Remote Control for Videoconferencing*
|
|
|
- Michael Ward
- 10 years ago
- Views:
Transcription
1 Remote Control for Videoconferencing* Marcia Perry and Deborah Agarwal Information and Computing Sciences Division Ernest Orlando Lawrence Berkeley National Laboratory One Cyclotron Road Berkeley, California Telephone: (510) Fax: (510) ABSTRACT We have designed, implemented, and deployed a camera control system and a conference controller that provide remote control capabilities for videoconferencing over the Internet. The camera control system allows users to pan, tilt, and zoom the cameras, switch between cameras, and get a picture-in-picture view from their desktops. The conference controller allows conference participants to not only start and stop the media tools on a remote host, but also to dynamically change settings and turn transmission on and off. It supports the vic (video) and vat (audio) Internet videoconferencing tools and enhances their usability by providing an integrated and secure user interface for local and remote control of these applications. This paper describes the design and implementation of the camera control system (devserv and camclnt) and the conference controller (confcntlr). The remote control capabilities offered by these tools have changed the videoconferencing paradigm to one of telepresence. With these tools remote users can walk around the room, focus in on objects, and actively participate rather than just observe. 1. INTRODUCTION The implementation of IP multicast over the Internet has inspired videoconferencing tools for video, audio, session directory, conference management, and shared workspace applications. These tools are built as standalone applications and integrated videoconferencing systems. However, they are designed for people sitting directly at the computer terminal participating in a videoconference and in some conferencing situations there may not be anyone to sit at the computer at a participating site. In the case of collaboratories, our experience has been that the researchers present at an experiment site do not want to tend to the videoconferencing tools in order to select views for the remote collaborators. This is also the case for participants in conference room meetings. However, if no one is at the sending host to execute a video tool or does not turn on transmission, remote users have no way of receiving an image. Also, if the person watching the video wishes to move a remote camera or change the remote settings and is unable to do so, it is frustrating to that remote participant. Remote control of videoconferencing *This work was supported by the Director, Office of Science. Office of Advanced Scientific Computing Research. Mathematical, Information, and Computational Sciences Division under U. S. Department of Energy Contract No. DE-AC03-76SF00098 with the University of California. 1
2 devices can provide a non-disruptive means of moving cameras and improving audio quality locally. As part of the Distributed Collaboratories project of the Imaging and Distributed Collaborations Group at Lawrence Berkeley Laboratory, we have designed, implemented, and deployed a camera control system and a conference controller. These tools give the remote user a sense of telepresence by providing remote control capabilities for videoconferences over the Internet. With the remote camera control and conference controller, collaborators can walk around a remote room, focusing in on what is taking place. This capability allows users to feel more like participants instead of observers. The camera control system consists of a server (devserv) and a client (camclnt) to drive serial-controllable video devices. Devserv is run on the machine directly connected via serial ports to the camera system. Camclnt is the user interface that can be run remotely or locally to control the cameras. Through the camclnt interface the user can control camera pan, tilt, zoom, and picture-in-picture. The devserv and camclnt programs communicate via IP multicast and UDP unicast. The conference control tool, confcntlr, enhances the usability of the media tools vic (video) and vat (audio) by providing an integrated and significantly enhanced user interface to these tools. Confcntlr allows conference participants from local and remote sites to change media tool settings. Confcntlr is based on a peer-to-peer architecture and it uses TCP connections to exchange messages over the Internet and IP multicast for communication with the media tools on the local host. The remainder of this paper is organized as follows. Section 2 surveys related work in multicastbased videoconferencing. Section 3 discusses the remote camera control system. Section 4 discusses the conference control tool. Section 5 summarizes the paper and suggests future work. 2. RELATED WORK Many of the early public domain, IP multicast-based videoconferencing tools were single media standalone applications such as the sdr session directory[4], and the mbone tools--vic and vat for video and audio and wb, a shared whiteboard[5]. Later development involved enhancing existing tools and building integrated systems. For example, support for new video cards was added to vic and the Robust Audio Tool (rat), which offers improved audio quality, was developed[10]. Although vic, vat, wb, and rat are independent applications, they all have the ability to use a local multicast-based conference bus or message bus for interprocess communication. An early conference management tool, the MultiMedia Conference Control program (MMCC), provides an integrated user interface to media tools, and offers session creation and invitation capabilities. Its autopilot mode allows users to accept invitations automatically, so the media tools can be started from a remote host, but settings cannot be changed remotely while the tools are executing[13]. More recent integrated conference management systems include the Multimedia Internet Terminal (MINT)[14], mstar[8], the MASH project[7], and the CORE2000 Collaboration Environment[9]. MASH has added to vic and vat the collaborator application, which provides an integrated user interface to the media tools[12]. MASH has also implemented a remote-controlled version of vic (rvic) to allow conference participants in one room (without a 2
3 technician) to manipulate a shared video display. An rvic server displays a set of windows representing the various video sources and supports different window layouts [6]. In addition to applications, MASH provides a network and media toolkit from which new applications can be built, and this toolkit includes agents for driving some serial devices. MASH is a research tool and so the priority is not on robustness or completeness of the tools. mstar is a commercial product and includes a controller that drives a Canon VC-C1 camera and an Extron 100 videoswitcher. Its development framework defines mechanisms for remotely controlling tools and parameters (e.g., stopping tools or changing bandwidth from a remote host). This control is intended for administrators rather than for conference participants. CORE2000 provides remote startup and termination of applications and a camera controller for pan, tilt, and zoom. When a user starts a tool, it is automatically launched on all participants hosts and, when a user terminates a tool, he or she is asked whether to stop the tool for everyone. Once the tool is executing its settings cannot be changed by a remote host. CORE2000 supports third-party applications (e.g., CuSeeMe, Televiewer) and provides a framework for porting new tools to its Java environment. The above systems provide cross-platform, integrated user interfaces for establishing, joining, and controlling multimedia conferences from the desktop. Although features vary from system to system, they support a wide range of collaborative capabilities including invitation, voting, floor control, chat, media archiving and playback, resource reservation, and conferencing via a web browser. And while several of the above tools provide some remote control capabilities, they do not offer all of the features needed by a distributed collaboratory. For example, these tools lack the abilities to remotely drive a variety of cameras and to change the configuration of media tools during execution. Since these capabilities are important for telepresence, we developed the remote camera control system and conference controller to directly address these needs. 3. REMOTE CAMERA CONTROL SYSTEM The camera control system consists of a device server (devserv) and a client (camclnt) which together allow users to control the video devices. Devserv is run on the host connected to the devices and camclnt is the graphical user interface that can be run anywhere. Participants using camclnt can select the camera to view and can pan, tilt, or zoom any available camera. They can also create or move a picture-in-picture view if there is a videoswitcher. In addition to providing a means of controlling video devices from the desktop, devserv and camclnt are extensible and cross-platform. Devserv is written in C++ and camclnt is written in Java and both have been tested on Solaris, FreeBSD, Linux, Irix, and Windows95/98/NT. The server currently supports the Sony EVI-D30/D31 and Canon VC-C1/VC-C3 cameras and the Panasonic WJ-MX50 videoswitcher. 3.1 System Design Client requests are transmitted using UDP unicast and IP multicast connections; the server uses IP multicast to send messages. Servers and clients can execute on the same or different hosts and any number of hosts can join a multicast group. Our system supports both the socket interface 3
4 for network communication and the common communication library developed under the Collaboratory Interoperability Framework (CIF) project[1]. The CIF library provides a simple uniform interface to low-level network protocols providing reliable and unreliable unicast and multicast. CIF has implementations available in both C++ and Java and these implementations interoperate seamlessly. Requests to move the video devices are sent by the client to a server using UDP unicast. The server then drives the devices (via RS232 communication) and multicasts the resulting status. Clients can also send a request to the server to send a description message. Commands and descriptions are ASCII strings, defined in our Remote Camera Control Language[2]. All messages contain a header with a timestamp and the server s name. Descriptions contain status information such as conference information (address, port, etc.) and the state of the connected devices (e.g., type, degrees of freedom, current positions). Commands specify the device, degree of freedom, and the appropriate values and allow absolute, relative, and fractional camera movements. For example, cam 3 tilt R is a command for camera three to tilt minus twenty degrees relative to the current position at the maximum speed, and cam 1 pan F is a command to pan camera one by one-half of an image to the right, at maximum speed. Other clients may be written to work with devserv by implementing the Remote Camera Control Language. In order to control access to the devices, we have incorporated the Secure Socket Layer (SSL) to provide a secure connection between the client and the server, and the Akenti authorization system to verify client authorization[15]. Servers and clients are identified by X.509 identity certificates. 3.2 Devserv Devserv s class structures for networking and devices are shown in Figure 1. In the network hierarchy, classes for specific connection types (UDP unicast, IP multicast, and SSL) are derived from a Network abstract base class that encapsulates common socket properties (e.g., identifier, open/close, send/receive). For CIF, objects from the CIF library are also used. The hardware device classes mirror physical objects. A class for each device is derived from the class that encapsulates the properties of its category (e.g., the Camera or Videoswitcher class). These base classes are derived from the Device abstract base class which represents attributes that are common to all programmable devices (e.g., move, transmit, receive). At runtime an object is instantiated for each device that is connected. Classes for new devices can be easily derived from the existing classes (e.g., a new videoswitcher could be derived from the Videoswitcher class). The network class structure can be extended similarly. 4
5 Network Device UDP IP SSL Camera Videoswitcher Sonyevid30 Canonvcc1 Canonvcc3 Panasonicwjmx50 Serialport Figure 1: Devserv s Major Class Structures Upon startup, devserv determines the hardware and network configuration for the host from a configuration file and then opens the serial port and network connections and initializes the devices according to the configuration. It then receives and processes requests until program termination. For security, the Akenti software provides authorization for each identity so that devserv can make access control decisions. If security is enabled, an SSL connection is established from camclnt to devserv to exchange and validate identity certificates. The shared secret that is generated by the SSL handshake (the master-secret) is cached by devserv and used to make access control decisions when requests arrive. Devserv multicasts descriptions periodically or after carrying out a request. Requests are sequenced by their timestamps. The devserv program is threaded: a thread is created for each device and network connection. The device threads initialize, run, and shut down the devices. The threads for network connections process incoming requests while the main thread sends descriptions. Thread synchronization uses wait-and-signal mechanisms and synchronize serial ports by locking objects. 3.3 Camclnt Camclnt uses the Java I/O and networking packages to implement communication. For CIF, objects from the CIF Java implementation are used. At startup camclnt opens its network connections and then multicasts a request for a description message. The descriptions allow camclnt to discover the addresses of hosts running servers and the devices connected to each server. This information is cached by camclnt. Camclnt s graphical user interface displays a list of the servers discovered. When a server is selected, the window is reconfigured to show the information for that server. Camclnt s graphical user interface is based on Java s Abstract Window Toolkit (AWT). The Java Media Framework (JMF) tools are incorporated to display the video. The main window contains controls for selecting a server, selecting cameras to view and move, and specifying device commands. Commands are sent to the server when the user selects a device, clicks in the pan- 5
6 and-tilt area, or manipulates a zoom control. For security, each command also includes a signed hash of the command. Fractional moves and a picture-in-picture view are created by clicking and dragging in the camera view area or the JMF player window. The pan/tilt area allows the user access to the entire pan and tilt range of the camera. Figure 2 shows the main window on the right and the JMF player window on the left. Figure 2: JMF Video Player and Camclnt Main Window Because servers can send descriptions at any time, camclnt uses a main thread to respond to usertriggered events and a separate thread for receiving messages from the server. When a description arrives, the receiving thread updates the configuration information for the server and reconfigures the information in the main window to reflect the server s current configuration. Access to shared objects is synchronized with Java synchronization mechanisms. 4. CONFCNTLR Confcntlr was developed to control media tools locally and remotely from a unified interface[11]. It supports the following actions: start one or all media tools on a local or remote host with user-selected settings stop media tools running on a local or remote host obtain a remote host s settings and current videoconferencing information change settings for a local or remote media tool that is executing turn video transmission on or off at a local or remote site Based on a peer-to-peer architecture, confcntlr is meant to execute on each host participating in a videoconference. Confcntlr supports encryption to preserve confidentiality and integrity of data exchanged between confcntlrs over the public Internet. Security features also allow a user to restrict access to the local confcntlr. The security operations are to: encrypt/decrypt messages exchanged between conference controllers at remote sites allow restricted control to authorized users allow users to grant or deny permission for another host to perform an operation unconditionally or on a per-request basis provide warnings when changes are made 6
7 4.1 Design The conference controller was designed as a desktop application that permits access to the tools it controls. It is single-threaded, handling all its events within one event loop that utilizes a FIFO event queue. Communication between confcntlrs running on different hosts is via TCP connections. Communication between applications running on the same host is via a conference bus. The conference bus is an IP multicast connection with a time-to-live of zero to restrict messages to the local host. Figure 3 depicts this communication architecture. Host A vic vic vat confcntlr Host B confcntlr vat vic vic Conference Bus TCP Conference Bus Figure 3: Communication Channels. A TCP connection is for peer-to-peer communication; the conference bus is for interprocess communication. In order to allow an arbitrary number of remote controllers, a separate TCP connection is used for each request; all other connections are opened once and remain open until program termination. Each conference controller controls one conference session at one site but multiple confcntlrs can be executed for simultaneous participation in multiple conferences. 4.2 Implementation The conference controller was written in Tcl/Tk and C and runs under Solaris, freebsd, Irix, and Windows. It has been designed as four separate units that work together: a graphical user interface (GUI), a control unit, a network unit, and an encryption unit. Figure 4 shows the relationships of these components. GUI Control Unit Network Unit Encryption Unit Figure 4: Confcntlr s Components. The arrows indicate the data flow. All actions go through the control unit. When a user manipulates a GUI control to invoke a local or remote operation, the control unit processes the request. To send a message to a remote host or to a videoconference tool on the same host, the control unit invokes the network component. The network unit invokes the encryption unit when messages are sent to or received from a remote host. The encryption unit uses the SSLeay library to encrypt plain text and decrypt ciphertext with the Data Encryption Standard (DES). When the network unit receives a message, 7
8 the control unit processes the message and invokes the GUI to display the output. The control unit carries out local operations invoked by the GUI or network unit. To start or stop a media tool on the local host, confcntlr spawns or terminates a process for the tool. To change local settings for a tool that is executing, the control unit formats a message and the network unit sends the message to the target tool. When a user invokes a remote operation, the control unit formats a message and the network unit sends it to the remote confcntlr. The control unit also formats replies to requests received from other hosts and processes incoming replies. The network unit is responsible for establishing and closing socket connections and transmitting and receiving all host-to-host and interprocess communication. Requests and replies are usually not sequential and replies are not always sent. There are two host-to-host communication schemes. 1. Host A sends a request to host B. Host A does not wait for a reply unless it is obtaining a remote host s settings. Host B receives the request, processes it, and sends a reply. 2. Host A notifies host B that some event took place (e.g., host A terminated a tool). Host B receives and processes the notification but does not send a reply. For interprocess communication, each process connected to a multicast channel receives a copy of all messages sent over the channel. If a process recognizes the message type, it processes the message locally and may also forward the message to another conference controller at a remote site. Confcntlr sends messages on the conference bus to dynamically change settings on the media tools and processes notifications from the tools that a setting was changed or that it is being terminated. Confcntlr s graphical user interface is designed to be unobtrusive so that it can run continuously on the user s desktop. It presents a main window with status information and controls for basic operations. Popup windows can be opened for specific categories of functions (e.g., local or remote settings, security, and general conference control). The main window is shown in Figure 5. The status buttons indicate what media tools are running locally and remotely. The image in the lower left displays the remote access level: red, yellow, and green correspond to allow no one, allow authorized users, and allow anyone, respectively. Figure 5: Confcntlr s main window The conference window, shown in Figure 6, is used for setting media tool addresses and launching the media tools. Figure 7 shows the window for changing the settings of remote media; the Local Settings window is similar. Figure 8 shows the security window for access control, prompts, and warnings options, an access control list, and a View key button to invoke an encryption window. 8
9 Figure 6: Conference Window Figure 7: Remote Settings Window Figure 8: Security window 5. SUMMARY AND FUTURE WORK This paper describes the design and implementation of a camera control system and a conference controller that together provide remote control capabilities to Internet-based multimedia conferencing. These applications allow users to control the video devices and media tools used in a videoconference from anywhere over the Internet. With these tools the person who is watching the transmission and cares most about how it is received can control the transmission. This new remote control capability has changed the videoconferencing paradigm to one of telepresence in which remote users become active participants rather than passive observers. The camera control system and conference controller have served an important role in videoconferencing at Lawrence Berkeley Laboratory and have been used in large conference rooms and by the Spectro-Microscopy Collaboratory[3] for videoconferencing. With these remote control tools, participants at the local site can spend their time on scientific experimentation or attending the meeting rather than babysitting the videoconference tools. By 9
10 presenting a unified interface to the media tools, confcntlr has made it easier to manage these separate tools. Confcntlr has also been used to remotely instruct a user in operating the media tools. Access control mechanisms allow protection of computer and network resources and have reduced concerns about being watched or heard without a user s knowledge and consent. Our experience has been that the usability of multimedia conferencing tools is enhanced when there is a unified, intuitive, and configurable interface. Our next goal will be to expand the integrated interface concept into a wide range of videoconferencing capabilities. We plan to offer an expanded implementation that works with a wider variety of media tools. In addition to remote control capabilities, the enhanced system will include mechanisms for floor control, indicating users availability, and meeting with both groups and individuals. The remote camera control system was demonstrated at the High Performance Distributed Computing Conference (HPDC 98) in Chicago, Illinois, July 1998 and at the SuperComputing Conference (SC 98) in Orlando, Florida, November Confcntlr was demonstrated at the SuperComputing Conference (SC 97) in San Jose, California, November More information about the project is available at and REFERENCES 1. Agarwal, D., et al., The Collaboratory Interoperability Framework Common Application Programming Interface, LBNL Report # Agarwal, D., Perry, M., Camera Remote Control Command Language, LBNL PUB Agarwal, D., Johnston, W., Perry, M., The Spectro-Microscopy Collaboratory at the ALS, LBNL Report # Clarke, L., Sasse, A., Conceptual Design Reconsidered -- The Case of the Internet Session Directory Tool. Proceedings of HCI 97, Bristol, UK, August McCanne, S., Jacobson, V., vic: A Flexible Framework for Packet Video. ACM Multimedia, November 1995, pp Hodes, T., et al., Shared remote control of a video conferencing application: motivation, design, and implementation. Proceedings of SPIE Multimedia Computing and Networking, San Jose, CA, USA, January 1999, pp McCanne, S., et al., Toward a Common Infrastructure for Multimedia-Networking Middleware, Proceedings of the 7th International Workshop on Network and Operating Systems Support for Digital Audio and Video (NOSSDAV 97), May Parnes, P., Synnes, K., Schefstrom, D., A Framework for Management and Control of Distributed Applications using Agents and IP-multicast. Proceedings of the 18th IEEE INFO- 10
11 COM Conference (INFOCOM 99), Payne, D., Myers, J., The EMSL Collaborative Research Environment (CORE) - Collaboration via the World Wide Web. The IEEE Fifth Workshops on Enabling Technology: Infrastructure for Collaborative Enterprises (WET ICE 96), June 19-21, 1996, Stanford, California. 10. Perkins, C., et al., Multicast Audio: The Next Generation. Proceedings of INET 97, June 1997, Kuala Lumpur, Malaysia. 11. Perry, M., Confcntlr: A Videoconference Controller: Masters Thesis, San Francisco State University and Lawrence Berkeley National Laboratory, Publication Number LBNL-41154, December Romer, C., A Composable Architecture for Scripting Multimedia Network Applications. Masters Report, University of California, Berkeley, July Schooler, E., Case Study: Multimedia Conference Control in a Packet-switched Teleconferencing System. Journal of Internetworking: Research and Experience, Volume 4, Number 2, June 1993, pp Sisalem, D., Schulzrinne, H., The Multimedia Internet Terminal. Journal on Telecommunication Systems, Volume 9, Number 3, 1998, pp Thompson, M., et al., Certificate-based Access Control for Widely Distributed Resources. Proceedings of the Eighth USENIX Security Symposium (Security 99), Washington, D.C., August 23-26, 1999, pp
CONFCNTLR: A VIDEOCONFERENCE CONTROLLER
CONFCNTLR: A VIDEOCONFERENCE CONTROLLER A thesis submitted to the faculty of San Francisco State University in partial fulfillment of the requirement for the degree Master of Science in Computer Science
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
A Survey Study on Monitoring Service for Grid
A Survey Study on Monitoring Service for Grid Erkang You [email protected] ABSTRACT Grid is a distributed system that integrates heterogeneous systems into a single transparent computer, aiming to provide
SyncLockStatus Evaluator s Guide
SyncLockStatus Evaluator s Guide 2011 Table of Contents Introduction... 2 System Requirements... 2 Required Microsoft Components... 2 Contact Information... 3 SyncLockStatus Architecture... 3 SyncLockStatus
Network Probe User Guide
Network Probe User Guide Network Probe User Guide Table of Contents 1. Introduction...1 2. Installation...2 Windows installation...2 Linux installation...3 Mac installation...4 License key...5 Deployment...5
Cloud Video. Data Sheet
Cloud Video Data Sheet 4net Technologies Cloud Video 4net s Cloud Video enables remote workers to simply and easily connect to standards-based videoconferencing systems, VoIP phones, ipad s, iphone s and
Contents. Introduction 3. Installation 4
VMS User Manual Contents Introduction 3 Installation 4 Minimum Recommended Requirements 4 Login 4 Main Window 5 Menu Items 5 Toolbar Items 6 Play Bar Items 7 Configuration 8 Add network cameras/ digital
Network Programming TDC 561
Network Programming TDC 561 Lecture # 1 Dr. Ehab S. Al-Shaer School of Computer Science & Telecommunication DePaul University Chicago, IL 1 Network Programming Goals of this Course: Studying, evaluating
District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification
1.1 Multipoint Control Unit (MCU) A. The MCU shall be capable of supporting (20) continuous presence HD Video Ports at 720P/30Hz resolution and (40) continuous presence ports at 480P/30Hz resolution. B.
Software evaluation criteria and terminology REPORT # : R07/0203 AUTHOR(S) : Diane Belyk & David Feist DATE : March 2002
Athabasca University CENTRE FOR DISTANCE EDUCATION Online Software Evaluation Report TITLE : Software evaluation criteria and terminology REPORT # : R07/0203 AUTHOR(S) : Diane Belyk & David Feist DATE
Audio and Web Conferencing
DATA SHEET MITEL Audio and Web Conferencing Simple, Cost-effective Audio and Web Conferencing Mitel Audio and Web Conferencing (AWC) is a simple, cost-effective and scalable audio and web conferencing
Virtual Team Collaboration Glossary
Virtual Team Collaboration Glossary Steve Prahst, Rhonda Arterberrie, and Dennis Kay Knowledge Management and Collaborative Technologies Branch NASA Glenn Research Center Introduction Most NASA projects
Multimedia Communications Voice over IP
Multimedia Communications Voice over IP Anandi Giridharan Electrical Communication Engineering, Indian Institute of Science, Bangalore 560012, India Voice over IP (Real time protocols) Internet Telephony
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Example of Standard API
16 Example of Standard API System Call Implementation Typically, a number associated with each system call System call interface maintains a table indexed according to these numbers The system call interface
Advanced Peer to Peer Discovery and Interaction Framework
Advanced Peer to Peer Discovery and Interaction Framework Peeyush Tugnawat J.D. Edwards and Company One, Technology Way, Denver, CO 80237 [email protected] Mohamed E. Fayad Computer Engineering
Information and Communications Technology Courses at a Glance
Information and Communications Technology Courses at a Glance Level 1 Courses ICT121 Introduction to Computer Systems Architecture This is an introductory course on the architecture of modern computer
Distance-Learning Remote Laboratories using LabVIEW
Distance-Learning Remote Laboratories using LabVIEW Introduction Laboratories, which are found in all engineering and science programs, are an essential part of the education experience. Not only do laboratories
A Java Based Tool for Testing Interoperable MPI Protocol Conformance
A Java Based Tool for Testing Interoperable MPI Protocol Conformance William George National Institute of Standards and Technology 100 Bureau Drive Stop 8951 Gaithersburg MD 20899 8951 1 301 975 4943 [email protected]
ADOBE ACROBAT CONNECT PRO MOBILE VISUAL QUICK START GUIDE
ADOBE ACROBAT CONNECT PRO MOBILE VISUAL QUICK START GUIDE GETTING STARTED WITH ADOBE ACROBAT CONNECT PRO MOBILE FOR IPHONE AND IPOD TOUCH Overview Attend Acrobat Connect Pro meetings using your iphone
FileMaker Server 14. FileMaker Server Help
FileMaker Server 14 FileMaker Server Help 2007 2015 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and FileMaker Go are trademarks
A&H Software House Inc. Web: www.luxriot.com Email: [email protected]. Luxriot
A&H Software House Inc. Web: www.luxriot.com Email: [email protected] Luxriot Luxriot Product Features Luxriot is equipped with Unique, Advanced and Industry Standard Surveillance Features: Luxriot is
User s Guide for Polycom CX7000 Systems
User s Guide for Polycom CX7000 Systems 1.1 August 2012 3725-63878-001/C Trademark Information Polycom, the Polycom Triangles logo, and the names and marks associated with Polycom s products are trademarks
Your Assistant Collaboration Module
MITEL Your Assistant Collaboration Module User Guide Notice This guide is released by Mitel Networks Corporation and provides information necessary to use the Mitel Your Assistant Collaboration Module.
Harnessing The Internet s Multimedia Potential
Harnessing The Internet s Multimedia Potential by: S. Ann Earon, Ph.D. President, Telemanagement Resources International Inc. (TRI) Manahawkin, New Jersey The current state of the multimedia market is
Chapter 3. Internet Applications and Network Programming
Chapter 3 Internet Applications and Network Programming 1 Introduction The Internet offers users a rich diversity of services none of the services is part of the underlying communication infrastructure
Resource Utilization of Middleware Components in Embedded Systems
Resource Utilization of Middleware Components in Embedded Systems 3 Introduction System memory, CPU, and network resources are critical to the operation and performance of any software system. These system
Developing and Integrating Java Based SIP Client at Srce
Developing and Integrating Java Based SIP Client at Srce Davor Jovanovi and Danijel Matek University Computing Centre, Zagreb, Croatia [email protected], [email protected] Abstract. In order
Dell SonicWALL SRA 7.5 Secure Virtual Meeting and Secure Virtual Assist
Dell SonicWALL SRA 7.5 Secure Virtual Meeting and Secure Virtual Assist Document Scope This document describes how to configure and use the Dell SonicWALL SRA Secure Virtual Meeting feature and the Dell
Blackboard Collaborate Introduction & Handbook
CSU Stanislaus Office of Information Technology Blackboard Collaborate Introduction & Handbook What is Collaborate? Blackboard Collaborate is the university s online meeting and conferencing service. Users
ShoreTel 13 Conferencing User Guide. Part Number 850-1234-01
ShoreTel 13 Part Number 850-1234-01 Document and Software Copyrights Copyright 1998-2012 by ShoreTel Inc., Sunnyvale, California, USA. All rights reserved. Printed in the United States of America. Contents
Network Attached Storage. Jinfeng Yang Oct/19/2015
Network Attached Storage Jinfeng Yang Oct/19/2015 Outline Part A 1. What is the Network Attached Storage (NAS)? 2. What are the applications of NAS? 3. The benefits of NAS. 4. NAS s performance (Reliability
Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2)
Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2) Hyper-V Manager Hyper-V Server R1, R2 Intelligent Power Protector Main
Lab VI Capturing and monitoring the network traffic
Lab VI Capturing and monitoring the network traffic 1. Goals To gain general knowledge about the network analyzers and to understand their utility To learn how to use network traffic analyzer tools (Wireshark)
A Conference Control Protocol for Highly Interactive Video-conferencing
A Conference Control Protocol for Highly Interactive Video-conferencing Ruibiao Qiu Fred Kuhns Jerome R. Cox Applied Research Laboratory Department of Computer Science Washington University Saint Louis,
CMS Manual. Digital Video Network Surveillance System. Unisight Digital Technologies, Inc.
CMS Manual Digital Video Network Surveillance System Index Overview... 4 Datacenter...4 Run...4 Configuration...5 CMS Settings...9 Functions:...9 Components:...9 Device Manager...17 Functions:...17 Components:...17
Central Management Software CV3-M1024
Table of Contents Chapter 1. User Interface Overview...5 Chapter 2. Installation...6 2.1 Beginning Installation...6 2.2 Starting the CMS software...10 2.3 Starting it from the Start menu...10 2.4 Starting
A Service Platform for Subscription-Based Live Video Streaming
A Service Platform for Subscription-Based Live Video Streaming Kelum Vithana 1, Shantha Fernando 2, Dileeka Dias 3 1 Dialog - University of Moratuwa Mobile Communications Research Laboratory 2 Department
Computer System Management: Hosting Servers, Miscellaneous
Computer System Management: Hosting Servers, Miscellaneous Amarjeet Singh October 22, 2012 Partly adopted from Computer System Management Slides by Navpreet Singh Logistics Any doubts on project/hypo explanation
Unified Messaging and Fax
April 25, 2007 Telecom White Paper Presented By: Toshiba Telecommunications Systems Division www.telecom.toshiba.com Unified Messaging and Fax Toshiba s Stratagy Enterprise Server Overview: Unified Messaging
Unified Communication Platform. Product Page
Unified Communication Platform Product Page Web conferencing system with web, audio, video and collaboration for online education & enterprise service ITT Consult ltd BENEFITS TANTANAKU Distance learning
Foot Locker Web Conferencing Service Guide
Foot Locker Web Conferencing Service Guide For Assistance Call: 1-800-688-9137 Reservation Line: (800) 688-9137 1 WebEx Users Guide This guide provides tips and techniques that you can use to conduct effective
Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX
APPENDIX A Introduction Understanding TCP/IP To fully understand the architecture of Cisco Centri Firewall, you need to understand the TCP/IP architecture on which the Internet is based. This appendix
CISCO TELEPRESENCE MANAGEMENT SUITE EXTENSION
You can read the recommendations in the user guide, the technical guide or the installation guide for CISCO TELEPRESENCE MANAGEMENT SUITE EXTENSION 2.2. You'll find the answers to all your questions on
File Transfer And Access (FTP, TFTP, NFS) Chapter 25 By: Sang Oh Spencer Kam Atsuya Takagi
File Transfer And Access (FTP, TFTP, NFS) Chapter 25 By: Sang Oh Spencer Kam Atsuya Takagi History of FTP The first proposed file transfer mechanisms were developed for implementation on hosts at M.I.T.
FioranoMQ 9. High Availability Guide
FioranoMQ 9 High Availability Guide Copyright (c) 1999-2008, Fiorano Software Technologies Pvt. Ltd., Copyright (c) 2008-2009, Fiorano Software Pty. Ltd. All rights reserved. This software is the confidential
Web Conferencing Version 8.3 Troubleshooting Guide
System Requirements General Requirements Web Conferencing Version 8.3 Troubleshooting Guide Listed below are the minimum requirements for participants accessing the web conferencing service. Systems which
Using RAID Admin and Disk Utility
Using RAID Admin and Disk Utility Xserve RAID Includes instructions for creating RAID arrays and monitoring Xserve RAID systems K Apple Computer, Inc. 2003 Apple Computer, Inc. All rights reserved. Under
NetSupport Manager v11
Remote Support For Any Environment NetSupport Manager v11 NetSupport Manager has been helping organizations optimize the delivery of their IT support services since 1989 and while the use of Remote Control
CA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
IOCOM Whitepaper: Connecting to Third Party Organizations
IOCOM Whitepaper: Connecting to Third Party Organizations September 2008 IOCOM www.iocom.com 312-786-9169 Table of Contents 1. Executive Summary 2. Goals 3. Scenarios for Enterprise Connectivity over IOCOM
Blackboard Collaborate Classroom in Desire2Learn. Presenters
Blackboard Collaborate Classroom in Desire2Learn Presenters Copyright 2014 Information Technology Services Kennesaw State University This document may be downloaded, printed, or copied, for educational
TimePictra Release 10.0
DATA SHEET Release 100 Next Generation Synchronization System Key Features Web-based multi-tier software architecture Comprehensive FCAPS management functions Software options for advanced FCAPS features
A Web Services Framework for Collaboration and Audio/Videoconferencing
A Web Services Framework for Collaboration and Audio/Videoconferencing Geoffrey Fox, Wenjun Wu, Ahmet Uyar, Hasan Bulut Community Grid Computing Laboratory, Indiana University [email protected], [email protected],
Encryption and Decryption for Secure Communication
Encryption and Decryption for Secure Communication Charu Rohilla Rahul Kumar Yadav Sugandha Singh Research Scholar, M.TECH CSE Dept. Asst. Prof. IT Dept. Asso. Prof. CSE Dept. PDMCE, B.Garh PDMCE, B.Garh
Glossary of Terms and Acronyms for Videoconferencing
Glossary of Terms and Acronyms for Videoconferencing Compiled by Irene L. Ferro, CSA III Education Technology Services Conferencing Services Algorithm an algorithm is a specified, usually mathematical
Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0
Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...
COLLABORATORY. 1 Introduction
COLLABORATORY Łukasz Maciejewski, Wojciech Myszka Institute of Materials Science and Applied Mechanics Wrocław University of Technology ul. Smoluchowskiego 25, 50-370, Wrocław [email protected],
Machine Problem 3 (Option 1): Mobile Video Chat
Machine Problem 3 (Option 1): Mobile Video Chat CS414 Spring 2011: Multimedia Systems Instructor: Klara Nahrstedt Posted: Apr 4, 2011 Due: 11:59pm Apr 29, 2011 Introduction You may have heard that Apple
Cloud Surveillance. Cloud Surveillance NVMS. Network Video Management System. isecucloud. isecucloud
Cloud Surveillance Network Video Management System isecucloud isecucloud Network Video Management System Introduction In the digital era, the demand for remote monitoring has continued to increase. Users
Bridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability
Bridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability Overview... 3 Installing Bridgit Software... 4 Installing Bridgit Software Services... 4 Creating a Server Cluster... 4 Using
Getting Started Guide for the VSX Series
Getting Started Guide for the VSX Series July 2004 Edition 3725-21286-005/A GETTING STARTED GUIDE FOR THE VSX SERIES Trademark Information Polycom and the Polycom logo design are registered trademarks
TREK GETTING STARTED GUIDE
TREK GETTING STARTED GUIDE February 2015 Approved for Public Release; Distribution is Unlimited. TABLE OF CONTENTS PARAGRAPH PAGE 1 Welcome... 2 1.1 About TReK... 2 1.2 About this Guide... 2 1.3 Important
Cisco TelePresence VCR MSE 8220
Cisco TelePresence VCR MSE 8220 Getting started 61-0008-05 Contents General information... 3 About the Cisco TelePresence VCR MSE 8220... 3 Port and LED location... 3 LED behavior... 4 Installing the VCR
Cisco TelePresence VCR Converter 1.0(1.8)
Cisco TelePresence VCR Converter 1.0(1.8) Software release notes D14725.02 February 2011 Contents Contents Document revision history... 3 Introduction... 4 New features in version 1.0(1.8)... 5 Convert
WIDAM - WEB INTERACTION DISPLAY AND MONITORING
WIDAM - WEB INTERACTION DISPLAY AND MONITORING Hugo Gamboa and Vasco Ferreira Escola Superior de Tecnologia de Setúbal Campo do IPS, Estefanilha, 2914-508 Setúbal, Portugal Email: {hgamboa, vferreira}@est.ips.pt
The Security Framework 4.1 Programming and Design
Tel: (301) 587-3000 Fax: (301) 587-7877 E-mail: [email protected] Web: www.setecs.com Security Architecture for Development and Run Time Support of Secure Network Applications Sead Muftic, President/CEO
Getting Started with Microsoft Office Live Meeting. Published October 2007 Last Update: August 2009
Getting Started with Microsoft Office Live Meeting Published October 2007 Last Update: August 2009 Information in this document, including URL and other Internet Web site references, is subject to change
Network Licensing. White Paper 0-15Apr014ks(WP02_Network) Network Licensing with the CRYPTO-BOX. White Paper
WP2 Subject: with the CRYPTO-BOX Version: Smarx OS PPK 5.90 and higher 0-15Apr014ks(WP02_Network).odt Last Update: 28 April 2014 Target Operating Systems: Windows 8/7/Vista (32 & 64 bit), XP, Linux, OS
Getting Started with Microsoft Office Live Meeting. Published October 2007
Getting Started with Microsoft Office Live Meeting Published October 2007 Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless
Design Notes for an Efficient Password-Authenticated Key Exchange Implementation Using Human-Memorable Passwords
Design Notes for an Efficient Password-Authenticated Key Exchange Implementation Using Human-Memorable Passwords Author: Paul Seymer CMSC498a Contents 1 Background... 2 1.1 HTTP 1.0/1.1... 2 1.2 Password
Design and Implementation of Video Conference System Over the Hybrid Peer-to- Peer Networks
Design and Implementation of Conference System Over the Hybrid Peer-to- Peer Networks Hyen Ki Kim Department of Multimedia Engineering Andong National University 388 Songcheon-dong Andong city Kyungbuk
IP Multicast Backgrounder An IP Multicast Initiative White Paper
Stardust Technologies, Inc 1901 S. Bascom Ave, #333 Campbell, CA 95008 USA Tel: 408-879-8080 Fax: 408-879-8081 Web: www.ipmulticast.com IP Multicast Initiative (IPMI) IP Multicast Backgrounder An IP Multicast
Windows Server 2003 default services
Windows Server 2003 default services To view a description for a particular service, hover the mouse pointer over the service in the Name column. The descriptions included here are based on Microsoft documentation.
Study and installation of a VOIP service on ipaq in Linux environment
Study and installation of a VOIP service on ipaq in Linux environment Volkan Altuntas Chaba Ballo Olivier Dole Jean-Romain Gotteland ENSEIRB 2002 Summary 1. Introduction 2. Presentation a. ipaq s characteristics
Videoconferencing Operation Troubleshooting Procedures
Videoconferencing Operation Troubleshooting Procedures Starting the Vtel Unit: 1. Power up the computer (If you have a Compaq unit, the power switch is located on the front in the middle of the computer.
Building a Highly Available and Scalable Web Farm
Page 1 of 10 MSDN Home > MSDN Library > Deployment Rate this page: 10 users 4.9 out of 5 Building a Highly Available and Scalable Web Farm Duwamish Online Paul Johns and Aaron Ching Microsoft Developer
Goverlan Remote Control
Goverlan Remote Control Feature Overview Goverlan Remote Control Powerful IT remote control, made easy Support, control and manage multiple users anywhere securely and seamlessly. With its powerful broadscope
Monitoring Infrastructure (MIS) Software Architecture Document. Version 1.1
Monitoring Infrastructure (MIS) Software Architecture Document Version 1.1 Revision History Date Version Description Author 28-9-2004 1.0 Created Peter Fennema 8-10-2004 1.1 Processed review comments Peter
Remote Client Program... 3. Web Client... 39
Remote Client / Web Client USER MANUAL T Series Digital Video Recorder Remote Client Program... 3 Remote Client Program Installation... 4 Remote Client... 6 Main Window... 6 Site Registration... 7 Group
Unicenter Remote Control r11
Data Sheet Unicenter Remote Control r11 Unicenter Remote Control TM is a highly reliable and secure application for controlling and supporting remote Windows and Linux systems. It delivers all of the features
Dell UPS Local Node Manager USER'S GUIDE EXTENSION FOR MICROSOFT VIRTUAL ARCHITECTURES Dellups.com
CHAPTER: Introduction Microsoft virtual architecture: Hyper-V 6.0 Manager Hyper-V Server (R1 & R2) Hyper-V Manager Hyper-V Server R1, Dell UPS Local Node Manager R2 Main Operating System: 2008Enterprise
Network setup and troubleshooting
ACTi Knowledge Base Category: Troubleshooting Note Sub-category: Network Model: All Firmware: All Software: NVR Author: Jane.Chen Published: 2009/12/21 Reviewed: 2010/10/11 Network setup and troubleshooting
Mikogo Web Conferencing & Remote Support. User Guide (Windows Version)
Mikogo Web Conferencing & Remote Support User Guide (Windows Version) Table of Contents Register an Account... 3 Download the Software... 3 Start a Session... 4 Informing your Participants to Join the
Getting Started Guide. January 19, 2014
Getting Started Guide January 19, 2014 User Guide Chapters 1. Scheduling Meetings Configuring Meeting Details Advanced Options Invitation Email, received by the Participants Invitation Email, sent to the
Kaspersky Security Center 10 Getting Started
Kaspersky Security Center 10 Getting Started A P P L I C A T I O N V E R S I O N : 1 0 M A I N T E N A N C E R E L E A S E 1 Dear User, Thank you for choosing our product. We hope that this document will
During your session you will have access to the following lab configuration. CLIENT1 (Windows XP Workstation) 192.168.0.2 /24
Introduction The Network Vulnerabilities module provides you with the instruction and Server hardware to develop your hands on skills in the defined topics. This module includes the following exercises:
About This Guide SolarEdge Configuration Tool Software Guide. About This Guide
About This Guide 3 About This Guide This user guide is intended for Photovoltaic (PV) system owners, installers, technicians, maintainers, administrators and integrators who are authorized to configure
Cisco Unified Videoconferencing Manager Version 5.5
Cisco Unified Videoconferencing Manager Version 5.5 A comprehensive management suite for Cisco Unified Videoconferencing solutions The Cisco Unified Videoconferencing product line an integral component
Guideline for setting up a functional VPN
Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the
LifeSize Networker Installation Guide
LifeSize Networker Installation Guide November 2008 Copyright Notice 2006-2008 LifeSize Communications Inc, and its licensors. All rights reserved. LifeSize Communications has made every effort to ensure
TENVIS Technology Co., Ltd. User Manual. For H.264 Cameras. Version 2.0.0
TENVIS Technology Co., Ltd User Manual For H.264 Cameras Version 2.0.0 Catalogue Basic Operation... 3 Hardware Installation... 3 Search Camera... 3 Get live video... 5 Camera Settings... 8 System... 8
Upgrading from a previous release of LifeSize Video Center to LifeSize UVC Video Center 2.0 is not supported in this release.
Release Notes LifeSize UVC Video Center Release: v2.0 Upgrades... 1 New Features... 1 Known Issues... 2 Product Limitations... 3 Interoperability... 5 Interoperability Limitations... 6 Contacting Technical
Virtual Private Networks
Virtual Private Networks ECE 4886 Internetwork Security Dr. Henry Owen Definition Virtual Private Network VPN! Virtual separation in protocol provides a virtual network using no new hardware! Private communication
