Hi Greg,

Thanks for your feedback.

> In NTP, the addition of an extension field requires the presence of the MAC.
[TM] According to RFC5905 "The extension fields are used to add optional 
capabilities, for example, the Autokey security protocol". So indeed, the only 
extension field currently defined is for security purposes, but the current 
draft proposes to use a newly defined extension field, independent of the MAC 
usage.

> How would this model work if the NTP packet did  have the MAC?
[TM] The current draft is more useful for cases where the MAC is not used, 
since this draft is about simplifying the implementation of intermediate nodes. 
When the MAC is used, it would mean that the intermediate node would have to 
compute the MAC, and only then to perform the Checksum update.

> If you define this simply at the edge, I'm not sure how much value this 
> additional UDP checksum update adds?  Is there a model you have in mind?
[TM] The idea is that the intermediate node (an ASIC/FPGA) assigns the packet's 
timestamp field, significantly improving the accuracy. The benefit of this 
improvement is negligible if the path between the NTP nodes consists of a large 
number of hops, BUT when there is a small number of hops this improvement is 
significant. An example use-case I have in mind is in the wireless backhaul, 
where the RBS and RNC synchronize over a CES, either using PTP or NTP. When NTP 
is used in this case, high precision is required, and can benefit from 
timestamping at the intermediate node.

Regards,
Tal.

From: Greg Dowd [mailto:[email protected]]
Sent: Monday, July 11, 2011 6:29 PM
To: Tal Mizrahi; [email protected]; [email protected]
Subject: RE: [TICTOC] [ntpwg] New draft: 
draft-mizrahi-tictoc-checksum-trailer-00

Is the use model you envision for NTP to support hardware timestamping at the 
edge?  In NTP, the addition of an extension field requires the presence of the 
MAC.  This requires the dissemination and maintenance of keys as well as the 
defined MAC checking.  How would this model work if the NTP packet did  have 
the MAC?  This extension field would be covered by the MAC and the 
authenticator would fail.  Or do you expect this block would have the key info 
and update the MAC as well?  And, how would it work if the MAC isn't there.  
Would the update not be used?

In PTP, there is a TC protocol function which necessitates the modification of 
the packet.  In NTP, as it is defined as a UDP protocol, there is not as clear 
a path to how lower stack layers modify the PDUs.

If you define this simply at the edge, I'm not sure how much value this 
additional UDP checksum update adds?  Is there a model you have in mind?




From: [email protected] [mailto:[email protected]] On Behalf Of Tal 
Mizrahi
Sent: Monday, July 04, 2011 5:01 AM
To: [email protected]; [email protected]
Subject: [TICTOC] [ntpwg] New draft: draft-mizrahi-tictoc-checksum-trailer-00

Hi,

I have posted a new draft that discusses Checksum updates in time 
synchronization protocols.
http://tools.ietf.org/html/draft-mizrahi-tictoc-checksum-trailer-00
Comments will be welcome.

Thanks.
Tal.
_______________________________________________
TICTOC mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/tictoc

Reply via email to