1 unstable release
0.1.0 | Dec 5, 2023 |
---|
175KB
3.5K
SLoC
Pickleback
A way to multiplex and coalesce messages over an unreliable stream of datagrams, for game netcode.
It's expected this will be hooked up to UDP sockets; this crate has no networking built-in.
Current Status
Under development. I'm RJ on bevy's Discord if you want to discuss.
There is an unencrypted handshake protocol for establishing a session between PiclebackServer and
PicklebackClient. Most the the useful stuff happens when exchanging Message
packets, after
handshaking. See the test harness for example usage.
Design Goals
To support multiplayer games where most updates are sent in an unreliable fashion, with occasional requirements for reliable ordered messages, such as for in-game chat and on-join state synchronization.
A regular exchange of packets in both directions is expected. In practice this means a packet will be sent in each direction at least 10 times a second even if there are no explicit messages to transmit.
Features
- Coalesces multiple small messages into packets
- Transparently fragments & reassembles messages too large for one packet
- Multiple virtual channels for sending/receiving messages
- Optionally reliable channels, with configurable resending behaviour
- Sending a message gives you a handle to use for checking acks (even on unreliable channels)
- Internal pool of buffers for messages and packets, to minimise allocations
- No async: designed to integrate into your existing game loop. Call it each tick.
- Unit tests and integration / soak tests with bad-link simulator that drops, dupes, & reorders packets.
- Calculates rtt (need to verify outside of test harness)
- Calculate packet loss estimate (need to verify outside of test harness)
- Enforce ordering on ordered channels (currently only reliability is supported)
- Bandwidth tracking and budgeting
- Allow configuration of channels and channel settings (1 reliable, 1 unreliable only atm)
- Prioritising channels when selecting messages to send. Low volume reliables first?
TODO
- Proxy some fns to ConnectedClient to tidy up serverside API
- Benchmarks, including with and without pooled buffers.
- Example using bevy and an unreliable transport mechanism.
Example
use pickleback::prelude::*;
let config = PicklebackConfig::default();
let time = 0.0;
let mut server = PicklebackServer::new(time, &config);
let mut client = PicklebackClient::new(time, &config);
// Address must be valid, but isn't used in this example:
client.connect("127.0.0.1:0");
// in lieu of sending over a network, deliver directly:
fn transmit_packets(server: &mut PicklebackServer, client: &mut PicklebackClient) {
// Server --> Client
{
server.update(0.1);
let mut send_to_client = |address, packet: BufHandle| {client.receive(packet.as_slice(), address); };
server.visit_packets_to_send(&mut send_to_client);
}
// Client --> Server
{
client.update(0.1);
let mut send_to_server = |address, packet: BufHandle| {server.receive(packet.as_slice(), address); };
client.visit_packets_to_send(&mut send_to_server);
}
}
// need to have some back-and-forth here to finish handshaking
// this would usually happen each tick of your game event loop.
// client sends ConnectionRequest
transmit_packets(&mut server, &mut client);
// server responds with ConnectionChallenge
transmit_packets(&mut server, &mut client);
// client responds with ConnectionChallengeResponse
transmit_packets(&mut server, &mut client);
// server sends a keep-alive, denoting fully connected
transmit_packets(&mut server, &mut client);
assert_eq!(client.state(), &ClientState::Connected);
let channel: u8 = 0;
// this can return an error if throttled due to backpressure and unable to send.
// we unwrap here, since it will not fail at this point.
let msg_id = {
let mut connected_client = server.connected_clients_mut().next().unwrap();
connected_client.pickleback.send_message(channel, b"hello").unwrap()
};
// server sends a Message packet containing a single message.
// (when sending multiple messages, they are coalesced into as few packets as possible)
transmit_packets(&mut server, &mut client);
// client will have received a message:
let received = client.drain_received_messages(channel).collect::<Vec<_>>();
assert_eq!(received.len(), 1);
// normally you'd use the .payload() to get a Reader, rather than .payload_to_owned()
// which reads it into a Vec. But a vec here makes it easier to test.
let recv_payload = received[0].payload_to_owned();
assert_eq!(b"hello".to_vec(), recv_payload);
// if the client doesn't have a message payload to send, it will still send
// a packet here just to transmit acks
transmit_packets(&mut server, &mut client);
// now the client has sent packets to the server, the server will have received an ack
let mut connected_client = server.connected_clients_mut().next().unwrap();
// TODO: don't expose pickleback via connected_client, proxy a couple of fns and document..
assert_eq!(vec![msg_id], connected_client.pickleback.drain_message_acks(channel).collect::<Vec<_>>());
Protocol Overview
Packets consist of a packet type, sequence number, ack header, and a payload.
The ack header acknowledges receipt of the last N packets received from the remote endpoint.
Message Packet payloads consist of one or more messages. Messages can be any size, and large messages are fragmented into 1024 byte fragment-messages, and reassembled for you.
When you call send_message
you get a MessageId
. Once the packet your message was delivered in is
acked, you receive an ack for your MessageId
. Unreliable channels also get acks (except if packets are lost).
When sending a message larger than 1024 bytes, you get the ack after all fragments have been delivered, and the message was reassembled successfully.
Reliable channels will retransmit messages that remain unacked for a configurable duration.
Messages are retransmitted, packets are not. ie as-yet unacked reliable mesages will be included in new future packets until such time as they get acked.
Message Size
Arbitrarily limited to 1024 fragments of 1024B, so 1MB maximum messages size.
Remember, as the number of fragments increases, the effects of packet loss are amplified.
10 fragments at 1% packet loss = 1 - (0.99^10) = 9.6% chance of losing a fragment.
Provenance
- Gaffer articles (building network protocol, packet acking, sequence buffer, etc)
- netcode.io rust code (implementation of gaffer concepts)
Dependencies
~3.5–5.5MB
~98K SLoC