当前位置:网站首页>Introduction to webrtc protocol -- an article to understand dtls, SRTP, srtcp
Introduction to webrtc protocol -- an article to understand dtls, SRTP, srtcp
2022-07-03 05:13:00 【Jiangnan - crossing the river with a reed】
DTLS effect

Packet transport layer security ( English :Datagram Transport Layer Security, Abbreviation for DTLS), Packet transport layer security , Is a communication protocol , Provide UDP The sending security of the protocol at the transport layer . It can provide TLS Similar security protection .DTLS Commonly used in streaming media .
DTLS And TLS
DTLS is similar to TLS intentionally except that DTLS has to solve two problems: packet lost and reordering. DTLS implements
packet retransmission
assigning sequence number within the handshake
replay detection.
DTLS be based on UDP Agreed ,OpenSSL Realized DTLS
stay WebRTC Use in DTLS There are two parts to it :
Datachannel Data channel . stay Datachannel In the data channel ,WebRTC Fully using the DTLS To negotiate and encrypt and decrypt
MediaChannel Media channel . In the media channel WebRTC Use SRTP To encrypt and decrypt data ,DTLS Is only used for key exchange ,RTP/RTCP For the sake of compatibility with historical equipment , Entirely by SRTP To achieve .
边栏推荐
- How to connect the network: Chapter 1 CSDN creation punch in
- 1110 complete binary tree (25 points)
- The principle is simple, but I don't know how to use it? Understand "contemporaneous group model" in one article
- cookie session jwt
- [research materials] 2021 annual report on mergers and acquisitions in the property management industry - Download attached
- Coordinatorlayout appbarrayout recyclerview item exposure buried point misalignment analysis
- Celebrate the new year together
- 酒店公共广播背景音乐-基于互联网+的酒店IP网络广播系统设计
- Ueditor, FCKeditor, kindeditor editor vulnerability
- Web APIs exclusivity
猜你喜欢
![[set theory] relationship properties (symmetry | symmetry examples | symmetry related theorems | antisymmetry | antisymmetry examples | antisymmetry theorems)](/img/34/d195752992f8955bc2a41b4ce751db.jpg)
[set theory] relationship properties (symmetry | symmetry examples | symmetry related theorems | antisymmetry | antisymmetry examples | antisymmetry theorems)

Kept hot standby and haproxy

小学校园IP网络广播-基于校园局域网的小学IP数字广播系统设计

es7创建索引容易犯的错误

联想R7000显卡的拆卸与安装

JS dynamic table creation

Make your own dataset

(perfect solution) how to set the position of Matplotlib legend freely

Botu uses peek and poke for IO mapping

【批处理DOS-CMD命令-汇总和小结】-CMD窗口的设置与操作命令-关闭cmd窗口、退出cmd环境(exit、exit /b、goto :eof)
随机推荐
Gbase8s unique index and non unique index
Basic use of Metasploit penetration testing framework
Prepare for 2022 and welcome the "golden three silver four". The "summary of Android intermediate and advanced interview questions in 2022" is fresh, so that your big factory interview can go smoothly
1086 tree traversals again (25 points)
Go practice -- closures in golang (anonymous functions, closures)
Yolov5 model construction source code details | CSDN creation punch in
小学校园IP网络广播-基于校园局域网的小学IP数字广播系统设计
1110 complete binary tree (25 points)
[basic grammar] Snake game written in C language
Common interview questions of microservice
Yolov5 input (II) | CSDN creative punch in
[set theory] relation properties (transitivity | transitivity examples | transitivity related theorems)
C language program ideas and several commonly used filters
Three representations of signed numbers: original code, inverse code and complement code
在PyCharm中配置使用Anaconda环境
Notes | numpy-11 Array operation
Botu uses peek and poke for IO mapping
appium1.22.x 版本後的 appium inspector 需單獨安裝
Overview of basic knowledge of C language
【批处理DOS-CMD命令-汇总和小结】-CMD窗口的设置与操作命令-关闭cmd窗口、退出cmd环境(exit、exit /b、goto :eof)