On 2013-04-12 14:08, Christian Vogler wrote:

    I hope you mean:
    - on the sender and receiver side I do modulo 2**31 arithmetic

    - on the sender side I limit the maximum random sequence restart
    number to 2**30.



actually yes, I do - but the difference between 2**31 and 2**30 is a cool billion, so wraparound really is never ever going to happen if the sender implements this strategy. Under these circumstances, doing modulo arithmetic is a mere precaution against clients that ignore this issue. I'm fine with specifying something re the wraparound in the standard, though - in fact, I would feel better if there were something.

Right, I agree, it is sufficient the way you state it.


-----------------------------------------
Looking at how others have handled wrap around issues, I found this exotic but relevant statement in RFC 3550 RTP section 4 on NTP wrap around:
----------------------------------------------------
The NTP timestamp will wrap around to zero some time in the year 2036, but for RTP purposes, only differences between pairs of NTP timestamps are used. So long as the pairs of timestamps can be assumed to be within 68 years of each other, using modular arithmetic for subtractions and comparisons makes the wraparound irrelevant.
------------------------------------------------------


So, we are in good company if we devote a few words to rare wrap-around issue prevention.

/Gunnar

Reply via email to