Online-Video – VIdeo on — КиберПедия 

Эмиссия газов от очистных сооружений канализации: В последние годы внимание мирового сообщества сосредоточено на экологических проблемах...

Архитектура электронного правительства: Единая архитектура – это методологический подход при создании системы управления государства, который строится...

Online-Video – VIdeo on

2017-08-24 74
Online-Video – VIdeo on 0.00 из 5.00 0 оценок
Заказать работу

UNIT V.

DOMAIN –DNS –Whois

 

5.1. Domain Name - this is the letter of your website. All computers on the Internet are actually denoted by numbers, for example, 213.180.194.129, but "simple" people find it very hard to remember a set of numbers. So were invented letter addresses - domain names. Figures as designations servers remain, but they are mapped to letter names.The above example - the popular search engine Yandex - a domain name www.yandex.ru, which is interpreted by the operating system of your computer as a digital number 213.180.194.129.

Domains are written in Latin letters. The domain name must be unique in each domain zone. A domain name consists of two (sometimes more) parts: the base name and extension. For example, for our customers as the primary domain name acts «ipmoney», expansion -. Info.

If you pay attention to the names of the sites you notice that the extension can be different. For example:. Com. Info. Ru. By. Net, etc.This is no accident. Each extension indicates a specialization site. More often than not. Com owned commercial sites. Info - information. There are also regional areas, pointing to a website belonging to a particular part of the planet Earth.

Domain Levels


Also, you've probably heard about the domains of different levels. Distinguish between first, second and third levels.


Top-level domain - national domains (enlargement itself without a name). For example:. Ru


Second-level domain, as consists of two words separated by a single point.
Third-level domain - point.mail.ru «i.info»

 

Answer the questions:

    1. Why did people invent domain names?
    2. What are the requirements for domain names?
    3. How many domain levels can exist?

 

5.2. Domain Name System (DNS)

The Domain indicates where the domain is hosted, in other words they point to the hosting firm whose name servers (also known as DNS) it is using at present.

 

IANA is responsible for management of the DNS root zone. This role means assigning the operators of top-level domains, such as.uk and.com, and maintaining their technical and administrative details.

With network-dependent initiatives like cloud, virtualization and BYOD rapidly consuming the last remaining IPv4 addresses, organizations need an IPv6 migration plan. IP Address Management is an essential technology for any successful IPv6 migration. The BlueCat IPAM solution ensures that your network infrastructure is ready for IPv6. Our simple and powerful solution allows you to discover IPv4 and IPv6 network assets, plan and model your IPv6 addressing scheme and map your IPv6 network onto existing IPv4 resources. Beyond IPv6 planning and implementation, our solution enables you to cohesively manage IPv6 and dual-stacked IPv4/IPv6 environments.

 

DNS service providers often deploy different types of DNS servers in their networks. In addition, different answers may be provided to DNS clients based on the clients' geographic location, as determined by their IP address (GeoIP). The most practical way to manage such critical Internet infrastructure has been to rely on databases and complex DNS management software to ensure homogeneity and avoid single points of deployment errors.

Most large hosting and/or cloud computing providers provide some form of DNS management software to their customers. Amazon provides Route53. RackSpace, SoftLayer, and Layered Technologies all have custom developed interfaces.

 

Link to e-learning of DNS management: http://technet.microsoft.com/en-us/gg508657.aspx

 

 

Answer the questions:

1. What’s the function of the domin?

2. What’s the role of IANA?

3. What pdo the organizations need with network-dependent initiatives like cloud, virtualization and BYOD rapidly consuming the last remaining IPv4 addresses?

4. What’s the most practical way to manage critical Internet infrastructure?

5. What is BYOD?

 

 

Domain name registration

You will find multiple companies offering various types of domain name registration services. Before completing any transaction relating to domain name registration, ICANN offers the general guidelines. Internet Corporation for Assigned Names and Numbers (ICANN) is a non-profit organization that was established for developing policies for coordination of some of the Internet's core technical elements, including the domain-name system (DNS). ICANN was established in 1998. At the time the organization ICANN was replacing other groups that had done similar type of work.

ICANN operates on the basis of consensus, with affected stakeholders coming together to formulate coordination policies for the Internet's core technical elements in the public interest. The policies are then implemented by the agreement of the operators of the core elements, including gtld registry operators and sponsors, cctld managers, regional Internet (IP address) registries, and root-nameserver operators.

Until recently, the Root Zone was limited to a set of characters conforming to US-ASCII (American Standard Code for Information Interchange) or "Latin" alphabets. This changed with the introduction of Internationalized Domain Names (idns), which introduced top-level domains (tlds) in different scripts and enabled Internet users to access domain names in their own language. Specifically:

· The approval of the IDN country code Top-Level Domain (cctld) Fast Track Process by the icannboard at its annual meeting in Seoul, South Korea in October 2009, enabled countries and territories to submit requests to ICANN for IDN cctlds representing their respective country or territory names in scripts other than US-ASCII characters.

· The new generic Top-Level Domain (gtld) Program, approved at the ICANN meeting in Singapore in June 2011, will allow for the first time the addition of IDN gtlds into the root zone

Links to learn: http://www.icann.org/en/about/learning

 

http://www.staffkit.com/learn/course/tcpc07kv4a.htm

 

Decipher the following abbreviations:

 

ICANN ____________________________________________________________
US-ASCII ____________________________________________________________
cctld ____________________________________________________________

Gtld __________________________________________________________________

idns ___________________________________________________________

tld ___________________________________________________________

SAVE YOUR ANSWERS INTO THE BANK

 

The WHOIS service


This service is most commonly used to find out whether a.rs domain name is registered or not. If a domain name is registered, the WHOIS service returns information about the registrant who registered the domain name, whether they are a legal entity or individual.


The WHOIS service can be used by anyone, without limitation. The details displayed are the details contained in the RNIDS database. This service does not provide domain name registrant contact details, such as telephone number, fax number or e-mail address. The service cannot be used for finding e-mail addresses.
If a domain name registrant does not want his or her details to be publicly accessible, he or she can request that RNIDS does not publish his or her details on the WHOIS service.

 

Answer the questions:

 

1. What is the WHOIS service used for?

2. What can’t the service do?

3. Is it possible to make registrant’s details private?

 

EXERCISES TO UNIT V:

Exercise 1. Read the definitions to the key terms and analyze the context in which they are used:

 

Domain a distinct subset of the Internet with addresses sharing a common suffix or under the control of a particular organization or individual. The organization met to discuss adding new 'top-level' domains, the global designations such as.com and.gov.
Server a computer or computer program which manages access to a centralized resource or service in a network. The server crashed twice.
DNS Domain Name System is a hierarchical distributed naming system for computers, services, or any resource connected to the Internet or a private network. The limited set of ASCII characters permitted in the DNS prevented the representation of names and words of many languages in their native alphabets or scripts.
Operator someone whose job is to use and control a machine, vehicle, or piece of equipment The system lets you talk directly to a call centre operator.
Network a large system consisting of many similar parts that are connected together to allow movement or communication between or along the parts or between the parts and a control centre We could reduce our costs by developing a more efficient distribution network.
Database a large amount of information stored in a computer system in such a way that it can be easily looked at or changed We're linked to the on-line database at our head office.
Homogeneity consisting of parts or people that are similar to each other or are of the same type The population of the village has remained remarkably homogeneous.
Deployment error Error occurred in installing, setting up, testing and running. Deployment is military term, which means the placement of troops and equipment in the field is widely used with computers as an alternate to the word "implementation." For example, "XYZ software deployment" is the same as saying "XYZ software implementation." To "deploy" something is to "get it installed and running." Deployment errors came up while I was dealing with classloading issues.
Interface a connection between two pieces of electronic equipment, or between a person and a computer The new version of the program comes with a much better user interface than the original.
Generic shared by, typical of, or relating to a whole group of similar things, rather than to any particular thing The new range of engines all had a generic problem with their fan blades.
Top-level domain is one of the domains at the highest level in the hierarchical Domain Name System of the Internet. The top-level domain names are installed in the root zone of the name space. For all domains in lower levels, it is the last part of the domain name, that is, the last label of a fully qualified domain name. For example, in the domain name www.example.com, the top-level domain is com. ICANN started a new process of Top-level domain naming policy to take a significant step forward on the introduction of new generic top-level domains.
Third-level domain are written immediately to the left of a second-level domain. There can be fourth- and fifth-level domains, and so on, with virtually no limitation. An example of an operational domain name with four levels of domain labels is www.sos.state.oh.us. The www preceding the domains is the host name of the World-Wide Web server. Each label is separated by a full stop (dot). 'sos' is said to be a sub-domain of 'state.oh.us', and 'state' a sub-domain of 'oh.us', etc. Computing Services will create a single third-level domain for any department or administrative group.
Second-level domain Below the top-level domains in the domain name hierarchy are the second-level domain (SLD) names. These are the names directly to the left of.com,.net, and the other top-level domains. As an example, in the domain example.co.uk, co is the second-level domain. This document outlines how the applicant proposes to moderate a second level domain for.nz.
IANA Internet Assigned Numbers Authority, is presently a department of ICANN, a nonprofit private US corporation, which oversees global IP address allocation, autonomous system number allocation, root zone management in the Domain Name System (DNS), media types, and other Internet Protocol-related symbols and numbers. The Internet Assigned Numbers Authority (IANA) is responsible for the global coordination of the DNS Root, IP addressing, and other Internet protocol resources. Certain domains are set aside, and nominally registered to “ IANA ”, for specific policy or technical purposes.
Internet Corporation for Assigned Names and Numbers (ICANN) is a nonprofit private organization headquartered in the Playa Vista section of Los Angeles, California, United States, that was created on September 18, 1998, and incorporated on September 30, 1998 to oversee a number of Internet-related tasks previously performed directly on behalf of the U.S. government[citation needed] by other organizations, notably the Internet Assigned Numbers Authority (IANA), which ICANN now operates. ICANN is responsible for the coordination of the global Internet's systems of unique identifiers and, in particular, ensuring its stable and secure operation. This work includes coordination of the Internet Protocol address spaces (IPv4 and IPv6) and assignment of address blocks to regional Internet registries, for maintaining registries of Internet protocol identifiers, and for the management of the top-level domain name space (DNS root zone), which includes the operation of root name servers. Through its By-laws, processes, and international meetings, ICANN provides the arena where all advocates can discuss Internet policy issues.
US-ASCII The American Standard Code for Information Interchange (ASCII /ˈæski/ ass-kee) is a character-encoding scheme originally based on the English alphabet that encodes 128 specified characters - the numbers 0-9, the letters a-z and A-Z, some basic punctuation symbols, some control codes that originated with Teletype machines, and a blank space - into the 7-bit binary integers. ASCII codes represent text in computers, communications equipment, and other devices that use text. Most modern character-encoding schemes are based on ASCII, though they support many additional characters. US-ASCII itself was first used commercially during 1963 as a seven-bit teleprinter code for American Telephone & Telegraph's TeletypeWriter eXchange network.

 


Exercise 2. Match the words with correct definitions:

 

· Domain   · a structured set of data held in a computer
· Server   · highest level in the domain name hierarchy below the second level domain and the segment that appears directly to the left of the second level domain
· DNS   · American Standard Code for Information Interchange
· Operator   · a person who operates equipment or a machine
· Network   · error in installation and set up
· Database   · portion of a domain name directly below the top level domain (TLD) in the domain name system (DNS) hierarchy and the portion that appears immediately to the left of the TLD
· Homogeneity   · coordinates the Internet Assigned Numbers Authority (IANA) functions, which are key technical services critical to the continued operations of the Internet's underlying address book, the Domain Name System (DNS)
· Deployment error   · letters immediately following the final dot in an Internet address
· Interface   · the hierarchical method by which Internet addresses are constructed
· Generic   · Internet Assigned Numbers Authority
· Top-level domain   · a group or system of interconnected people or things
· Third-level domain   · central computer that controls and provides information to other computers in a network
· Second-level domain · group of computers or websites that are organized by purpose, for example, to provide education or sell products
· IANA   · characteristic of or relating to a class or group of things; not specific
· Internet Corporation for Assigned Names and Numbers (ICANN) · of the same kind; alike
· US-ASCII   · a device or program enabling a user to communicate with a computer

 


Exercise 3: Complete the following table:

 

Nr Domain Levels Examples
1.      
2.          
3.          

 

Exercise 4. Don’t translate like this!

 

IANA is responsible for management of the DNS root zone. This role means assigning the operators of top-level domains, such as.uk and.com, and maintaining their technical and administrative details.

With network-dependent initiatives like cloud, virtualization and BYOD rapidly consuming the last remaining IPv4 addresses, organizations need an IPv6 migration plan. IP Address Management is an essential technology for any successful IPv6 migration. The BlueCat IPAM solution ensures that your network infrastructure is ready for IPv6.

IANA отвечает за управление корнями DNS. Эта роль означает присвоение операторов доменов верхнего уровня, таких как. Великобритании и. COM, и поддержание их технических и административных подробностей.

С углублением зависимости от инициатив, таких как облака, виртуализация и BYOD, быстро потребления последних оставшихся адресов IPv4, организации должны IPv6 плана миграции. Управление IP-адресами является важной технологией для любой успешной миграции IPv6. Решение Голубая Кошка ИГУМ гарантирует, что ваша сетевая инфраструктура готова к IPv6.

Give your translation variant.

UNIT VI

Technology.

H.264/MPEG-4 Part 10 or AVC (Advanced Video Coding) is a standard for video compression, and is currently one of the most commonly used formats for the recording, compression, and distribution of high definition video. The final drafting work on the first version of the standard was completed in May 2003.

H.264/MPEG-4 AVC is a block-oriented motion-compensation-based codec standard developed by the ITU-T Video Coding Experts Group (VCEG) together with the ISO/IEC JTC1 Moving Picture Experts Group (MPEG). The project partnership effort is known as the Joint Video Team (JVT). The ITU-T H.264 standard and the ISO/IEC MPEG-4 AVC standard (formally, ISO/IEC 14496-10 – MPEG-4 Part 10, Advanced Video Coding) are jointly maintained so that they have identical technical content.

Answer the questions:

1. When was the first version of the standard for video compression completed?

2. What does VCEG stand for?

3. What does MPEG stand for?

Text.

The volume of video traffic on mobile networks is not just growing quickly. It’s also changing quickly. That’s why Mobixell has started compiling the Mobile Video Trends Report series. We want to share our findings with our customers and the industry to help cultivate an understanding of what changes are going to be needed to tackle the approaching challenges.

The data that we analyzed come from worldwide commercial deployments of Mobixell Seamless Access video optimization. We were not surprised to see that mobile video is becoming dominant in the networks. In some instances, however, there is insight to be gained from the numbers. Specifically, the trends that this report reveals point strongly toward the need for more context-aware video optimization. A few highlights:

  • 50% of all video traffic comes from only 15% of clips viewed.
    No surprise there. This shows that the viral nature of some clips, leading to many multiple views, calls for popularity-based optimization to focus on the most viewed clips.
  • YouTube views nearly doubled in a year.
    But so did traffic on the top secondary video sites (mostly adult-oriented). Massive growth is led by a small number of mega sites. But the video storm is going to continue to hit from many multiple sources.
  • 68% of all streamed video on mobile was in FLV format (Adobe Flash).
    What that means is that the vast majority of mobile video is still unavailable to people with iOS devices (iPhone, iPad) which do not support Flash. In future reports, we will continue to track video formatted for HTML5 to see if there is any impact on FLV traffic.
  • HD video accounts for only 1% of mobile video traffic today.
    HD video is still not even a factor in rising mobile video traffic. That little sliver on the pie chart is actually very ominous. What it means is that as tablets and mobile laptop users become more comfortable with their devices as HD viewing screens, we could see yet another source of heavy video traffic that is not there today.

Source: http://www.mobixell.com/blog/trends-report/

Mobile video

Mobile video also comes in the form of streaming TV over the mobile network, which must be a 2.5G or 3G network. This mimics a television station in that the user cannot elect to see what they wish but must watch whatever is on the channel at the time.

There is also mobile broadcast TV, which operates like a traditional television station and broadcasts the content over a different spectrum. This frees up the mobile network to handle calls and other data usage, and because of the "one-to-many" nature of mobile broadcast TV the video quality is a lot better than that streamed over the mobile networks, which is a " one-to-one" system.

The problem is that broadcast technologies don't have a natural uplink, so for users to interact with the TV stream the service has to be closely integrated to the carriers mobile network. The main technologies for broadcast TV are DVB-H, Digital Multimedia Broadcasting (DMB) and MediaFLO.

The Open Mobile Video Coalition (OMVC), an alliance of broadcasters dedicated to accelerating the development and rollout of mobile television, has recently integrated functions with the National Association of Broadcasters.

Broadcasters are excited about the possibilities of mobile TV, which is already available in 130 markets reaching half the nation. Mobile TV is your favorite local content when and where you want it – on your smartphone or tablet – so you don't have to miss the weather report, the big game or your favorite show if you're on the go!

With mobile TV, viewers can tune in to live, local news, traffic information, weather, sporting events and entertainment programs from the convenience of their car, at the beach – wherever they may be, using a variety of mobile and video devices. And because the technology uses the broadcast airwaves – not the Internet – no WiFi is needed and you won't experience buffering.

The Advanced Television Systems Committee (ASTC) approved the A /153 ATSC mobile TV standard on October 15, 2009. This technology offers local broadcasters significant opportunities to provide consumers with new services in their over-the-air digital channel. The ATSC mobile TV standard is the result of an intense development effort involving participants from all over the world and across television and mobile device industries. The ATSC mobile TV system achieves the robustness necessary for mobile reception by adding extra training sequences and forward error correction. The mobile TV system converts the current 8-VSB emission into a dual-stream system without altering the emitted spectral characteristics. It does this by selecting some of the MPEG-2 segments (corresponding to MPEG-2 Transport packets in the current system) and allocating the payloads in those segments to carry the mobile TV data in a manner that existing legacy receivers ignore.

 

Geolocation videos are videos with geolocation features. It is achieved by synchronizing user generated videos with the data related to the location and the navigation path of the user, highlighted on the maps, so that the viewer of the video gets more information apart from the video feed. A geolocation video may be used in several ways such as for grouping geographically similar videos or geotagged relevant videos, geotagging of videos by the user or the viewer, augmented reality during video chat, creating maps of nearby friends during video chat, 3-dimensional realization of triangular disaster or crisis spots using multiple video feeds, video-check-in feature, video tourism, health and fitness, GPRS navigation etc

State the following sentences as true or false:

  1. Mobile video coming in the form of streaming TV over the mobile network must be a 2.5G or 3G network.
  2. Mobile broadcast TV doesn’t operate like a traditional television station.
  3. Mobile broadcast TV has a better quality than that streamed over the mobile networks thanks to the "one-to-many" nature.
  4. The Open Mobile Video Coalition works separately from the National Association of Broadcasters.

Answer the questions:

 

  1. What are the main technologies for broadcast TV?
  2. What does ASTC offer?

 

 

Text

Ilan Daniel is a Video Technology Expert. He and his team are the people at Mobixell who look into the future and track emerging trends and technologies in order to recommend what Mobixell video optimization products should do.

Q: What’s so special about HTML5, and what are some new features it offers?
A: HTML has not been updated since 2000. So a long list of improvements has built up over that time. The most interesting of those improvements to us – and probably to everyone who’s following the development of HTML5 – are the implementation of Scalable Vector Graphics (SVG) and video elements as part of the HTML language rather than by use of players/plugins as done previously. SVG is meant to help developers make Adobe Flash-like animations, which are supported by HTML5 with no need for add-ons. HTML5 video also means built-in video streaming support rather than the need to make use of an embedded Flash player. FLV is still the dominant format when it comes to streaming video and there are only a handful of sites that use HTML5 applications, we are certain that HTML5 video and SVG are going to be big.

Q: If HTML5 already exists, why don’t we see any HTML5 video or sites yet?
A: Most Web browsers, including Chrome, Firefox, Internet Explorer, Opera and Safari already have versions that support HTML5 at least partially. According to arstechnica.com, about 90% of mobile browsers support HTML5. But as many as 60% of desktop users still use browser versions that do not support HTML5 at all. It’s the classic chicken and egg story; There is little content because there is not enough support to justify the development, and there’s not enough support because there is not enough content to justify it. Companies like Adobe are working toward breaking the standoff by creating tools for developers to support HTML5. And although mobile operators are generally not demanding it yet, Mobixell has already included support for HTML5 video optimization in its Seamless Access Mobile Internet Platform, and will continue adding support as HTML5 evolves.

Q: So all we need for HTML5 videos to work is a browser that supports HTML5?
A: It is actually not that simple; There are three native file formats supported in HTML5. OGG with Theora/Vorbis (video/audio) codecs came first, and was replaced almost completely by two newer formats: MP4 and WebM. MP4 H264/AAC is currently the most common format, which is supported both by Apple iOS and Android. WebM MKV VP8/Vorbis is the newest format, and is supported by Android devices as well. Being an open source format, I believe WebM is certain to grow and become dominant. YouTube, for example, have already converted more than 80 percent of their content to WebM format, and new YouTube content is automatically stored as WebM alongside the FLV files. So the plain answer to your question is – No. While HTML5 is a standard wrapper to the video, the video format embedded in it may still have compatibility constraints through different end-devices.

Q: Will that hurt Adobe?


A: I believe it won’t. After all, Adobe doesn’t make any money when I download the Flash Player. As long as Adobe creates tools for developers to build applications for HTML5, developers will continue using Adobe products. And they just announced the release of Adobe Flash Media Server 4.5, with HTML5 support for developers. So it seems like a win-win situation. I think Adobe has played their hand well.

Q: And what about mobile operators? Is there anything they should do to prepare?
A: It’s no secret that smartphones and tablets have contributed to the huge growth of mobile video streaming in the last few years. Even without HTML5, that trend will continue. HTML5 will just be a new way to deliver what the subscribers want. We will need to help the operators optimize their HTML5-based video traffic to reduce congestion problems just as we do today for every other video format.

 

To seeking mobile TV resources and OMVC materials, visit TheFutureofTV.org/MobileTV

 

Choose the correct answer:

 

1. What technique of video-compressing has been developed in 2003?

a) H.264/MPEG-4 Part 10 or AVC

b) block-oriented – правильный вариант

 

2. What is the function of SVG?

a) to help developers make Adobe Flash-like animations –correct

b) to create tools for developers to support HTML5

 

  1. 60% of desktop users still use browser versions that do not support

 

a) HTML

b) HTML 5

4. The most common file format is:

 

a) WebM.

b) MP4 H264/AAC

EXERCISES TO UNIT VI:

 

Exercise 1. Read definitions to the key terms and analyze the context in which they are used:

 

Coding the process of assigning a code to something for classification or identification The forms are checked and returned to the census officer for coding.
Compression to make a computer file use less space when it is stored in the memory of a computer or on a disk, by using a special program Firm compression of the soil in the pot will secure the plant.
Compiling transformation of a program written in a high-level programming language from source code into object code. Compiling optimization can sometimes cause problems while profiling
Streaming relating to or making use of a form of tape transport in which data may be transferred in bulk while the tape is in motion Streaming media allows you to listen to music or watch videos live and online.
DSL connections (Digital subscriber line) is a family of technologies that provide Internet access by transmitting digital data over the wires of a local telephone network. A DSL internet connection is one of many effective communication tools for keeping employees in touch with the office.
LANs (local area network) is a computer network that interconnects computers in a limited area such as a home, school, computer laboratory, or office building using network media. Early LAN cabling had been based on various grades of coaxial cable.
"One-to-one" system a computer for every student which is an initiative created by many companies such as Microsoft, Apple, Dell, HP, and Intel One-to-one system is the future of education and improvement in schools and universities.
ITU-T ITU Telecommunication Standardization Sector (ITU-T) is one of the three sectors (divisions or units) of the International Telecommunication Union (ITU); it coordinates standards for telecommunications In the work of standardization, ITU-T cooperates with other SDOs, e.g., the International Organization for Standardization (ISO) and the Internet Engineering Task Force (IETF).
ITU-T Video Coding Experts Group (VCEG) Visual Coding Experts Group (VCEG) is the informal name of Question 6 (Visual coding) of Working Party 3 (Media coding) of Study Group 16 (Multimedia coding, systems and applications) of the ITU-T. Its abbreviated title is ITU-T Q.6/SG 16. It is responsible for standardization of the "H.26x" line of video coding standards, the "T.8xx" line of image coding standards, and related technologies. ITU-T Video Coding Experts Group’s standardization work on multimedia coding, systems and applications, including the coordination of related studies across the various ITU-T SGs.
ISO/IEC JTC1 Moving Picture Experts Group (MPEG) is a working group of experts that was formed by ISO and IEC to set standards for audio and video compression and transmission. It was established in 1988 by the initiative of Hiroshi Yasuda (Nippon Telegraph and Telephone) and Leonardo Chiariglione, group Chair since its inception. The first MPEG meeting was in May 1988 in Ottawa, Canada ISO/IEC JTC1 MPEG keeps on exploring new opportunities for standards serving the needs of the media industry.
Demand the desire of consumers, clients, employers, etc. for a particular commodity, service, or other item; an insistent and peremptory request, made as of right He has always demanded the highest standards of behaviour from his children. The big price rises in this country have been because of increased demand in other parts of the world.
Push video on demand is a technique used by a number of broadcasters on systems that lack connectivity to provide true video on demand or by broadcasters who want to optimize their video streaming infrastructure by pre-loading the most popular contents to the consumer device. A push VOD system uses a personal video recorder (PVR) to store a selection of content, often transmitted in spare capacity overnight or all day long at low bandwidth. As content occupies space on the PVR hard drive, downloaded content is usually deleted after a week to make way for newer programs. The limited space on a PVR hard drive means that the selection of programs is usually restricted to most popular content. A new generation of Push VOD solution recently appeared on the market which, by using efficient error correction mechanisms, can free significant amount of bandwidth and that can deliver more than video e.g. magazines, interactive applications. With push video on demand technique users can watch the downloaded content at the time they desire, immediately and without any buffering issue.
Near video on demand is a pay-per-view consumer video technique used by multi-channel broadcasters using high-bandwidth distribution mechanisms such as satellite and cable television. Multiple copies of a program are broadcast at short time intervals (typically 10–20 minutes) providing convenience for viewers. This form is bandwidth intensive and is generally provided only by large operators with a great deal of redundant capacity and has been reduced in popularity as video on demand is implemented. Pay-per-view provider In Demand provided up to 40 channels in 2002, with several films receiving up to four channels on the staggered schedule to provide the NVOD experience; however the service now provides only six channels of content, with In Demand sports PPV using the other channels. Near video on demand services are for those who can watch the program without needing to tune in at a scheduled point in time
The Open Mobile Video Coalition (OMVC) is a consortium founded to advance free broadcast mobile television in the United States. It was created by TV stations to promote the ATSC-M/H television standard to consumers, electronics manufacturers, the wireless industry, and the Federal Communications Commission. The Open Mobile Video Coalition says the costs associated with the advertising effort would be low.
The Advanced Television Systems Committee (ASTC) is the group, established in 1982, that developed the eponymous ATSC Standards for digital television in the United States, also adopted by Canada, Mexico, South Korea, and recently Honduras and is being considered by other countries. The Advanced Television Systems Committee (ATSC) has delivered an updated version of ATSC A/85 the core technology mandated by the Commercial Advertisement Loudness Mitigation Act.
Scalable Vector Graphics (SVG) is an XML-based vector image format for two-dimensional graphics that has support for interactivity and animation. The SVG specification is an open standard developed by the World Wide Web Consortium (W3C) since 1999. Scalable Vector Graphics (SVG) object can be animated when it uses the animation element.

Exercise 2. Match the words with correct definitions:

 

· Coding · to press something into a smaller space
· Compression · the process of assigning a code to something for classification or identification
· Compiling · the activity of listening to or watching sound or video directly from the internet
· Streaming · convert (a program) into a machine-code or lower-level form in which the program can be executed
· DSL connections · supplies networking capability to a group of computers in close proximity to each other
· LANs · medium for transferring data over regular phone lines and can be used to connect to the Internet
· "One-to-one" system · International Telecommunication Union that coordinates telecommunications
· ITU-T · an alliance of broadcasters dedicated to accelerating the development and rollout of mobile television, has recently integrated functions with the National Association of Broadcasters.
· ITU-T Video Coding Experts Group (VCEG) · a working group of ISO/IEC with the mission to develop standards for coded representation of digital audio and video and related data.
· ISO/IEC JTC1 Moving Picture Experts Group (MPEG) · responsible for standardization of the "H.26x" line of video coding standards, the "T.8xx" line of image coding standards, and related technologies
· Demand · pay-per-view consumer video technique
· Push video on demand · to ask for something forcefully, in a way that shows that you do not expect to be refused
· Near video on demand · technique used by a number of broadcasters on systems that lack connectivity to provide true video
· The Open Mobile Video Coalition (OMVC) · every student or teacher is given a computer, the internet and software anytime and anywhere
· The Advanced Television Systems Committee (ASTC) · vector graphics file format that enables two-dimensional images to be displayed in XML pages on the Web
· Scalable Vector Graphics (SVG) · international, non-profit organization developing voluntary standards for digital television.

Exercise 3. Watch the video: http://www.youtube.com/watch?v=JDpwPqTBXbE

UNIT VII.

WEBINAR

Web conferencing refers to a service that allows conferencing events to be shared with remote locations. These are sometimes referred to as webinars or, for interactive conferences, online workshops. In general the service is made possible by Internet technologies, particularly on TCP/IP connections. The service allows real-time point-to-point communications as well as multicast communications from one sender to many receivers. It offers information of text-based messages, voice and video chat to be shared simultaneously, across geographically dispersed locations. Applications for web conferencing include meetings, training events, lectures, or short presentations from any computer.

Web conferencing technologies are not standardized, which has been a significant factor in the lack of interoperability, transparency, platform dependence, security issues, cost and market segmentation. In 2003, the IETF established a working group to establish a standard for web conferencing, called " Centralized Conferencing (xcon)". The planned deliverables of xcon include:

· A basic floor control protocol. Binary Floor Control Protocol (BFCP) published as RFC 4582

· A mechanism for membership and authorization control

· A mechanism to manipulate and describe media "mixing" or "topology" for multiple media types (audio, video, text)

 

Answer the questions:

 

1. What does web conferencing mean?

2. What do webinars include?

3. What connections make Web conferencing possible?

4. What is " Centralized Conferencing (xcon)".?

5. What is BFCP?

Easier Said Than Done?

The temptation for organizations to save money by eliminating classroom time in favor of self-directed eLearning is a great one – but care must be taken in this transition. As someone once said, converting a bad ILT course into an eLearning format results in a bad eLearning course. For this reason, a complete review of the organization’s learning program – including its Learning Management System (LMS) is a required course of action.

Advances in the features and functionality of LMS platforms in the past few years have opened up a new realm of possibility in redesigning and converting instructor-led courses. In fact, in many cases the role of instructor can be assumed by a community of experts. The interface to the eLearning experience is now a personalized portal, where the learner can interact with the learning environment – including peers, subject matter experts, experienced veterans in his field and even the course designer.

Source: http://elearningindustry.com/a-view-into-the-future-of-elearning

State the following sentences as true or false:

 

1. Twenty-some years ago, computer-based training was unimportant for job skills.

  1. There are still limitations of computer-based training.
  2. Converting a bad ILT course into an eLearning format gives its results.

EXERCISES TO UNIT VII.

 

Exercise 1. Read the definitions to the given key terms and analyze the context in which they are used:

Webinar a service that allows conferencing events to be shared with remote locations that are sometimes referred as online workshops or web conferencing Think about a webinar as a way to attend a conference without leaving home.
E-learning the use of any electronic technology to aid in the acquisition and development of knowledge and understanding in order to demonstrable and positively influence behaviors. E-Learning can help us adapt while controlling costs, increasing quality and modernizing the workforce.
Workshop a meeting at which a group of people engage in intensive discussion and activity on a particular subject or project; a room or building in which goods are manufactured or repaired In the case of medium risk projects a shorter half-day planning workshop is usually more appropriate.
TCP/IP connections (Transmission Control Protocol/Internet Protocol) is the basic communication language or protocol of the Internet. It can also be used as a communications protocol in a private network (either an intranet or an extranet). When you are set up with direct access to the Internet, your computer is provided with a copy of the TCP/IP program just as every other computer that you may send messages to or get information from also has a copy of TCP/IP. TCP is responsible for breaking data down into IP packets before they are sent, and for assembling the packets when they arrive.
Binary Floor Control Protocol (BFCP) standard for managing floor control during collaboration sessions across dedicated video endpoints, mobile devices, and personal computers running collaboration software. These capabilities can be delivered using an enabled Session Initiation Protocol (SIP) standards-based endpoint or as a software implementation in a collaboration application stack. BFCP provides the ability to manage multiple streams being presented during a collaboration session using floor control.
Technology-enhanced learning (TEL) learning platforms, m-learning, digital educational collaboration, distributed learning, computer-mediated communication, cyber-learning, and multi-modal instruction. Every one of these numerous terms has had its advocates, who point up particular potential distinctions. In practice, as technology has advanced, the particular "narrowly defined" aspect that was initially emphasized has blended into "e-learning." As an example, "virtual learning" in a narrowly-defined semantic sense implies entering the environmental simulation within a virtual world,[5][6] for example in treating PTSD. In practice, a "virtual education course" refers to any instructional course in which all, or at least a significant portion, is delivered by the Internet. "Virtual" is used in that broader way to describe a course that not taught in a classroom face-to-face but through a substitute mode that can conceptually be associated "virtually" with classroom teaching, which means that people do not have to go to the physical classroom to learn. Accordingly, virtual education refers to a form of distance learning in which course content is delivered by various methods such as course management applications, multimedia resources, and videoconferencing. Students and instructors communicate via these technologies.
Computer-based training (CBT)
Computer-assisted instruction (CAI)
Internet-based training (IBT)
Web-based training (WBT)
Online education
Virtual education
Virtual learning environments (VLE)

Exercise 2. Match the words with correct definitions:

 

· Webinar · communication protocol for communication between computers on the Internet
· E-learning · a basic floor control protocol
· Workshop · refers to the use of electronic media and information and communication technologies (ICT) in education.
· TCP/IP connections · seminar conducted over the Internet
· Binary Floor Control Protocol (BFCP) · an intensive discussion on a project or a room or building where things are made or repaired using machines and/or tools

 

Exercise 3: Complete the following scheme:

 

Exercise 4. Watch the video

http://www.youtube.com/watch?v=J8kHfhiBKHQ

Webinar Tutorial

Answer the questions:

1. What are the computer requirements to run a successful webinar?

2. What will you get if you registered early for the webinar?

3. How is attendance checked at the webinars?

 

Exercise 5. Make the tapescript of the video from the previous execise:

 

 

Exercise 6. Watch the video: http://www.youtube.com/watch?v=jTWK78gtj5I

UNIT10.

Other types of e-payments.

Digital currency, among its various names, is electronic money that acts as alternative currency.

Digital currency exchangers (DCE s, independent exchange providers or e-currency exchangers) are market makers which exchange fiat currency for electronic money, such as digital gold currency (DGC), and/or convert one type of digital currency (DC) into another, such as Liberty Reserve into Bitcoin. Exchangers apply a commission to transactions.

Cryptocurrencies, such as Bitcoin, Litecoin and PPCoin, are a form of digital currency which relies on cryptography, as well as proof-of-work schemes, in order to create, distribute and maintain the currency. Cryptocurrencies are usually peer-to-peer and decentralized.

Financial cryptography (FC) is the use of cryptography in applications in which financial loss could result from subversion of the message system.

Cryptographers think of the field as originating in the work of Dr David Chaum who invented the blinded signature. This special form of a cryptographic signature permitted a virtual coin to be signed without the signer seeing the actual coin, and permitted a form of digital token money that offered untraceability. This form is sometimes known as Digital currency.

A widely-used and previously-developed cryptographic mechanism is the Data Encryption Standard, which was used primarily for the protection of electronic funds transfers. However, it was the work of David Chaum that excited the cryptography community about the potential of encrypted messages as actual financial instruments.

Financial cryptography includes the mechanisms and algorithms necessary for the protection of financial transfers, in addition to the creation of new forms of money. Proof of work and various auction protocols fall under the umbrella of Financial Cryptography. Hashcash is being used to limit spam.

Financial cryptography is distinguished from traditional cryptography in that for most of recorded history, cryptography has been used almost entirely for military and diplomatic purposes.

As part of a business model, FC followed the guide of cryptography and only the simplest ideas were adopted. Account money systems protected by SSL such as PayPal and e-gold were relatively successful, but more innovative mechanisms, including blinded token money, were not.

State the following sentences as true or false:

 

1. Online money transfers have replaced traditional paper methods.

2. PayPal service isn’t free.

3. Digital currency has the form of e-money.

4. Digital currency exchangers convert one type of digital currency (DC) into another.

5. Dr David Chaum who invented the a cryptographic signature permitted a virtual coin to be signed without the signer seeing the actual coin.

 

 

What are Mobile Payments?

There is a whole range of different types of mobile payment services including WAP, SMS, QR Codes, NFC and mBanking. Below is a breakdown of each of these mobile payment services:

SMS Payments: You send a payment request via SMS and a charge is applied to your phone bill. The merchant is informed of the charge and then releases the goods, which are most often digital (i.e. music, ringtones, apps etc.). In some cases an MMS message containing a QR barcode is delivered to you and scanned by the merchant for payment confirmation (i.e. electronic ticketing). This type of payment is often used for charity donations as well..

Mobile Web Payments (WAP): This is just shopping on a mobile website or regular website through your mobile phone browser. You enter your credit card and mailing information onto the website to pay for your desired products or services much in the same way as you would on your PC or laptop.

QR Code: Payment by QR Codes is a fast and efficient contact payment solution via Smart Phones. The user scans a QR barcode using the QR Pal application to complete a payment transaction.

Near Field Communications (Contactless NFC): An NFC enabled phone contains a radio frequency ID (RFID) chip or NFC technology, which communicates with the merchant's terminal allowing transactions to be triggered wirelessly. NFC Payments are currently limited to $15 without entering a PIN.

mBanking: It is now possible to make payments and transfers via online banking and banking applications on your mobile phone.

Source: http://www.qrpay.com/payments

Which mobile payment allows

4. paying through your mobile phone browser;

5. wireless transactions with the merchant's terminal;

6. paying via SMS;

7. paying via online banking;

8. paying by scanning a QR code

 

10.2. Mobile banking is a system that allows customers of a financial institution to conduct a number of financial transactions through a mobile device such as a mobile phone or personal digital assistant.

The earliest mobile banking services were offered over SMS, a service known as SMS banking. With the introduction of smart phones enabling the use of the mobile web in 1999, the first European banks started to offer mobile banking on this platform to their customers.

Mobile banking have led to increasing use of special client programs, called apps, downloaded to the mobile device. With that said, advancements in web technologies such as HTML5, CSS3 and JavaScript have seen more banks launching mobile web based services to complement native applications. A recent study (May 2012) by Mapa Research suggests that over a third of banks have mobile device detection upon visiting the banks' main website. A number of things can happen on mobile detection such as redirecting to an app store, redirection to a mobile banking specific website or providing a menu of mobile banking options for the user to choose from.

 

Answer the questions:

 

1. What is mobile banking?

2. When did SMS banking appear?

3. What can mobile device detection mean?

MOBILE PAYMENTS

Mobile banking differs from mobile payments, which involve the use of a mobile device to pay for goods or services either at the point of sale or remotely, analogously to the use of a debit or credit card to effect an EFTPOS payment.

Direct operator billing, also known as mobile content billing, WAP billing, and carrier billing, requires integration with the operator. It provides certain benefits:

1. the operators already have a billing relationship with the consumers, the payment will be added to their bill.

2. Provides instantaneous payment

3. Protect payment details and consumer identity

4. Better conversion rates

5. Reduced customer support costs for merchants

One drawback: the payout rate will be much lower than with other payment providers. Examples from a popular provider:

· 92% with Paypal

· 85 to 86% with Credit Card

· 45 to 91.7% with operator billing in the US, UK and some smaller European countries, but usually around 60%[14]

More recently, Direct operator billing is being deployed in an in-app environment, where mobile application developers are taking advantage of the one-click payment option that Direct operator billing provides for monetising mobile applications. This is a logical alternative to credit card and Premium SMS billing.

QR codes are an easy way to inject info into mobile phone. This makes it easy to create communication such as visit a website or copy useful text. QR codes have been around since they were invented in 1994. Originally used to track products in warehouses, QR codes were designed to replace traditional (1D bar codes). Traditional bar codes just represent numbers, which can be looked up in a database and translated into something meaningful. QR, or “Quick Response ” bar codes were designed to contain the meaningful info right in the bar code. They’ve been a successful marketing tool in Asia and Europe. In Germany a startup called GO4Q introduced mobile shopping / window shopping based on QR codes in October 2012. The system evolved and mobile payment was added by december 2012. GO4Q is using standard card payment procedures and thus not regionally limited. It requires a single registration.

Google, PayPal, GlobalPay and GoPago use a cloud-based approach to in-store mobile payment. The cloud based approach places the mobile payment provider in the middle of the transaction, which involves two separate steps. First, a cloud-linked payment method is selected and payment is authorized via NFC or an alternative method. During this step, the payment provider automatically covers the cost of the purchase with issuer linked funds. Second, in a separate transaction, the payment provider charges the purchaser's selected, cloud-linked account in a card-not-present environment to recoup its losses on the first transaction

Interview with Max Levchin

http://www.creditcardprocessingspace.com/paypal-founder-launches-new-online-payments-site-that-offers-credit/

PayPal co-founder Max Levchin is launching a new mobile-based online payments system called Affirm and it will offers its users credit, according to All Things Digital. Affirm will use Facebook as its authentication method and will use another company Levchin has invested in—Stripe—to process its credit card payments. An interesting aspect of Affirm is that besides just using traditional credit risk measures to determine if and how much credit it will extend to its users, it will also use “a number of other social and data signals to assess risk,” according to All Things Digital. Merchants who accept payments on credit through Affirm will pay Affirm a fee for this. How this will fit into the strict, government regulated credit market remains to be seen.

According to Levchin, “You will essentially be putting a purchase on a digital tab, and we are going to make it work for us by looking at all available data to determine if you are someone who will pay it back.” What data this means exactly is not yet known. Will Affirm be looking through the Facebook information of its users to authenticate the account to see if they are deadbeats? How regulators and fair lending laws will react to this leaves the success of this whole process very murky.

“Payments online are still too hard — we started the revolution with PayPal and democratized payments for small businesses, but we stopped


Поделиться с друзьями:

Индивидуальные и групповые автопоилки: для животных. Схемы и конструкции...

Типы оградительных сооружений в морском порту: По расположению оградительных сооружений в плане различают волноломы, обе оконечности...

Историки об Елизавете Петровне: Елизавета попала между двумя встречными культурными течениями, воспитывалась среди новых европейских веяний и преданий...

Кормораздатчик мобильный электрифицированный: схема и процесс работы устройства...



© cyberpedia.su 2017-2024 - Не является автором материалов. Исключительное право сохранено за автором текста.
Если вы не хотите, чтобы данный материал был у нас на сайте, перейдите по ссылке: Нарушение авторских прав. Мы поможем в написании вашей работы!

0.332 с.