Essential Guide: Flexible IP Monitoring

April 16th 2021 - 09:30 AM
Tony Orme, Editor, The Broadcast Bridge

Video, audio and metadata monitoring in the IP domain requires different parameter checking than is typically available from the mainstream monitoring tools found in IT. The contents of the data payload are less predictable and packet distribution more tightly defined leading to the need to use specialist media stream centric monitoring tools.

Monitoring for broadcast is inherently more challenging than those used on generic enterprise IP networks as the dynamic nature of video and audio demands the essence streams be displayed on video monitors and heard on loudspeakers for it to make any sense.

This Essential Guide, with a sponsor’s perspective from Telestream, looks at why monitoring video, audio and metadata essence streams is more challenging in broadcast IP networks than those traditionally used in IT.

Packet spacing, stream decoding and metadata alignment all make greater demands on monitoring. Although we’ve now gone way beyond the features offered by waveform monitors and vectorscopes, they are still incredibly important to us, and they must now be adapted so they can be used within the context of integrated ST2110 IP networks.

Download this Essential Guide now if you are an engineer, technologist or their managers and you want to better understand how you can achieve integrating monitoring of IP networks with streaming video, audio and metadata in broadcast media facilities.

Supported by

You might also like...

IP Monitoring & Diagnostics With Command Line Tools: Part 5 - Using Shell Scripts

Shell scripts enable you to edit your diagnostic and monitoring commands into a script file so they can be repeated without needing to type them manually every time. Shell scripts also offer some unique and powerful features that help to…

IP Monitoring & Diagnostics With Command Line Tools: Part 4 - SSH Public Keys

Installing public SSH keys created on your workstation in a server will authenticate you without needing a password. This streamlines the SSH interaction and avoids the need to use stored and visible passwords in your scripts.

IP Monitoring & Diagnostics With Command Line Tools: Part 3 - Monitoring Your Remote Systems

Monitoring what is happening in a remote system depends on being able to ask for something to be checked and having the results reported back to you. There are many ways to do this. This article looks at some simple…

IP Monitoring & Diagnostics With Command Line Tools: Part 2 - Testing Remote Connections

In the previous article, we set the scene for working with the Command Line Interface (CLI) on a UNIX system. Now we will explore some techniques for performing basic tests on our network infrastructure to check for potential problems.

IP Security For Broadcasters: Part 12 - Zero Trust

As users working from home are no longer limited to their working environment by the concept of a physical location, and infrastructures are moving more and more to the cloud-hybrid approach, the outdated concept of perimeter security is moving aside…