This document summarizes information about the Stream Control Transmission Protocol (SCTP), Real-time Transport Protocol (RTP), and RTP Control Protocol (RTCP). SCTP is a transport layer protocol that provides reliable message delivery like TCP with multi-streaming capabilities. RTP is used for delivering audio and video over IP and defines packet formats with timestamps and sequence numbers. RTCP monitors RTP transmission quality and provides feedback on metrics like packet loss.
IP resides at the network layer of the OSI model and provides logical addressing that allows systems on different logical networks to communicate. IP packets contain source and destination addresses as well as other fields. Transport protocols like UDP and TCP run on top of IP, with UDP being connectionless and used for real-time voice traffic in VoIP due to its simplicity and lower latency compared to TCP, which provides reliability but higher latency through mechanisms like acknowledgments and retransmissions. RTP runs on top of UDP to provide additional timestamping and sequencing information important for applications like voice calling.
IP resides at the network layer and provides logical addressing that allows systems on different logical networks to communicate. It is a connectionless protocol that does not provide reliability, flow control, or sequencing. VoIP uses RTP, which sits atop UDP, to transport real-time voice data in an efficient manner without retransmissions. UDP is used instead of TCP for VoIP as reliability is less important than latency for real-time voice communications.
This document summarizes several internet protocols including IP, TCP, UDP, and ICMP. It describes key aspects of each protocol such as their purpose, packet structure, error handling mechanisms, and how they interact to enable communication over the internet. IP is a connectionless protocol that forwards packets based on destination addresses. TCP and UDP are transport layer protocols, with TCP providing reliable connections and UDP being connectionless. ICMP provides error reporting and control for IP. Port numbers and sockets are used to direct communication to specific applications.
1) TCP provides reliable data transmission over unreliable networks like the Internet by establishing connections between endpoints, sequencing packets, detecting and retransmitting lost packets.
2) TCP connections are established through a 3-way handshake process where both sides negotiate sequence numbers to synchronize packet transmission.
3) TCP connections can be closed through a 4-step process where each side sends a FIN packet to gracefully close the connection in both directions.
This document summarizes key concepts from Chapter 3 of the textbook on transport layer protocols:
1. The transport layer provides logical communication between processes running on different hosts, abstracting the underlying network infrastructure. It multiplexes data from multiple sockets and demultiplexes received data to the appropriate socket.
2. UDP and TCP are the main transport protocols in the Internet. UDP is connectionless while TCP provides reliable, connection-oriented data transfer using sequence numbers, acknowledgments, and congestion control.
3. TCP uses congestion control including a congestion window, additive increase/multiplicative decrease, and slow start to dynamically control the sender's transmission rate based on detected packet loss as a signal of
The document discusses transport layer protocols and services including:
- TCP provides reliable, in-order delivery through congestion control, flow control, and connection setup. UDP provides unreliable, unordered delivery with no connection.
- Transport protocols multiplex and demultiplex data between applications using port numbers. TCP uses a 4-tuple of IP addresses and port numbers to identify each connection.
- UDP is useful for streaming multimedia since it is loss tolerant but rate sensitive, while TCP provides reliability through congestion control and retransmissions.
This document discusses transport layer protocols, specifically UDP and TCP. It provides an overview of each protocol, including key properties and operations. UDP allows applications to communicate via multiplexing but does not ensure delivery. TCP establishes reliable, in-order connections and implements flow and congestion control to ensure reliable data transfer. The document outlines TCP connection establishment, data transfer methods, congestion control algorithms, and retransmission timeout estimation.
The transport layer accepts data from the session layer, breaks it into packets, and delivers the packets to the network layer. It provides end-to-end communication and ensures reliable delivery of data. The network interface layer sends and receives TCP/IP packets on the network medium. It encompasses the data link and physical layers of the OSI model. TCP/IP is independent of the specific network technology.
A COMPARISON OF CONGESTION CONTROL VARIANTS OF TCP IN REACTIVE ROUTING PROTOC...ijcsit
A widely used TCP protocol is originally developed for wired networks. It has many variants to detect and
control congestion in the network. However, Congestion control in all TCP variants does not show similar
performance in MANET as in wired network because of the fault detection of congestion. In this paper, we
do a performance comparison between TCP variants NEW RENO, SACK and Vegas in AODV and DSR
reactive (On-Demand) routing protocols. Network traffic between nodes is provided by using File Transfer
Protocol (FTP) application. Multiple scenarios are created and the average values of each performance
parameter are used to evaluate the performance. The results show that TCP variants perform better in
terms of throughput and Packet drop with DSR routing protocol compared with AODV routing protocol.
TCP variants show a lower Jitter in AODV compared with DSR.
The document discusses key aspects of communication systems including characteristics, examples, transmitting and receiving processes, and issues. It covers characteristics such as protocols, handshaking, and transmission speed. Examples provided include email, voice mail, and the internet. The document also discusses transmitting serially and in parallel, as well as synchronous and asynchronous transmission. Finally, it outlines issues relating to messaging systems, internet trading, and internet banking.
RTP provides end-to-end delivery services for real-time audio and video traffic over UDP. It includes payload identification, sequence numbering, timestamping and delivery monitoring. RTP runs on top of UDP and is designed to support multimedia conferences using IP multicast. RTCP monitors quality of service and conveys information about participants. Profiles and payload formats can customize RTP to support specific applications.
Abstract - The Transmission Control Protocol (TCP) is
connection oriented, reliable and end-to-end protocol that support
flow and congestion control, with the evolution and rapid growth
of the internet and emergence of internet of things IoT, flow and
congestion have clear impact in the network performance. In this
paper we study congestion control mechanisms Tahoe, Reno,
Newreno, SACK and Vegas, which are introduced to control
network utilization and increase throughput, in the performance
evaluation we evaluate the performance metrics such as
throughput, packets loss, delivery and reveals impact of the cwnd.
Showing that SACK had done better performance in terms of
numbers of packets sent, throughput and delivery ratio than
Newreno, Vegas shows the best performance of all of them.
The document summarizes key topics related to transport layer protocols:
- It describes the services provided by the transport layer, including addressing, connection establishment and release, flow control, and multiplexing.
- It provides details on common transport protocols like TCP and UDP, including their packet headers, connection management, congestion control, and performance issues at high speeds.
- It also presents an example transport protocol and uses finite state machines to model its operation and connection management.
This document provides an overview of transport layer protocols TCP, UDP, and SCTP. It discusses the history and evolution of TCP, including key developments like congestion control algorithms. UDP is described as a connectionless and unreliable protocol. SCTP is introduced as a protocol developed to transport telephony signaling over IP networks. It addresses limitations of TCP like head-of-line blocking and provides features like multi-homing and message orientation. The document defines SCTP terminology and describes its chunks, states, congestion control approach, and similarities to TCP. In summary, it serves as a high-level introduction to transport protocols with a focus on motivations and capabilities of SCTP.
Abstract
The rapid growth in the Internet of Things (IoTs)
has change our life to be more intelligent and smart,
the development in the Wireless Sensors Networks
(WSNs), besides the wide use of the embedded devices
in different area like industry, home automation,
transport, agriculture and health care, which was led
the Routing Over Low-power and Lossy-network
(ROLL) working group to introduce the IPv6 Routing
Protocol for Low-Power and Lossy Networks (RPL),
therein the RPL nodes have organized topology as a
Directed Acyclic Graph (DAG) and terminated at one
root to form the Destination Oriented DAGs
(DODAGs). In this paper by using InstantContiki3.0
and CoojaGUI we analyze the DODAG formations,
the RPL control messages that are send downward
and upward routes to construct and maintain
DODAG and the Rank computation by Objective
Function (OF) for inconsistency and loop detection,
also we evaluate the performance of the RPL based
on the Expected Transmission Count (ETX) OF that
enable RPL to select and optimize routes within RPL
instance, as well as we evaluate the following metrics:
The ETX Reliability Object (ETX), Radio Duty Cycle
(RDC), energy consumption, the received packets by
the motes and neighbor count. The simulation results
show that the RPL control messages flow in consistent
manner, the DODAG root able to connect to all of the
neighbor motes, also Rank illustration shows no loops
and DODAG topology consistent, as well as the ETX
can essentially take control over DODAG formations
and it has an effects in the RDC ratio, furthermore
most of the motes show reasonable low power
consumption, also the motes show acceptable number
of the received packets.
This document discusses various topics related to computer networking including routing, addressing schemes, congestion control, remote procedure calls, simple mail transfer protocol, static routing algorithms, IPv4 addressing, and session layer design issues. It provides definitions and explanations of static and dynamic routing, differentiates between IPv4 and IPv6 addressing, describes congestion and congestion control, discusses the importance and workings of remote procedure calls, provides a detailed explanation of SMTP, explains two static routing algorithms (Dijkstra's algorithm and flooding algorithm), discusses IPv4 addressing schemes, describes congestion avoidance in the transport layer, and discusses design issues of the session layer such as dialog control.
Abstract— Internet of things (IoT) is a new networks paradigm,
that billions of internet things can be connected at anytime and
anyplace, and it’s expected to include billions of smart devices,
these devices characterized by small memory, low transfer rate
and low energy, internet protocol version 6 (IPv6) it was
introduced to offer huge address space, however it doesn’t
compatible with capabilities of the constrained device, therefore
IPv6 over low power Wireless Personal Area network
(6LoWPAN) adaptation layer was introduced to carry IPv6
datagram over constrained links, in this paper, we first provide
intensive analysis of 6LoWPAN specifications that includes IPv6
encapsulation, frame format, 6LoWPAN header compression,
fragmentation of the payload datagram and encoding of user
datagram protocol UDP, in addition to the implementation of the
6LoWPAN in the NS-3 using different payload size, then we
evaluate the following metrics throughput, packets loss, delay
and jitter, the results showed that the fragmentation effects the
network throughput and increase the delay and the number of
lost packets, moreover, when payload fit within a single frame the
network show better performance , there are no packets lost as
well as minimum values of the delay and the jitter, and in the
two cases 6LoWPAN shows reasonable packets delivery ratio.
This document contains answers to 35 questions related to computer networking concepts. Some key points addressed include:
- 10Base2, 10Base5, and 10BaseT are Ethernet LAN types defined by their maximum transfer rate and cabling used.
- An unspecified passive open has a server waiting for any client connection, while a fully specified passive open waits for a specific client.
- A TCB (Transmission Control Block) contains information about each network connection.
- SNMP (Simple Network Management Protocol) uses MIBs (Management Information Bases) to store device status, performance, and configuration data.
- Anonymous FTP allows users access files without a login for large public access.
UDP is a connectionless transport layer protocol that runs over IP. It provides an unreliable best-effort service where packets may be lost, delivered out of order, or duplicated. UDP has a small 8-byte header and is lightweight, with no connection establishment or guarantee of delivery. This makes it fast and low overhead, suitable for real-time applications like streaming media where resending lost packets would cause delay.
Introduction to SCTP and it's benefits over TCP and UDPVIJAY SHARMA
SCTP is a transport layer protocol that provides benefits over TCP and UDP for transmitting signaling messages over IP networks. It allows for multi-homing where a connection can be established over multiple network interfaces, multi-streaming to send multiple streams of data over a single connection, and preserves message boundaries during transmission. SCTP also protects against SYN flooding attacks, uses selective acknowledgements to selectively retransmit only missing parts of data, and supports both ordered and unordered delivery of messages.
This document discusses the use and copyright of slides from the textbook "Computer Networking: A Top Down Approach" by Jim Kurose and Keith Ross. It states that the slides are being made freely available for educational use provided that the source is cited and the copyright is acknowledged if posted online. The document asks users to mention the source of the slides if used in a class and to note the authors' copyright if posted on a website.
The Real-time Transport Protocol (RTP) provides end-to-end delivery services for real-time data like audio and video. It identifies payload types, numbers sequences, timestamps packets, and monitors delivery. RTP is designed to be lightweight, flexible, scalable, and works with various transport protocols like UDP. It is used with the RTP Control Protocol (RTCP) for quality of service feedback.
Transport Layer Services : Multiplexing And DemultiplexingKeyur Vadodariya
This document discusses the transport layer of computer networks. It begins with introducing the group members and topic, which is the transport layer introduction, services, multiplexing and demultiplexing. Then it provides definitions of the transport layer, its functions and services. It describes how the transport layer provides process to process delivery, end-to-end connections, congestion control, data integrity, flow control, multiplexing and demultiplexing. It explains the differences between connectionless and connection-oriented multiplexing and demultiplexing. In the end, it lists some references.
RTP provides real-time transport of data such as audio and video by identifying payload types, sequencing packets, and including timestamps. It uses UDP and is augmented by RTCP to monitor delivery over multicast networks. RTP supports applications like audio/video conferencing by encoding and transmitting media in packets with RTP headers for reconstruction at receivers.
The document discusses the Real-Time Transport Protocol (RTP) which provides end-to-end delivery services for delivering audio and video over IP networks. RTP is used with the RTCP to monitor transmission quality. RTP allows synchronization of multiple streams through timestamping and sequencing of packets. It uses UDP for multiplexing and includes fields for payload type, sequence number, timestamp and SSRC for stream identification. Mixers and translators are used to combine or modify RTP streams while maintaining synchronization between sources.
This document describes the development of several tools for covert communication via network protocol modification. It begins with Timeshifter, which modifies the timing of ICMP packets at the network layer. Stegnet was then created to modify ICMP packet contents at the network layer. BitStegNet was finally developed to modify μTP packet headers within BitTorrent traffic at the transport layer, providing covert communication at a higher protocol level. The document outlines the implementation of each tool on virtual and physical test networks to successfully transmit hidden messages via timing or content modifications of network packets.
Location Gathering: An Evaluation of Smartphone-Based Geographic Mobile Field...Greenapps&web
Mobile field spatial data collection is the act of gathering attribute data, including spatial position, about features in a study area. A common method of field data collection is to use a handheld computing device attached to a global navigation satellite system in which attribute data are directly inputted into a database table. The market for mobile data collection systems was formerly dominated by bulky positioning systems and highly specialized software. However, recent years have seen the emergence and widespread adoption of highly customizable and user-friendly mobile smartphones and tablets. In this research, smartphone devices and smartphone data collection applications were tested and compared to a conventional survey-grade field data collection system to compare the capabilities and possible use cases of each. The test consisted of an evaluation of the accuracy and precision of several mobile devices, followed by a usability analysis of several contemporary data collection applications for the Android operating system. The results of the experiment showed that mobile devices and applications are still less powerful than dedicated conventional data collection systems. However, the performance gap is shrinking over time. The use cases for mobile devices as data collection systems are currently limited to general use and small to mid-size projects, but future development promises expanding capability.
This 2-hour class is dedicated to Facebook – what is it, how it works and how to use it.
With lots of information and practical tips and tricks, this workshop will give you the knowledge and tools to start utilising the world’s most popular social media platform better for your organisation.
A COMPARISON OF CONGESTION CONTROL VARIANTS OF TCP IN REACTIVE ROUTING PROTOC...ijcsit
A widely used TCP protocol is originally developed for wired networks. It has many variants to detect and
control congestion in the network. However, Congestion control in all TCP variants does not show similar
performance in MANET as in wired network because of the fault detection of congestion. In this paper, we
do a performance comparison between TCP variants NEW RENO, SACK and Vegas in AODV and DSR
reactive (On-Demand) routing protocols. Network traffic between nodes is provided by using File Transfer
Protocol (FTP) application. Multiple scenarios are created and the average values of each performance
parameter are used to evaluate the performance. The results show that TCP variants perform better in
terms of throughput and Packet drop with DSR routing protocol compared with AODV routing protocol.
TCP variants show a lower Jitter in AODV compared with DSR.
The document discusses key aspects of communication systems including characteristics, examples, transmitting and receiving processes, and issues. It covers characteristics such as protocols, handshaking, and transmission speed. Examples provided include email, voice mail, and the internet. The document also discusses transmitting serially and in parallel, as well as synchronous and asynchronous transmission. Finally, it outlines issues relating to messaging systems, internet trading, and internet banking.
RTP provides end-to-end delivery services for real-time audio and video traffic over UDP. It includes payload identification, sequence numbering, timestamping and delivery monitoring. RTP runs on top of UDP and is designed to support multimedia conferences using IP multicast. RTCP monitors quality of service and conveys information about participants. Profiles and payload formats can customize RTP to support specific applications.
Abstract - The Transmission Control Protocol (TCP) is
connection oriented, reliable and end-to-end protocol that support
flow and congestion control, with the evolution and rapid growth
of the internet and emergence of internet of things IoT, flow and
congestion have clear impact in the network performance. In this
paper we study congestion control mechanisms Tahoe, Reno,
Newreno, SACK and Vegas, which are introduced to control
network utilization and increase throughput, in the performance
evaluation we evaluate the performance metrics such as
throughput, packets loss, delivery and reveals impact of the cwnd.
Showing that SACK had done better performance in terms of
numbers of packets sent, throughput and delivery ratio than
Newreno, Vegas shows the best performance of all of them.
The document summarizes key topics related to transport layer protocols:
- It describes the services provided by the transport layer, including addressing, connection establishment and release, flow control, and multiplexing.
- It provides details on common transport protocols like TCP and UDP, including their packet headers, connection management, congestion control, and performance issues at high speeds.
- It also presents an example transport protocol and uses finite state machines to model its operation and connection management.
This document provides an overview of transport layer protocols TCP, UDP, and SCTP. It discusses the history and evolution of TCP, including key developments like congestion control algorithms. UDP is described as a connectionless and unreliable protocol. SCTP is introduced as a protocol developed to transport telephony signaling over IP networks. It addresses limitations of TCP like head-of-line blocking and provides features like multi-homing and message orientation. The document defines SCTP terminology and describes its chunks, states, congestion control approach, and similarities to TCP. In summary, it serves as a high-level introduction to transport protocols with a focus on motivations and capabilities of SCTP.
Abstract
The rapid growth in the Internet of Things (IoTs)
has change our life to be more intelligent and smart,
the development in the Wireless Sensors Networks
(WSNs), besides the wide use of the embedded devices
in different area like industry, home automation,
transport, agriculture and health care, which was led
the Routing Over Low-power and Lossy-network
(ROLL) working group to introduce the IPv6 Routing
Protocol for Low-Power and Lossy Networks (RPL),
therein the RPL nodes have organized topology as a
Directed Acyclic Graph (DAG) and terminated at one
root to form the Destination Oriented DAGs
(DODAGs). In this paper by using InstantContiki3.0
and CoojaGUI we analyze the DODAG formations,
the RPL control messages that are send downward
and upward routes to construct and maintain
DODAG and the Rank computation by Objective
Function (OF) for inconsistency and loop detection,
also we evaluate the performance of the RPL based
on the Expected Transmission Count (ETX) OF that
enable RPL to select and optimize routes within RPL
instance, as well as we evaluate the following metrics:
The ETX Reliability Object (ETX), Radio Duty Cycle
(RDC), energy consumption, the received packets by
the motes and neighbor count. The simulation results
show that the RPL control messages flow in consistent
manner, the DODAG root able to connect to all of the
neighbor motes, also Rank illustration shows no loops
and DODAG topology consistent, as well as the ETX
can essentially take control over DODAG formations
and it has an effects in the RDC ratio, furthermore
most of the motes show reasonable low power
consumption, also the motes show acceptable number
of the received packets.
This document discusses various topics related to computer networking including routing, addressing schemes, congestion control, remote procedure calls, simple mail transfer protocol, static routing algorithms, IPv4 addressing, and session layer design issues. It provides definitions and explanations of static and dynamic routing, differentiates between IPv4 and IPv6 addressing, describes congestion and congestion control, discusses the importance and workings of remote procedure calls, provides a detailed explanation of SMTP, explains two static routing algorithms (Dijkstra's algorithm and flooding algorithm), discusses IPv4 addressing schemes, describes congestion avoidance in the transport layer, and discusses design issues of the session layer such as dialog control.
Abstract— Internet of things (IoT) is a new networks paradigm,
that billions of internet things can be connected at anytime and
anyplace, and it’s expected to include billions of smart devices,
these devices characterized by small memory, low transfer rate
and low energy, internet protocol version 6 (IPv6) it was
introduced to offer huge address space, however it doesn’t
compatible with capabilities of the constrained device, therefore
IPv6 over low power Wireless Personal Area network
(6LoWPAN) adaptation layer was introduced to carry IPv6
datagram over constrained links, in this paper, we first provide
intensive analysis of 6LoWPAN specifications that includes IPv6
encapsulation, frame format, 6LoWPAN header compression,
fragmentation of the payload datagram and encoding of user
datagram protocol UDP, in addition to the implementation of the
6LoWPAN in the NS-3 using different payload size, then we
evaluate the following metrics throughput, packets loss, delay
and jitter, the results showed that the fragmentation effects the
network throughput and increase the delay and the number of
lost packets, moreover, when payload fit within a single frame the
network show better performance , there are no packets lost as
well as minimum values of the delay and the jitter, and in the
two cases 6LoWPAN shows reasonable packets delivery ratio.
This document contains answers to 35 questions related to computer networking concepts. Some key points addressed include:
- 10Base2, 10Base5, and 10BaseT are Ethernet LAN types defined by their maximum transfer rate and cabling used.
- An unspecified passive open has a server waiting for any client connection, while a fully specified passive open waits for a specific client.
- A TCB (Transmission Control Block) contains information about each network connection.
- SNMP (Simple Network Management Protocol) uses MIBs (Management Information Bases) to store device status, performance, and configuration data.
- Anonymous FTP allows users access files without a login for large public access.
UDP is a connectionless transport layer protocol that runs over IP. It provides an unreliable best-effort service where packets may be lost, delivered out of order, or duplicated. UDP has a small 8-byte header and is lightweight, with no connection establishment or guarantee of delivery. This makes it fast and low overhead, suitable for real-time applications like streaming media where resending lost packets would cause delay.
Introduction to SCTP and it's benefits over TCP and UDPVIJAY SHARMA
SCTP is a transport layer protocol that provides benefits over TCP and UDP for transmitting signaling messages over IP networks. It allows for multi-homing where a connection can be established over multiple network interfaces, multi-streaming to send multiple streams of data over a single connection, and preserves message boundaries during transmission. SCTP also protects against SYN flooding attacks, uses selective acknowledgements to selectively retransmit only missing parts of data, and supports both ordered and unordered delivery of messages.
This document discusses the use and copyright of slides from the textbook "Computer Networking: A Top Down Approach" by Jim Kurose and Keith Ross. It states that the slides are being made freely available for educational use provided that the source is cited and the copyright is acknowledged if posted online. The document asks users to mention the source of the slides if used in a class and to note the authors' copyright if posted on a website.
The Real-time Transport Protocol (RTP) provides end-to-end delivery services for real-time data like audio and video. It identifies payload types, numbers sequences, timestamps packets, and monitors delivery. RTP is designed to be lightweight, flexible, scalable, and works with various transport protocols like UDP. It is used with the RTP Control Protocol (RTCP) for quality of service feedback.
Transport Layer Services : Multiplexing And DemultiplexingKeyur Vadodariya
This document discusses the transport layer of computer networks. It begins with introducing the group members and topic, which is the transport layer introduction, services, multiplexing and demultiplexing. Then it provides definitions of the transport layer, its functions and services. It describes how the transport layer provides process to process delivery, end-to-end connections, congestion control, data integrity, flow control, multiplexing and demultiplexing. It explains the differences between connectionless and connection-oriented multiplexing and demultiplexing. In the end, it lists some references.
RTP provides real-time transport of data such as audio and video by identifying payload types, sequencing packets, and including timestamps. It uses UDP and is augmented by RTCP to monitor delivery over multicast networks. RTP supports applications like audio/video conferencing by encoding and transmitting media in packets with RTP headers for reconstruction at receivers.
The document discusses the Real-Time Transport Protocol (RTP) which provides end-to-end delivery services for delivering audio and video over IP networks. RTP is used with the RTCP to monitor transmission quality. RTP allows synchronization of multiple streams through timestamping and sequencing of packets. It uses UDP for multiplexing and includes fields for payload type, sequence number, timestamp and SSRC for stream identification. Mixers and translators are used to combine or modify RTP streams while maintaining synchronization between sources.
This document describes the development of several tools for covert communication via network protocol modification. It begins with Timeshifter, which modifies the timing of ICMP packets at the network layer. Stegnet was then created to modify ICMP packet contents at the network layer. BitStegNet was finally developed to modify μTP packet headers within BitTorrent traffic at the transport layer, providing covert communication at a higher protocol level. The document outlines the implementation of each tool on virtual and physical test networks to successfully transmit hidden messages via timing or content modifications of network packets.
Location Gathering: An Evaluation of Smartphone-Based Geographic Mobile Field...Greenapps&web
Mobile field spatial data collection is the act of gathering attribute data, including spatial position, about features in a study area. A common method of field data collection is to use a handheld computing device attached to a global navigation satellite system in which attribute data are directly inputted into a database table. The market for mobile data collection systems was formerly dominated by bulky positioning systems and highly specialized software. However, recent years have seen the emergence and widespread adoption of highly customizable and user-friendly mobile smartphones and tablets. In this research, smartphone devices and smartphone data collection applications were tested and compared to a conventional survey-grade field data collection system to compare the capabilities and possible use cases of each. The test consisted of an evaluation of the accuracy and precision of several mobile devices, followed by a usability analysis of several contemporary data collection applications for the Android operating system. The results of the experiment showed that mobile devices and applications are still less powerful than dedicated conventional data collection systems. However, the performance gap is shrinking over time. The use cases for mobile devices as data collection systems are currently limited to general use and small to mid-size projects, but future development promises expanding capability.
This 2-hour class is dedicated to Facebook – what is it, how it works and how to use it.
With lots of information and practical tips and tricks, this workshop will give you the knowledge and tools to start utilising the world’s most popular social media platform better for your organisation.
City staff is presenting an amendment to the Tree Preservation regulations to clarify that the $2,000 per tree fee cap for properties paying a fee in lieu of onsite mitigation only applies to existing or proposed single-family structures in the MF-D zoning district, not multi-family projects, in response to City Council concerns about clear-cutting.
Data Management for Urban Tree Monitoring – Software RequirementsGreenapps&web
The creation of this report was organized by the Pennsylvania Horticultural Society (PHS) and the USDA Forest Service Philadelphia Field Station to explore how technology could be used to support the longterm systematic monitoring of urban trees by trained professionals, student interns and volunteers; assist with tree planting and maintenance data processes; and enable data to be organized and shared between researchers and practitioners. Interviews with researchers and forestry practitioners led to the development of user stories demonstrating how various individuals would interact with a software tool designed for long-term urban forestry monitoring. The information gathered from the interviews also resulted in a list of related system requirements for an ideal software monitoring system. Using that list of requirements, an evaluation of eleven existing software platforms in three general categories (proprietary forestry software, proprietary non-forestry specific software, and free and open source software) was completed and options listed for expanding the software to meet the system requirements. Data model and data integration workflows for a software system that met the majority of the system requirements were outlined, and PHS served as a test case for how such a system might work for tree planting and monitoring. The report concludes with a series of recommendations regarding cost and tech support, establishing an open data standard, creating a central data repository, and balancing collaboration and leadership.
Un dragón destruía todo en un país. La gente le pidió al presidente que hiciera algo, pero él no sabía cómo detener al dragón. Alguien sugirió contratar a un cazarecompensas para que matara al dragón a cambio de dinero. El cazarecompensas luchó valientemente contra el dragón y finalmente lo derrotó, salvando al pueblo.
The document discusses the history and ongoing journey of the women's movement over the past 100 years. It summarizes key events like the establishment of International Women's Day in 1911 and its adoption as an official UN holiday in 1975. While much progress has been made in areas like voting rights, the document argues more still needs to be done to achieve full equality and end discrimination. Education and technology have empowered women but vigilance is needed lest gains be eroded. The spirit shown by women in facing adversity and empowering future generations is celebrated.
This document discusses key concepts in international distribution and supply chain management. It defines distribution as physically moving products and establishing business relationships to support movement. Distribution channels are the systems of intermediaries that guide product movement. The document outlines different types of distribution channels and strategies for structuring channels. It also discusses challenges of global business like political and economic risks and how licensing agreements and supply chain management can help companies operate internationally.
Händler in Deutschland unterliegen den Vorschriften eines besonders strengen Wettbewerbsrechts. Gerade beim Verkauf an Verbraucher (business-to-consumer) sind diverse Informationspfl ichten beim Fernabsatzkauf und Pfl ichten im elektronischen Geschäftsverkehr zu erfüllen, denen Internethändler gerecht werden müssen. Praktisch jeder kleine Fehler kann abgemahnt werden. Es ist allerdings leichter gesagt als getan, einen Online-Shop rechtssicher zu gestalten. So gibt es unzählige Vorschriften zu beachten, die im Zweifel nur ein spezialisierter Rechtsanwalt vollständig überblicken kann. In dieser Broschüre soll daher ein Überblick über die wichtigsten rechtlichen Aspekte eines Online-Shops gegeben werden, so dass ein Händler, der an Verbraucher
verkauft, zumindest den gängigsten „Abmahnfallen“ entgehen kann.
The document provides an overview of several transport layer protocols and concepts:
- TCP is a connection-oriented protocol that provides reliable, ordered delivery through the use of acknowledgments, flow control, and error control. UDP is a simpler connectionless protocol.
- Sockets provide an interface between applications and the network, allowing applications to build distributed client-server systems.
- Congestion control is important to prevent network congestion and ensure fair resource sharing between flows. TCP uses end-to-end congestion control while some protocols use network feedback.
- RTP and RTCP are used for real-time media delivery over UDP, providing sequencing, timing information, and quality monitoring without guarantees.
- SCT
Overview of SCTP (Stream Control Transmission Protocol)Peter R. Egli
Overview of SCTP (Stream Control Transmission Protocol), outlining the main features and capabilities of SCTP.
SCTP is a transport protocol that overcomes many of the shortcomings of TCP, namely head-of-line blocking and stream-oriented transmission.
SCTP supports multiple streams within a connection and preserves boundaries of application messages thus greatly simplifying communication.
Additionally, SCTP supports multi-homing which increases availability in applications with high reliability demands.
SCTP inherits much of the congestion, flow and error control mechanisms of TCP.
SCTP has its roots in telecom carrier networks for use in transitional voice over IP scenarios.
However, SCTP is generic so that it is applicable in many enterprise applications as well.
Overview of SCTP (Stream Control Transmission Protocol)Peter R. Egli
Overview of SCTP (Stream Control Transmission Protocol), outlining the main features and capabilities of SCTP.
SCTP is a transport protocol that overcomes many of the shortcomings of TCP, namely head-of-line blocking and stream-oriented transmission.
SCTP supports multiple streams within a connection and preserves boundaries of application messages thus greatly simplifying communication.
Additionally, SCTP supports multi-homing which increases availability in applications with high reliability demands.
SCTP inherits much of the congestion, flow and error control mechanisms of TCP.
SCTP has its roots in telecom carrier networks for use in transitional voice over IP scenarios.
However, SCTP is generic so that it is applicable in many enterprise applications as well.
SCTP is a transport layer protocol that provides reliable transmission of data streams over connectionless networks. It supports multi-homing by allowing endpoints to connect over multiple IP addresses, allowing fault tolerance by switching connections if one path fails. SCTP establishes connections using a four-way handshake and supports ordered and unordered delivery of data chunks. It uses sequence numbers, acknowledgments, and retransmissions to ensure reliable and error-free data transfer. Flow control is implemented using a receiver window and congestion control uses mechanisms similar to TCP.
This section discusses process-to-process delivery at the transport layer. It covers three main protocols: UDP, TCP, and SCTP. UDP is a connectionless, unreliable protocol. TCP is connection-oriented and reliable, providing services like streaming, buffers, and congestion/flow control. SCTP combines features of UDP and TCP, being message-oriented, supporting multiple streams and multihoming, and providing reliability. Key aspects like multiplexing, demultiplexing, connections, and reliability models are also covered.
SCTP is a transport layer protocol that combines features of UDP and TCP. It allows multi-streaming so data on blocked streams can still be delivered, supports multihoming to use multiple network interfaces for fault tolerance, and provides reliable and ordered delivery of data. Key SCTP features include a 4-way handshake to prevent DoS attacks, graceful shutdown, and congestion/flow control adapted from TCP to support multihoming. Data is sent in chunks identified by TSN, SI, and SSN numbers.
The document discusses process-to-process delivery at the transport layer and three protocols used: UDP, TCP, and SCTP. The transport layer is responsible for delivering packets from one process to another in a client/server relationship. UDP provides basic connectionless and unreliable delivery, while TCP provides reliable connection-oriented delivery using mechanisms like flow control, error control, and sliding windows. SCTP is a newer protocol that combines features of UDP and TCP, and provides reliability with multiple streams and multihoming capabilities.
Study on Performance of Simulation Analysis on Multimedia NetworkIRJET Journal
This document summarizes a study that simulated voice communication over wired networks using the NS-2 network simulator. The study modeled VoIP traffic between nodes using the SCTP protocol and added background traffic to evaluate its effects. Key findings from the simulation included:
1) Average latency was 0.98 seconds and 98 packets were dropped, indicating degraded performance when background traffic was added.
2) Average jitter (packet delay variation) was calculated to be 0.006 seconds, showing instability in the network with changing traffic patterns.
3) A graph of latency over time demonstrated increased delays and bottlenecks as background traffic overloaded network links.
23 Process to_Process_Delivery_UDP_TCP_and_SCTPAhmar Hashmi
The document discusses process-to-process delivery and three transport layer protocols: UDP, TCP, and SCTP. It covers the basics of each protocol, including that UDP is connectionless and unreliable, TCP is connection-oriented and provides reliable, ordered delivery using acknowledgments and retransmissions, and SCTP combines features of UDP and TCP while adding multihoming and multiple streams. Key concepts covered include ports, segments/packets, checksums, sliding windows, and three-way handshakes for connection establishment and termination. Diagrams illustrate related concepts like demultiplexing, flow control, and fast retransmit.
The document discusses three transport layer protocols: UDP, TCP, and SCTP. UDP is a connectionless protocol that provides best-effort delivery of datagrams. TCP is a connection-oriented protocol that provides reliable, ordered delivery of bytes between applications through flow control and error control. SCTP combines features of UDP and TCP, providing reliable message delivery and support for multihoming. The document describes key aspects of each protocol including connections/associations, segments/packets, port numbers, flow control, and error handling.
The transport layer provides end-to-end communication over a network by providing services such as connection-oriented communication, reliability, flow control, and multiplexing. It links the application layer to the network layer and performs functions like segmenting messages and establishing connections between endpoints. Common transport protocols are TCP, which provides connection-oriented and reliable data transfer, and UDP, which provides connectionless datagram delivery.
RTP/RTCP are protocols for delivering audio and video over IP networks. RTP is used for media transport and provides sequencing and timing information. RTCP is used for quality of service monitoring through feedback on packet loss and delay. RTP and RTCP typically operate over UDP for real-time delivery without retransmissions. RTCP packets including sender and receiver reports provide synchronization and allow participants to monitor call quality.
The document provides information about tutorial courses and contact details for WEI Tutorials located in Thane, India. The courses offered include BSC, MCA, engineering degrees, and project guidance. The address and contact numbers are provided. Additional study material and updates can be accessed through the Facebook page or email provided.
The implementation will:
- FORWARD-TSN (0xC0): Silently skip this chunk but continue to process the rest of the chunks in the packet.
- ASCONF (0xC1): Silently skip this chunk but continue to process the rest of the chunks in the packet.
- ASC: This is an incomplete chunk type so I cannot determine how it would be processed.
The transport layer provides process-to-process communication and utilizes three main protocols: UDP, TCP, and SCTP. UDP is a connectionless protocol that does not guarantee delivery, while TCP provides reliable, ordered delivery through a connection-oriented approach. SCTP also provides reliable delivery with the added capability of multiple streams. Key aspects of these protocols include port numbers, packet/segment formatting, and connection establishment handshaking.
This document provides an overview of a training course on the Stream Control Transmission Protocol (SCTP). The objectives are to understand the technical details and operation of SCTP, know where to find relevant specification documents, understand the SCTP application programming interface, and be aware of ongoing extensions to SCTP. The course covers SCTP concepts like endpoints, associations, multi-homing, and the state machine. Reference materials and online resources are also listed.
The document provides an overview of HTML (Hypertext Markup Language) including:
- HTML was created by Tim Berners-Lee in 1991 and defines the structure and layout of web pages through a variety of tags.
- Common HTML tags are used to define headings, paragraphs, lines, and attributes that provide additional information about elements.
- The basic structure of an HTML document includes tags such as <html>, <head>, <body>, which contain other tags for formatting text, images, and other content.
This document discusses HTML frames and inline frames (iframes). Frames divide the browser window into separate panes, each containing an HTML document. Key advantages of frames include reloading single panes without reloading the entire window. A collection of frames is called a frameset. The document defines how to create framesets using the <frameset> element and <frame> elements to specify individual frames. Attributes of these elements control frame borders, sizes, and content. <iframes> embed separate documents within the main document.
Forms are used to collect data from users on a website. A form contains input elements like text fields, checkboxes, and select menus. When submitted, the form sends the user-entered data to a backend script for processing. Common form attributes include name, action, and method. Different input types like text, password, radio buttons, and file uploads are used to collect different data from users.
This document discusses HTML images, tables, and lists. For images, the <img> tag is used which contains attributes like src, alt, width and height. Tables are created with <table>, <tr>, and <td> tags. They can have borders, headers, rowspans and colspans. Unordered lists use the <ul> tag and list items <li>. Ordered lists use the <ol> tag. Definition lists have terms defined with <dt> and definitions with <dd>.
This document provides an overview of common HTML tags used for text formatting, links, and adding metadata to web pages. It describes tags such as <p>, <b>, <a>, <title>, <style>, <script>, <link>, and <meta> and provides examples of how to use each tag. It also explains how links are defined and styled in HTML and how images can be used as links. The document is intended as a tutorial on basic HTML tags and their usage.
CSS is a style sheet language used to describe the presentation of web pages including colors, fonts, layout, etc. It allows separation of document content from document presentation for better content organization and maintenance. CSS rules are made up of selectors, properties, and values and can be defined within HTML, externally, or via internal stylesheets. Common CSS properties include font, color, background, text, box model, list, table, and positioning. CSS specifications are developed and maintained by the W3C to standardize web development.
This document provides an overview of various CSS properties for controlling colors, backgrounds, fonts, text formatting, links, positioning elements, and more. It describes properties like color, background-color, font-family, text-align, border, float, position and others. The document is intended as a tutorial or guide for using CSS to style and lay out web pages.
The document provides an introduction to XML, explaining that it stands for Extensible Markup Language and is used to carry data rather than display it. XML tags are user-defined rather than predefined. It also discusses how XML separates data from HTML/display, and simplifies data transport between systems. Key aspects of XML like elements, attributes, and being well-formed are summarized.
This document provides an introduction to XML Schema, including:
- XML Schema defines the structure and legal elements of an XML document, similar to a DTD.
- XML Schema supports data types, which makes validating data easier.
- XML Schemas are written in XML syntax, allowing them to be edited, parsed, and manipulated using XML tools.
- XML Schemas help secure data communication by ensuring mutual understanding of data formats.
- XML Schemas are extensible and can reference other schemas.
- Examples are provided of a simple XML document and its corresponding XML Schema.
This document discusses Document Type Definitions (DTDs) which define the legal building blocks of an XML document including elements and attributes. It explains that a DTD can be declared inline or externally. The key purposes of a DTD are to allow data interchange between groups using a standard definition, and to validate received and internal data. The document defines XML building blocks like PCDATA and CDATA, and how to declare elements as empty, containing parsed character data, having any contents, or containing child elements with defined occurrences. It also distinguishes between internal and external DTD declarations.
The document discusses XML DOM and SAX. XML DOM defines a standard for accessing and manipulating XML documents and is a W3C standard. The XML DOM defines the objects and properties of all XML elements and methods to access them. SAX is an event-based parser API that provides an alternative to DOM for reading XML documents sequentially. SAX parsers have lower memory requirements than DOM parsers but validation requires access to the full document, which SAX does not provide.
The document discusses web technology and client-server computing. It provides an overview of the history and development of the World Wide Web from its creation by Tim Berners-Lee in 1989. It describes common web protocols like HTTP, TCP/IP, FTP, and SMTP. It also discusses strategies for web development projects and how to connect devices to the internet. Finally, it outlines the basic roles and interactions in a client-server computing model.
The document discusses various aspects of web development including:
1. It compares traditional projects to web projects, noting differences in roles, pricing models, and standards.
2. It defines objects in web development as visible components in the web browser like text boxes and buttons.
3. It outlines the typical steps in a web development strategy including goals, design, prototyping, testing, and launch.
The document discusses various aspects of web development including:
1. It compares traditional projects to web projects, noting differences in roles, pricing models, and standards.
2. It defines objects in web development as visible components in the browser like text boxes and buttons.
3. It outlines the typical steps in a web development strategy including goals, design, prototyping, testing, and launch.
This document provides an introduction to web technology. It discusses the history of the World Wide Web and protocols like HTTP, TCP/IP, FTP, and SMTP. It defines websites and the differences between corporate and individual websites. The document also covers cyber laws, web applications, and the process of writing web projects including identifying objectives, target users, scope, budget, and planning issues.
This document outlines the study and evaluation scheme for a Master of Technology degree in Computer Science/Information Technology at UPTU.
It provides the course codes, subjects, theory/tutorial/lab periods, and evaluation schemes for each semester. In semester 1, there are 4 core courses covering foundations of computer science, computer organization/architecture, operating systems, and data networks. Each has theory, tutorial, and lab components, with internal assessments worth 30-50 marks and end semester exams worth 100-150 marks.
Semester 2 covers 4 elective courses, with similar evaluation schemes. Semesters 3 and 4 include electives, a professional aspects course, seminar, and dissertation work. Evaluation includes internal and
WiMAX has the potential to replace existing telecommunications infrastructure by providing broadband internet, phone, and TV services without the need for cables. It can offer these services to both fixed locations and mobile users. WiMAX works by transmitting data between base stations and customer equipment over the air. The key components are radios at the base stations and customer locations, along with antennas to transmit and receive the wireless signals. WiMAX provides faster speeds and wider coverage than existing wireless technologies like WiFi, and allows for converged voice, data, and video services.
Virtual LANs (VLANs) segment networks logically by assigning ports on a switch to different broadcast domains. This allows broadcast traffic to be contained to specific VLANs rather than flooding the entire network. VLANs can be defined by port, MAC address, IP subnet, or multicast group. Quality of Service can also be implemented using VLAN tags to prioritize certain types of traffic. VLANs provide security and segregation benefits by creating logical boundaries between network segments. They allow networks to scale efficiently while containing broadcast traffic and prioritizing important applications.
1. Assignment on SCTP, RTP and RTCP Protocol
Submitted by Abhishek Kesharwani
College: United Institute of Technology
Course: M.Tech
Branch: (CSE)
2. Stream Control Transmission Protocol
In computer networking, the Stream Control Transmission Protocol (SCTP) is a transport
layer protocol (protocol number 132 ), serving in a similar role to the popular protocols Transmission
Control Protocol (TCP) and User Datagram Protocol(UDP). It provides some of the same service
features of both: it is message-oriented like UDP and ensures reliable, in-sequence transport of
messages with congestion control like TCP.
The protocol was defined by the IETF Signaling Transport (SIGTRAN) working group in 2000, and is
maintained by the IETF Transport Area (TSVWG) working group. RFC 4960 defines the protocol.
Message-based multi-streaming
SCTP applications submit their data to be transmitted in messages (groups of bytes) to the SCTP
transport layer. SCTP places messages and control information into separate chunks (data chunks
and control chunks), each identified by a chunk header. The protocol can fragment a message into a
number of data chunks, but each data chunk contains data from only one user message. SCTP
bundles the chunks into SCTP packets. The SCTP packet, which is submitted to the Internet
Protocol, consists of a packet header, SCTP control chunks (when necessary), followed by SCTP
data chunks (when available).
SCTP may be characterized as message-oriented, meaning it transports a sequence of messages
(each being a group of bytes), rather than transporting an unbroken stream of bytes as does TCP.
As in UDP, in SCTP a sender sends a message in one operation, and that exact message is passed
to the receiving application process in one operation. In contrast, TCP is a stream-oriented protocol,
transporting streams of bytes reliably and in order. However TCP does not allow the receiver to
know how many times the sender application called on the TCP transport passing it groups of bytes
to be sent out. At the sender, TCP simply appends more bytes to a queue of bytes waiting to go out
over the network, rather than having to keep a queue of individual separate outbound messages
which must be preserved as such.
The term multi-streaming refers to the capability of SCTP to transmit several independent streams of
chunks in parallel, for example transmitting web page images together with the web page text. In
essence, it involves bundling several connections into a single SCTP association, operating on
messages (or chunks) rather than bytes.
TCP preserves byte order in the stream by assigning a sequence number to each packet. SCTP, on
the other hand, assigns a sequence number to each message sent in a stream. This allows
independent ordering of messages in different streams. However, message ordering is optional in
SCTP; a receiving application may choose to process messages in the order of receipt instead of the
order they were sent.
Features
Features of SCTP include:
Multihoming support in which one or both endpoints of a connection can consist of more than
one IP address, enabling transparent fail-over between redundant network paths.
Delivery of chunks within independent streams eliminates unnecessary head-of-line blocking, as
opposed to TCP byte-stream delivery.
Path selection and monitoring to select a primary data transmission path and test the
connectivity of the transmission path.
Validation and acknowledgment mechanisms protect against flooding attacks and provide
notification of duplicated or missing data chunks.
3. Improved error detection suitable for Ethernet jumbo frames.
Association
TCP has provided the primary means to transfer data reliably across the Internet. However, TCP has
imposed limitations on several applications. From RFC 4960:
TCP provides both reliable data transfer and strict order-of-transmission delivery of data.
Some applications need reliable transfer without sequence maintenance, while others would
be satisfied with partial ordering of the data. In both of these cases, the head-of-line blocking
offered by TCP causes unnecessary delay.
The stream-oriented nature of TCP is often an inconvenience. Applications must add their
own record marking to delineate their messages, and must make explicit use of the push
facility to ensure that a complete message is transferred in a reasonable time.
The limited scope of TCP sockets complicates the task of providing highly-available data
transfer capability using multi-homed hosts.
TCP is relatively vulnerable to denial-of-service attacks, such as SYN attacks.
Packet structure
Bits 0–7 8–15 16–23 24–31
+0 Source port Destination port
32 Verification tag
64 Checksum
96 Chunk 1 type Chunk 1 flags Chunk 1 length
128 Chunk 1 data
… …
… Chunk N type Chunk N flags Chunk N length
… Chunk N data
SCTP packets have a simpler basic structure than TCP packets. Each consists of two basic
sections:
1. The common header, which occupies the first 12 bytes and is highlighted in blue, and
2. The data chunks, which occupy the remaining portion of the packet. The first chunk is
highlighted in green, and the last of Nchunks (Chunk N) is highlighted in red.
Each chunk has a type identifier that is one byte long yielding, at most, 255 different chunk
types. RFC 4960 defines a list of chunk types and there are currently 15 types defined. The
remainder of the chunk is a two byte length (maximum size of 65,535 bytes) and the data. If the
chunk does not form a multiple of 4 bytes (i.e., the length is not a multiple of 4) then it is implicitly
padded with zeros which are not included in the chunk length.
Security
Although encryption was not part of the original SCTP design, SCTP was designed with features for
improved security, such as 4-way handshake (compared to TCP 3-way handshake) to protect
against SYN flooding attacks, and large "cookies" for association verification and authenticity.
4. Reliability was also a key part of the security design of SCTP. Multihoming enables an association to
stay open even when some routes and interfaces are down. This is of particular importance
for SIGTRAN as it carries SS7 over an IP network using SCTP, and requires strong resilience during
link outages to maintain telecommunication service even when enduring network anomalies.
SCTP is sometimes a good fingerprinting candidate. Some operating systems ship with SCTP
support enabled, and, as it is not as well known as TCP or UDP, it is sometimes overlooked in
firewall and intrusion detection configurations, thus often permitting probing traffic.
Real-time Transport Protocol
The Real-time Transport Protocol (RTP, sometimes referred to as RTTP) defines a standardized
packet format for delivering audio and video over IP networks. RTP is used extensively in
communication and entertainment systems that involve streaming media, such as telephony, video
teleconference applications, television services and web-based push-to-talk features.
RTP is used in conjunction with the RTP Control Protocol (RTCP). While RTP carries the media
streams (e.g., audio and video), RTCP is used to monitor transmission statistics and quality of
service (QoS) and aids synchronization of multiple streams. RTP is one of the technical foundations
of Voice over IP and in this context is often used in conjunction with a signaling protocol such as
the Session Initiation Protocol (SIP) which assists in setting up connections across the network.
RTP was developed by the Audio-Video Transport Working Group of the Internet Engineering Task
Force (IETF) and first published in 1996 as RFC 1889, superseded by RFC 3550 in 2003.
Overview
RTP is designed for end-to-end, real-time, transfer of stream data. The protocol provides facilities
for jitter compensation and detection of out of sequence arrival in data, which are common during
transmissions on an IP network. RTP allows data transfer to multiple destinations through IP
multicast. RTP is regarded as the primary standard for audio/video transport in IP networks and is
used with an associated profile and payload format.
Real-time multimedia streaming applications require timely delivery of information and can tolerate
some packet loss to achieve this goal. For example, loss of a packet in audio application may result
in loss of a fraction of a second of audio data, which can be made unnoticeable with suitable error
concealment algorithms The Transmission Control Protocol (TCP), although standardized for RTP
use is not normally used in RTP applications because TCP favors reliability over timeliness. Instead
the majority of the RTP implementations are built on the User Datagram Protocol (UDP). Other
transport protocols specifically designed for multimedia sessions are SCTP and DCCP, although, as
of 2010, they are not in widespread use.
RTP was developed by the Audio/Video Transport working group of the IETF standards
organization. RTP is used in conjunction with other protocols such as H.323 and RTSP The RTP
standard defines a pair of protocols, RTP and RTCP. RTP is used for transfer of multimedia data,
and the RTCP is used to periodically send control information and QoS parameters.
Protocol components
The RTP specification describes two sub-protocols:
The data transfer protocol, RTP, which deals with the transfer of real-time data. Information
provided by this protocol includes timestamps (for synchronization), sequence numbers (for
packet loss and reordering detection) and the payload format which indicates the encoded
format of the data.
5. The control protocol RTCP is used to specify quality of service (QoS) feedback
and synchronization between the media streams. The bandwidth of RTCP traffic compared to
RTP is small, typically around 5%.
An optional signaling protocol such as H.323, Session Initiation Protocol (SIP), or Jingle (XMPP)
An optional media description protocol such as Session Description Protocol
Sessions
An RTP Session is established for each multimedia stream. A session consists of an IP address with
a pair of ports for RTP and RTCP. For example, audio and video streams will have separate RTP
sessions, enabling a receiver to deselect a particular stream. The ports which form a session are
negotiated using other protocols such as RTSP (using SDP in the setup method) and SIP. According
to the specification, an RTP port should be even and the RTCP port is the next higher odd port
number.RTP and RTCP typically use unprivileged UDP ports (1024 to 65535) but may use other
transport protocols (most notably, SCTP and DCCP) as well, as the protocol design is transport
independent.
Packet header
RTP packet header
Bit offset[b]
0-1 2 3 4-7 8 9-15 16-31
0 Version P X CC M PT Sequence Number
32 Timestamp
64 SSRC identifier
96
CSRC identifiers
...
96+32×CC Profile-specific extension header ID Extension header length
128+32×CC
Extension header
...
The RTP header has a minimum size of 12 bytes. After the header, optional header extensions may
be present. This is followed by the RTP payload, the format of which is determined by the particular
class of application.[19]
The fields in the header are as follows:
6. Version: (2 bits) Indicates the version of the protocol. Current version is 2.
P (Padding): (1 bit) Used to indicate if there are extra padding bytes at the end of the RTP
packet. A padding might be used to fill up a block of certain size, for example as required by an
encryption algorithm. The last byte of the padding contains the number of padding bytes that
were added (including itself).
X (Extension): (1 bit) Indicates presence of an Extension header between standard header and
payload data. This is application or profile specific.
CC (CSRC Count): (4 bits) Contains the number of CSRC identifiers (defined below) that follow
the fixed header.
M (Marker): (1 bit) Used at the application level and defined by a profile. If it is set, it means that
the current data has some special relevance for the application.
PT (Payload Type): (7 bits) Indicates the format of the payload and determines its interpretation
by the application. This is specified by an RTP profile. For example, see RTP Profile for audio
and video conferences with minimal control (RFC 3551).
Sequence Number: (16 bits) The sequence number is incremented by one for each RTP data
packet sent and is to be used by the receiver to detect packet loss and to restore packet
sequence. The RTP does not specify any action on packet loss; it is left to the application to take
appropriate action. For example, video applications may play the last known frame in place of
the missing frame. According to RFC 3550, the initial value of the sequence number should be
random to make known-plaintext attacks on encryption more difficult. RTP provides no
guarantee of delivery, but the presence of sequence numbers makes it possible to detect
missing packets.
Timestamp: (32 bits) Used to enable the receiver to play back the received samples at
appropriate intervals. When several media streams are present, the timestamps are
independent in each stream, and may not be relied upon for media synchronization. The
granularity of the timing is application specific. For example, an audio application that samples
data once every 125 µs (8 kHz, a common sample rate in digital telephony) would use that value
as its clock resolution. The clock granularity is one of the details that is specified in the RTP
profile for an application.
SSRC: (32 bits) Synchronization source identifier uniquely identifies the source of a stream. The
synchronization sources within the same RTP session will be unique.
CSRC: (32 bits each) Contributing source IDs enumerate contributing sources to a stream which
has been generated from multiple sources.
Extension header: (optional) the first 32-bit word contains a profile-specific identifier (16 bits)
and a length specifies (16 bits) that indicates the length of the extension (EHL=extension header
length) in 32-bit units, excluding the 32 bits of the extension header.
RTP-based systems
A complete network based system includes other protocols and standards in conjunction with RTP.
Protocols such as SIP, Jingle, RTSP, H.225 and H.245 are used for session initiation, control and
termination. Other standards, such as H.264, MPEG and H.263, are used to encode the payload
data as specified via RTP Profile.
An RTP sender captures the multimedia data, then encodes frames and transmits it as RTP packets
with appropriate timestamps and increasing sequence numbers. Depending on the RTP Profile in
use, the sender may set the Payload Type field. The RTP receiver captures the RTP packets,
detects missing packets, and may reorder packets. It decodes the frames according to the payload
format and presents the stream to its user.
7. (RTCP)RTP Control Protocol
The RTP Control Protocol (RTCP) is a sister protocol of the Real-time Transport Protocol (RTP). Its
basic functionality and packet structure is defined in RFC 3550. RTCP provides out-of-band statistics
and control information for an RTP session. It partners with RTP in the delivery and packaging of
multimedia data, but does not transport any media streams itself. The primary function of RTCP is to
provide feedback on the quality of service (QoS) in media distribution by periodically sending
statistics information to participants in a streaming multimedia session.
RTCP transports statistics for a media connection and information such as transmitted octet and
packet counts, lost packet counts, jitter, and round-trip delay time. An application may use this
information to control quality of service parameters, perhaps by limiting flow, or using a
different codec.
Protocol functions
Typically RTP will be sent on an even-numbered UDP port, with RTCP messages being sent over
the next higher odd-numbered port.
RTCP itself does not provide any flow encryption or authentication methods. Such mechanisms may
be implemented, for example, with the Secure Real-time Transport Protocol (SRTP).
RTCP provides three basic functions expected to be implemented in all RTP sessions:
The primary function of RTCP is to gather statistics on quality aspects of the media distribution
during a session and transmit this data to the session media source and other session
participants. Such information may be used by the source for adaptive media encoding (codec)
and detection of transmission faults. If the session is carried over a multicast network, this
permits non-intrusive session quality monitoring.
RTCP provides canonical end-point identifiers (CNAME) to all session participants. Although a
source identifier (SSRC) of an RTP stream is expected to be unique, the instantaneous binding
of source identifiers to end-points may change during a session. The CNAME establishes
unique identification of end-points across an application instance (multiple use of media tools)
and for third-party monitoring.
RTCP reports are expected to be sent by all participants, even in a multicast session which may
involve thousands of recipients. Such traffic will increase proportionally with the number of
participants. Thus, to avoid network congestion, the protocol must include session bandwidth
management. This is achieved by dynamically controlling the frequency of report transmissions.
RTCP bandwidth usage should generally not exceed 5% of total session bandwidth.
Furthermore, 25% of the RTCP bandwidth should be reserved to media sources at all times, so
8. that in large conferences new participants can receive the CNAME identifiers of the senders
without excessive delay.
A fourth, optional feature, is the provisioning of session control functions, because RTCP is a
convenient means to reach all session participants, whereas RTP itself is not. RTP is only
transmitted by a media source.
Message types
RTCP distinguishes several types of packets: sender report, receiver report, source, description, and
bye. In addition, the protocol is extensible and allows application-specific RTCP packets. A
standards-based extension of RTCP is the Extended Report packet type introduced by RFC 3611
Sender report (SR)
The sender report is sent periodically by the active senders in a conference to report
transmission and reception statistics for all RTP packets sent during the interval. The sender
report includes an absolute timestamp, which is the number of seconds elapsed since
midnight on January 1, 1900. The absolute timestamp allows the receiver to synchronize
RTP messages. It is particularly important when both audio and video are transmitted
simultaneously, because audio and video streams use independent relative timestamps.
Receiver report (RR)
The receiver report is for passive participants, those that do not send RTP packets. The
report informs the sender and other receivers about the quality of service.
Source description (SDES)
The Source Description message is used to send the CNAME item to session participants. It
may also be used to provide additional information such as the name, e-mail address,
telephone number, and address of the owner or controller of the source.
End of participation (BYE)
A source sends a BYE message to shut down a stream. It allows an end-point to announce
that it is leaving the conference. Although other sources can detect the absence of a source,
this message is a direct announcement. It is also useful to a media mixer.
Application-specific message (APP)
The application-specific message provides a mechanism to design application-specific
extensions to the RTCP protocol.