Essential Guide:  Audio Over IP - Making It Work

June 21st 2018 - 11:00 AM
by Tony Orme, Technology Editor at The Broadcast Bridge

Audio over IP (AoIP) has become one of the most important technologies to ever enter the media landscape. The protocol allows facilities to leverage today’s mature IP platforms for audio applications resulting in lower costs, faster installations, improved quality of service, all while creating a scalable and future-proof network.

With IP, applications are no longer dependent on the network or transport layers. And IP versions are available for the physical layers, including Ethernet, ATM and SDH over copper, fiber and radio links. Audio over IP technology has the advantage of being able to use the same networks and cabling found in most TV and production centers.

To help readers benefit from this technology, The Broadcast Bridge Technology Editor, Tony Orme, has written this Essential Guide, Audio Over IP – Making It work. You will learn about the benefits of AoIP and how the protocol and underlying hardware is independent of the data being carried, which makes distributing and interfacing between different formats and hardware easier than ever.

Readers will also learn about interfaces, the Open Systems Interconnection (OSI) model, UDP, gateways, Layer 2 and 3 switching and routing. The tutorial covers network timing and delays, VLANS, security, multicasting and much more.

Learn about the underlying principles of Audio over IP and how it can bring new operating benefits to any broadcast or production facility. Read the tutorial, Audio Over IP – Making It work.

Part of a series supported by

You might also like...

IP Monitoring & Diagnostics With Command Line Tools: Part 5 - Using Shell Scripts

Shell scripts enable you to edit your diagnostic and monitoring commands into a script file so they can be repeated without needing to type them manually every time. Shell scripts also offer some unique and powerful features that help to…

IP Monitoring & Diagnostics With Command Line Tools: Part 4 - SSH Public Keys

Installing public SSH keys created on your workstation in a server will authenticate you without needing a password. This streamlines the SSH interaction and avoids the need to use stored and visible passwords in your scripts.

IP Monitoring & Diagnostics With Command Line Tools: Part 3 - Monitoring Your Remote Systems

Monitoring what is happening in a remote system depends on being able to ask for something to be checked and having the results reported back to you. There are many ways to do this. This article looks at some simple…

IP Monitoring & Diagnostics With Command Line Tools: Part 2 - Testing Remote Connections

In the previous article, we set the scene for working with the Command Line Interface (CLI) on a UNIX system. Now we will explore some techniques for performing basic tests on our network infrastructure to check for potential problems.

IP Security For Broadcasters: Part 12 - Zero Trust

As users working from home are no longer limited to their working environment by the concept of a physical location, and infrastructures are moving more and more to the cloud-hybrid approach, the outdated concept of perimeter security is moving aside…