SlideShare uma empresa Scribd logo
1 de 28
Presentation
Title
Presenter
Date
DDS in the
Broadcast
Industry
Sandy Kellagher
Director of
Software Systems
www.s-a-m.comwww.s-a-m.com
Los Angeles
Toronto
New York
UK
Wiesbaden
Moscow
Paris
Madrid
Beijing
Tokyo
Sydney
Dubai
New Delhi
Hong Kong
Headquartered in the UK
550 Staff Worldwide, and growing
14 International Offices
www.s-a-m.comwww.s-a-m.com
www.s-a-m.comwww.s-a-m.com
ContentCreation
MediaDistribution
Management & Workflow
Infrastructure & Image Processing
Live
Production
Production
Editing
&
Finishing
Playout
&
Delivery
Our Market Place
Technologies for evolving media production ecosystems
Why did SAM choose DDS?
To migrate from disparate
existing in-house protocols…
To a single, unified,
open standard, high
performance standard
www.s-a-m.comwww.s-a-m.com
In-house protocols - RollCall
• RollCall was designed ~20 years ago for SAM’s IQ modular range of products:
• defines a proprietary (but openly published) set of messages and a wire protocol
• client-server protocol with various services (control, logging, file etc)
• all traffic end-to-end acknowledged
• ‘menu’ service provides metadata about (description of) controls offered
• allows generic GUI client to work with any RollCall device
• However, the simplicity of the protocol limits its usefulness for handling the
complex types of data structure involved in advanced router control
www.s-a-m.comwww.s-a-m.com
In-house protocols - DCCP
• DCCP is the SAM proprietary protocol used for advanced router control:
• is essentially an object-oriented remote procedure call mechanism
• devices are defined in XML and can have arbitrarily complex control sets
• DCCP framework allows ‘strongly typed’ client code interaction, with all
communication over the wire handled transparently by the framework
• DCCP framework supports persistence and replication of objects
• wire protocol recently adapted to improve performance over WAN links
• However, ongoing in-house support and development of DCCP (eg to
improve performance over WAN links or to support new platforms) is a
significant cost, and slows down product development
www.s-a-m.comwww.s-a-m.com
Desirable Protocol Characteristics
• So we wanted a protocol that could provide a solid and proven framework for
a unified future C&M solution across the full SAM product range:
• scalable to support many clients and large volumes of data
• high performance and light footprint
• cross-platform and open-standard
• available as a proven COTS solution rather than developed in-house
• mature ecosystem with multiple users, vendors and tool support
• support for persistence, redundancy and replication
• supports a distributed architecture
• automatic discovery of devices
• adaptable to different underlying transport mechanisms, eg LAN, WAN
• And RTI DDS Connext met all of these requirements
www.s-a-m.comwww.s-a-m.com
Key aspects of DDS
• Full name is OMG Data Distribution Service (DDS)
• Open standard with proven interoperability between several commercial
vendors (RTI, PrismTech, etc), as well as Open Source solutions
• DDS is a data-centric solution (ie modelled in terms of data ‘Topics’ rather
than messages exchanged)
• Basic underlying mechanism uses a ‘publish – subscribe’ model:
• effectively creates a distributed global data space
• designed to be scalable and perform well with large volumes of data
• Proven in safety- and performance-critical applications, eg military,
aerospace, air traffic control, NASA, medical, imaging, power utilities etc
www.s-a-m.comwww.s-a-m.com
DDS Framework
• DDS framework provides an extensive set of Quality of Service options:
• allows system to be ‘tuned’ for optimum performance based on user requirements
and underlying network features/performance
• Framework provides many advanced features as standard:
• redundancy and replication
• persistence
• automatic discovery
• security and authentication
• Application code becomes simpler and smaller, which leads to faster
product development…
www.s-a-m.comwww.s-a-m.com
Application to SAM
• Unified control and monitoring of all SAM broadcast products
• IP routing
• Media biometrics
Media Biometrics
www.s-a-m.comwww.s-a-m.com
What is Media Biometrics?
Media Biometrics is SAM’s unique
signature technology for video,
audio and metadata
Initial application is for Media
Assurance
www.s-a-m.comwww.s-a-m.com
What is Media Assurance?
Media Assurance is the act of
automatically checking and
verifying media throughout a
broadcast production chain
• Can be deployed in both
SDI and IP streaming
environments, and for files
• Media can be compared,
corrected and identified
Why?
• Improves efficiency
• Reduces the need for
skilled operators
• Reduces operational
cost
Unique
signatures
www.s-a-m.comwww.s-a-m.com
What are Biometric Signatures?
A set of numbers which represent each
frame of video, audio & metadata
• Low data rate enables many
hundreds of data sets to be stored or
streamed over an IP network
• Can be transported within VANC in
SDI / MXF or via IP using DDS
• Support for multiple audio channels
www.s-a-m.comwww.s-a-m.com
What Can You Do With Media Biometrics?
3562178865
7654299888
8765542344
6721663554
8642341561
5277731896
9066738712
0651823119
2784957718
Analyze them ….
• Video there ?
• Video still ?
• Video dark ?
• Audio present ?
• Audio level ?
Compare them …. fast
• Is the video the same ?
• Is the audio the same ?
• Absolute delay ?
• Lip sync ?
3562178865
3562178865
Identify them …. fast
• What video ?
• What audio ?
3562178865
UMID=2347654
Transport/Store them
• What video ?
• What audio ?
3562178865
UMID=2347654
www.s-a-m.comwww.s-a-m.com
What is Unique about our Media Biometrics Signatures?
It is resilient to …
www.s-a-m.comwww.s-a-m.com
Initial Media Assurance Applications
• Lip Sync detection & correction
• Audio mapping detection &
correction
• Confirmation two media streams
are the same
• Video / audio present
• Video stillish detection
Allows Monitoring by Exception
  !
www.s-a-m.comwww.s-a-m.com
Media Biometrics Philosophy
• Low cost Media Biometric Generation (MBG) points available
throughout the Live and File-based product range
• Analysis of data from these points within the SigMA system provides
licensed media assurance services for broadcast operations
• Comparison of two signatures within the SigMA system is referred to
as an Assurance Point (AP)
• Perfect fit with the publish-subscribe philosophy of DDS
www.s-a-m.comwww.s-a-m.com
Media Assurance System
Biometric Signature Generation Media Assurance Processing Monitoring by Exception
SAM Products
Switchers IP Stream
Kahuna 9600 MBG XS
Kahuna 6400
Kahuna 4800 File-based
MBG OD
Routers
Sirius 800 Playout
ICE/ICE OD
Modular/IQ
IQ SAM00 Biometric
IQ MBG Database
BioBank
SigMA RollCall/RollMap
SigMa Application
Media Assurance
SigMa Engine Management
Engine Management & Configuration
SigMa Engine
Multiple Correlation
Engines
SigMa License
Server
License Store
IQ IQ SAM00
www.s-a-m.comwww.s-a-m.com
IQSAM00 – Media Biometrics Generator with Assurance Point
Two Channel 3G/HD/SD-SDI SAM Media
Biometrics Generator Module with a single
Assurance Point
- Generate video and audio signatures
from 2 x SDI
- Signatures can be used locally or
published via DDS and IP multicast
- Integrated Assurance Point
- Standard IQ form-factor
- Monitoring by Exception with Rollcall
www.s-a-m.comwww.s-a-m.com
IQMBG80 – Media Biometrics Generator
Eight Channel 3G/HD/SD-SDI Media
Biometrics Generator Module
- Generates video & audio signatures from
8 SDI
- Signatures published via DDS and IP
multicast
- Standard IQ form-factor
- Space and cost efficient signature
generator
www.s-a-m.comwww.s-a-m.com
SigMA – Media Assurance Software
Licensed media assurance services in software
- Subscribes to signatures via DDS over IP multicast
- Scalable
- Supports monitoring by exception
- Central core for media assurance system
- Deploy on commodity IT equipment
- Deploy multiple Assurance Points simultaneously
www.s-a-m.comwww.s-a-m.com
Media Assurance System
• Assurance Point A – Compare
MBG 0 with MBG 1
• Assurance Point B – Compare
MBG 1 with MBG 2
• Assurance Point C – Compare
MBG 2 with MBG 3
Media Centre Head End
Monitoring
Receiver
Transmitter
Home
Satellite
IQ MBG/SAMMBG 0
Processing1 MBG 1 Processing2 MBG 2
MBG 3 Processing3
A B
C
SigMA
ASI
IP
SDI
Lines IN
Practical experience of DDS
www.s-a-m.comwww.s-a-m.com
Benefits and Caveats
• DDS provides a complete, proven and
scalable publish-subscribe framework
• There’s a comprehensive set of
configuration options (QoS settings)
• There’s extensive documentation
covering all aspects of DDS
• The data-centric publish-subscribe
model fits very well for many
applications
• DDS is a framework / toolkit, rather
than a solution for your application
• You’ll probably need help working out
the optimum set-up for your system!
• The details are well described, but it’s
harder to get the ‘big picture’
• Data-centric design is a major ‘mind
shift’ for engineers used to working
with transactional message-passing
protocols.
www.s-a-m.comwww.s-a-m.com
Benefits and Caveats (contd)
• Automatic discovery of units via IP
multicast is a neat feature.
• There are validated binaries for
standard platforms
• Connext Professional library may be
too big for your embedded device
• By default, data transfer is unicast.
• Good set of debug and analysis tools
• Does your network and/or Firewall
allow multicast? Across subnets?
• Is your favoured RTOS a mainstream
standard platform?
• DDS Connext Micro is designed for
devices with limited resources
• Can configure multicast data transfer
• Wire protocol is relatively complex
compared to in-house protocols.
DDS in the Broadcast Industry

Mais conteúdo relacionado

Destaque

Generic vehicle architecture
Generic vehicle architectureGeneric vehicle architecture
Generic vehicle architecture
Gerardo Pardo-Castellote
 
IoT - CONNECTED CAR - TECHNOLOGY TRENDS & OPPORTUNITIES - Harsha Bagur, Rober...
IoT - CONNECTED CAR - TECHNOLOGY TRENDS & OPPORTUNITIES - Harsha Bagur, Rober...IoT - CONNECTED CAR - TECHNOLOGY TRENDS & OPPORTUNITIES - Harsha Bagur, Rober...
IoT - CONNECTED CAR - TECHNOLOGY TRENDS & OPPORTUNITIES - Harsha Bagur, Rober...
Lounge47
 

Destaque (12)

Developing Mission-Critical Avionics and Defense Systems with Ada and DDS
Developing Mission-Critical Avionics and Defense Systems with Ada and DDSDeveloping Mission-Critical Avionics and Defense Systems with Ada and DDS
Developing Mission-Critical Avionics and Defense Systems with Ada and DDS
 
Generic vehicle architecture
Generic vehicle architectureGeneric vehicle architecture
Generic vehicle architecture
 
Connected Car by Ashish Bhasin
Connected Car by Ashish BhasinConnected Car by Ashish Bhasin
Connected Car by Ashish Bhasin
 
The Inside Story: Leveraging the IIC's Industrial Internet Security Framework
The Inside Story: Leveraging the IIC's Industrial Internet Security FrameworkThe Inside Story: Leveraging the IIC's Industrial Internet Security Framework
The Inside Story: Leveraging the IIC's Industrial Internet Security Framework
 
Tech Mahindra - Connected Engineering
Tech Mahindra - Connected EngineeringTech Mahindra - Connected Engineering
Tech Mahindra - Connected Engineering
 
How to Build the Connectivity Architecture for the Industrial Internet of Thi...
How to Build the Connectivity Architecture for the Industrial Internet of Thi...How to Build the Connectivity Architecture for the Industrial Internet of Thi...
How to Build the Connectivity Architecture for the Industrial Internet of Thi...
 
The Inside Story: GE Healthcare's Industrial Internet of Things (IoT) Archite...
The Inside Story: GE Healthcare's Industrial Internet of Things (IoT) Archite...The Inside Story: GE Healthcare's Industrial Internet of Things (IoT) Archite...
The Inside Story: GE Healthcare's Industrial Internet of Things (IoT) Archite...
 
ISO 26262 Approval of Automotive Software Components
ISO 26262 Approval of Automotive Software ComponentsISO 26262 Approval of Automotive Software Components
ISO 26262 Approval of Automotive Software Components
 
Secrets of Autonomous Car Design
Secrets of Autonomous Car DesignSecrets of Autonomous Car Design
Secrets of Autonomous Car Design
 
Cyber Security for the Connected Car
Cyber Security for the Connected Car Cyber Security for the Connected Car
Cyber Security for the Connected Car
 
IoT - CONNECTED CAR - TECHNOLOGY TRENDS & OPPORTUNITIES - Harsha Bagur, Rober...
IoT - CONNECTED CAR - TECHNOLOGY TRENDS & OPPORTUNITIES - Harsha Bagur, Rober...IoT - CONNECTED CAR - TECHNOLOGY TRENDS & OPPORTUNITIES - Harsha Bagur, Rober...
IoT - CONNECTED CAR - TECHNOLOGY TRENDS & OPPORTUNITIES - Harsha Bagur, Rober...
 
The Internet of Cars - Towards the Future of the Connected Car
The Internet of Cars - Towards the Future of the Connected CarThe Internet of Cars - Towards the Future of the Connected Car
The Internet of Cars - Towards the Future of the Connected Car
 

Mais de Real-Time Innovations (RTI)

Mais de Real-Time Innovations (RTI) (18)

A Tour of RTI Applications
A Tour of RTI ApplicationsA Tour of RTI Applications
A Tour of RTI Applications
 
Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...
Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...
Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...
 
The Inside Story: How the IIC’s Connectivity Framework Guides IIoT Connectivi...
The Inside Story: How the IIC’s Connectivity Framework Guides IIoT Connectivi...The Inside Story: How the IIC’s Connectivity Framework Guides IIoT Connectivi...
The Inside Story: How the IIC’s Connectivity Framework Guides IIoT Connectivi...
 
Upgrade Your System’s Security - Making the Jump from Connext DDS Professiona...
Upgrade Your System’s Security - Making the Jump from Connext DDS Professiona...Upgrade Your System’s Security - Making the Jump from Connext DDS Professiona...
Upgrade Your System’s Security - Making the Jump from Connext DDS Professiona...
 
The Low-Risk Path to Building Autonomous Car Architectures
The Low-Risk Path to Building Autonomous Car ArchitecturesThe Low-Risk Path to Building Autonomous Car Architectures
The Low-Risk Path to Building Autonomous Car Architectures
 
Introduction to RTI DDS
Introduction to RTI DDSIntroduction to RTI DDS
Introduction to RTI DDS
 
How to Design Distributed Robotic Control Systems
How to Design Distributed Robotic Control SystemsHow to Design Distributed Robotic Control Systems
How to Design Distributed Robotic Control Systems
 
Fog Computing is the Future of the Industrial Internet of Things
Fog Computing is the Future of the Industrial Internet of ThingsFog Computing is the Future of the Industrial Internet of Things
Fog Computing is the Future of the Industrial Internet of Things
 
The Inside Story: How OPC UA and DDS Can Work Together in Industrial Systems
The Inside Story: How OPC UA and DDS Can Work Together in Industrial SystemsThe Inside Story: How OPC UA and DDS Can Work Together in Industrial Systems
The Inside Story: How OPC UA and DDS Can Work Together in Industrial Systems
 
Space Rovers and Surgical Robots: System Architecture Lessons from Mars
Space Rovers and Surgical Robots: System Architecture Lessons from MarsSpace Rovers and Surgical Robots: System Architecture Lessons from Mars
Space Rovers and Surgical Robots: System Architecture Lessons from Mars
 
Advancing Active Safety for Next-Gen Automotive
Advancing Active Safety for Next-Gen AutomotiveAdvancing Active Safety for Next-Gen Automotive
Advancing Active Safety for Next-Gen Automotive
 
Learn About FACE Aligned Reference Platform: Built on COTS and DO-178C Certif...
Learn About FACE Aligned Reference Platform: Built on COTS and DO-178C Certif...Learn About FACE Aligned Reference Platform: Built on COTS and DO-178C Certif...
Learn About FACE Aligned Reference Platform: Built on COTS and DO-178C Certif...
 
How the fusion of time sensitive networking, time-triggered ethernet and data...
How the fusion of time sensitive networking, time-triggered ethernet and data...How the fusion of time sensitive networking, time-triggered ethernet and data...
How the fusion of time sensitive networking, time-triggered ethernet and data...
 
Cybersecurity Spotlight: Looking under the Hood at Data Breaches and Hardenin...
Cybersecurity Spotlight: Looking under the Hood at Data Breaches and Hardenin...Cybersecurity Spotlight: Looking under the Hood at Data Breaches and Hardenin...
Cybersecurity Spotlight: Looking under the Hood at Data Breaches and Hardenin...
 
Data Distribution Service Security and the Industrial Internet of Things
Data Distribution Service Security and the Industrial Internet of ThingsData Distribution Service Security and the Industrial Internet of Things
Data Distribution Service Security and the Industrial Internet of Things
 
IoT and M2M Safety and Security
IoT and M2M Safety and Security 	IoT and M2M Safety and Security
IoT and M2M Safety and Security
 
Slash Avionics Integration Costs with DO-178C Certifiable Connectivity Software
Slash Avionics Integration Costs with DO-178C Certifiable Connectivity SoftwareSlash Avionics Integration Costs with DO-178C Certifiable Connectivity Software
Slash Avionics Integration Costs with DO-178C Certifiable Connectivity Software
 
Weather Information System Airport and Decision Support (WISADS)
Weather Information System Airport and Decision Support (WISADS)Weather Information System Airport and Decision Support (WISADS)
Weather Information System Airport and Decision Support (WISADS)
 

Último

Último (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

DDS in the Broadcast Industry

  • 2. www.s-a-m.comwww.s-a-m.com Los Angeles Toronto New York UK Wiesbaden Moscow Paris Madrid Beijing Tokyo Sydney Dubai New Delhi Hong Kong Headquartered in the UK 550 Staff Worldwide, and growing 14 International Offices
  • 4. www.s-a-m.comwww.s-a-m.com ContentCreation MediaDistribution Management & Workflow Infrastructure & Image Processing Live Production Production Editing & Finishing Playout & Delivery Our Market Place Technologies for evolving media production ecosystems
  • 5. Why did SAM choose DDS? To migrate from disparate existing in-house protocols… To a single, unified, open standard, high performance standard
  • 6. www.s-a-m.comwww.s-a-m.com In-house protocols - RollCall • RollCall was designed ~20 years ago for SAM’s IQ modular range of products: • defines a proprietary (but openly published) set of messages and a wire protocol • client-server protocol with various services (control, logging, file etc) • all traffic end-to-end acknowledged • ‘menu’ service provides metadata about (description of) controls offered • allows generic GUI client to work with any RollCall device • However, the simplicity of the protocol limits its usefulness for handling the complex types of data structure involved in advanced router control
  • 7. www.s-a-m.comwww.s-a-m.com In-house protocols - DCCP • DCCP is the SAM proprietary protocol used for advanced router control: • is essentially an object-oriented remote procedure call mechanism • devices are defined in XML and can have arbitrarily complex control sets • DCCP framework allows ‘strongly typed’ client code interaction, with all communication over the wire handled transparently by the framework • DCCP framework supports persistence and replication of objects • wire protocol recently adapted to improve performance over WAN links • However, ongoing in-house support and development of DCCP (eg to improve performance over WAN links or to support new platforms) is a significant cost, and slows down product development
  • 8. www.s-a-m.comwww.s-a-m.com Desirable Protocol Characteristics • So we wanted a protocol that could provide a solid and proven framework for a unified future C&M solution across the full SAM product range: • scalable to support many clients and large volumes of data • high performance and light footprint • cross-platform and open-standard • available as a proven COTS solution rather than developed in-house • mature ecosystem with multiple users, vendors and tool support • support for persistence, redundancy and replication • supports a distributed architecture • automatic discovery of devices • adaptable to different underlying transport mechanisms, eg LAN, WAN • And RTI DDS Connext met all of these requirements
  • 9. www.s-a-m.comwww.s-a-m.com Key aspects of DDS • Full name is OMG Data Distribution Service (DDS) • Open standard with proven interoperability between several commercial vendors (RTI, PrismTech, etc), as well as Open Source solutions • DDS is a data-centric solution (ie modelled in terms of data ‘Topics’ rather than messages exchanged) • Basic underlying mechanism uses a ‘publish – subscribe’ model: • effectively creates a distributed global data space • designed to be scalable and perform well with large volumes of data • Proven in safety- and performance-critical applications, eg military, aerospace, air traffic control, NASA, medical, imaging, power utilities etc
  • 10. www.s-a-m.comwww.s-a-m.com DDS Framework • DDS framework provides an extensive set of Quality of Service options: • allows system to be ‘tuned’ for optimum performance based on user requirements and underlying network features/performance • Framework provides many advanced features as standard: • redundancy and replication • persistence • automatic discovery • security and authentication • Application code becomes simpler and smaller, which leads to faster product development…
  • 11. www.s-a-m.comwww.s-a-m.com Application to SAM • Unified control and monitoring of all SAM broadcast products • IP routing • Media biometrics
  • 13. www.s-a-m.comwww.s-a-m.com What is Media Biometrics? Media Biometrics is SAM’s unique signature technology for video, audio and metadata Initial application is for Media Assurance
  • 14. www.s-a-m.comwww.s-a-m.com What is Media Assurance? Media Assurance is the act of automatically checking and verifying media throughout a broadcast production chain • Can be deployed in both SDI and IP streaming environments, and for files • Media can be compared, corrected and identified Why? • Improves efficiency • Reduces the need for skilled operators • Reduces operational cost Unique signatures
  • 15. www.s-a-m.comwww.s-a-m.com What are Biometric Signatures? A set of numbers which represent each frame of video, audio & metadata • Low data rate enables many hundreds of data sets to be stored or streamed over an IP network • Can be transported within VANC in SDI / MXF or via IP using DDS • Support for multiple audio channels
  • 16. www.s-a-m.comwww.s-a-m.com What Can You Do With Media Biometrics? 3562178865 7654299888 8765542344 6721663554 8642341561 5277731896 9066738712 0651823119 2784957718 Analyze them …. • Video there ? • Video still ? • Video dark ? • Audio present ? • Audio level ? Compare them …. fast • Is the video the same ? • Is the audio the same ? • Absolute delay ? • Lip sync ? 3562178865 3562178865 Identify them …. fast • What video ? • What audio ? 3562178865 UMID=2347654 Transport/Store them • What video ? • What audio ? 3562178865 UMID=2347654
  • 17. www.s-a-m.comwww.s-a-m.com What is Unique about our Media Biometrics Signatures? It is resilient to …
  • 18. www.s-a-m.comwww.s-a-m.com Initial Media Assurance Applications • Lip Sync detection & correction • Audio mapping detection & correction • Confirmation two media streams are the same • Video / audio present • Video stillish detection Allows Monitoring by Exception   !
  • 19. www.s-a-m.comwww.s-a-m.com Media Biometrics Philosophy • Low cost Media Biometric Generation (MBG) points available throughout the Live and File-based product range • Analysis of data from these points within the SigMA system provides licensed media assurance services for broadcast operations • Comparison of two signatures within the SigMA system is referred to as an Assurance Point (AP) • Perfect fit with the publish-subscribe philosophy of DDS
  • 20. www.s-a-m.comwww.s-a-m.com Media Assurance System Biometric Signature Generation Media Assurance Processing Monitoring by Exception SAM Products Switchers IP Stream Kahuna 9600 MBG XS Kahuna 6400 Kahuna 4800 File-based MBG OD Routers Sirius 800 Playout ICE/ICE OD Modular/IQ IQ SAM00 Biometric IQ MBG Database BioBank SigMA RollCall/RollMap SigMa Application Media Assurance SigMa Engine Management Engine Management & Configuration SigMa Engine Multiple Correlation Engines SigMa License Server License Store IQ IQ SAM00
  • 21. www.s-a-m.comwww.s-a-m.com IQSAM00 – Media Biometrics Generator with Assurance Point Two Channel 3G/HD/SD-SDI SAM Media Biometrics Generator Module with a single Assurance Point - Generate video and audio signatures from 2 x SDI - Signatures can be used locally or published via DDS and IP multicast - Integrated Assurance Point - Standard IQ form-factor - Monitoring by Exception with Rollcall
  • 22. www.s-a-m.comwww.s-a-m.com IQMBG80 – Media Biometrics Generator Eight Channel 3G/HD/SD-SDI Media Biometrics Generator Module - Generates video & audio signatures from 8 SDI - Signatures published via DDS and IP multicast - Standard IQ form-factor - Space and cost efficient signature generator
  • 23. www.s-a-m.comwww.s-a-m.com SigMA – Media Assurance Software Licensed media assurance services in software - Subscribes to signatures via DDS over IP multicast - Scalable - Supports monitoring by exception - Central core for media assurance system - Deploy on commodity IT equipment - Deploy multiple Assurance Points simultaneously
  • 24. www.s-a-m.comwww.s-a-m.com Media Assurance System • Assurance Point A – Compare MBG 0 with MBG 1 • Assurance Point B – Compare MBG 1 with MBG 2 • Assurance Point C – Compare MBG 2 with MBG 3 Media Centre Head End Monitoring Receiver Transmitter Home Satellite IQ MBG/SAMMBG 0 Processing1 MBG 1 Processing2 MBG 2 MBG 3 Processing3 A B C SigMA ASI IP SDI Lines IN
  • 26. www.s-a-m.comwww.s-a-m.com Benefits and Caveats • DDS provides a complete, proven and scalable publish-subscribe framework • There’s a comprehensive set of configuration options (QoS settings) • There’s extensive documentation covering all aspects of DDS • The data-centric publish-subscribe model fits very well for many applications • DDS is a framework / toolkit, rather than a solution for your application • You’ll probably need help working out the optimum set-up for your system! • The details are well described, but it’s harder to get the ‘big picture’ • Data-centric design is a major ‘mind shift’ for engineers used to working with transactional message-passing protocols.
  • 27. www.s-a-m.comwww.s-a-m.com Benefits and Caveats (contd) • Automatic discovery of units via IP multicast is a neat feature. • There are validated binaries for standard platforms • Connext Professional library may be too big for your embedded device • By default, data transfer is unicast. • Good set of debug and analysis tools • Does your network and/or Firewall allow multicast? Across subnets? • Is your favoured RTOS a mainstream standard platform? • DDS Connext Micro is designed for devices with limited resources • Can configure multicast data transfer • Wire protocol is relatively complex compared to in-house protocols.

Notas do Editor

  1. Unique signatures are used to provide a content monitoring solution that may be deployed in SDI or IP-streaming broadcast environments. The signatures can be stored and compared at every stage of the production chain to provide automatic checking and verification of video and audio streams--allowing for a fully automated business model. Various aspects are handled including identification of correct media, track mapping, lip sync, logo assurance, and other essential data. The solution is resilient to format, frame-rate and aspect ratio conversions and encode/decode processes and allows monitoring of the content delivered to the end customer. In order to provide true monitoring by exception, the solution responds reliably and rapidly to changing material and content.
  2. Our unique proprietary technology is: Resilience to format conversion and aspect ratio conversion Resilience to encoding and decoding Resilience to colour correction, proc-amps, RGB legalization Resilience to frame rate conversion …and fast acquisition and re-acquisition (~ 2 seconds)
  3. One of the key things with the media biometrics system is to be able to generate media biometrics signatures cheaply and easily to allow a vast array of data from the system to be available for analysis by the server. IQMGB80 is the first step in cost reducing this technology by providing IP signatures for up to 8 SDI inputs on a single card for around $200 per channel. Generates video and audio biometric signatures from 8 independent SDI inputs for IP transmission to Sigma Media Assurance Software