• Out-of-Stock
Internet transmission of multimedia data in real time
search
  • Internet transmission of multimedia data in real time
ID: 138361

Bartosz Antosik

Delivery date unknown
 

Free shipping

free shipping in Poland for all orders over 500 PLN

 

Same day shipping

If your payment will be credited to our account by 11:00

 

14 days for return

Each consumer can return the purchased goods within 14 days

The book describes in detail the processes of multimedia data transmission, time-bound, in networks constructed on the basis of the TCP / IP protocol stack. It discusses the adaptation of the IP protocol for real-time data transmission, the construction of a stream of digital multimedia data, the RTP protocol for real-time data transport, and transmission issues in access networks. The SIP, H.323 and RTSP signaling protocols have been described, as well as the methodology of booking the network transmission service (QoS) parameters: Integrated Services and Differentiated Services, security of transmission and organization of real-time multimedia communication using one-to-one (P2P) network mechanisms.
Recipients of the book: students of faculties directly related to IT and telecommunications as well as courses teaching Internet techniques as a utility technician, as well as all others who would like to learn how multimedia telecommunications services work in computer networks.



Table of Contents:
Foreword 9
1. Basics of packet transmission in IP 11 networks
1.1. Model OSI 12
1.2. Internet Protocol (IP) 14
1.2.1. IP addressing 16
1.2.2. IPv4 frame 18
1.2.3. IPv6 frame 20
1.2.4. Route selection (routing) 22
1.2.5. TCP protocol 23
1.2.6. UDP protocol 25
1.2.7. Best-effort model 26
1.3. IP 27 traffic pathologies
1.3.1. Delays 27
1.3.2. Loss of packets 28
1.3.3. Duplication of packages 28
1.3.4. Fragmentation 28
1.3.5. Misrepresentations 29
1.3.6. Changing the order of arrival of packages 29
1.4. Multimedia real time service 30
1.4.1. Streaming 30
1.4.2. Interactive communication 31
1.5. Decomposition of multimedia communication applications in an IP 32 network
1.5.1. Processing of multimedia data 34
1.5.2. Transport of multimedia data 34
1.5.3. Session control 36
1.5.4. Resource reservation 36
1.5.5. Security of transmission 37
1.6. Time budget 37
1.6.1. Processing and compression 37
1.6.2. Packetization 39
1.6.3. Access network 40
1.6.4. Wide area network 41
1.6.5. Variance of delay time 42
1.7. Summary 43
2. Preparation of a multimedia signal for transport 44
2.1. Sound signal 45
2.1.1. Speech signal 45
2.1.2. Music signal 46
2.2. Sound signal processing 47
2.2.1. Acquisition and quantization of the audio signal 47
2.2.2. Encoding and compression of the audio signal 48
2.2.3. Echo elimination 59
2.2.4. Standards for speech signal compression 61
2.2.5. Standards for audio signal compression 64
2.3. Quality of sound transmission 65
2.3.1. Factors affecting the quality of the audio signal 67
2.3.2. Evaluation of the sound signal quality 69
2.4. Image and video signal 72
2.4.1. Pictures 73
2.4.2. Video signals 74
2.5. Image processing 75
2.5.1. Image compression 75
2.5.2. Image compression standards 80
2.5.3. Compression of video sequences 81
2.5.4. Compression standards for video signals 87
2.6. Image transmission quality 95
2.6.1. Factors affecting image quality 95
2.6.2. Image quality measures 96
2.7. Summary 100
3. Transport of multimedia content 102
3.1. Transport protocol 103
3.1.1. Introduction 103
3.1.2. Basics of the RTP 104 protocol
3.1.3. RTP 108 protocol package
3.1.4. RTP 110 package header extensions
3.1.5. RTCP control protocol 111
3.1.6. RTP 119 profile
3.1.7. Specification of the data format 120
3.1.8. Mixers and translators 121
3.1.9. Compression of RTP header (cRTP) 122
3.1.10. Scenarios of action 123
3.2. Access networks 124
3.2.1. Architecture 125
3.2.2. Requirements 126
3.2.3. Technologies 129
3.3. Firewall and address translation 144
3.3.1. Firewall mechanism 145
3.3.2. Address Translation (NAT) 146
3.3.3. Problems introduced by Firewall and NAT 148
3.3.4. Detecting the presence of address translation 149
3.3.5. Methods of passing through address translation 150
3.4. Broadcasting to multiple recipients (multicast) 155
3.4.1. Broadcasting to multiple recipients in an IPv4 network 157
3.4.2. Delivery of distribution packages 158
3.4.3. Group management protocol (IGMP) 159
3.4.4. Historic solutions 160
3.4.5. Path selection algorithms for multicasting 161
3.4.6. Routing protocols with distribution to multiple recipients 165
3.5. Synchronization of received data streams 169
3.5.1. Types of time dependencies 169
3.5.2. Intra-stream synchronization 170
3.5.3. Buffer reducing delay fluctuations 172
3.5.4. Reconstruction of lost fragments 175
3.5.5. Intra-stream synchronization 177
3.6. Summary 178
4. Handling the course of the session 180
4.1. Session Initialization Protocol (SIP) 182
4.1.1. Introduction 182
4.1.2. Basics of the protocol 182
4.1.3. System components 184
4.1.4. Addressing 185
4.1.5. Location of SIP 186 servers
4.1.6. Signaling path 187
4.1.7. Transport of multimedia data 188
4.1.8. SIP 188 messages
4.1.9. Scenarios of action 190
4.1.10. The SDP 194 protocol
4.1.11. Additional services 195
4.2. Standard H.323 200
4.2.1. Introduction 200
4.2.2. Basics of the protocol 200
4.2.3. System architecture 201
4.2.4. Addressing 203
4.2.5. The H.323 protocol stack 204
4.2.6. Scenarios of action 211
4.3. RTSP 215 protocol
4.3.1. Basics of the 215 protocol
4.3.2. Protocol 216 operation
4.3.3. RTSP 217 messages
4.3.4. Scenarios of action 219
4.4. Summary 221
5. Network Service Quality Guarantee (QoS) 222
5.1. Controversies around QoS 223
5.2. Fundamentals of QoS mechanisms 224
5.2.1. Router 224
5.2.2. Queuing 225
5.2.3. Tasks implemented by QoS mechanisms 228
5.2.4. Packet classification and marking 229
5.2.5. Access control 229
5.2.6. Traffic monitoring 230
5.2.7. Scheduling algorithms 232
5.2.8. Shaping traffic 239
5.3. Methodologies for implementing QoS in IP 241 networks
5.3.1. Integrated Services 242
5.3.2. Differentiated Services 249
5.4. Summary 255
6. Security in the transmission of multimedia data 256
6.1. Taxonomy of threats 257
6.1.1. Privacy 258
6.1.2. Integrity 258
6.1.3. Availability 259
6.2. Security services 261
6.3. Cryptographic methods 261
6.3.1. Authentication 261
6.3.2. Symmetric cryptography 264
6.3.3. Asymmetrical cryptography 266
6.3.4. Digital signature 266
6.3.5. Certificate 267
6.3.6. Public key infrastructure 267
6.3.7. Watermark mechanism 268
6.3.8. Distribution of key 269
6.4. Security structure of multimedia transmission 271
6.4.1. Tunneling using secure protocols 271
6.4.2. Secure transport protocol 277
6.4.3. Security model in SIP 282 protocol
6.4.4. Security model as part of the H.232 285 standard
6.5. Summary 289
7. Decentralized architectures (P2P) 290
7.1. Real-time communication in P2P architecture 291
7.2. Features of P2P architecture 292
7.3. P2P 293 algorithms
7.4. Distributed associative array 293
7.4.1. Organization of the table 294
7.4.2. Data storage and retrieval in table 295
7.4.3. Creating an array 297
7.4.4. Coating network 297
7.4.5. Registration of services 299
7.4.6. Centralized elements of architecture 301
7.5. Standards of the P2PSIP 301 family
7.5.1. The basic architecture of the 302 system
7.5.2. P2PP 303 architecture proposal
7.5.3. RELOAD 304 architecture proposal
7.6. Skype 305
7.6.1. P2P 305 architecture
7.6.2. Centralized elements 306
7.6.3. Transmission of multimedia data 306
7.6.4. Security 307
7.7. Summary 307

Literature 308
List of abbreviations 319
Index 324

138361

Other products in the same category (16)