Please note that index links point to page beginnings from the print edition. Locations are approximate in e-readers, and you may need to page down one or more times after clicking a link to get to the indexed material.
1 Gbps (or Gigabit) Ethernet, 119, 121–122
4:1:1 sampling, digital video, 216–217
4:2:2 sampling, digital video, 216
4:4:4 sampling, digital video, 216
10 Gbps Ethernet (10 Gigabit Ethernet), 119
10 Mbps (classic) Ethernet, 119–121
40/100 Gbps Ethernet, 119, 123–124
100 Mbps (Fast) Ethernet, 119–121
100Base-T Ethernet, 120
802.1x, EAP, 348
1000Base-X Ethernet, 120
A
AAC (Advanced Audio Coding), 218
access control
NAC (network access control), 347
planning remote management reporting, 297–298
security best practices, 334
security requirements for PetroGastro project, 396
UNIX OSs, 75–76
Windows NOSs, 73–74
accountability, planning remote management system, 296
accredited standards developer (ASD), ANSI, 17
ACLs (access control lists), 348
Active Directory
history of, 71–72
overview of, 73
ad hoc block, multicast addressing, 230–231
address resolution protocol. see ARP (address resolution protocol)
administratively scoped block, multicast addressing, 230–231
Advanced Audio Coding (AAC), 218
Advanced Encryption Standard (AES), 353
Advanced Video Coding (AVC), 222
Advanced Video Coding (H.264 AVC)
lossless video compression, 218
MPEG-4 Part 10 as, 222
AES (Advanced Encryption Standard), 353
aggregation, in data retention, 306
alarm messages, in remote management and response, 297–299
alerts, in remote management and response, 298–300
ALG (Application Layer gateway)
external conferencing with, 279–280
how they work, 344
alien cross talk (AXT), 31
American National Standards Institute (ANSI)
InfoComm International as, 17
simplex communication, 60–61
analog-to-digital encoding, 54–58
animated text, in digital signage, 245
ANSI (American National Standards Institute)
InfoComm International as, 17
simplex communication, 60–61
antimalware software, 346
antivirus software, 346
any-source multicast (ASM), 229
Apache web server, 78–79
Apple Lossless audio compression, 218
appliances, as digital signage players, 249–250
application integration, in smart buildings, 302
Application Layer gateway (ALG)
external conferencing with, 279–280
how they work, 344
Application Layer, TCP/IP stack, 138
architecture, network
client-server, 14–15
designing physical topology for
AV, 98
hybrid, 16
peer-to-peer, 15–16
planning remote management system, 297
remote management and monitoring and, 286–288
ARP (address resolution protocol)
displaying contents of ARP cache, 375–376
overview of, 138–139
subnetting within organization and, 177
arp utility, 375–376
ARPANET, 4
ASD (accredited standards developer), ANSI, 17
ASM (any-source multicast), 229
assessment, in needs analysis, 94–95
assignment, of IP addresses, 156–158
attack vectors
Trojan horses, 340
viruses, 340
attenuation
baseband limited by, 52
transmission media problems, 31
audience
conferencing needs analysis, 256
streaming AV needs analysis, 205, 208
Audinate, 129–130
audio
Audio Video Bridging protocol. see AVB (Audio Video Bridging) protocol
bandwidth, 214–215
compression, 219
DRM (digital rights management), 236
high-quality compressed images and, 223
managing streaming audio, 235
standards, 271–272
Audio Video Bridging protocol. see AVB (Audio Video Bridging) protocol
audit tools, third-party security, 345
authentication
gatekeeper/SIP conferencing business rules, 275
UNIX, 75–76
AV narrative, 314
availability
bandwidth and, 52–53
bandwidth capacity and, 210
designing for, 91–93
fault tolerance and, 105
security and, 103–105
AVB (Audio Video Bridging) protocol
Ethernet requirements, 125–126
overview of, 123–125
topologies, 126–127
transporting real-time AV with, 45–46
AVC (Advanced Video Coding), 222
lossless video compression, 218
AVnu Alliance, 125
awareness training, email attachments and, 336
AXT (alien cross talk), 31
B
backward compatibility, Ethernet and, 121–122
bandwidth
AV program, 217
baseband, 52–53
broadband, 53–54
codec selection, 219
conferencing needs analysis, 256
Dante not requiring dedicated, 129–130
detailing AV requirements in SLA, 327
determining streaming/bandwidth speed for project, 391
ensuring QoS, 106
EtherSound requirements, 127
fiber-optic cable offering high, 27
gatekeeper/SIP conferencing business rules, 275
image quality and available, 217–218
limiting usage with multicast, 227
MCU requirements, 265
mitigating videoconferencing requirements, 274–275
multiple endpoints and, 272–273
overview of, 51–52
Q-Sys not requiring dedicated, 131
review Q & A, 62–63
review summary, 61
streaming and, 204–207, 209–210, 213–218
switch considerations, 69
traffic shaping or policing for insufficient, 328
videoconferencing and, 274
VPNs increasing overhead of, 350
bandwidth throttling, 210
baseband
overview of, 52–53
baselines/benchmarks, in network maintenance, 378
basic rate ISDN (BRI), 43
B-frames (bidirectional frames), GoP, 221
BGP (Border Gateway Protocol), 192
bidirectional frames (B-frames), GoP, 221
binary code, encoding wave sent across network as, 54
binary numbering
hexadecimal numbering vs., 146–147
overview of, 145
representing IP addresses and subnets, 147–148
bipolar encoding, 60
bit depth
AV bandwidth and, 214–215
encoded digital signals, 56–58
MP3, 219
bit rate (bps)
AV bandwidth and, 214–215
conferencing and bandwidth formula, 271–272
videoconferencing bandwidth requirements, 275
blended machines, 69
Bluetooth, in wireless transmission, 28
Border Gateway Protocol (BGP), 192
bottlenecks, bandwidth, 53
bps. see bit rate (bps)
BRI (basic rate ISDN), 43
bridges, AVB, 125
broadband
baseband vs., 67
overview of, 53–54
broadcast addresses, IPv4, 154, 174–175
broadcast domains
IP addresses, 148
as network segments, 172
VLANs, 173
broadcast messages
ARP using, 139
as simplex communication, 60
broadcast video service class, QoS, 107–108
building(s)
designing physical topology for AV, 98
planning structured cabling, 99
smart, 302
bus topology, LAN
AVB working in, 127
defined, 9
business case
audience needs analysis, 205
streaming AV needs analysis, 204
business units, in designing
organizational structure, 100–101
bytes
IPv4 addresses, 148–149
IPv6 addresses, 150–151
C
cable Internet access, 44
cabling
CAT, 33–39
copper, 26
designing physical topology, 98
documenting with tone generator, 364–365
ensuring fault tolerance, 105
Ethernet, 45
LAN topologies, 9–10
planning structured, 99
system design, 99
testing, 364–366
transmission problems, 31
WAN topologies, 10–12
WLANs not defined by, 12
cache memory, 77–78
caching servers
managing multiple unicast streams, 225
overview of, 234–235
carrier sense multiple access with collision detection (CSMA/CD), 45, 118
Cascading Style Sheets (CSS), 17
CAT (category) cabling
crosstalk in, 31
documenting with tone generator, 364
Fast Ethernet and, 121
networked AV systems and, 33–35
RJ-45 connectors, 35–39
testing, 364
CAT5 (category 5) cable, 34
CAT5e (category 5e) cable, 34
CAT6 (category 6) cable, 34–36
CBR (constant bit rate), 219
CCMP (Counter Cipher Mode with Block Chaining Message Authentication Code Protocol), for WPA2, 353
CDN (content delivery network), 235
central processing units. see CPUs (central processing units)
certificates, digital, 349
Certified Technology Specialist Exam Guide, Second Edition (McGraw-Hill Education, 2013), 33
Challenge Handshake Authentication Protocol (CHAP), 347
channels, in digital audio bandwidth, 214–215
CHAP (Challenge Handshake Authentication Protocol), 347
CIA (confidentiality, integrity, and availability), 103–105
CIDR (classless interdomain routing) notation
calculating IPv4 subnets, 177–178
EIGRP used on, 192
IPv4, 149
IPv6, 151
circuit-switched networks, 4–5
cladding, fiber optics, 27
Class D addresses, 226, 230–231
classes
IPv4 network, 148–149
service, 106–108
Classic Ethernet, 119–121
classless interdomain routing (CIDR) notation. see CIDR (classless interdomain routing) notation
CLI (command-line interface)
arp utility, 375
Ipconfig and Ifconfig utilities, 373–374
Netstat utility, 374
Nslookup utility, 376
Ping, 369–371
Traceroute, 373
clients
client-server architecture, 14–16
multicast streaming, 226
unicast streaming, 225
client-server architecture, 14–16
clock speed, CPU I/O ports determining, 78
Clock strata, 87
cloning servers, with disk images, 307
cloud storage
evaluating cloud-based monitoring, 307–308
NoSQL as cloud-based database, 82
overview of, 86
clustering, NAS servers, 85
coating, fiber optics, 27
coaxial cable
10 Mbps Ethernet designed for, 120
as common Physical Layer connection, 32
COBIT (Control Objectives for Information and Related Technology), 102
CobraCAD tool, 129
CobraNet
integrating systems into Q-Sys, 130
overview of, 128–129
placing all devices on single VLAN, 173
transporting real-time AV with, 45–46
codecs
choosing, 221
encoders, 233
for high-quality compressed images, 224
overview of, 218–219
wrappers vs., 220
collections, NoSQL, 82
collision domains, as network segments, 172
combination event, in alarm notification and response plan, 300
command-line interface. see CLI (command-line interface)
common intermediate format (PAL)
conferencing media, 271
digital video bandwidth, 215
common-carrier topology, WAN, 10–11
components
network, 65–70
server, 77–80
SLA, 322
compression. see content compression and encoding
computers, digital signage and, 249–253
concept design report, 314
conferencing
calling across networks, 275–280
H.323 gatekeepers and, 260–261
inventorying networked devices in project planning, 388–390
needs analysis, 255–257
network device inventory and, 197
overview of, 255
review Q & A, 281–284
review summary, 281
routing modes, 262–263
session negotiation, 257
session protocols, 258–260
SIP servers, 261–262
where to install gatekeeper or SIP server, 263–264
conferencing, with multiple endpoints
bandwidth and, 272–273
categories of endpoints, 265–267
conferencing as a stream, 269
dedicated links for videoconferencing, 273–274
digital audio standards, ITU, 271–272
directory integration and, 267–268
E.164 addressing, 268–269
gatekeeper/SIP server business rules, 275
MCU, 264–265
mitigating bandwidth requirements of videoconferencing, 274–275
overview of, 264
SIP and unified communications, 269–270
types of conferencing media, 270–271
videoconferencing latency, 274
confidentiality, ensuring security, 103–105
configuration, of remote management system, 292–293
connectionless protocols, 188
connection-oriented protocols, 188
connectivity
defining network connections, 3
diagnosing issues with, 144
digital signage system and, 249
testing network connections with Netstat, 373
connectors
CAT cabling, 35–39
fiber-optic cabling, 40–42
console ports, vulnerability of open, 334
constant bit rate (CBR), 219
content
bandwidth of, 213–218
conferencing needs analysis, 256
streaming needs analysis, 205–208
content compression and encoding
choosing codec, 221
codecs, 218–219
digital AV compression, 219–221
high-quality compressed images, 223–224
high-quality streaming video, 221–222
overview of, 218
transcoding and intelligent streaming, 224
content delivery network (CDN), 235
Content Scrambling System (CSS), 207
continuity, using UDP for, 190
continuous presence mode, MCUs, 264
control mechanisms, digital signage, 244–245
Control Objectives for Information and Related Technology (COBIT), 102
control systems, growing into management systems, 294–295
copyrighted content, 206–207
corrective action, troubleshooting remote management, 296
cost
of green network devices, 101
of networked AV systems, 5
of remote management system, 296–297
Wi-Fi disadvantages, 30
Counter Cipher Mode with Block Chaining Message Authentication Code Protocol (CCMP), for WPA2, 353
CPUs (central processing units)
I/O ports on, 78
overview of, 77
running multiple VMs, 86
critical events, in alarm notification and response plan, 300
cross talk (XT), transmission media problems, 31
crossed cables, CAT cable failure, 38
crossover cables, 39
CSMA/CD (carrier sense multiple access with collision detection), 45, 118
CSS (Cascading Style Sheets), 17
CSS (Content Scrambling System), 207
CSV (spreadsheet) export, for data retention, 306
customers
customizing digital signage content for, 245–247
defining, 93
digital signage solutions and, 242–243
is not always right, 95–96, 317
needs analysis for, 93–95
network design driven by, 92–93
readiness for networked AV, 96
security posture and AV design, 341
setting expectation with SLAs, 315–316
D
DAC (discretionary access control) model, UNIX, 75
daisy-chain topology, 127–128
Dante, 129–130
DARPA (Defense Advanced Research Projects Agency), 4
data
retention policies, 305–307
scoping remote monitoring system, 303–305
data field
IPv4 packet, 142
IPv6 packet, 143
Data Link Layer (Layer 2)
CobraNet using, 128–129
Ethernet as main technology of, 117
EtherSound using, 127–128
MPLS and, 351
and networked AV, 45–47
overview of, 24
data servers, 81–82
data throughput, 52
data transfer
Transport Layer protocols for, 187–190
troubleshooting with OSI model, 22
data transmission
bandwidth, 51–54
differentiated service categories for, 106–108
duplex communication method, 62
encoding, 54–60
overview of, 60
QoS, 106
review Q & A, 62–63
review summary, 61
simplex communication method, 60–61
database feeds, for dynamic digital signage content, 246
database management system (DBMS), 81
database servers, 81–82
database storage, for management system, 306
datagrams, fragmenting, 143
DBMS (database management system), 81
DCHP (dynamic host configuration protocol), 157–158
decimal numbering
binary numbering vs., 145
hexadecimal numbering vs., 146
overview of, 145
decoders, delivering streaming media, 233
dedicated links
of circuit-switched networks, 4–5
for videoconferencing, 274–275
Defense Advanced Research Projects Agency (DARPA), 4
delay encoding, 60
delivery mechanisms, digital signage, 244
demilitarized zone (DMZ)
sample digital signage network, 251–252
videoconferencing in, 278–279
denial of service (DoS) attacks, 337
design, networked AV
customer is not always right, 95–96
customer readiness, 96
electrical and HVAC, 101
ensuring quality, 105–108
ensuring security, 101–105
implementation, 108–110
needs analysis, 91–95
organizational structure, 99–101
overview of, 91
physical topology, 97–98
review Q & A, 111–114
review summary, 110–111
structured cabling, 99
design, streaming system
multicast addressing, 230–231
multicast implementation, 228–230
other streaming protocols, 225
overview of, 224
unicast and multicast, 225–228
video-on-demand, 231–232
desktop systems, conferencing endpoints, 266–267
destination address field, IPv4 packet, 141
destination address field, IPv6 packet, 143
device files, UNIX, 75
device-management systems
alternatives to SNMP communication, 289–291
basic reporting, 291–292
remote management and monitoring, 286
SNMP on, 288
devices
documenting AV protocols and, 195–197
integrating into management systems, 305
inventorying in project planning, 388–390
monitoring data with SMMP, 304
planning management system architecture, 297
profiles, 293
scoping remote management and monitoring system, 303
SNMP for communication of subsystems and, 288
troubleshooting by rebooting, 296
diagnostics
ICMP tools, 368
using loopback address for, 156
dial plan, conferencing across networks, 277
dial rules, 275
differentiated service. see DiffServ (differentiated service)
differentiated services code point (DSCP) field, IPv4 packet, 140–141
DiffServ (differentiated service)
ensuring QoS with DiffServ class, 106–108
RSVP used with, 210
streaming and QoS, 211
Digigram, 127
digital certificates, implementing encryption, 349
digital content bandwidth
digital audio bandwidth, 214–215
digital video bandwidth, 215–217
image quality vs. available bandwidth, 217–218
overview of, 213–214
total program size, 217
digital rights management (DRM)
audio files and, 236
copyright owners using, 207
digital signage
basics, 241–243
content, 245–247
content configuration, 247–248
controlling, 244–245
elements of, 243–244
next-generation, 242
overview of, 241
review Q & A, 253
review summary, 252–253
sample network, 251–252
strategy for PetroGastro project, 391–395
system, 249–251
VLANs, 173
digital signals
analog-to-digital encoding, 54–58
encoding for transmission, 58–60
for transmission, 58–60
digital signatures, 348
digital subscribers line (DSL), 43–44
direct memory access (DMA), 78
direct-endpoint calling mode, routing conferencing, 262
directory integration, 267–268
direct-to-screen content distribution model, 250
discovery phase report, 314
discovery process, remote management and monitoring systems, 305
discretionary access control (DAC) model, UNIX, 75
disk images, data retention options, 307
display, digital signage
defined, 243–244
delivering content to, 246
designing, 249
mounting, 248
Display-Port, for digital AV, 33
distance-vector routing protocols, 191–192
distributed hierarchy, DNS, 160–161
DMA (direct memory access), 78
DMZ (demilitarized zone)
sample digital signage network, 251–252
videoconferencing in, 278–279
DNS (domain name system)
FQDN, 163–164
hierarchy, 160–161
ICANN, 161
Nslookup utility for querying DNS names, 376
overview of, 159–160
registering domains, 161–162
relative domain names, 164
SIP-based conferencing, 260
subdomains, 162
zones, 163
documentation
of CAT (category) cabling, 364
of devices and protocols, 195–197
of DNS names, 164
of MAC addresses, 6
of management system, 289
in needs analysis, 95
of network implementation, 110
of physical topology, 98
of streaming and latency, 212
of system limitations in SLA, 318
Dolby TrueHD, 218
domain controllers, Windows NOSs, 72
domain name system. see DNS (domain name system)
domain user accounts, Windows NOSs, 73–74
domains, Windows server, 72–73
DoS (denial of service) attacks, 337
dot-decimal notation
calculating IPv4 subnets, 178–179
IP addresses and, 145
IPv4 subnet masks, 174
downtime, scheduling for maintenance, 379
DRM (digital rights management)
audio files and, 236
copyright owners using, 207
DSCP (differentiated services code point) field, IPv4 packet, 140–141
DSL (digital subscribers line), 43–44
dual-stack conferencing, across networks, 276
duplex communication
full-duplex. see full-duplex communication
half-duplex. see half-duplex communication
methods, 62
overview of, 61
DVI, 33
dynamic content, in digital signage, 245–246
dynamic control mechanisms, in digital signage, 244
dynamic E.164 address translation, 269
dynamic host configuration protocol (DCHP), 157–158
dynamic ports, 193
E
E.164 addressing, 268–269
EAP (Extensible Authentication Protocol), 348
ECN (explicit congestion notification) field, IPv4 packet, 140–141
EIA/TIA 568 standards, 17. see also CAT (category) cabling
EIGRP (Enhanced Interior Gateway Routing Protocol), 192
electrical requirements, in designing networked AV system, 101
electromagnetic interference (EMI)
fiber-optic cable immunity to, 27
transmission media problems, 31
attachments and social vulnerability, 336
phishing attacks via, 338
servers, 82–83
EMI (electromagnetic interference)
fiber-optic cable immunity to, 27
transmission media problems, 31
encapsulation, 188
encoding
analog-to-digital, 54–58
delivering streaming media with encoders, 233
digital signals for transmission, 58–60
overview of, 54
review Q & A, 62–63
review summary, 61
encryption
implementing, 348–350
of network traffic, 345
SSH and SCP, 350
SSL and TLS, 349–350
VPNs, 350–351
endpoints
calling multiple. see conferencing, with multiple endpoints
conferencing and, 265–267
in conferencing needs analysis, 256
endpoint interface, 236
as MCUs, 265
routing modes for conferencing, 262–263
in streaming AV needs analysis, 205, 208
end-user interface, streaming, 236
Enhanced Interior Gateway Routing Protocol (EIGRP), 192
enterprise networks, 8
environment, for streaming networks
bandwidth, 209–210
codecs, 221
latency, 211–212
overview of, 208–209
policies and restrictions, 212
quality of service, 211
questions, 212–213
topologies, 209
ES-100, 127
ES-Giga, 127
Essentials of AV Technology Online, 33
Ethernet
AVB and, 123–127
baseband, 52–53
CobraNet and, 128–129
as common Data Link Layer, 45
Dante and, 129–130
EtherSound and, 127–128
frames, 118
Gigabit Ethernet, 121
overview of, 117
Q-Sys and, 130–131
review Q & A, 132–135
review summary, 132
speeds, 118–123
understanding, 117–118
EtherSound
overview of, 127–128
transporting real-time AV with, 45–46
event classifications, in alarm notification and response plan, 300
event rule configuration, in planning remote management system, 296
expanded-beam connector, fiber-optic, 42
explicit congestion notification (ECN) field, IPv4 packet, 140–141
exports, data retention options, 306–307
extensibility, in planning remote management system, 296
Extensible Authentication Protocol (EAP), 348
Extensible Markup Language (XML), 80
external conferencing strategies
Application Layer gateway (ALG), 279–280
conferencing over VPN, 278
overview of, 277–278
session border controller (SBC), 280
videoconferencing in DMZ, 278–279
external intruders
denial of service attacks, 337
as network threat, 336
F
failure analysis, 363
far-end cross talk (FEXT), 31
Fast (100 Mbps) Ethernet, 119–121
fault tolerance
designing networked AV system, 105
RAID levels and, 84–85
faulty functions
listing, 361–362
localizing, 362
Federal Information Processing Standards (FIPS), 288
FEXT (far-end cross talk), 31
fiber optics
10 Gigabit Ethernet designed for, 122–123
cabling options, 40–42
Gigabit Ethernet over, 121–122
testing cabling, 365–366
fields
IPv4 packet, 140–142
IPv6 packet, 142–143
file servers, 80–81
file systems, UNIX, 75
File Transfer Protocol (FTP) server. see FTP (File Transfer Protocol) servers
File Transfer Protocol over Secure Socket Layer (FTPS), 81
FIPS (Federal Information Processing Standards), 288
firewalls
ALG working with, 344
external conferencing traversing, 277–280
full-proxy calling mode traversing, 263
H.323-based conferencing challenges, 259
port forwarding, 343
SBCs working with, 344–345
strategy for PetroGastro example project, 396
using packet filtering, 343
using port address translation, 342–343
videoconferencing in DMZ, 279
VPN often built into, 350
flags field, IPv4 packet, 141
flow label field, IPv6, 142
formats
conferencing media, 270–271
digital audio, 271–272
Fourcc.org, on video codecs, 221
FQDN (fully qualified domain name), 163–164
fragment offset field, IPv4 packet, 141
fragmenting
avoiding side effects in videoconferencing, 278
external conferencing with VPN, 278
fragmenting IP packets
by Transport Layer protocols, 188
frame rate, codec selection and, 219
frames
Data Link Layer converting packets to, 24
Ethernet, 118
frame size for high-quality compressed images, 223
switch considerations, 69
frames per second, video bandwidth and, 215
FTP (File Transfer Protocol) servers
accessing over Internet, 80
authentication, 75
digital signage network and, 246, 252
overview of, 80–81
FTPS (File Transfer Protocol over Secure Socket Layer), 81
full-duplex communication
40/100 Gbps Ethernet, 123
100 Mbps (Fast) Ethernet, 120–121
Gigabit Ethernet, 122
overview of, 61
full-proxy calling mode, conferencing
installing gatekeeper/SIP server, 263
overview of, 263
fully qualified domain name (FQDN), 163–164
G
Gantt chart, for network implementation timeline, 108–109
gatekeeper-routed calling mode, routing conferencing, 262
gatekeepers
business rules, 275
overview of, 260–261
routing modes, 262–263
SIP server business rules, 275
SIP servers vs., 261–262
where to install, 263–264
gateways
on blended machines, 69
conferencing across networks, 276–277
overview of, 66
Gigabit (1 Gbps) Ethernet, 119, 121–122
glass medium, fiber optics, 27
overview of, 151
private addresses vs., 153
GLOP multicast addressing, 230–231
GoP (groups of pictures), AV compression and, 220–221
graphical user interface tools. see GUI (graphical user interface) tools
graphics, digital signage content, 245
green network devices, 101
group ID, IPv6 multicast addresses, 155
group policy, in Windows NOSs, 72
Group Policy Manager, 74
groups of pictures (GoP), AV compression and, 220–221
GUI (graphical user interface) tools
for MySQL, 82
UNIX OSs and, 74–75
Windows NOSs, 72
H
H.225 routed mode, conferencing, 262–263
H.245 routed mode, conferencing, 262–263
H.264 AVC (Advanced Video Coding)
lossless video compression, 218
H.323 gatekeepers
conferencing across networks, 276
mitigating videoconferencing bandwidth requirements, 275
overview of, 260–261
SIP servers vs., 261–262
H.323 session protocol, 258–259
hackers, using protocol analyzers, 345
half-duplex communication
100 Mbps (Fast) Ethernet, 121
hubs only capable of, 68
overview of, 61
handshake, TCP data transfer, 188
hardware
decoders, 233
encoders, 233
maintaining, 379
policies, 380
hash values, encryption algorithms, 349
HDBaseT
for digital AV, 33
overview of, 131
HDCP (High-Bandwidth Digital Content Protection), 207
HDMI (High-Definition Multimedia Interface), 33
HD-SDI, for digital AV, 33
header checksum field, IPv4 packet, 141
headers
hermaphroditic connector, fiber-optic, 42
hexadecimal numbering
IPv6 addresses and, 150
IPv6 private address range, 153
IPv6 subnet masks, 175
overview of, 146–147
hierarchy
DNS, 160–161
of SLAs, 318
of UNIX file systems, 75
High-Bandwidth Digital Content Protection (HDCP), 207
high-definition formats
conferencing media, 271
digital video, 215
High-Definition Multimedia Interface (HDMI), 33
high-quality compressed images, 223–224
high-quality streaming video, 221–222
high-throughput data service class, QoS, 107–108
home, loopback addresses, 156
hop limit field, IPv6, 143
hops
EIGRP, 192
IP packets, 140
RIP, 191–192
horizontal pixels, digital video bandwidth and, 215
host domains, DNS, 160–161
host identifier bits, IP addresses, 144
Host layers, OSI, 22
hosts
calculating on IP4 subnets, 179–180
calculating on IPv6 subnets, 183–184
naming system and, 158–159
subnets within LANs as logical group of, 172
hot failover devices, ensuring fault tolerance, 105
hot spare, RAID, 84–85
HTML (HyperText Markup Language)
crafting web pages with, 79–80
as primary language of HTTP, 79
W3C maintenance of, 17
HTTP (Hypertext Transfer Protocol)
access web-based email applications, 87
polling whether system is turned on, 303
as source of device-management data, 290
web servers using, 79
HTTPS (HyperText Transfer Protocol Secure)
planning remote management system reporting, 298
TLS/SSL encrypting, 349
hub-and-spoke topology, WAN, 10–11
hubs
running CobraNet on, 129
switches vs., 67–68
HVAC requirements, in designing networked AV system, 101
hybrid architectures, 16
hybrid mode, MCUs, 264
hybrid topologies, 14
HyperText Markup Language. see HTML (HyperText Markup Language)
HyperText Transfer Protocol. see HTTP (Hypertext Transfer Protocol)
HyperText Transfer Protocol Secure (HTTPS)
planning remote management system reporting, 298
TLS/SSL encrypting, 349
I
IANA (Internet Assigned Numbers Authority)
assigning IP addresses, 151
assigning multicast addresses, 230–231
assigning port numbers, 193
ICANN (Internet Corporation for Assigned Names and Numbers)
managing/operating Internet’s root servers, 161
registering DNS domains with, 162
ICMP (Internet Control Messaging Protocol)
denial of service attacks, 337
diagnostic tools and, 368
echo request, 290
Ping and, 369
TCP/IP, 143–144
Traceroute and, 370–373
identification field, IPv4 packet, 141
IDSs (intrusion detection systems), 105
IEC (International Electrotechnical Commission)
MPEG standards, 222
risk-management standard, 102
IEEE (Institute of Electrical and Electronics Engineers)
AVB standards, 124
Bluetooth standard, 28
EAP standard, 348
Ethernet standards. see Ethernet
overview of, 16
wireless standards, 28–29
wiring formats, 35–39
IETF (Internet Engineering Task Force)
IPv6, 150
overview of, 16–17
SNMP standards, 288
TCP/IP development, 138
Ifconfig, 373–375
I-frames (intraframes), GoP, 220
IGMP (Internet Group Management Protocol), 227, 229
IHL (Internet header length) field, IPv4 packet, 140–141
IIS (Internet Information Services), 72, 79
image quality
available bandwidth and, 217–218
high-quality compressed images, 223–224
images, digital signage content, 245
IMAP (Internet Message Access Protocol), 83
IMAPS (Internet Message Access Protocol Secure), 87
immersive systems, conferencing endpoints, 265–267
implementation
developing timeline for network, 108–109
of networked AV system, 108
training, 110
InfoComm International, 17, 33
Information Technology Infrastructure Library (ITIL), 314
ingestion points, in streaming AV needs analysis, 206
Institute of Electrical and Electronics Engineers. see IEEE (Institute of Electrical and Electronics Engineers)
integrity
encryption for, 349
ensuring security, 103–105
interactive digital signage, 242
interframe compression, AV, 220
intermittent event, in alarm notification and response plan, 300
internal speed test server, 212
internal threats, 336–337
International Electrotechnical Commission (IEC)
MPEG standards, 222
risk-management standard, 102
International Organization for Standardization. see ISO (International Organization for Standardization)
Internet, multicasting routing over, 228
Internet Assigned Numbers Authority. see IANA (Internet Assigned Numbers Authority)
Internet control block, multicast addressing, 230
Internet Control Messaging Protocol. see ICMP (Internet Control Messaging Protocol)
Internet Corporation for Assigned Names and Numbers (ICANN)
managing/operating Internet’s root servers, 161
registering DNS domains with, 162
Internet Engineering Task Force. see IETF (Internet Engineering Task Force)
Internet Group Management Protocol (IGMP), 227, 229
Internet header length (IHL) field, IPv4 packet, 140–141
Internet Information Services (IIS), 72, 79
Internet layer, TCP/IP stack, 138
Internet Message Access Protocol (IMAP), 83
Internet Message Access Protocol Secure (IMAPS), 87
Internet service providers. see ISPs (Internet service providers)
interoperability, in planning remote management system, 296
intraframe compression, AV, 219
intrusion detection systems (IDSs), 105
I/O (input/output) ports
NAS servers lacking, 85
overview of, 78
IP (Internet Protocol)
diagnosing configuration issues, 373–375
HTTP encapsulated in, 79
IP addresses and, 139
IP addresses
assigning, 156–158
binary numbering, 145
Class D addresses, 226
components, 144
decimal numbering, 145
designing organizational structure based on, 100–101
determining subnets for IPv4 addresses, 181
diagnosing IP configuration issues, 373–375
E.164 addressing vs., 269–270
fragmenting, 143
global addresses, 151
hexadecimal numbering, 146
inventorying networked devices in project planning, 388
IP protocol and, 139
IPv4. see IPv4 addresses
IPv6. see IPv6 addresses
loopback, 156
man-in-the-middle attacks spoofing, 338
name resolution. see DNS (domain name system)
at Network Layer of OSI, 24
networked digital signage players, 250
Nslookup utility for resolving, 376
OSPF only working with, 191
private, 151–154
review Q & A, 165–170
review summary, 164–165
subnetting and, 390–391
translating MAC addresses to, 138–139
WANs communicating via, 7
IP masquerading. see PAT (port address translation)
Ipconfig, 373–375
IPsec (Internet Protocol Security) VPN, 351
IPv4 addresses
broadcast, 154
dot-decimal notation, 145
header, 368–369
for networked AV, 25
overview of, 147–149
packet format, 140–142
reserved addresses, 152
subnet masks, 174–175
IPv6 addresses
header, 368–369
hexadecimal numbering, 146–147
multicast addresses, 154–155
for networked AV, 25
overview of, 150–151
packet format, 142–143
reserved addresses, 152
subnet masks, 175
IRQ (interrupt request), 78
ISDN (Integrated Services Digital Network)
bridging when placing external calls, 279
for long-distance communication, 43
IS-IS (Intermediate System–to–Intermediate System Protocol), 191
ISO (International Organization for Standardization)
MPEG standards, 222
overview of, 16
risk-management standard, 102
ISPs (Internet service providers) public and private WANs leased from, 8
subnetting classful IPv4 addresses, 175
WAN connections leased from, 7
IT governance, 341
ITIL (Information Technology Infrastructure Library), 314
ITU (International Telecommunication Union)
audio standards, 271–272
data transmission methods, 60–61
H.323, 258
jitter tolerance levels, DiffServ classes, 108
JPEG 2000, 218
K
KDC (key distribution center), 348
Kerberos, 347–348
kernel file, UNIX OS, 75
key distribution center (KDC), 348
L
L2TP (Layer 2 Tunneling Protocol) VPN, 350
landscape mode, digital signage display in, 248
LANs (local area networks)
AVB working in any LAN topology, 127
copper as transmission medium for, 26
designing organizational structure, 99
multicast streams sent over, 226
overview of, 6–7
PIM allowing multicasting routing over, 228
routers marking border between WANs and, 66
switches vs. hubs, 67–68
topologies, 9–10
WANs connecting one or more, 7–8
Wi-Fi enabled devices integrating with, 28
latency
CobraNet, 129
conferencing needs analysis, 256
Dante, 130
defined, 328
detailing AV requirements in SLA, 328–329
Ping tests and, 369–370
Q-Sys, 131
in streaming AV needs analysis, 204–205
streaming network environment, 210, 211–212
tolerance levels for DiffServ classes, 108
Layer 1. see Physical Layer (Layer 1)
Layer 2. see Data Link Layer (Layer 2)
Layer 2 Tunneling Protocol (L2TP) VPN, 350
Layer 3. see Network Layer (Layer 3)
Layer 4. see Transport Layer (Layer 4)
Layer 5. see Session Layer (Layer 5)
Layer 6. see Presentation Layer (Layer 6)
layers, digital signage content, 247–248
layers, network. see OSI (Open Systems Interconnection) model
LC connector, fiber-optic, 41
LDAP (Lightweight Directory Access Protocol), 266–267
lease time, DHCP, 157
legacy devices
hubs on, 68
NetBIOS names and lmhosts on, 158–159
licensing fees
codecs, 219
copyrighted content, 206–207
Lightweight Directory Access Protocol (LDAP), 266–267
Link layer, TCP/IP stack
ARP function at, 138–139
defined, 138
link-local technology, zeroconf, 335
link-state routing protocols, 191
Linux, 74. see also UNIX OSs
lmhosts file, 158–159
local area networks. see LANs (local area networks)
local hosts, loopback addresses, 156
local network block, multicast addressing, 230
local user accounts, Windows OSs, 73–74
location
scoping remote management and monitoring system, 303
in streaming AV needs analysis, 205
logical ports, vulnerability of, 335
logical topology
conceptualizing in project planning, 390–391
designing networked AV system, 97–98
designing organizational structure, 99–100
overview of, 8
planning structured cabling, 99
logs
in alarm notification and response plan, 300
audit tools gathering, 345
monitoring system error, 303
long-distance communication media, 43–44
loopback testers, 366–367
loss tolerance levels, DiffServ classes, 108
lossless compression, 218
lossy compression, 218–219
low-latency data service class, QoS, 107–108
low-priority data service class, QoS, 107–108
M
MAC (media access control) addresses
at Data Link Layer of OSI, 24
defined, 70
DHCP and, 157
filtering on WAPs, 352
hexadecimal numbering for, 146–147
LANs communicating via, 6
man-in-the-middle attacks spoofing, 338
at Network Layer of OSI, 24
NIC card and, 70
switches reading, 67
translating at TCP/IP Link layer to IP addresses, 138–139
unmanaged switches and, 65
Mac OS X, 74
maintenance. see also troubleshooting
overview of, 378
scheduling downtime for, 379
of system hardware, 379
of system software, 378–379
malware
antimalware software, 346
overview of, 338
Trojan horses, 339
viruses, 339–340
worms, 340
managed switches
considerations, 69
MAC addresses and, 65–66
for multicast streaming, 227
management
digital signage, 250–251
risk, 102
streaming audio and video, 235
management information base (MIB)
MIB browser, 289
SNMP and, 289
manager-of-managers systems. see MOM (manager-of-managers) systems
man-in-the-middle (MiM) attacks, 338
manual (or reserve) DHCP, 157
masquerade attacks
man-in-the-middle, 338
overview of, 337
phishing, 338
Trojan horses combining viruses with, 339–340
maximum transmission units. see MTUs (maximum transmission units)
MCUs (multiple control units)
conferencing and bandwidth formula, 271–272
conferencing with, 264–265
videoconferencing strategy and, 396
measurement/enforcement of service-level targets, 320
media access control addresses. see MAC (media access control) addresses
Media layers, OSI, 22
memory
direct memory access, 78
overview of, 77
mesh topology
AVB working in, 127
LANs, 10
WANs, 10–12
message digests, encryption algorithms, 349
metadata tagging, 232
MIB (management information base)
MIB browser, 289
SNMP and, 289
MiM (man-in-the-middle) attacks, 338
MIME (Multipurpose Internet Mail Extensions), 87
mission, customer security posture and AV design, 341
mitigation, of security risks, 102–103
MLD (Multicast Listener Discovery), 229
mobile and/or software-based endpoints, 266–267
MOM (manager-of-managers) systems
alternatives to SNMP communication, 289–291
basic reporting, 292
configuration, 292–293
MIB and SNMP, 289
planning management system architecture, 297
remote management and monitoring, 286–288
SNMP, 288
monitoring
defining procedures for in SLA, 322
remote management and monitoring system. see remote management and monitoring
Motion JPEG, 219
mounting, digital signage display, 248
MPEG standards
high-quality streaming video, 221
MP3 encoding, 218–219
MPEG-4, 222
using interframe compression, 220
MPEG-TS (MPEG transport stream) protocol, 225
MPLS (Multiprotocol Label Switching), 351
MTUs (maximum transmission units)
for data across Ethernet network, 118
fragmenting dependent upon, 143
VPNs, 278
multicast
addressing, 230–231
implementing with PIM, 228–229
IPv6 multicast addresses, 154–155
overview of, 225–228
protocols, 228
as simplex communication, 61
Multicast Listener Discovery (MLD), 229
multilevel SLAs, 319
multimedia conferencing service class, QoS, 106–108
3.137.217.220