunit. Without this, a receiver would need to wait | + | | for the next RTP packet with a different timestamp to | + | | arrive, thus signaling the end of one KLVunit and the | + | | start of another. | + +-----------+-------------------------------------------------------+ + + The remaining RTP header fields are used as specified in [RFC3550]. + +4.2. Payload Data + +4.2.1. The KLVunit + + A KLVunit is a logical collection of all KLV items that are to be + presented at a specific time. A KLVunit is comprised of one or more + KLV items. Compound items (sets, packs) are allowed as per + [SMPTE-ST336], but the contents of a compound item MUST NOT be split + across two KLVunits. Multiple KLV items in a KLVunit occur one after + another with no padding or stuffing between items. + + + + + + + + + +Downs & Arbeiter Standards Track [Page 5] + +RFC 6597 RTP Format for SMPTE ST 336 Data April 2012 + + +4.2.2. KLVunit Mapping to RTP Packet Payload + + An RTP packet payload SHALL contain one, and only one, KLVunit or a + fragment thereof. KLVunits small enough to fit into a single RTP + packet (RTP packet size is up to the implementation but should + consider underlying transport/network factors such as MTU + limitations) are placed directly into the payload of the RTP packet, + with the first byte of the KLVunit (which is the first byte of a KLV + Universal Label Key) being the first byte of the RTP packet payload. + + KLVunits too large to fit into a single RTP packet payload MAY span + multiple RTP packet payloads. When this is done, the KLVunit data + MUST be sent in sequential byte order, such that when all RTP packets + comprising the KLVunit are arranged in sequence number order, + concatenating the payload data together exactly reproduces the + original KLVunit. + + Additionally, when a KLVunit is fragmented across multiple RTP + packets, all RTP packets transporting the fragments of a KLVunit MUST + have the same timestamp. + + KLVunits are bounded with changes in RTP packet timestamps. The + marker (M) bit in the RTP packet headers marks the last RTP packet + comprising a KLVunit (see Section 4.1). + +4.3. Implementation Considerations + +4.3.1. Loss of Data + + RTP is generally deployed in network environments where packet loss + might occur. RTP header fields enable detection of lost packets, as + described in [RFC3550]. When transmitting payload data described by + this payload format, packet loss can cause the loss of whole KLVunits + or portions thereof. + + + + + + + + + + + + + + + + + +Downs & Arbeiter Standards Track [Page 6] + +RFC 6597 RTP Format for SMPTE ST 336 Data April 2012 + + +4.3.1.1. Damaged KLVunits + + A damaged KLVunit is any KLVunit that was carried in one or more RTP + packets that have been lost. When a lost packet is detected (through + use of the sequence number header field), the receiver + + o MUST consider the KLVunit partially received before a lost packet + as damaged. This damaged KLVunit includes all packets prior to + the lost one (in sequence number order) back to, but not + including, the most recent packet in which the M-bit in the RTP + header was set to '1'. + + o MUST consider the first KLVunit received after a lost packet as + damaged. This damaged KLVunit includes the first packet after the + lost one (in sequence number order) and, if the first packet has + its M-bit in the RTP header set to '0', all subsequent packets up + to and including the next one with the M-bit in the RTP header set + to '1'. + + The above applies, regardless of the M-bit value in the RTP header of + the lost packet itself. This enables very basic receivers to look + solely at the M-bit to determine the outer boundaries of damaged + KLVunits. For example, when a packet with the M-bit set to '1' is + lost, the KLVunit that the lost packet would have terminated is + considered damaged, as is the KLVunit comprised of packets received + subsequent to the lost packet (up to and including the next received + packet with the M-bit set to '1'). + + + + + + + + + + + + + + + + + + + + + + + + +Downs & Arbeiter Standards Track [Page 7] + +RFC 6597 RTP Format for SMPTE ST 336 Data April 2012 + + + The example below illustrates how a receiver would handle a lost + packet in another possible packet sequence: + + +---------+-------------+ +--------------+ + | RTP Hdr | Data | | | + +---------+-------------+ +--------------+ + .... | ts = 30 | KLV KLV ... | | | >---+ + | M = 1 | | | | | + | seq = 5 | ... KLV KLV | | | | + +---------+-------------+ +--------------+ | + Last RTP pkt for time 30 Lost RTP Pkt | + (seq = 6) | + | + +--------------------------------------------------------+ + | + | +---------+-------------+ +---------+-------------+ + | | RTP Hdr | Data | | RTP Hdr | Data | + | +---------+-------------+ +---------+-------------+ + +--> | ts = 45 | KLV KLV ... | | ts = 45 | ... KLV ... | >---+ + | M = 0 | | | M = 1 | | | + | seq = 7 | ... KLV ... | | seq = 8 | ... KLV KLV | | + +---------+-------------+ +---------+-------------+ | + RTP pkt for time 45 Last RTP pkt for time 45 | + KLVunit carried in these two packets is "damaged" | + | + +----------------------------------------------------------------+ + | + | +---------+-------------+ + | | RTP Hdr | Data | + | +---------+-------------+ + +--> | ts = 55 | KLV KLV ... | .... + | M = 1 | | + | seq = 9 | ... KLV ... | + +---------+-------------+ + Last and only RTP pkt + for time 55 + + In this example, the packets with sequence numbers 7 and 8 contain + portions of a KLVunit with a timestamp of 45. This KLVunit is + considered "damaged" due to the missing RTP packet with sequence + number 6, which might have been part of this KLVunit. The KLVunit + for timestamp 30 (ended in packet with sequence number 5) is + unaffected by the missing packet. The KLVunit for timestamp 55, + carried in the packet with sequence number 9, is also unaffected by + the missing packet and is considered complete and intact. + + + + + + +Downs & Arbeiter Standards Track [Page 8] + +RFC 6597 RTP Format for SMPTE ST 336 Data April 2012 + + +4.3.1.2. Treatment of Damaged KLVunits + + SMPTE ST 336 KLV data streams are built in such a way that it is + possible to partially recover from errors or missing data in a + stream. Exact specifics of how damaged KLVunits are handled are left + to each implementation, as different implementations can have + differing capabilities and robustness in their downstream KLV payload + processing. Because some implementations can be particularly limited + in their capacity to handle damaged KLVunits, receivers MAY drop + damaged KLVunits entirely. + +5. Congestion Control + + The general congestion control considerations for transporting RTP + data apply; see RTP [RFC3550] and any applicable RTP profile, like + AVP [RFC3551]. + + Further, SMPTE ST 336 data can be encoded in different schemes that + reduce the overhead associated with individual data items within the + overall stream. SMPTE ST 336 grouping constructs, such as local sets + and data packs, provide a mechanism to reduce bandwidth requirements. + +6. Payload Format Parameters + + This RTP payload format is identified using the application/smpte336m + media type, which is registered in accordance with [RFC4855], and + using the template of [RFC4288]. + +6.1. Media Type Definition + + Type name: application + + Subtype name: smpte336m + + Required parameters: + + rate: RTP timestamp clock rate. Typically chosen based on + sampling rate of metadata being transmitted, but other rates + can be specified. + + Optional parameters: None + + Encoding considerations: This media type is framed and binary; see + Section 4.8 of [RFC4288]. + + Security considerations: See Section 8 of RFC 6597. + + + + + +Downs & Arbeiter Standards Track [Page 9] + +RFC 6597 RTP Format for SMPTE ST 336 Data April 2012 + + + Interoperability considerations: Data items in smpte336m can be very + diverse. Receivers might only be capable of interpreting a subset + of the possible data items; unrecognized items are skipped. + Agreement on data items to be used out of band, via application + profile or similar, is typical. + + Published specification: RFC 6597 + + Applications that use this media type: Streaming of metadata + associated with simultaneously streamed video and transmission of + [SMPTE-ST336]-based media formats (e.g., Material Exchange Format + (MXF) [SMPTE-ST377]). + + Additional Information: none + + Person & email address to contact for further information: J. Downs + <jeff_downs@partech.com>; IETF Payload Working Group + <payload@ietf.org> + + Intended usage: COMMON + + Restrictions on usage: This media type depends on RTP framing, and + hence is only defined for transfer via RTP ([RFC3550]). Transport + within other framing protocols is not defined at this time. + + Author: + + J. Downs <jeff_downs@partech.com> + + J. Arbeiter <jimsgti@gmail.com> + + Change controller: IETF Payload working group delegated from the + IESG. + +6.2. Mapping to SDP + + The mapping of the above defined payload format media type and its + parameters SHALL be done according to Section 3 of [RFC4855]. + +6.2.1. Offer/Answer Model and Declarative Considerations + + This payload format has no configuration or optional format + parameters. Thus, when offering SMPTE ST 336 Encoded Data over RTP + using the Session Description Protocol (SDP) in an Offer/Answer model + [RFC3264] or in a declarative manner (e.g., SDP in the Real-Time + Streaming Protocol (RTSP) [RFC2326] or the Session Announcement + Protocol (SAP) [RFC2974]), there are no specific considerations. + + + + +Downs & Arbeiter Standards Track [Page 10] + +RFC 6597 RTP Format for SMPTE ST 336 Data April 2012 + + +7. IANA Considerations + + IANA has registered application/smpte336m as specified in + Section 6.1. The media type has been added to the IANA registry for + "RTP Payload Format media types" + (http://www.iana.org/assignments/rtp-parameters). + +8. Security Considerations + + RTP packets using the payload format defined in this specification + are subject to the security considerations discussed in the RTP + specification [RFC3550], and in any applicable RTP profile. The main + security considerations for the RTP packet carrying the RTP payload + format defined within this memo are confidentiality, integrity, and + source authenticity. Confidentiality is achieved by encryption of + the RTP payload. Integrity of the RTP packets is achieved through a + suitable cryptographic integrity protection mechanism. Cryptographic + systems may also allow the authentication of the source of the + payload. A suitable security mechanism for this RTP payload format + should provide confidentiality, integrity protection, and at least + source authentication capable of determining whether or not an RTP + packet is from a member of the RTP session. + + Note that the appropriate mechanism to provide security to RTP and + payloads following this memo may vary. It is dependent on the + application, the transport, and the signaling protocol employed. + Therefore, a single mechanism is not sufficient, although if suitable + the usage of the Secure Real-time Transport Protocol (SRTP) [RFC3711] + is recommended. Other mechanisms that may be used are IPsec + [RFC4301] and Transport Layer Security (TLS) [RFC5246] (RTP over + TCP), but other alternatives may exist as well. + + This RTP payload format presents the possibility for significant + non-uniformity in the receiver-side computational complexity during + processing of SMPTE ST 336 payload data. Because the length of SMPTE + ST 336 encoded data items is essentially unbounded, receivers must + take care when allocating resources used in processing. It is easy + to construct pathological data that would cause a naive decoder to + allocate large amounts of resources, resulting in denial-of-service + threats. Receivers SHOULD place limits on resource allocation that + are within the bounds set forth by any application profile in use. + + This RTP payload format does not contain any inherently active + content. However, individual SMPTE ST 336 KLV items could be defined + to convey active content in a particular application. Therefore, + receivers capable of decoding and interpreting such data items should + use appropriate caution and security practices. In particular, + accepting active content from streams that lack authenticity or + + + +Downs & Arbeiter Standards Track [Page 11] + +RFC 6597 RTP Format for SMPTE ST 336 Data April 2012 + + + integrity protection mechanisms places a receiver at risk of attacks + using spoofed packets. Receivers not capable of decoding such data + items are not at risk; unknown data items are skipped over and + discarded according to SMPTE ST 336 processing rules. + +9. References + +9.1. Normative References + + [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate + Requirement Levels", BCP 14, RFC 2119, March 1997. + + [RFC3550] Schulzrinne, H., Casner, S., Frederick, R., and V. + Jacobson, "RTP: A Transport Protocol for Real-Time + Applications", STD 64, RFC 3550, July 2003. + + [RFC3551] Schulzrinne, H. and S. Casner, "RTP Profile for Audio + and Video Conferences with Minimal Control", STD 65, + RFC 3551, July 2003. + + [RFC4288] Freed, N. and J. Klensin, "Media Type Specifications + and Registration Procedures", BCP 13, RFC 4288, + December 2005. + + [RFC4855] Casner, S., "Media Type Registration of RTP Payload + Formats", RFC 4855, February 2007. + +9.2. Informative References + + [RFC2326] Schulzrinne, H., Rao, A., and R. Lanphier, "Real Time + Streaming Protocol (RTSP)", RFC 2326, April 1998. + + [RFC2974] Handley, M., Perkins, C., and E. Whelan, "Session + Announcement Protocol", RFC 2974, October 2000. + + [RFC3264] Rosenberg, J. and H. Schulzrinne, "An Offer/Answer + Model with Session Description Protocol (SDP)", + RFC 3264, June 2002. + + [RFC3711] Baugher, M., McGrew, D., Naslund, M., Carrara, E., and + K. Norrman, "The Secure Real-time Transport Protocol + (SRTP)", RFC 3711, March 2004. + + [RFC4301] Kent, S. and K. Seo, "Security Architecture for the + Internet Protocol", RFC 4301, December 2005. + + + + + + +Downs & Arbeiter Standards Track [Page 12] + +RFC 6597 RTP Format for SMPTE ST 336 Data April 2012 + + + [RFC5246] Dierks, T. and E. Rescorla, "The Transport Layer + Security (TLS) Protocol Version 1.2", RFC 5246, + August 2008. + + [SMPTE-RP210] Society of Motion Picture and Television Engineers, + "SMPTE RP 210v12:2010 Data Element Dictionary", 2010, + <http://www.smpte-ra.org/mdd/>. + + [SMPTE-ST298] Society of Motion Picture and Television Engineers, + "SMPTE ST 298:2009 Universal Labels for Unique + Identification of Digital Data", 2009, + <http://www.smpte.org>. + + [SMPTE-ST335] Society of Motion Picture and Television Engineers, + "SMPTE ST 335:2012 Metadata Element Dictionary + Structure", 2012, <http://www.smpte.org>. + + [SMPTE-ST336] Society of Motion Picture and Television Engineers, + "SMPTE ST 336:2007 Data Encoding Protocol Using Key- + Length-Value", 2007, <http://www.smpte.org>. + + [SMPTE-ST377] Society of Motion Picture and Television Engineers, + "SMPTE ST 377-1:2011 Material Exchange Format (MXF) - + File Format Specification", 2011, + <http://www.smpte.org>. + +Authors' Addresses + + J. Downs (editor) + PAR Government Systems Corp. + US + + EMail: jeff_downs@partech.com + + + J. Arbeiter (editor) + US + + EMail: jimsgti@gmail.com + + + + + + + + + + + + +Downs & Arbeiter Standards Track [Page 13] + |