Hi Danny,
        Yes, we (Symmetricom) have tested this.  It does work.  It basically is 
what the 2step clock was designed for.  You create an event message (SYNC) and 
send it out.  As it gets transmitted, you record the actual time of 
transmission.  Then you follow up with a general message (FOLLOW UP) in which 
timing doesn't matter to send the corrected tx time.  The slave sees the follow 
up bit set in the SYNC message which tells the slave to wait for the follow up 
packet before processing the timestamp.

        This was designed as hardware wasn't available to insert timestamps 
accurately but it was/is relatively easy to tap the G/MII channel to see the 
packet flowing into the PHY.  Obviously, you need to correlate the packet with 
the timestamp which you can do by serializing transmission or looking at the 
frame.  This is part of the reasoning behind the draft in that, if the frame is 
encrypted, it makes it easier to identify if there is a bit set somewhere.  
 

Greg Dowd
gdowd at symmetricom dot com (antispam format)
Symmetricom, Inc.
www.symmetricom.com
"A clever person solves a problem.  A wise person avoids it." Albert Einstein


-----Original Message-----
From: [email protected] [mailto:[email protected]] On Behalf Of 
Danny Mayer
Sent: Thursday, October 13, 2011 5:08 PM
To: Kevin Gross
Cc: [email protected]; [email protected]; Cui Yang; David L. Mills
Subject: Re: [TICTOC] Review request for IPsec security for packet based 
synchronization (Yang Cui)

On 10/13/2011 2:28 PM, Kevin Gross wrote:
> Definitely important issues for some synchronization protocols but it
> seems though two-step 1588 would work through such a connection. The
> followup message will contain an accurate (and encrypted) timestamp.
> Encryption delays would not result in significant loss of accuracy with
> respect to an unencrypted connection also using two step.
> 

Has anyone tested or measured that? I have not seen any information how
this will work without losing accuracy. Don't forget the followon
message will also have to be encrypted and decrypted when sent making
for additional uncertainties and errors. I have not reviewed how the
two-step IEEE 1588 protocol works so I don't have a good understanding
of the effects of IPsec encryption on such packets.

Danny
> Kevin Gross
> 
> On Thu, Oct 13, 2011 at 8:43 AM, Danny Mayer <[email protected]
> <mailto:[email protected]>> wrote:
> 
>     On 9/18/2011 9:41 PM, Cui Yang wrote:
> 
> 
>     IEEE-1588 (PTP) also cannot benefit from this as it is basically a
>     hardware-stamping protocol and now you are routing it through a software
>     tunnel which means it has to be timestamped before it is IPsec
>     encapsulated which decreases it's accuracy. It's no longer on-wire.
> 
> 

_______________________________________________
TICTOC mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/tictoc
_______________________________________________
IPsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to