This website uses cookies to ensure you have the best experience. Learn more

Real Time Protocol (Rtp) Essay

620 words - 3 pages


What is RTP (Real-time Transport Protocol)? The RTP is a simple way of sending and receiving encoded video, audio, and data in connectionless network sessions. It provides headers that give VoIP systems an easy way of selecting between multiple sessions on the same host machine. Throughout this paper, I will illustrate what the real-time transport protocol is, why it is used in transporting data, and some of the RFCs that are relevant to the RTP.
The RTP “provides end-to-end network transport functions suitable for applications transmitting real-time data, such as audio, video or simulation data, over multicast or unicast network services. RTP does not address resource reservation and does not guarantee quality-of-service for real-time services” (RFC 3550, 2003). In other words, it provides various forms of data a means to get to and from its source and destination. However, it does ...view middle of the document...

Without technologies like RTP, we wouldn’t be able have these kinds of transmissions. However, RTP isn’t able to all of this alone; there has to be some form of control in order for the technology to work. This is where RTCP (Real-Time Transport Control Protocol) comes into play. This protocol controls RTP’s media sessions and all of the collection of all of the data that is relevant to those sessions. Without RTCP, data would be getting lost in the void somewhere. Together though, RTP and RTCP provide several different functions. They packetize and transport digitized, encoded voice and/or video signals (including unique identification of each RTP stream), they multicast sessions for conferencing applications, and they handle basic performance feedback about the utilization of RTP media sessions. This means that systems administrators barely have to worry about these protocols inner workings because they practically run themselves upon implementation. Next, I will be discussing an RFC which puts RTP into a professional perspective.
RFC 1889 defines RTP as providing end-to-end delivery services for data with real-time characteristics, such as interactive audio and video. The services it’s referring to, includes payload type identification, sequence numbering, time stamping, and delivery monitoring. It goes on to describe the applications which are typically ran using RTP are on top of UDP because it makes use of its multiplexing and checksum services. Both protocols contribute parts of the transport protocol functionality.
In conclusion, the RTP is a protocol used to transport real-time video, audio, and data via network sessions (connected and connectionless). RTCP provides the control portion of RTP media transmissions; without it, RTP would not work properly. RFC 1889 and 3550 go into a lot of depth on what RTP is, and how it came about. RFC 1889 was obsoleted by 3550 in 2003.

Casner S.L., Frederick, R., Jacobson, V. (2003). RFC 3550. RTP A Transport Protocol for Real-Time Applications. The Internet Society. Retrieved from:
Some Frequently Asked Questions about RTP. (2004). Retrieved from:

Other Essays Like Real Time Protocol (Rtp)

Ntc 360 Network and Telecommunications Concepts

2413 words - 10 pages audio streams with VoIP solutions regardless if SIP, SCCP, or H.323 is used for signaling? Real Time Protocol (RTP) is used for audio streams over VoIP. Bibliography Freeman, Roger L., Practical Data Communications, Wiley Series Publication, 1995, pg. 137-145 Perlman, Radia, Interconnections: bridges, routers, switches and internetworking protocols, 2nd Ed., ISBN 0-201-63448-1, 1999, pg. 47 Seifert, Rich, ABC’s of Spanning Tree Protocol, Feb. 2006, pg. 2-3

Network Critque Essay

1890 words - 8 pages increase the revenue and will reduce the costs of operation throughout the Kudler Fine Foods stores. Kudler Fine Foods will go back up to technological speed as the network upgrade is completed, while at the same time improving the way they keep track of inventory and sales by using data mining techniques, which will be collected and analyzed in real time. Network Overview The review of the current network used at Kudler Fine Foods was able to

Environment - Kyoto Protocol

789 words - 4 pages warming and this can only be reached through international agreements. On the other hand, the protocol is only in force for the period of time between 2008-2012; afterwards a new agreement has to be made. Since there are no enforcing mechanisms or punishments for non-compliance the protocol will not be able to achieve real climate protection as most nations are more concerned about their economy and the two countries with the highest emissions, the

Ptional Protocol.Pdf

3156 words - 13 pages Protocol. Article 2 For the purpose of the present Protocol: (a) Sale of children means any act or transaction whereby a child is transferred by any person or group of persons to another for remuneration or any other consideration; (b) Child prostitution means the use of a child in sexual activities for remuneration or any other form of consideration; (c) Child pornography means any representation, by whatever means, of a child engaged in real

Dynamic Source Routing Protocol

5382 words - 22 pages at any time. The Dynamic Source Routing protocol (DSR) [Johnson 1994, Johnson 1996a, Broch 1999a] is a simple and efficient routing protocol designed specifically for use in multi-hop wireless ad hoc networks of mobile nodes. Using DSR, the network is completely self-organizing and self-configuring, requiring no existing network infrastructure or administration. Network nodes (computers) cooperate to forward packets for each other to allow

Service Request Sr-Rm-019

2550 words - 11 pages that connect to the network, the more slowly the network will function, which means the connection degrades, and because the protocol stack is big it requires time and bandwidth to transmit the information across the network. A set of standards is needed for all networks to use a protocol, which controls data transmission in a network. It is also considered necessary that the computer systems communicate on those same protocols to prevent

Somery of the Fall

4490 words - 18 pages Information Protocol RIS Remote Installation Service RISC Reduced Instruction Set Computer RJ-11 Registered Jack Function 11 RJ-45 Registered Jack Function 45 RMA Returned Materials Authorization ROM Read-Only Memory RTC Real-Time Clock SAN Storage Area Network SAS Serial Attached SCSI SATA Serial Advanced Technology Attachment SC Subscription Channel SCP Secure Copy Protection SCSI Small Computer System

A+ Super a+

4668 words - 19 pages Remote Desktop Protocol radio frequency radio frequency interference red green blue RAMBUS® inline memory module routing information protocol remote installation service reduced instruction set computer registered jack registered jack function 11 registered jack function 45 returned materials authorization read only memory recommended standard 232 real-time clock storage area network Serial Attached SCSI serial advanced technology attachment

Netw360 W7 Ilab Report

961 words - 4 pages . What type of software is Wireshark? Why is this important to users of Wireshark? Wireshark is a network protocol analyzer, and is the standard in many industries. It is the continuation of a project that started in 1998. Hundreds of developers around the world have contributed to it, and it is still under active development. Wireshark, a network analysis tool formerly known as Ethereal, captures packets in real time and display them in human

Windows NT

1168 words - 5 pages gets overloaded. The packet-switching nature of the Internet gives it sufficient speed and flexibility to support real-time communication, such as sending messages to other people in a chat environment (IRC). Every packet is written in a particular protocol language, called TCP/IP, which stands for Transmission Control Protocol/Internetworking Protocol. This protocol is the common language of the Internet, and it supports two major programs called


1421 words - 6 pages packet capture are by using the port stealing an attacker can steal the data of the user and can access the data illegally, so there is no confidentiality in the network. We can overcome this confidentiality by updating the FTP to the MFT which provides more security to the system, as it carry out the ad hoc file transfer and we can monitor the file transfer process in the real time. Which gives a lot of confidentiality to the system and the end user

Related Papers

Video Conferencing Essay

5176 words - 21 pages worldwide basis. The ITU has developed the H, G and T Series of standards whilst the IETF has developed Real-Time Protocol (RTP), Real-Time Control Protocol (RTCP) & Resource Reservation Protocol (RSVP). Transport Protocols. There are several standards based transport protocols used with conferencing, TCP, UDP & RTP. Generally, each configures the data into packets, with each packet having a 'header' that identifies its contents. The protocol

Networking Sip Trunking Essay

598 words - 3 pages from within an enterprise remains an IP Media stream and passes to anywhere else within the enterprise or to across the boundary of the enterprise to another enterprise via Internet protocol. In other words, a SIP trunk is the digital data transmission link with SIP protocol which signals interfaces recognizing SIP signals and SIP media protocols using the Real Time Protocol (RTP) for voice transmission (media) and Real Time Control Protocol

A Report To Critically Compare A Number Of Routing Protocols; Including Rip V2, Eigrp & Ospf

4252 words - 18 pages advantages of this are that fewer IP addresses are needed, and summarization can be controlled within the routing protocol EIGRP uses less bandwidth than other routing protocols as it does not use periodic updates, rather it uses bounded and partial updates. EIGRP uses reliable transport protocol (RTP) for the delivery and receipt of EIGRP packets. It can send these packets multicast or unicast, but has the address of reserved for

Wimax Technology Essay

5610 words - 23 pages Multicast Backbone) 177. _________ is designed for the transport of real-time data, such as audio and video streams. 1. FTP (File Transport Protocol) 2. Reliable Multicast Transport 3. RTP (Real-time Transport Protocol) 4. IGMP (Internet Group Management Protocol) 178. ___________ is for communication between a client and stored media server. 1. RTSP Protocol (Real Time Streaming Protocol) 2. RTCP (Real-time Control Transport Protocol) 3. IGMP