summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc1257.txt
diff options
context:
space:
mode:
Diffstat (limited to 'doc/rfc/rfc1257.txt')
-rw-r--r--doc/rfc/rfc1257.txt283
1 files changed, 283 insertions, 0 deletions
diff --git a/doc/rfc/rfc1257.txt b/doc/rfc/rfc1257.txt
new file mode 100644
index 0000000..6101050
--- /dev/null
+++ b/doc/rfc/rfc1257.txt
@@ -0,0 +1,283 @@
+
+
+
+
+
+
+Network Working Group C. Partridge
+Request for Comments: 1257 Swedish Institute of Computer Science
+ September 1991
+
+
+ Isochronous Applications Do Not Require Jitter-Controlled Networks
+
+Status of this Memo
+
+ This memo provides information for the Internet community. It does
+ not specify an Internet standard. Distribution of this memo is
+ unlimited.
+
+Abstract
+
+ This memo argues that jitter control is not required for networks to
+ support isochronous applications. A network providing bandwidth and
+ bounds delay is sufficient. The implications for gigabit
+ internetworking protocols are briefly considered.
+
+Introduction
+
+ An oft-stated goal of many of the ongoing gigabit networking research
+ projects is to make it possible to support high bandwidth isochronous
+ applications. An isochronous application is an application which
+ must generate or process regular amounts of data at fixed intervals.
+ Examples of such applications include telephones, which send and
+ receive voice samples at regular intervals, and fixed rate video-
+ codecs, which generate data at regular intervals and which must
+ receive data at regular intervals.
+
+ One of the properties of isochronous applications like voice and
+ video data streams is that their users may be sensitive to the
+ variation in interarrival times between data delivered to the final
+ output device. This interarrival time is called "jitter" for very
+ small variances (less than 10 Hz) and "wander" if it is somewhat
+ larger (less than one day). For convenience, this memo will use the
+ term jitter for both jitter and wander.
+
+ A couple of examples help illustrate the sensitivity of applications
+ to jitter. Consider a user watching a video at her workstation. If
+ the screen is not updated regularly every 30th of a second or faster,
+ the user will notice a flickering in the image. Similarly, if voice
+ samples are not delivered at regular intervals, voice output may
+ sound distorted. Thus the user is sensitive to the interarrival time
+ of data at the output device.
+
+ Observe that if two users are conferring with each other from their
+
+
+
+Partridge [Page 1]
+
+RFC 1257 Isochronous and Jitter September 1991
+
+
+ workstations, then beyond sensitivity to interarrival times, the
+ users will also be sensitive to end-to-end delay. Consider the
+ difference between conferencing over a satellite link and a
+ terrestrial link. Furthermore, for the data to be able to arrive in
+ time, there must be sufficient bandwidth. Bandwidth requirements are
+ particularly important for video: HDTV, even after compression,
+ currently requires bandwidth in excess of 100 Mbits/second.
+
+ Because multimedia applications are sensitive to jitter, bandwidth
+ and delay, it has been suggested that the networks that carry
+ multimedia traffic must be able to allocate and control jitter,
+ bandwidth and delay [1,2].
+
+ This memo argues that a network which simply controls bandwidth and
+ delay is sufficient to support networked multimedia applications.
+ Jitter control is not required.
+
+Isochrony without Jitter Control
+
+ The key argument of this memo is that an isochronous service can be
+ provided by simply bounding the maximum delay through the network.
+
+ To prove this argument, consider the following scenario.
+
+ The network is able to bound the maximum transit delay on a channel
+ between sender and receiver and at least the receiver knows what the
+ bound is. (These assumptions come directly from our assertion that
+ the network can bound delay). The term "channel" is used to mean
+ some amount of bandwidth delivered over some path between sender and
+ receiver.
+
+ Now imagine an operating system in which applications can be
+ scheduled to be active at regular intervals. Further assume that the
+ receiving application has buffer space equal to the channel bandwidth
+ times the maximum interarrival variance. (Observe that the maximum
+ interarrival variance is always known - in the worst case, the
+ receiver can assume the maximum variance equals the maximum delay).
+
+ Now consider a situation in which the sender of the isochronous data
+ timestamps each piece of data when it is generated, using a universal
+ time source, and then sends the data to the receiver. The receiver
+ reads a piece data in as soon as it is received and and places the
+ timestamped data into its buffer space. The receiver processes each
+ piece of data only at the time equal to the data's timestamp plus the
+ maximum transit delay.
+
+ I argue that the receiver is processing data isochronously and thus
+ we have shown that a network need not be isochronous to support
+
+
+
+Partridge [Page 2]
+
+RFC 1257 Isochronous and Jitter September 1991
+
+
+ isochronous applications.
+
+ A few issues have to be resolved to really make this proof stick.
+
+ The first issue is whether the operating system can be expected to
+ schedule applications to be active at regular intervals. I will
+ argue that whether or not the network is isochronous, the operating
+ system must be able to schedule applications at regular intervals
+
+ Consider an isochronous network which delivers data with a tight
+ bound on jitter. If the application on the receiving system does not
+ wake up when new data arrives, but waits until its next turn in the
+ processor, then the isochrony of the network service would be lost
+ due to the vagaries of operating system scheduling. Thus, we may
+ reasonably expect that the operating system provides some mechanism
+ for waking up the application in response to a network interrupt for
+ a particular packet. But if the operating system can wake up an
+ application in response to an interrupt, it can just as easily wake
+ the application in response to a clock interrupt at a particular
+ time. Waking up to a clock interrupt provides the regular scheduling
+ service we wanted.
+
+ Observe that the last paragraph suggests an application of the End-
+ To-End Principle [3]. Given that the operating system must provide a
+ mechanism sufficient for restoring isochrony, regardless of whether
+ the network is isochronous, it seems unreasonable to require the
+ network to redundantly provide the same service.
+
+ Another issue is the question of whether all receiving systems will
+ have memory for buffering. For example, the telephone network is
+ required to deliver its data isochronously because many telephones do
+ not have memory. However, most receiving devices do have memory, and
+ those devices, like telephones, that do not currently have memory
+ seem likely to have memory in the future. Many telephones have a
+ modest amount of memory now. Furthermore, even if the end nodes
+ require isochronous traffic it is possible that last switch before
+ delivery to the end node could provide the necessary buffer space to
+ restore isochrony to the data flow.
+
+ Readers may wonder if the assumption of a universal time source is
+ reasonable. The Network Time Protocol (NTP) has been widely tested
+ on the Internet and is capable of distributing time accurately to the
+ millisecond [4]. Its designer is currently contemplating the
+ possibility of distributing time accurate to the microsecond.
+
+Some Implications
+
+ The most important observation that can be made is that jitter
+
+
+
+Partridge [Page 3]
+
+RFC 1257 Isochronous and Jitter September 1991
+
+
+ control is not required for networks to be able to support
+ isochronous applications. A corollary observation is that if we are
+ to design an internetworking protocol for isochronous applications,
+ that internetworking protocol should probably only offer control over
+ delay and bandwidth. (There may exist networks that simply manage
+ delay and bandwidth. We know that's sufficient for multimedia
+ networking so our multimedia internetworking protocol should be
+ capable of running over those networks. But if the multimedia
+ internetworking protocol requires control over jitter too, then
+ jitter control must be implemented on those subnetworks that don't
+ have it. Implementing jitter control is clearly feasible - the
+ method for restoring jitter in the last section could be used on a
+ single network. But if we know jitter control isn't needed, why
+ require networks to implement it?)
+
+ Note that the argument simply says that jitter control is not
+ required to support isochronous applications. It may be the case
+ that jitter control is useful for other reasons. For example, work
+ at Berkeley suggests that jitter control makes it possible to reduce
+ the amount of buffering required in intermediate network nodes [Y].
+ Thus, even if applications express their requirements only in terms
+ of bandwidth and delay, a network may find it useful to try to limit
+ jitter and thereby reduce the amount of memory required in each node.
+
+Acknowledgements
+
+ Thanks to the members of the End-To-End Interest mailing list who
+ provided a number of invaluable comments on this memo.
+
+References
+
+ [1] Leiner, B., Editor, "Critical Issues in High Bandwidth
+ Networking", Report to DARPA, August 1988.
+
+ [2] Ferrari, D., "Client Requirements for Real-Time Communication
+ Services", IEEE Communications Magazine, November 1990. See also
+ RFC 1193, November, 1990.
+
+ [3] Saltzer, J., Reed D., and D. Clark, "End-To-End Arguments in
+ System Design", ACM Transactions on Computer Systems, Vol. 2, No.
+ 4, November 1984.
+
+ [4] Mills, D., "Measured Performance of the Network Time Protocol in
+ the Internet System", RFC 1128, UDEL, October 1989.
+
+ [5] Verma, D., Zhang H., and D. Ferrari. "Guaranteeing Delay Jitter
+ Bounds in Packet Switching Networks", Proceedings of TriComm '91,
+ Chapel Hill, North Carolina, April 1991.
+
+
+
+Partridge [Page 4]
+
+RFC 1257 Isochronous and Jitter September 1991
+
+
+Security Considertaions
+
+ Security issues are not discussed in this memo.
+
+Author's Address
+
+ Craig Partridge
+ Swedish Institute of Computer Science
+ Box 1263
+ 164 28 Kista
+ SWEDEN
+
+ Phone: +46 8 752 1524
+
+ EMail: craig@SICS.SE
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Partridge [Page 5]
+ \ No newline at end of file