How does reliability work in RTCDataChannel
?
When we create a data channel, we pass some options:
dataChannel = RTCPeerConnection.createDataChannel(label[, options]);
The options dictionary has three interesting properties relating to network guarantees:
dictionary RTCDataChannelInit {
boolean ordered = true;
unsigned short maxPacketLifeTime;
unsigned short maxRetransmits;
// ...
};
These properties are not independent! The spec explains:
A RTCDataChannel can be configured to operate in different reliability modes. A reliable channel ensures that the data is delivered at the other peer through retransmissions. An unreliable channel is configured to either limit the number of retransmissions ( maxRetransmits ) or set a time during which transmissions (including retransmissions) are allowed ( maxPacketLifeTime ). These properties can not be used simultaneously and an attempt to do so will result in an error. Not setting any of these properties results in a reliable channel.
So a reliable channel is given by { ordered: true, maxPacketLifeTime: null, maxRetransmits: null }
. Changing any of these values results in an “unreliable” channel, of which there are several types.
The first property, ordered
, says whether “data will be delivered in order.” This presumably means each message is assigned a sequence number, and messages received out-of-order will result in either buffering or discarding.
The other properties, maxPacketLifeTime
and maxRetransmits
, provide a policy for when a sender will give up trying to send a message - that is, they specify “partial reliability”. They “cannot be used simultaneously”: they are two different kinds of policy, and we must choose one or the other. The one we do not use must be set to null
.
The maxPacketLifeTime
property “limits the time during which the channel will transmit or retransmit data if not acknowledged.” More precisely, it is “the length of the time window (in milliseconds) during which transmissions and retransmissions may occur in unreliable mode”. The sender will give up sending the message at the point that this lifetime expires.
The maxRetransmits
property is “the maximum number of retransmissions that are attempted in unreliable mode”.
So here are the possible interesting patterns for RTCDataChannelInit
:
var tcpLike = { ordered: true, maxPacketLifeTime: null, maxRetransmits: null };
var ?? = { ordered: true, maxPacketLifeTime: null, maxRetransmits: 0 };
= { ordered: true, maxPacketLifeTime: 0, maxRetransmits: null };
var signalPerSecond = { ordered: true, maxPacketLifeTime: 1000, maxRetransmits: null };
var ?? = { ordered: true, maxPacketLifeTime: null, maxRetransmits: 5 };
var ?? = { ordered: true, maxPacketLifeTime: 1000, maxRetransmits: null };
var imageTransfer = { ordered: false, maxPacketLifeTime: null, maxRetransmits: null };
var udpLike = { ordered: false, maxPacketLifeTime: null, maxRetransmits: 0 };
= { ordered: false, maxPacketLifeTime: 0, maxRetransmits: null };
var ?? = { ordered: false, maxPacketLifeTime: null, maxRetransmits: 5 };
var ?? = { ordered: false, maxPacketLifeTime: 1000, maxRetransmits: null };
I’m not sure how deduplication of messages fits in. ordered: true
must deduplicate, but if ordered: false
, can the receiving application receive a message multiple times?
How are these actually implemented? A guess. Reliability is implemented at the sender (buffer for retransmit to receiver). Ordering is implemented at the receiver (buffer for release to receiving application).
On the receiver side: ACK all messages. If unordered, keep no state and release all messages to the application (thus admitting possible duplication of messages). If ordered, we must keep some state, depending on whether reliable. If reliable, keep a buffer of incoming messages, and only release them to the application sequentially. If unreliable, only keep a “highest sequence number seen”; release messages with a higher sequence number, and discard the rest.
On the sender side: If totally unreliable (UDP-like), keep no state. Else, keep a list of unacknowledged messages. If totally reliable (TCP), only remove from the list on ACK. Else either maxPacketLifeTime
or maxRetransmits
are set, and they determine what to do when we consider retransmission (at an ACK timeout). If maxPacketLifeTime
is set, keep a timestamp for each message. If maxRetransmits
is set, increment a retransmission counter for each message.
Similar posts
How to write a ‘hello world’ serverless WebRTC app
Including setting up the RTCPeerConnection
, creating a data channel, handling ICE candidates, and generating an offer to be shared with the remote peer. The signaling channel is copy-paste! 2017-01-16
What is STUN?
STUN is a protocol that allows clients to discover their public IP address and port, enabling peer-to-peer connections in WebRTC. 2017-01-15
WebRTC group chat hello world
A WebRTC-based group chat application that uses Ably’s publish-subscribe system for signaling. Clients connect directly via peer-to-peer data channels, with Ably facilitating the initial connection. 2020-10-13
WebRTC - low barrier to entry, low barrier to exit?
WebRTC has many challenges - browser API inconsistencies, protocol ambiguities, infrastructure requirements, and lack of built-in “business logic”. Not as easy as it seemed at first. 2017-02-04
How to run Redis Sentinel
Redis Sentinel provides high availability for Redis. We start a Redis master, then three Redis Sentinel instances. They discover each other, then we trigger a failover. 2019-01-08
What is HTTP keep-alive? What is HTTP request pipelining?
HTTP keep-alive allows reusing the same TCP connection for multiple requests, avoiding the overhead of opening a new connection. HTTP request pipelining sends multiple requests without waiting for their responses. 2018-03-27
More by Jim
What does the dot do in JavaScript?
foo.bar
, foo.bar()
, or foo.bar = baz
- what do they mean? A deep dive into prototypical inheritance and getters/setters. 2020-11-01
Smear phishing: a new Android vulnerability
Trick Android to display an SMS as coming from any contact. Convincing phishing vuln, but still unpatched. 2020-08-06
A probabilistic pub quiz for nerds
A “true or false” quiz where you respond with your confidence level, and the optimal strategy is to report your true belief. 2020-04-26
Time is running out to catch COVID-19
Simulation shows it’s rational to deliberately infect yourself with COVID-19 early on to get treatment, but after healthcare capacity is exceeded, it’s better to avoid infection. Includes interactive parameters and visualizations. 2020-03-14
The inception bar: a new phishing method
A new phishing technique that displays a fake URL bar in Chrome for mobile. A key innovation is the “scroll jail” that traps the user in a fake browser. 2019-04-27
The hacker hype cycle
I got started with simple web development, but because enamored with increasingly esoteric programming concepts, leading to a “trough of hipster technologies” before returning to more productive work. 2019-03-23
Project C-43: the lost origins of asymmetric crypto
Bob invents asymmetric cryptography by playing loud white noise to obscure Alice’s message, which he can cancel out but an eavesdropper cannot. This idea, published in 1944 by Walter Koenig Jr., is the forgotten origin of asymmetric crypto. 2019-02-16
How Hacker News stays interesting
Hacker News buried my post on conspiracy theories in my family due to overheated discussion, not censorship. Moderation keeps the site focused on interesting technical content. 2019-01-26
My parents are Flat-Earthers
For decades, my parents have been working up to Flat-Earther beliefs. From Egyptology to Jehovah’s Witnesses to theories that human built the Moon billions of years in the future. Surprisingly, it doesn’t affect their successful lives very much. For me, it’s a fun family pastime. 2019-01-20
The dots do matter: how to scam a Gmail user
Gmail’s “dots don’t matter” feature lets scammers create an account on, say, Netflix, with your email address but different dots. Results in convincing phishing emails. 2018-04-07
The sorry state of OpenSSL usability
OpenSSL’s inadequate documentation, confusing key formats, and deprecated interfaces make it difficult to use, despite its importance. 2017-12-02
I hate telephones
I hate telephones. Some rational reasons: lack of authentication, no spam filtering, forced synchronous communication. But also just a visceral fear. 2017-11-08
The Three Ts of Time, Thought and Typing: measuring cost on the web
Businesses often tout “free” services, but the real costs come in terms of time, thought, and typing required from users. Reducing these “Three Ts” is key to improving sign-up flows and increasing conversions. 2017-10-26
Granddad died today
Granddad died. The unspoken practice of death-by-dehydration in the NHS. The Liverpool Care Pathway. Assisted dying in the UK. The importance of planning in end-of-life care. 2017-05-19
How do I call a program in C, setting up standard pipes?
A C function to create a new process, set up its standard input/output/error pipes, and return a struct containing the process ID and pipe file descriptors. 2017-02-17
Your syntax highlighter is wrong
Syntax highlighters make value judgments about code. Most highlighters judge that comments are cruft, and try to hide them. Most diff viewers judge that code deletions are bad. 2014-05-11
Want to build a fantastic product using LLMs? I work at
Granola where we're building the future IDE for knowledge work. Come and work with us!
Read more or
get in touch! This page copyright James Fisher 2017. Content is not associated with my employer. Found an error? Edit this page.