Real World IP Event Video Series - Part 4 - Gerard Phillips – Arista Networks

Part 4 in our series of videos from ‘Real World IP’, a one-day seminar event from The Broadcast Bridge held at BAFTA in London, Gerard Phillips, Systems Engineer at Arista Networks, discusses network topologies and ethernet switches.

In this ground-breaking talk, Phillips describes the design criteria for guaranteeing robust PTP distribution, the special considerations for media network architectures, what is involved in programming network switches, and how to choose an ethernet switch for media applications.

Analyzing PTP at the network layer, Phillips discusses packet delivery variance, why it occurs in heavily utilized ethernet switches, and the effects this has on terminal equipment synchronizing to a PTP Grand Master.

Watch the video; HERE.

Please note you must be logged in to access this video.

You might also like...

IP Security For Broadcasters: Part 4 - MACsec Explained

IPsec and VPN provide much improved security over untrusted networks such as the internet. However, security may need to improve within a local area network, and to achieve this we have MACsec in our arsenal of security solutions.

IP Security For Broadcasters: Part 3 - IPsec Explained

One of the great advantages of the internet is that it relies on open standards that promote routing of IP packets between multiple networks. But this provides many challenges when considering security. The good news is that we have solutions…

Microphones: Part 3 - Human Auditory System

To get the best out of a microphone it is important to understand how it differs from the human ear.

IP Security For Broadcasters: Part 2 - The Problem To Be Solved

By assuming that IP must be made secure, we run the risk of missing a more fundamental question that is often overlooked: why is IP so insecure?

IP Security For Broadcasters: Part 1 - Psychology Of Security

As engineers and technologists, it’s easy to become bogged down in the technical solutions that maintain high levels of computer security, but the first port of call in designing any secure system should be to consider the user and t…