‘Real World IP’ Event Video Series: Part 6 - Norbert Paquet - sony
Part 6 in our series from ‘Real World IP’, a one-day seminar event from The Broadcast Bridge held at BAFTA in London, Norbert Paquet, Head of Product Management – Sony Europe, discusses system architectures, network control, and the business benefits of IP.
After providing an update on the current ST2110 family of specifications, Paquet goes on to discuss the achievements of AMWA and the status of the current NMOS family of specifications, and then explains the EBU Tech 3371 recommendation for the Technology Pyramid for Media Nodes.
To gain the optimum IP solution, Paquet argues there must be a change in mindset, that is, to identify the abstraction between the physical layers and the logical layers as the fibers carry everything – video layers, tally, comms, control, reverse vision, etc.
Watch the video; HERE.
Please note you must be logged in to access this video.
You might also like...
IP Security For Broadcasters: Part 4 - MACsec Explained
IPsec and VPN provide much improved security over untrusted networks such as the internet. However, security may need to improve within a local area network, and to achieve this we have MACsec in our arsenal of security solutions.
IP Security For Broadcasters: Part 3 - IPsec Explained
One of the great advantages of the internet is that it relies on open standards that promote routing of IP packets between multiple networks. But this provides many challenges when considering security. The good news is that we have solutions…
Microphones: Part 3 - Human Auditory System
To get the best out of a microphone it is important to understand how it differs from the human ear.
IP Security For Broadcasters: Part 2 - The Problem To Be Solved
By assuming that IP must be made secure, we run the risk of missing a more fundamental question that is often overlooked: why is IP so insecure?
IP Security For Broadcasters: Part 1 - Psychology Of Security
As engineers and technologists, it’s easy to become bogged down in the technical solutions that maintain high levels of computer security, but the first port of call in designing any secure system should be to consider the user and t…