Re: [AVTCORE] Some (SFrame RTP encapsulation) questions to ponder

"Mo Zanaty (mzanaty)" <mzanaty@cisco.com> Thu, 11 March 2021 09:23 UTC

Return-Path: <mzanaty@cisco.com>
X-Original-To: avt@ietfa.amsl.com
Delivered-To: avt@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9B1993A16AD for <avt@ietfa.amsl.com>; Thu, 11 Mar 2021 01:23:04 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.619
X-Spam-Level:
X-Spam-Status: No, score=-9.619 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=X65Eg1RX; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=tdjqhMUY
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Bih71qDWA19G for <avt@ietfa.amsl.com>; Thu, 11 Mar 2021 01:23:02 -0800 (PST)
Received: from alln-iport-6.cisco.com (alln-iport-6.cisco.com [173.37.142.93]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 556E13A16AA for <avt@ietf.org>; Thu, 11 Mar 2021 01:23:02 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=25491; q=dns/txt; s=iport; t=1615454582; x=1616664182; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=2kupwoi01N6y0wyikBRxN/0XKBblIndclk1MIVjzQXE=; b=X65Eg1RXPsIUEFr14V3jaXsH7P+5Y3IygYxx/YMYxBn/N2Pzzse4VkB2 Iqe2EHYEvleKaI1AM5vk0dQa3q4Ig2SI89r5n5/ha23qShqP71nrp93CW p7NG6NZ+n+aLha5My0O26v0yA82ZvjM0kzaJfBKdBKbhDZ1lo9tkos4Y4 o=;
X-IPAS-Result: A0BYAABw30lgkIUNJK1aGgEBAQEBAQEBAQEDAQEBARIBAQEBAgIBAQEBgg+BIzBRfVo2MYRBg0gDhTmIQAOKHYR3hRSEc4FCgREDVAsBAQENAQEdAQoKAgQBAYRNAheBXAIlOBMCAwEBAQMCAwEBAQEFAQEBAgEGBBQBAQEBAQGGOA2GRAEBAQQBASEdAQE3AQ8CAQgRAwECKAMCAgIfBgsUCQgCBAENBYJwAYF+VwMvAQ6hdgKKHnaBMoMEAQEGhR0NC4ITAwaBOYJ2gmyBGwEBgQyFOAgeHIFJQoERJxyBWn4+ghpCAQECAYFCOg0JgmA0giuBWCRIBj4qUQIFGzsqLC0MGAEBJxE4kBFYgnyHUIwkO5B0WwqDAIlEjTyFLQMflzSHSYUDlGuLTIMKjxoMhEgCAgICBAUCDgEBBoFrIYFZcBU7KgGCPlAXAg2OHwwNCYNNhRSFRXMCNgIGAQkBAQMJfIwDAQE
IronPort-PHdr: A9a23:4iAUqBKrrdTR6lO4EdmcuZUyDhhPgJ39IxIV55w7irlHbqWk+dH4M VfC4el25HfGWIza77RPjO+F+6zjWGlV55GHvThCdZFXTBYKhI0QmBBoG8+KD0D3bZuIJyw3F chPThlpqne8N0UGF8P3ZlmUqXq3vnYeHxzlPl9zIeL4UofZk8Ww0bW0/JveKwVFjTawe/V8N hKz+A7QrcIRx4BlL/VZ9w==
IronPort-HdrOrdr: A9a23:IeIO5qtcZUp3wzxQDjkjSDXw7skCNIcji2hD6mlwRA09T+WxrO rrtOgH1BPylTYaUGwhn9fFA6WbXXbA7/dOgLU5FYyJGC3ronGhIo0n14vtxDX8Bzbzn9Qy6Y 5JSII7MtH5CDFB4vrSyAOzH888hPyO9661jenTpk0dMj1CQYsI1XYfNi+wFEpqSA5aQb8wE5 SB7sRKzgDQB0g/RMK9G3UDQqz/t8TG/aiWICIuKjwGzE21jT2u4KPnCBTw5Hcjeh5G3LtKyx m/ryXX/aOm2svLryP092iW1JhOncuk990rPr3xtuEwChHBzjmlf55gXbrqhkF0nMiK5EwxmN fB5zcMVv4DkU/5RW2+rRvz1wSI6l9HgBWOpS768BneiPf0Sz4gB81KiZgxSGql12MboNp+3K hXtljp0aZ/MBLakCzxo/jOWh16/3DE2UYKrO8Jg3RTFbYZcb9axLZvhX99LZFoJlOf1KkXVM 1VSO3M7vdfdl2XK1rDuHN0/dCqVnMvWj+bX0kroKWuontrtUE863Fd6N0Un38G+p54YYJD/f 74PqNhk6wLZtMKbJh6GPwKTaKMey7waCOJFFjXDUXsFakBNX6IgYXw+q8J6Oajf4FN65cuhp LbUhd9uXQpc0zjTe2Ctac7tyzlcSGYZ3DA28te7592tvnXX7zwKxCOT1gojo+uuPMaDsrHW+ uiOZ5fDvP5RFGeXrph7knbYd1/OHMeWMoatpIQQFSVuP/GLYXsq6jafZ/oVfzQOAdhflm6Lm oIXTD1KskFxFusQGXEjB/YXG6ofkT++Jl3AbXL5uR78vlVCqR89iwuzXip7MCCLjNP9oYsel FlHb/hmqSn4W+s/WjJ6G1tMgFHDllc5ajhV38in35PD2rENZI4//mPc2Fb23WKYjVlSdnNLQ JZr1Nrvb6sI4eI3iAkAdK/Omech38ezUj6F6s0q+mm34PIa5k4BpEpVOhNDg3NDQVyghsvgn xEchU4SkjWES7Oha2pgIcPPvzWc8BxjW6QUJVpgEOakX/ZhMk0AlMHQjalUKes8HcTbgsRom c0zogyr/6rny21JW42neIiWWc8GFi/MfZhFwSKZIJdh7bxXhp/JF363wCyulUUZnfg8VkUiy jHKyCZEMu7XmZ1izR/zrvg9k9yeyGmW39ILlp+sYF7CA39yytO+OeWe6u+1HaQYFMewucbdC rIeycWPxkG/aHE6DeIgjqYUX0pypIyV9atf4gLYvXd3GigJ5aPkrxDF/hI/Ix9PNSrqeMTV/ mDEjXlYA/QGqcs2waPoGwiNzQxoH44kenw0BmN1hnz4FcvRf7TKk9hXbcVPpWV6HXlXe+B1N F8gcguteW9dmX3Zdju89CbUxdTbhfSq3WxVecmtNRdur8zrqJ6G93DSiTTvUs3lSkWPYPxjg cTUa576LfONstmeNETYTtQ+h4smM6UJEUmvwTqCoYFDB4Qpm6eO8nM76vDqLIpDEHEvgf2NF WF+yBW/vvOXUK4pPUnIrN1JX4TZFk36Xxk8u/HapbZDx+ycfpfuFW9KX2wfdZmOea4MKRVqg w/5d6Gn+WaLXWlnA/RuCZ2OaJI/SKsR9ioDAeFBO5P9Ji7ND2389yXyd/2iC2yTz2xL1kcj8 lCc0cba8xYkDksjIEtyEGJO+TKi1Ngl0Eb+C1tk17mx5Ov72jaF1xXKAGxuOQjYRBDdnyTyd nf+eeW1H7h8CFI1JnKGkBXZMxPEbErP/7KBjYrL9MRsr6u97cuhSoGYA5GNR9ItAzA
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="5.81,240,1610409600"; d="scan'208,217";a="700255611"
Received: from alln-core-11.cisco.com ([173.36.13.133]) by alln-iport-6.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 11 Mar 2021 09:23:00 +0000
Received: from mail.cisco.com (xbe-aln-005.cisco.com [173.36.7.20]) by alln-core-11.cisco.com (8.15.2/8.15.2) with ESMTPS id 12B9N04w030963 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK); Thu, 11 Mar 2021 09:23:00 GMT
Received: from xfe-aln-001.cisco.com (173.37.135.121) by xbe-aln-005.cisco.com (173.36.7.20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.3; Thu, 11 Mar 2021 03:22:59 -0600
Received: from xhs-rtp-002.cisco.com (64.101.210.229) by xfe-aln-001.cisco.com (173.37.135.121) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.2.792.3; Thu, 11 Mar 2021 03:22:45 -0600
Received: from NAM10-MW2-obe.outbound.protection.outlook.com (64.101.32.56) by xhs-rtp-002.cisco.com (64.101.210.229) with Microsoft SMTP Server (TLS) id 15.0.1497.2 via Frontend Transport; Thu, 11 Mar 2021 04:22:45 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=AidaqtsRnOqEz5LE0qvA4Uoxliqqk/JfF6bRNY4h6V9CwRtR6/ybLrAU5ffYoNqIXtMDfr1HJ6DB/6IzIv7F5b7N7CzkmOFhqIXHg75CeA7JGTXPlHskFAeftS7vKCxabb1eoYEPpdkKhQEBuyXa7RWcNGbnWiSIdGJIiEe63jn74mmQ5BMrstHQm+Rk/PnDcreljSuuQzU/i/tfN/SvUmzmZI1IoQ4ogUISzLaN52/FcLpk/3+t/fDQvYBmEtmEP1YTAEqEbRxmRFGvBqFokBrAhunyUamXMsVPHgkmoYAOAl6MaUhsMEandEsf5ATr3M2VoRs2TCjabvgRt8U8pA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=2kupwoi01N6y0wyikBRxN/0XKBblIndclk1MIVjzQXE=; b=OvaJgodUpbdHtq36dAe1TZFw08+ZuuT4kHVr92Q7UeFGZDppzU9KT5pTec2AkViP6b1ezkskTsIsEnth9Gi+Q/ifv/ZeGA3JgJSx0ZxZAR06GKrAcg//KTBwgBsrKxyx48ummQLaB2sojt9JnrKqJgFMastLw++3Y5K667sLpFZTzE3NBMHO11OJD1otFTzsnW6M8OxjFGJrx1oYyyOOjllaen5cTS1wZz6e4Gm+KABUyjYkoZbDwOKcLIMwcG+3ZJp9+TKbDQQGS4eq2s2/vTvUGoP2yocYVC35nRo1KphCuVQJkogHJMUp64vsz9IqDl+vNVvIurhmXyJufJ5lyA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=2kupwoi01N6y0wyikBRxN/0XKBblIndclk1MIVjzQXE=; b=tdjqhMUYM+GGTfpWhIarWK5f25CevsKlayorloeLrmhuNSyi6ljYuDDD+MnGgHf695d/X1Es+ls9P5CwKvgY8qwBbaSE8+auwb0AlLHYpMZq8jnDNsIMuLUaW7evDRrGcc2UB81S++IOMnzgtiHGT/FR7ic8pVu6eEaNR8dyaq0=
Received: from SN6PR11MB2768.namprd11.prod.outlook.com (2603:10b6:805:62::20) by SA2PR11MB4779.namprd11.prod.outlook.com (2603:10b6:806:11a::7) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3912.29; Thu, 11 Mar 2021 09:22:44 +0000
Received: from SN6PR11MB2768.namprd11.prod.outlook.com ([fe80::45b8:aaf5:24d0:5d6a]) by SN6PR11MB2768.namprd11.prod.outlook.com ([fe80::45b8:aaf5:24d0:5d6a%5]) with mapi id 15.20.3890.039; Thu, 11 Mar 2021 09:22:44 +0000
From: "Mo Zanaty (mzanaty)" <mzanaty@cisco.com>
To: Alexandre GOUAILLARD <agouaillard@gmail.com>, Sergio Garcia Murillo <sergio.garcia.murillo@gmail.com>
CC: IETF AVTCore WG <avt@ietf.org>
Thread-Topic: [AVTCORE] Some (SFrame RTP encapsulation) questions to ponder
Thread-Index: AQHXFj70egp6lieUu0+6M4HSTcXQnKp+cL8AgAAI0AD//7ZOAA==
Date: Thu, 11 Mar 2021 09:22:43 +0000
Message-ID: <6C429B81-ADB2-400C-A6A9-E73602788C68@cisco.com>
References: <CA+ag07bVmt8j1vQ9dt7JtfpqRgqVwqWA8M42=vyP=kr771KTzA@mail.gmail.com> <A2E8BA7B-911F-4970-B622-95D1C9F7A5BA@gmail.com>
In-Reply-To: <A2E8BA7B-911F-4970-B622-95D1C9F7A5BA@gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/10.1d.0.190908
authentication-results: gmail.com; dkim=none (message not signed) header.d=none;gmail.com; dmarc=none action=none header.from=cisco.com;
x-originating-ip: [2600:1700:3d40:77f0:20e2:bd1d:cda2:ba3d]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: b72c7689-4a41-4244-0ab3-08d8e46f3a39
x-ms-traffictypediagnostic: SA2PR11MB4779:
x-microsoft-antispam-prvs: <SA2PR11MB47792FDAD62190CEA40CFDCDB4909@SA2PR11MB4779.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:SN6PR11MB2768.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(366004)(396003)(376002)(39860400002)(346002)(136003)(2906002)(91956017)(53546011)(6506007)(66946007)(4326008)(6512007)(76116006)(71200400001)(2616005)(66556008)(66476007)(64756008)(5660300002)(86362001)(478600001)(66446008)(186003)(83380400001)(110136005)(166002)(316002)(6486002)(966005)(8936002)(8676002)(36756003)(33656002)(45980500001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_6C429B81ADB2400CA6A9E73602788C68ciscocom_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: SN6PR11MB2768.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: b72c7689-4a41-4244-0ab3-08d8e46f3a39
X-MS-Exchange-CrossTenant-originalarrivaltime: 11 Mar 2021 09:22:44.0835 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: XOLXiZohdGmyVmMQ1xAqujxndsgJvE8dCZGZ9zVaiZ+Yl0UDBf++zMIABCDKVSPkFdHJfyFNC1sLp3Vk9sYtug==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA2PR11MB4779
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.20, xbe-aln-005.cisco.com
X-Outbound-Node: alln-core-11.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/avt/sG07BhBecRTvCNHZ8FSwDSHB4ik>
Subject: Re: [AVTCORE] Some (SFrame RTP encapsulation) questions to ponder
X-BeenThere: avt@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Audio/Video Transport Core Maintenance <avt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/avt>, <mailto:avt-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/avt/>
List-Post: <mailto:avt@ietf.org>
List-Help: <mailto:avt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/avt>, <mailto:avt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Mar 2021 09:23:05 -0000

While updating frame marking to add back VP9, I checked the actual specs and discovered that VP9 and VP8 have identical language on TL0PICIDX, and both merely say it “MUST be incremented” but not necessarily by 1. Any implementation that requires +1 seems incorrect unless I’m missing something. There is an additional informative note in VP8: “This will likely require rewriting values of TL0PICIDX and KEYIDX after the splice.” This also does not require +1, and also seems to apply equally to VP9 for TL0PICIDX, and was likely removed from VP9 because it lacks KEYIDX, not because it has any different semantics for TL0PICIDX.

VP9: https://tools.ietf.org/html/draft-ietf-payload-vp9-11#section-4.2
      TL0PICIDX:  8 bits temporal layer zero index.  TL0PICIDX is only
         present in the non-flexible mode (F = 0).  This is a running
         index for the temporal base layer pictures, i.e., the pictures
         with TID set to 0.  If TID is larger than 0, TL0PICIDX
         indicates which temporal base layer picture the current picture
         depends on.  TL0PICIDX MUST be incremented when TID is equal to
         0.  The index SHOULD start on a random number, and MUST restart
         at 0 after reaching the maximum number 255.

VP8: https://tools.ietf.org/html/rfc7741#section-4.2
      TL0PICIDX:  8 bits temporal level zero index.  TL0PICIDX is a
         running index for the temporal base layer frames, i.e., the
         frames with TID set to 0.  If TID is larger than 0, TL0PICIDX
         indicates on which base-layer frame the current image depends.
         TL0PICIDX MUST be incremented when TID is 0.  The index MAY
         start at a random value, and it MUST wrap to 0 after reaching
         the maximum number 255.  Use of TL0PICIDX depends on the
         presence of TID.  Therefore, it is RECOMMENDED that the TID be
         used whenever TL0PICIDX is.
…snip…
   Informative note:  Implementations doing splicing of VP8 streams will
      have to make sure the rules for incrementing TL0PICIDX and KEYIDX
      are obeyed across the splice.  This will likely require rewriting
      values of TL0PICIDX and KEYIDX after the splice.

Regards,
Mo

From: avt <avt-bounces@ietf.org> on behalf of Alexandre GOUAILLARD <agouaillard@gmail.com>
Date: Thursday, March 11, 2021 at 3:47 AM
To: Sergio Murillo <sergio.garcia.murillo@gmail.com>
Cc: "avt@ietf.org" <avt@ietf.org>
Subject: Re: [AVTCORE] Some (SFrame RTP encapsulation) questions to ponder

Sergio,

I think you had done this analysis for h264, vp8 and vp9 two years ago. There are some existing  slides about it.

If Apple/Intel add a slide for h265 since they support it in safari, we add av1, Stefan bring in h266, we have more or less most of the codecs of interest and enough data to judge.

We could have three sections:
1 - what do you need to use to go into a generic packetizer and how much is codec specific.
2 - what do You need to duplicate in an rtp header extension for an SFU to work.
I see three different things:
- base for encrypted non-SVC payload (frame marking)
- scalability structure (payload encrypted or not).
a/ I have not had the time to look at Stefan a proposal for the new MPEG codecs but his messages on the list were going in the same direction (higher complexity with full SVC than with temporal scalability only).
b/ I do not know how far appart the AV1 structure and the vvc or ecc would be, if there is a way to make it generic, and if it a even a goal we would want to have.
c/ I understand there was originally a framemarking part to the vvc rtp payload proposal, I m wondering if there was a gap when trying to represent all SVC structures the vvc bistream otherwise provides.
- sfu optimisation structures, eg for av1 the Instant decidability decision structure (payload encrypted or not), whic is not critical for sfu operation but allow much faster adaptation and smarter CC.

If we go down that path that could mean a codec specific version of each of:
- Payload format
- Sframe rtp packetizer
- rtp extension header

With the following triplet already more or less working well together already:
[h264, generic, framemarking]
[VP8, generic, framemarking]
[VP9, generic, DD]
[AV1, generic, DD]

Now in terms of security for the encrypted case, that means the presence or absence of a given rtp header extension leaks info about e.g which codec is being used. I m not sure this is something w can completely avoid anyway.

Sent from my iPhone


On 11 Mar 2021, at 15:15, Sergio Garcia Murillo <sergio.garcia.murillo@gmail.com> wrote:


El jue, 11 mar 2021 a las 7:22, Bernard Aboba (<bernard.aboba@gmail.com<mailto:bernard.aboba@gmail.com>>) escribió:

I ask this because there appear to be codecs that are widely deployed (e.g. VP8) that require "hacks" for SFUs to forward, as noted in the presentation at IETF 109.  In the case of VP8, the "hack" was required because of a deficiency in the VP8 decoder specification (e.g. the requirement that PictureIDs be consecutive, not just monotonically increasing).  This means that the "hacks" described can't be eliminated just by coming up with a better RTP forwarding extension.  You'd actually need to change the VP8 specification and upgrade VP8 decoders.


The PictureID and the TL0PICIDX  are defined in rfc7741 RTP Payload Format for VP8 Video and not on the VP8 spec. So, if using an agnostic packetizer instead of the rfc7741 one, the issue just doesn't exist.

Best regards
Sergio
_______________________________________________
Audio/Video Transport Core Maintenance
avt@ietf.org
https://www.ietf.org/mailman/listinfo/avt