Font Size: a A A

Ip Multicast Media Stream Management And Security Mechanisms Of Desktop Video Conferencing Systems Study

Posted on:2003-02-08Degree:MasterType:Thesis
Country:ChinaCandidate:N GuiFull Text:PDF
GTID:2208360062990335Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the development of modern Network & communications technology, the intercommunions between people are growing more frequent So Video Conferencing System is becoming a hotspot of the research fields. This paper introduces the design and implement of a discussing conferencing system base the on IP network using COM object. This system has characteristics as real-time audio multicasting and video multicasting and it has such character that it can display multi-video and audio stream at the same time and require low system resource requirements. Besides, we proposed a practical secure model for IP Multicast A/V Conference and put it into practical use in our conferencing system. It has very good performance. At last, we also do some work in IP Multicast Security.This paper has five main sections: section one introduces the research status in this field > technical line* main work that we had done; Section two introduces the key technologies in implement this IP multicast conference system, such as COM technology > IP multicast ^ video & audio codes ; Section three proposes conference system architecture and the implement of this system. It introduces the main function of this system and gives some concrete example of its implement; section four proposed a practical secure model. This mode uses use the Session Descriptor Protocol, Security Subsystem of Win 2000 Active Directory and Secure Conference in NetMeeting. This model have the main features of security, flexibility and easy to deploy; Section five provide a further discuss in IP multicast security, especially in source authentication. We raise a new mode of An Efficient Multicast Source Authentication Scheme in Heterogeneous Networks. It effectively solve the source authentication problem in the heterogeneous networks with a little system resource requirement; section six give some test on this system and give some improving direction.
Keywords/Search Tags:IP multicast, COM, SDP, TAPI, Source Authentication
PDF Full Text Request
Related items