Essential Guide: Keeping Studio IP Media Streams Reliable
August 31st 2022 - 09:00 AMIP broadcast infrastructures are delivering on their promise of flexibility and scalability. But as we progress on our IP journey, we are now discovering that an integrated monitoring system is essential.
This Essential Guide discusses the challenges of monitoring a modern IP broadcast facility. Although IT tools provide a deep insight into the network QoS, as packet jitter and latency are still incredibly important, IT network analysis tools do not come close to providing the detailed information needed to reliably distribute video and audio throughout a broadcast facility.
With the potential for thousands of media essence files traversing an IP network, providing a monitoring system based just on waveform monitors and vectorscopes only skims the surface of the facilities requirements. Instead, an integrated approach is necessary.
This Essential Guide has been written for technologists, broadcast engineers, their managers, and anybody looking to improve their knowledge of IP broadcast infrastructures, especially when understanding what to monitor and how.
Supported by
You might also like...
Automating HDR-SDR Conversion
Automation seems like an obvious solution but effective conversion involves understanding what the image content is and therefore what the priorities are for how it should look.
IP Security For Broadcasters: Part 8 - RADIUS Network Access
Maintaining controlled access is critical for any secure network, especially when working with high-value media in broadcast environments.
Standards: Part 25 - Designing Client-Side Video Players
Here we chart the historical development of client-side video players, describe the building blocks used to create them and the relevant standards.
Microphones: Part 5 - The Variable Directivity Microphone
The variable directivity microphone is very popular for studio work. What goes on inside is very clever and not widely appreciated.
IP Security For Broadcasters: Part 7 - Operating Systems
As well as providing the core functionality of a computer, operating systems have the potential to be a primary issue for security and keeping hackers at bay.