uvgrtp-base/docs/examples/binding.cc

108 lines
4.2 KiB
C++
Raw Normal View History

2020-04-27 11:07:24 +00:00
#include <uvgrtp/lib.hh>
2020-04-03 08:50:44 +00:00
#include <iostream>
/* Some NATs may close the hole created in the firewall if the stream is not bidirectional,
* i.e., only one participant produces and the other consumes.
*
* To prevent the connection from closing, uvgRTP can be instructed to keep the hole open
* by periodically sending 1-byte datagram to remote (once every 2 seconds).
*
* This is done by giving RCE_HOLEPUNCH_KEEPALIVE to the unidirectional media_stream that
* acts as the receiver
*
* All RFC 3550 compatible implementations should ignore the packet as it is not recognized
* to be a valid RTP frame and the stream should work without problems.
*
* NOTE: this flag is only necessary if you're using the created media_stream object
* as a unidirectional stream and you are noticing that after a while the packets are no longer
* passing through the firewall */
// Change these to reflect your local and remote addresses. In this example both remote
// and local are in localhost so this example can be run anywhere.
constexpr char LOCAL_INTERFACE[] = "127.0.0.1";
constexpr uint16_t LOCAL_PORT = 8888;
constexpr char REMOTE_ADDRESS[] = "127.0.0.1";
constexpr uint16_t REMOTE_PORT = 8889;
// Parameters of sent dummy frames
constexpr uint16_t PAYLOAD_MAXLEN = 256;
constexpr int SEND_TEST_PACKETS = 100;
constexpr int PACKET_INTERVAL_MS = 1000/30;
2020-04-03 08:50:44 +00:00
void hook(void *arg, uvgrtp::frame::rtp_frame *frame)
{
std::cout << "Received frame: Payload size: " << frame->payload_len << std::endl;
uvgrtp::frame::dealloc_frame(frame);
}
2020-04-03 08:50:44 +00:00
int main(void)
{
std::cout << "Starting uvgRTP binding example" << std::endl;
/* See sending.cc for more details */
uvgrtp::context rtp_ctx;
2020-04-03 08:50:44 +00:00
/* Start session with remote at IP address LOCAL_INTERFACE
* and bind ourselves to interface pointed to by the IP address REMOTE_ADDRESS */
uvgrtp::session *local_session = rtp_ctx.create_session(LOCAL_INTERFACE, REMOTE_ADDRESS);
2020-04-03 08:50:44 +00:00
/* LOCAL_PORT is source port or the port for the interface where data is received
* REMOTE_PORT is remote port or the port for the interface where the data is sent */
uvgrtp::media_stream *send = local_session->create_stream(LOCAL_PORT, REMOTE_PORT, RTP_FORMAT_H265, RTP_NO_FLAGS);
// Notice the RCE_HOLEPUNCH_KEEPALIVE flag which keeps the NAT/firewall open
uvgrtp::session *remote_session = rtp_ctx.create_session(REMOTE_ADDRESS, LOCAL_INTERFACE);
uvgrtp::media_stream *recv = remote_session->create_stream(REMOTE_PORT, LOCAL_PORT,
RTP_FORMAT_H265, RCE_HOLEPUNCH_KEEPALIVE);
if (recv)
{
/* install receive hook for asynchronous reception */
recv->install_receive_hook(nullptr, hook);
}
else
{
std::cerr << "Failed to install receive hook!" << std::endl;
}
2020-04-03 08:50:44 +00:00
if (send)
{
auto start = std::chrono::steady_clock::now();
for (unsigned int i = 0; i < SEND_TEST_PACKETS; ++i)
{
std::cout << "Sending frame " << i + 1 << '/' << SEND_TEST_PACKETS << std::endl;
2020-04-03 08:50:44 +00:00
std::unique_ptr<uint8_t[]> dummy_frame = std::unique_ptr<uint8_t[]>(new uint8_t[PAYLOAD_MAXLEN]);
if (send->push_frame(std::move(dummy_frame), PAYLOAD_MAXLEN, RTP_NO_FLAGS) != RTP_OK)
{
std::cerr << "Failed to send frame" << std::endl;
}
2020-04-03 08:50:44 +00:00
// wait until it is time to send the next frame. Included only for
// demostration purposes since you can use uvgRTP to send packets as fast as desired
auto time_since_start = std::chrono::steady_clock::now() - start;
auto next_frame_time = (i + 1)*std::chrono::milliseconds(PACKET_INTERVAL_MS);
if (next_frame_time > time_since_start)
{
std::this_thread::sleep_for(next_frame_time - time_since_start);
}
}
2020-04-03 08:50:44 +00:00
}
else
{
std::cerr << "The creation of send media_stream failed!" << std::endl;
}
2020-04-03 08:50:44 +00:00
if (send)
local_session->destroy_stream(send);
if (recv)
remote_session->destroy_stream(recv);
if (local_session)
rtp_ctx.destroy_session(local_session);
if (remote_session)
rtp_ctx.destroy_session(remote_session);
2020-04-03 08:50:44 +00:00
}