Network Dictionary
http://www.javvin.com/networkdiction-
ary.html
Network Protocols Map
http://www.javvin.com/map.html
Network Security Map
http://www.javvin.com/securitymap.
html
Wireless Communications
Technology Map
http://www.javvin.com/wirelessmap.
html
Network Protocols Hand-
book
http://www.javvin.com/model.html
TCP/IP Quick Guide
http://www.javvin.com/tcpipguide.html
Ethernet Quick Guide
http://www.javvin.com/ethernetguide.
html
Packet Analyzer
http://www.javvin.com/packet.html
DiskShare
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor
http://www.javvin.com/LANsurveyor.
html
CyberGauge
http://www.javvin.com/CyberGauge.
html
Easy Network Service
Monitor
http://www.javvin.com/easy.html
Business Card Scanner
http://www.javvin.com/businesscard-
scanner.html
Color Cards and Picture
Scanner
http://www.javvin.com/colorcardscan-
ner.html
Portable Document Scan-
ner
http://www.javvin.com/portablescan-
ner.html
www.javvin.com
www.networkdictionary.
com
Network Dictionary
http://www.javvin.com/networkdiction-
ary.html
Network Protocols Map
http://www.javvin.com/map.html
Network Security Map
http://www.javvin.com/securitymap.
html
Wireless Communications
Technology Map
http://www.javvin.com/wirelessmap.
html
Network Protocols Hand-
book
http://www.javvin.com/model.html
TCP/IP Quick Guide
http://www.javvin.com/tcpipguide.html
Ethernet Quick Guide
http://www.javvin.com/ethernetguide.
html
Packet Analyzer
http://www.javvin.com/packet.html
DiskShare
http://www.javvin.com/diskshare.html
DiskAccess
http://www.javvin.com/diskaccess.html
LANsurveyor
http://www.javvin.com/LANsurveyor.
html
CyberGauge
http://www.javvin.com/CyberGauge.
html
Easy Network Service
Monitor
http://www.javvin.com/easy.html
Business Card Scanner
http://www.javvin.com/businesscard-
scanner.html
Color Cards and Picture
Scanner
http://www.javvin.com/colorcardscan-
ner.html
Portable Document Scan-
ner
http://www.javvin.com/portablescan-
ner.html
www.javvin.com
www.networkdictionary.
com
Real Time Streaming Protocol
April 1998
[ Page 5 ]
12.16 Content-Type ................................................................................ 50
12.17 CSeq ............................................................................................. 50
12.18 Date .............................................................................................. 50
12.19 Expires .......................................................................................... 50
12.20 From ............................................................................................. 51
12.21 Host .............................................................................................. 51
12.22 If-Match ........................................................................................ 51
12.23 If-Modied-Since ......................................................................... 52
12.24 Last-Modied................................................................................ 52
12.25 Location ........................................................................................ 52
12.26 Proxy-Authenticate ...................................................................... 52
12.27 Proxy-Require .............................................................................. 52
12.28 Public ............................................................................................ 53
12.29 Range ............................................................................................ 53
12.30 Referer .......................................................................................... 54
12.31 Retry-After ................................................................................... 54
12.32 Require ......................................................................................... 54
12.33 RTP-Inf.......................................................................................... 55
12.34 Scale ............................................................................................. 56
12.35 Speed ............................................................................................ 57
12.36 Server ........................................................................................... 57
12.37 Session .......................................................................................... 57
12.38 Timestamp .................................................................................... 58
12.39 Transport ...................................................................................... 58
12.40 Unsupported ................................................................................. 62
12.41 User-Agent ................................................................................... 62
12.42 Vary .............................................................................................. 62
12.43 Via ................................................................................................ 62
12.44 WWW-Authenticate ..................................................................... 62
13 Caching .................................................................................................. 62
14 Examples ................................................................................................ 63
14.1 Media on Demand (Unicast) .......................................................... 63
14.2 Streaming of a Container le ......................................................... 65
14.3 Single Stream Container Files ........................................................ 67
14.4 Live Media Presentation Using Multicast ...................................... 69
14.5 Playing media intan existing session .............................................. 70
14.6 Recording ....................................................................................... 71
15 Syntax ..................................................................................................... 72
15.1 Base Syntax .................................................................................... 72
16 Security Considerations ......................................................................... 73
A RTSP Protocol State Machines ................................................................ 76
A.1 Client State Machine ....................................................................... 76
A.2 Server State Machine ....................................................................... 77
B Interaction with RTP ................................................................................ 79