SlideShare a Scribd company logo
1 of 28
Eng: Mohammed Hussein1
Republic of Yemen
THAMAR UNIVERSITY
Faculty of Computer Science&
Information System
Lecturer, and Researcher atThamar University
By Eng: Mohammed Hussein
Outline
 Introduction
 Types of multimedia services
1. Streaming stored audio/video
 Video on demand
2. Streaming Live audio/video
 Direct to home (DTH)
3. Interactive real time audio/video
 Teleconferencing
 Voice over IP
2 Eng: Mohammed Hussein
Introduction of multimedia services
The deployment of high-speed networks and reduction in bandwidth
requirement has led to the emergence diverse of many applications.
Because the audio/video compression.
Classes of audio/video services applications:
1) Streaming stored audio and video
2) Streaming live audio and video
3) Real-time interactive audio and video
Fundamental characteristics:
 Typically delay sensitive
 end-to-end delay
 delay jitter
 But loss tolerant
3 Eng: Mohammed Hussein
Streaming stored audio/video
 Approach 1: compressed audio/video file is downloaded just like a
text file by a client.The client then plays the file.
1. The uncompressed file become larger,
example: 1-hour the size approximately
about 600Mb and the file after
compression 300 Mb forVCR quality 1-
hour video using MPEG1.Then it can be
played.
2. The downloading will depending on the
size of file and bandwidth.
3. It will reserve at client side larger
storage space.
4. So, it doesn’t provide a streaming stored
services.
 Limitation:
4 Eng: Mohammed Hussein
1: GET: audio/video file
2: RESPONSE
Media
player
3: audio/video file
Web
server
Server
Browser
Client
Streaming stored audio/video
 Approach 2: the media player is directly connected to the web server for
downloading the audio/video file.The media player uses the metafile to
interact direct with web server and the web server response to the client
via media player.
The advantage of this approach:
1. The storage requirement at the
client side is small.
2. We are using two different type
of files: the metafile and the
audio/video file.
3. The client can play without
delay of downloading.
• Limitation here is both the browser and media player uses HTTP protocol for downloading
the two files. So HTTP runs overTCP and all data will transformed usingTCP. TheTCP is
not good protocol to provide streaming audio/video services. (flow control, error control,.)
5 Eng: Mohammed Hussein
1: GET: metafile
2: RESPONSE
Media
player
3: metafile
Web
server
Server
Browser
Client
5: RESPONSE
4: GET: audio/video file
Streaming stored audio/video
 Approach 3: A separate media server is used for downloading the
audio/video file.
 Advantage: avoids the use of TCP, which is unsuitable for
downloading audio/video files.
 The browser communicate with
web server and send metafile to
media player.
 The media player use the metafile
to communicate with a media
server to get the audio/video file.
 This approach uses UDP and RTP
protocols as we discussed in
lecture5.
6 Eng: Mohammed Hussein
1: GET: metafile
2: RESPONSE
Media
player
3: metafile
Web
Server
Server
Browser
Client
5: RESPONSE
4: GET: audio/video file
Media
Server
Video on demand application
 As the user can play, pause and replay .The storage video in the CD or DVD.
 So, we would like to do that in the network as the requirements of VOD
7
Eng: Mohammed Hussein
Video
Server
Server
Audio
Server
Server
Switch
High Speed Network
(SONET,ATM,
MPLS,LTE, …)
Local distribution Network
(LAN,WLAN …)
Switch
VOD Requirements of educational
Eng: Mohammed Hussein8
 The video-on-demand service at the campus.
 Infrastructure deployed:
1. High speed LAN (Gigabit Ethernet) and ADSL
2. Media Servers
3. Software:
 OS- windows 2008/.NET server
 Encoding software- windows media encoding at the server.
 Windows media player at the server.
 The above two are free and provides good quality audio/video above
128 Kbps.
The Distribution Network
Eng: Mohammed Hussein9
 This example of one university
 Gigabit Ethernet based backbone network in the institutional area
 DSL based broadband access in the residential area.
 The DSLAM at the access provider is the equipment that really allows DSL
to happen.A DSLAM takes connections from many customers and
aggregates them onto a single, high-capacity connection to the Internet.
Media servers
Eng: Mohammed Hussein
10
 Media servers has to be powerful in terms of Processor and Hard
disk.An example
 Processor: P-IV(1.3 GHz), Main memory: 1 GB
 Hard disk: RAID-5 (4:1, 147 GB each)
What is Flash Media Server (FMS)?
Eng: Mohammed Hussein11
 Adobe Flash Media Server is a real-time media server
 It can deliver live audio/video, stream audio/video, record
audio/video etc .
 Flash Media Server Applications
 Live video broadcasting
 Interactive gaming
 Video conferencing
How the FMS works?
1. Client-sideAction Script file (.swf)
resides in theWeb Server.
2. Server-sideAction Script file (main.asc)
may or may not reside in the same
machine
3. Client makes connection to Flash Media
Server via RealTime Messaging
Protocol (RTMP).
4. Web Server sends swf file to flash client
over HTTP.
5. Client plays the swf file
6. Client connects to FMS using RTMP
7. FMS and client communicates via
RTMP.
Client-server architecture12 Eng: Mohammed Hussein
Storage issue related to VOD services
Eng: Mohammed Hussein13
 When we speak about 100 courses each one 1-hour, so storing all
courses in a Hard disk using RAD5.
 RAD5 which provides higher throughput that is necessary for
streaming purposes and we can Use 3 media server with the same IP.
 Because all courses are not equally popular. One possible solution is to
use memory hierarchy.
 Another approach is to distribute the courses in multiple servers with
the same IP.
costcapacity
Real time issue related to VOD services
Example the time of encoding here request rate of 766 Kbps to get
flicker free display.
 So the output streams to meet timing requirements (766 Kbps).
As we know to read data from disks it is read in terms of sectors.
In other hand when it is display it is done in streaming way ( continues
manner).Therefore, we should use buffering : (Read one sector and One
Sector transmitting)
Read one sector
One Sector transmitting
The data here is sent continuously
Data read from disk
Transmission
Buffered data
14 Eng: Mohammed Hussein
Streaming Live Audio/Video
Eng: Mohammed Hussein15
 SatelliteTelevision distribution system (or Broadcasting of radio/TV
program)
 The user get the services through dish with a broadcast of frequency
 DirectTo Home (DTH) services
 The user use small antenna which provided by the satellite company to
get the services directly with a help of set top box (receiver).
 Set top box(receiver) is like a computer which has CPU, RAM to
MPEG, NIC to network, I/O toTV and remote control
Real-Time Interactive Audio/Video
Eng: Mohammed Hussein16
 In real-time interactive audio/video, people communicate with one
another in real time, an example that allows people to communicate
visually and orally, the applications are:
1. The Internet phone or voice over IP
2. Video conferencing
 Characteristics:
 Before addressing the protocols used in this class of applications, we
discuss some characteristics of real-time audio/video communication.
1. Time Relationship
2. Timestamp
3. Playback Buffer
4. Ordering
Characteristic : Time Relationship
Eng: Mohammed Hussein
17
 The time relationship between the packets is preserved.
 Real-time data on a packet-switched network require the preservation of the
time relationship between packets of a session. For example, let us assume
that a real-time video server creates live video images and sends them
online.The video is digitized and packetized.
 There are only three packets, and each packet holds 10s of video information.
 The packets starts at 00:00:00, 00:00:10, and 00:00:20. Also imagine that it
takes 1s (propagation time) for each packet to reach the destination.
The receiver can play back the
packets at 00:00:01, 00:00:11, and
00:00:21.Although there is a 1s
time difference between what the
server sends and what the client
sees on the computer screen.
Characteristic :Jitter
Eng: Mohammed Hussein18
 What happens if the packets arrive with different delays? This
phenomenon is called jitter.
 For example, say the first packet arrives at 00:00:01 (1s delay), the second
arrives at 00:00:15 (5s delay), and the third arrives at 00:00:27 (7s delay).
 If the receiver starts playing the first packet at 00:00:01, it will finish at
00:00:11. However, the next packet has not yet arrived; it arrives 4s later.
There is a gap between the
first and second packets and
between the second and the
third as the video is viewed at
the remote site..
Characteristic: Timestamp
Eng: Mohammed Hussein19
 One solution to jitter is the use of a timestamp. If each packet has a
timestamp that shows the time it was produced relative to the first
(or previous) packet, then the receiver can add this time to the time
at which it starts the playback. In other words, the receiver knows
when each packet is to be played.
 To remove gaps between the packets. Imagine the packets in the
previous example have a timestamp of 0, 10, and 20.
If the receiver starts playing
back the packets at 00:00:08,
00:00:18 and 00:00:28.
Characteristic : Playback Buffer
Eng: Mohammed Hussein20
 To be able to separate the arrival time from the playback time, we need a
buffer to store the data until they are played back.
 The buffer is referred to as a playback buffer.When a session begins (the
first bit of the first packet arrives), the receiver delays playing the data
until a threshold is reached.
 In the previous example, the first bit of the first packet arrives at
00:00:01; the threshold is 7s, and the playback time is 00:00:08.The
replay does not start until the time units of data are equal to the threshold
value.
The threshold is measured in time
units of data.
Data are stored in the buffer at a
possibly variable rate, but they are
extracted and played back at a fixed
rate.
Characteristic : Ordering
Eng: Mohammed Hussein21
 A sequence number to order the packets is needed to handle this situation.
 In addition to time relationship information and timestamps for real-time
traffic, one more feature is needed.We need a sequence number for each
packet.
 The timestamp alone cannot inform the receiver if a packet is lost. For
example, suppose the timestamps are 0, 10, and 20.
 The receiver receives just two packets with timestamps 0 and 20.The
receiver assumes that the packet with timestamp 20 is the second packet,
produced 20s after the first.The receiver has no way of knowing that the
second packet has actually been lost.
 Therefore, now it can be played one after the other in continues manner
without any jitter.
Video conferencing application
Eng: Mohammed Hussein22
 Video conferencing: Using a network, a camera and headset, people can
interact as if they were talking face in a room.
 Applications:
 Conducting interviews
 Holding meetings
 Setting up meetings
 Giving lectures
 There are two types of video conferencing. One is called point-to-point
conferencing, which basically is a communication link between any two
locations.
 Another is multipoint conferencing which is a link between a variety of
locations (more then two).
Video Conferencing
Eng: Mohammed Hussein23
 To support real-time audio/video service such as video conferencing, the
following functionalities are essential
 Multicasting (The traffic can be heavy, and the data are distributed by using
multicasting methods.)
 Translation (A translator is a computer that can change the format of a high-
bandwidth video signal to a lower-quality narrow-bandwidth signal.)
 Mixing (If there is more than one source that can send data at the same time
(as in a video or audio conference), the traffic is made of multiple streams.To
converge the traffic to one stream, data from different sources can be mixed.A
mixer mathematically adds signals coming from different sources to create one
single signal.)
 TCP is unsuitable for interactive traffic.
 Multicast services of IP and use of the transport layer protocol.
Voice Over IP
Eng: Mohammed Hussein24
 On real-time interactive audio/video application: voice over IP, or
Internet telephony.The idea is to use the Internet as a telephone
network with some additional capabilities.
 InternetTelephony: with the increased deployment high speed
(broadband) internet connectivity, a growing numbers of individuals
are using internet for voice telephony.
 Protocols to supportVOIP:
1. Session Internet protocol (SIP)
2. H.323
Session Initiation Protocol (SIP)
Eng: Mohammed Hussein25
 SIP is a text-based protocol, as is HTTP. SIP, like HTTP, uses
messages. Six messages such as:
 INVITE,ACK, BYE, OPTIONS, CANCEL, and REGISTER.
 Address: IPv4/Email/Phone number
Tracking the Callee
Eng: Mohammed Hussein26
 What happens if the callee is not sitting at his/her terminal? He/ She may
be away from his/ her system or at another terminal.
 SIP has a mechanism (similar to one in DNS) that finds the IP address of
the terminal at which the callee is sitting.
DHCP of Callee may
not have permanent
IP. So to track the
callee the register is
used.The register
replays and provides
IP address.
H.323
Eng: Mohammed Hussein
27
 H.323 is a standard designed by ITU to allow telephones on the public telephone network
to talk to computers (called terminals in H.323) connected to the Internet.
 Gateway transforms a telephone network(PSTN ) message to an Internet message.
 ForAudio H.323 uses protocols: compression code, RTP, RTCP, H.225
 For Control and signaling H.323 uses protocols: Q.931 and H.245
 H.323 Operations
 A terminal sends a message to the gatekeeper, which responds with the IP address.
 The terminal and gatekeeper communicate, using H.225 message to negotiate bandwidth.
 The terminal, gatekeeper, gateway, and telephone communicate by using Q.931 to set up
connection.
 H.245 is used to negotiate the compression method.
 RTP is used for audio exchange and RCTP for management.
 Q.931 to terminate connection.
VOIP Programs
Eng: Mohammed Hussein28
 Programs such as Skype or GoogleTalk,….etc
 Programs property:
 Program is a peer-to-peerVOIP client.
 Programs have become very popular.
 Two people can speak with each other using headsets and microphones
connected to their computers directly.
 It is free between any two computers.
 Programs have used good voice compressor providing very good quality
audio.
 It also supports instant messaging, search and file transfer.
 It is encrypted

More Related Content

What's hot

bài tập lớn ghép kênh số.1.pptx
bài tập lớn ghép kênh số.1.pptxbài tập lớn ghép kênh số.1.pptx
bài tập lớn ghép kênh số.1.pptxQuân Nguyễn Triệu
 
Kĩ thuật truyền hình
Kĩ thuật truyền hìnhKĩ thuật truyền hình
Kĩ thuật truyền hìnhHằng Jessi
 
Chapter 2 - Multimedia Communications
Chapter 2 - Multimedia CommunicationsChapter 2 - Multimedia Communications
Chapter 2 - Multimedia CommunicationsPratik Pradhan
 
Chapter 10 - Multimedia Over Atm
Chapter 10 - Multimedia Over AtmChapter 10 - Multimedia Over Atm
Chapter 10 - Multimedia Over AtmPratik Pradhan
 
Introduction to Video Compression Techniques - Anurag Jain
Introduction to Video Compression Techniques - Anurag JainIntroduction to Video Compression Techniques - Anurag Jain
Introduction to Video Compression Techniques - Anurag JainVideoguy
 
MMS2401 - Multimedia system and Communication Notes
MMS2401 - Multimedia system and Communication NotesMMS2401 - Multimedia system and Communication Notes
MMS2401 - Multimedia system and Communication NotesPratik Pradhan
 
Video compression
Video compressionVideo compression
Video compressionnnmaurya
 
Chapter 9 -Multimedia on The Internet
Chapter 9 -Multimedia on The InternetChapter 9 -Multimedia on The Internet
Chapter 9 -Multimedia on The InternetPratik Pradhan
 
Chapter 5 - Data Compression
Chapter 5 - Data CompressionChapter 5 - Data Compression
Chapter 5 - Data CompressionPratik Pradhan
 
Chapter 6 - Multimedia Over Ip
Chapter 6 - Multimedia Over IpChapter 6 - Multimedia Over Ip
Chapter 6 - Multimedia Over IpPratik Pradhan
 
Message and Stream Oriented Communication
Message and Stream Oriented CommunicationMessage and Stream Oriented Communication
Message and Stream Oriented CommunicationDilum Bandara
 
Ch12 the internert & mm
Ch12 the internert & mmCh12 the internert & mm
Ch12 the internert & mmSaba Siddique
 
11 distributed file_systems
11 distributed file_systems11 distributed file_systems
11 distributed file_systemslongly
 
multimedia making it work by Tay Vaughan Chapter1
multimedia making it work by Tay Vaughan Chapter1multimedia making it work by Tay Vaughan Chapter1
multimedia making it work by Tay Vaughan Chapter1alichaudhry28
 

What's hot (20)

bài tập lớn ghép kênh số.1.pptx
bài tập lớn ghép kênh số.1.pptxbài tập lớn ghép kênh số.1.pptx
bài tập lớn ghép kênh số.1.pptx
 
Kĩ thuật truyền hình
Kĩ thuật truyền hìnhKĩ thuật truyền hình
Kĩ thuật truyền hình
 
Chapter 2 - Multimedia Communications
Chapter 2 - Multimedia CommunicationsChapter 2 - Multimedia Communications
Chapter 2 - Multimedia Communications
 
Chapter 23
Chapter 23Chapter 23
Chapter 23
 
Ch4 1 v1
Ch4 1 v1Ch4 1 v1
Ch4 1 v1
 
Hdtv technology
Hdtv technologyHdtv technology
Hdtv technology
 
Video Streaming
Video StreamingVideo Streaming
Video Streaming
 
Chapter 10 - Multimedia Over Atm
Chapter 10 - Multimedia Over AtmChapter 10 - Multimedia Over Atm
Chapter 10 - Multimedia Over Atm
 
Audio and Video Streaming
Audio and Video StreamingAudio and Video Streaming
Audio and Video Streaming
 
Introduction to Video Compression Techniques - Anurag Jain
Introduction to Video Compression Techniques - Anurag JainIntroduction to Video Compression Techniques - Anurag Jain
Introduction to Video Compression Techniques - Anurag Jain
 
MMS2401 - Multimedia system and Communication Notes
MMS2401 - Multimedia system and Communication NotesMMS2401 - Multimedia system and Communication Notes
MMS2401 - Multimedia system and Communication Notes
 
Video compression
Video compressionVideo compression
Video compression
 
Chapter 9 -Multimedia on The Internet
Chapter 9 -Multimedia on The InternetChapter 9 -Multimedia on The Internet
Chapter 9 -Multimedia on The Internet
 
Chapter 5 - Data Compression
Chapter 5 - Data CompressionChapter 5 - Data Compression
Chapter 5 - Data Compression
 
HTTP Live Streaming
HTTP Live StreamingHTTP Live Streaming
HTTP Live Streaming
 
Chapter 6 - Multimedia Over Ip
Chapter 6 - Multimedia Over IpChapter 6 - Multimedia Over Ip
Chapter 6 - Multimedia Over Ip
 
Message and Stream Oriented Communication
Message and Stream Oriented CommunicationMessage and Stream Oriented Communication
Message and Stream Oriented Communication
 
Ch12 the internert & mm
Ch12 the internert & mmCh12 the internert & mm
Ch12 the internert & mm
 
11 distributed file_systems
11 distributed file_systems11 distributed file_systems
11 distributed file_systems
 
multimedia making it work by Tay Vaughan Chapter1
multimedia making it work by Tay Vaughan Chapter1multimedia making it work by Tay Vaughan Chapter1
multimedia making it work by Tay Vaughan Chapter1
 

Viewers also liked

Whizle For Learners
Whizle For LearnersWhizle For Learners
Whizle For Learnershumanist3
 
Multimedia lecture ActionScript3
Multimedia lecture ActionScript3Multimedia lecture ActionScript3
Multimedia lecture ActionScript3Mohammed Hussein
 
02 asymptotic-notation-and-recurrences
02 asymptotic-notation-and-recurrences02 asymptotic-notation-and-recurrences
02 asymptotic-notation-and-recurrencesNoushadur Shoukhin
 
02 greedy, d&c, binary search
02 greedy, d&c, binary search02 greedy, d&c, binary search
02 greedy, d&c, binary searchPankaj Prateek
 
02 Analysis of Algorithms: Divide and Conquer
02 Analysis of Algorithms: Divide and Conquer02 Analysis of Algorithms: Divide and Conquer
02 Analysis of Algorithms: Divide and ConquerAndres Mendez-Vazquez
 
Iteration, induction, and recursion
Iteration, induction, and recursionIteration, induction, and recursion
Iteration, induction, and recursionMohammed Hussein
 
Internet programming lecture 1
Internet programming lecture 1Internet programming lecture 1
Internet programming lecture 1Mohammed Hussein
 
Algorithm Analyzing
Algorithm AnalyzingAlgorithm Analyzing
Algorithm AnalyzingHaluan Irsad
 
Data Management (Data Mining Klasifikasi)
Data Management (Data Mining Klasifikasi)Data Management (Data Mining Klasifikasi)
Data Management (Data Mining Klasifikasi)Adam Mukharil Bachtiar
 
Divide and conquer - Quick sort
Divide and conquer - Quick sortDivide and conquer - Quick sort
Divide and conquer - Quick sortMadhu Bala
 
Divide and Conquer - Part 1
Divide and Conquer - Part 1Divide and Conquer - Part 1
Divide and Conquer - Part 1Amrinder Arora
 
Quick Sort , Merge Sort , Heap Sort
Quick Sort , Merge Sort ,  Heap SortQuick Sort , Merge Sort ,  Heap Sort
Quick Sort , Merge Sort , Heap SortMohammed Hussein
 

Viewers also liked (20)

Lec3 Algott
Lec3 AlgottLec3 Algott
Lec3 Algott
 
Whizle For Learners
Whizle For LearnersWhizle For Learners
Whizle For Learners
 
Multimedia lecture ActionScript3
Multimedia lecture ActionScript3Multimedia lecture ActionScript3
Multimedia lecture ActionScript3
 
JAVA SCRIPT
JAVA SCRIPTJAVA SCRIPT
JAVA SCRIPT
 
Wireless lecture1
Wireless lecture1Wireless lecture1
Wireless lecture1
 
02 asymptotic-notation-and-recurrences
02 asymptotic-notation-and-recurrences02 asymptotic-notation-and-recurrences
02 asymptotic-notation-and-recurrences
 
02 greedy, d&c, binary search
02 greedy, d&c, binary search02 greedy, d&c, binary search
02 greedy, d&c, binary search
 
02 Analysis of Algorithms: Divide and Conquer
02 Analysis of Algorithms: Divide and Conquer02 Analysis of Algorithms: Divide and Conquer
02 Analysis of Algorithms: Divide and Conquer
 
Divide and conquer
Divide and conquerDivide and conquer
Divide and conquer
 
Iteration, induction, and recursion
Iteration, induction, and recursionIteration, induction, and recursion
Iteration, induction, and recursion
 
Comnet Network Simulation
Comnet Network SimulationComnet Network Simulation
Comnet Network Simulation
 
PHP
 PHP PHP
PHP
 
Internet programming lecture 1
Internet programming lecture 1Internet programming lecture 1
Internet programming lecture 1
 
Algorithm Analyzing
Algorithm AnalyzingAlgorithm Analyzing
Algorithm Analyzing
 
Control system
Control systemControl system
Control system
 
Divide and Conquer
Divide and ConquerDivide and Conquer
Divide and Conquer
 
Data Management (Data Mining Klasifikasi)
Data Management (Data Mining Klasifikasi)Data Management (Data Mining Klasifikasi)
Data Management (Data Mining Klasifikasi)
 
Divide and conquer - Quick sort
Divide and conquer - Quick sortDivide and conquer - Quick sort
Divide and conquer - Quick sort
 
Divide and Conquer - Part 1
Divide and Conquer - Part 1Divide and Conquer - Part 1
Divide and Conquer - Part 1
 
Quick Sort , Merge Sort , Heap Sort
Quick Sort , Merge Sort ,  Heap SortQuick Sort , Merge Sort ,  Heap Sort
Quick Sort , Merge Sort , Heap Sort
 

Similar to Multimedia lecture6

An intoroduction to Multimedia
An intoroduction to MultimediaAn intoroduction to Multimedia
An intoroduction to MultimediaZahra Sadeghi
 
Multimedia data compression challenge and their solution
Multimedia data compression challenge and their solutionMultimedia data compression challenge and their solution
Multimedia data compression challenge and their solutionshamsbhai495
 
Chapter7 multimedia
Chapter7 multimediaChapter7 multimedia
Chapter7 multimediaKhánh Ghẻ
 
Chapter 9 - Computer Networking a top-down Approach 7th
Chapter 9 - Computer Networking a top-down Approach 7thChapter 9 - Computer Networking a top-down Approach 7th
Chapter 9 - Computer Networking a top-down Approach 7thAndy Juan Sarango Veliz
 
Multimedia networking
Multimedia networkingMultimedia networking
Multimedia networkingKikima Jimmy
 
Streaming Stored Video
Streaming Stored VideoStreaming Stored Video
Streaming Stored VideoMdAshikJiddney
 
Multimedia
MultimediaMultimedia
MultimediaBUDNET
 
Project Paper
Project PaperProject Paper
Project PaperVideoguy
 
Real time transport protocol
Real time transport protocolReal time transport protocol
Real time transport protocolSwaroopSorte
 
Videostream compression in iOS
Videostream compression in iOSVideostream compression in iOS
Videostream compression in iOS*instinctools
 
Video Streaming
Video StreamingVideo Streaming
Video StreamingVideoguy
 

Similar to Multimedia lecture6 (20)

Computer Networking
Computer NetworkingComputer Networking
Computer Networking
 
An intoroduction to Multimedia
An intoroduction to MultimediaAn intoroduction to Multimedia
An intoroduction to Multimedia
 
WEEK 1
WEEK 1WEEK 1
WEEK 1
 
Multimedia data compression challenge and their solution
Multimedia data compression challenge and their solutionMultimedia data compression challenge and their solution
Multimedia data compression challenge and their solution
 
Chapter7 multimedia
Chapter7 multimediaChapter7 multimedia
Chapter7 multimedia
 
Chapter 9 - Computer Networking a top-down Approach 7th
Chapter 9 - Computer Networking a top-down Approach 7thChapter 9 - Computer Networking a top-down Approach 7th
Chapter 9 - Computer Networking a top-down Approach 7th
 
Multi media networking
Multi media networking Multi media networking
Multi media networking
 
Multimedia networking
Multimedia networkingMultimedia networking
Multimedia networking
 
Multimedia
Multimedia Multimedia
Multimedia
 
Streaming Stored Video
Streaming Stored VideoStreaming Stored Video
Streaming Stored Video
 
Internet Video
Internet VideoInternet Video
Internet Video
 
Multimedia
MultimediaMultimedia
Multimedia
 
Dos presentation by ahlam shakeel
Dos presentation by ahlam shakeelDos presentation by ahlam shakeel
Dos presentation by ahlam shakeel
 
Project Paper
Project PaperProject Paper
Project Paper
 
Real time transport protocol
Real time transport protocolReal time transport protocol
Real time transport protocol
 
6761 8-realtime
6761 8-realtime6761 8-realtime
6761 8-realtime
 
Videostream compression in iOS
Videostream compression in iOSVideostream compression in iOS
Videostream compression in iOS
 
Streaming multimedia
Streaming multimediaStreaming multimedia
Streaming multimedia
 
Multimedia-Applications.ppt
Multimedia-Applications.pptMultimedia-Applications.ppt
Multimedia-Applications.ppt
 
Video Streaming
Video StreamingVideo Streaming
Video Streaming
 

Recently uploaded

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 

Recently uploaded (20)

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 

Multimedia lecture6

  • 1. Eng: Mohammed Hussein1 Republic of Yemen THAMAR UNIVERSITY Faculty of Computer Science& Information System Lecturer, and Researcher atThamar University By Eng: Mohammed Hussein
  • 2. Outline  Introduction  Types of multimedia services 1. Streaming stored audio/video  Video on demand 2. Streaming Live audio/video  Direct to home (DTH) 3. Interactive real time audio/video  Teleconferencing  Voice over IP 2 Eng: Mohammed Hussein
  • 3. Introduction of multimedia services The deployment of high-speed networks and reduction in bandwidth requirement has led to the emergence diverse of many applications. Because the audio/video compression. Classes of audio/video services applications: 1) Streaming stored audio and video 2) Streaming live audio and video 3) Real-time interactive audio and video Fundamental characteristics:  Typically delay sensitive  end-to-end delay  delay jitter  But loss tolerant 3 Eng: Mohammed Hussein
  • 4. Streaming stored audio/video  Approach 1: compressed audio/video file is downloaded just like a text file by a client.The client then plays the file. 1. The uncompressed file become larger, example: 1-hour the size approximately about 600Mb and the file after compression 300 Mb forVCR quality 1- hour video using MPEG1.Then it can be played. 2. The downloading will depending on the size of file and bandwidth. 3. It will reserve at client side larger storage space. 4. So, it doesn’t provide a streaming stored services.  Limitation: 4 Eng: Mohammed Hussein 1: GET: audio/video file 2: RESPONSE Media player 3: audio/video file Web server Server Browser Client
  • 5. Streaming stored audio/video  Approach 2: the media player is directly connected to the web server for downloading the audio/video file.The media player uses the metafile to interact direct with web server and the web server response to the client via media player. The advantage of this approach: 1. The storage requirement at the client side is small. 2. We are using two different type of files: the metafile and the audio/video file. 3. The client can play without delay of downloading. • Limitation here is both the browser and media player uses HTTP protocol for downloading the two files. So HTTP runs overTCP and all data will transformed usingTCP. TheTCP is not good protocol to provide streaming audio/video services. (flow control, error control,.) 5 Eng: Mohammed Hussein 1: GET: metafile 2: RESPONSE Media player 3: metafile Web server Server Browser Client 5: RESPONSE 4: GET: audio/video file
  • 6. Streaming stored audio/video  Approach 3: A separate media server is used for downloading the audio/video file.  Advantage: avoids the use of TCP, which is unsuitable for downloading audio/video files.  The browser communicate with web server and send metafile to media player.  The media player use the metafile to communicate with a media server to get the audio/video file.  This approach uses UDP and RTP protocols as we discussed in lecture5. 6 Eng: Mohammed Hussein 1: GET: metafile 2: RESPONSE Media player 3: metafile Web Server Server Browser Client 5: RESPONSE 4: GET: audio/video file Media Server
  • 7. Video on demand application  As the user can play, pause and replay .The storage video in the CD or DVD.  So, we would like to do that in the network as the requirements of VOD 7 Eng: Mohammed Hussein Video Server Server Audio Server Server Switch High Speed Network (SONET,ATM, MPLS,LTE, …) Local distribution Network (LAN,WLAN …) Switch
  • 8. VOD Requirements of educational Eng: Mohammed Hussein8  The video-on-demand service at the campus.  Infrastructure deployed: 1. High speed LAN (Gigabit Ethernet) and ADSL 2. Media Servers 3. Software:  OS- windows 2008/.NET server  Encoding software- windows media encoding at the server.  Windows media player at the server.  The above two are free and provides good quality audio/video above 128 Kbps.
  • 9. The Distribution Network Eng: Mohammed Hussein9  This example of one university  Gigabit Ethernet based backbone network in the institutional area  DSL based broadband access in the residential area.  The DSLAM at the access provider is the equipment that really allows DSL to happen.A DSLAM takes connections from many customers and aggregates them onto a single, high-capacity connection to the Internet.
  • 10. Media servers Eng: Mohammed Hussein 10  Media servers has to be powerful in terms of Processor and Hard disk.An example  Processor: P-IV(1.3 GHz), Main memory: 1 GB  Hard disk: RAID-5 (4:1, 147 GB each)
  • 11. What is Flash Media Server (FMS)? Eng: Mohammed Hussein11  Adobe Flash Media Server is a real-time media server  It can deliver live audio/video, stream audio/video, record audio/video etc .  Flash Media Server Applications  Live video broadcasting  Interactive gaming  Video conferencing
  • 12. How the FMS works? 1. Client-sideAction Script file (.swf) resides in theWeb Server. 2. Server-sideAction Script file (main.asc) may or may not reside in the same machine 3. Client makes connection to Flash Media Server via RealTime Messaging Protocol (RTMP). 4. Web Server sends swf file to flash client over HTTP. 5. Client plays the swf file 6. Client connects to FMS using RTMP 7. FMS and client communicates via RTMP. Client-server architecture12 Eng: Mohammed Hussein
  • 13. Storage issue related to VOD services Eng: Mohammed Hussein13  When we speak about 100 courses each one 1-hour, so storing all courses in a Hard disk using RAD5.  RAD5 which provides higher throughput that is necessary for streaming purposes and we can Use 3 media server with the same IP.  Because all courses are not equally popular. One possible solution is to use memory hierarchy.  Another approach is to distribute the courses in multiple servers with the same IP. costcapacity
  • 14. Real time issue related to VOD services Example the time of encoding here request rate of 766 Kbps to get flicker free display.  So the output streams to meet timing requirements (766 Kbps). As we know to read data from disks it is read in terms of sectors. In other hand when it is display it is done in streaming way ( continues manner).Therefore, we should use buffering : (Read one sector and One Sector transmitting) Read one sector One Sector transmitting The data here is sent continuously Data read from disk Transmission Buffered data 14 Eng: Mohammed Hussein
  • 15. Streaming Live Audio/Video Eng: Mohammed Hussein15  SatelliteTelevision distribution system (or Broadcasting of radio/TV program)  The user get the services through dish with a broadcast of frequency  DirectTo Home (DTH) services  The user use small antenna which provided by the satellite company to get the services directly with a help of set top box (receiver).  Set top box(receiver) is like a computer which has CPU, RAM to MPEG, NIC to network, I/O toTV and remote control
  • 16. Real-Time Interactive Audio/Video Eng: Mohammed Hussein16  In real-time interactive audio/video, people communicate with one another in real time, an example that allows people to communicate visually and orally, the applications are: 1. The Internet phone or voice over IP 2. Video conferencing  Characteristics:  Before addressing the protocols used in this class of applications, we discuss some characteristics of real-time audio/video communication. 1. Time Relationship 2. Timestamp 3. Playback Buffer 4. Ordering
  • 17. Characteristic : Time Relationship Eng: Mohammed Hussein 17  The time relationship between the packets is preserved.  Real-time data on a packet-switched network require the preservation of the time relationship between packets of a session. For example, let us assume that a real-time video server creates live video images and sends them online.The video is digitized and packetized.  There are only three packets, and each packet holds 10s of video information.  The packets starts at 00:00:00, 00:00:10, and 00:00:20. Also imagine that it takes 1s (propagation time) for each packet to reach the destination. The receiver can play back the packets at 00:00:01, 00:00:11, and 00:00:21.Although there is a 1s time difference between what the server sends and what the client sees on the computer screen.
  • 18. Characteristic :Jitter Eng: Mohammed Hussein18  What happens if the packets arrive with different delays? This phenomenon is called jitter.  For example, say the first packet arrives at 00:00:01 (1s delay), the second arrives at 00:00:15 (5s delay), and the third arrives at 00:00:27 (7s delay).  If the receiver starts playing the first packet at 00:00:01, it will finish at 00:00:11. However, the next packet has not yet arrived; it arrives 4s later. There is a gap between the first and second packets and between the second and the third as the video is viewed at the remote site..
  • 19. Characteristic: Timestamp Eng: Mohammed Hussein19  One solution to jitter is the use of a timestamp. If each packet has a timestamp that shows the time it was produced relative to the first (or previous) packet, then the receiver can add this time to the time at which it starts the playback. In other words, the receiver knows when each packet is to be played.  To remove gaps between the packets. Imagine the packets in the previous example have a timestamp of 0, 10, and 20. If the receiver starts playing back the packets at 00:00:08, 00:00:18 and 00:00:28.
  • 20. Characteristic : Playback Buffer Eng: Mohammed Hussein20  To be able to separate the arrival time from the playback time, we need a buffer to store the data until they are played back.  The buffer is referred to as a playback buffer.When a session begins (the first bit of the first packet arrives), the receiver delays playing the data until a threshold is reached.  In the previous example, the first bit of the first packet arrives at 00:00:01; the threshold is 7s, and the playback time is 00:00:08.The replay does not start until the time units of data are equal to the threshold value. The threshold is measured in time units of data. Data are stored in the buffer at a possibly variable rate, but they are extracted and played back at a fixed rate.
  • 21. Characteristic : Ordering Eng: Mohammed Hussein21  A sequence number to order the packets is needed to handle this situation.  In addition to time relationship information and timestamps for real-time traffic, one more feature is needed.We need a sequence number for each packet.  The timestamp alone cannot inform the receiver if a packet is lost. For example, suppose the timestamps are 0, 10, and 20.  The receiver receives just two packets with timestamps 0 and 20.The receiver assumes that the packet with timestamp 20 is the second packet, produced 20s after the first.The receiver has no way of knowing that the second packet has actually been lost.  Therefore, now it can be played one after the other in continues manner without any jitter.
  • 22. Video conferencing application Eng: Mohammed Hussein22  Video conferencing: Using a network, a camera and headset, people can interact as if they were talking face in a room.  Applications:  Conducting interviews  Holding meetings  Setting up meetings  Giving lectures  There are two types of video conferencing. One is called point-to-point conferencing, which basically is a communication link between any two locations.  Another is multipoint conferencing which is a link between a variety of locations (more then two).
  • 23. Video Conferencing Eng: Mohammed Hussein23  To support real-time audio/video service such as video conferencing, the following functionalities are essential  Multicasting (The traffic can be heavy, and the data are distributed by using multicasting methods.)  Translation (A translator is a computer that can change the format of a high- bandwidth video signal to a lower-quality narrow-bandwidth signal.)  Mixing (If there is more than one source that can send data at the same time (as in a video or audio conference), the traffic is made of multiple streams.To converge the traffic to one stream, data from different sources can be mixed.A mixer mathematically adds signals coming from different sources to create one single signal.)  TCP is unsuitable for interactive traffic.  Multicast services of IP and use of the transport layer protocol.
  • 24. Voice Over IP Eng: Mohammed Hussein24  On real-time interactive audio/video application: voice over IP, or Internet telephony.The idea is to use the Internet as a telephone network with some additional capabilities.  InternetTelephony: with the increased deployment high speed (broadband) internet connectivity, a growing numbers of individuals are using internet for voice telephony.  Protocols to supportVOIP: 1. Session Internet protocol (SIP) 2. H.323
  • 25. Session Initiation Protocol (SIP) Eng: Mohammed Hussein25  SIP is a text-based protocol, as is HTTP. SIP, like HTTP, uses messages. Six messages such as:  INVITE,ACK, BYE, OPTIONS, CANCEL, and REGISTER.  Address: IPv4/Email/Phone number
  • 26. Tracking the Callee Eng: Mohammed Hussein26  What happens if the callee is not sitting at his/her terminal? He/ She may be away from his/ her system or at another terminal.  SIP has a mechanism (similar to one in DNS) that finds the IP address of the terminal at which the callee is sitting. DHCP of Callee may not have permanent IP. So to track the callee the register is used.The register replays and provides IP address.
  • 27. H.323 Eng: Mohammed Hussein 27  H.323 is a standard designed by ITU to allow telephones on the public telephone network to talk to computers (called terminals in H.323) connected to the Internet.  Gateway transforms a telephone network(PSTN ) message to an Internet message.  ForAudio H.323 uses protocols: compression code, RTP, RTCP, H.225  For Control and signaling H.323 uses protocols: Q.931 and H.245  H.323 Operations  A terminal sends a message to the gatekeeper, which responds with the IP address.  The terminal and gatekeeper communicate, using H.225 message to negotiate bandwidth.  The terminal, gatekeeper, gateway, and telephone communicate by using Q.931 to set up connection.  H.245 is used to negotiate the compression method.  RTP is used for audio exchange and RCTP for management.  Q.931 to terminate connection.
  • 28. VOIP Programs Eng: Mohammed Hussein28  Programs such as Skype or GoogleTalk,….etc  Programs property:  Program is a peer-to-peerVOIP client.  Programs have become very popular.  Two people can speak with each other using headsets and microphones connected to their computers directly.  It is free between any two computers.  Programs have used good voice compressor providing very good quality audio.  It also supports instant messaging, search and file transfer.  It is encrypted