This slide-share contains details about the Multimedia networking and why it is important for us. Also this contains details regarding performance issues, applications, technical challenges and features of a multimedia system.
3. OUTLINE
▸ Introduction
▸ What is multimedia netwoking
▸ Why multimedia netwoking
▸ Applications of multimedia netwoking
▸ Application tools for multimedia
▸ Technical challenges
▸ Performance issues
▸ Desirable features of a Multimedia System
▸ Online sites of multimedia networking
3
4. INTRODUCTION
Multimedia
Diverse classes of media employed to represent information.
4
Multimedia Networking
Transmission and distribution of multimedia information on the
network.
6. Networked multimedia is to build the multimedia on
network and distributed systems.
So different users on different machines can share image,
sound, video, voice and many other features.
And to communicate with each under multimedia
networking tools.
6
8. Multimedia combines the interactivity of computer with a
natural user interface that includes images, sounds,
animation, full-motion video, and voice recognition.
People can share the multimedia resource and
communicate, work collaboratively.
So they may produce more effective results and save more
time and money.
8
10. 1.Multimedia content
has been
prerecorded &
stored on a server.
2.Users request
audio/video file on
demand.
3.Interactivity is
allowed.
10
STREAMING
STORED AUDIO
AND VIDEO
11. Streaming playback
can lag tens of
seconds after
transmission.
Examples:
• Internet radio talk
show
• Live sporting event
11
LIVE
STREAMING
15. 1.
Real-time data over
non-realtime network.
2.
High data rate over
limited network
bandwidth.
3.
Unpredictable
availability of network
bandwidth.
SOME
TECHNICAL
CHALLENGES
15
4.
Illegal access to
transmitted data in
networks.
5.
Malicious content
modification and
retransmission of
illegitimate copies.
6.
Reproduction of a
digital product.
16. HOW TO
PREVENT
Public or Secrete
key Cryptography
Original data are
encrypted by the
providers using a
private key.
The users can
decrypt the received
data
Authentication
Users should be
able to check the
originality of the
content of a digital
product.
Content verification
can be performed by
attaching digital
signatures to the
transmitted data
Copyright
Protection
Watermarks modify
slightly the digital
data to embed non-
perceptible encoded
copyright
information.
16
20. DESIRABLE
FEATURES
20 • Very High Processing Power
• Multimedia Capable File System
• Efficient and High I/O
• Special Operating System
• Storage and Memory
• Network Support
• Software Tools