Documente Academic
Documente Profesional
Documente Cultură
Geoffrey
G
ff
M.
M Garner
G
Consultant
September 24, 2008
Outline - 1
Acknowledgment
A
k
l d
t
Purpose of IEEE 1588
Status and history of IEEE 1588
New features for Version 2
Overview of IEEE 1588 V2
Application
pp
service interface
Some basic PTP concepts and entities
Synchronization basics
Delay request-response mechanism
Peer delayy mechanism
2
9/24/2008
Outline - 2
3
9/24/2008
Outline - 3
Thi
This ttutorial
t i l iis an updated
d t d version
i off reference
f
5
4
9/24/2008
Acknowledgment
g
Th
The author
th would
ld lik
like tto acknowledge
k
l d and
d
thank John Eidson for having provided
references 2 4,
4 from which many of the
slides used here were taken or adapted.
5
9/24/2008
Purpose
p
of IEEE 1588
NETWORK
6
9/24/2008
9/24/2008
8
9/24/2008
9
9/24/2008
M
Means tto accumulate
l t cumulative
l ti ffrequency
scale factor offset relative to grandmaster
(experimental specification only)
11
9/24/2008
Clause
8
9
Definitions
10
Notation Convention
11
Data types
12
Description of PTP
13
protocol (Informative)
PTP entities
14
Purpose
Data sets
PTP protocol for ordinary
and boundary clocks
PTP protocol for
transparent clocks
Clock offset, path delay,
residence time, and
asymmetry corrections
Synchronization and
y
syntonization
Message formats
TLV entities
12
9/24/2008
19
Annex
A
B
Purpose
Using the PTP protocol
Timescales and epochs
Examples of residence
and asymmetry
corrections
Transport over UDP/IPv4
Compatibility (V1/V2 D
and V2/future
versions)
Conformance and PTP E
profiles
F
p over UDP/IPv6
Transport
Transport over IEEE
802 3/Ethernet
802.3/Ethernet
13
9/24/2008
Annex
L
I
J
K
Transport over
ControlNet
Transport over IEC
61158 Type 10
Default PTP profiles
Security protocol
( p
(experimental)
)
Purpose
Transport of cumulative
frequency scale factor
offset (experimental)
Bibliography
14
9/24/2008
Application Service
Interface
Thi
This is
i outside
t id the
th scope off IEEE 1588 (V1
and V2), and also outside the scope of this
tutorial
However, it cannot be ignored
15
9/24/2008
16
9/24/2008
19
9/24/2008
Sync
Delay_Req
Pdelay_Req
Pdelay_Resp
Follow_Up
Delay_Resp
y_
p
Pdelay_Resp_Follow_Up
Announce
Management
Signaling
20
9/24/2008
21
9/24/2008
Synchronization
y
Basics
St
Step 1:
1 Prior
P i tto synchronizing,
h i i
organize
i th
the clocks
l k
into a master-slave hierarchy (based on observing
the clock property information contained in
Announce messages)
Announce messages carry information used to
establish the master-slave hierarchy; they are not
used for synchronization
Grandmaster Clock
This clock
determines the time
base for the system
Slave to the
Grandmaster Clock
and Master to its
Slave
23
9/24/2008
t-ms
Slave
time
t1
Timestamps known
by slave
Sync
t 2 t2
Follow_Up
t3
Delay_Req
t-sm
t 1 , t2
t 1 , t2 , t3
t4
Delay_Resp
t 1 , t2 , t3 , t4
Grandmaster- M
S- BC - M
S- OC
24
9/24/2008
25
9/24/2008
One-step
p clock: the Sync
y egress
g
time stamp
p is
carried in the Sync message, and Follow_Up is
not sent
Two-step clock: the Sync egress time stamp is
carried in the Follow_Up message. This option is
useful in cases where it is not possible both to
achieve sufficient time stamp accuracy and place
the time stamp in the message as it is transmitted.
26
9/24/2008
Synchronization Basics
Peer Delay Mechanism - 1
Initially
Initially, consider the case where no
transparent clocks are present
Each slave synchronizes to its master using
Sync, possibly Follow_Up, Pdelay_Req,
Pdelay Resp and possibly
Pdelay_Resp,
Pdelay_Resp_Follow_Up messages
g between master and its slave
exchanged
Grandmaster Clock
This clock
determines the time
base for the system
Slave to the
Grandmaster Clock
and Master to its
Slave
27
9/24/2008
Synchronization Basics
Peer Delay Mechanism
t-ms
Master
time
t1
Slave
time Timestamps known
y slave
by
Sync
Follow_Up
Pdelay_Req
t-sm
t4
t5
t2 t2
t 1 , t2
t3 t3
Pdelay_Resp
Pdelay_Resp_Follow_Up
t6
t6
t3, t4, t5, t6
Grandmaster- M
S- BC - M
S- OC
28
9/24/2008
Synchronization Basics
Peer Delay Mechanism - 2
U
Under
d th
the assumption
ti th
thatt th
the lilink
k iis symmetric
ti
(i.e., propagation time from master to slave =
propagation time from slave to master)
Offset = t2 t1 (propagation time) = (t-ms) (propagation time)
(propagation time) = [(t4 t3) + (t6 t5)]/2
29
9/24/2008
Synchronization Basics
Peer Delay Mechanism - 3
Th
The peer d
delay
l mechanism
h i
iis lilimited
it d tto pointi t
to-point links between two ordinary clocks,
boundary clocks,
clocks and/or peer
peer-to-peer
to peer
transparent clocks
This is because the protocol does not provide
for the clock that receives Pdelay_Req to keep
track of which clock it receives the message
f
from,
and
d respond
d separately
t l tto each
h clock
l k
30
9/24/2008
Synchronization Basics
Peer Delay Mechanism - 4
O
One-step
t clock:
l k The
Th Sync
S
timestamp
ti
t
is
i
carried in the Sync message, and Follow_Up
is not sent
sent. The Pdelay
Pdelay_Resp
Resp message
carries the turnaround time, t5 t4, and
Pdelay
y_Resp
p_Follow_Up
p is not sent.
31
9/24/2008
Synchronization Basics
Peer Delay Mechanism - 5
T
Two-step
t clock:
l k The
Th Sync
S
timestamp
ti
t
is
i
carried in the Follow_Up message.
Eith
Either
(a) the turnaround time, t5 t4, is carried in
Pdelay Resp Follow Up or
Pdelay_Resp_Follow_Up,
(b) t5 is carried in Pdelay_Resp_Follow_Up
and t4 is carried in Pdelayy_Resp.
p
This option is useful in cases where it is not
possible both to achieve sufficient time stamp
accuracy and
d place
l
th
the titime stamp
t
iin th
the
message as it is transmitted.
32
9/24/2008
End-to-End Transparent
Clocks - 1
O
One alternative
lt
ti to
t placing
l i an OC or BC att every
node in a 1588 network is to use E2E TCs
An E2E TC is not part of the master
master-slave
slave
hierarchy, i.e., it does not synchronize to the
grandmaster ((GM))
g
Instead, an E2E TC forwards Sync and corresponding
Follow_Up messages on all ports not blocked by any
underlying network protocols (e.g., rapid spanning tree
protocol (RSTP) operating in an IEEE 802 bridged LAN)
End-to-End Transparent
Clocks - 2
34
9/24/2008
End-to-End Transparent
Clocks - 3
Th
The residence
id
time
ti
iis accumulated
l t d iin a fi
field
ld off
the Sync (one-step clock) or Follow_Up (twostep clock) messages
Message at ingress
PTP message
payload
Correction field
Message at egress
PTP message
payload
Network
protocol Preamble
headers
Correction field
Network
protocol Preamble
headers
+
+
Ingress timestamp
Ingress
-+
Egress timestamp
Egress
35
9/24/2008
End-to-End Transparent
Clocks - 4
E
Each
h slave
l
uses th
the cumulative
l ti residence
id
titime iin th
the
computation of propagation time from the master
In the previous formula
formula, the correction fields of the Sync
Sync,
Follow_Up, and Delay_Resp messages are subtracted in the
numerator
The offset is given by t2 minus t1 minus propagation time
minus Sync correction field minus Follow_Up correction field
End-to-End Transparent
Clocks - 5
If this
hi error iis unacceptably
bl llarge, the
h E2E
TC clock may optionally be syntonized,
i
i.e.,
synchronized
h i d iin ffrequency, tto th
the GM
This may be done by using the egress time
stamps (i.e.,
(i e egress at master) and corrections
fields in the successive Sync and Follow_Up
messages, and the ingress time stamps of
these Sync messages, to measure elapsed
time of the master and corresponding elapsed
time of the E2E TC
These two elapsed times may be used to
obtain an estimate of the frequency
q
y offset of
the TC relative to the master
37
9/24/2008
End-to-End Transparent
Clocks - 6
IEEE 1588 d
does nott specify
if h
how th
the
information contained in the egress time
stamps and correction fields of the successive
Sync and Follow_Up messages, and in the
ingress
g
time stamps
p of those Sync
y messages,
g ,
is to be used to accomplish the Syntonization
This is consistent with the fact that IEEE 1588
(V1 and V2) does not specify how the
computed offset is used to synchronize OCs
and BCs
38
9/24/2008
End-to-End Transparent
Clocks - 7
D
Detailed
t il d specifications
ifi ti
off whether
h th tto syntonize,
t i
and how, is the subject of PTP profiles and
application specifications
Syntonization may be done in hardware,
e.g., by physically adjusting the TC oscillator
frequency, or in software, e.g., by using the
measured frequency offset in the residence
time computation
39
9/24/2008
Peer-to-Peer Transparent
Clocks - 1
Th
The E2E TC measures residence
id
titime off a
Sync and Delay_Req message through the TC
H
However, propagation
ti titime b
between
t
th
the master
t
and slave is measured using the delay requestresponse
p
mechanism
If the master changes, propagation time from the
slave to the new master must be measured
This results in a longer transient during the
network reconfiguration
40
9/24/2008
Peer-to-Peer Transparent
Clocks - 2
Th
The delay
d l measurementt iis made
d on every lilink
k
in both directions, including links that are
blocked by lower layer network protocols (e
(e.g.,
g
rapid spanning tree protocol)
This allows a delay measurement to be
immediately available on links newly used after
a change of GM or network reconfiguration
Peer-to-Peer Transparent
Clocks - 3
Peer-to-peer
Transparent Clock
42
9/24/2008
Peer-to-Peer Transparent
Clocks - 4
The
Th offset
ff t between
b t
the
th slave
l
and
d master
t is
i given
i
b
by
Offset = t2 t1 (Sync correction field) (Follow_Up correction
field) (propagation time on final link to slave)
Peer-to-Peer
Transparent Clocks - 4
If th
the P2P TCs
TC are nott syntonized,
t i d the
th first
fi t
term may be computed by measuring the
frequency offset between the adjacent nodes
using the egress and ingress time stamps of
the successive Pdelay
y_Resp
p messages
g
received by the sender of Pdelay_Req
The resulting propagation time will still be in
error by an amount equal to the second term in
this case
For
F many applications,
li ti
thi
this error (i
(i.e.,
relative propagation delay error) may be
sufficientlyy small ((e.g.,
g , 10-4 or smaller,, since
the free-run frequency accuracy of PTP
clocks is specified as 100 ppm (10-4 ))
44
9/24/2008
Time Format
struct Timestamp
{
UInteger48 seconds;
UInteger32 nanoseconds;
}
Integer64 correctionField; /* nanoseconds 216 */
45
9/24/2008
Architectural choices - 1
IEEE 1588 V2 allows
ll
ffor a variety
i t off architectures,
hit t
each based on choices of clock(s) and delay
mechanism
As stated earlier
P2P TCs use the peer delay mechanism
E2E TCs use the delay request-response mechanism
OCs can use either mechanism within a domain (but a vendor
is not required to implement both mechanisms)
BCs can use either mechanism on any port within a domain
(but a vendor is not required to implement both mechanisms on
all ports)
p
)
The two delay mechanisms do not mix
P2P and E2E TCs cannot be mixed on the same
communication path
path, except in very special cases
cases, e
e.g.,
g linear
chains where each E2E TC has only 2 ports and no collocated
OC
46
9/24/2008
Architectural choices - 2
Hi
Hierarchical
hi l topology
t
l
example
l (figure
(fi
ttaken
k
from reference 1)
U
Uses BC
BCs and
d OC
OCs
The cyclic path (indicated by the dashed line) is
blocked by a lower layer network protocol and
appears to not be present to PTP
Grandmaster clock
Boundary Clock-1
Ordinary Clock-1
Cyclic path
Ordinary Clock-2
Boundary Clock-2
Boundary Clock-3
Ordinary Clock-3
Ordinary Clock-4
Ordinary Clock-5
Ordinary Clock-6
47
9/24/2008
Architectural choices - 3
Linear
Li
ttopology
l
example
l (fi
(figure ttaken
k from
f
reference
f
1)
Uses BC, OCs, and E2E TCs, arranged in linear chains
Propagation time measured using delay request-response
request response mechanism
separately between each OC and BC-1
Boundary Clock-1
A
Grandmaster clock
B
Cyclic path
Ordinary Clock-1
End-to-end
Transparent
Clock-1-1
Ordinary Clock-1-1
End-to-end
Transparent
Clock-2-1
Ordinary Clock-2-1
End-to-end
Transparent
Clock-2-2
Ordinary Clock-2-2
C
End-to-end
Transparent
Clock-1-2
Ordinary Clock-1-2
...
...
S
Ordinary Clock-1-n
End-to-end
Transparent
Clock-1-n
End-to-end
Transparent
Clock-2-n
48
Ordinary Clock-2-n
9/24/2008
Architectural choices - 4
M
Multiply
lti l connected
t d ttopology
l
example
l (fi
(figure ttaken
k
from reference 1)
Uses OCs and P2P TCs,
TCs arranged in a mesh
Propagation time measured on each link using peer delay
mechanism
Grandmaster clock
Ordinary Clock-1-1
Peer-to-peer
Transparent
Clock-1-1
Ordinary Clock-1-2
Peer-to-peer
Transparent
Clock-1-2
Peer-to-peer
Transparent
Clock-2-1
...
Peer-to-peer
Transparent
Clock-m-1
...
Peer-to-peer
Transparent
Clock-m-2
...
Peer-to-peer
Transparent
Clock-m-n
Peer-to-peer
Transparent
Clock-2-2
Peer-to-peer
Transparent
Clock-2-n
...
Peer-to-peer
Transparent
Clock-1-n
...
...
Ordinary Clock-1-n
49
9/24/2008
Architectural choices - 5
Bridging disparate technologies using BC
Ordinary
S
Clock-3
M2
Ordinary
Clock-1
M
Ordinary
Clock-2
S
S
1
M
1
Boundary
Clock-1
3 M
S2
Boundary
Clock-2
4
M
4
M
S
Ordinary
Clock-5
S
Ordinary
Clock-6
3 M
Ordinary
Clock-4
50
9/24/2008
53
9/24/2008
54
9/24/2008
Specification
15
1-5
R
Reserved
d
Shall designate a clock that is synchronized to a primary reference time source. The timescale distributed shall be
PTP. A clockClass 6 clock shall not be a slave to another clock in the domain.
Shall designate a clock that has previously been designated as clockClass 6 but that has lost the ability to
synchronize to a primary reference time source and is in holdover mode and within holdover specifications. The
timescale distributed shall be PTP. A clockClass 7 clock shall not be a slave to another clock in the domain.
Reserved
9-10
11-12
Reserved
13
Shall designate a clock that is synchronized to an application specific source of time. The timescale distributed
shall be ARB. A clockClass 13 clock shall not be a slave to another clock in the domain.
14
Shall designate a clock that has previously been designated as clockClass 13 but that has lost the ability to
synchronize to an application specific source of time and is in holdover mode and within holdover specifications.
The timescale distributed shall be ARB. A clockClass 14 clock shall not be a slave to another clock in the domain.
Reserved
15-51
52
Degradation alternative A for a clock of clockClass 7 that is not within holdover specification. A clock of
clockClass 52 shall not be a slave to another clock in the domain.
53-57
Reserved
55
9/24/2008
Specification
58
Degradation alternative A for a clock of clockClass 14 that is not within holdover specification. A clock of
clockClass 58 shall not be a slave to another clock in the domain.
59 67
59-67
R
Reserved
d
68-122
123-127
Reserved
128-132
Reserved
133-170
171-186
Reserved
187
Degradation alternative B for a clock of clockClass 7 that is not within holdover specification. A clock of
clockClass 187 may be a slave to another clock in the domain.
188-192
Reserved
193
Degradation alternative B for a clock of clockClass 14 that is not within holdover specification. A clock of
clockClass 193 may be a slave to another clock in the domain.
194-215
reserved
216-232
56
9/24/2008
clockClass
((decimal))
Specification
233-247
Reserved
248
Default. This clockClass shall be used if none of the other clockClass definitions apply.
249 250
249-250
R
Reserved
d
251
252-254
Reserved
255
57
9/24/2008
Value (hex)
Specification
00-1F
reserved
20
21
22
23
24
25
26
27
28
29
2A
2B
2C
2D
2E
2F
30
31
32-7F
reserved
80-FD
FE
Unknown
FF
reserved
58
9/24/2008
Time source
Description
10
ATOMIC_CLOCK
20
GPS
Any device, or device directly connected to such a device, that is based on atomic
resonance for frequency and that has been calibrated against international
standards for frequency and, if the PTP timescale is used, time
Any device synchronized to a satellite systems that distributes time and frequency
tied to international standards
30
TERRESTRIAL_RADIO
Any device synchronized via any of the radio distribution systems that distribute
time and frequency tied to international standards
40
PTP
50
NTP
Any device
An
de ice synchronized
s nchroni ed via
ia NTP or Simple Network
Net ork Time Protocol (SNTP) to
servers that distribute time and frequency tied to international standards
60
HAND_SET
90
OTHER
Used for any device whose time has been set by means of a human interface
based on observation of an international standards source of time to within the
claimed clock accuracy
Other source of time and/or frequency not covered by other values
A0
INTERNAL_OSCILLATOR
0
F0-FE
For
o use by aalternate
te ate PTP
profiles
FF
Reserved
Any device whose frequency is not based on atomic resonance nor calibrated
against international standards for frequency, and whose time is based on a freerunning oscillator with epoch determined in an arbitrary or unknown manner
59
9/24/2008
60
9/24/2008
GM Identity of A
=
GM Identity of B
Yes
No
A>B
Compare
GM priority1 values of
A and B
A<B
A=B
A>B
Compare
GM class values of A
and B
A<B
A=B
A>B
Compare
GM accuracy values
of A and B
A<B
A=B
A>B
Compare
GM offsetScaledLogVariance
values of A and B
A<B
A=B
A>B
Compare
GM priority2 values of
A and B
A<B
A=B
A>B
Compare
GM identity values of
A and B
A<B
61
Return
B better than A
Return
A better than B
9/24/2008
Return
B better than A
A >B+1
Compare Steps
Removed of
A and B
A+1<B
Return
A better than B
Compare Identities
of Receiver of A and
Sender of A
A>B
Compare Steps
Removed of
A and B
Dataset comparison
algorithm - 2
Compare Identities
of Receiver of B and
Sender of B
A<B
A=B
Receiver > Sender
Return
B better by
topology than A
A>B
Compare
Identities of
Senders of
A and B
A<B
Return
A better by
topology than B
A=B
A>B
A<B
Compare
Port Numbers of
Receivers of
A and B
Receiver = Sender
Receiver = Sender
A=B
error-1
error-2
error-1
62
9/24/2008
65
9/24/2008
TLV mechanism
Optional BMCA
Optional management mechanism
Use of a unicast messaging model provided the
behavior of the PTP protocol is preserved
66
9/24/2008
67
9/24/2008
N
Nodes
d conform
f
tto allll normative
ti sections
ti
off IEEE
1588 except those that are optional
If an option is implemented
implemented, the node shall conform to
the clause that specifies the option (i.e., the option must
be implemented in its entirety as specified)
68
9/24/2008
69
9/24/2008
General Optional
p
Features - 1
Unicast
U i
t negotiation
ti ti ((subclause
b l
16
16.1)
1)
Provides for negotiated unicast sessions of
finite duration between two clocks
Sync, Announce, and Delay_Resp
messages
Subclause 16.1 defines TLVs that enable a
clock to request unicast transmission, grant a
requested unicast transmission made by
another clock, and cancel a unicast
transmission session
70
9/24/2008
General Optional
p
Features - 2
Path
P th ttrace (subclause
( b l
16
16.2)
2)
Provides a mechanism for recording the
identities of all boundary clocks traversed by a
PTP message
Typically used with Announce messages to
detect rogue frames
Path trace is enabled or disabled via
management message
A TLV appended to Announce message
contains
t i the
th path
th trace
t
list
li t
Current path trace list may be retrieved from a
clock via management message
71
9/24/2008
General Optional
p
Features - 3
Alternate
Alt
t timescales
ti
l ((subclause
b l
16
16.3)
3)
One or more alternate timescales may be
optionally maintained
ALTERNATE_TIME_OFFSET_INDICATOR TLV is
attached to each Announce message
message, and
contains current information for the alternate
timescale
currentOffset
jumpSeconds
timeOfNextJump
displayName
Alternate
te ate timescale
t esca e iss enabled,
e ab ed, disabled,
d sab ed, a
and
d
configured in GM via management messages
72
9/24/2008
State Configuration
Options - 1
Cl
Clause 17 contains
t i options
ti
that
th t may b
be used
d
to more explicitly control (i.e., more explicitly
compared to the default BMCA)
how a PTP system recovers from failure of a
clock or a break in the network
Which clocks in the network are acceptable
masters
73
9/24/2008
State Configuration
Options - 2
Grandmaster
G d
t cluster
l t table
t bl (subclause
( b l
17
17.3)
3)
Allows two or more OCs or BCs to be
designated as a grandmaster cluster
Provides for more rapid evaluation of the
BMCA to speed up change to new GM
Each clock in the cluster maintains a master
cluster table
Priority1 values of clocks in the cluster
should be less than those of all other clocks
i the
in
th d
domain
i
Each clock in the cluster periodically requests
unicast Announce messages from the ports
listed in the grandmaster cluster table
74
9/24/2008
State Configuration
Options - 3
Alternate
Alt
t master
t ((subclause
b l
17
17.4)
4)
Allows alternate masters that are not currently
the best master to be visible to slave ports
An alternate master is configured to send
Announce and optionally Sync messages
Slave may use the information contained in
these messages to acquire knowledge of the
characteristics of the transmission path
between itself and each alternate master
Allows
All
for
f faster
f t switchover
it h
to
t an alternate
lt
t
master when the current best master fails
Alternate masters are configured via
management message
75
9/24/2008
State Configuration
Options - 4
Unicast
U i
t di
discovery ((subclause
b l
17
17.5)
5)
Allows PTP to be used over a network that
does not provide for multicast
Slave port is configured with addresses of
potential masters,
masters and may request unicast
Announce, Sync, and Delay_Resp messages
from these potential masters
Configure via management TLVs
76
9/24/2008
State Configuration
Options - 5
Acceptable
A
t bl master
t ttable
bl ((subclause
b l
17
17.6)
6)
Allows configuration of a slave port to accept
as a master only ports listed in the acceptable
master table
This option may be used to constrain which
clocks can be in the master-slave hierarchy
and, in a limiting case, can force a specific
master-slave
t
l
hi
hierarchy
h
Configured via management TLVs
77
9/24/2008
State Configuration
Options - 6
Th
There is
i a fundamental
f d
t l conflict
fli t b
between
t
a
self-configuring system (default BMCA defined
in IEEE 1588) and a configured system
The system integrator must exercise extreme
care in using these options
Unintended behavior may result when using
these options
p
with the default BMCA
78
9/24/2008
Compatibility
Requirements - 1
Cl
Clause 18 d
defines
fi
requirements
i
t ffor
compatibility between
IEEE 1588 V2 and
d ffuture
t
versions
i
IEEE 1588 V1 and V2
Compatibility
Requirements - 2
Compatibility
C
tibilit b
between
t
V2 and
d ffuture
t
versions
i
If a V2 node receives a message with a versionPTP
field greater than 2,
2 it shall
Disregard the message if it is not defined in V2
Parse and execute the message if it is defined in
V2, but disregard any TLV extensions that are
not defined in V2
Disregard the message if any inconsistencies are
detected
80
9/24/2008
Compatibility
Requirements - 3
Compatibility
C
tibilit b
between
t
V1 and
d V2
Recommended that V1 and V2 devices communicate via
a BC
Communication between V1 and V2 devices via a TC is
outside the scope of IEEE 1588
Cl
Clause 18 contains
t i d
detailed
t il d specifications
ifi ti
th
thatt
describe how V1 entities and attributes are
translated to V2
V2, and vice-versa
vice versa, to ensure V1/V2
interworking
Domains
clock attributes
messageType
Message transmission intervals
Timestamp representation
81
9/24/2008
Transport
p Specific
p
Field
IEEE 1588 V2 messages contain a
transportSpecific field, that functions as a
subtype
yp of the respective
p
Ethertype
yp
At present, 2 values are defined for the case of
transport of PTP directly over IEEE
802.3/Ethernet
DEFAULT (value = 0 (hex)): All PTP layer 2
Eth
Ethernet
t transmissions
t
i i
nott covered
d by
b another
th
enumeration value
ETHERNET_AVB
ETHERNET AVB (value = 1 (hex)): This value is
reserved for use in connection with the standard
being developed by the IEEE 802.1 AVB Task
Group as P802.1AS
82
See reference 8 for more detail on P802.1AS9/24/2008
Security
y-1
A
Annex K describes
d
ib an experimental
i
t l security
it
protocol
Th
The protocol
t
lh
has b
been reviewed
i
db
by security
it
experts
The protocol is experimental because it was felt
experience must be gained in its use
Provides
o des g
group
oup sou
source
ce aut
authentication,
e t cat o ,
message integrity, and replay protection for
PTP messages
Does not provide nonrepudiation
Does not support
pp data confidentiality
y
(encryption)
83
9/24/2008
Security
y-2
Composed
C
d off ttwo basic
b i mechanisms
h i
Integrity protection mechanism, which uses a
message authentication code to verify that a
received message was transmitted by an
authenticated source,, was not modified in transit,,
and is fresh (i.e., is not a replay). Replay
protection is implemented using counters.
A challenge-response
h ll
mechanism,
h i
which
hi h iis used
d
to affirm the authenticity of new sources and to
maintain the freshness of trust relations
84
9/24/2008
Security
y-3
S
Security
it protocol
t
l uses symmetric
t i message
authentication code functions
Clocks
Cl k share
h
secrett kkeys
85
9/24/2008
Transport of Cumulative
Frequency Offset Information
Annex L describes an experimental TLV that may
be used to transport cumulative frequency offset
information
Th
The quantity
i transported
d iis a scale
l ffactor that
h d
depends
d on
both the cumulative frequency offset and the frequency
change needed to drive the phase error to zero
Questions
87
9/24/2008
References - 1
1 IEEE Std1588TM 2008,
1.
2008 IEEE St
Standard
d d ffor a
Precision Clock Synchronization Protocol for
Networked Measurement and Control Systems,
IEEE Instrumentation and Measurement Society,
July 24, 2008.
2. John C. Eidson, IEEE 1588 Version 2, Agilent
Laboratories, Measurement Research Lab,
March 5
5, 2007
2007.
3. John C. Eidson, IEEE-1588 Standard for a
Precision Clock Synchronization Protocol for
Networked Measurement and Control Systems
A Tutorial, Agilent Technologies, October 10,
2005.
2005
88
9/24/2008
References - 2
4 John C
4.
C. Eidson
Eidson, Implementing IEEE 1588 in LXI
LXI,
LXI Beijing meeting, June, 2007.
5. Geoffreyy M. Garner,, IEEE 1588 Version 2,, ISPCS
Vienna 07, Tutorial 1, October 1, 2007.
6. Ron Cohen, Security and IEEE 1588, Tutorial 2,
ISPCS Vi
Vienna 0
07.
7. John Eidson, Geoffrey M. Garner, John Mackay,
and Veselin Skendzic
Skendzic, Provision of Precise
Timing via IEEE 1588 Application Interfaces,
ISPCS Vienna 07.
8. Michael D. Johas Teener, Geoffrey M. Garner,
Benjamin Hur, and Dawey (Weida) Huang,
O
Overview
i
and
d Ti
Timing
i P
Performance
f
off IEEE
89
802.1AS, ISPCS Ann Arbor 08.
9/24/2008