‘Real World IP’ Event Video Series: Part 3 - Daniel Boldt - Meinberg

Part 3 in our series of full length videos from ‘Real World IP’, a one-day seminar event from The Broadcast Bridge held at BAFTA in London, Daniel Boldt, Head of Software Development at Meinberg, uncovers the mysteries of PTP timing and discusses how it relates to broadcast television, the key components required, and how it forms the backbone of any ST2110 system.

Through practical example, Boldt goes onto explain the effects of network latency on timing and packet jitter. He discusses how the evaluated RTP timestamps are used to re-order packets and synchronize them to both the sender and receiver, and in doing so, resynchronizes the video, audio, and metadata essence streams.

The presentation culminates with an excellent example of a PTP solution over a WAN between Cologne and Dusseldorf. The effects and remedies of packet jitter, accuracy, and stability are addressed and analyzed.

Watch the video; HERE.

Please note you must be logged in to access this video.

You might also like...

IP Security For Broadcasters: Part 4 - MACsec Explained

IPsec and VPN provide much improved security over untrusted networks such as the internet. However, security may need to improve within a local area network, and to achieve this we have MACsec in our arsenal of security solutions.

IP Security For Broadcasters: Part 3 - IPsec Explained

One of the great advantages of the internet is that it relies on open standards that promote routing of IP packets between multiple networks. But this provides many challenges when considering security. The good news is that we have solutions…

Microphones: Part 3 - Human Auditory System

To get the best out of a microphone it is important to understand how it differs from the human ear.

IP Security For Broadcasters: Part 2 - The Problem To Be Solved

By assuming that IP must be made secure, we run the risk of missing a more fundamental question that is often overlooked: why is IP so insecure?

IP Security For Broadcasters: Part 1 - Psychology Of Security

As engineers and technologists, it’s easy to become bogged down in the technical solutions that maintain high levels of computer security, but the first port of call in designing any secure system should be to consider the user and t…