Re: [AVTCORE] draft-ietf-avtcore-multi-party-rtt-mix Issue 1: transport

Paul Kyzivat <pkyzivat@alum.mit.edu> Sat, 16 May 2020 14:41 UTC

Return-Path: <pkyzivat@alum.mit.edu>
X-Original-To: avt@ietfa.amsl.com
Delivered-To: avt@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8A3573A0659 for <avt@ietfa.amsl.com>; Sat, 16 May 2020 07:41:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.09
X-Spam-Level:
X-Spam-Status: No, score=-0.09 tagged_above=-999 required=5 tests=[DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_MSPIKE_H2=-0.001, T_SPF_PERMERROR=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=alum.mit.edu
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id p9himqmJWF9V for <avt@ietfa.amsl.com>; Sat, 16 May 2020 07:41:28 -0700 (PDT)
Received: from NAM12-MW2-obe.outbound.protection.outlook.com (mail-mw2nam12on2065.outbound.protection.outlook.com [40.107.244.65]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 855A73A065A for <avt@ietf.org>; Sat, 16 May 2020 07:41:28 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=HcSR66DKcPSomk6DVcWImKOPflGVY24EQTcDduRLQDxY+htUFFnnQp/aeeluTIrcPFeazmXSKeu51KK9+RvyvoQTHxzrF0uIHdZwN9XBwbtw40P7W6EJz1PMDndwoSio1nZPkNEXrezgIVt8ViOlANjPKLAK1oe5ujIZ5/ApDyq2gX9Emxlb53L1uubPNaIvQXIFCok/CjRyVcPQ8ya7+NNXX2jtKk6PZm+XrHMI2ETVH2zpu47KnYRWoD7c4OPlL2NwWlRy7/3UAh82eX8pfUG1164DofDAcbY7MR+Cw/np3o//6fJv7+jlaF8vNFHFhHdyhDIhHL3FQ/RbG16x6w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=YjBF/q/iaIm7V3f15mfbDQA+hQ8udOw0Go4JLZ2ii7M=; b=cD/ybuZgRvPUTSW5STqwoHYtsbleATMc4/HPBuo+wF6j/9VDb9AhTWg7hiR/Il/bZB1iHMtzV3SuBLgnEOTtqUb09fXTXMK9Y8dBS4A+vh6ZI+iAP3FZZggTwkG5A2FxUPM62hGfRuSQXoiHP+CMl6Z/Sz6bX6wr+DdDtG+t5Kxv8yppoDnrCltGal0w+j60GQMzHyEbpnakwqSl/yLa3aUIj25cRGzGCfEMm4D1HK+Y0heiYIYDpckJ7F69cVl35lEvFFkSLnyihoPz53OTxQyYitq0aa0Z/dLjPM7CUInqxJF/l9iuSjcpFQ6ctlVoNTdNxeUMMKqkYG3skgTDjg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=permerror (sender ip is 18.7.68.33) smtp.rcpttodomain=ietf.org smtp.mailfrom=alum.mit.edu; dmarc=none action=none header.from=alum.mit.edu; dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=alum.mit.edu; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=YjBF/q/iaIm7V3f15mfbDQA+hQ8udOw0Go4JLZ2ii7M=; b=Twt1Ktx4JKIrH48aCFebotfnLaL9BBFi2ujsHt7tx5x0uISMZ3cqizbmENb1PwY9P53hlLPAbHYd0shimNIGRyqRxsUqstv9ZwvdIk5yqnLk0FDvXnNKpW51uAnakHx6kBFiHZ//+0WIA6oXcixMg3uEIhrla3E6GhN9r8kRaoU=
Received: from DM6PR03CA0039.namprd03.prod.outlook.com (2603:10b6:5:100::16) by BL0PR12MB2817.namprd12.prod.outlook.com (2603:10b6:208:36::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3000.27; Sat, 16 May 2020 14:41:27 +0000
Received: from CY1NAM02FT063.eop-nam02.prod.protection.outlook.com (2603:10b6:5:100:cafe::52) by DM6PR03CA0039.outlook.office365.com (2603:10b6:5:100::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3000.20 via Frontend Transport; Sat, 16 May 2020 14:41:27 +0000
Authentication-Results: spf=permerror (sender IP is 18.7.68.33) smtp.mailfrom=alum.mit.edu; ietf.org; dkim=none (message not signed) header.d=none;ietf.org; dmarc=none action=none header.from=alum.mit.edu;
Received-SPF: PermError (protection.outlook.com: domain of alum.mit.edu used an invalid SPF mechanism)
Received: from outgoing-alum.mit.edu (18.7.68.33) by CY1NAM02FT063.mail.protection.outlook.com (10.152.75.161) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3000.19 via Frontend Transport; Sat, 16 May 2020 14:41:26 +0000
Received: from Kokiri.localdomain (c-24-62-227-142.hsd1.ma.comcast.net [24.62.227.142]) (authenticated bits=0) (User authenticated as pkyzivat@ALUM.MIT.EDU) by outgoing-alum.mit.edu (8.14.7/8.12.4) with ESMTP id 04GEfOa4024400 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES128-SHA bits=128 verify=NOT) for <avt@ietf.org>; Sat, 16 May 2020 10:41:24 -0400
To: avt@ietf.org
References: <158895171474.17391.16816077344810423489@ietfa.amsl.com> <e462ea93-e084-5c55-1ade-521424884d41@ghaccess.se> <e6d35436-0ba4-6347-6990-46bbf5b4e5b3@ghaccess.se> <a2a1add6-7934-6371-81a0-8e3dc6735045@ghaccess.se> <C8BCBCFE-EA60-4964-A969-320265A89FA7@brianrosen.net> <06d6a0e7-8a0b-6177-ebcb-b03d3396e6cb@ghaccess.se> <0104AEDD-A7FC-4FC9-9E9E-8858D258581D@brianrosen.net>
From: Paul Kyzivat <pkyzivat@alum.mit.edu>
Message-ID: <633edda9-2a36-bc9b-b98e-577f97de7c73@alum.mit.edu>
Date: Sat, 16 May 2020 10:41:24 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.13; rv:68.0) Gecko/20100101 Thunderbird/68.8.0
MIME-Version: 1.0
In-Reply-To: <0104AEDD-A7FC-4FC9-9E9E-8858D258581D@brianrosen.net>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Language: en-US
Content-Transfer-Encoding: 8bit
X-EOPAttributedMessage: 0
X-Forefront-Antispam-Report: CIP:18.7.68.33; CTRY:US; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:outgoing-alum.mit.edu; PTR:outgoing-alum.mit.edu; CAT:NONE; SFTY:; SFS:(346002)(396003)(39860400002)(136003)(376002)(46966005)(47076004)(966005)(478600001)(86362001)(82740400003)(75432002)(786003)(316002)(5660300002)(31686004)(8936002)(36906005)(30864003)(8676002)(53546011)(2616005)(186003)(956004)(31696002)(26005)(2906002)(6916009)(70206006)(70586007)(356005)(66574014)(82310400002)(336012)(7596003)(43740500002); DIR:OUT; SFP:1101;
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 10fea558-ae22-4a22-6f37-08d7f9a73656
X-MS-TrafficTypeDiagnostic: BL0PR12MB2817:
X-Microsoft-Antispam-PRVS: <BL0PR12MB281764EF021B81FE3DD1B4F2F9BA0@BL0PR12MB2817.namprd12.prod.outlook.com>
X-MS-Oob-TLC-OOBClassifiers: OLM:9508;
X-Forefront-PRVS: 040513D301
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-OriginatorOrg: alum.mit.edu
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 16 May 2020 14:41:26.0824 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 10fea558-ae22-4a22-6f37-08d7f9a73656
X-MS-Exchange-CrossTenant-Id: 3326b102-c043-408b-a990-b89e477d582f
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3326b102-c043-408b-a990-b89e477d582f; Ip=[18.7.68.33]; Helo=[outgoing-alum.mit.edu]
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BL0PR12MB2817
Archived-At: <https://mailarchive.ietf.org/arch/msg/avt/xX3kXvFcqFssSWEm4nhJfMK8qRk>
Subject: Re: [AVTCORE] draft-ietf-avtcore-multi-party-rtt-mix Issue 1: transport
X-BeenThere: avt@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Audio/Video Transport Core Maintenance <avt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/avt>, <mailto:avt-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/avt/>
List-Post: <mailto:avt@ietf.org>
List-Help: <mailto:avt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/avt>, <mailto:avt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 16 May 2020 14:41:32 -0000

On 5/15/20 5:33 PM, Brian Rosen wrote:
> Ah,  two cases, multiparty aware and multi party unaware slipped my mind.
> 
> I would say if we’re defining multi-party aware UAs, which is by 
> definition, new code, that we’re better off with a truly reliable 
> transport.  Keeping “repeat it enough times that it ought to work” 
> doesn’t strike me as the best choice given implementations must change. 
>   That was a hack.  It’s an okay hack, but we have the problem that this 
> is very high information density per bit, so it’s quite a bit worse to 
> lose information with RTT than with audio or video.  Your mind can fill 
> in some missing character blanks, but not as well as it can deal with 
> missing audio and video packets.

I agree with you in theory. But going that way has some problems in 
practice. Notably, the multiparty aware and unaware implementations need 
to coexist in order to be deployed. If they use the same transport and 
the differences can be negotiated via O/A of SDP parameters then the 
coexistence is easy. But with differences in transport the O/A mechanism 
for discovering the best mechanism supported by both ends becomes messy.

	Thanks,
	Paul

> Brian
> 
>> On May 15, 2020, at 2:29 PM, Gunnar Hellström 
>> <gunnar.hellstrom@ghaccess.se <mailto:gunnar.hellstrom@ghaccess.se>> 
>> wrote:
>>
>> Hi Brian,
>>
>> Den 2020-05-15 kl. 17:03, skrev Brian Rosen:
>>> I think we have to consider who has to do what.
>>>
>>> If we are requiring all implementations to change because of other 
>>> multi-party issues, then I think we should us an actual reliable 
>>> protocol, and not just a “repeat enough times that the probability it 
>>> gets there is high enough.
>>>
>>> If we aren’t asking all implementations to change for multi-party, 
>>> but only the mixer, then I think that we’re sticking with T.140,
>>>
>>> We’re in the latter case, right?  The point of this work is don’t 
>>> change the endpoints, only the conference bridge.
>>
>> We are in both cases. And I hope you agree we should be.  And this is 
>> in general, not only for the transport. Both cases are there in the 
>> current draft draft-ietf-avtcore-multi-party-rtt-mix-01
>>
>> 1) A mechanism that the mixer can use when it is revealed that the 
>> endpoint does not support proper multi-party presentation. There are 
>> functional limitations, but it works reasonably well, especially for 
>> few parties taking turns in reasonably good order. It is specified in 
>> section 13.2 and is called "Multi-party mixing for multi-party unaware 
>> endpoints".  You can check the functional limitations at the end of 
>> that section and tell if you agree that we also need something better.
>>
>> 2) A mechanism to use when both the mixer and the endpoint can handle 
>> fully functional multi-party presentation of text. That requires 
>> active action by the endpoint to place received text in areas for each 
>> participant, and present them in a suitable way, both providing a good 
>> real-time impression, an impression of approximately when in time 
>> order the text entries were produced, and a collection of text from 
>> each participant in suitable chunks, phrases, sentences or messages, 
>> with source information attached. The latest draft has a format for 
>> multi-party transport that allows up to 16 sources per packet, and can 
>> by that provide text from about 32 simultaneously typing participants 
>> without introducing unacceptable delay. Earlier versions of the draft 
>> had different and much lower performance.  I am glad that the new 
>> format will not be the bottleneck for a good RTT multi-party experience.
>>
>> It would have been possible to specify another transport for mechanism 
>> 2), but my reasoning ended up in the same as before: RTP with 
>> RFC2198-type redundancy, with one original and two redundant 
>> transmissions, most often 300 ms apart. You can see the format as 
>> 16-tuple-RFC-4103. Do you agree in this conclusion for case 2?
>>
>> Thanks,
>>
>> Gunnar
>>
>>
>>
>>
>>>
>>> Brian
>>>
>>>> On May 14, 2020, at 11:01 AM, Gunnar Hellström 
>>>> <gunnar.hellstrom@ghaccess.se <mailto:gunnar.hellstrom@ghaccess.se>> 
>>>> wrote:
>>>>
>>>> I have concluded that only two of the discussed transports are 
>>>> realistic.
>>>>
>>>> Comments below
>>>>
>>>> Den 2020-05-11 kl. 12:22, skrev Gunnar Hellström:
>>>>> In a recent e-mail, I listed 9 issues to act on in 
>>>>> draft-ietf-avtcore-multi-party-rtt-mix-00
>>>>>
>>>>> I want to deal with them one by one or in small groups. Here is 
>>>>> number 1:
>>>>>
>>>>> 1. Consider rapidly if there is any more reliable transport that is 
>>>>> feasible to move to.
>>>>>> (e.g. Comedia RFC 4145 and RFC 4572, or the recently approved 
>>>>>> WebRTC t140 data channel 
>>>>>> draft-ietf-mmusic-t140-data-channel-usage, or use of SAVPF with 
>>>>>> NAK and retransmission RFC 4588)
>>>>>
>>>>> It may look strange with this issue after many months as an 
>>>>> individual draft. But I want to touch it anyway before we move on 
>>>>> in one fixed direction.
>>>>>
>>>>> T.140 and its RTP transport (RFC 2793 - later RFC 4103) were 
>>>>> created 1998 - 2000 as the third real-time medium for human 
>>>>> conversations beside voice and video. The idea was to give equal 
>>>>> opportunities to persons wanting to communicate by text as the ones 
>>>>> who use voice or video. That means real-time transmission while 
>>>>> text is created and accepting some rare dropouts just as we do with 
>>>>> voice and video. However, users are nowadays used to text messaging 
>>>>> where it is customary to accept a delay and get the text complete 
>>>>> in most cases, rather than to have loss. That user experience might 
>>>>> be expected from real-time text as well. I do not have any strong 
>>>>> user indications that this is the case, it is just my own thinking.
>>>>>
>>>>> The reason to bring this up now, is that we seem to need to 
>>>>> introduce the multi-party mixed format at least as a new text media 
>>>>> subtype, text/rex instead of text/red. Then we are anyway 
>>>>> introducing signaling complexity of similar kind that another 
>>>>> transport will do.
>>>>>
>>>>> Are any of the initially mentioned more reliable transports 
>>>>> realistic and easily implemented in the target implementation 
>>>>> environments: NG emergency services, 3GPP IMS MTSI, IETF RUM, and 
>>>>> plain SIP multimedia? Or are there any other not mentioned?
>>>>>
>>>>> When considering this, we should have in mind that the proposed 
>>>>> transport should be with security so that we do not need to 
>>>>> introduce more options to negotiate between.
>>>>>
>>>>> And we shall also keep in mind that NAT traversal needs to be 
>>>>> supported as well as multi-party-signaling through the SIP central 
>>>>> conferencing model RFC 4353.
>>>>>
>>>>> Another complexity is that current regulation requires RFC 4103 and 
>>>>> it would be best that the finaly specified multi-party solution can 
>>>>> be perceived as an extension to RFC 4103.
>>>>>
>>>>> What can be said about the options?
>>>>>
>>>>>  1. Comedia RFC 4145 and RFC 4572. Makes use of TLS for transport, 
>>>>> so it is secured. Should use RFC 6544 ICE for TCP for NAT 
>>>>> traversal. Requires specification of how to arrange the streams and 
>>>>> code the sources in the multi-party environment. I do not know how 
>>>>> well these RFCs are supported in the target environments. Seems to 
>>>>> increase complexity.
>>>> --Increases complexity - not selected
>>>>>
>>>>> 2. draft-ietf-mmusic-t140-usage-data-channel. Has security, NAT 
>>>>> traversal and possibility to code multi-party source. Has good 
>>>>> opportunity for being supported in endpoint devices, because all of 
>>>>> them are expected to support WebRTC. Maybe less supported in 
>>>>> traditional SIP bridges.
>>>> --A realistic solution. The base is already approved and is for a 
>>>> popular environment. Multi-party is briefly mentioned but should 
>>>> probably be a bit further specified. Should however not be the only 
>>>> solution. The RTP based solution is also needed.
>>>>>
>>>>> 3. SAVPF with NACK and RFC 4588 retransmission. I assume this can 
>>>>> be combined with OSRTP RFC 8643 for security negotiation. When the 
>>>>> immediate or early feedback option can be used, this method can 
>>>>> likely be used without redundancy to achieve a reliability 
>>>>> enhancement. That will not work well over networks with high 
>>>>> latency. Further study needed if redundancy or FEC is needed as 
>>>>> complement for high latency networks. Easy to achieve up to 5 
>>>>> simultaneously sending users.
>>>> --Increases complexity - not selected
>>>>>
>>>>> 4. (Not mentioned in the introduction above) Use RFC 4103 plus one 
>>>>> of the RTP based methods for multi-party source indication but just 
>>>>> increase redundancy to one original and three (instead of two) 
>>>>> redundant generations. Can easily be done if reliability increase 
>>>>> is really a concern. Has low overhead. Easily applicable to OSRTP 
>>>>> security, SIP conferencing model and ICE NAT traversal.
>>>> --Easily done by local recommendations if 3 generations redundancy 
>>>> (including the original) would not be felt sufficient somewhere.
>>>>>
>>>>>
>>>>> 5. Accept reliability that is quite good as it is with RTP with one 
>>>>> original and two redundant generations in the RFC 2198 - style ( 
>>>>> with one of the additional methods discussed for increasing 
>>>>> switching performance)
>>>>>
>>>> --Realistic and regarded sufficient. By move to a mixer method 
>>>> allowing 300 ms transmission interval, the protection against burtsy 
>>>> packet loss is quite good. Continue on this track.
>>>>
>>>>
>>>> The conclusion is reflected in version -01 of the draft, just published.
>>>>
>>>> Regards
>>>>
>>>> Gunnar
>>>>
>>>>
>>>>> Comments please so we can take a rapid decision and move on with 
>>>>> one solution.
>>>>>
>>>>> Regards
>>>>>
>>>>>
>>>>> Gunnar
>>>>>
>>>>>
>>>>>
>>>>>
>>>> --
>>>> Gunnar Hellström
>>>> GHAccess
>>>> gunnar.hellstrom@ghaccess.se <mailto:gunnar.hellstrom@ghaccess.se>
>>>>
>>>> _______________________________________________
>>>> Audio/Video Transport Core Maintenance
>>>> avt@ietf.org <mailto:avt@ietf.org>
>>>> https://www.ietf.org/mailman/listinfo/avt
>>>
>> -- 
>> Gunnar Hellström
>> GHAccess
>> gunnar.hellstrom@ghaccess.se
> 
> 
> _______________________________________________
> Audio/Video Transport Core Maintenance
> avt@ietf.org
> https://www.ietf.org/mailman/listinfo/avt
>