SO headers based on CRC Functionality and comparisons to a Keyword approach Lars-Erik Jonsson (Ericsson) ROHC IETF 48 2000-08-03.

Slides:



Advertisements
Similar presentations
1 Data Link Protocols By Erik Reeber. 2 Goals Use SPIN to model-check successively more complex protocols Using the protocols in Tannenbaums 3 rd Edition.
Advertisements

Introduction to H.264 / AVC Video Coding Standard Multimedia Systems Sharif University of Technology November 2008.
Computer Interfacing and Protocols
IP Header compression in UMTS network Thesis Work Presentation Author: Jukka Raunio Supervisor: Prof. Raimo Kantola Instructor: M. Sc. Antti.
Chapter 11 Data Link Control
Data and Computer Communications Updated: 2/9/2009.
Flow and Error Control. Flow Control Flow control coordinates the amount of data that can be sent before receiving acknowledgement It is one of the most.
Zero byte ROHC RTP1Lars-Erik Jonsson, Zero-byte ROHC RTP Background, requirements, current status and proposed way forward Lars-Erik Jonsson.
CSCI 4550/8556 Computer Networks Comer, Chapter 7: Packets, Frames, And Error Detection.
Requirements for ROHC TCP1Lars-Erik Jonsson, Requirements for ROHC TCP Lars-Erik Jonsson Ericsson Research, Luleå Sweden
CSCI 4550/8556 Computer Networks Comer, Chapter 20: IP Datagrams and Datagram Forwarding.
Header Compression Schemes. Center for TeleInFrastructure 2 Different Header Compression schemes  Compressed TCP – Van Jacobsen RFC 1144  only for TCP/IP.
Chapter 6 Errors, Error Detection, and Error Control
Error Checking continued. Network Layers in Action Each layer in the OSI Model will add header information that pertains to that specific protocol. On.
Data link layer: services
M. Menelaou CCNA2 DYNAMIC ROUTING. M. Menelaou DYNAMIC ROUTING Dynamic routing protocols can help simplify the life of a network administrator Routing.
ARQ Mechanisms Rudra Dutta ECE/CSC Fall 2010, Section 001, 601.
11.1 Chapter 11 Data Link Control Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Data Link Layer - 1 Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF.
Multicast Routing Algorithms n Multicast routing n Flooding and Spanning Tree n Forward Shortest Path algorithm n Reversed Path Forwarding (RPF) algorithms.
Doc.:IEEE /0129r3 May 2012 Santosh Abraham, Qualcomm Inc. Short Beacon Slide 1 Authors:
Robust Header Compression (ROHC)‏ An introduction Jonathan Shufelt
Part 2: Packet Transmission Packets, frames Local area networks (LANs) Wide area networks (LANs) Hardware addresses Bridges and switches Routing and protocols.
جلسه هشتم شبکه های کامپیوتری به نــــــــــــام خدا.
Chapter 5 Peer-to-Peer Protocols and Data Link Layer PART I: Peer-to-Peer Protocols ARQ Protocols and Reliable Data Transfer Flow Control.
Header Compression over Cellular LinksLars-Erik Jonsson, Header Compression for IP-Telephony over Cellular Links Lars-Erik Jonsson (Ericsson.
Maintenance Policies Corrective maintenance: It is usually referred to as repair. Its purpose is to bring the component back to functioning state as soon.
Data Integrity © Prof. Aiman Hanna Department of Computer Science Concordia University Montreal, Canada.
CS3505: DATA LINK LAYER. data link layer  phys. layer subject to errors; not reliable; and only moves information as bits, which alone are not meaningful.
Data Communications & Computer Networks, Second Edition1 Chapter 6 Errors, Error Detection, and Error Control.
Vertical Optimization Of Data Transmission For Mobile Wireless Terminals MICHAEL METHFESSEL, KAI F. DOMBROWSKI, PETER LANGENDORFER, HORST FRANKENFELDT,
ISCSI Extensions for RDMA (iSER) draft-ko-iwarp-iser-02 Mike Ko IBM August 2, 2004.
Overview of ROHC framework
SvanbroLower Layer Guidelines for ROHC, 47th IETF 1 Lower Layer Guidelines for Robust Header Compression Krister Svanbro Ericsson Research
IETF77 Multimob California1 Proposal for Tuning IGMPv3/MLDv2 Protocol Behavior in Wireless and Mobile networks draft-wu-multimob-igmp-mld-tuning-00 Qin.
1 CS 4396 Computer Networks Lab TCP – Part II. 2 Flow Control Congestion Control Retransmission Timeout TCP:
1 Chapter 7 Switching, Packets, Frames, Parity, Checksums, and CRCs.
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
TCP OVER ADHOC NETWORK. TCP Basics TCP (Transmission Control Protocol) was designed to provide reliable end-to-end delivery of data over unreliable networks.
1 © NOKIA 3GPP2-TSGC-SWG1.2/ / BKM RTP Header Compression using RObust Header Compression (ROHC) Keith Miller Nokia Inc.
Unit 1 Lecture 4.
Protocol Layering Chapter 11.
Video Quality Evaluation for Wireless Transmission with Robust Header Compression Fourth International Conference on Information, Communications & Signal.
COSC 3213: Computer Networks I Instructor: Dr. Amir Asif Department of Computer Science York University Section M Topics: 1.Flow Control and ARQ Protocols.
1 0-Byte Header Reduction Mechanism Fundamentals.
March 2002 Jie Liang, et al, Texas Instruments Slide 1 doc.: IEEE /0207r0 Submission Simplifying MAC FEC Implementation and Related Issues Jie.
DATA LINK CONTROL. DATA LINK LAYER RESPONSIBILTIES  FRAMING  ERROR CONTROL  FLOW CONTROL.
Data Link Layer.
Powerpoint Templates Data Communication Muhammad Waseem Iqbal Lec # 15.
Protocols and layering Network protocols and software Layered protocol suites The OSI 7 layer model Common network design issues and solutions.
Introduction to H.264 / AVC Video Coding Standard Multimedia Systems Sharif University of Technology November 2008.
Chapter 9: Transport Layer
Reliable Transmission
Instructor Materials Chapter 9: Transport Layer
EEC 688/788 Secure and Dependable Computing
Configuring EtherChannels and Switch Troubleshooting
Data Link Layer What does it do?
TCP - Part II Relates to Lab 5. This is an extended module that covers TCP flow control, congestion control, and error control in TCP.
Chapter 5 Peer-to-Peer Protocols and Data Link Layer
EEC 688/788 Secure and Dependable Computing
IETF 50, Minneapolis Zero-byte ROHC RTP Background, requirements, current status and proposed way forward Lars-Erik Jonsson Ericsson Research, Luleå.
EEC 688/788 Secure and Dependable Computing
Error Detection and Correction
Switching, Packets, Frames, Parity, Checksums, and CRCs
Chapter 5 Peer-to-Peer Protocols and Data Link Layer
Lecture 4 Peer-to-Peer Protocols and Data Link Layer
Error detection: Outline
Error Checking continued
Presentation transcript:

SO headers based on CRC Functionality and comparisons to a Keyword approach Lars-Erik Jonsson (Ericsson) ROHC IETF

2 Purposes of CRC in SO headers Guarantee the correctness of all decompressed headers and catch all possible errors, such as: –Long loss events –Residual bit errors –Errors introduced by external decompressor mechanisms (e.g. timers and wall clocks) Continuously move the context forward Make special decompressor features possible to implement (e.g. reverse decompression)

3 Clarification of questioned issues These issues have been pointed out on the mailing list and are therefore paid extra attention here even if they are not the most important issues with the CRC approach Remember that normally: –there will be no errors to detect –loss of several consecutive packets is very uncommon –the CRC verifies the correctness of the header and makes it possible to move the context forward

4 Issue 1 - Long loss detection 1(3) How are long loss events detected?? –A long loss (elevator case) is when (depending on how things are interpreted) consecutive packets are lost, and the probability for that is very low ( P[long loss] ) –An error may occur if the CRC fail to detect that long loss has happened ( P[undetected] ). Simulations have shown that the probability for this is much lower than 1/8 for three bits of CRC (about 1/24) –If detection fails ( P[long loss] x P[undetected] ) in the first packet after long loss, the error will not propagate since all headers have a CRC. Hence, the error probability is exponentially decreasing with each packet

5 Issue 1 - Long loss detection 2(3) Can the probability for successful long loss detection be further improved? YES!! –Pre-verifying CRC’s can guarantee detection of some loss –Choice of polynomials and calculation methods –With timers or wall clocks, long loss detection will probably always succeed

6 Issue 1 - Long loss detection 3(3) Compared to Keyword approach –With timers or wall clocks, the long loss detection problem is almost eliminated both for the Keyword and the CRC approach. However, the latter will still be more reliable regarding this since it has the CRC to verify with –Without timers, the CRC approach has a very low probability to not detect long loss and it prevents error propagation, while Keyword will fail completely to detect long loss

7 Issue 2 - Residual BER 1(2) What will be the result of residual bit errors? –Residual bit errors will usually be detected by the CRC –If several bit errors occur ( P[several bit errors] ), the CRC check may fail ( P[undetected] ) and the context may be incorrectly updated due to wrap around ( P[wrap around] ). –The combined probability for this will obviously be very low P[several bit errors] x P[undetected] x P[wrap around] –Further, such errors will never propagate due to CRC’s in subsequent headers, they may only require a context update. –Unnecessary updates and packet discard could also be avoided with extra reconstruction attempts

8 Issue 2 - Residual BER 2(2) Compared to Keyword approach –Without the CRC, incorrectly decompressed packets due to residual bit errors can never be detected and discarded

9 Robustness, KW / CRC SO packet Keyword packet Keyword approach CRC approach NN

10 Robustness, KW / CRC SO packet Keyword packet Keyword approach CRC approach Consecutive losses NN

11 Robustness, KW / CRC SO packet Keyword packet Keyword approach CRC approach Consecutive losses NN

12 Robustness, KW / CRC SO packet Keyword packet Keyword approach CRC approach Consecutive losses N-1 NN

13 Efficiency KW / CRC SO packet FO packet Keyword packet Keyword approach NN Timestamp jump CRC approach Timestamp jump

14 Summary It has been shown that compared to Keywords, the CRC approach: –Can achieve both higher robustness and better compression efficiency –Better can avoid error events due to long loss (elevator case) and residual bit errors –Gives flexibility to use special decompression methods such as local recovery and reverse decompression Therefore, as already suggested by several parties on the mailing list, the CRC approach should be used for the unidirectional and optimistic modes of operation

15 Questions??

16 CRC Pros&Cons +Verifies the correctness of ALL decompressed headers +Continuously updates the context, no need for explicit update packets +Makes it possible to use “external” decompressor methods +Detects residual bit errors (and undetected errors will not propagate) +Can be implemented over fixed-sized-channels that assume only 1-octet headers and payload during “normal operation” (larger packets occur only after silent periods) +Robustness against long loss can be increased with additional reconstruction attempts +FO formats can easily be designed which are common to the FO required by the reliable mode -Can fail with long loss detection. With timers or wall clocks, this problem can be completely solved. Without timers, the CRC still provides a good detection mechanism that avoids error propagation

17 KW Pros&Cons +Can possibly be robust against longer long loss periods if the loss occur between keyword updates -Adds extra sensitive packets which reduces the overall robustness -The KW updates means that non 1-octet headers are needed even when packet stream is regular -Has no detection mechanism for residual bit errors -“External” decompressor methods can not be used since decompression can not be verified -Without timers, there is no mechanism to detect long loss which may result in undetectable error propagation -Since KW can only be sent with certain intervals, timestamp updates can not be performed at any time. This means that it may be necessary to send larger packets with increased timestamp information during long periods until the KW can be updated