Improved Digital Media Delivery with Telestream HyperLaunch



Similar documents
Chapter 11. User Datagram Protocol (UDP)

Transport Layer Protocols

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Computer Networks. Chapter 5 Transport Protocols

ICOM : Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM

High Performance VPN Solutions Over Satellite Networks

Transport and Network Layer

Final for ECE374 05/06/13 Solution!!

Protocols. Packets. What's in an IP packet

[Prof. Rupesh G Vaishnav] Page 1

Ethernet. Ethernet. Network Devices

LESSON Networking Fundamentals. Understand TCP/IP

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

EXPLORER. TFT Filter CONFIGURATION

2. IP Networks, IP Hosts and IP Ports

Protocols and Architecture. Protocol Architecture.

Overview of Computer Networks

Network Simulation Traffic, Paths and Impairment

Bridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability

Access Control: Firewalls (1)

Chapter 12 Supporting Network Address Translation (NAT)

Per-Flow Queuing Allot's Approach to Bandwidth Management

Clearing the Way for VoIP

First Semester Examinations 2011/12 INTERNET PRINCIPLES

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Frequently Asked Questions

IP - The Internet Protocol

This sequence diagram was generated with EventStudio System Designer (

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation

GlobalSCAPE DMZ Gateway, v1. User Guide

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

Transport Layer. Chapter 3.4. Think about

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP

CSIS CSIS 3230 Spring Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture

Lecture 2-ter. 2. A communication example Managing a HTTP v1.0 connection. G.Bianchi, G.Neglia, V.Mancuso

Network Programming TDC 561

Lecture 28: Internet Protocols

TCP for Wireless Networks

Overview - Using ADAMS With a Firewall

Mobile Communications Chapter 9: Mobile Transport Layer

An Introduction to VoIP Protocols

Network Configuration Settings

Overview - Using ADAMS With a Firewall

Chapter 1: Introduction

UPPER LAYER SWITCHING

CPS221 Lecture: Layered Network Architecture

Requirements of Voice in an IP Internetwork

Comparing Mobile VPN Technologies WHITE PAPER

The Problem with TCP. Overcoming TCP s Drawbacks

The OSI and TCP/IP Models. Lesson 2

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

TCP Offload Engines. As network interconnect speeds advance to Gigabit. Introduction to

TCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme

Computer Networks/DV2 Lab

Review: Lecture 1 - Internet History

VPN over Satellite A comparison of approaches by Richard McKinney and Russell Lambert

Solving complex performance problems in TCP/IP and SNA environments.

Encapsulating Voice in IP Packets

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst

Names & Addresses. Names & Addresses. Hop-by-Hop Packet Forwarding. Longest-Prefix-Match Forwarding. Longest-Prefix-Match Forwarding

QoS (Quality of Service)

How To Write A Transport Layer Protocol For Wireless Networks

Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol

A comparison of TCP and SCTP performance using the HTTP protocol

BroadCloud PBX Customer Minimum Requirements

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

SwiftBroadband and IP data connections

Top-Down Network Design

Slide 1 Introduction cnds@napier 1 Lecture 6 (Network Layer)

VERITAS Cluster Server Traffic Director Option. Product Overview

Chapter 9. IP Secure

Three Key Design Considerations of IP Video Surveillance Systems

Per-Flow Queuing Allot s Approach to Bandwidth Management

BASIC ANALYSIS OF TCP/IP NETWORKS

How do I get to

IP address format: Dotted decimal notation:

From Centralization to Distribution: A Comparison of File Sharing Protocols

EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science

Objectives of Lecture. Network Architecture. Protocols. Contents

7.1. Remote Access Connection

Session Hijacking Exploiting TCP, UDP and HTTP Sessions

CITS1231 Web Technologies. Client, Server, the Internet, and the Web

ReadyNAS Remote White Paper. NETGEAR May 2010

RARP: Reverse Address Resolution Protocol

Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario

Mobile Computing/ Mobile Networks

Abstract. Introduction. Section I. What is Denial of Service Attack?

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

21.4 Network Address Translation (NAT) NAT concept

Configuring Channel Access. Jeff Hill

MOBILITY AND MOBILE NETWORK OPTIMIZATION

User Datagram Protocol - Wikipedia, the free encyclopedia

L-Series LAN Provisioning Best Practices for Local Area Network Deployment. Introduction. L-Series Network Provisioning

Solution of Exercise Sheet 5

Linux MPS Firewall Supplement

Nokia Siemens Networks. CPEi-lte User Manual

ETM System SIP Trunk Support Technical Discussion

Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)

Transcription:

WHITE PAPER Improved Digital Media Delivery with Telestream THE CHALLENGE Increasingly, Internet Protocol (IP) based networks are being used to deliver digital media. Applications include delivery of news to a broadcast station or approvals from a content creator to a client. The delivery of digital media over IP data networks has presented an ongoing challenge due the extremely large amounts of data involved and the strain that puts on the network. This paper examines the challenges of delivery over IP networks, and it discusses a technical solution from Telestream called. Like all Internet communication schemes, builds upon Internet Protocol. IP is a routing protocol. It defines the addressing scheme used within the Internet and routes data packets between network end points. IP is also a connectionless protocol. This means that it does not exchange control information between the end points before packets are transmitted. Because IP provides no error detection or recovery mechanisms, it is often referred to as an unreliable protocol. IP relies on a transport layer protocol, such as Transmission Control Protocol (TCP), to establish a connection between the end points and provide a reliable data stream. Once a reliable connection has been established, application layer protocols such as File Transfer Protocol (FTP) and HyperText Transfer Protocol (HTTP) allow the end points to participate in a session. TELESTREAM SOLUTION FOR OPTIMIZED DELIVERY Telestream (patent pending) performs several important functions to optimize delivery of digital media files via the Internet: Automatically resumes transfers interrupted by network interrupts or failures Automatically resumes interrupted transfers even if the sender changes locations critical for delivery in portable applications Minimizes the effects of packet loss to enhance throughput over lossy connections such as wireless Handles complex content such as the media essence file and one or more related metadata files also includes encryption capability for users who require secure delivery of their content. In addition, for facilities which may be receiving multiple deliveries simultaneously, comes with a management console which allows an administrator to prioritize one or more transfers over others. WHITE PAPER: Improved Digital Media Delivery with Telestream Page 1 of 5

Reliability Telestream combines both transport and application layers within a single protocol. creates a reliable connection between the end points and establishes a session which is shared by the communicating applications. Throughput Optimization A reliable protocol must detect and recover from the loss, duplication or incorrect sequencing of data packets. Packet loss is typically caused by congestion in the devices that route data packets through the network. Packet loss may be ambient, meaning that it is caused by other traffic present in the routers, or it may be induced by the traffic being exchanged between the communicating end points. In either case, packet loss degrades the rate at which information is exchanged between the end points. An efficient protocol must implement a mechanism for avoiding congestion while maximizing the data transfer rate. While TCP is a reliable transport protocol, it is not necessarily an efficient one. As packet loss increases, the congestion avoidance mechanism causes the transfer rate to decrease geometrically. While this is generally not an issue for small amounts of data, it can have a significant impact on the time required to transport large media content. In contrast, Telestream implements a flow control mechanism that avoids congestion and degrades linearly in the presence of ambient packet loss. This ensures that content is transferred at the maximum rate possible for a given network connection. For example, with traditional TCP/IP a 3% packet loss might result in a 20% drop in throughput, whereas with the throughput would be close to 97% of the potential data rate. Connection Tolerance Connection oriented protocols such as TCP are designed to tolerate a relatively small percentage of packet loss. They are not tolerant of a complete loss of network connectivity. If the physical network is disrupted, the connection between the end points is irrevocably severed, and any application protocol using that data stream will eventually fail. Network disruptions can be caused by simply disconnecting an end point from the network or by a failure in some portion of the network infrastructure. Wireless networks are particularly prone to disruption due to RF interference and line of sight obstructions. Telestream technology is tolerant of network disruptions. Once a session is established, it is independent of the connection currently used to transport data between the end points. Therefore, if a media delivery session is interrupted by a loss of connection, will attempt to resume the delivery. And, if the connection stays down for some time, an operator can resume the delivery manually when the network connection is re-established. Network Portability Following a network disruption it is possible that an end point will reconnect to the network at an entirely different IP address. This might be caused by a DHCP server assigning a new address to the end point or because the end point physically moved to a different network. For instance, a mobile journalist may run out of time to complete delivery of a large file and want to resume transmission from a hotel room or bureau. WHITE PAPER: Improved Digital Media Delivery with Telestream Page 2 of 5

After a session has been established, Telestream allows either end point to move to a different network address. A beacon mechanism allows the end points to find each other following a network disruption, re-establish a reliable connection and continue the existing session. For the user, this means that will automatically resume the disrupted transfer session from the point where it disconnected, and/or that the user can choose to stop the transfer, move to a new location, and will automatically resume the existing transfer session from the point it left off. Content Complexity The primary purpose of Telestream technology is to reliably and efficiently transport large, complex content between two network end points. In this context, complex means that the content is comprised of more than one aspect. For example, a file transported using FTP has two aspects: the file name and the file data. Telestream extends this concept by allowing the content to be transported as multiple and separable aspects. An aspect might be used to transport the content essence or the metadata that describes the essence. Aspects may also be used to transport multiple related items, for example, the files contained within a folder. Secure Data is normally transported in the clear across the network, meaning that no security measures take place. Because content security is an issue for some users, Telestream provides an encryption capability which users can choose to turn on or off. If users choose to use encryption, some secure administrative set-up tasks need to be performed at both the send and receive end points prior to transmission. Once turned on content encryption occurs automatically at both ends. Data security is only as good as the encryption key that is used. Telestream uses triple DES, the government data encryption standard, to ensure maximum content security. Transfer Management For facilities with limited Internet connection bandwidth, the speed of delivery from remote senders can be compromised, particularly if multiple senders are submitting large files simultaneously. For instance, news organizations may have multiple journalists sending content at the same time as the deadline for the evening news approaches. comes with a transfer management utility which enables an administrator to pause one or more transfers, so that a higher priority story may be delivered more quickly. IMPLEMENTING HYPERLAUNCH Telestream employs the User Datagram Protocol (UDP) as its basic transport service. UDP is a connectionless, unreliable protocol; the only services it provides above IP are checksum protection of the datagram and multiplexing by port number (similar to TCP). Each packet is transported within a UDP datagram which is in turn transported within an IP packet. A packet consists of a 16-byte header followed by a variable length array of data bytes. WHITE PAPER: Improved Digital Media Delivery with Telestream Page 3 of 5

The diagram below illustrates a (PMP) session, conducted between a client and server application. Application Application Client Server Accept Socket Traffic Content Socket Reject Packet Exchange Packets are exchanged between the client and server as follows: 1. The client application initially creates the new session. The client assigns a unique identifier to the session which is used for all packets exchanged between the end points. 2. The client sends an accept message containing the credentials, if any, required by the server. The accept message is sent periodically until a response is received from the server or the client application closes the session. 3. If, for any reason (unsupported authentication scheme, invalid credentials, etc.), the server application is unwilling to accept the session, the server responds with a reject message describing the reason. The client terminates the session and informs the application accordingly. 4. If the session is accepted the server responds with traffic packet requesting the first content sequence (0). The server informs the application that it may begin reading the content stream. The traffic packet is sent periodically until a response is received from the client. 5. The client receives the initial traffic request and informs the application that it may begin writing to the content stream. When sufficient data is available from the application, the client sends the initial content sequence. 6. The client and server continue to exchange traffic and content sequence packets subject to the flow control mechanism. WHITE PAPER: Improved Digital Media Delivery with Telestream Page 4 of 5

7. If the network is disrupted the server continues to request the incomplete content sequences. The client, now unable to respond with content sequences, begins sending beacon messages to the server. 8. When the network is restored, the server examines the received beacon message. If the client location (IP address or port number) has changed, the server begins sending the traffic requests to the new location. Similarly, the client can examine the traffic packets to determine if the location of the server has changed. 9. When the client application has finished writing a particular aspect to the content stream, the client sends the end-of-aspect content sequence to the server. 10. When the client application has finished writing all data to the content stream it closes the session. The client sends the end-of-content sequence to the server and then waits for that sequence to be acknowledged. 11. The server continues to send traffic packets until all content sequences (including the end-of-content sequence) have been received and consumed by the application. 12. When the client has confirmation that all content sequences have been received, it sends a reject message in response to any further traffic for the session indicating that the session has been closed. SESSION LIFETIME Once a session has been established, it exists until one of the following conditions occurs: The content has been transferred successfully and the client closes the session. An unrecoverable error occurs within the client or server and that end point closes the session. The session expires due to inactivity (the inactivity timer is a user-defined parameter that defaults to 24 hours). SUMMARY encompasses a number of technologies and techniques to enhance the speed, reliability and security of delivering inherently complex media files over IP networks. The benefits extend to not only mobile laptop users, but any content creator looking for simple tools to improve media delivery. Copyright 2005 Telestream, Inc. Telestream is a registered trademark and Telestream MAP, Launch, MAPreview, MAPx and are trademarks of Telestream, Inc. All other trademarks are the property of their respective owners. March 2005 848 Gold Flat Road 877 257 6245 toll free (US only) Nevada City, CA 95959 1 530 470 1300 tel USA 1 530 470 1301 fax www.telestream.net info@telestream.net WHITE PAPER: Improved Digital Media Delivery with Telestream Page 5 of 5