What is IPTV? Internet Protocol television (IPTV)

Slides:



Advertisements
Similar presentations
GSC: Standardization Advancing Global Communications IP-based Multimedia Services Activities in CCSA Baohong He CCSA, China SOURCE:CCSA TITLE:IP-based.
Advertisements

Multimedia Systems Irek Defee IPTV IP + TV Providing television over IP networks.
IPTV Technology Kelum Vithana 25 May 2010.
A Comprehensive Approach to Internet Protocol Television.
IPTV for People who AREN’T Engineers by Shaun Carlson Arvig.
PHP syntax basics. Personal Home Page This is a Hypertext processor It works on the server side It demands a Web-server to be installed.
29.1 Chapter 29 Multimedia Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
INTERNATIONAL LAW ENFORCEMENT IP CRIME CONFERENCE SEPTEMBER 2014 LEN HYNDS CSO MODERN TIMES GROUP.
14 April Joint EW and MAGELLAN Workshop - QoS and Multimedia Communications for Heterogeneous Networks MAGELLAN project Tiia Sutinen VTT Oulu,
Dr. Philip Cannata 1 Principles of Network Applications.
CMPT771 Presentation Xu Cheng Internet Protocol Television (IPTV)
مرتضی امیرپناه 18 بهمن 93.  What is IPTV  Internet TV & IPTV  IPTV Services  IPTV Process  Future of IPTV.
Video Value Chains Case Study Update: The Evolution of Video Services Natalie Klym Research Associate, MIT May 31, 2007 Philadelphia,
Media streaming Joni Alhonen VBP07S 1/19. Multimedia, which is broadcasted simultaneously as it is played by the receiver 2/19.
IPTV Security ITX8040-Cyberdefence seminar Rait Teder 28.Nov.2011.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
INFOCOM, 2007 Chen Bin Kuo ( ) Young J. Won ( ) DPNM Lab.
VBox Confidential 1 TV Gateway : Adding the Home LAN Device into the payTV Acquisition.
1.1 What is the Internet What is the Internet? The Internet is a shared media (coaxial cable, copper wire, fiber optics, and radio spectrum) communication.
W EB R ESOURCES Michelle Stabile. PODCAST Video podcast is a term used for the online delivery of video on demand video clip content via Atom or RSS enclosures.
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
Interactive TV Team. Parts of software  Admin control panel (UI) Any control panel designed for a specific use, our target basketball game.  Restful.
IPTV. What is the IPTV? Internet Protocol Television— a digital television service is delivered using the Internet Protocol over a network infrastructure.
0 draft-lkchoi-mmusic-iptvdbs-req-00.txt 63rd IETF, 1 August 2005 Requirement of service provider for the Data Broadcasting Service over the IPTV Lark.
Streaming Media A technique for transferring data on the Internet so it can be processed as a steady and continuous stream.
Delivering Video over IP
Chapter 28. Network Management Chapter 29. Multimedia
Internet Protocol TeleVision
ITVP Platform: delivering interactive TV services over IP networks Miroslaw Czyrnek
INTERNET PROTOCOLS. Microsoft’s Internet Information Server Home Page Figure IT2031 UNIT-3.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
INTERNET AND PROTOCOLS For more notes and topics visit: eITnotes.com.
R Consulting Mobile IPTV Application
California State University, LA Presented by Amanda Steven StevenAamirObaid.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
UNAISE E.K ROLL NO:56.  Introduction  IPTV Services  IPTV Requirements  Network Architecture  IPTV Components  IPTV Security  Advantages  Limitation.
5/11/2009 IPTV 1 Guided By: Mr. Ankit Biscuitwala Prepared By: Nency P. Patel Roll No:37.
A PRESENTATION ON INTERNET PROTOCOL TELEVISION.
INTERNET PROTOCOL TELEVISION (IP-TV)
Securing Information Systems
Chapter 20: Multimedia Systems
TV Broadcasting What to look for Architecture TV Broadcasting Solution
Chapter 29 Multimedia Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Security, Social and Legal Issues Regarding Software and Internet
Internet, Intranet and Extranets
Chapter 20: Multimedia Systems
High Performance Computing Lab.
Internet, Intranet and Extranets
Some bits on how it works
Answer the questions to reveal the blocks and guess the picture.
Sharing makes life beautiful
INTERNET PROTOCOL TELEVISION (IP-TV)
Chapter 20: Multimedia Systems
Internet, Intranet and Extranets
TelcoTV 2009 Richard Griffiths.
PREPARED BY: RUMMY MIRANDA
Managing Online Services
Framtidens distribution av multimedia
Digital television systems - (DTS)
Lecture 2: Overview of TCP/IP protocol
Fire-wall.
Lecture 3: Secure Network Architecture
PRESENTATION ON IPTV.
Protocols 2 Key Revision Points.
The Need for Addressing
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Chapter 20: Multimedia Systems
Test 3 review FTP & Cybersecurity
Chapter 20: Multimedia Systems
Chapter 20: Multimedia Systems
Presentation transcript:

What is IPTV? Internet Protocol television (IPTV) IPTV is defined as multimedia services such as tv/video/audio/text/graphics/data delivered over IP based networks managed to provide the required level of quality of service and experience, security, interactivity and reliability.

IPTV history? 1994 first time television show was broadcast over internet by ABC - Word News Now. The term IPTV first appeared in 1995 with the founding of Precept Software by Judith Estrin and Bill Carrico. First continuous live webcasts started by Internet radio company AudioNet 10.Jan.1998

IPTV main services Live television Time-shifted television (replays) Video on demand (VOD) Radio broadcast Interactive applications (web browsing, e- mail, games and others) live television, with or without interactivity related to the current TV show; time-shifted television: catch-up TV (replays a TV show that was broadcast hours or days ago), start-over TV (replays the current TV show from its beginning); video on demand (VOD): browse a catalog of videos, not related to TV programming.

IPTV Architecture Content source (Video/stream store) Delivery and Management Network (Encode and stream servers. Multicast, Unicast) Home network (PC, TV, STB...)

IPTV Architecture 2

IPTV Security Objectives The main security objectives for IPTV service are: IPTV service should be high stable and high available. Only allowed people can access and operate on the IPTV services Abuse actions should be controlled to reduce garbage data. The IPTV service should be protected against unauthorized deletion, insertion, modification or replay attack. The IPTV service programs should be protected by copyrights.

IPTV Attacker's Goals Take control of home networks Service disruption Spreading worms, trojans, virus Broadcast own material (for political or other reasons) Steal the content For piracy or as simple as P2P TV source For free TV or VOD

IPTV Security Testing A combination of: Network penetration testing Web application security testing Device security testing Software vulnerability testing May also include Policy and procedure review

VOD Encryption Flow Process 1 The video stream enters the HTTP live streaming encoder. The encoder splits the continuous video stream into equal chunks of predefined duration (for example, 10s). The encoder transcodes each chunk into multiple different bit rates chunk files. 2 For each chunk, the encoder requests an encryption key from the VCAS for Internet TV server. The encoder encrypts each of the different bit rate chunk files with the provided encryption for the chunk. 3 The encoder creates the playlists and sends them together with the chunk files onto the HTTP content server. 4 A user device with a Verimatrix client requests the playlist for a particular piece of content from the content server. The Verimatrix client then requests the content key(s) from the VCAS for Internet TV server. 5 If the user's client device is authorized to receive the content key(s), the VCAS for Internet TV server returns the key(s) to the Verimatrix Client, and the client device can start decrypting and playing the content. If the user's client device is not authorized to receive the content key(s), the VCAS for Internet TV server denies the keys to the Verimatrix client in the client device

Verimatrix Encryption solusion

Verimatrix High-Level Architecture

Thank you for listening! Questions?