Re: [Sframe] Proposal: SFrame && SPacket && !SIDU
Richard Barnes <rlb@ipv.sx> Tue, 07 September 2021 19:46 UTC
Return-Path: <rlb@ipv.sx>
X-Original-To: sframe@ietfa.amsl.com
Delivered-To: sframe@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 05DDA3A11F7 for <sframe@ietfa.amsl.com>; Tue, 7 Sep 2021 12:46:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.896
X-Spam-Level:
X-Spam-Status: No, score=-1.896 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=ipv-sx.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id c7Ltfuqwe60z for <sframe@ietfa.amsl.com>; Tue, 7 Sep 2021 12:46:16 -0700 (PDT)
Received: from mail-qk1-x72e.google.com (mail-qk1-x72e.google.com [IPv6:2607:f8b0:4864:20::72e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 68DF63A11F5 for <sframe@ietf.org>; Tue, 7 Sep 2021 12:46:16 -0700 (PDT)
Received: by mail-qk1-x72e.google.com with SMTP id f22so128894qkm.5 for <sframe@ietf.org>; Tue, 07 Sep 2021 12:46:16 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ipv-sx.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=+Kv8tfoiJl3mam66pZsi4ltEo00wcS0m3790BBCPmK8=; b=rg+oUjbx7Ir+rLEF7XHnH71zuaCNV/sQytd96MI8QnvQqO2DKOi357A95cvcMFg42v 8iqKP6bAgNrleXoM2fJG2ufmy2dWbu0iSkUsAN3Ypd7lHYJ0znWDTOsLQ4LK3fIIAUgB eTaBAEIwkYuHV4/A1n1snRYUG6AkDJIdhuQcg0WC6D6nMVIcmnSKDotC2KepEzfiLfY0 3ktW+60aPH7GxkDMob6Pdz6AvvFdgSOSasbTQ31XNzOK3lfFG256i7MuAwB8cw4RGrzh w5cKCe+EVubit3lDRHEP7KPLtZSKGSjp36MaKkV0zNNfUnGWKeij/uWAY5GXItb2urdd lr5w==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=+Kv8tfoiJl3mam66pZsi4ltEo00wcS0m3790BBCPmK8=; b=s7iuqzggO7q3bOW/3JkNUeiA03tWAkxxCLgthj9FBz+esdJcmHVeg4BYIuv52x/UX7 cYSUEWTh0K9EP5zSe8Hlz0OiYZbb8N/AKAZ6DgLZ+N7a9s4ktQ1lugjqHmkWgzw+HdIE R+07GgYefF//f+raa8ZmePMjCYFsh+y+W+jIGntRB1s1NyN01PKhoA+FmFeqfv9Szwlc 0X3OmYeVBpCX94+M6ggLN2qFZv4+QuhnhXhqALOgIfEfjzF0GLTOg3io9uhMJUiiI6mY JCjB5BFmnwuRNQCFmPLnzQPbA+RNJGv8wvWj84xuLTCGGU6s+FFr830Q+8HJKIZYTwPz 7suQ==
X-Gm-Message-State: AOAM53246kh82efNlKI71h8mCPkdLXXo8OonMWhAXhWGQg2v+V4tPVas Ota4x4lAhsVHgg/7c5OnMNHe11p4aBmMLybyzfzhuQ==
X-Google-Smtp-Source: ABdhPJyHz7ZDg5i3LhAVcwkRyuD6D6HQ+Qlx1zV4wBvNKPPg1EXknZYbJ6nhQ2QGKxDWw9thCyAkEWyyuMx8Q/JcDHs=
X-Received: by 2002:ae9:f701:: with SMTP id s1mr17659434qkg.223.1631043974271; Tue, 07 Sep 2021 12:46:14 -0700 (PDT)
MIME-Version: 1.0
References: <CAL02cgSytJSLPziTzTOAQZFke47YrhdS381b4OmqcMPM1=Nzbw@mail.gmail.com> <CANRTqcNATCQcSyTr9Vcs3Y9uMJ1f_4FDKGo6idF9D+9ae+SX9g@mail.gmail.com>
In-Reply-To: <CANRTqcNATCQcSyTr9Vcs3Y9uMJ1f_4FDKGo6idF9D+9ae+SX9g@mail.gmail.com>
From: Richard Barnes <rlb@ipv.sx>
Date: Tue, 07 Sep 2021 15:46:02 -0400
Message-ID: <CAL02cgRmgOn1bvzLY4aFojYh306O6-BxJ3B_5Agq5KVEypACSg@mail.gmail.com>
To: Sergio Garcia Murillo <sergio.garcia.murillo@cosmosoftware.io>
Cc: sframe@ietf.org
Content-Type: multipart/alternative; boundary="000000000000b32a7505cb6d0427"
Archived-At: <https://mailarchive.ietf.org/arch/msg/sframe/T_Z6t2x_Ijc9A20mRjbeKJFPbD4>
Subject: Re: [Sframe] Proposal: SFrame && SPacket && !SIDU
X-BeenThere: sframe@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Secure Media Frames <sframe.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sframe>, <mailto:sframe-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sframe/>
List-Post: <mailto:sframe@ietf.org>
List-Help: <mailto:sframe-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sframe>, <mailto:sframe-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 07 Sep 2021 19:46:22 -0000
I'm not totally sure what you mean by "spatial frames" here; looks like the notion varies some by codec. Assuming "spatial frames" are frames in the sense of "something that comes out of depacketizater", I think we're probably on the same page. Maybe it would be clearer to state the proposal as: Encryption is done in units of whole RTP payloads. One payload for SPacket; all payloads in the frame for SFrame. We would not support cases where an encrypted unit would span a partial RTP payload. For example: NOT OK Payload 1: First part of SFrame unit A Payload 2: Second part of A, first part of B Payload 3: Second part of B OK Payload 1: SFrame unit A Payload 2: First part of Sframe unit B Payload 3: Second part of B Does that line up with what you have in mind? --Richard On Mon, Sep 6, 2021 at 2:53 PM Sergio Garcia Murillo < sergio.garcia.murillo@cosmosoftware.io> wrote: > Hi Richard, > > Just one minor comment, the "media frames", should be spatial frames if > SVC is used so an SFU is able to not forward all spatial layers to the > receiver. Apart from that, I am ok with removing "SIDUs" from the scope. > > Best regards > Sergio > > On Thu, Sep 2, 2021 at 10:20 PM Richard Barnes <rlb@ipv.sx> wrote: > >> Hi folks, >> >> I'd like to see if we can agree to limit our scope a bit. There has been >> discussion of multiple levels at which SFrame could be applied: >> >> * "SFrame" - Whole media frames >> * "SPacket" - Individual RTP media payloads >> * "SIDU" - Some codec-specific "independently decodeable units" >> >> I'd like to propose that we take "SIDU" off of the table, but keep the >> other two. >> >> It seems like SFrame and SPacket both have strengths in certain scenarios >> (depending on how you want to trade off bandwidth vs. complexity), but >> they're both pretty straightforward in terms of how they integrate with the >> media processing pipeline. In particular, they don't have any >> codec-dependence. SIDU, by contrast, seems like a world of pain. It >> requires that the encryption scheme be entangled with the codec, which >> requires special per-codec integration logic in the specifications. And >> the bandwidth gains for all that complexity are not that large. >> >> Is there anyone here who feels that SIDU is something this group needs to >> spend time specifying? >> >> --Richard >> -- >> Sframe mailing list >> Sframe@ietf.org >> https://www.ietf.org/mailman/listinfo/sframe >> >
- [Sframe] Proposal: SFrame && SPacket && !SIDU Richard Barnes
- Re: [Sframe] Proposal: SFrame && SPacket && !SIDU Sergio Garcia Murillo
- Re: [Sframe] Proposal: SFrame && SPacket && !SIDU Richard Barnes
- Re: [Sframe] Proposal: SFrame && SPacket && !SIDU Justin Uberti
- Re: [Sframe] Proposal: SFrame && SPacket && !SIDU Richard Barnes
- Re: [Sframe] Proposal: SFrame && SPacket && !SIDU Richard Barnes
- Re: [Sframe] Proposal: SFrame && SPacket && !SIDU Justin Uberti
- Re: [Sframe] Proposal: SFrame && SPacket && !SIDU Justin Uberti