►
From YouTube: IETF-AVTCORE-20230523-1600
Description
AVTCORE meeting session at IETF
2023/05/23 1600
https://datatracker.ietf.org/meeting//proceedings/
A
B
Yeah
yeah,
for
some
reason,
the
the
carp,
the
pdf
version
is
showing
an
old
slide
deck.
So.
D
A
A
B
A
Yeah-
let's
see
so
yes,
virtual
interim
meaning
tips
I
think
most
people
here
have
used
mediko
before,
but
it's
I
remember
that
you
need
to
enable
your
own
audio.
Also,
that
can
be
quite
slow,
sometimes
so
Becca
can
you
mute,
I
think
I'm,
hearing
Echo
from
you,
where
I
can
mute.
You.
A
Yeah
so
yeah
you'll
need
to
please
see
a
pleasure
as
please
stay
muted,
when
you're,
not
talking
and
so
forth.
No
well
ietf
has
various
policies,
including
IPR
and
participation
policies
and
code
of
conduct
and
privacy
policies
by
participating.
You
agree
to
them
see
your
lawyer
for
more
details,
not
really
well,
please.
As
mentioned,
we
are
under
the
code
of
conduct
and
the
anti-harassment
policy.
A
A
A
Okay,
this
is
the
meeting.
Here's
the
link
notes.
You
should
also
there's
also
a
link
to
the
note-taking
tool
in
mediko,
the
one
that
looks
like
a
pencil
on
a
piece
of
paper
or
perhaps
a
square.
A
If
anybody
says
anything
so
far,
no
one
has
and
we
do
need
a
note
taker.
So
at
this
point
we
will
install
to
ask
somebody
to
please
take
notes.
E
A
Yeah,
if
you
need
somebody
who's,
not
presenting
I'm,
not
sure
who's
presenting
for
all
the
sessions.
But
let's
see.
G
Kicked
out
of
the
session
already
twice
in
the
LA
in
the
first
five
minutes,
I'm
willing
to
take
notes
on
the
best
effort
basis,
and
it's
not
going
to
be
a
particularly
good
effort.
I
feel.
C
It
is
also
fair
to
ask
people
to
check
the
notes
for
what
what
they
said
and
what
they've
heard
as
the
answer
this,
this
really
is
kind
of
a
working
group
responsibility
as
much
as.
A
A
So
yeah,
so
everybody
please
keep.
You
know
open
up
the
note
taking
tool
and
keep
an
eye
on
it,
but
we
need
somebody
to
be
the
primary
Note
Taker
still.
A
A
Okay,
here's
our
agenda
I'm
not
going
to
go
over
it
in
detail,
but
if
anybody
has
any
comments
or
requests
to
change
it,
let
us
know
shouldn't
take
too
long.
A
A
I
Great
I'm
presenting
for
that
okay,
let's
go
ahead
here,
I
guess
we
published
draft
version
05
back
on
March
29th
again,
we'll
read
the
whole
list
of
things
that
we
did
change
because
we
talked
about
this
at
the
meeting.
Again
we
focus
things
on
more
from
a
network
perspective
rather
than
from
a
pillow
perspective,
because
again
trying
to
empathize
and
Skip
is
an
opaque
payload
and
trying
to
Define
it
at
any
particular
point
in
time
in
the
rpt.
Stream
is
really
difficult
and
again
asking
that
network
devices.
I
Don't
attempt
to
try
to
do
packet
filters
on
it
just
because
again,
it's
hard
to
quantify
specifically
what
skip
looks
like
not
only
because
of
different
messages,
but
because
of
the
it
being
encrypted
that
it
again
makes
it
a
very
difficult
payload
to
try
to
modify
at
any
point
in
time
and
try
to
produce
a
reliable
package
as
well.
So
basically
we
just
change
it
say:
don't
do
it.
I
So
I
guess
other
than
that
I
guess
final
slide
is
I,
guess
yeah
trying
to
figure
out
how
to
how
to
move
forward
again.
We've
contacted
I've
contacted
several
of
the
reviewers
from
the
is
icsg
and
ask
for
their
reviews,
but
I've
heard
absolutely
everything
back
from
any
of
them.
For
the
last
two
months.
I
guess
I'm.
I
H
I
B
Those
values
are
yeah,
I
mean
I,
don't
want
to
try
to
interpret
somebody
who's
silent
as
to
what
they
want,
but
we
couldn't
I
but
I.
Didn't
you
know
in
the
deck
I
did
include
the
comments.
The
discuss
comments
that
just
trying
to
address
so
I
mean
here.
Here's
you
know
it's
Roman
and
darker.
So.
I
B
Yeah
I
think
in
particular.
So
let's
talk
about
Roman's
comment.
The
section
four
comment,
I
think
the
new
draft
does
say
the
details
are
entirely
opaque
right.
Yes,
so
we
have
been
explicit
in
saying
that
I
guess
maybe
well,
there's
the
there's
the
pre-pre-uh
encryption
messages
which
are
in
opaque.
But
after
that
it
is
I,
don't
know
what
you
could
say
more
other
than
copying
text
out
of
the
skip
document
or
something.
B
Yeah
I
mean
what
I'm
wondering
I
mean
it's.
It's
kind
of
the
these
reviews
were
conducted
without
access
to
the
skip
documents
right
so
they're
saying
they
want
something
from
the
skip
documents,
but
they
haven't
looked
at
the
skip
documents
to
actually
be
able
to
express
what
they're
asking
for
right.
So
that's
kind
of
a
difficult
it's
difficult
position
to
even
talk
about
right
because
you
know
I've
read
the
skip
documents,
I
think
they're,
useful
I.
Don't
think
they're
required
to
implement
this
document,
but
I'm.
B
I
B
B
I
H
G
B
I
don't
know
well
I
understand
why
that
happened
with
Francesca.
She
was
legitimately
on
leave,
but
you
addressed
her
comment
so
that
one
I
understand
these
these
other
ones.
I
do
not
understand,
because
those
people
I
I,
see
email
from
them
just
not
to
us.
I
Right
and
there
were
others
that
were
listed
on
that
list,
but
they
didn't
have
any
contact
information,
at
least
what
was
on
the.
If
you
go.
B
Any
contacts
there's
section
six
about
RC
7202.
B
I
B
Ahead,
yeah,
so
this
so
he
seems
to
be
asking
for
the
security
properties
which
I
think
you
have
some
are
in
the
document.
Right.
Basically,
it's
I
mean
I'm,
not
sure
what
he
means
by
security
properties,
but
the
services
are
indicated,
or
certainly
they
could
be
basically
authentication
and
encryption
yeah.
It's
it's
section
two
says:
end-to-end
Security
application,
layer,
authentication
of
user
identity
ability,
probably
different
security
levels.
B
So
right
I
guess
you
could
put
that
text
into
the
security
consideration
section
it's
already
there,
but
you
can
put
it
somewhere
else.
I
I
I
B
I
mean,
but
that's
true
of
all
Key
Management
traffic
right.
It's
set
in
the
clear
until
you
push
down
the
keys,
so
that's
not
news,
but
I
I
mean
the
way
you
can
clarify.
That
is
with
a
state
machine,
but
it'll,
look
like
I
mean
it.
The
state
machine
will
look
exactly
like
it's
pretty
much
what
it
does
in
ipsec
or
other
encryption
protocols
right.
It's
the
stuff
is
in
the
clear
but
I,
don't
know
what
the
point
of
that
is
because
it's
in
it's
inside
of
skip
okay.
I
J
B
I
B
Could
I
guess
you
could
say
you
could
say
that
that's
a
point
of
confusion.
That's
like!
Yes,
you
could
do
sodb
or
you
could
not
do
sotp,
but
that's
not
related
to
the
payload
per
se.
I
mean
we
don't
say
that
in
every
Pro
RTP
profile
spec,
you
could
do
srtp
or
you
could
not,
but
I
guess
we
could
say
it
if
that
helps
them.
I
I,
oh,
so
he
does
have
confusion
about
the
term
variable
because
he's
wondering
if
it
means
variable
bit
rate
which
it
doesn't
foreign.
I
I
Yeah
well,
I
think
he's.
That
was
that's
relating
to
the
previous
comment.
I
think
that's
what
he
was
right
relating
the
confusion
about
you
know,
variable
rate
and
so
I
didn't
see
that
it
being
applying
the
need
to
put
a
b
parameter.
If
you
wanted
to
put
it,
you
can,
but
that
was
not
I
think
that
was.
That
was
not
the
meaning
of
of
what
that
was
right.
B
Jitterbuffer,
a
Jitter
buffer
may
be
implemented
in
endpoint
devices,
only
all
right,
so
he
doesn't
like
the
May
yeah.
Well
I
you're,
not
saying
that
that
it's
optional
to
have
a
Jitter
buffer.
I
I
B
K
C
Thank
you.
My
my
working
group
is
working
through
a
discuss
about
a
May
that
should
have
probably
should
have
been.
Might
right.
It's
not
it's,
not
a
it's,
not
a
bcp-14
may,
but
you
know,
but
basically,
basically,
the
conversation
we're
having
on
our
discuss
is
that
this
is
not
a
bcpe
14
use
of
the
word
May
and
saying
that
it
could
be
or
might
be
right.
B
B
But
so.
I
I
Yeah
I
have
to
go
back.
I
can
make
some
I
guess.
We
didn't
change
some
Jitter
buffer
wording
on
that,
but
I
can
go
back
and
look
at
that
to
see
so.
B
B
Okay,
well,
thank
you
and
then
we'll
we'll
see.
If
we
can,
we
can
Whittle
this
down
right.
I
B
Yes,
yes,
well
he's
asking
for
a
link
to
the
spec
and
he
said
he
had
a
hard
time
finding
documentation.
Well,
is
it
were
we
not
clear
that
you
had
to
ask
for
it?
I,
don't
know
right
right
anyway,.
I
B
B
C
B
A
C
C
C
C
Well,
but
that's
that's
a
conversation
that
the
chairs
can
have
with
the
ad
about
doing
things
like
and
just
for
an
example
putting
you
know
putting
this
document
on
a
on
a
telechannel
agenda
as
a
returning
as
a
returning
item.
Okay,
as
a
you
know,
kind
of
there's
a
it.
You
know
it's
it's
easy
for
area
directors
to
forget
about
one
discuss
among
many
yeah.
B
B
So
I
guess
this
segment
here
is
to
understand
what
we
need
to
do
to
address.
Paul
wooters,
discuss
on
prey
marking
and
just
reading
this
discuss.
It
says
the
document
has
no
privacy
considerations
section
but
as
far
as
I
know,
I
mean
I
wrote
the
Aya
B.
We
wrote
the
IAB
statement
on
privacy,
there's
no
requirement
to
have
one,
but
basically
what
he's
asking
about
is
I
guess,
encryption
of
header
extensions.
B
A
H
H
The
the
whole
point
of
this
was
that
it
would
be
understandable
by
the
by
the
middle
boxes.
You
know
frameworking
doesn't
make
sense
for
end
to
end.
It
only
makes
sense
for
for
deployments
with
metal
boxes
right.
B
H
In
in
a
privacy
considerations
that
yeah
that
this
is
not,
this
is
intentionally
being
revealed
to
a
middle
box.
A
Yeah
I
think.
The
point
is
that
you
know
standard
SRD,
header
extension,
Exposed
on
the
wire
and
I
think
you
know
if
you
could
use
cryptex
or
you
know,
potentially
the
whatever
the
older
I
received
number
was,
but
probably
cryptex
is
better.
A
B
A
A
H
B
H
I,
don't
think
someone
would
would
implement
it
just
for
that
extra
determinism-
it's
really
only
for
conferencing,
topologies
with
middle
boxes,
and
so
it
really
wouldn't
be
negotiated.
We
can
add
some
text
to
say
you
know
this
is
intended
to
be
negotiated
for
topologies
with
middle
boxes
and,
if
you,
if
you're
not
using
that
topology,
then
for.
B
H
So
do
you
want
next
in
a
version
15
that
says
that
and
then
and
then
present,
that
for
the
discussor
you
want
to
just
have
a
a
proposal.
First
to
Paul.
B
B
B
A
C
To
get
something
to
say:
yeah
yeah,
my
apologies
I'm
still
trying
to
catch
up
with
the
minutes
on
the
skip
document.
So
I
had
to
not
take
any
notes
at
all
on
on
this
document
and
if
somebody
could
take
notes
why
you
know
for
like
two
or
three
more
three
minutes
and
I'll
say
that
I'm
back
in
the
chat
that
would
really.
C
C
Step
that
would
be
a
that
would
be
a
fine
thing
to
do
and
I'm
not
finished
yet
so
I'm
trying
to
get
I
was
I
was
trying
to
raise
the
raise
awareness
of
this,
so
I
wouldn't
be
just
sitting
there
trying
to
flag
down
the
meeting
for
the
whole
time
and
not
taking
notes.
Okay,.
H
A
C
That
would
be,
that
would
be
superior,
usually
I
have
two
screens
and
I'm
in
a
hotel.
So.
L
Yes,
so
thanks
for
accommodating
this
to
your
agenda
today,
I
wanted
to
just
make
it
make
you
aware
that
the
version
with
the
changes
presented
in
the
last
online
meeting
or
like
in-person
meeting
is
now
available,
and
you
can
have
a
look
at
that
and
after
that,
or
shortly
after
making
this
available,
a
couple
of
new
issues
were
created
for
the
draft
one
proposing
to
change
the
previously
hex
coded
Fields
fields
to
a
base64
coded
Fields
like
in
BBC
RTP,
payload
format,
I
I,
suppose
this
makes
sense,
but
I
also
looked
at
hebc,
RTV
payload
format,
specification
and
there
it's
there.
L
It
seems
that
there's
a
mix
of
base,
16
and
base64
coded
builds
personal
I
think
it's.
It
might
be
better
to
just
keep
with
one
coding
rather
than
mix
them
together
in
the
same
specification.
So
I
was
thinking
that
we
should
just
move
to
this
base64
code.
It
builds.
L
Another
thing
another
issue
that
was
added
was
to
remove
comments
from
the
example
STP
fields
and
add
them
as
text
instead
to
kind
of
maintain
the
syntax
correctness
for
the
sdp
examples
and
yeah.
Those
are
the
two
two
new
things
that
I'm
trying
to
are
planning
to
address
for
the
next
meeting
and
as
always,
new,
more
more
ideas
and
suggestions
are
always
welcome.
L
You
can
file
these
issues
under
the
under
the
link
here
and
yeah.
That's
it.
I've,
no
requests
just
an
update
of
what's
Happening.
D
L
I
I
mean
these
are
minor
changes
right,
so
I
think
it's.
It
should
be
fairly
fairly
straightforward
from
this
point
on.
A
If
you
think,
if
you
think
you're,
you
know
your
your
future
complete
and
have
no
open
issues,
then,
presumably
just
moved
to
working
with
classical.
A
All
right,
Bernard.
F
Okay,
can
you
hear
me
no
yeah,
yeah?
Okay,
thank
you
yeah.
So
young
he's
not
present
today
in
today's
meeting
so
I'm
presenting
on
before
her
film.
This
is
srinivas,
so
we
updated
the
title
up
that
draft
us,
because
this
are
the
artistic
messages
for
temporal
special
resolution.
This
basically
is
not
presenting
all
the
messages
that
are
part
of
the
green
metadata,
so
it's
only
presenting
the
temporal
and
special
resolution
requests.
F
So
the
temporal
and
spatial
resolutions
in
the
TSS
TSR
message
shall
not
be
more
than
the
resolutions
that
were
negotiated
in
the
SD
via
the
sdp,
so
the
constraint
has
been
added
in
the
ITF
draft,
so
these
are
the
changes
that
we
made
it
in
and
we
uploaded
the
revision
in
April
and
we
haven't
received
any
other
feedback.
So,
as
usual,
we
are
open
to
receive
the
feedback
here.
Avt
core
reflector.
B
F
I
I
think
we
should
receive
a
error
message,
so
it's
not
accepted,
so
it
should
be
basically
a
maximum
of
what
is
it's
negotiated
during
the
STP
yeah.
The
the
responder
should
not
accept
for
anything
more
than
that,
but
anyhow
in
the
rtcp,
the
UE
actually
requesting
you,
each
shall
request
only
less
than
their
resolutions
that
are
negotiated
during
the
STP
negotiation.
F
Yeah,
okay,
sure
I
can
update
like
that.
You,
the
receiver
Behavior
as
well
sure
okay.
G
Stefan
I
would
I,
would
you
know
I
I,
wouldn't
I?
Would
I
wouldn't
put
sender-based
constraints
there
and
expect
them
to
be
to
be
obeyed?
I
would
I
would
just
say
what
the
receiver
is
doing.
Yeah
I
would
write
a
rather
something
like
it
doesn't
make
sense
to
send
TSS
our
messages
with
with
resolutions
higher
than
what
what
rtcpe
and
what
STP
has
negotiated
and
if
anything
like
that
is
received,
the
the
the
receiver
shot
ignore
it
or.
F
A
G
The
the
you
know
the
the
it
it
the
the
burden
should
be
on
on
the
receiver
to
react
on.
In
the
spirit
of
that
that
we
don't
want
to.
You
know,
we
want
to
be
tolerant
against
stupid
senders
right.
We
don't
want
to
have
an
application
Crush,
because
some
idiot
doesn't
read
this
line
all
right
or
doesn't
read
this
shell
statement
and
we
don't
want
to
get
into
non-compliance
arguments
either,
so
so
just
make
it
receiver
Centric
then
it's!
F
A
I
mean
I
would
actually
I
mean
ignore,
is
sort
of
a
little
tricky,
because
I
think
you
still
want
to
send
the
tsrm
with
you
know,
basically
just
never
send
anything
higher
that
never
send
the
tsrn
higher
than
the
or
the
media
higher
than
the
sdp.
But
if
you
just
ignore
that
might
imply
don't
respond
to
the
tsrn,
which
means
somebody
would
keep
her
interested
in
the
TSR
forever,
which
is
a
bad
outcome
too.
So
I.
F
Would
say
basically
yeah,
so
the
request
will
be
ignored,
but
there
will
be
a
tsar
and
message
with
the
actual
with
with
what
has
been
actually
been
used
by
the
sender.
So
the
that
special
and
temporal
resolution
will
be
included
in
the
tsrn
message.
So
yeah
a
message
will
still
be
flowing,
but
the
request
will
not
be
accepted
or
acted
upon.
Yeah.
B
Okay
Spencer
did
you
get
that
for
the
notes.
C
I
think
so
again
it
would
be.
It
would
be
great
if
somebody
is
looking
at
what
I'm
doing
what
I'm
typing.
There
are
six
people
in
the
in
the
meet
Echo
document
and
I'm
not
seeing
things
coming
along,
but
anyone
coming
on
behind
me
and
changing
anything
I,
don't
know
what
that
means.
Of
course,.
B
Yeah,
so
Serena
boss
have
a
look
at
what
is
in
the
minutes
and
if
you
clear
enough.
J
C
G
Yeah,
please,
okay,
multiple
screens
here
and
and
multiple
sessions
ongoing,
not
only
activity.
A
J
Right
so
we
have
a
couple
of
updates,
since
we
last
met
in
Oklahoma,
I
I
want
to
start
with
a
couple
of
things
we
merged
into
the
document
since
then,
and
then
later,
I
have
a
couple
of
slides
on
issues
we're
currently
working
on
or
we're
planning
to
work
on
next
next
slide.
Please
ask
first
rdcp
analysis.
J
We
already
mentioned
this
one
in
Yokohama
we
basically
added
a
large
table
of
a
lot
of
different
rtcp
packet
types
and
subtypes,
and
for
each
of
them
we
explained
if
there
is
equivalent
information
that
we
can
use
from
quick
and
for
a
lot
of
them.
That
means
that
we
only
have
a
entry
in
our
table,
which
says
there's
nothing
to
be
done
about
this,
but
we
still
include
that
because
we
wanted
to
make
sure
that
we
document
what
we
considered
in
this
document
done
in
the
same
PRS.
Here
we
also.
J
J
Rtcp
analysis
is
still
work
in
progress,
because
we
still
have
a
couple
of
open
issues
related
to
this
one
is
that
was
mentioned,
I
think
in
the
last
meeting
we
had
that
we
don't
really
consider
that
there
are
differences
for
how
we
can
replace
certain
rtcp
fields
in
different
topologies
because
for
peer
one-to-one
connections
that
may
be
different
than
or
from
from
topologies,
where
we
have
multiple
Hops
and
quick
connections
between
different
notes
in
the
topology
and
then
the
information
we
get
from
Quick
is,
of
course,
not
the
same
as
you
would
get
it
from
rtcp.
J
So
we
will
add
some
considerations
for
that,
then
the
analysis
just
not
yet
include
green
metadata,
I
guess,
depending
on
how
fast
that
progress
is,
we
can
add
a
note
for
that.
I'm
not
sure
how
much
we
can
say
about
this,
but
it
will
probably
make
sense
to
at
least
I,
don't
know,
as
we
did
for
many
other
rtcp
fields
that
we
considered
this
then
there's
at
the
moment
there
are
a
few
sections
which
are
duplicated
because
we
have
fields
in
our
new
tables,
and
we
also
had
some
text
about
that
before.
J
J
and
for
all
of
them
we
explained
how
well
it
works
with
RTP
over
quick.
If
there's
anything
to
consider
about
that,
and
then
there's
again
the
related
issue,
which
I
already
mentioned
for
rtcp,
that
we
don't
have
good
considerations.
We
want
to
talk
much
apologies
with
rtcp,
so
we
may
need
to
do
some
changes
to
the
topology
section
here
too.
J
Then
we
merged
pull
request
about
congestion,
control
terms
and
definitions.
We
added
terms
and
definitions
for
these
Fields
here,
like
for
delay
based
and
low
latency
condition,
control,
algorithms
for
loss-based
congestion
control
algorithm,
and
then
we
have
explanations
for
what
we
mean
when
recycle
a
congestion,
controller
or
RTP
congestion
controller,
because
we
thought
that
makes
it
much
easier
to
understand
what
we
say
about
congestion
control
in
the
sections
later,
when
we
have
clear
definitions
of
these
terms
and-
and
we
have
a
few
more
about
congestion
control
on
the
next
slides.
J
Yeah,
we
explain
why
we
don't
make
any
BCP
recommendations
for
congestion,
control
algorithm
and
the
reason
is
basically
that
the
choices
often
dependent
on
application
or
coding
specific
things.
And
we
have
a
couple
of
references
to
different
algorithms.
But
they
are
all
informative
and
the
references
are
mostly
to
the
RM
cut
algorithms,
which
are
all
experimental.
J
J
I
think
this
was
the
biggest
change.
We
have
the
world
congestion
control
in
the
recent
updates.
We
rearranged
the
section
A
little
bit
and
added
edit
some
parts
from
the
introduction
to
that
section
to
more
specific
subsections,
and
we
added
a
new
subject
section,
which
talks
more
clearly
about
resolving
interactions
between
quick
and
application
layer,
congestion
control
and
explains
issues
that
can
appear
when
we
have
congestion
control
at
different
layers.
J
This
talks
about
what
happens
if
we
are
application
limited
or
what
happens
if
we
have
different
kinds
of
contention,
control
in
the
quick
layer
that
react
differently
and
may
have
an
impact
on
what
happens
on
the
RTP
layer.
There
are
still
a
couple
of
open
issues
for
congestion
control.
The
first
two
are
about
how
to
handle
congestion.
Control
for
shared
connections
runs
for
shared
connections
on
a
single
five
to
pull
I'm,
not
sure
how
much
we
can
say
about
that.
J
But
probably
there
should
be
some
consideration
that
we
or
that
that
there
could
be
impacts
on
the
different
connections
depending
on
what
congression
control
they
use
and
the
second
one
is
what
condition
control
impacts
there
are.
If
we
have
media
and
non-real-time
streams
sharing
one
single
connection,
and
then
we
still
have
an
issue
about
where
there
are,
where
the
real-time
congestion
control
algorithms
are
suitable
for
quick
specs
themselves
like
if
we
would
Implement
any
of
these
directly
in
the
quick
stack
I
think
there
may
be
some
need
to
do
some
research
on
that.
J
J
I
already
explained
that
the
problem
with
status
we
need
to
somehow
Define
how
to
handle
stop
sending
on
sender
site
with
what
what
happens
if
the
sender
receives
stop
sending
from
the
RTP
receiver,
because
the
receiver
might
send
that
at
any
time,
because
it's
in
quick,
so
the
sender
which
receives
stop
sending
doesn't
really
know
which
stream
does
which
Media
frame
on
that
stream?
J
J
So
now
we
added
in
pull
request
ADH,
that
a
review
paraphrase
RFC
9000
here
from
Quick,
which
says
basically
that
a
quick
sender
that
receives
stop
sending
must
send
a
reset
stream
afterwards
and
it
should
not
re-transmit
any
data
that
was
declared
lost.
J
And
now
we
add
to
that
that
in
RTP
sender,
which
sends
some
media
stream
on
quick
streams
should
or
must
continue
sending
the
media
stream.
But
it
must
do
that
on
a
new,
quick
screen
or
generally
will
open
more
new
quick
streams
anyway,
and
that
the
RTP
sender
must
not
retransmit
media
frames
that
have
already
been
transmitted
on
the
previous
quick
stream
that
received
the
stop
sending
frame
on
new
quick
streams.
That
was
something
we
discussed
in
Yokohama
I.
B
I
think
we
we
basically
said
we
didn't
want
to
interpret
application
layer
semantics
based
on
the
quick
message,
but
I
I
guess.
The
question
is
why
the
question
is
why
you
would
send
the
stop
sending.
What
is
the?
What
do
you
think
the
purpose
of
it
is
and
is
is:
does
that
make
sense
did
just
to
try
to
cancel
a
frame.
J
Yeah,
so
I
I
think
what
we
said
in
Yokohama
is
that
we
actually
would
like
to
drop
this
as
a
feature
which
we
advertise
in
our
document,
because,
okay,
exactly
for
that
reason,
but
the
feedback
we
got
in
Oklahoma
was,
as
I
said,
is
that
we
still
need
to
say
something
about
substanding,
because
it
is
in
quick
and
any
quick
implementation
may
send
that.
So
we
need
to
add
some
text
that
says
how
our
sender
should
handle
the
situation.
C
A
couple
things
as
we're
talking:
this
is
actually
a
PRI
road.
So
that's
why
I'm,
asking
or
or
or
a
lot
of
feedback
on
it
anyway,
this
one
so
basically
I
think.
C
We
we
for
some
value
of
we.
We
have
been
a
little
bit
confused
about
how
you
know
about
what
stop
sending
would
mean
because
in
so
let's
say
in
HTTP
3,
if
you
say,
stop
sending
I
really
have
lost
interest
right
right,
but
in
in
RTP.
C
H
C
In
getting
frames
that
are
up
too
old
for
me
to
do
anything
with
right
right,
so
the
so
so
and
I'm
not
telling
I'm
not
trying
to
say
that
stop.
Sending
is
the
right
way
to
clear
the
queue
basically.
B
C
C
So,
like
I
said
I'm,
not
I'm,
not
it
may
be
that
we're
we're
conflating
two
different
things
in
this
conversation
and
I.
Believe
Mattis
has
a
fascinating
third
slide
on
this
immediately
following,
but
I
think
that's
one
of
the
things
that's
going
on.
B
Yeah,
because
in
in
conventional
RTP
right
you
have
you
have
the
negotiation
of
RTX
time
where,
basically,
the
sender
knows,
if
it
takes
more
than
this,
don't
bother
yeah
you
allow
through
basically
reset
for
the
sender
to
be
a
little
bit
more
sophisticated,
maybe
vary
the
reset
times,
depending
on
what
kind
of
packet
it's
sending
or
or
frame
it
sending.
So
you
have
that
on
the
sender
side
and
then
I
I
guess
yeah
I
mean
you
guys
can
think
it
over.
B
C
I
think
that
I'm
agreeing
with
what
you're
saying,
Bernard
and
I
I
think
I
I
would
not
maybe
even
just
add
that
there's
there's
a
there's,
a
role
for
an
RTP
receiver.
C
Explaining
to
the
RTP
sender
that
they
need
to
change
the
Leading
Edge
of
what's
being
transmitted
and
if
or
if
stop
sending
turns
out
to
be
a
way
to
do
that.
Fine,
if
it
doesn't
turn
out
to
be
a
way
to
do
that,
we
still
have
to
explain
what
stop
sending
means.
C
C
You
know
it
basically
uses
uses
words
like
the
reset.
The
stop
sending
triggers
a
reset
string.
J
York
is
still
in
the
queue.
Do
you
want
to
add
something
or.
E
Yeah,
so
can
you
hear
me
yep
I
I
just
wanted
to
offer
two
more
additions
to
what
Spencer
said.
I
see,
Bernard
Bernard
I
see
your
point
about
the
RTP
level
operations,
but
we
shouldn't
forget
that
we
have.
If
we
are
talking
about
streams,
we
have
an
undetermined
amount
of
data
buffered
inside
quick
that
the
RTP
sender
doesn't
really
have
control
over.
E
So
you
will
not
know
when
you're
no
longer
in
control
of
re-transmissions,
and
this
is
a
legitimate
way
to
cancel
any
outstanding
efforts,
and
we
could
of
course
do
see
this
similar
semantics
of
signaling
a
layer
above.
But
one
of
the
things
that
we
try
to
do
also
is
to
reduce
the
amount
of
extra
RTP,
RTP
and
RTP
CP
signaling,
also
in
other
places,
so
that
we
can
make
of
the
future
use
of
the
good
use
of
the
features
that
are
available.
E
It
stands
to
be
validated
that
this
is
truly
the
complete
and
comprehensive
semantics
exactly
of
what
we
want,
but
I
believe
there
is
a
very
legitimate
reason
for
having
this
or
this
kind
of
mechanism,
at
least
in
mind,
hope
that
helps.
C
Spencer
just
saying
that
Spencer
agrees
that
what
York's
and
was
was
helpful.
Thank
you.
A
A
J
J
J
A
Yeah
I
mean
I
think
it's
obviously
you
don't
know
what
the
receiver
had
received
at
the
time
it
sent
stop
sending.
But-
and
it's
not
clear-
it's
not
clear
that
a
receiver
can
usefully
do
this
for
a
multiple
RTP
frames
per
stream.
M
J
C
Yeah
and
and
on
on
the
on
the
next
slide,
one
of
the
things
we
are
kind
of
getting
at
there
is
how
much
the
is
basically.
So,
how
does
the
RTP
receiver
tell
the
RTP
sender
what
to
do
and
if
the
only
tool
is
stop
sending,
we
may
not
be
very
happy
with
that
for
multiple
frames
per
per
stream
that,
if
that
really
turns
into
a
requirement,
it
might
be
good
to
advance
the
to
the
next
slide,
because
that's
actually
what
I'm
talking
about,
but
the.
C
The
you
know
the
base.
Basically,
this
is
why
we
have
the
line
down
there
about
using
streams
diagrams
and
pro
RTP
frame
streams
with
you
know,
and
even
the
multiple
RTP
frame
streams,
but
not
but
being
willing
to
close
the
stream
and
reopen
a
stream
in
a
new
stream
in
order
to
fast
forward
to
something
useful.
C
But
all
this
all
this
is
about.
You
know
we,
we
know
what
the
quick
tool
is
and
we
tools
we
have
available
are,
and
we
need
to
think
about
whether
those
tools
can
whether
we
can
use
those
tools
to
do
the
thing
we
need
to
do
or
whether
we
need
some
other
tool.
C
E
I
wanted
to
come
back
to
what
Jonathan
said
and
maybe
also
add
a
bit
on
to
what
Spencer
just
said
effectively
saying
that
we
shouldn't
be
trying
to
over
specify
at
a
very
low
layer,
these
semantics
and
applications
you
might
try
to
implement.
E
That
is
a
very
straightforward
interpretation
and
the
reaction
to
this,
whether
you're
using
multiple
frames
per
stream
in
the
first
place,
or
whether
you're,
using
just
one
frame
per
stream
or,
if
you're,
using
multiple
frames
per
stream.
What
your
packing
strategy
then
would
might
be
heavily
dependent
on
the
application
context.
It
would
appear
to
be
to
me
premature
to
try
and
embrace
all
these
potential
faults
that
the
application
might
have
at
that
level
when
we
are
effectively
trying
to
tell
this
stream
is
too
late.
E
If
a
Spencer
alluded
to
us
the
tools
we
will
require
for
some
specific
application
users,
additional
signaling
bits
that
tell
us
further
details
on
how
a
sender
should
react.
That
may
be
very
well
specify.
Those
later
on,
but
it
it
appears
too
hypothetical
to
me
to
try
and
cover
all
potential
use
cases,
including
their
semantics
at
this
point
and
that
ain't
gonna
get
us
anywhere
and
because
we
will
surely
miss
something.
E
So
therefore,
I'd
like
to
stay
a
bit
closer
to
the
actual
semantics
of
what
this
means
to
a
particular
stream
and
the
remedy
action
may
be
obvious
for
some
senders.
It
may
least
be
less
obvious
for
other
senders.
It
may
be
a
part
of
negotiation
that
applications
have
performed
before
or
of
the
implicit
understanding,
and
so
maybe
I
just
want
to
try
to
prevent
us
from
from
from
interpreting
too
much
semantics
into
this
more
transport
related
mechanism.
Here.
C
J
J
J
We
also
talked
about
that
in
Yokohama,
and
the
problem
from
extremes
is
that
receiver
needs
to
give
a
sender
in
US,
quick
stream
credits
to
open
enough
streams
that
can
send
all
the
media
and
the
receiver
needs
to
do
that
fast
enough,
and
we
don't
really
have
a
very
concrete
way
to
tell
in
the
draft
how
that
should
be
done
because
it's
depending
on
a
lot
of
factors.
So
we
now
added
an
example.
J
Calculation
for
one
scenario
might
be
like
it
was
suggested
in
Yokohama,
and
then
we
also
added
a
note
that
some
signaling
may
be
required
here,
because
if
the
receiver
doesn't
know
what
the
sender
is
going
to
send,
then
it's
going
to
be
hard
to
set
my
streams
correctly.
So,
depending
on
what
what
the
scenario
is,
there
may
be
some
signaling
that
helps
the
test.
J
Receiver,
they're
going
to
be
so
many
new
streams
for
so
many
media
streams,
so
you
have
to
open
so
many
clicks
or
allow
so
many
quick
streams
yeah
that
that
was
merged
in
this
pull
request
too
next
slide.
Please
yeah.
J
J
Okay,
so
then,
then
we
have
a
couple
of
One
open,
pull
request,
currently
I
think
in
addition
to
the
one
for
substanding,
which
I
already
mentioned
about
error
codes.
This
is
the
kind
of
work
in
progress
and,
if
there's
an
issue
76
which
asks
about
error
codes,
which
makes
sense
because
we
need
to
Define
error
codes
for
different
things,
that
can
happen
at
quick
and
then
there's
Issue
13,
which
has
been
open
for
quite
a
while,
which
also
could
be
solved
by
adding
error
codes
or
using
the
error.
Codes
appropriately.
J
J
I
took
some
of
these
from
other
documents
like
HTTP,
3
and
DNS
over
quick
I'll
just
quickly
go
through
them,
so
no
error
could
be
used,
for
example,
to
close
a
connection
or
a
screen.
If
there's
just
no
other
reason
just
fill
in
the
connection,
then
I
think
General
protocol
error
could
be
used
for
when
there's
no
more
specific
one.
That
seems
to
be
something
that
makes
sense,
because
it's
also
in
the
other
documents,
internal
errors,
I,
think
also
clear,
screen
creation
error.
J
We
specify,
in
intersection
about
quick
streams
that
we
only
use
unidirectional
streams.
So
if
a
sender
tries
to
open
a
bidirectional
screen
to
send
RTP,
for
example,
that
could
be
used
as
an
error
code
next
slide.
Please.
J
Then
we
have
packet
error
for
inverted
packet.
Pedal
formats
with
the
payroll
format
is
not
compliant
with
what
we
specify
in
the
draft
for
our
RTP
packets
are
encapsulated,
or
also
for
non-rtp
things
that
are
sent
and,
for
example,
the
floor
idea
as
a
whole
thing
is
not
format.
Formatted
correctly,
then
we
have
frame
canceled,
which
would
be
what
we
just
talked
about.
Stop
sending
an
unowned
flow
ID
in
theory,
I
think
we
could
allow
receivers
to
accept
any
flow
ID
if
they
know
what
to
do
with
it.
J
But
if
a
receiver
does
not
accept
the
flow
ID
or
it
was
not
negotiated
for
an
RTP
stream,
then
we
could
use
this
as
an
error
code
here
and
then
signaling
error
is
for
a
situation
which
was
described
in
this
issues,
13.,
where,
for
example,
if
we
do
signaling
outside
of
quick,
which
says
that
we
want
to
use
Quick
RTP
over
quick
datagrams,
but
then
we
open
a
quick
connection
which
does
not
support
datagrams.
Then
we
need
something
to
tell
there's
an
error.
J
Then
we
have
a
couple
of
more
open
issues
which
we
have
not
started
working
on
yet
but
plan
to
do
after
we
finish
the
stop
sending
PR
and
the
error
codes
PR,
we
have
number
50
with
just
ice
interaction.
We
haven't
done
anything
about
that
so
far,
but
I
think
there
will
be
later
slot
in
this
meeting,
which
may
help
I
don't
know
but
we'll
see.
J
Then
we
have
issue
77,
which
is
about
extending
motivation
for
adoption
of
prtp
over
quick,
which
adds
a
few
more
nodes
to
I.
Think
protocol
overview
or
to
the
introduction
for
y11
would
want
to
use
either
quick.
J
J
J
J
Yeah
then,
we
have
a
couple
of
quick
extensions
which
we
already
mentioned
in
the
draft.
We
always
said
that
none
of
them
is
required,
but
it
would
be
helpful
to
have
a
list
of
extensions
that
are
mentioned
somewhere
else
in
the
draft
and
that
are
helpful
for
different
things
and
then
the
using
streams,
datagrams
and
pro
XP
frame
streams
with
work
is
what
we
also
just
talked
about
and
stop
sending
then
the
last
two
issues
down
here
are
things
that
we
are
not
sure.
J
Yet,
if
there's
something
we
can
do
about
this
in
this
stocks.
In
this
document
we
have
issue
labels
on
these
currently
in
a
stock
enhancement
and
not
just
rtps.
So
we
are
not
sure
if
we
are
going
to
do
something
about
these.
J
B
Basically,
this
the
need
for
this
came
about
because
browsers
are
actually
adding
support
for
hebc,
so
in
web
codex.
Api
decode
is
supported
today
for
Hardware.
Only
and
typically
the
support
is
for
main
profile
level.
3.1
I
haven't
gotten
a
look
at
all
the
chipsets,
so
I
don't
know
what
other
things
are
supported,
but
at
least
through
cell
level
3.1
seems
very
common.
B
Encode
is
a
work
in
progress
that
will
also
be
Hardware
only
and
there's
a
Tracker
bug
where
you
can
see
what
progress
they're,
making
there's
a
registration
page
in
web
codex.
That
tells
you
what,
in
code
options
there
are
for
hevc,
because
the
support
is
Hardware.
Only
we've
only
looked
at
adding
stuff
that
will
be
very
commonly
supported
on
different
Hardware
chipsets.
B
Some
of
the
more
advanced
things
like
screen
coding,
at
least
so
far,
don't
seem
to
be
supported,
so
we
haven't
added
it
yet.
But
if
you
have
suggestions,
you
can
file
an
issue
about
the
registration
so
now
that
the
encode
decode
code
apis
are
getting
hevc
support.
The
next
question
has
been
what
about
webrtc.
B
So
there's
a
Tracker
bug
that
tracks
the
progress
on,
supporting
that
it
will
also
be
Hardware.
Only
work
is
proceeding
on
implementing
RFC,
7798,
packetization
and
depacketization,
but
one
question
that
came
up
is:
what
is
the
sdp
that's
going
to
be
supported
as
part
of
that,
so
that's.
They
would
need
that
in
order
to
finally
ship
this
and
and
get
HB
supported
in
webrt,
you
see,
there's
no
Guidance.
The
webrtc
video
document
is
RFC.
B
So
it's
basically
and
what
we're
trying
to
do.
We
generally
use
the
approach
taken
by
RC
7742,
there's
not
a
lot
of
guidance
here,
but
basically
it
says
you
got
to
support
the
RFC
7798
format
and
it
requires
support
for
level
3.1
and
suggests
support
for
main
profile
level.
Four
and
it
requires
support
for
receiving
and
I
guess
mini
support
ability
to
send
so
the
decoder
is
required,
but
the
encoder
is
I.
B
B
Also,
some
of
the
same
parameters
that
are
in
the
AVC
section
under
7742
such
as
Max
FPS,
Max,
BR,
Etc,
it's
kind
of
the
kind
of
stuff
and
then
for
the
VPS,
SPS
and
PPS.
The
same
approach
is
taken
as
7742,
which
basically
says
that
webrtc
implementations
will
signal
the
information
inbound
and
won't
put
it
in
the
sdp,
and
that
seems
to
be
working
okay
so
far
for
for
ABC,
so
we
figured
hey,
let's
try
it
for
hebc
and
then
there's
the
issue
of
video
orientation.
B
Typically,
this
is
done
in
Weber
to
see
use
using
the
CVO
extension
and
I
guess
it
could
be
done
in
hebc
as
well.
So
that's
the
extent
of
the
guidance
that
we
have
in
there.
Not
it's
not
terribly
much,
but
it's
trying
to
get
a
minimal
profile
that
would
allow
use
of
hebc
in
in
webrtc.
A
I
think
this
is
useful
to
do
I'm.
You
know
trying
to
figure
out
if
this
is
within
our
Charter
and
I
think
the
answer
is
probably
yes
because
RTC
web
is
closed,
but
we
definitely
would
want
to
raise
it
on
the
RTC
web
list,
also
just
to
make
sure
that
the
I
think
the
list
is
so
open.
Even
though
the
group
is
closed,
so
I.
B
A
Yes,
yeah
I
agree.
The
expertise
is
here
about
the
you
know
that
we
need
the
browser
side
too.
I
mean
the
one
quibble
I'd
have
is
on
the
previous
thing.
You
must
support
receiving
it.
This.
You
know
it's
possible
to
build
a
you
know
a
non-browser
web
urgency
endpoint
that
doesn't
support
sending
it
doesn't
receiving
video
at
all.
So
video
at
all.
So.
A
I
I
haven't
it's
been
too
long,
since
I
did
in
the
atbc
work,
so
I'm
I'm
worried
if
there's
any
other
parameters
that
might
be
needed,
but
I
agree
basically
following
the
general
model
of
ABC
of
don't
use,
S
props
and
send
everything
inbound,
especially
things
that
can
change
anything
that
certainly
anything
that
changes
when
a
resolution
changes
needs
to
be
invent.
B
Yeah,
well,
they
haven't
gotten
to
the
sdp
stuff
yet
because
they're
still
working
on
a
packetization
depacketization,
but
I'm
I'm,
hoping
that
once
they
get
to
that
point,
they'll
take
a
look
at
it
and
see
what
they
think.
Yeah.
A
Does
anything
need
to
be
said
about
if
you
actually
support
hvc
SVC.
B
Well,
at
least
right
now,
because
it's
Hardware
only
the
the
hardware.
Support
for
SVC
is
really
bad.
Okay,
but
yeah
I
mean
part
of
it
is
just
getting
a
handle
on
what
the
chipsets
actually
do.
I
mean.
B
Did
it
we
should
probably
put
it
in
to
allow
them
to
do
it.
You
know,
but
right
now
we're
still
still
sorting
through
all
of
the
chipsets
and
what
they
can
do
there.
You
know
the
the
problem
Jonathan
has
been
SVC.
Support
has
never
been
high
on
their
list
for
really
any
code.
Yes,.
A
A
M
B
A
lot
more
attention
to
that
and
one
of
them
one
of
the
really
bad
ones
that
we
encountered
recently
with
ab1,
was
that
lack
of
support
for
spatial
referencing
in
the
hardware
decoder.
So
we
thought
great,
we've
got
this
codec,
we
can
do
spatial
ABC
in
the
spatial
SVC
and
the
answer
is
Matt.
You
can't
do
that
now
so
well
anyway,
it's
it.
What
we
did
is
we
surfaced
it
as
a
parameter
in
the
capabilities
where
you'd
know
hey.
My
receiver
is
busted.
You
can't.
C
M
A
And
I'm
not
positive
ITF
document
is
the
best
place
to
track
such
things,
but
right
right.
Oh.
B
Yeah,
it's
yeah.
Basically,
with
those
things
they're
not
negotiated,
necessarily
they're
they're
kind
of
transmitted
out
of
band.
Hey
I've
got
a
busted
decoder
in
the
following
project:
s
yeah.
B
That's
something
it's
going
to
be,
it's
gonna,
be
you
know,
Less
Pleasant,.
B
Okay,
so
I
think
the
next
steps
is
to
notify
the
RTC
web
list
and
see
if
they
have
any
opinions.
Yeah.
E
B
I
already,
if
there's
any
suggestions
on
changing
the
text,
we
welcome
them
yeah
and.
A
B
K
K
K
It
contains
the
ideas
that
I
presented
last
time,
which
are
to
packet
ties
first,
with
the
codec
specific
packetizer
into
one
big
RTP
packet,
then
encrypt
the
payload
of
that
using
S
frame
then
packetize
that
using
the
S
frame,
specific
packetization
defined
in
this
draft,
which
takes
the
ssrc,
timestamp
and
other
RTP
header
values
from
the
first
packetization
when
making
the
packets
in
the
second
factorization.
K
But
it
takes
the
payload
type
for
S
frame
and
puts
it
in
the
RTP
header
as
indicating
that
it's
s
frame
and
then
takes
the
RTP
load
from
the
first
packetization
and
puts
it
in
the
payload
for
the
S
frame,
specific
packetization.
And
in
order
to
do
this,
you
need
to
negotiate
One
S
frame.
K
K
Right
now,
I
just
put
myself
I
didn't
know
if
Linux
for
you
and
wanted
to
be
on
there,
but
they
can
be
if
they
want
to
be
I,
wasn't
sure
if
there
should
be
an
introduction
like
what
you
and
wrote
previously
with
nysaski
are
describing
the
whole
process
of
how
westframe
works.
I
didn't
put
it
that
in
the
draft,
but
we
can
cut
and
paste
some
ASCII
art
and
descriptions.
K
If
we
want
it
wasn't
it
decided
how
the
package
the
depacketizer
would
know
which
packets
go
with
the
which
s
frame
so
I
went
ahead
and
put
a
Media
frame
ID
in
the
draft,
which
indicates
you
know
the
RTP
packets
for
the
same
Media
frame,
ID
go
together
when
depacketizing.
K
There
are
different
options
for
how
the
Deep
packet,
as
you
would
know,
the
order
of
the
packets
within
Nest
frame
and
which
one's
the
last
I
went
ahead
and
put
a
frame
or
a
fragment
index
in
the
draft.
But
there
are
other
options
and
the
question
of
whether
or
not
we
should
put
all
the
RTP
header
extensions
in
all
of
the
S
frame,
RTP
packets.
K
You
know,
for
example,
if
there's
a
mid
or
a
video
rotation,
should
we
put
that
in
all
the
packets,
for
the
benefit
of
sfus
for
now
I
just
put
all
I
just
said
all
the
RTP
header
extensions
go,
but
we
could
refine
that
and
then
also
the
payload
type,
that's
embedded
in
the
S
frame,
specific
RGB
packet
that
is
copied
from
the
package,
the
Codex
specific
packetization
that
I
putting
on
all
of
the
packets
right
now.
K
K
The
big
question
is:
do
we
want
to
adopt
this
draft
and
obviously
people
are
going
to
want
to
go?
Look
at
it.
First
I
just
put
it
on
GitHub
yesterday.
So
that's
the
status
questions
comments.
A
One
thing
I
didn't
see:
one
question
I
know
we
had
is:
how
is
the
sequence
numbers
being
handled?
How
does
the
the
packet
has
to
figure
out
how
to
describe
sequence
numbers?
Did
you
handle
that
or.
K
A
K
Oh
right,
right,
sorry,
yeah
on
the
depacketization
side,
when
you
feed
in
to
the
depacketizer
the
the
assembled
s
frames,
what
sequence
number
do
you
use?
Yes,
I've.
M
K
Forgot
to
put
that
on
the
slide
here,
but
yes,
that
is,
that
is
another
question
you're
right
anything
in
the
draft
at
the
moment.
B
B
That
that's
true,
but
but
I
think
the
whole
process
may
be.
It
may
be
worth
having
that
in
the
intro
to
try
to
clear
that
up,
because
they
also,
of
course,
had
lots
of
questions
about
how
you
packetize
the
encrypted
blob.
So
it's
probably
good
to
have
an
intro
that
clears
a
lot
up
from
the
beginning.
K
Sure,
I'll
I'll
pull
over
an
intro
from
the
one
you
and
made.
A
K
A
I
don't
know
I'll
try
to
answer
some
of
these
questions
that
are
still
like.
You
know,
fickly
the
you
know,
the
ones
that
you
don't
have.
A
K
A
B
K
K
D
L
B
Well,
maybe
I'll
I'll
read
this
slide
and
hopefully
Peter
can
get
his
audio
back.
So
there
was
peer-to-peer
quick,
shipped
in
chromium
as
An
Origin
trial
in
2019.
B
That
was
to
be
clear
that
wasn't
ITF
standard
quick.
It
was
G
quick
at
the
time
which
didn't
have
the
ability
to
Multiplex
srtp
RGB
TCP
like
like
we've
done
7983
this,
but
it
was
a
prototype
that
that
went
out
in
2019.
B
It
was
later
evolved
into
web
transport,
which
became
a
client
server
only,
but
it
turns
out
that
a
bunch
of
the
applications
that
were
envisions
for
web
transfer
turned
out
to
be
peer-to-peer
apps.
B
As
an
example,
people
thought
that
game
streaming
would
be
done,
client
server,
but
in
fact
the
a
lot
of
the
implementations
out
there
also
are
used
not
just
for
cloud
gaming,
but
also
remoting
your
game
from
your
console
to
your
at
your
mobile
device,
for
example.
Similarly,
remote
desktop
isn't
just
from
the
cloud
to
your
machine.
B
It
could
also
be
trying
to
get
access
to
your
computer
at
work,
so
it
turned
out
that
the
web
transfer
doesn't
actually
handle
a
bunch
of
the
use
cases
that
were
envisioned
and
they
need
the
peer-to-peer
stuff
too,
and
so,
as
a
result
of
that,
the
original
discussion
about
web
I
apis
for
peer-to-peer,
quick
is
restarting
and
and
so
the
question
there
have
been
a
few
open
questions
about
the
implementation
of
the
peer-to-peer,
quick
in
RTP
over
quick
and
so
there's
a
few
things
that
need
to
be
discussed
in
the
igf.
B
How
quick
combines
with
ice,
registering
of
an
alpn
value,
defining
how
the
STP
works
or
really
I'd,
say
also
the
authentication
model
for
peer-to-peer,
quick
and
then
some
of
the
same
real-time
congestion
control
issues
that
have
been
discussed
for
Rock,
and
there
is
some
overlap
here.
I
think
the
difference.
May
one
difference
is
that
peer-to-peer
quick
was
the
General
thing
it
could
be
used
for
data
or
RTP.
B
It
didn't
really
specify
which
what
it
could
be
used
for
and
the
API
by
the
way
is
very,
very
similar
to
What's
Done
in
web
transfer
with
a
few
additions
that
are
in
the
list
of
documents,
basically
to
establish
the
peer-to-peer
operation,
it
basically
works
a
lot
like
dtls
works,
it's
self-signed
search
and
then
in
the
signaling
you
verify
the
fingerprints,
so
Peter
says
here
it's
important
to
distinguish
between
what's
in
peer-to-peer
quick
and
what
rock
does
there
may
be
some
similarities?
B
There
may
be
some
differences
and
I
think
the
next
slide
talks
about
some
of
those
can.
D
K
Hope
so
yeah
what
I
meant
to
say
at
the
bottom
was
basically
like.
Instead
of
defining
certain
things
twice,
I
think
we
should
find
things
that
are
the
same
and
Define
them
once
and
if
it's
not
something
specific
to
RTP
over
quick,
but
rather
more
generic
P2P
quick,
we
should
do
the
generic
way
that
can
be
used
by
both
RTP
over
quick
and
future
other
uses
of
P2P,
quick.
K
Yeah,
so
if
I,
if
I'm
still
working
I'll,
go
to
the
next
slide,
so,
for
example,
when
you're
combining
quick
and
Ice,
what
we
would
need
to
describe
are
things
like
demuxing,
using
like
the
ice
magic,
cookie
I,
like
Bernard
just
mentioned,
using
the
self-signed
certs
with
signal
fingerprints,
turning
off
quick
migration,
and
then,
if
we
have
ideas
for
how
to
save
a
round
trip
when
using
ice
and
quick
together,
I
put
some
there.
But
these
are
things
that
are
an
overlap
between
RTP
over
quick
in.
A
Which
is
in
the
RFC,
editor
queue,
so
good
news
there,
but
okay,
all
right,
yeah
I.
A
K
Yeah,
sorry,
okay,
let's
move
on
to
the
next
slide,
so
the
aopn
will
probably
be
something
like
q2q
or
peer-to-peer
quick
or
something
like
that.
It
would
not
make
sense
to
have
any
more
anything
more
descriptive
than
that,
so
the
question
would
be
if
potentially,
someone
wanted
to
implement
RTP
over
quick
on
top
of
a
peer-to-peer
quick
web
API.
Would
it
make
sense
to
have
a
different
aopn
for
RGB,
real
quick,
or
should
we
just
have
one
LPN
when
doing
peer-to-peer
quick.
B
First,
yes
yeah,
so
my
question
is:
are
we?
Are
you
thinking
Peter
that
peer-to-peer
quick?
Would
it
be
only
be
a
browser
thing?
Because
and
and
what
is
what
is
the
meaning
of
saying
what
would
be
the
difference
between
that
and
rock?
For
example,
I
guess
Rock
assumes
that
the
quick
is
kind
of
compiled
with
the
r2b
stack
into
one
application.
K
B
A
B
Question
would
be
like
if
you
register
q2q
you
could
you
could
do
RTP
over
quick,
but
you
could
do
something
completely
different
and
I
guess.
K
K
But
if
we
don't,
if
we
don't
care
about
RTP
over
quick
ever
being
implemented
on
top
of
a
potential
peer
peer-to-peer,
quick
in
a
web
browser,
then
I
guess
it
doesn't
matter.
It
was
just
something:
I
wanted
to
bring
up
as
an
overlap
between
the
conversation
being
started
now
and
RTP
over
quick.
B
J
Yeah
I
think
it's
good
that
you
bring
it
up,
because
if
you
want
to
do,
for
example,
RTP
or
click
on
top
of
peer-to-peer,
we
should
yeah.
It
should
be
possible
I
guess,
but
we
should-
or
we
might
want
to
add-
that
to
RTP
over
quick.
Then
too,
so
not
only
just
Define
something
somewhere
else,
but
maybe
important
to
have
that
in
our
document
too.
So
because
currently
we
say
that
I.
J
K
Okay,
well
I
think
I'll
just
keep
going
here.
Next
slide.
B
M
I
did
I'm
I
I.
Don't
think
that
the
aopm
is
the
right
place
to
be
putting
the
signaling
of
this
is
a
peer-to-peer
thing
and
and
not
a
usual
server,
client
interaction.
This
really
needs
to
belong
elsewhere,
but
I
also
recognize
that
trying
to
extend
quick
itself
to
support
that
would
be
kind
of
difficult
because
you're
conflating
both
the
peer-to-peer
aspect
and
the
RTP
in
something
that
really
should
only
be
handling
one
of
those.
A
K
I
mean
it's
either
that
or
make
a
make
it
a
part
of
the
web
API
to
choose
the
aopm,
but
that
seems
fro
I,
don't
know
that
that
seems
right,
yeah.
K
Well,
anyway,
in
the
interest
time,
I
think
I'll
skip
to
the
next
slide.
Yeah,
so
I
just
wanted
to
this
would
not
be
part
of
the
web
API
because
we
do
not
want
to
move,
have
more
sdp
in
web
API.
But
if
you
wanted
to
use
sdp
to
Signal,
peer-to-peer
quick
I
think
that
it
would
look
something
like
this,
where
it
looks
almost
exactly
like
when
doing
ice
and
dtos
together,
except
that
the
the
string
for
what
it
is
I
forgot.
What
that
string
is
called
is
different.
K
So
it's
UDP,
slash,
quick,
it's
all
the
same
attributes
for
ice
and
the
the
roll
on
the
fingerprint
next
slide
and
then
I
even
thought.
Okay,
if
you
wanted
to
do
it
together,
then
with
with
RTP,
you
could
just
stick
in
RTP
parameters
there
and
so
I
I
don't
actually
know
what
sdp
have
come
up
with
for
r2b
over
quick.
If
you
have
any
sorry,
but
it
did,
it
didn't
seem
to
me
that
it
would
overlap.
K
Much
I
mean
sorry,
it
wouldn't
conflict
much,
but
we
could,
if
we
wanted
separate
the
definition
of
the
pieces
that
are
for
peer-to-peer,
quick
and
those
that
are
not
if
we
care
to
for
the
web
API,
like
I,
said
we
don't
need
to
define
the
sdp
at
all.
It's
just
one
of
those
things.
People
always
like
to
have
they
like
to
have
some
STP.
K
C
So
a
draft
on
sdp
for
what
is
now
Rock
I
stopped
doing
that,
because
the
functionality
that
we
had
defined
for
rock
so
far
was
not.
It
was.
You
know
we
had
not
defined
enough
of
the
functionality
and
we
did
not
have
consensus
for
enough
of
the
functionality
to
justify
trying
to
do
to
maintain
that
in
parallel.
C
So
this
is
but
this
is
definitely
something
I'll
be
interested
in
talking
about
fairly
soon,
because
I
honestly
I've
been
helping
with
RTP
over
quick
and
waiting
for
us
to
do
the
you
know
the
ice
interaction
thing
before
I
move
forward
on
that.
K
C
A
I
was
gonna,
say
you
can
take
a
look
at
Spencer's
expired
draft.
Even
you
know
just
for
this.
You
can
see
what
his
ideas
were
when
I'm
like
the
UDP
quickest
idea.
So
just
more
or
less
matters.
What
you
have
here
so.
K
K
It
just
just
happens
that
you
can
also
send
data
by
itself
without
having
sctp
in
the
mix
kind
of
so
the
only
thought
I
would
have.
There
is
if
we
get
to
the
point
where
we're
going
to
Define
these,
it
might
make
sense
to
Define
in
two
separate
drafts,
one
for
the
peer-to-peer,
quick
things
just
ice
and
quick
by
itself
and
then
a
separate
one
for
RTP
being
added
on
top
of
that,
so
that
people
that
are
doing
just
peer-to-peer,
quick,
wouldn't
need
the
RTP
parts.
K
But
I
guess
it
could
be
two
sections
in
one
draft.
I,
don't
know.
B
I
would
point
out
that
this
similar
kind
of
question
has
now
come
up
in
the
re-chartering
of
the
wish
working
group
where
people
have
raised
you
know,
there's
the
whole
RTC
data
chat,
the
webrtc
data,
Channel
signaling
and
people
have
wondered
how
do
I
signal
something
being
sent
over
the
data
Channel,
for
example,
if
media
is
being
sent
over
the
data
Channel,
because
today
the
webrtc
data
channel
is
just
generic
like
what
Peter
had
for
the
you
to
be
quick
right,
it
doesn't
say,
what's
being
sent
over
it,
but
in
which
the
need
has
come
up
for
maybe
trying
to
specify
that
more
like
extending
it
like
what
he's
describing
here
so
I
think
this
this
problem
has
come
up.
B
Rtp
might
not
be
the
only
media
that
gets
sent
over
this.
This
Channel,
like,
for
example,
in
webrtc
data
channel
cmap,
gets
sent
over
the
data
Channel
very
commonly
anyway,
so
I
think.
There's
there's
something
in
common
with
some
of
the
issues
discussed
in
which
year.
K
K
Adopting
or
requiring
an
extension
like
the
one
I
linked
here
and
then
somebody
needs
to
Port
something
like
CC
to
an
implementation
of
quick
and
see
how
well
it
works.
It's
on
my
to-do
list
to
keep
trying
that,
but
I
haven't
done
it
yet
so,
but
I
think
that
effort
should
be
done
in
a
way
that
is
not
just
for
RTP.
C
Yeah,
so
I,
so
Methodist
and
York
and
I
have
not
cut
a
new
version
of
the
Rock
draft.
Since
you
know,
since
116,
we
expect
to
do
that
before
117.
C
and
if
we
weren't
busy
closing
PR's
the
last
couple
weeks,
we
would
have
probably
done
it
before
this
meeting,
but
just
too
bad,
possibly
to
encourage
people
to
think
about
what
they
need
to
be
reviewing.
One
of
the
big
things
that
we
had
in
the
Rock
draft
was
ideas
about
what
what
should
be
going
on.
C
You
know,
basically,
what
quick
should
be
doing
for
for
real-time
media
and
we
so
I've
been
trying
to
be
clear,
be
clear
about
that
and
to
make
sure
that
we
were
not
over
specifying
that
because
there's,
you
know
from
my
perspective,
there's
still
a
lot
of
unknowns
about
world-time
congestion
control,
and
you
know
for
media
and
interaction
with
that
of
that
with
other
kinds
of
traffic
that
are
sharing
the
same
network
paths
or
quick
connections
or
whatever
I.
C
I
was
not
following
our
cat
as
much
after
Maria
took
that
became
she
joined
the
isg,
and
you
know
she
got
that
working
group
because
she
knew
more
about
it
than
I.
Did
I've
been
the
I've
been
the
ad
for
it,
but
she'd
been
the
chair,
so
I
don't
know
everything
that
I
would
like
to
know
about.
C
The
armcat
algorithms,
but
my
impression
was
that
they
had
done
a
lot
more
work
on
making
sure
you
were
not
self-congest
congesting
than
looking
at
how
you
were
interacting
with
other
congestion
controllers,
especially
for
congestion
controllers
that
were
not.
You
know
for
that
congestion
controllers
that
were
not
being
used
for
real-time
traffic,
so
I,
I,
really
I'm.
Sorry,
I'm,
not
clear
on
this
I
think.
C
Coming
out
of
my
mouth,
but
I
think
that
what
you're
what
to
do
is
a
really
good
idea,
I
think
it's
I
think
it
could
be
consistent
with
the
Rock
draft,
and
if
it's
not
consistent
with
the
rock
draft,
we
should
probably
have
a
conversation
about
why
that
would
be
different,
so
I
I
would
encourage
you.
You
know
I
would
encourage
you
to
continue
thinking
about
that.
I
would
continue
to
encourage
myself
and
the
other
Rock
folks
who've
been
typing
in
the
draft
I
would
encourage.
C
I
would
encourage
us
to
have
a
conversation
more.
You
know
have
conversations
about
this,
but
I.
Think
I,
think
that
specifying
this
once
for
real-time,
that
is
not
restricted
to
RTP
is
a
good
plan.
A
So
yeah
I
guess
my
main
question
is
I
mean
I.
Think
where
do
you
see
this
work
actually
being
done
because
I
think
this
is
you
know
it's
important
for
Abt
core
to
be
aware
of
this,
for
the
rock
but
I.
Don't
think
this
itself
is
in
scope
for
Abt
core.
So
you
see
this
in
quick,
proper
or
some
new
group
or
w3c
or
what.
K
Oh
sorry,
that
maybe
did
you
were
you,
did
you
mean
peer-to-peer
quick
in
general.
K
I,
don't
know
where
the
right
place
it
should
happen
is
if
it
should,
if
we
should
make
a
new
working
group
or
what
kind
of
like
we
did
with
web
transport.
C
So
I
and
I
apologize
for
jumping
in
and
I
I
I
was
I
was
aiming
to
click
the
race
hand,
thing
and
managed
to
close
my
window
for
meet
Echo,
so
I
missed
about
the
last
15
seconds
of
what
Peter
was
saying
or
I
missed
about
15
seconds
of
what
Peter
was
saying.
K
It
was
a
good
question
that
where
we
should
do
work
for
peer-to-peer
quick,
if
it's
not
RTP
specific,
does
that
no
longer
fit
in
avt
cord.
If
not,
then
where
should
it
go
and
I
don't
know
the
answer
to
that?
It's
a
good
question
for
web
transport.
We
made
a
new
web
trans
working
group
and
maybe
we
need
one
for
peer-to-peer,
quick,
I,
don't
know.
C
So
I
am
not
current
in
the
past
week
about
how
about
what
the
charter
for
the
congestion
control
working
group
that's
in
the
process
of
chartering
I'm,
not
quite
sure
what
their
Charter
says
right
now,
I,
don't
know
if
that
would
that
might
be
a
place
to
have
this
conversation
I.
A
A
C
Somewhat
amusingly
I
think
quick
would
have
I
I
the
80s,
the
the
transport
IDs
would
be
the
people
who
would
know
this,
but
my.
A
Specifically,
but
for
but
not
the
real
time
is
out
of
their
scope.
C
Right
right,
so
what
I
was
trying
to
say
was
I,
don't
know,
they've
been
they've,
been
in
the
process
of
chartering
since,
before
116.
C
and
and
the
last
time
I
looked,
which
has
been
within
the
last
week,
they
were
still
in
the
process
of
chartering,
so
I
don't
actually
know
what's
in
scope
for
them,
because
that's
and
you
know
until
the
charter
is
approved,
you
know
I'm,
not
sure
I'm,
not
sure
who
knows,
but
so
I'm
not
saying
I'm,
not
saying
that
that's
a
good
place
to
do
that.
I'm
saying
that
it's
a
good
place
to
consider
whether
it's
a
charter
for
them
well,
whether
they
think
it
should
be
in
Charter
for
them.
C
A
A
All
right,
yeah,
so
I
think
this
is
important
work.
You
know
the
rock
people
should
keep
an
eye
on
it,
but
I
don't
think
the
core
of
the
work
is
in
scope.
Here,
obviously,
pieces
are
and
it
should
you
know,
influence
Rock,
but
I.
Don't
think
we
would
need
a
draft
Beyond
Rock
just
that
this
draft
needs
to
keep
in
scope,
and
you
know
to
be
authors
of
rock.
You
need
to
keep
an
eye
on
this
and
hopefully
stay
in
sync
with
it
and
contribute
to
its
requirements.
Wherever
that
happens,.
A
C
So
Bernard
and
Jonathan
I
I,
captured
as
much
as
I
could
in
the
votes
and
I'm
still
making
updates.
So
don't
don't
cut
and
paste
them
into
the
data
tracker.
Yet
all
right,
but.
B
B
C
Will
follow
them?
Yeah,
I,
I,
haven't
I,
haven't
been
able
to
confirm
or
deny
that
yet
because
he
was
I.
C
Oh
God,
no
Spencer
Dawkins
at
it's
Mr
Dawkins
at
Spencer
doc,
has
got
ietf
gmail.com,
okay,
the
the
yeah,
okay.
A
D
D
D
D
D
A
C
C
I'm
trying
to
finish
something
while
I
can
still
remember
what
was
going
on,
because
I
was
also
taking
notes.
Did
I
tell
you
that
yeah
yeah
this
is
when
I,
when
I
got
silent,
a
reasonable
question
would
be.