[TICTOC] Comments on Architecture doc

"Doug Arnold" <darnold@symmetricom.com> Wed, 30 July 2008 14:06 UTC

Return-Path: <tictoc-bounces@ietf.org>
X-Original-To: tictoc-archive@optimus.ietf.org
Delivered-To: ietfarch-tictoc-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 6B7F43A693B; Wed, 30 Jul 2008 07:06:20 -0700 (PDT)
X-Original-To: tictoc@core3.amsl.com
Delivered-To: tictoc@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id C0E703A6937 for <tictoc@core3.amsl.com>; Wed, 30 Jul 2008 07:06:18 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.505
X-Spam-Level:
X-Spam-Status: No, score=-1.505 tagged_above=-999 required=5 tests=[AWL=0.759, BAYES_00=-2.599, HTML_MESSAGE=0.001, IP_NOT_FRIENDLY=0.334]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NxNwMnY4NsKP for <tictoc@core3.amsl.com>; Wed, 30 Jul 2008 07:06:14 -0700 (PDT)
Received: from mail4.symmetricom.com (mail4.symmetricom.com [69.25.98.6]) by core3.amsl.com (Postfix) with SMTP id 2B44D3A693B for <tictoc@ietf.org>; Wed, 30 Jul 2008 07:06:14 -0700 (PDT)
X-ASG-Debug-ID: 1217426786-171300230000-4wH9i1
X-Barracuda-URL: http://192.168.10.95:80/cgi-bin/mark.cgi
Received: from sjowa.symmetricom.com (localhost [127.0.0.1]) by mail4.symmetricom.com (Spam Firewall) with ESMTP id 6FB05300580 for <tictoc@ietf.org>; Wed, 30 Jul 2008 07:06:26 -0700 (PDT)
Received: from sjowa.symmetricom.com ([192.168.10.41]) by mail4.symmetricom.com with ESMTP id XhaAKyWyRSdVqVan for <tictoc@ietf.org>; Wed, 30 Jul 2008 07:06:26 -0700 (PDT)
X-ASG-Whitelist: Client
Received: from sjmail2.symmetricom.com ([192.168.10.66]) by sjowa.symmetricom.com with Microsoft SMTPSVC(6.0.3790.3959); Wed, 30 Jul 2008 07:06:26 -0700
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
X-ASG-Orig-Subj: Comments on Architecture doc
Date: Wed, 30 Jul 2008 07:06:24 -0700
Message-ID: <E8FCF6A615F8334CBD7F2F792C2DF128C75E91@sjmail2.symmetricom.com>
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Thread-Topic: Comments on Architecture doc
Thread-Index: AcjyTXOEAEBE1h9SSSu1sjXU3aqo8g==
From: Doug Arnold <darnold@symmetricom.com>
To: tictoc@ietf.org
X-OriginalArrivalTime: 30 Jul 2008 14:06:26.0338 (UTC) FILETIME=[74A43020:01C8F24D]
X-Barracuda-Connect: UNKNOWN[192.168.10.41]
X-Barracuda-Start-Time: 1217426786
X-Barracuda-Virus-Scanned: by Symmetricom Spam Gateway at symmetricom.com
Subject: [TICTOC] Comments on Architecture doc
X-BeenThere: tictoc@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Timing over IP Connection and Transfer of Clock BOF <tictoc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/tictoc>, <mailto:tictoc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/tictoc>
List-Post: <mailto:tictoc@ietf.org>
List-Help: <mailto:tictoc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tictoc>, <mailto:tictoc-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============1724455013=="
Sender: tictoc-bounces@ietf.org
Errors-To: tictoc-bounces@ietf.org

 Comments on Architecture for the transmission of Timing over Packet
Networks: draft-stein-tictoc-modules-02.txt


1.	This document should have a section on timescales.

2.	This document sometimes uses server and master interchangeably,
and client and slave interchangeably. Master-slave protocols are
fundamentally different from client-server protocols.

3.	We need a better term for time-of-day than "wall clock". Wall
clock is likely to be mis-interpreted as inaccurate time.

4.	Master clocks do not always employ atomic clocks. A master clock
often has only an OCXO or TCXO.

5.	Section 2.2: Frequency transfer in not always done with a one
way protocol. In constrained networks two way protocols can be used.
Note that to select packets with the lowest delays for the servo loop we
will want a two way protocol.

6.	Section 2.4: PLLs as well as frequency synthesizers are used to
create additional frequencies.

7.	Section 3.1: Another challenge to the use of transparent clocks
is that they modify packets. This is a serious challenge for security.

8.	Section 3.1: Time distribution can in fact be done entirely in
multicast, such as in IEEE1588. However this is limited to networks
which can run multicast. There are also scaling issues with the
proliferation of multicast delay request and delay response messages,
unless the peer delay mechanism used.

9.	Section 3.1: The recent revision of IEEE1588 included many
enhancements and revisions, not all of which were related to the needs
of the telecommunications industry.

10.	Section 3.3: The presentation of time also includes the
generation of timing signals, for example IRIG-B.

11.	Section 4.1: Not all slaves are simple. Security mechanisms
should scale to allow equipment designers to make trade-offs between
computational complexity and security robustness.

//Doug Arnold

_______________________________________________
TICTOC mailing list
TICTOC@ietf.org
https://www.ietf.org/mailman/listinfo/tictoc