Issue 11035: Must send GAP when filtering on writer-side Jira Issue DDSIRTP2-30
Issue 15885: RTF needs to agree any chnage of name and/or URL for specification Jira Issue DDSIRTP2-31
Issue 15912: DDSI/RTPS Key MD5 Hash Jira Issue DDSIRTP2-32
Issue 16099: How should interoperable implementations deal with Transient / Persistent data." Jira Issue DDSIRTP2-33
Issue 16100: How should interoperable implementations deal with Group Coherent updates Jira Issue DDSIRTP2-34
Issue 16558: Key attributes and Regular attributes of a topic should be individually de-serializable Jira Issue DDSIRTP2-35
Issue 16954: Remove the concept of Topic Kinds (With Key vs. No Key) Jira Issue DDSIRTP2-36
Issue 16955: Use the term "Encapsulation" consistently and precisely Jira Issue DDSIRTP2-37
Issue 16957: Editing issues Jira Issue DDSIRTP2-38
Issue 16963: Section: 8.4.7.3, Table 8.52 Jira Issue DDSIRTP2-39
Issue 16964: Section: 8.4.8.1.4 Jira Issue DDSIRTP2-40
Issue 16965: Section: 8.4.9.1.4 Jira Issue DDSIRTP2-41
Issue 16966: Section: 8.4.14.1.1, Bullet 3 Jira Issue DDSIRTP2-42
Issue 16967: Section: 8.4.15.7 Jira Issue DDSIRTP2-43
Issue 16968: Section: 8.5.3.2, Figure 8.27 and Table 8.73 Jira Issue DDSIRTP2-44
Issue 16969: Section: 8.5.3.2, Table 8.73 Jira Issue DDSIRTP2-45
Issue 16970: Section: 8.7.6 Jira Issue DDSIRTP2-46
Issue 16978: Section: 9.6.2.2 Jira Issue DDSIRTP2-47
Issue 16979: Section: 9.6.2.2 Jira Issue DDSIRTP2-48
Issue 16980: Section: 9.6.2.2 Jira Issue DDSIRTP2-49
Issue 16981: Section: 9.6.2.2.2, Table 9.12 Jira Issue DDSIRTP2-50
Issue 16982: Section: 9.6.2.2.2, Table 9.12 Jira Issue DDSIRTP2-51
Issue 16983: Section: 9.6.2.2.2, Table 9.13 Jira Issue DDSIRTP2-52
Issue 16984: Section: 9.6.2.2.2, Table 9.13 Jira Issue DDSIRTP2-53
Issue 17285: The Writer Liveliness Protocol should be removed Jira Issue DDSIRTP2-54
Issue 17286: Message Size should be included as part of DDSI/RTPS Messages Jira Issue DDSIRTP2-55
Issue 19237: Clarification of link comment Jira Issue DDSIRTP2-56
Issue 19508: Some constants specified in PSM table 9.4 conflict with the ones used in wireshark Jira Issue DDSIRTP2-57
Issue 19660: Clarify start of alignment for SerializedPayload Jira Issue DDSIRTP2-58
Issue 19694: Locator_t kind needs a reserved range and a range for vendor extensions Jira Issue DDSIRTP2-59
Issue 19730: Incorrect/misleading description of KeyHash computation Jira Issue DDSIRTP2-29
Issue 19818: missing space "eachother" Jira Issue DDSIRTP2-60
Issue 11035: Must send GAP when filtering on writer-side (ddsi-rtps-rtf)
Click here for this issue's archive.
Source: Real-Time Innovations (Mr. Kenneth Brophy, ken(at)rti.com)
Nature: Uncategorized Issue
Severity:
Summary:
Title: Must send GAP when filtering on writer-side regardless of reliability QoS setting Source: Real-Time Innovations, Inc. (Ken Brophy, [email protected]) Summary: This issue is not currently in a state to be resolved. What follows are various thoughts on the issue and possible solutions to be discussed. This issue will not be resolved in time for the finalization task force and is included here to be documented for the revision task force. Discussion topic: what are DDS semantics for combining filtering with the deadline QoS? Should the deadline be triggered when all samples during the deadline period were filtered out? That is, does deadline require at least one sample to arrive every deadline period seconds that passed the filter? Or is the deadline satisfied when any sample arrives within the period, whether filtered out or not? If deadline only applies to samples that pass the filter, RTPS needs no changes, simply use the GAP subMessage to avoid incorrect onDataLost callbacks. If not, we run into a problem when using keyed DataWriters and finite deadlines. As the deadline applies on a per instance basis, the Reader expects at least one update for every instance, even when none of the updates for a particular instance pass the filter. A GAP message does not indicate for which instance an update was filtered out, so it cannot be used by the Reader to verify the deadline constraint. Instead, we should consider using an empty DATA message instead, possibly with a flag that states the update did not pass any filter. This would also be useful to add a new instance state NOT_ALIVE_FILTERED or so later on to the DDS spec. Another possibility would be to add a list of KeyHashes to the GAP message. SO that a GAP that is caused by a CFT actually encodes the instances that are being gapped. This would not cause incorrect firings of the DEADLINE and as a result would maintain ownership of instances even if they are filtered out� There are two ways to do this. Either we separate GAPs that correspond to filtered samples from those that correspond to irrelevant samples. So in effect we have two kinds of GAP messages Or we list explicitly the sequence number of each filtered message along with its KeyHash. Not clear what would be easier implementationwise. The samples that have been filtered are still on the writer so it appears that either implementation would work. Option (1) would save putting the sequence number with each KeyHash. This can be 4 or 8 bytes per instance, depending on whether we put the sequence number as is, or we encode it as an increment Option (2) would cause additional GAP submessages to be sent which is an overhead of 28 bytes. Not clear what is less costly� Also, if we use Option(1), then the messages that represent real GAPs can be sent via multicast; but this is only likely to occur when late joiners appear as normally there would be no "irrelevant" gaps if data is published immediately. Moreover we can in practice still do this and separate the GAP messages that represent real GAPs from the ones that don't. Option 1 does not force us to combine, just provides the means to do so� Option (2) has the problem that in certain edge cases the overhead is significant. For example if each we have a irrelevant-sample GAP followed by a filtered sample, followed by an irrelevant sample gap, etc. then we end up sending one GAP message per filtered sample with is 28 bytes of overhead per filtered sample versus a single GAP with 4 bytes of overhead per filtered sample. Also the processing is much more efficient as each GAP message is dispatched separately up the receiver's stack. For this reason it appears that Option 1 is more flexible, and the overhead is more stable. Opt Proposal(s): Always send GAPs for filtered-out messages (both in the BestEffort and in the RELIABLE) cases If the type is Keyed, then the GAP also includes at the end a sequence of : struct FilteredSampleDesc { long gapStartOffset; KeyHashPrefix keyHashPrefix; KeyHashSuffic keyHashSuffix; }; The GAP message gets two additional flags: KeyHashFlag indicates the presence of the KeyHashPrefix FilteredSamplesFlag Indicates the presence of the sequence< FilteredSampleDesc> An issue needs to be filed against the DDS spec to clarify: (a) Whether the deadline as specified by a DataReader should apply to the samples that pass the DataReader filter or to the samples sent by any writer? (b) Whether a new instance_state ALIVE_FILTERED should be added such that the DataReader can determine that a sample was filtered and potentially take action on that. (c) Whether an API or a QoS should be added to the DataReader to allow the DataReader to remove the instance information for instances with state ALIVE_FILTERED after all samples are taken. This allows resources to be conserved in the case where once filtered we expect the instance to remain filtered and also allows a reader to be notified if the instance becomes unfiltered. (d) Weather to add a filtered_generation_count that the instance has becomed ALIVE after being in the ALIVE_FILTERED Resolution: T4 should include code and description that states that when the sample is not relevant, send a GAP�same for the stateful best effort writer. Revised Text:
Proposal(s): Always send GAPs for filtered-out messages (both in the BestEffort and in the RELIABLE) cases If the type is Keyed, then the GAP also includes at the end a sequence of : struct FilteredSampleDesc { long gapStartOffset; KeyHashPrefix keyHashPrefix; KeyHashSuffic keyHashSuffix; }; The GAP message gets two additional flags: KeyHashFlag indicates the presence of the KeyHashPrefix FilteredSamplesFlag Indicates the presence of the sequence< FilteredSampleDesc> An issue needs to be filed against the DDS spec to clarify: (a) Whether the deadline as specified by a DataReader should apply to the samples that pass the DataReader filter or to the samples sent by any writer? (b) Whether a new instance_state ALIVE_FILTERED should be added such that the DataReader can determine that a sample was filtered and potentially take action on that. (c) Whether an API or a QoS should be added to the DataReader to allow the DataReader to remove the instance information for instances with state ALIVE_FILTERED after all samples are taken. This allows resources to be conserved in the case where once filtered we expect the instance to remain filtered and also allows a reader to be notified if the instance becomes unfiltered. (d) Weather to add a filtered_generation_count that the instance has becomed ALIVE after being in the ALIVE_FILTERED Resolution: T4 should include code and description that states that when the sample is not relevant, send a GAP�same for the stateful best effort writer. Resolution: This issue cannot be resolved until the DDS specification defines what the correct behavior is for readers that use both content-filtered topics and a deadline. The proposal is to leave this issue unresolved for now until the DDS specification clarifies the semantics of the deadline. The opinion of this RTF task force is that a content filter prevents non-matching data from arriving in the datareader and a deadline applies to a datareader. Therefore deadline only applies to samples that pass the filter. When read- and/or query conditions are used instead of content filters, data always arrives at the datareader and deadline applies to all samples. Revised Text: Proposed Disposition: Deferred
The DDS interoperability protocol is also referred to as RTPS. OMG staff have received conflicting suggestions for the short name of the protocol (RTPS vs. DDSI). This short name determines (amongst other things) the URL by which the mist recent version of the specification is always accessible. The RTF must decide what short name to use for this specification.
In section 8.7.9 of the DDSI/RTPS v2.1 protocol is described the KeyHash sub-message-element representing the MD5 hash of the key for the Data sub-message to which it belongs. The specification does not mandate the use of the KeyHash all keyed topics -- implementations are free to include it or not. However, if implementations are not including the KeyHash the only way to get a clue on the Topic Instance to which the received samples belongs is to de-serialize the payload. This leads two at least two problems, (1) DDSI/RTPS routers are forced to de-serialize the data payload even if no content transformation have to be performed and (2) DDS Implementations are forced to deserialize eagerly in order to manage instances, thus preventing DDS implementations to do lazy deserialization (which is now possible with the API provided by the new C++/Java PSM). The suggested resolution is to require that Data SubMessage for keyed topic shall always include the KeyHash submessage element.
The DDSI-RTPS Specification v2.1 does not currently specify how interoperable implementations should deal with Transient / Persistent data."
The DDSI-RTPS Specification v2.1 does not currently specify how interoperable implementations should deal with Group Coherent updates
Key attributes and Regular attributes of a topic should be individually de-serializable (or at least make the keyhash compulsory) [Nature] Architectural [Severity] Major [Description] The "DDS Interoperability Wire Protocol v2.1" defines a a serialization format for topic types in which it is not easy, nor efficient, to simply get access to the key of a given topic. This has to do with how CDR serializes structs but could be worked around with the new X-Types specification. In essence the problem is that some applications such as DDS routers (such as the PrismTech BlendBox) require to perform some operations that while requiring a knowledge of the instance do not require the deserialization of the data payload. [Resolution] For DDS implementation compatible with the X-Types ensure that the regular data attributes and the key attributes are serialized in different chunks and thus individually accessible in an efficient manner -- meaning to access the key I would prefer not to scan all the regular attributes. For non X-Types compatible DDS implementations make the KeyHash compulsory, meaning require DDS compliant implementation to always send a key-hash along with a Data submessage.
This distinction is important for DDS, but not relevant for RTPS. There are places where RTPS deals with the Key as an independent unit of data (KeyFlag, etc.), but those are not relevant to the TopicKind_t which seems to be an artifact of an older version of the specification. The current protocol as written in this specification works the same way for both With Key and No Key topics. This issue seeks to remove the Topic Kind concept entirely from the specification. Section: 8.2.1.2, Table 8.2 Page: 14 Change: remove the table row for TopicKind_t Section: 8.2.1.3, Figure 8.2 Page: 16 Change: remove the topicKind attribute in Endpoint Section: 8.2.5, Figure 8.5 Page: 21 Change: remove the topicKind attribute in Endpoint Section: 8.2.6, Table 8.9 Page: 23 Change: remove the table row for TopicKind_t Section: 8.2.9.1, Figure 8.6 Page: 25 Change: remove the if() statements for W::topicKind Section: 8.2.9.1.3-4 Page: 26-27 Change: remove the if() statements for the_rtps_writer.topicKind and the paragraphs �This operation has no effect if the topicKind==NO_KEY).� Section: 8.3.3, Figure 8.8 Page: 31 Change: remove NoKeyData and NoKeyDataFrag Section: 8.3.7, Bullets 1-2,4 Page: 43 Change: remove the text �(NO_KEY Reader/Writer or WITH_KEY Reader/Writer)� Section: 8.3.7.2 Page: 47 Change: remove the text �(NO_KEY or WITH_KEY)� Section: 8.3.7.3 Page: 49 Change: remove the text �(NO_KEY or WITH_KEY)� Section: 8.3.7.2, 3rd Bullet Page: 63 Change: remove the text referring to �keyed topics� Section: 8.4.4 Page: 69-70 Change: remove all references to topicKind, WITH_KEY, NO_KEY, etc. Section: 8.4.7.1, Figure 8.15 Page: 72 Change: remove the topicKind attribute in Endpoint Section: 8.4.8.1 Page: 83 Change: remove �WITH_KEY� Section: 8.4.8.1, Figure 8.16 Page: 84 Change: remove �WITH_KEY� Section: 8.4.8.2 Page: 85 Change: remove �WITH_KEY� and �NO_KEY� Section: 8.4.8.2, Figure 8.17 Page: 86 Change: remove �WITH_KEY� Section: 8.4.9.1 Page: 90 Change: remove �WITH_KEY� and �NO_KEY� Section: 8.4.9.1, Figure 8.18 Page: 90 Change: remove �WITH_KEY� Section: 8.4.9.2 Page: 93 Change: remove �WITH_KEY� and �NO_KEY� Section: 8.4.9.2, Figure 8.19 Page: 94 Change: remove �WITH_KEY� Section: 8.4.10.1, Figure 8.21 Page: 102 Change: remove the topicKind attribute in Endpoint Section: 8.4.11.1 Page: 109 Change: remove �WITH_KEY� and �NO_KEY� Section: 8.4.11.1, Figure 8.22 Page: 110 Change: remove �WITH_KEY� Section: 8.4.12.1 Page: 111 Change: remove �WITH_KEY� and �NO_KEY� Section: 8.4.12.1, Figure 8.23 Page: 111 Change: remove �WITH_KEY� Section: 8.4.12.2 Page: 113 Change: remove �WITH_KEY� and �NO_KEY� Section: 8.4.12.3, Figure 8.25 Page: 117 Change: remove �NOKEYDATA� alternative Section: 8.5.3.3, Tables 8.74 and 8.75 Page: 129 Change: remove topicKind rows from both tables Section: 9.3.2, Table 9.4 Page: 155 Change: remove the �TopicKind_t� row
Encapsulation has a precise technical meaning from the CORBA spec (formal/11-11-02 section 9.3.3) and a similar meaning from chapter 10 of RTPS, neither of which matches most of the other uses of �encapsulation� throughout the RTPS spec. In general, encapsulation means adding specific prefix bytes to the on-the-wire representation of data. This prefix can be used by the receiver to understand the format of the following bytes. The majority of uses of �encapsulation� in the specification do not agree with this meaning. This issue seeks to fix that by using the simpler term of �encoding� in place of �encapsulation.� Section: 8.3.2, Table 8.13, Count_t row Page: 30 Change: replace �encapsulate� with �encode� Section: 8.3.3.2, Table 8.15, flags row Page: 34 Change: replace �encapsulate� with �encode� Section: 8.3.5.1 Page: 37 Change: replace �encapsulate� with �encode� Section: 8.3.5.9, Paragraph 1 Page: 41 Change: replace �encapsulate� with �encode�; replace �encapsulation� with �encoding� Section: 8.3.7.9.2, Table 8.41, protocolVersion and VendorId rows Page: 59 Change: replace �encapsulate� with �encode�; replace �encapsulated� with �encoded� Section: 8.4.10.3 Page: 105 Change: replace �encapsulated� with �represented� (this use has nothing to do with encoding) Section: 8.5.3.2, Table 8.73, expectesInlineQos row Page: 126 Change: replace �encapsulated� with �encoded� Section: 9.4.2.11, Paragraphs 5, 7, 9 Page: 165 Change: replace �encapsulation� with �encoding�. Note that ParameterList itself is not an encapsulation. When it is used as the data payload for Discovery, it is the encapsulated data. When it is used as inlineQos it is not encapsulated. Each data value in the ParameterList is certainly not a CDR encapsulation. Section: 9.6.2.2, Paragraphs 4-5 Page: 181 Change: replace �encapsulates� with �encodes�; replace �encapsulated� with �encoded� (twice) Section: 9.6.2.2.2 Page: 182 Change: replace �encapsulate� with �encode� Section: 9.6.3 Page: 187 Change: replace �encapsulated� with �encoded� Section: 8.6.3.3 Page: 190-191 Change: replace �encapsulated� with �encoded� (twice); replace �encapsulation� with �encoding� (six times) Section: 10 Page: 193 Change: The introduction to section 10 (before the 10.1 header) should be removed. It adds no useful information and only confuses things with ambiguous use of the "encapsulate" term and the concept of a "type-plugin" which is nowhere to be found in the DDS specification. Since there is no 10.2, the contents of 10.1 can become 10. Regarding just the first sentence, data encapsulation must be part of RTPS or it would not be here, and different DDS implementations would not be able to interoperate.
The following collection of proposed changes represents fixes to problems in the editing of the specification. Section: 3 Page: 1 Change: DDS 1.1 is obsolete; CORBA should be referenced for IDL/CDR; IETF RFCs 1321 and 1305 should be referenced Section: 8.2.4.2, Paragraph 2 Page: 21 Change: First two octets of prefix are fixed due to issue 12509 Section: 8.3.6.3, Bullet 2 and Footnote 2 Page: 43 Change: PROTOCOL_RTPS is not defined by PSM Section: 8.3.7.3.2, Table 8.35 Page: 50 Change: KeyFlag is missing from the table Section: 8.3.7.3.2, Table 8.35 Page: 51 Change: Remove the line "Present only if DataFlag is set in the header", as DataFrag has no such flag. Remove the line "Present only if either the DataFlag or the KeyFlag are set in the header", as DataFrag has no DataFlag. In the first bullet point replace "If the DataFlag is set" with "If the KeyFlag is not set". Section: 8.4.1 Page: 63 Change: Section 8.4.13 (Writer Liveliness) is missing from this list. Section: 8.4.7.1, Figure 8.15 Page: 72 Change: resendDataPeriod is unused, it should be removed Section: 8.4.7.2, Table 8.49 Page: 75 Change: resendDataPeriod is unused, it should be removed Section: 8.4.7.2, Table 8.50 Page: 76 Change: Locator_t in this table should be ReaderLocator Section: 8.4.7.2.1 Page: 76 Change: resendDataPeriod is unused, it should be removed Section: 8.4.7.2.2, 8.4.7.2.3 Page: 76 Change: Locator_t in these sections should be ReaderLocator Section: 8.4.7.3 Page: 77 Change: In figure 8.15, type of locator is Locator_t[*] but the [*] is missing from this table and the text should reflect the true cardinality. Section: 8.4.9.2 Page: 93 Change: The sentence fragment "Submessages are used�" is nonsensical, it should be removed. Section: 8.5.3.2, Table 8.73 Page: 127 Change: The six constants for BuiltInEndpoints (each constant describes an endpoint, not an endpoint set) are all missing from the PSM Section: 8.5.3.3, Figure 8.29 Page: 128 Change: Remove figure 8.29, it is a duplicate of figure 8.28 Section: 9.3.1.5 Page: 153 Change: OMG Issue 12509 was resolved but the changed text is missing here Section: 9.3.2, Table 9.4 Page: 153 Change: OMG Issue 12507 was resolved but the assigned Vendor IDs are not listed. If they should not be listed in the spec, a URL to the appropriate omg.org web site should be listed here. Section: 9.3.2, Table 9.4 Page: 156 Change: ReliabilityKind_t is not used on the wire, it should be a PIM-only concept and removed from the PSM Section: 9.3.2, Table 9.4 Page: 157 Change: Property_t and EntityName_t are not used by the protocol, they should be removed Section: 9.3.2, Table 9.4 Page: 158 Change: Three problems with the constants for BuiltinEndpoints: 1. the constants don't match the table in the PSM, so the reader of the spec must guess to determine how they are used. 2. constants corresponding to propagation of Topic discovery data are missing. 3. constants for 'participant proxy' and 'participant state' need further explanation (or removal from the spec) Section: 9.4.5.3, block diagram Page: 170 Change: Flag "K" is missing from the flags byte Section: 9.6.2.1 Page: 180 Change: The wire-representation diagram is missing the participantGuidPrefix and kind fields (also see OMG Issue 12501) Section: 9.6.2.2, Table 9.10 Page: 181 Change: remoteWriterGuid belongs to WriterProxy, not ReaderProxy Section: 9.6.2.2, Table 9.10 Page: 181 Change: Table 9.10 caption is incorrect Section: 9.6.2.2.2, Table 9.12 Page: 184 Change: The following ParameterIds are not used for built-in entities and therefore do not belong in this table: PID_BUILTIN_ENDPOINT_SET, PID_PROPERTY_LIST, PID_TYPE_MAX_SIZE_SERIALIZED, PID_ENTITY_NAME, PID_KEY_HASH, PID_STATUS_INFO (the last six rows). Some of them are already in Table 9.14. Section: 9.6.2.2.2, Table 9.13 Page: 187 Change: The presence of the final three rows of the table with "Reserved for future use" is confusing, why is it in the specification if all (non-vendor-specific) PIDs are effectively reserved. Section: 9.6.3, Table 9.14 Page: 188 Change: PID_DIRECTED_WRITE and PID_ORIGINAL_WRITER_INFO are not described in the subsequent subsections. Section: 9.6.3.2, Table 9.16 Page: 190 Change: KeyHashSuffix does not exist; remove this row from the table. The row for SerializedData should be sufficient to describe the use of PID_COHERENT_SET.
Page: 77 Change: Unlike other tables of operations in this section, none of these operations are described in the text of the section
Page: 85 Change: Figure 8.16 notes that transition T4 can send a GAP, but this section doesn't describe when/how to send a GAP.
Page: 92 Change: Figure 8.18 notes that transition T4 can send a GAP, but this section doesn't describe when/how to send a GAP.
Page: 120 Change: Fragment size should be allowed to be equal to (instead of strictly greater than) 1KB, also define KB as 1024 bytes to avoid the KB/KiB issue (1000 vs. 1024).
Page: 123 Change: Scope of counts is underspecified: is a Heartbeat count scoped to one Writer; is an AckNack/NackFrag count scoped to a Reader itself or to a Reader's conversation with a given Writer?
Page: 126-127 Change: In the figure and the table, BuiltinEndpointSet_t is already a "set" so it should not also be an array with "[*]"
Page: 127 Change: In the row for defaultUnicastLocatorList, "at least one Locator must be present" constrains implementations unnecessarily. As long as each Endpoint has a locator, there is no need for the participant to have a default locator
Page: 146 Change: There is no such "directed" or "peer-to-peer" function described by the DDS spec, therefore none is available to the user. If such a function should be used by RTPS to implement DDS communication, its use by RTPS must be described here. Otherwise remove this section.
This feature should be left open until a decision is made on whether to extend the DDS specification to offer this peer-to-peer functionality Revised Text: Disposition: Defer
Page: 181 Change: Duration_t (used for leaseDuration) is not defined in the PSM. Use Time_t instead?
Page: 181 Change: This section under-specifies the key fields for all four data types. The "inherited" DDS structures do not provide a key field that is useful for RTPS because it is vendor-specific. This section should describe what a "key only" (KeyFlag==1) Data Submessage should contain as its payload for both SPDP and for all 3 types of SEDP. Table 9.13 indicates that Built-In Topic Keys can be encoded as a GUID, which has no correspondence to the actual definition of Built-In Topic Keys.
Page: 182 Change: This section refers to a non-existent "key parameter" in the Data submessage.
Page: 183-184 Change: IPv4Address_t and Port_t are not defined anywhere in the specification
Page: 184 Change: Duration_t (used for PID_PARTICIPANT_LEASE_DURATION) is not defined in the PSM. Use Time_t instead?
Page: 185 Change: The following DDS fields lack a mapping: TopicBuiltinTopicData::topic_data, SubscriptionBuiltinTopicData::durability, PublicationBuiltinTopicData::ownership, SubscriptionBuiltinTopicData::ownership, SubscriptionBuiltinTopicData::presentation, and the "key" field in Publication, Subscription, and Topic. Also, the mapped DDS field SubscriptionBuiltinTopicData::lifespan does not exist in DDS
Page: 184-187 Change: The following RTPS fields lack a mapping: ParticipantProxy::guidPrefix, ReaderProxy::remoteReaderGuid, WriterProxy::remoteWriterGuid. Table 9.10 indicates that they are optional, but they are not possible to encode without a mapping. Also, DiscoveredReaderData::contentFilterProperty (AKA DiscoveredReaderData::contentFilter in the PIM: these should be consistent) is lacking a mapping
The DDSI v2.1 specification describes in section 8.4.13 the Writer Liveliness Protocol as the mechanism used by participants to assess the liveliness of their contained data writers (with automatic liveliness). The Writer Liveliness Protocol is specified as mandatory for compliant implementations. The first remark is that the Writer Liveliness Protocol is not required at all for interoperability, thus it should not be a mandatory requirement for compliant implementation. This is not only easy to reason about, but wireshark captures made during the DDS interoperability demo of the past March 2012 showed how different DDS implementations could work w/o using this protocol. Beyond that, the protocol is simply superfluous as DataWriter liveliness can be anyway asserted via the Participant Liveliness, this in turns is asserted by the participant discovery protocol. Beyond the potential waste of resource required by yet another periodic information flow, what seems very odd is the choices of QoS for the built-in entities that write this periodic message. As described in section 8.4.13.3 these built-int entities communicate reliably and have a history set to KeepLast(1), along with TransientLocal durability. This QoS settings only "works" best for those implementations that tie the reliability send queue to the writer history but is less than ideal for those that rightfully decouple history and reliability. Anyway, however one looks at it this part of the specs seems bogus. In addition as mentioned above is not required for interoperability and generates yet another stream of periodic messages. The recommendation is to remove this section from the next version of the standard.
The DDSI/RTPS wire protocol currently expects the transport to provide the size for the message -- said in other terms, the current version of the protocol can only work with message oriented transports, such as UDP/IP. This assumptions should be dropped in order to enable the use of DDSI/RTPS over stream oriented transports such as TCP/IP. One possible approach to overcome this limitation w/o breaking backward compatibility with other implementation is to add a new sub-message element, say MESSAGE_LEN structured as follows: +--------+--------+--------+--------+ | ID | Flags | octect2NextSME | +--------+--------+--------+--------+ | Message Length | +-----------------------------------+ In addition, for efficient parsing, if the sub-message above, when used, should be always placed right after the RTPS header.
Please excuse my learning curve here. Section 6.1 says that this formal is a supplement to Version 1.1 formal, However there is now a version 1.2. That MIGHT suggest that aspects of 1.2 is not within interoperability to this specification. and that this one is interoperable to 1.1. Which I understand is across major versions and not a mandate. Anyway Please clareify. Is there a document that has version differences overview. If so a reference to that would be value added as well.
In table 9.4 the the PSM RTPS define ReliabilityKind_t defines � RELIABLE as having the value 3. However the Wireshark packet dissector defines ReliabilityKind_t RELIABLE as having the value 2. In table 9.4 the PSM RTPS specification defines LOCATOR_KIND_UDPv6 having the value 2. However the Wireshark packet dissector defines� LOCATOR_KIND_UDPv6� as having the value 8.� The vendors interoperate and used Wireshark to fine-tune their discovery therefore they are actually using the Wireshark-defined values rather than the ones in table 9.4 Proposed resolution: Modify Table 9.4 entry for ReliabilityKind_t from: #define RELIABLE 3 to #define� RELIABLE� 2 Modify Table 9.4 entry for Locator_t from: #define LOCATOR_KIND_UDPv6 2 to #define LOCATOR_KIND_UDPv6 8
Section 9.4.2.12 should clearly state where the alignment begins. Is it before the encapsulation header or after the encapsulation header? Note that 9.4.2.11 already talks about it for the ParameterList encapsulation so 9.4.2.12 should use the same approach. The language in 9.4.2.11 should also be improve to make it less ambiguous, specifically stating that the reset of the alignment occurs after the parameterID before the parameter data is serialized.
The Locator_t contains an integer field that identifies the type of locator. Currently only the values -1, 0, 1, 2 are defined. Which correspond to reserved values as well as UDPv4 and UDPv6. Future revisions of the protocol may define additional kinds for things like TCP v4, TCPv6, shared memory and other transports. At the same time vendors are using this field to identify their own custom transports. To avoid collisions with future revisions of the protocol, the RTPS specification should reserve a range. For example, all kinds with value less than 0x01000000. These values should be reserved for future revisions of the protocol. Vendors that want to define their custom transport should use Locator_t kind with values 0x01000000. And these values should be interpreted in the context of the RTPS vendorId so that different vendors can use the same value to mean different things.
Section� 9.6.3.3 KeyHash (PID_KEY_HASH) says that the KeyHash is either computed as the CDR Big-Endian encapsulation of all the Key fields in sequence, or else as the MD5 of that "CDR Big-Endian encapsulation of all the Key fields in sequence" the decision is based on whether the "CDR Big-Endian encapsulation of all the Key fields in sequence" for that data-type is known to always fit into the 16-byte KeyHash. However the text in the first bullet says "If the maximum size of the sequential CDR encapsulation of all the key fields is guaranteed to be less than 128 bits, then the KeyHash shall be computed... This is misleading as it leave indeterminate the case when the "the maximum size of the sequential CDR encapsulation of all the key fields" is exactly 128 bits. In this case if the sentence is interpreted to mean "strictly less than 128" then an MD5 should be used. If it is interpreted to mean "less or equal" then no MD5 should be applied. � Unfortunately this situation occurs on the builtin-topic types because the GUIDs are exactly 16 bytes. Proposed Resolution: In Section� 9.6.3.3 KeyHash (PID_KEY_HASH). In the first bullet, replace: "If the maximum size of the sequential CDR encapsulation of all the key fields is guaranteed to be less than 128 bits," With "If the maximum size of the sequential CDR encapsulation of all the key fields is guaranteed to be less or equal than 128 bits,"
There is a missing space in paragraph 5 of "eachother" should be "each other"