SlideShare uma empresa Scribd logo
1 de 15
Baixar para ler offline
WIGOWIN 2010
Collision avoidance using a wandering
token in the PTP protocol
_____________________________
Augusto Ciuffoletti
PTP?
● PTP stands for Precision Time Protocol
● The nickname for IEEE1588-2008
● It addresses clock synchronization in packet
networks
● Substantially improves the Network Time Protocol
(IETF NTP)
● Addresses converging users (telecom, industrial
plant control)
Clock Synchronization - Why?
● Control of industrial plants requires sub
microsecond coordination.
● Telecom networks need precise synchronization to
manage media playback applications.
● Network monitoring applications need
synchronization preciser than packet delay.
● TDM (Time Division Multiplexing) over IP is a
solution for many problems, but needs synchronized
clocks.
Synchronization over Packet - Why?
● Link level synchronization solutions exist (SONET,
SyncE …)
● Packet based solutions have many advantages:
– Scalability
– Adaptability
– Maintainability
– Interoperability
● Packet based solutions have one (big) problem:
– Sensitive to packet delay variations
The PTP solution
● Messages can travel across layers (UDP/IP, Eth,
DeviceNet)
● One master, many slaves
● The master periodically sends a syntonization
message (Sync)
● Each slave responds after a delay with a Delay_Req
message
● The master replies with a Delay_Resp
PTP - Syntonization
● Sync-Sync protocol:
– Invariant: (t1
-t0
) = (t3
-t2
)
– The slave tunes clock frequency
● Assumption: M-S packet delay is constant (!)
Master
Slave
Sync(t0
) Sync Sync Sync Sync
t0
t1
t2
t3
PTP - Synchronization
● Delay_Req – Delay_Resp protocol
– Invariant: PacketDelay =[(t1
-t0
) – (t3
-t2
)]/2
– The slave compensates time of the day offset
● Assumption: M-S packet delay is symmetric (!)
Master
Slave
Sync(t0
)
Delay_Req(t3
)
Delay_Resp(t1
)
t0
t1
t2
t3
Delay_Req – Delay_Resp
● Delay_Req timing is critical (Delay_Resp is not)
● Delay_Req/Delay_Resp traffic grows with system
size (Sync traffic does not)
● The PTP protocol arranges Delay_Req to be
distributed uniformly on time, but uncoordinated
● Clock synchronization is allocated a small, protected
(virtual) channel
● Packet collisions may occur that disrupt protocol
consistency
Coordinate Delay_Req to avoid
collisions
● PRO:
– Protocol overall more reliable (no collisions)
– Improved network utilization
● Beware of:
– Extra complexity, extra problems (KISS)
– Fault tolerance
– Footprint (traffic, processing)
– Standard boundaries
One token to rule them all
● Token circulation to control the production of a
Delay_Req
● Randomized token circulation from slave to slave to
avoid complex and slow ring maintenance
● Each slave maintains a limited number of neighbors
to choose from
● But:
– How to limit the token return time?
– How to effectively maintain a neighborhood?
– Do we need additional messages to carry the token?
Limit return time
● Introduce some global knowledge in the master
(already a single point of failure) to avoid starvation
● Accumulate global knowledge passively observing
the system (no footprint)
● Activate only when needed (minimize impact of
inconsistencies of global knowledge)
Token passing operation
● Token “bounces”
on the master
● Master learns
slaves timeouts
passively
● Token de-routed
to starving slave
● Master usually
transparent
Source
Selected
destinationStarving
slave
A dynamic neighborhood
● Neighborhood
initially just legal
● Token source
observes token
routing
● Selected destination
swapped with real
destination
Token de-routed
to D
A – B – C
Selected address
is B
A – D – C
Random
neighborhood
of token source
After
token passing
Token passing operation
● The token travels
embedded within
PTP messages
● Delay_Req carries
selected dest
● Delay_Resp
carries final dest
● All slaves observe
Delay_Resp msgs
Source
Final
destination
Delay_req
(unicast)
Delay_resp
(multicast)
Token path PTP messages
Future work
● Implementation using the UDP open source PTP
(sourceforge) (thesis)
● Application to wireless ad-hoc networks
(simulation, experiments with low cost devices)
● Use of the PTP in virtual networking environments
(IEEE803.1Q)
● ...and more...
These slides available at “http://www.slideshare.net/AugustoCiuffoletti”

Mais conteúdo relacionado

Semelhante a Collision avoidance using a wandering token in the PTP protocol

IJSRED-V1I1P2
IJSRED-V1I1P2IJSRED-V1I1P2
IJSRED-V1I1P2IJSRED
 
Simulation-Based Fault Injection as a Verification Oracle for the Engineering...
Simulation-Based Fault Injection as a Verification Oracle for the Engineering...Simulation-Based Fault Injection as a Verification Oracle for the Engineering...
Simulation-Based Fault Injection as a Verification Oracle for the Engineering...RealTime-at-Work (RTaW)
 
Lagopus presentation on 14th Annual ON*VECTOR International Photonics Workshop
Lagopus presentation on 14th Annual ON*VECTOR International Photonics WorkshopLagopus presentation on 14th Annual ON*VECTOR International Photonics Workshop
Lagopus presentation on 14th Annual ON*VECTOR International Photonics WorkshopLagopus SDN/OpenFlow switch
 
Current state of IEEE 802.1 Time-Sensitive Networking Task Group Norman Finn,...
Current state of IEEE 802.1 Time-Sensitive Networking Task Group Norman Finn,...Current state of IEEE 802.1 Time-Sensitive Networking Task Group Norman Finn,...
Current state of IEEE 802.1 Time-Sensitive Networking Task Group Norman Finn,...Jörgen Gade
 
DPDK Summit - 08 Sept 2014 - NTT - High Performance vSwitch
DPDK Summit - 08 Sept 2014 - NTT - High Performance vSwitchDPDK Summit - 08 Sept 2014 - NTT - High Performance vSwitch
DPDK Summit - 08 Sept 2014 - NTT - High Performance vSwitchJim St. Leger
 
Four Ways to Improve Linux Performance IEEE Webinar, R2.0
Four Ways to Improve Linux Performance IEEE Webinar, R2.0Four Ways to Improve Linux Performance IEEE Webinar, R2.0
Four Ways to Improve Linux Performance IEEE Webinar, R2.0Michael Christofferson
 
Protecting Data In Motion with MACsec - Gijs Willemse - Rambus Design Summit ...
Protecting Data In Motion with MACsec - Gijs Willemse - Rambus Design Summit ...Protecting Data In Motion with MACsec - Gijs Willemse - Rambus Design Summit ...
Protecting Data In Motion with MACsec - Gijs Willemse - Rambus Design Summit ...Rambus
 
Precision Time Synchronization
Precision Time SynchronizationPrecision Time Synchronization
Precision Time SynchronizationKrishna Sankar
 
High perf-networking
High perf-networkingHigh perf-networking
High perf-networkingmtimjones
 
TRACK B: Multicores & Network On Chip Architectures/ Oren Hollander
TRACK B: Multicores & Network On Chip Architectures/ Oren HollanderTRACK B: Multicores & Network On Chip Architectures/ Oren Hollander
TRACK B: Multicores & Network On Chip Architectures/ Oren Hollanderchiportal
 
Network-Connected Development with ZeroMQ
Network-Connected Development with ZeroMQNetwork-Connected Development with ZeroMQ
Network-Connected Development with ZeroMQICS
 
PFQ@ 9th Italian Networking Workshop (Courmayeur)
PFQ@ 9th Italian Networking Workshop (Courmayeur)PFQ@ 9th Italian Networking Workshop (Courmayeur)
PFQ@ 9th Italian Networking Workshop (Courmayeur)Nicola Bonelli
 
Designing an 4K/UHD1 HDR OB Truck as 12G-SDI or IP-based
Designing an 4K/UHD1 HDR OB Truck as 12G-SDI or IP-basedDesigning an 4K/UHD1 HDR OB Truck as 12G-SDI or IP-based
Designing an 4K/UHD1 HDR OB Truck as 12G-SDI or IP-basedDr. Mohieddin Moradi
 
Multithreading computer architecture
 Multithreading computer architecture  Multithreading computer architecture
Multithreading computer architecture Haris456
 

Semelhante a Collision avoidance using a wandering token in the PTP protocol (20)

SDI to IP 2110 Transition Part 2
SDI to IP 2110 Transition Part 2SDI to IP 2110 Transition Part 2
SDI to IP 2110 Transition Part 2
 
IJSRED-V1I1P2
IJSRED-V1I1P2IJSRED-V1I1P2
IJSRED-V1I1P2
 
Simulation-Based Fault Injection as a Verification Oracle for the Engineering...
Simulation-Based Fault Injection as a Verification Oracle for the Engineering...Simulation-Based Fault Injection as a Verification Oracle for the Engineering...
Simulation-Based Fault Injection as a Verification Oracle for the Engineering...
 
Lagopus presentation on 14th Annual ON*VECTOR International Photonics Workshop
Lagopus presentation on 14th Annual ON*VECTOR International Photonics WorkshopLagopus presentation on 14th Annual ON*VECTOR International Photonics Workshop
Lagopus presentation on 14th Annual ON*VECTOR International Photonics Workshop
 
Current state of IEEE 802.1 Time-Sensitive Networking Task Group Norman Finn,...
Current state of IEEE 802.1 Time-Sensitive Networking Task Group Norman Finn,...Current state of IEEE 802.1 Time-Sensitive Networking Task Group Norman Finn,...
Current state of IEEE 802.1 Time-Sensitive Networking Task Group Norman Finn,...
 
Micro-controllers (PIC) based Application Development
Micro-controllers (PIC) based Application DevelopmentMicro-controllers (PIC) based Application Development
Micro-controllers (PIC) based Application Development
 
Intro to Embedded OS, RTOS and Communication Protocols
Intro to Embedded OS, RTOS and Communication ProtocolsIntro to Embedded OS, RTOS and Communication Protocols
Intro to Embedded OS, RTOS and Communication Protocols
 
Traffic analyzer Ip multicast
Traffic analyzer Ip multicastTraffic analyzer Ip multicast
Traffic analyzer Ip multicast
 
Cat @ scale
Cat @ scaleCat @ scale
Cat @ scale
 
DPDK Summit - 08 Sept 2014 - NTT - High Performance vSwitch
DPDK Summit - 08 Sept 2014 - NTT - High Performance vSwitchDPDK Summit - 08 Sept 2014 - NTT - High Performance vSwitch
DPDK Summit - 08 Sept 2014 - NTT - High Performance vSwitch
 
Four Ways to Improve Linux Performance IEEE Webinar, R2.0
Four Ways to Improve Linux Performance IEEE Webinar, R2.0Four Ways to Improve Linux Performance IEEE Webinar, R2.0
Four Ways to Improve Linux Performance IEEE Webinar, R2.0
 
Protecting Data In Motion with MACsec - Gijs Willemse - Rambus Design Summit ...
Protecting Data In Motion with MACsec - Gijs Willemse - Rambus Design Summit ...Protecting Data In Motion with MACsec - Gijs Willemse - Rambus Design Summit ...
Protecting Data In Motion with MACsec - Gijs Willemse - Rambus Design Summit ...
 
synchonization PTP
synchonization PTP synchonization PTP
synchonization PTP
 
Precision Time Synchronization
Precision Time SynchronizationPrecision Time Synchronization
Precision Time Synchronization
 
High perf-networking
High perf-networkingHigh perf-networking
High perf-networking
 
TRACK B: Multicores & Network On Chip Architectures/ Oren Hollander
TRACK B: Multicores & Network On Chip Architectures/ Oren HollanderTRACK B: Multicores & Network On Chip Architectures/ Oren Hollander
TRACK B: Multicores & Network On Chip Architectures/ Oren Hollander
 
Network-Connected Development with ZeroMQ
Network-Connected Development with ZeroMQNetwork-Connected Development with ZeroMQ
Network-Connected Development with ZeroMQ
 
PFQ@ 9th Italian Networking Workshop (Courmayeur)
PFQ@ 9th Italian Networking Workshop (Courmayeur)PFQ@ 9th Italian Networking Workshop (Courmayeur)
PFQ@ 9th Italian Networking Workshop (Courmayeur)
 
Designing an 4K/UHD1 HDR OB Truck as 12G-SDI or IP-based
Designing an 4K/UHD1 HDR OB Truck as 12G-SDI or IP-basedDesigning an 4K/UHD1 HDR OB Truck as 12G-SDI or IP-based
Designing an 4K/UHD1 HDR OB Truck as 12G-SDI or IP-based
 
Multithreading computer architecture
 Multithreading computer architecture  Multithreading computer architecture
Multithreading computer architecture
 

Mais de Augusto Ciuffoletti

An open-source testbed for IoT systems
An open-source testbed for IoT systemsAn open-source testbed for IoT systems
An open-source testbed for IoT systemsAugusto Ciuffoletti
 
Design and implementation of a low-cost modular sensor
Design and implementation of a low-cost modular sensorDesign and implementation of a low-cost modular sensor
Design and implementation of a low-cost modular sensorAugusto Ciuffoletti
 
Automated deployment of a microservice based monitoring architecture
Automated deployment of a microservice based monitoring architectureAutomated deployment of a microservice based monitoring architecture
Automated deployment of a microservice based monitoring architectureAugusto Ciuffoletti
 
OCCI Monitoring at OGF42 - Concepts and demo
OCCI Monitoring at OGF42 - Concepts and demoOCCI Monitoring at OGF42 - Concepts and demo
OCCI Monitoring at OGF42 - Concepts and demoAugusto Ciuffoletti
 
Extending the OCCI API with monitoring capabilities
Extending the OCCI API with monitoring capabilitiesExtending the OCCI API with monitoring capabilities
Extending the OCCI API with monitoring capabilitiesAugusto Ciuffoletti
 
Monitoring a virtual network infrastructure - An IaaS perspective
Monitoring a virtual network infrastructure - An IaaS perspectiveMonitoring a virtual network infrastructure - An IaaS perspective
Monitoring a virtual network infrastructure - An IaaS perspectiveAugusto Ciuffoletti
 
TIP: a course about IP convergence technology
TIP: a course about IP convergence technologyTIP: a course about IP convergence technology
TIP: a course about IP convergence technologyAugusto Ciuffoletti
 
Design of a secure "Token Passing" protocol
Design of a secure "Token Passing" protocolDesign of a secure "Token Passing" protocol
Design of a secure "Token Passing" protocolAugusto Ciuffoletti
 
Network Monitoring in the age of the Cloud
Network Monitoring in the age of the CloudNetwork Monitoring in the age of the Cloud
Network Monitoring in the age of the CloudAugusto Ciuffoletti
 
Grid Infrastructure Architecture A Modular Approach from CoreGRID
Grid Infrastructure Architecture A Modular Approach from CoreGRIDGrid Infrastructure Architecture A Modular Approach from CoreGRID
Grid Infrastructure Architecture A Modular Approach from CoreGRIDAugusto Ciuffoletti
 
Scalable concurrency control in a dynamic membership
Scalable concurrency control  in a dynamic membershipScalable concurrency control  in a dynamic membership
Scalable concurrency control in a dynamic membershipAugusto Ciuffoletti
 
Prototype Implementation of a Demand Driven Network Monitoring Architecture
Prototype Implementation of a Demand Driven Network Monitoring ArchitecturePrototype Implementation of a Demand Driven Network Monitoring Architecture
Prototype Implementation of a Demand Driven Network Monitoring ArchitectureAugusto Ciuffoletti
 

Mais de Augusto Ciuffoletti (20)

An open-source testbed for IoT systems
An open-source testbed for IoT systemsAn open-source testbed for IoT systems
An open-source testbed for IoT systems
 
0 basic
0 basic0 basic
0 basic
 
Thingspeak: integrazione
Thingspeak: integrazioneThingspeak: integrazione
Thingspeak: integrazione
 
Thingspeak: fondamenti
Thingspeak: fondamentiThingspeak: fondamenti
Thingspeak: fondamenti
 
Design and implementation of a low-cost modular sensor
Design and implementation of a low-cost modular sensorDesign and implementation of a low-cost modular sensor
Design and implementation of a low-cost modular sensor
 
ZHAW 2016 - OCCI for monitoring
ZHAW 2016 - OCCI for monitoringZHAW 2016 - OCCI for monitoring
ZHAW 2016 - OCCI for monitoring
 
Open Cloud Computing Interface
Open Cloud Computing InterfaceOpen Cloud Computing Interface
Open Cloud Computing Interface
 
Laboratorio Openstack
Laboratorio OpenstackLaboratorio Openstack
Laboratorio Openstack
 
Automated deployment of a microservice based monitoring architecture
Automated deployment of a microservice based monitoring architectureAutomated deployment of a microservice based monitoring architecture
Automated deployment of a microservice based monitoring architecture
 
OCCI Monitoring at OGF42 - Concepts and demo
OCCI Monitoring at OGF42 - Concepts and demoOCCI Monitoring at OGF42 - Concepts and demo
OCCI Monitoring at OGF42 - Concepts and demo
 
Extending the OCCI API with monitoring capabilities
Extending the OCCI API with monitoring capabilitiesExtending the OCCI API with monitoring capabilities
Extending the OCCI API with monitoring capabilities
 
2013 03 occi-monitoring
2013 03 occi-monitoring2013 03 occi-monitoring
2013 03 occi-monitoring
 
Monitoring a virtual network infrastructure - An IaaS perspective
Monitoring a virtual network infrastructure - An IaaS perspectiveMonitoring a virtual network infrastructure - An IaaS perspective
Monitoring a virtual network infrastructure - An IaaS perspective
 
TIP: a course about IP convergence technology
TIP: a course about IP convergence technologyTIP: a course about IP convergence technology
TIP: a course about IP convergence technology
 
Design of a secure "Token Passing" protocol
Design of a secure "Token Passing" protocolDesign of a secure "Token Passing" protocol
Design of a secure "Token Passing" protocol
 
The wandering token
The wandering tokenThe wandering token
The wandering token
 
Network Monitoring in the age of the Cloud
Network Monitoring in the age of the CloudNetwork Monitoring in the age of the Cloud
Network Monitoring in the age of the Cloud
 
Grid Infrastructure Architecture A Modular Approach from CoreGRID
Grid Infrastructure Architecture A Modular Approach from CoreGRIDGrid Infrastructure Architecture A Modular Approach from CoreGRID
Grid Infrastructure Architecture A Modular Approach from CoreGRID
 
Scalable concurrency control in a dynamic membership
Scalable concurrency control  in a dynamic membershipScalable concurrency control  in a dynamic membership
Scalable concurrency control in a dynamic membership
 
Prototype Implementation of a Demand Driven Network Monitoring Architecture
Prototype Implementation of a Demand Driven Network Monitoring ArchitecturePrototype Implementation of a Demand Driven Network Monitoring Architecture
Prototype Implementation of a Demand Driven Network Monitoring Architecture
 

Último

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Último (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

Collision avoidance using a wandering token in the PTP protocol

  • 1. WIGOWIN 2010 Collision avoidance using a wandering token in the PTP protocol _____________________________ Augusto Ciuffoletti
  • 2. PTP? ● PTP stands for Precision Time Protocol ● The nickname for IEEE1588-2008 ● It addresses clock synchronization in packet networks ● Substantially improves the Network Time Protocol (IETF NTP) ● Addresses converging users (telecom, industrial plant control)
  • 3. Clock Synchronization - Why? ● Control of industrial plants requires sub microsecond coordination. ● Telecom networks need precise synchronization to manage media playback applications. ● Network monitoring applications need synchronization preciser than packet delay. ● TDM (Time Division Multiplexing) over IP is a solution for many problems, but needs synchronized clocks.
  • 4. Synchronization over Packet - Why? ● Link level synchronization solutions exist (SONET, SyncE …) ● Packet based solutions have many advantages: – Scalability – Adaptability – Maintainability – Interoperability ● Packet based solutions have one (big) problem: – Sensitive to packet delay variations
  • 5. The PTP solution ● Messages can travel across layers (UDP/IP, Eth, DeviceNet) ● One master, many slaves ● The master periodically sends a syntonization message (Sync) ● Each slave responds after a delay with a Delay_Req message ● The master replies with a Delay_Resp
  • 6. PTP - Syntonization ● Sync-Sync protocol: – Invariant: (t1 -t0 ) = (t3 -t2 ) – The slave tunes clock frequency ● Assumption: M-S packet delay is constant (!) Master Slave Sync(t0 ) Sync Sync Sync Sync t0 t1 t2 t3
  • 7. PTP - Synchronization ● Delay_Req – Delay_Resp protocol – Invariant: PacketDelay =[(t1 -t0 ) – (t3 -t2 )]/2 – The slave compensates time of the day offset ● Assumption: M-S packet delay is symmetric (!) Master Slave Sync(t0 ) Delay_Req(t3 ) Delay_Resp(t1 ) t0 t1 t2 t3
  • 8. Delay_Req – Delay_Resp ● Delay_Req timing is critical (Delay_Resp is not) ● Delay_Req/Delay_Resp traffic grows with system size (Sync traffic does not) ● The PTP protocol arranges Delay_Req to be distributed uniformly on time, but uncoordinated ● Clock synchronization is allocated a small, protected (virtual) channel ● Packet collisions may occur that disrupt protocol consistency
  • 9. Coordinate Delay_Req to avoid collisions ● PRO: – Protocol overall more reliable (no collisions) – Improved network utilization ● Beware of: – Extra complexity, extra problems (KISS) – Fault tolerance – Footprint (traffic, processing) – Standard boundaries
  • 10. One token to rule them all ● Token circulation to control the production of a Delay_Req ● Randomized token circulation from slave to slave to avoid complex and slow ring maintenance ● Each slave maintains a limited number of neighbors to choose from ● But: – How to limit the token return time? – How to effectively maintain a neighborhood? – Do we need additional messages to carry the token?
  • 11. Limit return time ● Introduce some global knowledge in the master (already a single point of failure) to avoid starvation ● Accumulate global knowledge passively observing the system (no footprint) ● Activate only when needed (minimize impact of inconsistencies of global knowledge)
  • 12. Token passing operation ● Token “bounces” on the master ● Master learns slaves timeouts passively ● Token de-routed to starving slave ● Master usually transparent Source Selected destinationStarving slave
  • 13. A dynamic neighborhood ● Neighborhood initially just legal ● Token source observes token routing ● Selected destination swapped with real destination Token de-routed to D A – B – C Selected address is B A – D – C Random neighborhood of token source After token passing
  • 14. Token passing operation ● The token travels embedded within PTP messages ● Delay_Req carries selected dest ● Delay_Resp carries final dest ● All slaves observe Delay_Resp msgs Source Final destination Delay_req (unicast) Delay_resp (multicast) Token path PTP messages
  • 15. Future work ● Implementation using the UDP open source PTP (sourceforge) (thesis) ● Application to wireless ad-hoc networks (simulation, experiments with low cost devices) ● Use of the PTP in virtual networking environments (IEEE803.1Q) ● ...and more... These slides available at “http://www.slideshare.net/AugustoCiuffoletti”