Professional Documents
Culture Documents
AES67
How the net was won
Francis Rumsey
Staff Technical Writer
The AES67 standard describes a relatively straightforward
collection of networking solutions and protocols that together
enable audio networks to interoperate. A special session presented
during the 135th Convention explained the decisions that were
made and the compromises involved during the development of the
standard, led by some of the key protagonists.
T
he AES67 standard for network audio Key criteria of the AES project, originally using them. (Kevin Gross adds that when
interoperability, launched in Septem- known as X192, included low latency (less investigating the existing proprietary solu-
ber last year, stands as a beacon of than ten milliseconds) and high perform- tions, it was found that although they used
cooperation between otherwise competing ance, but the scope excluded non-IP similar approaches they were not designed
parties. During a special session that was networks, audio data compression, and low- to talk to each other, as shown in Table 1.)
part of the network audio track at the 135th performance networks such as the public These issues came down to questions
Convention, chaired by Greg Shay, some of Internet. Video was excluded, but the foun- including methods of synchronization,
the leading lights explained how the stan- dations set out in AES67 are likely to be payload formats, and the way in which the
dard was designed. Also included in this useful for video as well as audio. The group transport system was used.
article is a summary of the key features of undertaking this challenging task consisted
AES67, a standard that will change the way of members from over 100 companies, as AES67 IN A NUTSHELL
that audio networks operate together. well as broadcasters and live sound engi- The topic of synchronization was of crucial
neers. Led by Kevin Gross, it managed to importance, said Hildebrand, and the group
WHAT PROBLEMS WAS AES67 move from inception to published standard settled on IEEE1588–2008 as the way for-
DESIGNED TO SOLVE? within the impressive time scale (for stan- ward. This essentially specifies the Preci-
Andreas Hildebrand of ALC NetworX dards work) of three years. sion Time Protocol (PTP) version 2 as the
explained that the new standard aimed to Although there had been a number of means to achieve synchronization. PTP dis-
tackle the issue of interoperability for audio existing protocols for carrying audio based
networks based on Internet Protocol (IP) on IP, it had not been possible until now to
using existing solutions as much as possible. exchange data packets between networks
Table 1. Existing network technologies, listing their sync and transport methods (courtesy Kevin Andreas Hildebrand explained the basic
Gross) principles of AES67.
but it is likely to work with a broader range devices. (Kevin Gross comments that
of equipment. (Annex D of the standard unicast is more secure and can be more
explains how to use the highly accurate simple and efficient if there is only one
clocking system employed in AVB as a intended receiver.) SIP (session initiation
replacement for that specified in AES67.) protocol) can be used to set this up, being a
AVB uses Ethernet as a transport proto- protocol that is also used for things such as
col and employs a VLAN tag at the start of establishing telephone calls over IP. It
each packet to set a high priority. Within involves a certain software overhead but it
these AVB packets the audio information is was considered “worth it,” said Shay.
carried as a Firewire payload. So essen- Dealing with the “discovery problem”
tially AVB is a form of “Firewire over was one of the biggest compromises that
Ethernet.” AES67 uses the 6-bit DSCP the group made, according to Shay. With
field in the IP header for setting packet many audio channels available, an auto-
priority. (VLAN tags are allowed but are matic system to find what is “out there”
not required for AES67.) Kevin explained would have many advantages. However
that the majority of IT professionals know there was no off-the-shelf solution that
Greg Shay spoke on management and
a lot more about IP than they do about would do everything for everyone, and the
discovery.
lower-level Ethernet, so this was an argu- group did not want to compromise the
ment to go with IP for AES67. Gross. If you want such a feature, you future use of the standard by saddling it
There is a bandwidth reservation always have the choice of using an AVB with a solution that was inadequate for
approach used in AVB that attempts to network, or indeed running AES67 data some use cases. An appendix to the stan-
calculate whether there is sufficient band- over an AVB network, as described in Annex dard, therefore, presents a survey of exist-
width to handle a stream on the network C of the standard. ing options, leaving it to the user to
before it is “admitted.” This is designed to implement whatever is appropriate.
ensure that if a stream is allowed onto the CONNECTION MANAGEMENT
network it will always have enough capacity AND DISCOVERY SUMMARY
to run properly. AES67, on the other hand, Connection management is about getting The AES67 standard describes a relatively
does not employ any such “admission audio communication going, said Greg straightforward collection of networking
control,” so if there is insufficient capacity Shay, whereas discovery is about finding solutions and protocols that together
you will experience unreliable transmis- out what devices are on the network, rather enable audio networks to interoperate. This
sion. It’s therefore up to the system like a phone book. In AES67 there is no may require some existing systems to be
designer to make sure that the network has connection management on top of the mul- adapted, and the approach may not work
sufficient capacity to handle the scenarios ticast mode. In essence, audio streams are under all circumstances or for all applica-
you expect. (This is also true of AVB, of broadcast on the network and other devices tions, but the building blocks are those
course, it’s just that with AVB you would pick them off as required. This is very sim- used in standard IP network systems and so
get an “access refused” response if you tried ple to implement. Internet Group Manage- should be relatively easy to implement by
to send data on a network that was already ment Protocol (IGMP) is usually imple- developers.
too full, rather than it being accepted and mented in a network switch and it simply
the result being unpredictable.) There have requires that devices advertise themselves
Editor’s note: Go to
already been some failed attempts by the as potential sources, while receivers sub- www.mobiltape.com/conference/Audio-
Internet Engineering Task Force (IETF) to scribe to a particular multicast stream. Engineering-Society-135th-Convention to
introduce forms of admission control for AES67 needed to have a unicast mode as purchase and download an mp3 (13AES-
IP-based networks, and those people have well as multicast. Unicast modes involve N05) of this workshop.
pretty much given up on the idea, said point-to-point connections between
The AES67 project group celebrates the successful completion of its work, with Richard Foss (chair, working group SC-02-12) and Kevin Gross
(leader of the project) seated center.