Real-time Ethernet on IEEE 802.3 Networks Tutorial

undefined
J
o
i
n
t
 
T
u
t
o
r
i
a
l
I
E
E
E
 
8
0
2
.
3
b
r
T
F
 
I
n
t
e
r
s
p
e
r
s
i
n
g
 
e
x
p
r
e
s
s
 
t
r
a
f
f
i
c
 
(
I
E
T
)
L
u
d
w
i
g
 
W
i
n
k
e
l
,
 
S
i
e
m
e
n
s
 
A
G
a
n
d
I
E
E
E
 
8
0
2
.
1
 
T
i
m
e
 
s
e
n
s
i
t
i
v
e
 
N
e
t
w
o
r
k
i
n
g
 
(
T
S
N
)
M
i
c
h
a
e
l
 
J
o
h
a
s
 
T
e
n
n
e
r
,
 
B
r
o
a
d
c
o
m
IEEE 802.1 / IEEE 802.3 Tutorial #2,
March, 2015
Berlin, Germany
Title and presenters
T
I
T
L
E
 
O
F
 
T
U
T
O
R
I
A
L
:
R
e
a
l
-
t
i
m
e
 
E
t
h
e
r
n
e
t
 
o
n
 
I
E
E
E
 
8
0
2
.
3
 
N
e
t
w
o
r
k
s
N
A
M
E
 
O
F
 
P
R
E
S
E
N
T
E
R
S
,
 
T
H
E
I
R
 
A
F
F
L
I
A
T
I
O
N
S
A
N
D
 
C
O
N
T
A
C
T
 
I
N
F
O
:
Abstract
There have been multiple networks based on propriety
technology or specialized standards developed to
support carrying highly time sensitive traffic for
applications such industrial automation and
automotive control. Some of these are modified
Ethernet networks. The efforts in IEEE 802.1 Time
Sensitive Networking and P802.3br Interspersing
Express Traffic provide an example of bringing
together the requirements of those applications to
provide a standard network that can support traffic
requiring deterministic delivery time for real-time
communication along with traditional traffic. This
tutorial will cover the fundamentals of the projects and
how they work together to fulfill the requirements of
the various verticals.
Agenda
Welcome, Introduction (Michael, Ludwig) 5min
Recap of Geneva Tutorial (Ludwig) 5min
Project time lines (Michael, Ludwig) 5min
Architectural Options/System Overview (Norm) 30min
Enhancing IEEE 802.1Q tool set
Interspersing Express Traffic (Pat) 30min
Preemption for Ethernet
Conclusion,Q&A/Discussion (Michael, Ludwig) 15min
Recap of Geneva Tutorial
Presented by Ludwig or Mike
P
o
t
e
n
t
i
a
l
 
M
a
r
k
e
t
s
 
S
e
r
v
e
d
 
b
y
 
I
E
T
Industrial
Automation
A
s
s
e
t
O
p
t
i
m
i
z
a
t
i
o
n
High Traffic Mix,
Deterministic, Low
Latency, Secure,
Reliable, High
Throughput
Network Complexity
Functional Complexity
Networked 
Controls
Era
Sensor/Actuator
Networks
Cloud
Architecture
Era
Network
Fabrics
Functional Complexity
Time Line
Virtualization
Control Function and Network Complexity Progression
Discrete
Controls
Era
2013
Control Systems in all market sectors perpetually increase in functional complexity.
Communications complexity limits functional capability.
Advanced communications architectures enable advances in controls.
Application Protocols for Control
Note: There are many other proprietary protocols not on this list
Why Converged Traffic Networks
T2
Slot
T1
T2
low
High
Minimizing 
Interference
T1
Slot
None time slotted traffic
Time Cyclic
Control Traffic
None Real time Traffic
Logging
Alerting
Real time – non cyclic Traffic
Critical Alarms
Discrete/event control
Why one single Network for all
Communication Services
O
n
l
y
 
o
n
e
 
n
e
t
w
o
r
k
 
m
e
a
n
s
:
-
Reduced possibility of network failures
-
wire breaks, reduced confusion in case of maintenance
-
Reduced installation costs
-
fewer cables and connectors, lower installed costs and faster startups
-
Enables smaller devices
-
reduced space for connectors, lower power consumption (only half the number
of PHYs needed)
-
Reduced maintenance costs
-
easier to understand and to maintain, less personnel training
-
Only one interface in the devices
-
only one MAC address, only one IP address, easier to understand and to
maintain, easier coordination of the communication relations in the stack and
application layer in the devices, more direct access to data.
Summary: 
Industrial Requirements for
Interspersed Traffic
P
e
r
f
o
r
m
a
n
c
e
 
r
e
q
u
i
r
e
m
e
n
t
s
 
f
o
r
 
I
n
t
e
r
s
p
e
r
s
e
d
 
T
r
a
f
f
i
c
:
M
i
n
i
m
u
m
 
l
a
t
e
n
c
y
:
 
<
 
3
µ
s
e
c
 
m
a
x
 
p
e
r
 
h
o
p
 
a
c
c
u
m
u
l
a
t
e
d
 
l
a
t
e
n
c
y
 
(
G
E
 
 
m
i
n
f
r
a
m
e
)
 Guaranteed latency, low jitter
 Topology independent
 Typical data size (payload size): 40 - 300 bytes
 Range of transmission period: 31.25µs – 100ms and aperiodic
 Scheduled Traffic & Alarm has higher priority than Reserved Traffic and Best
Effort Traffic
 Low cost, Low power, Low complexity
* These are our best estimates derived from multiple use cases of the current and future
industrial applications.
Main Benefits of IET
Better network utilization for scheduled
traffic (More capacity).
Lower latency for High Priority, critical
asynchronous (non-scheduled) traffic.
Lower cost and power consumption (for
equivalent performance).
Better environmental characteristics.
Project time lines, 
Work plan
Work plan IEEE 802-3br:
TF review in Dec 2014 done
WG ballot in March 2015
Publication in 1Q/2016
Work plan IEEE 802-1Qbu:
TG review in Sep 2014
WG ballot in Jan 2015
Publication in Sep 2015
Architectural options / system
overview
Who, What, Why, How
Norman Finn
W
h
a
t
 
i
s
 
T
i
m
e
-
S
e
n
s
i
t
i
v
e
 
N
e
t
w
o
r
k
i
n
g
?
S
a
m
e
 
a
s
 
n
o
r
m
a
l
 
n
e
t
w
o
r
k
i
n
g
,
 
b
u
t
 
w
i
t
h
 
t
h
e
 
f
o
l
l
o
w
i
n
g
 
f
e
a
t
u
r
e
s
 
f
o
r
c
r
i
t
i
c
a
l
 
d
a
t
a
 
s
t
r
e
a
m
s
:
1.
T
i
m
e
 
s
y
n
c
h
r
o
n
i
z
a
t
i
o
n
 
f
o
r
 
n
e
t
w
o
r
k
 
n
o
d
e
s
 
a
n
d
 
h
o
s
t
s
 
t
o
 
b
e
t
t
e
r
t
h
a
n
 
1
 
µ
s
.
2.
S
o
f
t
w
a
r
e
 
f
o
r
 
r
e
s
o
u
r
c
e
 
r
e
s
e
r
v
a
t
i
o
n
 
f
o
r
 
c
r
i
t
i
c
a
l
 
d
a
t
a
 
s
t
r
e
a
m
s
(
b
u
f
f
e
r
s
 
a
n
d
 
s
c
h
e
d
u
l
e
r
s
 
i
n
 
n
e
t
w
o
r
k
 
n
o
d
e
s
 
a
n
d
 
b
a
n
d
w
i
d
t
h
 
o
n
l
i
n
k
s
)
,
 
v
i
a
 
c
o
n
f
i
g
u
r
a
t
i
o
n
,
 
m
a
n
a
g
e
m
e
n
t
,
 
a
n
d
/
o
r
 
p
r
o
t
o
c
o
l
 
a
c
t
i
o
n
.
3.
S
o
f
t
w
a
r
e
 
a
n
d
 
h
a
r
d
w
a
r
e
 
t
o
 
e
n
s
u
r
e
 
e
x
t
r
a
o
r
d
i
n
a
r
i
l
y
 
l
o
w
 
p
a
c
k
e
t
l
o
s
s
 
r
a
t
i
o
s
,
 
s
t
a
r
t
i
n
g
 
a
t
 
1
0
6
 
a
n
d
 
e
x
t
e
n
d
i
n
g
 
t
o
 
1
0
1
0
 
o
r
 
b
e
t
t
e
r
,
a
n
d
 
a
s
 
a
 
c
o
n
s
e
q
u
e
n
c
e
,
 
a
 
g
u
a
r
a
n
t
e
e
d
 
e
n
d
-
t
o
-
e
n
d
 
l
a
t
e
n
c
y
 
f
o
r
 
a
r
e
s
e
r
v
e
d
 
f
l
o
w
.
4.
C
o
n
v
e
r
g
e
n
c
e
 
o
f
 
c
r
i
t
i
c
a
l
 
d
a
t
a
 
s
t
r
e
a
m
s
 
a
n
d
 
o
t
h
e
r
 
Q
o
S
 
f
e
a
t
u
r
e
s
(
i
n
c
l
u
d
i
n
g
 
o
r
d
i
n
a
r
y
 
b
e
s
t
-
e
f
f
o
r
t
)
 
o
n
 
a
 
s
i
n
g
l
e
 
n
e
t
w
o
r
k
,
 
e
v
e
n
 
w
h
e
n
c
r
i
t
i
c
a
l
 
d
a
t
a
 
s
t
r
e
a
m
s
 
a
r
e
 
7
5
%
 
o
f
 
t
h
e
 
b
a
n
d
w
i
d
t
h
.
Two classes of bleeding-edge customers, Industrial
(including in-automobile) and Audio/Video.  Both have
moved into the digital world, and some are using packets,
but now they all realize they must move to Ethernet, and
most will move to the Internet Protocols.
1.
I
n
d
u
s
t
r
i
a
l
:
 
p
r
o
c
e
s
s
 
c
o
n
t
r
o
l
,
 
m
a
c
h
i
n
e
 
c
o
n
t
r
o
l
,
 
a
n
d
 
v
e
h
i
c
l
e
s
.
A
t
 
L
a
y
e
r
 
2
,
 
t
h
i
s
 
i
s
 
I
E
E
E
 
8
0
2
.
1
 
T
i
m
e
-
S
e
n
s
i
t
i
v
e
 
N
e
t
w
o
r
k
i
n
g
 
(
T
S
N
)
.
Data rate per stream very low, but can be large numbers of
streams.
Latency critical to meeting control loop frequency requirements.
2.
A
u
d
i
o
/
v
i
d
e
o
:
 
s
t
r
e
a
m
s
 
i
n
 
l
i
v
e
 
p
r
o
d
u
c
t
i
o
n
 
s
t
u
d
i
o
s
.
A
t
 
L
a
y
e
r
 
2
,
 
t
h
i
s
 
i
s
 
I
E
E
E
 
8
0
2
.
1
 
A
u
d
i
o
 
V
i
d
e
o
 
B
r
i
d
g
i
n
g
 
(
A
V
B
)
.
Not so many flows, but one flow is 3 Gb/s now, 12 Gb/s tomorrow.
Latency and jitter are important, as buffers are scarce at these
speeds.
(You won’t find any more market justification in this deck.)
W
h
y
 
s
u
c
h
 
a
 
l
o
w
 
p
a
c
k
e
t
 
l
o
s
s
 
r
a
t
i
o
?
Back-of-the-envelope calculations for big networks:
1.
I
n
d
u
s
t
r
i
a
l
:
A
u
t
o
m
o
t
i
v
e
 
f
a
c
t
o
r
y
 
f
l
o
o
r
:
 
1
0
0
0
 
n
e
t
w
o
r
k
s
 
 
1
0
0
0
0
 
p
a
c
k
e
t
s
/
s
/
n
e
t
w
o
r
k
 
1
0
0
,
0
0
0
 
s
/
d
a
y
 
=
 
1
0
1
2
 
p
a
c
k
e
t
s
/
d
a
y
.
Machine fails safe when 2 consecutive packets of a stream are lost.
A
t
 
a
 
r
a
n
d
o
m
 
l
o
s
s
 
r
a
t
i
o
 
o
f
 
1
0
6
,
 
1
0
1
2
 
i
s
 
c
h
a
n
c
e
 
o
f
 
2
 
c
o
n
s
e
c
u
t
i
v
e
 
l
o
s
s
e
s
.
1
0
1
2
 
p
a
c
k
e
t
s
/
d
a
y
 
 
1
0
1
2
 
2
-
l
o
s
s
 
r
a
t
i
o
 
=
 
1
 
p
r
o
d
u
c
t
i
o
n
 
l
i
n
e
 
h
a
l
t
/
d
a
y
.
In extreme cases, lost packets can damage equipment or require
expensive measures to protect people.
2.
A
u
d
i
o
 
v
i
d
e
o
 
p
r
o
d
u
c
t
i
o
n
:
 
(
n
o
t
 
d
i
s
t
r
i
b
u
t
i
o
n
)
1
0
1
0
 
b
/
s
 
 
1
0
 
p
r
o
c
e
s
s
i
n
g
 
s
t
e
p
s
 
 
1
0
0
0
 
s
/
s
h
o
w
 
=
 
1
0
1
4
 
b
i
t
s
 
=
 
1
0
1
0
 
p
a
c
k
e
t
s
.
Waiting for ACKs and retries = too many buffers, too much latency.
L
o
s
t
 
p
a
c
k
e
t
s
 
r
e
s
u
l
t
 
i
n
 
a
 
f
l
a
w
e
d
 
m
a
s
t
e
r
 
r
e
c
o
r
d
i
n
g
,
 
w
h
i
c
h
 
i
s
 
t
h
e
 
u
s
e
r
s
e
n
d
 
p
r
o
d
u
c
t
.
H
o
w
 
s
u
c
h
 
a
 
l
o
w
 
p
a
c
k
e
t
 
l
o
s
s
 
r
a
t
i
o
?
1.
Z
e
r
o
 
c
o
n
g
e
s
t
i
o
n
 
l
o
s
s
.
This requires reserving resources along the path.  (Think, “IntServ” and
“RSVP”)  You cannot guarantee anything if you cannot say, “No.”
This requires hardware in the form of buffers, shapers, and schedulers.
Overprovisioning not useful: its packet loss curve has a tail.
Circuits only scale by aggregation in to larger circuits.  ( MPLS? Others?)
0 congestion loss goes hand-in-hand with finite guaranteed latency.
2.
S
e
a
m
l
e
s
s
 
r
e
d
u
n
d
a
n
c
y
.
1+1 redundancy: Serialize packets, send on 2 (or more) fixed paths, then
combine and delete extras.  Paths are seldom automatically rerouted.
0 congestion loss 
means 
packet loss is failed equipment or cosmic rays.
Zero congestion loss satisfies some customers without seamless
redundancy.  The reverse is not true in a converged network—if there is
congestion on one path, congestion is likely on the other path, as well.
Why all the fuss?  You could just …
O
l
d
-
t
i
m
e
r
s
 
r
e
m
e
m
b
e
r
 
t
h
e
 
f
u
s
s
 
1
9
8
3
-
1
9
9
5
 
a
b
o
u
t
E
t
h
e
r
n
e
t
 
v
s
.
 
T
o
k
e
n
 
B
u
s
,
 
T
o
k
e
n
 
R
i
n
g
,
 
a
n
d
 
o
t
h
e
r
 
m
o
r
e
d
e
t
e
r
m
i
n
i
s
t
i
c
 
v
e
r
s
i
o
n
s
 
o
f
 
I
E
E
E
 
8
0
2
 
w
i
r
e
d
 
m
e
d
i
a
.
E
t
h
e
r
n
e
t
 
w
o
n
.
 
 
O
n
e
 
c
o
u
l
d
 
a
r
g
u
e
 
t
h
a
t
 
t
h
i
s
 
T
S
N
 
s
t
u
f
f
s
o
u
n
d
s
 
l
i
k
e
 
t
h
e
 
s
a
m
e
 
a
r
g
u
m
e
n
t
.
 
 
S
o
,
 
w
h
a
t
s
 
d
i
f
f
e
r
e
n
t
b
e
s
i
d
e
s
,
 
T
h
a
t
 
w
a
s
 
t
h
e
n
,
 
t
h
i
s
 
i
s
 
n
o
w
?
1.
TSN stays within the 802.1/802.3 paradigm.
2.
Applications are more demanding of the network,
now.
3.
No IEEE 802 medium entirely captured the real-time
control applications that drive the present effort—they
went to non-802 (including non-packet) answers.
4.
Yes, Voice over IP works pretty well—except when it
doesn’t.  That’s a non-starter for these users.
5.
Too much data to overprovision.
Queuing models
The IEEE 802.1Q Queuing Model
IEEE 802.1 has an integrated set of queuing capabilities.
There are several capabilities, most familiar to all.
T
h
e
 
i
n
t
e
g
r
a
t
e
d
 
p
a
r
t
 
i
s
 
i
m
p
o
r
t
a
n
t
t
h
e
 
i
n
t
e
r
a
c
t
i
o
n
s
a
m
o
n
g
 
t
h
e
s
e
 
c
a
p
a
b
i
l
i
t
i
e
s
 
a
r
e
 
w
e
l
l
-
c
h
a
r
a
c
t
e
r
i
z
e
d
 
a
n
d
m
a
t
h
e
m
a
t
i
c
a
l
l
y
 
s
o
u
n
d
.
Priority queuing and weighted queuing
8
0
2
.
1
Q
-
1
9
9
8
:
 
S
t
r
i
c
t
 
P
r
i
o
r
i
t
y
8
0
2
.
1
Q
-
2
0
1
2
 
(
8
0
2
.
1
Q
a
z
)
 
a
d
d
s
 
w
e
i
g
h
t
e
d
 
q
u
e
u
e
s
.
 
 
T
h
i
s
s
t
a
n
d
a
r
d
 
p
r
o
v
i
d
e
s
 
s
t
a
n
d
a
r
d
 
m
a
n
a
g
e
m
e
n
t
 
h
o
o
k
s
 
f
o
r
w
e
i
g
h
t
e
d
 
p
r
i
o
r
i
t
y
 
q
u
e
u
e
s
 
w
i
t
h
o
u
t
 
o
v
e
r
-
s
p
e
c
i
f
y
i
n
g
 
t
h
e
d
e
t
a
i
l
s
.
Priority selection
1
0
2
3
4
5
6
7
Priority selection
1
0
2
3
4
5
6
7
Weighted
AVB shapers
8
0
2
.
1
Q
-
2
0
1
2
 
(
8
0
2
.
1
Q
a
t
)
 
a
d
d
s
 
c
r
e
d
i
t
-
b
a
s
e
d
 
s
h
a
p
e
r
s
 
 
 
 
.
 
 
S
h
a
p
e
d
q
u
e
u
e
s
 
h
a
v
e
 
h
i
g
h
e
r
 
p
r
i
o
r
i
t
y
 
t
h
a
n
 
u
n
s
h
a
p
e
d
 
q
u
e
u
e
s
.
 
 
T
h
e
 
s
h
a
p
i
n
g
s
t
i
l
l
 
g
u
a
r
a
n
t
e
e
s
 
b
a
n
d
w
i
d
t
h
 
t
o
 
t
h
e
 
h
i
g
h
e
s
t
 
u
n
s
h
a
p
e
d
 
p
r
i
o
r
i
t
y
 
(
7
)
.
The AVB shaper is similar to the typical run rate/burst rate shaper,
but with really useful mathematical properties.
Only parameter = bandwidth.
The impact on other queues of any number of adjacent shapers Is the
same as the impact of one shaper with the same total bandwidth.
Priority selection
1
0
4
5
6
7
2
3
Weighted
 Highest priority for shaped queues
Time-gated queues
8
0
2
.
1
Q
b
v
:
 
A
 
c
i
r
c
u
l
a
r
 
s
c
h
e
d
u
l
e
 
o
f
 
{
t
i
m
e
,
 
8
-
b
i
t
 
m
a
s
k
}
 
p
a
i
r
s
c
o
n
t
r
o
l
s
 
g
a
t
e
s
 
b
e
t
w
e
e
n
 
e
a
c
h
 
q
u
e
u
e
 
a
n
d
 
t
h
e
 
p
r
i
o
r
i
t
y
s
e
l
e
c
t
i
o
n
 
f
u
n
c
t
i
o
n
.
Priority selection
1
0
4
5
6
7
2
3
T
T
T
T
T
T
T
T
Operated by a repeating schedule
Weighted
Cyclic Queuing and Forwarding
8
0
2
.
1
Q
c
h
:
 
 
T
h
e
 
1
Q
b
v
 
t
i
m
e
 
g
a
t
e
d
 
q
u
e
u
e
s
 
a
r
e
 
u
s
e
d
 
t
o
c
r
e
a
t
e
 
d
o
u
b
l
e
 
b
u
f
f
e
r
s
 
(
t
w
o
 
p
a
i
r
s
,
 
2
3
 
a
n
d
 
4
5
,
 
s
h
o
w
n
 
i
n
t
h
i
s
 
e
x
a
m
p
l
e
)
If the wire length and bridge transit time are negligible compared
to the cycle time, double buffers are sufficient.
Priority selection
1
0
6
7
2
3
4
5
T
T
T
T
T
T
T
T
Alternately enable green and purple
 
Frames being received
 
Output in progress
For next cycle 
Dead-time pad
Shapers ensure fair access for 0, 1, 6, 7 traffic
Security and misbehavior
Security has traditionally been concerned with
P
r
i
v
a
c
y
:
 
H
i
d
i
n
g
 
t
h
e
 
d
a
t
a
 
f
r
o
m
 
i
n
t
r
u
d
e
r
s
A
u
t
h
e
n
t
i
c
a
t
i
o
n
:
 
E
n
s
u
r
i
n
g
 
t
h
a
t
 
t
h
e
 
d
a
t
a
 
i
s
 
n
o
t
 
a
l
t
e
r
e
d
.
B
u
t
 
n
o
w
,
 
p
r
o
p
e
r
 
o
p
e
r
a
t
i
o
n
 
d
e
p
e
n
d
s
 
u
p
o
n
 
t
h
e
 
t
r
a
n
s
m
i
s
s
i
o
n
 
t
i
m
i
n
g
,
 
a
s
w
e
l
l
 
a
s
 
t
h
e
 
c
o
n
t
e
n
t
s
,
 
o
f
 
a
 
p
a
c
k
e
t
.
T
h
e
 
o
n
l
y
 
d
i
f
f
e
r
e
n
c
e
 
b
e
t
w
e
e
n
 
a
 
m
a
l
i
c
i
o
u
s
 
i
n
t
r
u
d
e
r
 
a
n
d
 
a
 
s
o
f
t
w
a
r
e
 
b
u
g
,
m
i
s
c
o
n
f
i
g
u
r
a
t
i
o
n
,
 
o
r
 
h
a
r
d
w
a
r
e
 
f
a
i
l
u
r
e
 
i
s
 
i
n
t
e
n
t
,
 
n
o
t
 
r
e
s
u
l
t
.
For example, a “babbling idiot” sending extra data on a TSN priority can
cause the loss of packets from properly-behaving flows that share the
same output queue.
T
h
e
r
e
f
o
r
e
,
 
d
e
f
e
n
s
e
 
i
n
 
d
e
p
t
h
 
i
s
 
r
e
q
u
i
r
e
d
 
t
o
 
p
r
o
t
e
c
t
 
t
h
e
 
n
e
t
w
o
r
k
.
G
Per-stream filtering and policing
The priority and packet flow ID (circuit_identifier) select to which
Gate a frame is directed in P802.1Qci.
P
r
i
o
r
i
t
y
 
+
 
c
i
r
c
u
i
t
_
i
d
e
n
t
i
f
i
e
r
 
d
e
m
u
x
G
G
G
G
G
G
G
G
G
G
G
A
p
p
l
i
e
s
 
t
o
 
f
r
a
m
e
s
c
o
m
i
n
g
 
u
p
 
t
h
e
 
s
t
a
c
k
,
n
o
t
 
d
o
w
n
.
Each Gate can have:
1.
A
 
p
a
s
s
 
/
 
d
o
n
t
 
p
a
s
s
 
s
w
i
t
c
h
.
 
 
(
M
a
y
 
b
e
 
t
i
m
e
s
c
h
e
d
u
l
e
d
)
2.
A
 
s
t
a
n
d
a
r
d
 
8
0
2
.
1
Q
 
p
o
l
i
c
i
n
g
 
f
u
n
c
t
i
o
n
.
3.
C
o
u
n
t
e
r
s
 
o
f
 
f
r
a
m
e
s
:
 
e
.
g
.
 
p
a
s
s
e
d
,
 
m
a
r
k
e
d
 
d
o
w
n
,
a
n
d
 
d
i
s
c
a
r
d
e
d
.
4.
A Service Class or priority output specifyer (TBD)
5.
Filters, e.g. max frame size.
Preempting a non-time-critical frame with a low-latency frame
does get the low-latency frame out, sooner.
But, in many networks of interest, there are many conflicting low-
latency frames—and the preemption of the non-time-critical
frame only helps the first one.
Scheduling the time-critical frames’ transmission (P802.1Qbv)
gives almost 0 jitter and guarantees end-to-end latency.  These
scheduled transmissions are the “rocks” around which a time-
critical application is built.
Interspersed Express Traffic
IET is critical for convergence; non-scheduled does not
mean “unimportant”.
S
c
h
e
d
u
l
e
d
 
r
o
c
k
s
 
o
f
 
c
r
i
t
i
c
a
l
 
p
a
c
k
e
t
s
 
i
n
 
e
a
c
h
 
c
y
c
l
e
:
C
o
n
f
l
i
c
t
 
e
x
c
e
s
s
i
v
e
l
y
 
w
i
t
h
 
n
o
n
-
g
u
a
r
a
n
t
e
e
d
 
p
a
c
k
e
t
 
r
o
c
k
s
:
P
r
o
b
l
e
m
 
s
o
l
v
e
d
 
b
y
 
p
r
e
e
m
p
t
i
v
e
 
s
a
n
d
 
b
e
t
w
e
e
n
 
t
h
e
 
r
o
c
k
s
.
1
2
2
2
1
2
3
3
But wait!  There’s more!
As a consequence of the above, you also get …
C
u
t
-
t
h
r
o
u
g
h
 
f
o
r
w
a
r
d
i
n
g
:
 
T
h
e
 
s
c
h
e
d
u
l
i
n
g
 
t
o
o
l
s
 
m
e
n
t
i
o
n
e
d
,
a
b
o
v
e
,
 
a
l
l
o
w
 
o
n
e
 
t
o
 
g
u
a
r
a
n
t
e
e
 
s
c
h
e
d
u
l
e
d
 
c
u
t
-
t
h
r
o
u
g
h
 
f
o
r
w
a
r
d
i
n
g
o
p
p
o
r
t
u
n
i
t
i
e
s
 
f
o
r
 
p
r
e
d
i
c
t
a
b
l
e
 
u
l
t
r
a
-
l
o
w
-
l
a
t
e
n
c
y
 
p
a
c
k
e
t
s
.
I
n
t
e
n
t
i
o
n
a
l
 
b
u
f
f
e
r
i
n
g
 
d
e
l
a
y
s
:
 
T
i
m
e
-
s
c
h
e
d
u
l
e
d
 
t
r
a
n
s
m
i
s
s
i
o
n
s
c
a
n
 
i
n
t
e
n
t
i
o
n
a
l
l
y
 
d
e
l
a
y
i
n
g
 
t
r
a
n
s
m
i
s
s
i
o
n
s
 
i
n
 
o
r
d
e
r
 
t
o
 
g
u
a
r
a
n
t
e
e
b
o
t
h
 
a
 
m
i
n
i
m
u
m
 
a
n
d
 
a
 
m
a
x
i
m
u
m
 
l
a
t
e
n
c
y
,
 
t
h
u
s
 
m
i
n
i
m
i
z
i
n
g
 
j
i
t
t
e
r
f
o
r
 
t
h
e
 
c
r
i
t
i
c
a
l
 
t
r
a
f
f
i
c
.
 
 
I
n
d
u
s
t
r
i
a
l
 
s
y
s
t
e
m
s
 
t
h
a
t
 
t
r
i
g
g
e
r
 
e
v
e
n
t
s
b
a
s
e
d
 
o
n
 
p
a
c
k
e
t
 
r
e
c
e
p
t
i
o
n
 
r
e
q
u
i
r
e
 
t
h
i
s
.
Current IEEE 802 Status
IEEE 802 standards now and coming
802.1 Audio Video Bridging is now the 
Time-Sensitive Networking TG
.
T
i
m
e
:
 
 
A
 
p
l
u
g
-
a
n
d
-
p
l
a
y
 
P
r
e
c
i
s
i
o
n
 
T
i
m
e
 
P
r
o
t
o
c
o
l
 
(
P
T
P
)
 
p
r
o
f
i
l
e
 
t
h
a
t
 
a
l
l
o
w
b
r
i
d
g
e
s
,
 
r
o
u
t
e
r
s
,
 
o
r
 
m
u
l
t
i
-
h
o
m
e
d
 
e
n
d
 
s
t
a
t
i
o
n
s
 
t
o
 
s
e
r
v
e
 
a
s
 
t
i
m
e
 
r
e
l
a
y
s
i
n
 
a
 
p
h
y
s
i
c
a
l
 
n
e
t
w
o
r
k
,
 
r
e
g
a
r
d
l
e
s
s
 
o
f
 
L
2
/
L
3
 
b
o
u
n
d
a
r
i
e
s
.
 
 
(
1
A
S
 
c
o
m
p
l
e
t
e
,
1
A
S
b
t
 
i
m
p
r
o
v
e
m
e
n
t
s
 
i
n
 
T
G
 
b
a
l
l
o
t
)
R
e
s
e
r
v
a
t
i
o
n
:
 
 
A
 
p
r
o
t
o
c
o
l
 
(
M
S
R
P
)
 
t
o
 
r
e
s
e
r
v
e
 
b
a
n
d
w
i
d
t
h
 
a
l
o
n
g
 
a
n
 
L
2
p
a
t
h
 
d
e
t
e
r
m
i
n
e
d
 
b
y
 
L
2
 
t
o
p
o
l
o
g
y
 
p
r
o
t
o
c
o
l
,
 
e
.
g
.
 
I
S
I
S
.
 
 
(
1
Q
a
t
 
c
o
m
p
l
e
t
e
,
1
Q
c
c
 
e
n
h
a
n
c
e
m
e
n
t
s
 
i
n
 
T
G
 
b
a
l
l
o
t
)
E
x
e
c
u
t
i
o
n
:
 
 
S
e
v
e
r
a
l
 
k
i
n
d
s
 
o
f
 
r
e
s
o
u
r
c
e
s
 
(
s
h
a
p
e
r
s
,
 
s
c
h
e
d
u
l
e
r
s
,
 
e
t
c
.
)
 
t
h
a
t
c
a
n
 
b
e
 
a
l
l
o
c
a
t
e
d
 
t
o
 
r
e
a
l
i
z
e
 
t
h
e
 
p
r
o
m
i
s
e
s
 
m
a
d
e
 
b
y
 
t
h
e
 
r
e
s
e
r
v
a
t
i
o
n
.
 
 
(
S
e
e
n
e
x
t
 
s
l
i
d
e
s
.
)
P
a
t
h
 
d
i
s
t
r
i
b
u
t
i
o
n
:
 
I
S
I
S
 
T
L
V
s
 
t
o
 
c
o
m
p
u
t
e
 
a
n
d
 
d
i
s
t
r
i
b
u
t
e
 
m
u
l
t
i
p
l
e
 
p
a
t
h
s
t
h
r
o
u
g
h
 
a
 
n
e
t
w
o
r
k
.
 
 
(
1
Q
c
a
 
i
n
 
s
p
o
n
s
o
r
 
b
a
l
l
o
t
)
S
e
a
m
l
e
s
s
 
R
e
d
u
n
d
a
n
c
y
:
 
1
+
1
 
d
u
p
l
i
c
a
t
i
o
n
 
f
o
r
 
r
e
l
i
a
b
i
l
i
t
y
.
 
 
(
1
C
B
 
i
n
 
T
G
b
a
l
l
o
t
)
IEEE 802 schedulers and shapers
A
V
B
 
C
r
e
d
i
t
-
B
a
s
e
d
 
S
h
a
p
e
r
:
 
 
S
i
m
i
l
a
r
 
t
o
 
t
h
e
 
t
y
p
i
c
a
l
 
r
u
n
 
r
a
t
e
/
b
u
r
s
t
 
r
a
t
e
s
h
a
p
e
r
,
 
b
u
t
 
w
i
t
h
 
r
e
a
l
l
y
 
u
s
e
f
u
l
 
m
a
t
h
e
m
a
t
i
c
a
l
 
p
r
o
p
e
r
t
i
e
s
.
 
(
1
Q
a
t
 
d
o
n
e
)
Only parameter = bandwidth.
The impact of any number of shapers = the impact of one shaper with the
same total bandwidth.
T
r
a
n
s
m
i
s
s
i
o
n
 
p
r
e
e
m
p
t
i
o
n
 
/
 
e
x
p
r
e
s
s
 
f
o
r
w
a
r
d
i
n
g
:
 
 
I
n
t
e
r
r
u
p
t
 
(
1
 
l
e
v
e
l
o
n
l
y
)
 
t
r
a
n
s
m
i
s
s
i
o
n
 
o
f
 
a
n
 
E
t
h
e
r
n
e
t
 
f
r
a
m
e
 
w
i
t
h
 
a
 
f
r
a
m
e
 
w
i
t
h
 
t
i
g
h
t
 
l
a
t
e
n
c
y
r
e
q
u
i
r
e
m
e
n
t
s
,
 
t
h
e
n
 
r
e
s
u
m
e
 
t
h
e
 
i
n
t
e
r
r
u
p
t
e
d
 
f
r
a
m
e
.
 
 
(
3
b
r
,
 
1
Q
b
u
 
T
G
b
a
l
l
o
t
)
T
i
m
e
 
s
c
h
e
d
u
l
e
d
:
 
 
E
v
e
r
y
 
b
r
i
d
g
e
 
p
o
r
t
 
r
u
n
s
 
a
 
s
y
n
c
h
r
o
n
i
z
e
d
,
 
r
e
p
e
a
t
i
n
g
s
c
h
e
d
u
l
e
 
t
h
a
t
 
t
u
r
n
s
 
o
n
 
a
n
d
 
o
f
f
 
e
a
c
h
 
o
f
 
t
h
e
 
8
 
q
u
e
u
e
s
 
w
i
t
h
 
u
p
 
t
o
n
a
n
o
s
e
c
o
n
d
 
p
r
e
c
i
s
i
o
n
.
 
 
(
1
Q
b
v
 
W
G
 
b
a
l
l
o
t
)
S
y
n
c
h
r
o
n
i
z
e
d
 
Q
u
e
u
i
n
g
 
a
n
d
 
F
o
r
w
a
r
d
i
n
g
:
 
E
v
e
r
y
 
f
l
o
w
 
p
r
o
c
e
e
d
s
 
i
n
l
o
c
k
-
s
t
e
p
p
e
d
 
t
r
a
n
s
m
i
s
s
i
o
n
 
c
y
c
l
e
s
,
 
l
i
k
e
 
a
r
t
e
r
i
a
l
 
b
l
o
o
d
.
 
 
(
1
Q
c
h
 
P
A
R
a
p
p
r
o
v
a
l
)
P
e
r
-
S
t
r
e
a
m
 
F
i
l
t
e
r
i
n
g
 
a
n
d
 
P
o
l
i
c
i
n
g
:
 
P
a
c
k
e
t
s
 
a
c
c
e
p
t
e
d
 
o
n
l
y
 
f
r
o
m
 
t
h
e
r
i
g
h
t
 
p
o
r
t
 
o
n
l
y
 
a
t
 
t
h
e
 
r
i
g
h
t
 
t
i
m
e
 
o
r
 
a
t
 
t
h
e
 
r
i
g
h
t
 
r
a
t
e
.
 
 
(
1
Q
c
i
 
P
A
R
 
a
p
p
r
o
v
a
l
)
Mixed L2/L3 need
Reference network
Controller
Talker
Listener
La
Ld
Lc
Bridges
Physical
connectivity
MultiLink
 subnet
L2
L2
L2
A
s
 
s
e
e
n
 
b
y
 
n
e
t
w
o
r
k
t
o
p
o
l
o
g
y
 
p
r
o
t
o
c
o
l
s
Gazillions of complex protocols
T
L3
Lb
routers
Network sizes vary from
~home to ~large but within 
one administrative domain.
Reference network
A
s
 
s
e
e
n
 
b
y
 
r
e
l
i
a
b
i
l
i
t
y
/
q
u
e
u
i
n
g
/
l
a
t
e
n
c
y
/
t
i
m
e
Just nodes, queues, clocks, and wires!!
Talker
Listener
Lb
Lc
T
Physical
connectivity
Queue
X
La
Clock
Ld
Summary
By means of resource reservation, via protocol, configuration, or
net management, time-critical traffic can be guaranteed a low,
finite end-to-end latency and extraordinarily low loss rate.
Preemption enables these guarantees to be made without
sacrificing the ability of the network to carry “ordinary” traffic, and
without compromising the promises made to time-critical traffic.
These features can, and should, work irrespective of L2/L3
boundaries, though of course, proper layering must be
respected.
Interspersing Express Traffic
Preemption for Ethernet
Pat Thaler
 IET Architecture
MAC Merge sublayer
Capability discovery without
negotiation
Preserves frame integrity
Is transparent to existing non-
deprecated PHYs above 10 Mb/s
Doesn’t change MAC operation
Minimizes impact on throughput
Provides lower latency for
express traffic
Provides cut-through for
scheduled traffic
Queuing Frames
Transmission Selection
MAC Control
MAC Merge Sublayer
PHY (unaware of preemption)
Express MAC
Preemptable MAC
MAC Control
MAC Merge Sublayer
MAC Merge sublayer
Transmit processing arbitrates between eMAC and pMAC transmit packets and
preempts if preemption capability is active.
Express filter sends express packets to eMAC
Receive Processing handles mPacket formats, checks fragments and sends to pMAC
Verification tests that the link can support preemption before preemption is activated
Express MAC (eMAC)
Premptable MAC (pMAC)
Physical Layer
Preemption capability disabled
Transmit processing
eMAC packets have priority over pMAC packets
They don’t preempt but if both have a frame ready to start, eMAC
packet is sent.
Preemptable mPacket formats aren’t used
Able to receive preemptable mPackets from link partner
If link partner preemption capability isn’t active, all packets received by
eMAC
Verification will respond to verify request from link partner
Receive Processing
Express Filter
Transmit
Processing
Verification
Preemption enabled, not active
Verification function attempts to verify link
preemption capability
Transmits a verify mPacket
Receipt of a response mPacket verifies the link and
preemption capability can go active
.
No change to Express Filter, Receive Processing or
Transmit Processing
Receive Processing
Express Filter
Transmit
Processing
Verification
Why verify?
A link partner’s preemption capability is discovered
through LLDP,
IEEE 802.1Q bridges don’t forward if the SA is nearest
bridge group address, but …
Some non-standard devices (e.g. buffered repeaters)
don’t block the address.
If such a device is between two ports, it may drop or alter
the preemptable mPackets.
Verify tests that the link between to ports is able to carry
preemptable mPacket formats.
Networks that are fixed by design (e.g. automotive
networks) can disable verification.
Preemption Active
Transmit processing
Uses mPacket formats
Preempts preemptable packets if eMAC has a packet to send or
for a HOLD request.
Verification responds to verify requests
Receive Processing
Express Filter
Transmit
Processing
Verification
mPackets
Discovery and verification summary
Preemption capability independently
activated on each end.
Capability discovery – not negotiation.
Receiver is always ready for preemption
Receive Processing and Express Filter
behavior is the same regardless of whether
preemption capability is active.
Link ability to support preemption is
verified
MAC Merge Service Interface
Minimizing latency for scheduled tr
affic
Without Hold and Release
Preemption isn’t instantaneous.
Packets with less than min packet size left to
transmit or packets less than 123 octets can’t be
preempted.
In many use cases, this delay is short enough
but not in all cases.
pMAC tx
eMAC tx
MAC Merge tx
IPG
> Min mPacket left
MMSI Hold and Release
MAC Merge Service Interface primitive:
Primitive from the MAC Client to MAC Merge
sublayer
MM_CTL.request (hold_req)
hold_req takes one of 2 values: HOLD,
RELEASE
hold stops transmission from the pMAC –
preempting if preemption capability is active
release allows pMAC transmission.
With Hold and Release
Asserting MM_CTL.request (HOLD) a
guardband in advance of a scheduled express
traffic window ensures minimal latency (cut-
through) for express traffic
pMAC tx
eMAC tx
MAC Merge tx
IPG
> Min mPacket left
MAC Client schedule
Express traffic window
Guard
band
HOLD
RELEASE
MM_CTL.request
mPacket Formats
Reassembly error protection
Maintain Ethernet’s robust protection against
false packet acceptance
Detect any errors due to:
Up to 3 bit errors in mPacket format
Up to 3 lost fragments in a frame
Loss of last fragment of one frame and start of the
next frame.
By providing
Hamming distance of 4 between mPacket start
delimiters
Mod 4 fragment count
Mod 4 frame count
mPacket Format
Preamble
SFD
MAC DA
FCS
Ethertype
Data
MAC SA
MAC Frame
Express
Non-fragmented
Preemptable frame
M
C
R
C
 
i
s
 
t
h
e
 
C
R
C
 
o
f
 
a
n
o
n
-
f
i
n
a
l
 
f
r
a
g
m
e
n
t
.
Value is the same as
the FCS of the frame
bytes transmitted XOR
FFFF0000
MCRC indicates that
the frame has been
preempted
7
1
6
6
2
4
Last
Fragment
First
Fragment
Preamble
SMD-Sx
M
C
R
C
Data
7
1
4
MAC DA
Ethertype
MAC SA
6
6
2
L
e
g
e
n
d
:
Start mPacket delimiter (SMD)
SMD-E Express mPacket
SMD-Sx: Start Fragment
SMD-Cx: Continuation Fragment
Preamble
SMD-E
MAC DA
Ethertype
Data
MAC SA
7
1
6
6
2
FCS
7
1
6
6
2
Intermediate
Fragment
Preamble
SMD-Cx
Data
6
1
4
Frag Count
1
M
C
R
C
Fragmented
Preemptable
frame
Payload of
each fragment
(DATA plus
CRC) ≥ min
packet size
SMD and Frag Count encoding
mPacket summary
Protects against reassembly errors
Minimum impact on throughput
No extra overhead for un-preempted traffic
Maintains Ethernet IPG and minimum packet
size for compatibility with PHYs
Compatible with all Ethernet full-duplex PHY
standards operating at greater than 10 Mb/s
IET Summary
IET
Supports preemption without change to the
Ethernet MAC and PHYs
Maintains data integrity
Provides for capability discovery and
verification
Supplies a primitive to further reduce latency
for scheduled traffic
MACsec and Preemption
MACsec and preemption
A port may have one Secure Channel (SC) serving both the express
and preemptable traffic
Preemption may alter the arrival of the packets
Not the only case where this happens, e.g. a Secure Channel running between
Provider Bridging customer ports may reorder between priorities
SCs transition from one Secure Association (SA) to another
changing keys
A preemptable packet sent with the old key may complete after express frames
with a new key.
Not a problem – SAs are designed to overlap and the MACsec header
Association Number identifies the SA for the frame.
MACsec header contains a Packet Number (PN) to provide replay
protection
Default is strict replay protection
Out of order arrivals will be dropped
That would be a problem
MACsec/Preemption Solution Space
Non-zero replayWindow parameter
Packets are tested for
PN ≥ nextPN – replayWindow
If the test fails, packet is discarded
replayWindow default is 0 but it can be set higher to allow for
some out of order arrival
.
However it isn’t always possible to predict how large
replayWindow is needed to allow for the reordering and non-zero
replayWindow slightly reduces security
Use 2 Secure Connections
One for preemptable traffic and one for express
No reordering occurs within an SC and strict replay protection
can be used.
Per traffic class SC is being considered in 802.1AEcg
Conclusion
IEEE 802.1 Time Sensitive Networking and IEEE
802.3br Interspersing Express Traffic together
enable real time traffic on Ethernet
This supports applications such as
Industrial control systems
Automotive networks
Thus these applications can share a single network
with traditional Ethernet traffic
Slide Note
Embed
Share

This tutorial focuses on IEEE standards for real-time Ethernet networks, enabling deterministic delivery time for applications in industrial automation and automotive control. Key topics include IEEE 802.1 Time Sensitive Networking and P802.3br Interspersing Express Traffic projects, aiming to meet the requirements of various verticals by combining specialized standards with traditional traffic support.


Uploaded on Sep 13, 2024 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. Download presentation by click this link. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

E N D

Presentation Transcript


  1. Joint Tutorial IEEE 802.3br TF Interspersing express traffic (IET) Ludwig Winkel, Siemens AG and IEEE 802.1 Time sensitive Networking (TSN) Michael Johas Tenner, Broadcom IEEE 802.1 / IEEE 802.3 Tutorial #2, March, 2015 Berlin, Germany IEEE 802.3 TF IET / IEEE 802.1 TF TSN Tutorial #2 March 2015, Berlin Version 0.2 rev1 Page 1

  2. Title and presenters TITLE OF TUTORIAL: Real-time Ethernet on IEEE 802.3 Networks NAME OF PRESENTERS, THEIR AFFLIATIONS AND CONTACT INFO: Presenter(s) Name: Ludwig Winkel Michael J.Teener Norm Finn Pat Thaler Affiliation: Email Address: Siemens Broadcom Cisco Broadcom Ludwig.Winkel@Siemens.com mike@JOHASTEENER.COM nfinn@CISCO.COM pthaler@broadcom.com Panelists Siemens Hirschmann (Belden) b-plus GmbH Rockwell Automation Bosch albert.tretter@siemens.com Stephan.Kehrer@belden.com christian.boiger@b-plus.com ddbrandt@ra.rockwell.com Helge.Zinner@de.bosch.com Albert Tretter Stephan Kehrer Christian Boiger David Brandt Helge Zinner Version 1.0 Version 0.2 rev1 Page 2 Page 2 IEEE P802.3 Maintenance report July 2008 Plenary IEEE 802.3 TF IET / IEEE 802.1 TF TSN Tutorial #2 March 2015, Berlin

  3. Abstract There have been multiple networks based on propriety technology or specialized standards developed to support carrying highly time sensitive traffic for applications such industrial automation and automotive control. Some of these are modified Ethernet networks. The efforts in IEEE 802.1 Time Sensitive Networking and P802.3br Interspersing Express Traffic provide an example of bringing together the requirements of those applications to provide a standard network that can support traffic requiring deterministic delivery time for real-time communication along with traditional traffic. This tutorial will cover the fundamentals of the projects and how they work together to fulfill the requirements of the various verticals. Version 1.0 Version 0.2 rev1 Page 3 Page 3 IEEE P802.3 Maintenance report July 2008 Plenary IEEE 802.3 TF IET / IEEE 802.1 TF TSN Tutorial #2 March 2015, Berlin

  4. Agenda Welcome, Introduction (Michael, Ludwig) 5min Recap of Geneva Tutorial (Ludwig) 5min Project time lines (Michael, Ludwig) 5min Architectural Options/System Overview (Norm) 30min Enhancing IEEE 802.1Q tool set Interspersing Express Traffic (Pat) 30min Preemption for Ethernet Conclusion,Q&A/Discussion (Michael, Ludwig) 15min Version 1.0 Version 0.2 rev1 Page 4 Page 4 IEEE P802.3 Maintenance report July 2008 Plenary IEEE 802.3 TF IET / IEEE 802.1 TF TSN Tutorial #2 March 2015, Berlin

  5. Recap of Geneva Tutorial Presented by Ludwig or Mike Version 1.0 Version 0.2 rev1 Page 5 Page 5 IEEE P802.3 Maintenance report July 2008 Plenary IEEE 802.3 TF IET / IEEE 802.1 TF TSN Tutorial #2 March 2015, Berlin

  6. Potential Markets Served by IET Industrial Automation High Traffic Mix, Deterministic, Low Latency, Secure, Reliable, High Throughput Asset Optimization Version 1.0 Version 0.2 rev1 Page 6 Page 6 IEEE P802.3 Maintenance report July 2008 Plenary IEEE 802.3 TF IET / IEEE 802.1 TF TSN Tutorial #2 March 2015, Berlin

  7. Control Function and Network Complexity Progression Virtualization Network Complexity Functional Complexity Network Fabrics Discrete Controls Era Networked Controls Era Functional Complexity Sensor/Actuator Networks Cloud Architecture Era Time Line 2013 Control Systems in all market sectors perpetually increase in functional complexity. Communications complexity limits functional capability. Advanced communications architectures enable advances in controls. Version 1.0 Version 0.2 rev1 Page 7 Page 7 IEEE P802.3 Maintenance report July 2008 Plenary IEEE 802.3 TF IET / IEEE 802.1 TF TSN Tutorial #2 March 2015, Berlin

  8. Application Protocols for Control Motion Industrial Transportation Distribution Modbus TCP ARINC 664 IEC 61850 Ethercat SERCOS III OPC Flexray IEC 60870 AS6802 (TTE) Profinet DNP 3.0 Powerlink Foundation Fieldbus HSE Profinet IRT CAN SynqNet Ethernet/IP MOST IEEE 1588 NTP Note: There are many other proprietary protocols not on this list Version 1.0 Version 0.2 rev1 Page 8 Page 8 IEEE P802.3 Maintenance report July 2008 Plenary IEEE 802.3 TF IET / IEEE 802.1 TF TSN Tutorial #2 March 2015, Berlin

  9. Why Converged Traffic Networks Minimizing Interference T2 T1 High low T2 Slot T1 Slot None time slotted traffic Time Cyclic Control Traffic Real time non cyclic Traffic Critical Alarms Discrete/event control None Real time Traffic Logging Alerting Version 1.0 Version 0.2 rev1 Page 9 Page 9 IEEE P802.3 Maintenance report July 2008 Plenary IEEE 802.3 TF IET / IEEE 802.1 TF TSN Tutorial #2 March 2015, Berlin

  10. Why one single Network for all Communication Services Only one network means: - Reduced possibility of network failures - wire breaks, reduced confusion in case of maintenance - Reduced installation costs - fewer cables and connectors, lower installed costs and faster startups - Enables smaller devices - reduced space for connectors, lower power consumption (only half the number of PHYs needed) - Reduced maintenance costs - easier to understand and to maintain, less personnel training - Only one interface in the devices - only one MAC address, only one IP address, easier to understand and to maintain, easier coordination of the communication relations in the stack and application layer in the devices, more direct access to data. Version 1.0 Version 0.2 rev1 Page 10 Page 10 IEEE P802.3 Maintenance report July 2008 Plenary IEEE 802.3 TF IET / IEEE 802.1 TF TSN Tutorial #2 March 2015, Berlin

  11. Summary: Industrial Requirements for Interspersed Traffic Performance requirements for Interspersed Traffic: Minimum latency: < 3 sec max per hop accumulated latency (GE min frame) Guaranteed latency, low jitter Topology independent Typical data size (payload size): 40 - 300 bytes Range of transmission period: 31.25 s 100ms and aperiodic Scheduled Traffic & Alarm has higher priority than Reserved Traffic and Best Effort Traffic Low cost, Low power, Low complexity * These are our best estimates derived from multiple use cases of the current and future industrial applications. Version 1.0 Version 0.2 rev1 Page 11 Page 11 IEEE P802.3 Maintenance report July 2008 Plenary IEEE 802.3 TF IET / IEEE 802.1 TF TSN Tutorial #2 March 2015, Berlin

  12. Main Benefits of IET Better network utilization for scheduled traffic (More capacity). Lower latency for High Priority, critical asynchronous (non-scheduled) traffic. Lower cost and power consumption (for equivalent performance). Better environmental characteristics. Version 1.0 Version 0.2 rev1 Page 12 Page 12 IEEE P802.3 Maintenance report July 2008 Plenary IEEE 802.3 TF IET / IEEE 802.1 TF TSN Tutorial #2 March 2015, Berlin

  13. Project time lines, Work plan Work plan IEEE 802-3br: TF review in Dec 2014 done WG ballot in March 2015 Publication in 1Q/2016 Work plan IEEE 802-1Qbu: TG review in Sep 2014 WG ballot in Jan 2015 Publication in Sep 2015 Version 1.0 Version 0.2 rev1 Page 13 Page 13 IEEE P802.3 Maintenance report July 2008 Plenary IEEE 802.3 TF IET / IEEE 802.1 TF TSN Tutorial #2 March 2015, Berlin

  14. Architectural options / system overview Who, What, Why, How Norman Finn Version 1.0 Version 0.2 rev1 Page 14 Page 14 IEEE P802.3 Maintenance report July 2008 Plenary IEEE 802.3 TF IET / IEEE 802.1 TF TSN Tutorial #2 March 2015, Berlin

  15. What is Time-Sensitive Networking? Same as normal networking, but with the following features for critical data streams: 1. Time synchronization for network nodes and hosts to better than 1 s. 2. Software for resource reservation for critical data streams (buffers and schedulers in network nodes and bandwidth on links), via configuration, management, and/or protocol action. 3. Software and hardware to ensure extraordinarily low packet loss ratios, starting at 10 6 and extending to 10 10 or better, and as a consequence, a guaranteed end-to-end latency for a reserved flow. 4. Convergence of critical data streams and other QoS features (including ordinary best-effort) on a single network, even when critical data streams are 75% of the bandwidth. Version 1.0 Version 0.2 rev1 Page 15 Page 15 IEEE P802.3 Maintenance report July 2008 Plenary IEEE 802.3 TF IET / IEEE 802.1 TF TSN Tutorial #2 March 2015, Berlin

  16. Who needs Time-Sensitive Networking? Two classes of bleeding-edge customers, Industrial (including in-automobile) and Audio/Video. Both have moved into the digital world, and some are using packets, but now they all realize they must move to Ethernet, and most will move to the Internet Protocols. 1. Industrial: process control, machine control, and vehicles. At Layer 2, this is IEEE 802.1 Time-Sensitive Networking (TSN). Data rate per stream very low, but can be large numbers of streams. Latency critical to meeting control loop frequency requirements. 2. Audio/video: streams in live production studios. At Layer 2, this is IEEE 802.1 Audio Video Bridging (AVB). Not so many flows, but one flow is 3 Gb/s now, 12 Gb/s tomorrow. Latency and jitter are important, as buffers are scarce at these speeds. (You won t find any more market justification in this deck.) Version 1.0 Version 0.2 rev1 Page 16 Page 16 IEEE P802.3 Maintenance report July 2008 Plenary IEEE 802.3 TF IET / IEEE 802.1 TF TSN Tutorial #2 March 2015, Berlin

  17. Why such a low packet loss ratio? Back-of-the-envelope calculations for big networks: 1. Industrial: Automotive factory floor: 1000 networks 10000 packets/s/network 100,000 s/day = 1012 packets/day. Machine fails safe when 2 consecutive packets of a stream are lost. At a random loss ratio of 10 6, 10 12 is chance of 2 consecutive losses. 1012 packets/day 10 12 2-loss ratio = 1 production line halt/day. In extreme cases, lost packets can damage equipment or require expensive measures to protect people. 2. Audio video production: (not distribution) 1010b/s 10 processing steps 1000 s/show = 1014 bits = 1010 packets. Waiting for ACKs and retries = too many buffers, too much latency. Lost packets result in a flawed master recording, which is the user s end product. Version 1.0 Version 0.2 rev1 Page 17 Page 17 IEEE P802.3 Maintenance report July 2008 Plenary IEEE 802.3 TF IET / IEEE 802.1 TF TSN Tutorial #2 March 2015, Berlin

  18. How such a low packet loss ratio? 1. Zero congestion loss. This requires reserving resources along the path. (Think, IntServ and RSVP ) You cannot guarantee anything if you cannot say, No. This requires hardware in the form of buffers, shapers, and schedulers. Overprovisioning not useful: its packet loss curve has a tail. Circuits only scale by aggregation in to larger circuits. ( MPLS? Others?) 0 congestion loss goes hand-in-hand with finite guaranteed latency. 2. Seamless redundancy. 1+1 redundancy: Serialize packets, send on 2 (or more) fixed paths, then combine and delete extras. Paths are seldom automatically rerouted. 0 congestion loss means packet loss is failed equipment or cosmic rays. Zero congestion loss satisfies some customers without seamless redundancy. The reverse is not true in a converged network if there is congestion on one path, congestion is likely on the other path, as well. Version 1.0 Version 0.2 rev1 Page 18 Page 18 IEEE P802.3 Maintenance report July 2008 Plenary IEEE 802.3 TF IET / IEEE 802.1 TF TSN Tutorial #2 March 2015, Berlin

  19. Why all the fuss? You could just Old-timers remember the fuss 1983-1995 about Ethernet vs. Token Bus, Token Ring, and other more deterministic versions of IEEE 802 wired media. Ethernet won. One could argue that this TSN stuff sounds like the same argument. So, what s different besides, That was then, this is now ? 1. TSN stays within the 802.1/802.3 paradigm. 2. Applications are more demanding of the network, now. 3. No IEEE 802 medium entirely captured the real-time control applications that drive the present effort they went to non-802 (including non-packet) answers. 4. Yes, Voice over IP works pretty well except when it doesn t. That s a non-starter for these users. 5. Too much data to overprovision. Version 1.0 Version 0.2 rev1 Page 19 Page 19 IEEE P802.3 Maintenance report July 2008 Plenary IEEE 802.3 TF IET / IEEE 802.1 TF TSN Tutorial #2 March 2015, Berlin

  20. Queuing models Version 1.0 Version 0.2 rev1 Page 20 Page 20 IEEE P802.3 Maintenance report July 2008 Plenary IEEE 802.3 TF IET / IEEE 802.1 TF TSN Tutorial #2 March 2015, Berlin

  21. The IEEE 802.1Q Queuing Model IEEE 802.1 has an integrated set of queuing capabilities. There are several capabilities, most familiar to all. The integrated part is important the interactions among these capabilities are well-characterized and mathematically sound. Version 1.0 Version 0.2 rev1 Page 21 Page 21 IEEE P802.3 Maintenance report July 2008 Plenary IEEE 802.3 TF IET / IEEE 802.1 TF TSN Tutorial #2 March 2015, Berlin

  22. Priority queuing and weighted queuing 802.1Q-1998: Strict Priority 1 0 2 3 4 5 6 7 Priority selection 802.1Q-2012 (802.1Qaz) adds weighted queues. This standard provides standard management hooks for weighted priority queues without over-specifying the details. Weighted 1 0 2 3 4 5 6 7 Priority selection Version 1.0 Version 0.2 rev1 Page 22 Page 22 IEEE P802.3 Maintenance report July 2008 Plenary IEEE 802.3 TF IET / IEEE 802.1 TF TSN Tutorial #2 March 2015, Berlin

  23. AVB shapers 802.1Q-2012 (802.1Qat) adds credit-based shapers . Shaped queues have higher priority than unshaped queues. The shaping still guarantees bandwidth to the highest unshaped priority (7). Highest priority for shaped queues Weighted 1 0 4 5 6 7 2 3 Priority selection The AVB shaper is similar to the typical run rate/burst rate shaper, but with really useful mathematical properties. Only parameter = bandwidth. The impact on other queues of any number of adjacent shapers Is the same as the impact of one shaper with the same total bandwidth. Version 1.0 Version 0.2 rev1 Page 23 Page 23 IEEE P802.3 Maintenance report July 2008 Plenary IEEE 802.3 TF IET / IEEE 802.1 TF TSN Tutorial #2 March 2015, Berlin

  24. Time-gated queues 802.1Qbv: A circular schedule of {time, 8-bit mask} pairs controls gates between each queue and the priority selection function. Weighted 1 0 4 5 6 7 2 3 Operated by a repeating schedule T T T T T T T T Priority selection Version 1.0 Version 0.2 rev1 Page 24 Page 24 IEEE P802.3 Maintenance report July 2008 Plenary IEEE 802.3 TF IET / IEEE 802.1 TF TSN Tutorial #2 March 2015, Berlin

  25. Cyclic Queuing and Forwarding 802.1Qch: The 1Qbv time gated queues are used to create double buffers (two pairs, 2 3 and 4 5, shown in this example) Shapers ensure fair access for 0, 1, 6, 7 traffic 1 0 6 7 2 3 4 5 Alternately enable green and purple T T T T T T T T Priority selection If the wire length and bridge transit time are negligible compared to the cycle time, double buffers are sufficient. Frames being received Dead-time pad For next cycle Output in progress Version 1.0 Version 0.2 rev1 Page 25 Page 25 IEEE P802.3 Maintenance report July 2008 Plenary IEEE 802.3 TF IET / IEEE 802.1 TF TSN Tutorial #2 March 2015, Berlin

  26. Security and misbehavior Security has traditionally been concerned with Privacy: Hiding the data from intruders Authentication: Ensuring that the data is not altered. But now, proper operation depends upon the transmission timing, as well as the contents, of a packet. The only difference between a malicious intruder and a software bug, misconfiguration, or hardware failure is intent, not result. For example, a babbling idiot sending extra data on a TSN priority can cause the loss of packets from properly-behaving flows that share the same output queue. Therefore, defense in depth is required to protect the network. Version 1.0 Version 0.2 rev1 Page 26 Page 26 IEEE P802.3 Maintenance report July 2008 Plenary IEEE 802.3 TF IET / IEEE 802.1 TF TSN Tutorial #2 March 2015, Berlin

  27. Per-stream filtering and policing Applies to frames coming up the stack, not down. G G G G G G G G G G G Priority + circuit_identifier demux The priority and packet flow ID (circuit_identifier) select to which Gate a frame is directed in P802.1Qci. Each Gate can have: 1. A pass / don t pass switch. (May be time scheduled) 2. A standard 802.1Q policing function. 3. Counters of frames: e.g. passed, marked down, and discarded. 4. A Service Class or priority output specifyer (TBD) 5. Filters, e.g. max frame size. IEEE 802.3 TF IET / IEEE 802.1 TF TSN Tutorial #2 March 2015, BerlinG 0 0 1 0 0 1 P 0 0 1 0 0 1 Version 1.0 Version 0.2 rev1 Page 27 Page 27 IEEE P802.3 Maintenance report July 2008 Plenary

  28. Interspersed Express Traffic Preempting a non-time-critical frame with a low-latency frame does get the low-latency frame out, sooner. But, in many networks of interest, there are many conflicting low- latency frames and the preemption of the non-time-critical frame only helps the first one. Scheduling the time-critical frames transmission (P802.1Qbv) gives almost 0 jitter and guarantees end-to-end latency. These scheduled transmissions are the rocks around which a time- critical application is built. Version 1.0 Version 0.2 rev1 Page 28 Page 28 IEEE P802.3 Maintenance report July 2008 Plenary IEEE 802.3 TF IET / IEEE 802.1 TF TSN Tutorial #2 March 2015, Berlin

  29. Interspersed Express Traffic IET is critical for convergence; non-scheduled does not mean unimportant . Scheduled rocks of critical packets in each cycle: Conflict excessively with non-guaranteed packet rocks: 1 2 2 2 Problem solved by preemptive sand between the rocks. 3 3 1 2 Version 1.0 Version 0.2 rev1 Page 29 Page 29 IEEE P802.3 Maintenance report July 2008 Plenary IEEE 802.3 TF IET / IEEE 802.1 TF TSN Tutorial #2 March 2015, Berlin

  30. But wait! Theres more! As a consequence of the above, you also get Cut-through forwarding: The scheduling tools mentioned, above, allow one to guarantee scheduled cut-through forwarding opportunities for predictable ultra-low-latency packets. Intentional buffering delays: Time-scheduled transmissions can intentionally delaying transmissions in order to guarantee both a minimum and a maximum latency, thus minimizing jitter for the critical traffic. Industrial systems that trigger events based on packet reception require this. Version 1.0 Version 0.2 rev1 Page 30 Page 30 IEEE P802.3 Maintenance report July 2008 Plenary IEEE 802.3 TF IET / IEEE 802.1 TF TSN Tutorial #2 March 2015, Berlin

  31. Current IEEE 802 Status Version 1.0 Version 0.2 rev1 Page 31 Page 31 IEEE P802.3 Maintenance report July 2008 Plenary IEEE 802.3 TF IET / IEEE 802.1 TF TSN Tutorial #2 March 2015, Berlin

  32. IEEE 802 standards now and coming 802.1 Audio Video Bridging is now the Time-Sensitive Networking TG. Time: A plug-and-play Precision Time Protocol (PTP) profile that allow bridges, routers, or multi-homed end stations to serve as time relays in a physical network, regardless of L2/L3 boundaries. (1AS complete, 1ASbt improvements in TG ballot) Reservation: A protocol (MSRP) to reserve bandwidth along an L2 path determined by L2 topology protocol, e.g. ISIS. (1Qat complete, 1Qcc enhancements in TG ballot) Execution: Several kinds of resources (shapers, schedulers, etc.) that can be allocated to realize the promises made by the reservation. (See next slides.) Path distribution: ISIS TLVs to compute and distribute multiple paths through a network. (1Qca in sponsor ballot) Seamless Redundancy: 1+1 duplication for reliability. (1CB in TG ballot) Version 1.0 Version 0.2 rev1 Page 32 Page 32 IEEE P802.3 Maintenance report July 2008 Plenary IEEE 802.3 TF IET / IEEE 802.1 TF TSN Tutorial #2 March 2015, Berlin

  33. IEEE 802 schedulers and shapers AVB Credit-Based Shaper: Similar to the typical run rate/burst rate shaper, but with really useful mathematical properties. (1Qat done) Only parameter = bandwidth. The impact of any number of shapers = the impact of one shaper with the same total bandwidth. Transmission preemption / express forwarding: Interrupt (1 level only) transmission of an Ethernet frame with a frame with tight latency requirements, then resume the interrupted frame. (3br, 1Qbu TG ballot) Time scheduled: Every bridge port runs a synchronized, repeating schedule that turns on and off each of the 8 queues with up to nanosecond precision. (1Qbv WG ballot) Synchronized Queuing and Forwarding: Every flow proceeds in lock-stepped transmission cycles, like arterial blood. (1Qch PAR approval) Per-Stream Filtering and Policing: Packets accepted only from the right port only at the right time or at the right rate. (1Qci PAR approval) Version 1.0 Version 0.2 rev1 Page 33 Page 33 IEEE P802.3 Maintenance report July 2008 Plenary IEEE 802.3 TF IET / IEEE 802.1 TF TSN Tutorial #2 March 2015, Berlin

  34. Mixed L2/L3 need Version 1.0 Version 0.2 rev1 Page 34 Page 34 IEEE P802.3 Maintenance report July 2008 Plenary IEEE 802.3 TF IET / IEEE 802.1 TF TSN Tutorial #2 March 2015, Berlin

  35. Reference network As seen by network topology protocols Controller Physical connectivity Network sizes vary from ~home to ~large but within one administrative domain. Listener La L2 Talker Lc L2 T MultiLink subnet L2 L3 routers Ld Lb Bridges Gazillions of complex protocols Version 1.0 Version 0.2 rev1 Page 35 Page 35 IEEE P802.3 Maintenance report July 2008 Plenary IEEE 802.3 TF IET / IEEE 802.1 TF TSN Tutorial #2 March 2015, Berlin

  36. Reference network As seen by reliability/ queuing/latency/time Listener X Physical connectivity Queue Clock La Talker Lc T Ld Lb Just nodes, queues, clocks, and wires!! Version 1.0 Version 0.2 rev1 Page 36 Page 36 IEEE P802.3 Maintenance report July 2008 Plenary IEEE 802.3 TF IET / IEEE 802.1 TF TSN Tutorial #2 March 2015, Berlin

  37. Summary By means of resource reservation, via protocol, configuration, or net management, time-critical traffic can be guaranteed a low, finite end-to-end latency and extraordinarily low loss rate. Preemption enables these guarantees to be made without sacrificing the ability of the network to carry ordinary traffic, and without compromising the promises made to time-critical traffic. These features can, and should, work irrespective of L2/L3 boundaries, though of course, proper layering must be respected. Version 1.0 Version 0.2 rev1 Page 37 Page 37 IEEE P802.3 Maintenance report July 2008 Plenary IEEE 802.3 TF IET / IEEE 802.1 TF TSN Tutorial #2 March 2015, Berlin

  38. Interspersing Express Traffic Preemption for Ethernet Pat Thaler Version 1.0 Version 0.2 rev1 Page 38 Page 38 IEEE P802.3 Maintenance report July 2008 Plenary IEEE 802.3 TF IET / IEEE 802.1 TF TSN Tutorial #2 March 2015, Berlin

  39. IET Architecture MAC Merge sublayer Capability discovery without negotiation Preserves frame integrity Is transparent to existing non- deprecated PHYs above 10 Mb/s Doesn t change MAC operation Minimizes impact on throughput Provides lower latency for express traffic Provides cut-through for scheduled traffic Queuing Frames Transmission Selection MAC Control MAC Control Express MAC Preemptable MAC MAC Merge Sublayer PHY (unaware of preemption) Version 1.0 Version 0.2 rev1 Page 39 Page 39 IEEE P802.3 Maintenance report July 2008 Plenary IEEE 802.3 TF IET / IEEE 802.1 TF TSN Tutorial #2 March 2015, Berlin

  40. MAC Merge Sublayer Version 1.0 Version 0.2 rev1 Page 40 Page 40 IEEE P802.3 Maintenance report July 2008 Plenary IEEE 802.3 TF IET / IEEE 802.1 TF TSN Tutorial #2 March 2015, Berlin

  41. MAC Merge sublayer Express MAC (eMAC) Premptable MAC (pMAC) Express Filter Verification Receive Processing Transmit Processing Physical Layer Transmit processing arbitrates between eMAC and pMAC transmit packets and preempts if preemption capability is active. Express filter sends express packets to eMAC Receive Processing handles mPacket formats, checks fragments and sends to pMAC Verification tests that the link can support preemption before preemption is activated Version 1.0 Version 0.2 rev1 Page 41 Page 41 IEEE P802.3 Maintenance report July 2008 Plenary IEEE 802.3 TF IET / IEEE 802.1 TF TSN Tutorial #2 March 2015, Berlin

  42. Preemption capability disabled Transmit Processing Express Filter Receive Processing Verification Transmit processing eMAC packets have priority over pMAC packets They don t preempt but if both have a frame ready to start, eMAC packet is sent. Preemptable mPacket formats aren t used Able to receive preemptable mPackets from link partner If link partner preemption capability isn t active, all packets received by eMAC Verification will respond to verify request from link partner Version 1.0 Version 0.2 rev1 Page 42 Page 42 IEEE P802.3 Maintenance report July 2008 Plenary IEEE 802.3 TF IET / IEEE 802.1 TF TSN Tutorial #2 March 2015, Berlin

  43. Preemption enabled, not active Transmit Processing Express Filter Receive Processing Verification Verification function attempts to verify link preemption capability Transmits a verify mPacket Receipt of a response mPacket verifies the link and preemption capability can go active. No change to Express Filter, Receive Processing or Transmit Processing Version 1.0 Version 0.2 rev1 Page 43 Page 43 IEEE P802.3 Maintenance report July 2008 Plenary IEEE 802.3 TF IET / IEEE 802.1 TF TSN Tutorial #2 March 2015, Berlin

  44. Why verify? A link partner s preemption capability is discovered through LLDP, IEEE 802.1Q bridges don t forward if the SA is nearest bridge group address, but Some non-standard devices (e.g. buffered repeaters) don t block the address. If such a device is between two ports, it may drop or alter the preemptable mPackets. Verify tests that the link between to ports is able to carry preemptable mPacket formats. Networks that are fixed by design (e.g. automotive networks) can disable verification. Version 1.0 Version 0.2 rev1 Page 44 Page 44 IEEE P802.3 Maintenance report July 2008 Plenary IEEE 802.3 TF IET / IEEE 802.1 TF TSN Tutorial #2 March 2015, Berlin

  45. Preemption Active Transmit Processing Express Filter Receive Processing Verification mPackets Transmit processing Uses mPacket formats Preempts preemptable packets if eMAC has a packet to send or for a HOLD request. Verification responds to verify requests Version 1.0 Version 0.2 rev1 Page 45 Page 45 IEEE P802.3 Maintenance report July 2008 Plenary IEEE 802.3 TF IET / IEEE 802.1 TF TSN Tutorial #2 March 2015, Berlin

  46. Discovery and verification summary Preemption capability independently activated on each end. Capability discovery not negotiation. Receiver is always ready for preemption Receive Processing and Express Filter behavior is the same regardless of whether preemption capability is active. Link ability to support preemption is verified Version 1.0 Version 0.2 rev1 Page 46 Page 46 IEEE P802.3 Maintenance report July 2008 Plenary IEEE 802.3 TF IET / IEEE 802.1 TF TSN Tutorial #2 March 2015, Berlin

  47. MAC Merge Service Interface Minimizing latency for scheduled traffic Version 1.0 Version 0.2 rev1 Page 47 Page 47 IEEE P802.3 Maintenance report July 2008 Plenary IEEE 802.3 TF IET / IEEE 802.1 TF TSN Tutorial #2 March 2015, Berlin

  48. Without Hold and Release pMAC tx eMAC tx > Min mPacket left MAC Merge tx IPG Preemption isn t instantaneous. Packets with less than min packet size left to transmit or packets less than 123 octets can t be preempted. In many use cases, this delay is short enough but not in all cases. Version 1.0 Version 0.2 rev1 Page 48 Page 48 IEEE P802.3 Maintenance report July 2008 Plenary IEEE 802.3 TF IET / IEEE 802.1 TF TSN Tutorial #2 March 2015, Berlin

  49. MMSI Hold and Release MAC Merge Service Interface primitive: Primitive from the MAC Client to MAC Merge sublayer MM_CTL.request (hold_req) hold_req takes one of 2 values: HOLD, RELEASE hold stops transmission from the pMAC preempting if preemption capability is active release allows pMAC transmission. Version 1.0 Version 0.2 rev1 Page 49 Page 49 IEEE P802.3 Maintenance report July 2008 Plenary IEEE 802.3 TF IET / IEEE 802.1 TF TSN Tutorial #2 March 2015, Berlin

  50. With Hold and Release MAC Client schedule Guard band Express traffic window MM_CTL.request HOLD RELEASE pMAC tx eMAC tx > Min mPacket left MAC Merge tx IPG Asserting MM_CTL.request (HOLD) a guardband in advance of a scheduled express traffic window ensures minimal latency (cut- through) for express traffic Version 1.0 Version 0.2 rev1 Page 50 Page 50 IEEE P802.3 Maintenance report July 2008 Plenary IEEE 802.3 TF IET / IEEE 802.1 TF TSN Tutorial #2 March 2015, Berlin

Related


More Related Content

giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#