...MPSTME, NMIMS 2012-2013 Multimedia Ameya Dighe 162, Raghav Jaju 165, Ujjwal Kumar 177 Times have changed. People want to use the Internet not only for text and image communications, but also for audio and video services. We concentrate on applications that use the Internet for audio and video services. 1. INTRODUCTION Audio & video services is divided in 3 parts: * streaming stored audio/video, * streaming live audio/video, * interactive audio/video In the first category, streaming stored audio/video, the files are compressed and stored on a server. A client downloads the files through the Internet. This is sometimes referred to as on-demand audio/video. Examples of stored audio files are songs, symphonies, books on tape, and famous lectures. Examples of stored video files are movies, TV shows, and music video clips. In the second category, streaming live audio/video, a user listens to broadcast audio and video through the Internet. A good example of this type of application is the Internet radio. Some radio stations broadcast their programs only on the Internet; many broadcast them both on the Internet and on the air. Internet TV is not popular yet, but many people believe that TV stations will broadcast their programs on the Internet in the future. In the third category, interactive audio/video, people use the Internet to interactively communicate with one another. A good example of this application is Internet telephony and Internet teleconferencing...
Words: 4574 - Pages: 19
...for Real-time Transport Protocol defines a standard packet format for delivering audio and video over the internet. It is defined in RFC 1889. It was developed by the Audio Video Transport Working group and was first published in 1996. RTP is used extensively in communication and entertainment systems that involve streaming media, such as telephony, video teleconference applications, television services and web-based push-to-talk features. RTP is an end-to-end transfer of data in real-time. What this means is that data is sent from the server to the client(s) and is in actual time. Imagine something like Internet radio which is audio only, but there should be few lapses in the transmission since the data is usually buffered. A buffer is when data is stored in memory and played from memory. The buffer may allow for a few seconds of stored information before playing. Some applications can allow for setting the buffer amount. RTP is used in conjunction with the RTP Control Protocol (RTCP). While RTP carries the media streams (e.g., audio and video), RTCP is used to monitor transmission statistics and quality of service (QoS) and aids synchronization of multiple streams. RTP is originated and received on even port numbers and the associated RTCP communication uses the next higher odd port number. RTP is one of the foundations of VoIP and it is used in conjunction with SIP which assists in setting up the connections across the network. The Real-Time Transport Protocol (RTP)...
Words: 604 - Pages: 3
...Voice Chat & Video Conferencing INDEX Title of Project……………………………………………………. i Certificate………………………………………………………… ii Acknowledgements……………………………………………… iii 1 Introduction 2 Design & Implementation 2.1 Why Java Platform 2.2 Java Media Framework Streaming Media Architecture Presentation Processing Capture Media Data Storage & Transmission 2.3 Real-time Transport Protocol Streaming Media RTP Architecture RTP Application 2.4 JMF RTP Application Programming Interface RTP API Architecture Reception Transmission 2.5 Requirements & Specification Feasibility Analysis Requirements Functionality Specification 2.6 Diagrams 3 Results 3.1 Snapshots 3.2 Future Offshoots 3.3 Conclusion References CHAPTER 1 INTRODUCTION Introduction To sum up, the at most priority must be given to the definition of the problem statement of the project to be undertaken. So the project is a set of file related with each other developed by the creators of the system to accomplish a specific purpose. Our purpose is to design project for “VOICE CHATTING & VIDEO CONFERENCING”. As the name suggests, our project is based on audio/video transmission & reception. Through our application two or more persons in an intranet can Chat with one another & they can have Video Conferencing...
Words: 5465 - Pages: 22
...Assignment 2: Network protocols numbers 1. What organization has been given the responsibility for assigning protocol numbers? ICANN – The Internet Corporation for Assigned Names and Numbers 2. Determine the protocol numbers for the protocol names: Protocol| Number| IPv4| 4| IPv6| 41| TCP| 6| UDP| 17| ICMP| 1| VRRP| 112| IPSEC ESP| 50| L2TP| 115| OSPF| 89| EIGRP| 88| 3. Determine the correct ICMP type based on the description provided: ICMP Message Description| Type| Code*| Echo| 8| | Echo Reply| 0| | Time Exceeded| 11| 0| Port Unreachable| 3| 3| Fragmentation Needed| 3| 4| 4. What are the valid ranges of protocol numbers? 0-65535 5. What protocol number(s) is/are specified for experimentation and testing? 253 and 254 6. What organization has been given the responsibility for assigning port numbers, sometimes referred to as “Well Known Ports or Registered Ports”? IANA 7. Determine the protocol numbers for the protocol names: Port| Application / Protocol| TCP -23| telnet| TCP -443| HTTPS| UDP -53| Domain name system| UDP -123| Network time protocol| TCP -110| Post office protocol v3| TCP -25| Simple mail transfer protocol| TCP -80| HTTP| UDP -88| kerberos| TCP -22| SSH| UDP -161| Simple network management| 8. What numeric range is commonly referred to as the “well-known ports”? 0 to 1024 9. What numeric port range is commonly used by clients in a client -> server communication session? 0 to 1023 10. What do you believe would be...
Words: 282 - Pages: 2
...Real-Time Transport Protocol Name Professor NETW 320 10/3/2014 Real-Time Transport Protocol (RTP) is a way for programs to manage the real-time multimedia, such as, audio / video, data over unicast (point to point) and/or multicast (multipoint) network services. RTP is used extensively in systems that involve streaming. VoIP, video teleconference applications and several television services utilize RTP. RTP provides an IP-based transmission service for real-time communication between computers or devices. In combination with other protocols, RTP is used for transmitting audio and video information. VoIP uses a combination of protocols to transmit the phone data between computers or from a computer to a cell phone or land-line. VoIP data is changed from an analog signal to a digital signal. Also RTP allows discontinuous transmission (silence suppression) on any audio payload format. The receiver can detect silence suppression on the first packet received after the silence by observing that the RTP timestamp is not contiguous with the end of the interval covered by the previous packet even though the RTP sequence number has incremented only by one ( voipinfo, 2003). Layered protocols transfer, receive and interpret the signal; RTP is a part of the transport layer. RTP itself does not provide a mechanism to secure the transmission quality. It is however, able to ensure real-time communication even without such mechanisms. It uses consecutive numbering of the sent...
Words: 574 - Pages: 3
...List of network protocols (OSI model) This article is about network protocols organized by OSI model. For network protocols organized by TCP/IP model, see Internet Protocol Suite. This is a list of network protocols, categorized by their nearest Open Systems Interconnection (OSI) model layers. This list is not exclusive to only the OSI protocol family. Many of these protocols are originally based on the Internet Protocol Suite (TCP/IP) and other models and they often do not fit neatly into OSI layers. The OSI model | 7 Application layer | 6 Presentation layer | 5 Session layer | 4 Transport layer | 3 Network layer | 2 Data link layer | * LLC sublayer * MAC sublayer | 1 Physical layer | * v * t * e | பொருளடக்கம் * 1 Layer 1 protocols (physical Layer) * 2 Layer 2 protocols (Data Link Layer) * 3 Layer +3 protocols * 4 Layer 3 protocols (Network Layer) * 5 Layer 3.5 protocols * 6 Layer 3+4 protocol suites * 7 Layer 4 protocols (Transport Layer) * 8 Layer 5 protocols (Session Layer) * 9 Other protocols * 10 Layer 7 protocols (Application Layer) * 11 Protocol description languages * 12 See also * 13 Further reading * 14 External links Layer 1 protocols (physical Layer) * Telephone network modems- V.92 * IRDA physical layer * USB physical layer * EIA RS-232, EIA-422, EIA-423, RS-449, RS-485 * Ethernet physical layer Including 10BASE-T, 10BASE2, 10BASE5, 100BASE-TX, 100BASE-FX...
Words: 1041 - Pages: 5
...Computer Networks Applica3on Layer 1 Examples of network applica3ons • • • • • • • e-‐mail web instant messaging remote login P2P file sharing mul3-‐user network games streaming stored video clips • social networks • voice over IP • real-‐3me video conferencing • grid compu3ng 2 1 Crea3ng a network app write programs that application transport network data link physical – run on (different) end systems – communicate over network – e.g., web server soJware communicates with browser soJware No need to write soJware for network-‐core devices – Network-‐core devices do not run user applica3ons – applica3ons on end systems allows for rapid app development, propaga3on application transport network data link physical application transport network data link physical 3 Applica3on architectures • Client-‐server – Including data centers / cloud compu3ng • Peer-‐to-‐peer (P2P) • Hybrid of client-‐server and P2P 4 2 Client-‐server architecture server: – always-‐on host – permanent IP address – server farms for scaling clients: client/server...
Words: 855 - Pages: 4
...TCP/IP Protocol Suite Brad Kauble Benjamin Miller Networking 101 Section 104 November 20, 2013 In the world of the Internet and data networking, applications need a way to transfer information form one user to another, anywhere, anytime in a manner that does not disrupt the applications usefulness. Devices connected to a network use multiple applications simultaneously that send and receive information. That data cannot just be sent across the network with any hope of getting to its destination in any recognizable state if it were not for the Transport layer. The Transport layer divides the data into manageable pieces, packaging and addressing them so they will arrive at their proper destination and then reassembling the pieces into the original signal or stream. This paper will observe the part the Transport layer plays in application data encapsulating for use by the Network layer; how it allows simultaneous communication of multiple applications on a single host device while ensuring reliable data delivery to the right application correcting errors if required. The Transport layer is layer 4 in the Open Systems Interconnection (OSI) Model and layer 2 in the Transmission Control Protocol/Internet Protocol (TCP/IP) Model. The Transport layer is needed to track individual conversations, segment, manage and reassemble data packets, identify sending and receiving applications, perform flow control between end users, enable error recovery and initiate and terminate sessions...
Words: 1829 - Pages: 8
...JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD M. TECH (REAL TIME SYSTEMS) COURSE STRUCTURE AND SYLLABUS I YEAR I SEMESTER Code Group Subject L P Credits Advanced Computer Architecture 3 0 3 Advanced Micro Controllers 3 0 3 Fundamentals of Real Time Systems 3 0 3 Design & Development of Real Time Systems 3 0 3 Elective -I Digital Control Systems Distributed Operating Systems Cloud Computing 3 0 3 Elective -II Digital Systems Design Fault Tolerant Systems Advanced Computer Networks 3 0 3 Lab Micro Processors and Programming Languages Lab 0 3 2 Seminar - - 2 Total Credits (6 Theory + 1 Lab.) 22 JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD MASTER OF TECHNOLOGY (REAL TIME SYSTEMS) I SEMESTER ADVANCED COMPUTER ARCHITECTURE UNIT I Concept of instruction format and instruction set of a computer, types of operands and operations; addressing modes; processor organization, register organization and stack organization; instruction cycle; basic details of Pentium processor and power PC processor, RISC and CISC instruction set. UNIT II Memory devices; Semiconductor and ferrite core memory, main memory, cache memory, associative memory organization; concept of virtual memory; memory organization and mapping; partitioning, demand paging, segmentation; magnetic disk organization, introduction to magnetic tape and CDROM. UNIT III IO Devices, Programmed IO, interrupt driver IO, DMA IO modules, IO addressing; IO channel...
Words: 3183 - Pages: 13
...Term paper cyber security awareness -Topic- Network intrusion detection methods INTRODUCTION Intrusions are the activities that violate the security policy of the system, and intrusion detection is the process used to identify intrusions. Intrusion Detection Systems look for attack signatures, which are specific patterns that usually indicate malicious or suspicious intent. Intrusion Detection Systems (IDSs) are usually deployed along with other preventive security mechanisms, such as access control and authentication, as a second line of defense that protects information systems. Intrusion detection provides a way to identify and thus allow responses to, attacks against these systems. Second, due to the limitations of information security and software engineering practice, computer systems and applications may have design flaws or bugs that could be used by an intruder to attack the systems or applications. As a result, certain preventive mechanisms (e.g., firewalls) may not be as effective as expected. Intrusion detection complements these protective mechanisms to improve the system security. Moreover, even if the preventive security mechanisms can protect information systems successfully, it is still desirable to know what intrusions have happened or are happening, so that we can understand the security threats and risks and thus be better prepared for future attacks. IDSs may be classified into Host-Based IDSs, Distributed IDSs, and Network-Based IDSs according...
Words: 1083 - Pages: 5
...more, we also have to deal with the forthcoming media-enabled 3G mobile phone and how this links in with existing systems. This document explains what these standards, terminologies and buzz-words mean, how they relate to the various communications infrastructures of video conferencing and how they relate to each other. It is assumed that the reader has a general knowledge of Video Conferencing systems. However, the following technical papers are available to provide more information: * How do I choose a Video Conferencing system? * H.323 Terminals, Gatekeepers, Gateways & MCUs. * Global Dialling Scheme (GDS) for Schools VideoConferencing. * H.323 Dial Plan and Service Codes used by Gatekeepers etc. * IP Ports and Protocols used by H.323 Devices. * Cost Efficient ISDN Conferencing, including Multipoint Access. * H.221 Framing used in ISDN Conferences. International Telecommunications Union & The Internet Engineering Task Force. Telecommunications standards are set by the United Nations agency, International Telecommunications Union (ITU)and the Internet Engineering Task Force (IETF). Products that adhere to these standards allow users to participate in a conference, regardless of their platform. These standards for desktop video conferencing ensure compatibility on a worldwide basis. The ITU has developed the H, G and T Series of standards whilst the IETF has developed...
Words: 5144 - Pages: 21
...essential needs to connect one computer to any other in a network. It is a conjectural model that is used commonly in network plan, and in constructing decision. Generally, real networks cling to the Open System Interconnection, however, there are variances with views to the true model. The Open Systems Interconnection supplies an ordinary technique for how current networks work. It separate the technique and steps necessary for a network connection in seven different layers. Each higher division conforms on services given by a lower division. For a complete network connection, information is connected from the top layer on one computer throughout the remaining lower layer, and have a backup of the layers to other computers. The supporting items below explains each layer making assessment for real networking formation as required. 1. Physical Layer: The base layer, physical layer supply the features result in a physical method, used to provide a network connection. The physical layer network result in a physical method, which is a network cable that can transport bits between nodes on the physical network. The physical network can be from an end-to-end, which will result in between two points, or multipoint, which will result in between different points. It can cover half-duplex of one place at a time, or full-duplex of both places broadcasted. The bits can transfer in series or parallel. The need for the physical layer supplies the cable used for the electrical transmit...
Words: 1046 - Pages: 5
...specifics are open and detailed another vendor could come in and also give work and or solutions to the project. Another benefit would be it is easier for systems using different vendors to be able to adapt to the technology and communicate with each other. Therefore open standards are here to stay and further the internet and other projects well from what it is now. Layered architecture is beneficial to society for the reason of easily organizing the tasks at hand. With this method it not only pertains to networking but to real life as well. Layered architecture is not a new process it has been around for quite some time. A protocol is a set of rules that allows the communications between computers on the network. These rules help regulate the guidelines of speed data transfer and access method. A society based protocol would be like a motorcycle club. For example the network would be the president and the computers would be the other members. The protocol would be the Sgt of Arms as for he would be the one that controls the communication between he members and the president. The four types of different networks are LAN (local area network), WLAN (wireless local area network), WAN (wide area network), and VPN (virtual private network). LAN is your most basic form or network; this is where all the computers belong to the same network and plugged into the same hub. WLAN is your second most basic home network, this is where you are wirelessly connected to the internet in your...
Words: 449 - Pages: 2
...specifics are open and detailed another vendor could come in and also give work and or solutions to the project. Another benefit would be it is easier for systems using different vendors to be able to adapt to the technology and communicate with each other. Therefore open standards are here to stay and further the internet and other projects well from what it is now. Layered architecture is beneficial to society for the reason of easily organizing the tasks at hand. With this method it not only pertains to networking but to real life as well. Layered architecture is not a new process it has been around for quite some time. A protocol is a set of rules that allows the communications between computers on the network. These rules help regulate the guidelines of speed data transfer and access method. A society based protocol would be like a motorcycle club. For example the network would be the president and the computers would be the other members. The protocol would be the Sgt of Arms as for he would be the one that controls the communication between he members and the president. The four types of different networks are LAN (local area network), WLAN (wireless local area network), WAN (wide area network), and VPN (virtual private network). LAN is your most basic form or network; this is where all the computers belong to the same network and plugged into the same hub. WLAN is your second most basic home network, this is where you are wirelessly connected to the internet in your...
Words: 449 - Pages: 2
...LAB 3.1-3.4 3.1.1 – WHAT WOULD HAPPEN IF WIRELESS DEVICES WERE NOT GOVERNED BY THE WI-FI ALLIANCE AND EACH VENDOR HAD ITS OWN STANDARDS AND PROTOCOLS? A. WIRELESS DEVICES WOULD HAVE DIFFICULTY COMMUNICATING. WHAT IS OKAY WITH ONE VENDOR MAY NOT BE OKAY WITH ANOTHER VENDOR. PRICES OF DEVICES AND CONNECTIONS WOULD ALSO CHANGE. 3.1.2 – GIVE AN EXAMPLE OF A MODEL THAT IS USED TO VISUALIZE SOMETHING THAT IS DIFFICULT TO OBSERVE OR PERCEIVE. A. CONNECTIONS REQUIRING ROUTER EQUIPMENT – HUBS, SWITCHES AND ROUTERS. 3.1.3 – WHAT ARE THE DIFFERENT LAYERS YOU THINK WOULD BE NECESSARY FOR COMMUNICATION TO BE MAPPED TO A MODEL? A. APPLICATION LAYER, PRESENTATION LAYER, SESSION LAYER, TRANSPORT LAYER, DATA LINK LAYER AND PHYSICAL LAYER. 3.1.4 – WHAT WILL HAPPEN IF A MODEL IS TOO GENERAL? TOO GRANULAR? A. THE MODEL WOULD NOT BE FLEXIBLE IF TOO GENERAL; IF TOO GRANULAR, A LOAD IMBALANCE WOULD OCCUR. 3.1 REVIEW – 1. WHY WOULD A 3-LAYER MODEL OF COMMUNICATION THAT HAS THE LAYERS PHYSICAL, NETWORK AND APPLICATIONS BE INSUFFICIENT TO ADEQUATELY DESCRIBE NETWORK COMMUNICATIONS? A. THE 7-LAYER COMMUNICATION MODEL WAS TESTED AND SUCCESSFULLY PROVEN TO WORK. IF A LAYER IS MISSING THE MODEL WILL NOT WORK PROPERLY. 2. WHAT IS THE HISTORY OF THE OSI REFERENCE MODEL? A. TO SERVE AS THE FOUNDATION OF THE ESTABLISHED WIDELY ADOPTED SUITE OF PROTOCOLS THAT ARE USED BY INTERNATIONAL INTERNETWORKS. 3. WHAT IS THE HISTORY OF THE TCP/IP MODEL? A. BOTH DEVELOPED TOGETHER (INTERNET AND TCP/IP)...
Words: 996 - Pages: 4