SlideShare a Scribd company logo
REAL-TIME TRANSFER CONTROL PROTOCOL
VISHWAJEET KUMAR
205320024
M.SC. COMPUTER SCIENCE
OBJECTIVE
To get to understand
about the RTCP
protocol flow diagram
It’s working properties Benefit of RTCP
Type of information
stream it works on
Where used?
OVERVIEW
Introduction
What is RTCP?
Working Scenario
Why RTCP?
Reports
Flow Diagram Of RTP/RTCP
INTRODUCTION
AS WE KNOW THAT IN RTP (REAL-TIME
TRANSFER PROTOCOL) WE CAN ONLY
SEND THE DATA FROM SOURCE TO THE
TERMINALS/USERS BUT CAN’T GET THE
DATA FROM THE USERS.
SO THIS DISADVANTAGE CAN BE
OVERCOME BY USING RTCP (REAL-TIME
TRANSFER CONTROL PROTOCOL) .
WHAT IS RTCP?
 The messages that can control the transmission
and quality of data (QoS) as well as also allow the
recipients so that they can send feedback to the
source or sources. A protocol designed for this
purpose, which is known as Real-time Transport
Control Protocol (RTCP).
HOW RTCP WORKS?
RTCP operates
alongside with the
RTP and share
information with it
but at same time
every RTCP has
different port
– User Datagram
Protocol) to work
independently
from the RTP
.
UDP – it’s just like
transport control
protocol but it
doesn’t provide
acknowledgement of
the sent packets.
RTCP doesn’t use well
known UDP port but
instead of that it uses
temporary port that
must be an odd-
numbered port that
follows port number
selected for RTP
.
HIERARCHY
DIAGRAM OF
PROTOCOL
STACK FOR
MULTIMEDIA
SERVICES
 RTCP is basically based on the periodic transmission of control packets to all participants
in the network being on the fourth layer i.e. transport layer), using the same distribution
process as the data packets.
 It is recommended that the fraction of network bandwidth allocated to the RTCP is not
more than 5% and at least 25% of bandwidth is for source reports.
 So, the primary function of RTCP is to provide feedback on the quality of the data
distribution.
 It specifies report PDUs exchanged between source and destination.
CONTINUE…
 PDU – Protocol data unit nothing but it gives an abstract
idea of the data packets, but it has lesser overhead than
 Although PDU for the transport layer protocol is called
segment
 The reports contain statistics such as the number of RTP-
PDUs sent, number of RTP-PDUs lost, inter arrival jitter.
 It is used by application to modify sender transmission rate
and diagnostics purposes.
SO RTCP IS VERY
USEFUL IN THE
REAL TIME
APPLICATIONS
LIKE VIDEO
CONFERENCING
WHERE WE
ALWAYS WANT
TO KNOW THE
STATUS OF THE
TERMINALS THAT
AS WE HAVE SEEN
IN THE DIAGRAM
THAT EVERY SENDER
WILL SEND RTP AS
WELL AS RTCP, BUT
EVERY TERMINAL OR
DESTINATION
SENDS THE
FEEDBACK
THROUGH RTCP.
MULTICAST
DISTRIBUTION IS
USED JUST LIKE
DATA PACKETS.
SYNCHRONIZATION OF STREAMS
 Timestamp doesn’t get tied up with the individual video or audio sampling clocks like RTP.
 Each sender report in the RTCP contains:-
 The timestamp of RTP PDU .
 The wall-clock time for when PDU was created.
 so receiver use this association to synchronize video and audio playout.
Internetwork
RTP audio
RTCP audio
RTP video
RTP video
WHY RTCP?
 What happens when there is one sender and many receivers?
RTP can’t do anything in this scenario as it focus on individual
video but RTCP can do this by creating reports linearly with the
number of participants and would match or exceed the amount of
RTP data, but more overhead than useful data.
SOLUTION
 RTCP attempts to limit its traffic to 5% of the session bandwidth
to ensure it can scale!
 RTCP gives 75% of this rate to the receivers; and the remaining
25% to the sender.
Suppose one sender, sending video at a rate of 2 Mbps. Then RTCP attempts to limit its traffic to 100
Kbps.
The 75 kbps is equally shared among receivers:
• With R receivers, each receiver gets to send RTCP traffic at 75/R kbps.
Sender gets to send RTCP traffic at 25 kbps.
Version: (2 bits) identifies the version of RTP
.
P (Padding): (1 bits) this is used to indicate if there is any extra padding bytes at the end of the RTP packet. It might be used to fill up a block of certain
size like for block required by an encryption algorithm .
RC ( Reception Report Count ): (5 bits) It is the number of reception report blocks contained in this packet.
PT (Packet Type): (8 bits) It contains a constant to identify RTCP packet type.
Length: ( 16 bits ) It indicates the length of this RTCP packet.
SSRC: (32 bits ) Synchronization source identifier uniquely identifies the source of stream.
 RTCP packets have a length field in header; aligned to 32
bits --- stackable
 Sent in a compound packet of at least 2 RTCP packets
Basically RTCP has five types of messages namely :-
• Sender Report
• Receiver’s Report
• Source Description Message
• Bye Message
• Application Specific Message
SENDER MESSAGE
Sender report is
sent after a fixed
interval by the
active sender in a
conference to
report transmission
as well as stats of
reception for all
RTP packets
transmitted during
this time period.
After receiving these
RTP messages, receiver
get some help in
synchronization process
and thus it is very
important in audio
video transmission or
for any smoother real
time experience.
It contains current time,
no. of packets sent, no.
of bytes sent, timestamp
SSRC (synchronization source) : identify sender
Sender info. block:
• NTP (Network transport protocol) timestamp sent time (wall clock time or roundtrip delay, etc.)
• RTP timestamp: corresponding to NTP but in formats of RTP data packet timestamp; used for intra & inter media
synchronization.
• Sender’s packet count & octet count
Multiple report blocks, each block has
• SSRC_n, fraction lost, number of lost
• Highest sequence number received
• Inter-arrival jitter, LSR (Last SR timestamp ), DLSR (Delay Since Last SR)
RECEIVER’S MESSAGE
Passive participants are those that don’t send any RTP packet and for them receiver
report is used to inform the sender and other receivers about the quality of service(QoS).
So basically, we get to know about fraction of packets lost, last sequence no., average
interarrival jitter
SOURCE DESCRIPTION MESSAGE
The Source Sends a source description message at every fixed interval to give some extra information
about itself containing details like name of source, its mail id, contact number or source controller.
It contains CNAME (canonical name) unique for every different terminal/user.
BYE MESSAGE
 When ever a stream is to be in completion or to shut down a
stream there should be a bye message and this last time shut
down message is bye report/message.
 It is sent by source to announcing for leaving the conference.
 This is direct announcement for other sources about absence of
other source.
APPLICATION
SPECIFIC
MESSAGE
Now if we want to make our application more
extensible then RTCP allows application-specific
RTCP packets which is introduced by RFC 3611.
This can be used to extend the type of application.
ROUND TRIP TIME CALCULATION
 SR packet contains: NTP (= t1)
 RR packet contains: Last SR timestamp (LSR = t1), Delay Since Last SR (DLSR=t3-t2)
 Roundtrip time = t4 - t3 + t2 - t1 = t4 – (t3-t2) –t1
= t4 – DLSR - LSR
sender
receiver
SR RR
DLSR
t1
t2 t3
t4
 So basically, RTCP is used to get more features of
multimedia and efficiently share the bandwidth for the
better accessibility.
SUMMARY
 We got to know about the flow of RTCP
how it act as a companion to RTP
 What RTCP means
 Features of RTCP
 Types of report it sends
 Application
THANKS
GUYS

More Related Content

What's hot

Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
FabMinds
 
Go Back N ARQ
Go  Back N ARQGo  Back N ARQ
Go Back N ARQ
guesta1b35273
 
Overview of SCTP (Stream Control Transmission Protocol)
Overview of SCTP (Stream Control Transmission Protocol)Overview of SCTP (Stream Control Transmission Protocol)
Overview of SCTP (Stream Control Transmission Protocol)
Peter R. Egli
 
Transport layer services
Transport layer servicesTransport layer services
Transport layer services
Melvin Cabatuan
 
the transport layer
the transport layerthe transport layer
the transport layer
tumetr1
 
Dist deadlock sureka
Dist deadlock surekaDist deadlock sureka
Dist deadlock sureka
Arun Kannan
 
Chap 10 igmp
Chap 10 igmpChap 10 igmp
Chap 10 igmp
Noctorous Jamal
 
Distance Vector & Link state Routing Algorithm
Distance Vector & Link state Routing AlgorithmDistance Vector & Link state Routing Algorithm
Distance Vector & Link state Routing Algorithm
MOHIT AGARWAL
 
Socket Programming
Socket ProgrammingSocket Programming
Socket Programming
elliando dias
 
Multicastingand multicast routing protocols
Multicastingand multicast routing protocolsMulticastingand multicast routing protocols
Multicastingand multicast routing protocols
Iffat Anjum
 
TCP and UDP
TCP and UDP TCP and UDP
TCP and UDP
Ramesh Giri
 
Transmission control protocol
Transmission control protocolTransmission control protocol
Transmission control protocol
Sundra Anand
 
Ip addressing classful
Ip addressing classfulIp addressing classful
Ip addressing classful
Abhishek Kesharwani
 
Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocol
asimnawaz54
 
Rtsp
RtspRtsp
Stop and-wait protocol
Stop and-wait protocolStop and-wait protocol
Stop and-wait protocol
Venkata Sreeram
 
Design issues for the layers
Design issues for the layersDesign issues for the layers
Design issues for the layers
jayaprakash
 
Selective repeat protocol
Selective repeat protocolSelective repeat protocol
Selective repeat protocol
Manusha Dilan
 
network convergence problem and solutions
network convergence  problem and solutionsnetwork convergence  problem and solutions
network convergence problem and solutions
Siddhi Viradiya
 
Chap 12 tcp
Chap 12 tcpChap 12 tcp
Chap 12 tcp
Sparsh Samir
 

What's hot (20)

Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
Go Back N ARQ
Go  Back N ARQGo  Back N ARQ
Go Back N ARQ
 
Overview of SCTP (Stream Control Transmission Protocol)
Overview of SCTP (Stream Control Transmission Protocol)Overview of SCTP (Stream Control Transmission Protocol)
Overview of SCTP (Stream Control Transmission Protocol)
 
Transport layer services
Transport layer servicesTransport layer services
Transport layer services
 
the transport layer
the transport layerthe transport layer
the transport layer
 
Dist deadlock sureka
Dist deadlock surekaDist deadlock sureka
Dist deadlock sureka
 
Chap 10 igmp
Chap 10 igmpChap 10 igmp
Chap 10 igmp
 
Distance Vector & Link state Routing Algorithm
Distance Vector & Link state Routing AlgorithmDistance Vector & Link state Routing Algorithm
Distance Vector & Link state Routing Algorithm
 
Socket Programming
Socket ProgrammingSocket Programming
Socket Programming
 
Multicastingand multicast routing protocols
Multicastingand multicast routing protocolsMulticastingand multicast routing protocols
Multicastingand multicast routing protocols
 
TCP and UDP
TCP and UDP TCP and UDP
TCP and UDP
 
Transmission control protocol
Transmission control protocolTransmission control protocol
Transmission control protocol
 
Ip addressing classful
Ip addressing classfulIp addressing classful
Ip addressing classful
 
Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocol
 
Rtsp
RtspRtsp
Rtsp
 
Stop and-wait protocol
Stop and-wait protocolStop and-wait protocol
Stop and-wait protocol
 
Design issues for the layers
Design issues for the layersDesign issues for the layers
Design issues for the layers
 
Selective repeat protocol
Selective repeat protocolSelective repeat protocol
Selective repeat protocol
 
network convergence problem and solutions
network convergence  problem and solutionsnetwork convergence  problem and solutions
network convergence problem and solutions
 
Chap 12 tcp
Chap 12 tcpChap 12 tcp
Chap 12 tcp
 

Similar to RTCP

Rtp
RtpRtp
Sania rtp
Sania rtpSania rtp
Sania rtp
saniacorreya
 
Realtimetapan
RealtimetapanRealtimetapan
Realtimetapan
Tapan Kumar
 
Rtp
RtpRtp
Streaming Media Protocols
Streaming Media ProtocolsStreaming Media Protocols
Streaming Media Protocols
sanjoysanyal
 
RTP_RTCP.ppt
RTP_RTCP.pptRTP_RTCP.ppt
RTP_RTCP.ppt
umas1234
 
Sip technology overview
Sip technology overviewSip technology overview
Sip technology overview
Oded Ben-Dori
 
Unit 5.Transport Layer.pptx
Unit 5.Transport Layer.pptxUnit 5.Transport Layer.pptx
Unit 5.Transport Layer.pptx
1136NayanSonawane
 
Assignment on data network
Assignment on data networkAssignment on data network
Assignment on data network
Abhishek Kesharwani
 
Assignment on data network
Assignment on data networkAssignment on data network
Assignment on data network
Abhishek Kesharwani
 
Sctp
SctpSctp
Overview of SCTP (Stream Control Transmission Protocol)
Overview of SCTP (Stream Control Transmission Protocol)Overview of SCTP (Stream Control Transmission Protocol)
Overview of SCTP (Stream Control Transmission Protocol)
Peter R. Egli
 
Alternative Transport Protocols
Alternative Transport ProtocolsAlternative Transport Protocols
Alternative Transport Protocols
Peter R. Egli
 
Transport Layer in Computer Networks (TCP / UDP / SCTP)
Transport Layer in Computer Networks (TCP / UDP / SCTP)Transport Layer in Computer Networks (TCP / UDP / SCTP)
Transport Layer in Computer Networks (TCP / UDP / SCTP)
Hamidreza Bolhasani
 
TCP/IP & UDP
TCP/IP & UDPTCP/IP & UDP
TCP/IP & UDP
ghayour abbas
 
Bg4101335337
Bg4101335337Bg4101335337
Bg4101335337
IJERA Editor
 
Chapter03 sg
Chapter03 sgChapter03 sg
Chapter03 sg
Dang Hop
 
Transport Layer
Transport LayerTransport Layer
Transport Layer
Dr Shashikant Athawale
 
Adhoc and Sensor Networks - Chapter 07
Adhoc and Sensor Networks - Chapter 07Adhoc and Sensor Networks - Chapter 07
Adhoc and Sensor Networks - Chapter 07
Ali Habeeb
 
Analytical Research of TCP Variants in Terms of Maximum Throughput
Analytical Research of TCP Variants in Terms of Maximum ThroughputAnalytical Research of TCP Variants in Terms of Maximum Throughput
Analytical Research of TCP Variants in Terms of Maximum Throughput
IJLT EMAS
 

Similar to RTCP (20)

Rtp
RtpRtp
Rtp
 
Sania rtp
Sania rtpSania rtp
Sania rtp
 
Realtimetapan
RealtimetapanRealtimetapan
Realtimetapan
 
Rtp
RtpRtp
Rtp
 
Streaming Media Protocols
Streaming Media ProtocolsStreaming Media Protocols
Streaming Media Protocols
 
RTP_RTCP.ppt
RTP_RTCP.pptRTP_RTCP.ppt
RTP_RTCP.ppt
 
Sip technology overview
Sip technology overviewSip technology overview
Sip technology overview
 
Unit 5.Transport Layer.pptx
Unit 5.Transport Layer.pptxUnit 5.Transport Layer.pptx
Unit 5.Transport Layer.pptx
 
Assignment on data network
Assignment on data networkAssignment on data network
Assignment on data network
 
Assignment on data network
Assignment on data networkAssignment on data network
Assignment on data network
 
Sctp
SctpSctp
Sctp
 
Overview of SCTP (Stream Control Transmission Protocol)
Overview of SCTP (Stream Control Transmission Protocol)Overview of SCTP (Stream Control Transmission Protocol)
Overview of SCTP (Stream Control Transmission Protocol)
 
Alternative Transport Protocols
Alternative Transport ProtocolsAlternative Transport Protocols
Alternative Transport Protocols
 
Transport Layer in Computer Networks (TCP / UDP / SCTP)
Transport Layer in Computer Networks (TCP / UDP / SCTP)Transport Layer in Computer Networks (TCP / UDP / SCTP)
Transport Layer in Computer Networks (TCP / UDP / SCTP)
 
TCP/IP & UDP
TCP/IP & UDPTCP/IP & UDP
TCP/IP & UDP
 
Bg4101335337
Bg4101335337Bg4101335337
Bg4101335337
 
Chapter03 sg
Chapter03 sgChapter03 sg
Chapter03 sg
 
Transport Layer
Transport LayerTransport Layer
Transport Layer
 
Adhoc and Sensor Networks - Chapter 07
Adhoc and Sensor Networks - Chapter 07Adhoc and Sensor Networks - Chapter 07
Adhoc and Sensor Networks - Chapter 07
 
Analytical Research of TCP Variants in Terms of Maximum Throughput
Analytical Research of TCP Variants in Terms of Maximum ThroughputAnalytical Research of TCP Variants in Terms of Maximum Throughput
Analytical Research of TCP Variants in Terms of Maximum Throughput
 

Recently uploaded

Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 

Recently uploaded (20)

Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 

RTCP

  • 1. REAL-TIME TRANSFER CONTROL PROTOCOL VISHWAJEET KUMAR 205320024 M.SC. COMPUTER SCIENCE
  • 2. OBJECTIVE To get to understand about the RTCP protocol flow diagram It’s working properties Benefit of RTCP Type of information stream it works on Where used?
  • 3. OVERVIEW Introduction What is RTCP? Working Scenario Why RTCP? Reports
  • 4. Flow Diagram Of RTP/RTCP
  • 5. INTRODUCTION AS WE KNOW THAT IN RTP (REAL-TIME TRANSFER PROTOCOL) WE CAN ONLY SEND THE DATA FROM SOURCE TO THE TERMINALS/USERS BUT CAN’T GET THE DATA FROM THE USERS. SO THIS DISADVANTAGE CAN BE OVERCOME BY USING RTCP (REAL-TIME TRANSFER CONTROL PROTOCOL) .
  • 6. WHAT IS RTCP?  The messages that can control the transmission and quality of data (QoS) as well as also allow the recipients so that they can send feedback to the source or sources. A protocol designed for this purpose, which is known as Real-time Transport Control Protocol (RTCP).
  • 7. HOW RTCP WORKS? RTCP operates alongside with the RTP and share information with it but at same time every RTCP has different port – User Datagram Protocol) to work independently from the RTP . UDP – it’s just like transport control protocol but it doesn’t provide acknowledgement of the sent packets. RTCP doesn’t use well known UDP port but instead of that it uses temporary port that must be an odd- numbered port that follows port number selected for RTP .
  • 9.  RTCP is basically based on the periodic transmission of control packets to all participants in the network being on the fourth layer i.e. transport layer), using the same distribution process as the data packets.  It is recommended that the fraction of network bandwidth allocated to the RTCP is not more than 5% and at least 25% of bandwidth is for source reports.  So, the primary function of RTCP is to provide feedback on the quality of the data distribution.  It specifies report PDUs exchanged between source and destination.
  • 10. CONTINUE…  PDU – Protocol data unit nothing but it gives an abstract idea of the data packets, but it has lesser overhead than  Although PDU for the transport layer protocol is called segment  The reports contain statistics such as the number of RTP- PDUs sent, number of RTP-PDUs lost, inter arrival jitter.  It is used by application to modify sender transmission rate and diagnostics purposes.
  • 11. SO RTCP IS VERY USEFUL IN THE REAL TIME APPLICATIONS LIKE VIDEO CONFERENCING WHERE WE ALWAYS WANT TO KNOW THE STATUS OF THE TERMINALS THAT AS WE HAVE SEEN IN THE DIAGRAM THAT EVERY SENDER WILL SEND RTP AS WELL AS RTCP, BUT EVERY TERMINAL OR DESTINATION SENDS THE FEEDBACK THROUGH RTCP. MULTICAST DISTRIBUTION IS USED JUST LIKE DATA PACKETS.
  • 12. SYNCHRONIZATION OF STREAMS  Timestamp doesn’t get tied up with the individual video or audio sampling clocks like RTP.  Each sender report in the RTCP contains:-  The timestamp of RTP PDU .  The wall-clock time for when PDU was created.  so receiver use this association to synchronize video and audio playout. Internetwork RTP audio RTCP audio RTP video RTP video
  • 13. WHY RTCP?  What happens when there is one sender and many receivers? RTP can’t do anything in this scenario as it focus on individual video but RTCP can do this by creating reports linearly with the number of participants and would match or exceed the amount of RTP data, but more overhead than useful data.
  • 14. SOLUTION  RTCP attempts to limit its traffic to 5% of the session bandwidth to ensure it can scale!  RTCP gives 75% of this rate to the receivers; and the remaining 25% to the sender.
  • 15. Suppose one sender, sending video at a rate of 2 Mbps. Then RTCP attempts to limit its traffic to 100 Kbps. The 75 kbps is equally shared among receivers: • With R receivers, each receiver gets to send RTCP traffic at 75/R kbps. Sender gets to send RTCP traffic at 25 kbps.
  • 16. Version: (2 bits) identifies the version of RTP . P (Padding): (1 bits) this is used to indicate if there is any extra padding bytes at the end of the RTP packet. It might be used to fill up a block of certain size like for block required by an encryption algorithm . RC ( Reception Report Count ): (5 bits) It is the number of reception report blocks contained in this packet. PT (Packet Type): (8 bits) It contains a constant to identify RTCP packet type. Length: ( 16 bits ) It indicates the length of this RTCP packet. SSRC: (32 bits ) Synchronization source identifier uniquely identifies the source of stream.
  • 17.  RTCP packets have a length field in header; aligned to 32 bits --- stackable  Sent in a compound packet of at least 2 RTCP packets
  • 18. Basically RTCP has five types of messages namely :- • Sender Report • Receiver’s Report • Source Description Message • Bye Message • Application Specific Message
  • 19. SENDER MESSAGE Sender report is sent after a fixed interval by the active sender in a conference to report transmission as well as stats of reception for all RTP packets transmitted during this time period. After receiving these RTP messages, receiver get some help in synchronization process and thus it is very important in audio video transmission or for any smoother real time experience. It contains current time, no. of packets sent, no. of bytes sent, timestamp
  • 20. SSRC (synchronization source) : identify sender Sender info. block: • NTP (Network transport protocol) timestamp sent time (wall clock time or roundtrip delay, etc.) • RTP timestamp: corresponding to NTP but in formats of RTP data packet timestamp; used for intra & inter media synchronization. • Sender’s packet count & octet count Multiple report blocks, each block has • SSRC_n, fraction lost, number of lost • Highest sequence number received • Inter-arrival jitter, LSR (Last SR timestamp ), DLSR (Delay Since Last SR)
  • 21. RECEIVER’S MESSAGE Passive participants are those that don’t send any RTP packet and for them receiver report is used to inform the sender and other receivers about the quality of service(QoS). So basically, we get to know about fraction of packets lost, last sequence no., average interarrival jitter
  • 22. SOURCE DESCRIPTION MESSAGE The Source Sends a source description message at every fixed interval to give some extra information about itself containing details like name of source, its mail id, contact number or source controller. It contains CNAME (canonical name) unique for every different terminal/user.
  • 23. BYE MESSAGE  When ever a stream is to be in completion or to shut down a stream there should be a bye message and this last time shut down message is bye report/message.  It is sent by source to announcing for leaving the conference.  This is direct announcement for other sources about absence of other source.
  • 24. APPLICATION SPECIFIC MESSAGE Now if we want to make our application more extensible then RTCP allows application-specific RTCP packets which is introduced by RFC 3611. This can be used to extend the type of application.
  • 25. ROUND TRIP TIME CALCULATION  SR packet contains: NTP (= t1)  RR packet contains: Last SR timestamp (LSR = t1), Delay Since Last SR (DLSR=t3-t2)  Roundtrip time = t4 - t3 + t2 - t1 = t4 – (t3-t2) –t1 = t4 – DLSR - LSR sender receiver SR RR DLSR t1 t2 t3 t4
  • 26.  So basically, RTCP is used to get more features of multimedia and efficiently share the bandwidth for the better accessibility.
  • 27. SUMMARY  We got to know about the flow of RTCP how it act as a companion to RTP  What RTCP means  Features of RTCP  Types of report it sends  Application