[rtcweb] New use-case proposed
Stefan Hakansson LK <stefan.lk.hakansson@ericsson.com> Fri, 11 May 2012 13:01 UTC
Return-Path: <stefan.lk.hakansson@ericsson.com>
X-Original-To: rtcweb@ietfa.amsl.com
Delivered-To: rtcweb@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 71B6C21F86FD for <rtcweb@ietfa.amsl.com>; Fri, 11 May 2012 06:01:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.249
X-Spam-Level:
X-Spam-Status: No, score=-6.249 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HELO_EQ_SE=0.35, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id T2QMGXXivKRU for <rtcweb@ietfa.amsl.com>; Fri, 11 May 2012 06:01:03 -0700 (PDT)
Received: from mailgw2.ericsson.se (mailgw2.ericsson.se [193.180.251.37]) by ietfa.amsl.com (Postfix) with ESMTP id 62BE521F86FA for <rtcweb@ietf.org>; Fri, 11 May 2012 06:01:03 -0700 (PDT)
X-AuditID: c1b4fb25-b7b48ae0000025b3-e2-4fad0d8d725e
Received: from esessmw0184.eemea.ericsson.se (Unknown_Domain [153.88.253.125]) by mailgw2.ericsson.se (Symantec Mail Security) with SMTP id B4.AC.09651.D8D0DAF4; Fri, 11 May 2012 15:01:02 +0200 (CEST)
Received: from [150.132.142.244] (153.88.115.8) by esessmw0184.eemea.ericsson.se (153.88.115.82) with Microsoft SMTP Server id 8.3.213.0; Fri, 11 May 2012 15:01:00 +0200
Message-ID: <4FAD0D8C.7020701@ericsson.com>
Date: Fri, 11 May 2012 15:01:00 +0200
From: Stefan Hakansson LK <stefan.lk.hakansson@ericsson.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:12.0) Gecko/20120430 Thunderbird/12.0.1
MIME-Version: 1.0
To: "rtcweb@ietf.org" <rtcweb@ietf.org>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
X-Brightmail-Tracker: AAAAAA==
Subject: [rtcweb] New use-case proposed
X-BeenThere: rtcweb@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Real-Time Communication in WEB-browsers working group list <rtcweb.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtcweb>, <mailto:rtcweb-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/rtcweb>
List-Post: <mailto:rtcweb@ietf.org>
List-Help: <mailto:rtcweb-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtcweb>, <mailto:rtcweb-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 11 May 2012 13:01:04 -0000
I've been sketching on a new use-case. The use-case is intended to derive requirements that enable low complex central nodes for multi party sessions, which in turn leads to requirements regarding (essentially) keying solution for SRTP and the possibility for the app to control/set things in the media configuration (in other words, for JSEP): Multi-party with low complexity central node ============================================== A geographically spread (charity, non-profit, school) organization offers its members multi-party video communication via a shared virtual room that participants can enter and leave at any time. At times there are many persons in the virtual room (20+), at other times very few (3-5, or even 0-1). The application will control if few participants (a subset) are shown at a higher fidelity or if many (all) are shown at a lower fidelity or a mix of some few at high fidelity and the rest at much lower fidelity given the existing bandwidth limitations between participants. Since there are at times many persons in the virtual room, it is not feasible to set up a mesh. The bandwidth needed by a participant exceeds what many members have access to, especially in their uplinks, so instead a central media node is deployed. In addition, the organization does not have access to much funds, but has to rely on cheap hardware (often donated) operated by volunteers. From this use-case a high level requirement saying something like "It must be possible to set up media streams and encryption in such a way that processing in a central node is minimized (no transcoding required, no RTP packet rewriting, no decryption/re-encryption for every outgoing flow - just simple forwarding)." can be derived. This can in turn be broken down into more detailed requirements such as: - The keying solution must allow each participants to encrypt to multiple receivers without any decryption+encryption in the middle node - RTP sessions that have SSRCs from multiple PeerConnections being interconneted must be supported. From a given end-point all SSRCs will come over one PC, but the full path will be different towards different sets of SSRCs. - Signalling must be capable of establishing a common set of receiver configurations over all participants. - The API must allow for the above, i.e.: -- The app must be able to chose a keying solution that enables encryption to multiple receivers (if the app can have any control over keying method used) -- The app must be able to control SSRCs to use for outgoing streams -- The app must be able to control the receiver configuration the browser uses Is this something we should consider adding to the use-case document? Br, Stefan
- Re: [rtcweb] New use-case proposed Magnus Westerlund
- Re: [rtcweb] New use-case proposed Roman Shpount
- Re: [rtcweb] New use-case proposed Göran Eriksson AP
- [rtcweb] New use-case proposed Stefan Hakansson LK
- Re: [rtcweb] New use-case proposed Justin Uberti
- Re: [rtcweb] New use-case proposed Göran Eriksson AP
- Re: [rtcweb] New use-case proposed Harald Alvestrand
- Re: [rtcweb] New use-case proposed Henry Lum
- Re: [rtcweb] New use-case proposed Harald Alvestrand
- Re: [rtcweb] New use-case proposed Göran Eriksson AP
- Re: [rtcweb] New use-case proposed Dan Wing
- Re: [rtcweb] New use-case proposed Marshall Eubanks
- Re: [rtcweb] New use-case proposed Dan Wing
- Re: [rtcweb] New use-case proposed Michael Welzl
- Re: [rtcweb] New use-case proposed Magnus Westerlund
- Re: [rtcweb] New use-case proposed Oscar Ohlsson