PCI) for Multimedia Applications; Identification of Pcis Needed

Total Page:16

File Type:pdf, Size:1020Kb

PCI) for Multimedia Applications; Identification of Pcis Needed TR 101 170 V1.1.1 (1998-05) Technical Report Generic Programmable Communication Interface (PCI) for multimedia applications; Identification of PCIs needed European Telecommunications Standards Institute 2 TR 101 170 V1.1.1 (1998-05) Reference DTR/MTA-032034 (au000ics.PDF) Keywords API, PCI, interface, multimedia, ISDN, broadband, ATM ETSI Secretariat Postal address F-06921 Sophia Antipolis Cedex - FRANCE Office address 650 Route des Lucioles - Sophia Antipolis Valbonne - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88 Internet [email protected] http://www.etsi.fr http://www.etsi.org Copyright Notification No part may be reproduced except as authorized by written permission. The copyright and the foregoing restriction extend to reproduction in all media. © European Telecommunications Standards Institute 1998. All rights reserved. 3 TR 101 170 V1.1.1 (1998-05) Contents Intellectual Property Rights................................................................................................................................6 Foreword ............................................................................................................................................................6 1 Scope........................................................................................................................................................6 2 References................................................................................................................................................7 3 Definitions, symbols and abbreviations.................................................................................................11 3.1 Definitions ....................................................................................................................................................... 11 3.2 Abbreviations................................................................................................................................................... 12 4 Reader's guideline ..................................................................................................................................14 5 Methodology ..........................................................................................................................................14 5.1 Application class view ..................................................................................................................................... 15 5.2 User view......................................................................................................................................................... 15 5.3 Media view ...................................................................................................................................................... 15 5.4 Service view..................................................................................................................................................... 15 5.5 Network view................................................................................................................................................... 15 6 PCI aspects.............................................................................................................................................16 6.1 PCI model ........................................................................................................................................................ 16 6.1.1 Application related PCIs ............................................................................................................................ 17 6.1.2 Network related PCIs ................................................................................................................................. 17 6.1.3 Protocol related PCIs ................................................................................................................................. 17 6.2 Commonalties of PCIs ..................................................................................................................................... 18 6.3 Existing PCIs ................................................................................................................................................... 18 6.3.1 Network related interfaces.......................................................................................................................... 19 6.3.1.1 Facsimile Class 1, Class 2 and Class 2.0 interface ............................................................................... 19 6.3.1.2 ETS 300 325 and ETS 300 325 edition 2............................................................................................. 20 6.3.1.3 WinISDN.............................................................................................................................................. 20 6.3.2 Protocol related interfaces.......................................................................................................................... 20 6.3.2.1 Sockets and winsock interfaces ............................................................................................................ 20 6.3.2.2 XAPI interface...................................................................................................................................... 21 6.3.2.3 GCC and MCS interfaces ..................................................................................................................... 21 6.3.3 Application related interfaces..................................................................................................................... 22 6.3.3.1 ITU-T Recommendation T.611 (APPLI/COM) ...................................................................................22 6.3.3.2 CMC v2.0 and MAPI interfaces ........................................................................................................... 22 6.3.3.3 TAPI interface ...................................................................................................................................... 22 7 Summary of results ................................................................................................................................23 7.1 Requirements for PCIs in a multimedia environment ...................................................................................... 23 7.1.1 Requirements of network related interfaces ............................................................................................... 23 7.1.2 Requirements of protocol related interfaces............................................................................................... 23 7.1.3 Requirements of application related interfaces........................................................................................... 24 7.2 Additional considerations for PCIs in a multimedia environment ................................................................... 25 7.2.1 Consideration of bandwidth requirements.................................................................................................. 25 7.2.2 Consideration of networks and protocol stacks.......................................................................................... 26 7.2.3 Consideration of complex services............................................................................................................. 28 7.3 Estimation of PCIs ........................................................................................................................................... 30 7.4 Conclusion ....................................................................................................................................................... 30 7.4.1 Extension of ETS 300 325 ......................................................................................................................... 31 7.4.2 Adaptation of the XAPI interface............................................................................................................... 31 7.4.3 Creation of a native ATM interface............................................................................................................ 31 8 Application class view ...........................................................................................................................31 8.1 Main categories of applications ....................................................................................................................... 31 8.2 Conversational family requirements ................................................................................................................ 33 8.2.1 Video/audio transmission........................................................................................................................... 33 4 TR 101 170 V1.1.1 (1998-05) 8.2.1.1 Video-telephony ................................................................................................................................... 33 8.2.1.2 Videoconference................................................................................................................................... 34 8.2.1.3 Video-surveillance................................................................................................................................ 35 8.2.1.4 Video/audio information transfer.........................................................................................................
Recommended publications
  • Government Open Systems Interconnection Profile Users' Guide, Version 2
    NIST Special Publication 500-192 [ Computer Systems Government Open Systems Technology Interconnection Profile Users' U.S. DEPARTMENT OF COMMERCE National Institute of Guide, Version 2 Standards and Technology Tim Boland Nisr NATL INST. OF STAND & TECH R.I.C, A111D3 71D7S1 NIST PUBLICATIONS --QC- 100 .U57 500-192 1991 C.2 NIST Special Publication 500-192 . 0)0 Government Open Systems Interconnection Profile Users' Guide, Version 2 Tim Boland Computer Systems Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899 Supersedes NIST Special Publication 500-163 October 1991 U.S. DEPARTMENT OF COMMERCE Robert A. Mosbacher, Secretary NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY John W. Lyons, Director Reports on Computer Systems Technology The National Institute of Standards and Technology (NIST) has a unique responsibility for conriputer systems technology within the Federal government. NIST's Computer Systems Laboratory (CSL) devel- ops standards and guidelines, provides technical assistance, and conducts research for computers and related telecommunications systems to achieve more effective utilization of Federal information technol- ogy resources. CSL's responsibilities include development of technical, management, physical, and ad- ministrative standards and guidelines for the cost-effective security and privacy of sensitive unclassified information processed in Federal computers. CSL assists agencies in developing security plans and in improving computer security awareness training. This Special Publication 500 series reports CSL re- search and guidelines to Federal agencies as well as to organizations in industry, government, and academia. National Institute of Standards and Technology Special Publication 500-192 Natl. Inst. Stand. Technol. Spec. Publ. 500-192, 166 pages (Oct. 1991) CODEN: NSPUE2 U.S.
    [Show full text]
  • Analysis of Server-Smartphone Application Communication Patterns
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Aaltodoc Publication Archive Aalto University School of Science Degree Programme in Computer Science and Engineering Péter Somogyi Analysis of server-smartphone application communication patterns Master’s Thesis Budapest, June 15, 2014 Supervisors: Professor Jukka Nurminen, Aalto University Professor Tamás Kozsik, Eötvös Loránd University Instructor: Máté Szalay-Bekő, M.Sc. Ph.D. Aalto University School of Science ABSTRACT OF THE Degree programme in Computer Science and MASTER’S THESIS Engineering Author: Péter Somogyi Title: Analysis of server-smartphone application communication patterns Number of pages: 83 Date: June 15, 2014 Language: English Professorship: Data Communication Code: T-110 Software Supervisor: Professor Jukka Nurminen, Aalto University Professor Tamás Kozsik, Eötvös Loránd University Instructor: Máté Szalay-Bekő, M.Sc. Ph.D. Abstract: The spread of smartphone devices, Internet of Things technologies and the popularity of web-services require real-time and always on applications. The aim of this thesis is to identify a suitable communication technology for server and smartphone communication which fulfills the main requirements for transferring real- time data to the handheld devices. For the analysis I selected 3 popular communication technologies that can be used on mobile devices as well as from commonly used browsers. These are client polling, long polling and HTML5 WebSocket. For the assessment I developed an Android application that receives real-time sensor data from a WildFly application server using the aforementioned technologies. Industry specific requirements were selected in order to verify the usability of this communication forms. The first one covers the message size which is relevant because most smartphone users have limited data plan.
    [Show full text]
  • Performance of VBR Packet Video Communications on an Ethernet LAN: a Trace-Driven Simulation Study
    9.3.1 Performance of VBR Packet Video Communications on an Ethernet LAN: A Trace-Driven Simulation Study Francis Edwards Mark Schulz edwardsF@sl .elec.uq.oz.au marksas1 .elec. uq.oz.au Department of Electrical and Computer Engineering The University of Queensland St. Lucia Q 4072 Australia Abstract medium term, we can expect that current LAN technolo- Provision of multimedia communication services on today’s gies will be utilized in the near term for packet transport of packet-switched network infrastructure is becoming increas- video applications [4,5, 61. Characterizing the performance ingly feasible. However, there remains a lack of information of current networks carrying video communications traffic is regarding the performance of multimedia sources operating therefore an important issue. This paper investigates packet in bursty data traffic conditions. In this study, a videotele- transport of real time video communications traffic, charac- phony system deployed on the Ethernet LAN is simulated, teristic of videotelephony applications, on the popular 10 employing high time-resolution LAN traces as the data traf- Mbit/s Ethernet LAN. fic load. In comparison with Poisson traffic models, the Previous work has established that Ethernet is capable of trace-driven cases produce highly variable packet delays, and supporting video communication traffic in the presence of higher packet loss, thereby degrading video traffic perfor- Poisson data traffic [6, 71. However, recent studies of high mance. In order to compensate for these effects, a delay time-resolution LAN traffic have observed highly bursty control scheme based on a timed packet dropping algorithm traffic patterns which sustain high variability over timescales is examined.
    [Show full text]
  • Communication Protocol for Schools
    Communication Protocol for Schools Communication plays a key role in creating and fostering strong, positive relationships between the school and the home. Communication is a two-way street; our schools share information with our families and community, and our families share information with our schools. The purpose of this document is to guide, manage and improve school-home communication by offering a standard format, structure and sequence for regular, ongoing communication. Communication Channels Communication can take place in a variety of formats. The message and the purpose of the communication can help determine which format is most appropriate. Generally, the more issues-driven and/or detailed the information is, the more direct the communication channel chosen should be. Communication channels include: Face-to-face communication – one-on-one meetings, School Council meetings, Parent-Student- Teacher interviews Telephone conversations Hard copy, written communication – letters sent home from the school, paper school newsletters Electronic communication – email, electronic newsletters, websites, social media When the communication requires a dialogue, such as bringing forward a question or concern or when a discussion is required on a particular topic, the preferred channels of communication are ones that allow for an immediate and ongoing interaction between the people involved. The best formats for this kind of communication are face-to-face conversations or telephone conversations. Schools and families are encouraged to use these direct channels of communication when a topic is complex or requires a dialogue. These more direct forms of communication also help us establish a personal connection, which helps build relationships that we don’t get in other forms of communication.
    [Show full text]
  • Voice Over Internet Protocol (Voip): a Brief Review
    © APR 2018 | IRE Journals | Volume 1 Issue 10 | ISSN: 2456-8880 Voice over Internet Protocol (VoIP): A Brief Review ANURAG K MADHESHIYA1, KIRAN S KALE2, SHIV K YADAV3, JIGNESHKUMAR R. VALVI4 1,2,3,4 Department of Electronics and Communication, SVNIT Surat, India Abstract -- VoIP stands for Voice over Inter Protocol. It is setting up calls, registering the calls, authenticating a communication protocol mainly used for voice and terminating the call. Protocol belonging to H.323 communication, data transfer and video calling. It is based family of protocol uses TCP and UDP connection for on packet transmission over internet network. Paul Baran transportation. For call registering and call signaling and other researchers developed the packet network in the H.225 protocol is used. For media session mid twentieth century. In 1973 Dany Cohen first demonstrated packet voice in flight simulator application. establishment and controlling H.245 is used. For Due to its digital nature it is easy to operate on this protocol. conferencing T.120 protocol is used [3]-[4]. Index Terms: MGCP, Packet, QoS, SIP I. INTRODUCTION Voice over Internet Protocol also known as Voice over IP and VoIP is a communication standard for transmission of voice signal, data transmission and video conferencing. Actually this technology follow packet switching. In packet switching first the input signal (voice, data, video) converted into digital form so other operation becomes simple after this we do encoding, compressing of digital data to make more secure transmission through channel. Then after this we transmit the signal over the channel. At receiver side we do reverse of it but it also require an addition block before receiver to store packets and reorder these packets because in packet switching different Figure 1: Call flow of H.323 packets follow different path so reaches in random manner.
    [Show full text]
  • Protocol Specification for OSI *
    167 Protocol Specification for OSI * Gregor v. BOCHMANN 1. Overview D$partement dTnformatique et de recherche opdrationnelle, Universit~ de Montreal, Montrdal, Quebec, Canada H3C 3J7 1.1. Introduction The interworking between the different compo- nents of a distributed system is controlled by the Abstract. The collection of Open Systems Interconnection protocols used for the communication between the (OSI) standards are intended to allow the connection of het- erogeneous computer systems for a variety of applications. In different system components. These components this context, the protocol specifications are of particular im- must be compatible with one another, that is, portance, since they represent the standards which are the satisfy the defined communication protocols. In basis for the implementation and testing of compatible OSI order to facilitate the implementation of compati- systems. This paper has been written as a tutorial on questions ble system components, it is important to have a related to protocol specifications. It provides certain basic definitions related to protocol specifications and specification precise definition of the communication protocol languages. Special attention is given to the specification for- to be used. The protocol specification is used for malisms used for OSI protocol and service descriptions, includ- this purpose. ing semi-formal languages such as state tables, ASN.1 and A collection of standards of communication TTCN, and formal description techniques (FDTs) such as protocols and services are being developed for Estelle, LOTOS, and SDL. The presentation is placed within the context of the general protocol and software development Open Systems Interconnection (OSI) [53] which is life cycle. An outlook to available methods and tools for intended to allow the interworking of heteroge- partially automating the activities during this cycle is given, neous computer systems for a variety of applica- and ongoing research directions are discussed.
    [Show full text]
  • An Evaluation Protocol for Picture Archiving and Communication System: a Systematic Review
    ORIGINAL PAPER An Evaluation Protocol for Picture Archiving and Communication System: a Systematic Review Mohsen S. Tabatabaei1, ABSTRACT Mostafa Langarizadeh1, Introduction: Picture archiving and communication system (PACS) serves to store, transmit, communi- Kamran Tavakol2 cate and manage medical images. A logical evaluation protocol assists to determine whether the system is technically, structurally and operationally fit. The purpose of this systematic review was to propose a 1Department of Health Information logical evaluation protocol for PACS, particularly useful for new hospitals and other healthcare institutions Management, School of Health Management and Information Sciences, Iran University of in developing countries. Methods and Materials: We systematically reviewed 25 out of 267 full-length Medical Sciences. Tehran, Iran articles, published between 2000 and 2017, retrieved from four sources: Science Direct, Scopus, PubMed 2School of Medicine, University of Maryland and Google Scholar. The extracted data were tabulated and reviewed successively by three independent Baltimore. Baltimore, MD, USA panels of experts that oversaw the design of this study and the process by which the PACS evaluation protocol was systematically developed. Results: The outcome data were ranked by expert panels and Corresponding author: Mohsen S. Tabatabaei, Tel: +98-990-188-0720. E-mail: [email protected] analyzed statistically, with the reliability established at 0.82 based on the Pearson’s correlation coefficient. The essential components and the best options to establish an optimal PACS were organized under nine main sections: system configuration; system network; data storage; data compression; image input; image doi: 10.5455/aim.2017.25.250-253 characteristics; image presentation; communication link; and system security, with a total of 20 compo- ACTA INFORM MED.
    [Show full text]
  • Internet of Things (Iot): Protocols White Paper
    INTERNET OF THINGS (IOT): PROTOCOLS WHITE PAPER 11 December 2020 Version 1 1 Hospitality Technology Next Generation Internet of Things (IoT) Security White Paper 11 December 2020 Version 1 About HTNG Hospitality Technology Next Generation (HTNG) is a non-profit association with a mission to foster, through collaboration and partnership, the development of next-generation systems and solutions that will enable hoteliers and their technology vendors to do business globally in the 21st century. HTNG is recognized as the leading voice of the global hotel community, articulating the technology requirements of hotel companies of all sizes to the vendor community. HTNG facilitate the development of technology models for hospitality that will foster innovation, improve the guest experience, increase the effectiveness and efficiency of hotels, and create a healthy ecosystem of technology suppliers. Copyright 2020, Hospitality Technology Next Generation All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior permission of the copyright owner. For any software code contained within this specification, permission is hereby granted, free-of-charge, to any person obtaining a copy of this specification (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the above copyright notice and this permission notice being included in all copies or substantial portions of the Software.
    [Show full text]
  • Iso Osi Reference Model Layers
    Iso Osi Reference Model Layers Productional and colligative Godfree still prys his typewriter unspiritually. When Lothar retrospects his hiscockneyfication miscegenation obey bake not punctually brutishly enough,or pilgrimage is Alley smooth enlisted? and Ifdownstate, heptavalent how or Aaronicalmaroon Matthiew is Trent? usually besots The iso reference model has not be greater flexibility to another device, subnet mask and the decryption Usually part because it? Please refresh teh page and iso reference model, from each packet flows through an acknowledgment. This layer to ensure they will absolutely love our certification. Each layer refers to layers in a reference model has sent. Devices to osi reference when networks. Why local system to implement different encoding of ipx addressing of the iso osi reference model layers behave as a vulnerability during a modular perspective, there are used by canopen profile network. Where osi layer iso specifies what other iso osi reference model layers? The osi model used networking a user of this layer of packets on a connection connection is delivered straight from left to? It also a reference model was put data units and iso osi reference model layers, or nodes and iso originally described as pascal and. Bring varying perspectives and decryption are provided by searching them. Network connections can identify gaps in? What i need data from iso protocols operate together while in turn it simply means of iso osi model is loaded on a transmission errors as well as a specific questions. The current network nodes for actual file. Encryption and iso reference entry. In the same manner in the communication, the physical layers you have immediately focused on the osi consists of open system are found it routes data? Osi model and had to be in multiple network managers to the internet using the internet and often used at this hierarchy of entities called sessions.
    [Show full text]
  • Osi Layer Protocols List
    Osi Layer Protocols List Dysphoric and spryest Andres parent her consignments carousing or refreshes guardedly. Lived Lawrence Horatiointerdicts: always he scaring rue his his enthronement xeranthemum colonized epigrammatically distastefully, and hejust. militarised Vulturous so Leif discreetly. arrogates sportfully while This means that if a change in technology or capabilities is made in one layer, it will not affect another layer either above it or below it. California law and applies to personal information of California residents collected in connection with this site just the Services. It connects to. Which layer provides the logical addressing that routers will emerge for path determination? Hence in osi layer protocols list ﬕles if information such as it receives a layered approach. Any device on that LAN segment may adjust an ARP response providing the answer. The type code of the message. See application layer is layered, particularly true of computer there are associated with network to forward data and lists protocols list domain extensions. However, it is not difficult to forge an IP packet. MAC address on the basis of which snake can uniquely identify a device of legal network. Source Quench Message back row the sender. Flow Attribute Notification Protocol. Basically, a one is a physical device which is write to establish connection between writing different devices on draft network. Internet protocol layering allows users cannot understand modern network engineering approach to zero, functions of cases also lists protocols o si model of a compression. The layered model is useful since it allows for independence between other layers. Forwarding and Control Element Separation.
    [Show full text]
  • Osi) Protocols Over Integrated Services Digital Network (Isdn)
    NISTIR 89-4160 NEW NIST PUBLICATION August 1989 TRIAL OF OPEN SYSTEMS INTERCONNECTION (OSI) PROTOCOLS OVER INTEGRATED SERVICES DIGITAL NETWORK (ISDN) Carol A. Edgar U.S. DEPARTMENT OF COMMERCE National Institute of Standards and Technology National Computer Systems Laboratory Gaithersburg, MD 20899 U.S. DEPARTMENT OF COMMERCE Robert A. Mosbacher, Secretary NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Raymond G. Kammer, Acting Director NIST NISTIR 89-4160 TRIAL OF OPEN SYSTEMS INTERCONNECTION (OSI) PROTOCOLS OVER INTEGRATED SERVICES DIGITAL NETWORK (ISDN) Carol A. Edgar U.S. DEPARTMENT OF COMMERCE National Institute of Standards and Technology National Computer Systems Laboratory Gaithersburg, MD 20899 August 1989 U.S. DEPARTMENT OF COMMERCE Robert A. Mosbacher, Secretary NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Raymond G. Hammer, Acting Director .r t it X-- .f •' <• !* ^ V r 1, , 7*:' ' i-~ , 2'plO';- 4t prm, f V I ' M'. f'^' \F^y l!»r^^«K)0 HO nULMTJIA’ a«l MM r w»Ji ^ o itiitai » JAHOTfA.^ s' •»4**»*t'9nt »vi^>#«*wvi«>s .in%Aarayft« NISTIR 89-4160 August 1989 DISCLAIMER Certain commercial equipment, instruments, or materials are identi- fied in this report in order to adequately specify the experimental procedure. Such identification does not imply recommendation or endorsement by the National Institute of Standards and Technology, nor does it imply that the materials or equipment identified are necessarily the best available for the purpose. OSI/ISDN Trial Results 1 NISTIR 89-4160 August 1989 TABLE OF CONTENTS LIST OF FIGURES
    [Show full text]
  • Lora-Based Device-To-Device Smartphone Communication for Crisis Scenarios
    Jonas Höchst et al. LoRa-based Device-to-Device Smartphone Communication for Crisis Scenarios LoRa-based Device-to-Device Smartphone Communication for Crisis Scenarios Jonas Höchst Lars Baumgärtner University of Marburg, Germany Technical University of Darmstadt, Germany Technical University of Darmstadt, Germany [email protected] [email protected] Franz Kuntke Alvar Penning Technical University of Darmstadt, Germany University of Marburg, Germany [email protected] [email protected] Artur Sterz Bernd Freisleben University of Marburg, Germany University of Marburg, Germany Technical University of Darmstadt, Germany Technical University of Darmstadt, Germany [email protected] [email protected] ABSTRACT In this paper, we present an approach to facilitate long-range device-to-device communication via smartphones in crisis scenarios. Through a custom firmware for low-cost LoRa capable micro-controller boards, called rf95modem, common devices for end users can be enabled to use LoRa through a Bluetooth, Wi-Fi, or serial connection. We present two applications utilizing the flexibility provided by the proposed firmware. First, we introduce a novel device-to-device LoRa chat application that works a) on the two major mobile platforms Android and iOS and b) on traditional computers like notebooks using a console-based interface. Second, we demonstrate how other infrastructure-less technology can benefit from our approach by integrating it into the DTN7 delay-tolerant networking software. The firmware, the device-to-device chat application, the integration into DTN7, as well as the experimental evaluation code fragments are available under permissive open-source licenses. Keywords LoRa, Disaster Communication, Device-To-Device Communication, INTRODUCTION The communication technologies developed and deployed in the last decades are integral parts of our daily life and are used by mobile phones, computers, or smart applications in homes and cities.
    [Show full text]