Use Case Brief · Cloudflare Realtime

Real-time media infrastructure
for Multi Media LLC

Multi Media LLC operates live production events, remote collaboration workflows, and on-demand video delivery at scale. This brief maps their core infrastructure challenges to Cloudflare's Realtime platform — and quantifies the technical and business outcomes they can expect.

Cloudflare Realtime stack:
SFU Simulcast TURN WHIP / WHEP MoQ Transport Stream + Signed URLs Workers

Where today's infrastructure falls short

Multi Media LLC's current stack relies on a mix of third-party CDNs, self-managed SFU deployments, and legacy streaming infrastructure. At scale — and especially for live events — this creates compounding pain across three dimensions.

Latency and buffering under load

Traditional CDN-based video delivery uses TCP and long HLS/DASH segments. For live events with thousands of concurrent viewers, this means 5–30 second glass-to-glass latency and buffer stalls when regional origin capacity is exhausted. Remote production teams can't collaborate in real time on a 20-second lag.

Buffering spikes during live peaks 20–30s HLS latency Regional origin overload

Unreliable WebRTC connectivity

Remote production relies on WebRTC for real-time audio/video between crew. NATs and firewalls at venues, hotels, and corporate networks routinely block peer-to-peer connections. Without a managed TURN relay service, teams fall back to software workarounds, degraded quality, or dropped connections mid-shoot.

NAT/firewall traversal failures No managed TURN relay Call drops at venues

Content security and access control gaps

Delivering premium event recordings and brand films to paying clients requires granular access control. Public video IDs are trivially shareable. Geo-restrictions, time-limited access, and per-client authentication are needed but require custom middleware on top of every current CDN or streaming provider.

Public video IDs shareable No time-limited access Custom auth middleware required

Unpredictable egress and infrastructure costs

Live event spikes generate massive outbound bandwidth. Self-managed SFU deployments require over-provisioning compute to handle peak loads — most of that capacity sits idle. Third-party CDN egress charges scale linearly with audience size, making large events increasingly expensive to run.

Over-provisioned SFU servers Linear egress cost at scale Idle capacity between events

Cloudflare Realtime as the media backbone

Cloudflare Realtime replaces Multi Media LLC's patchwork of vendors with a single, globally distributed platform. Every component is serverless, managed, and deeply integrated.

Camera / Encoder OBS, hardware encoder, browser
WHIP
Cloudflare Realtime SFU 330+ cities · anycast routing
WHEP / WebRTC
Viewers / Crew Browser, mobile, hardware decoder

Core Transport

Realtime SFU

A Selective Forwarding Unit that routes WebRTC audio/video/data between participants without re-encoding. It functions as both an interactive conferencing SFU and a broadcast CDN fanout system. No servers to provision — it scales automatically across Cloudflare's network using anycast routing.

Protocol WebRTC (SDP / ICE / DTLS / SRTP)
Scale Serverless — no capacity planning required
Modes Interactive SFU + broadcast CDN fanout
Network 330+ cities, anycast routing
Multi Media LLC fit: Replace self-managed SFU deployments for remote production calls and live multi-viewer events with a managed, globally distributed alternative that scales to any audience size instantly.

Adaptive Quality

Simulcast

Publishers send three simultaneous encodings (high / medium / low) using WebRTC RTP stream identifiers (RIDs). The SFU dynamically selects the appropriate layer for each subscriber based on their network conditions — or operators can pin a layer manually via the API. Per-track bandwidth estimation runs independently.

Publisher sends 3 layers simultaneously
const transceiver = pc.addTransceiver(track, {
  direction: "sendonly",
  sendEncodings: [
    { rid: "f", scaleResolutionDownBy: 1 },   // 1080p full
    { rid: "h", scaleResolutionDownBy: 2 },   // 540p half
    { rid: "q", scaleResolutionDownBy: 4 },   // 270p quarter
  ],
});
Multi Media LLC fit: Live event viewers on mobile or congested networks automatically receive lower-quality streams, eliminating buffering. Crew on fast connections see full 1080p with no manual intervention.

Connectivity

TURN Service

A managed TURN relay that ensures WebRTC connectivity even through NATs, corporate firewalls, and venue networks that block UDP. Uses anycast routing so clients automatically connect to the nearest Cloudflare location. Free when used with the Realtime SFU — otherwise $0.05/GB outbound.

STUN/TURN UDP turn.cloudflare.com:3478 / alt :53
TURN over TCP Port 3478 / alt :80
TURN over TLS Port 5349 / alt :443 (TLS 1.3)
Cost with SFU $0 — included
Multi Media LLC fit: Venue and hotel networks routinely block UDP. With Cloudflare TURN over TLS:443, remote crew connections survive any network restriction — no on-site network configuration required.

Ingest / Egress

WHIP & WHEP

WHIP (WebRTC-HTTP Ingest Protocol) and WHEP (WebRTC-HTTP Egress Protocol) are IETF-standardized signaling protocols that allow any encoder — OBS, hardware encoders, or custom apps — to push and pull WebRTC streams via simple HTTP requests, without implementing custom SDP negotiation.

WHIP ingest from a Cloudflare Worker
// Ingest: encoder POSTs SDP offer to your Worker
const whipResp = await fetch(
  `https://rtc.live.cloudflare.com/v2/apps/${APP_ID}/sessions/new`,
  {
    method: 'POST',
    headers: { 'Authorization': `Bearer ${TOKEN}` },
    body: sdpOffer
  }
);
const { sessionId, sdpAnswer } = await whipResp.json();
Multi Media LLC fit: Production teams use OBS or hardware encoders on-site. WHIP lets them push directly to Cloudflare Realtime without any proprietary streaming SDK — standard HTTP POST with an SDP offer.

On-Demand Delivery

Stream + Signed URLs

Cloudflare Stream's signed URL system lets Multi Media LLC deliver recorded event footage and brand films exclusively to paying or authenticated clients. JWTs are generated server-side (inside a Worker) using a signing key — tokens can carry expiry, geo restrictions, and download permissions with no per-token API call needed.

Generate a signed token in a Worker
const payload = {
  sub: videoUID,
  exp: Math.floor(Date.now() / 1000) + 3600,
  accessRules: [
    { type: 'ip.geoip.country', action: 'allow', country: ['US'] },
    { type: 'any', action: 'block' }
  ]
};
// Sign with RSA-256 using stored JWK — no API call
const token = await signJWT(payload, signingKey);
Multi Media LLC fit: Client deliverables and event recordings are locked behind time-limited, geo-restricted signed URLs — no public video IDs, no custom auth middleware, no external token service.

Privacy & Compliance

End-to-End Encryption (E2EE)

Cloudflare's Cloudflare Meet (formerly Orange Meets) demonstrates MLS-based E2EE over the Realtime SFU. The SFU never sees plaintext media — it only forwards encrypted bytes. A WASM Rust service worker handles per-frame MLS encryption and a designated committer algorithm manages key rotation as participants join and leave.

Protocol MLS (RFC 9420) — IETF standard
Key Exchange Continuous group key agreement (CGKA)
Encryption Per-frame, WASM Rust worker in browser
Verification Safety number (out-of-band verification)
Multi Media LLC fit: Confidential pre-launch client reviews, legal holds on unreleased content, and NDA-covered productions can be conducted over encrypted video calls where Cloudflare's infrastructure never accesses media content.

How Multi Media LLC's stack is built

Three deployment patterns covering live production, remote crew collaboration, and on-demand client delivery — all on a single Cloudflare account.

Live event at scale

An on-site encoder (OBS or hardware) pushes via WHIP to the Cloudflare Realtime SFU. The SFU fans out to viewers via WHEP or the WebRTC player. Simulcast ensures every viewer — from a 5G phone to a fiber desktop — gets the right quality layer automatically. TURN over TLS:443 handles venue networks that block UDP.

1
Encoder → SFU
OBS/hardware pushes SDP offer via WHIP POST to a Cloudflare Worker that proxies to the Realtime API and returns the SDP answer.
2
SFU → Simulcast layers
Publisher sends RIDs f/h/q. SFU stores all three layers and serves each subscriber the highest layer their bandwidth supports.
3
TURN relay fallback
If direct UDP is blocked, TURN over TLS:443 relays media. Anycast routing ensures the relay is geographically co-located with the SFU.
4
Stream recording + signed delivery
Post-event, recordings are available in Cloudflare Stream and delivered to clients via time-limited, geo-restricted signed URLs.
Encoder
OBS / HW
WHIP
CF Realtime SFU
Simulcast · TURN
WHEP
Desktop 1080p
WHEP
Mobile 360p

Remote crew collaboration

Directors, producers, and remote crew join a shared SFU room. Each participant publishes audio and video; the SFU selectively forwards streams. The MLS-based E2EE layer (from Cloudflare Meet / Orange Meets) encrypts every frame in-browser — Cloudflare's SFU forwards ciphertext only. TURN ensures connectivity from any location.

1
Room creation via Workers
A Cloudflare Worker creates an SFU session and returns a room token. All participants connect to the same SFU session via WebRTC.
2
E2EE key negotiation
MLS group key is established client-side. A designated committer handles add/remove operations. The SFU sees only encrypted bytes.
3
AI participant (optional)
An OpenAI Realtime API WebRTC relay (from realtime-examples) can be added as an AI participant for real-time transcription or direction assistance.
Director
Producer
Remote Crew
CF Realtime SFU
E2EE · TURN · Simulcast

Client video delivery

Completed productions are uploaded to Cloudflare Stream. A Cloudflare Worker generates signed JWT tokens on demand, scoped per client with expiry, geo-restriction, and optional download permissions. Clients access deliverables through a Pages-hosted portal — no public video IDs are ever exposed.

1
Upload to Stream
Finished video is uploaded via the Stream API or direct creator upload. requireSignedURLs: true is set immediately, disabling any public access.
2
Token generation in Worker
Client portal authenticates the user, then calls a Worker that signs a JWT with the client's allowed country codes, a 24-hour expiry, and the specific video UID.
3
Playback via signed token
The token replaces the video ID in the Stream embed URL. Stream validates the JWT signature on every request — no separate auth service, no token database.
Upload
Stream API
store
CF Stream
requireSignedURLs
signed token
Client
Time-limited access

What Multi Media LLC gets

Mapped across two dimensions: the technical gains the engineering team experiences, and the business results that flow from them.

Technical Outcomes
Sub-500ms glass-to-glass latency for live events

WebRTC SFU delivery via WHEP replaces HLS polling. Combined with simulcast for adaptive quality, live event viewers experience real-time playback instead of 20–30 second buffered segments. MoQ Transport (IETF draft-14 in moq-rs) pushes this to sub-200ms at CDN scale as it matures.

100% WebRTC connectivity regardless of network

Cloudflare TURN over TLS:443 ensures fallback connectivity from any environment — venue networks, hotel WiFi, corporate firewalls. The anycast routing means the relay is co-located with the SFU edge, keeping round-trip latency minimal even through relay.

Automatic quality adaptation per viewer

Simulcast with three RID layers (full / half / quarter resolution) means the SFU switches quality per-subscriber based on their real-time bandwidth estimate. No manual quality selection by viewers, no quality locking that wastes bandwidth on capable connections.

Zero infrastructure provisioning for live events

The Realtime SFU is serverless — Multi Media LLC deploys no compute for live event scale. No pre-provisioned SFU clusters, no capacity planning spreadsheets before events. The Cloudflare network absorbs arbitrary audience spikes without operator intervention.

E2EE for confidential productions

MLS-based end-to-end encryption (IETF RFC 9420), as deployed in Cloudflare Meet, ensures that confidential pre-release content and NDA-covered sessions are never accessible to the infrastructure layer. Perfect forward secrecy and post-compromise security are guaranteed by continuous group key agreement.

Cryptographically secure content delivery

Stream signed URLs using RSA-256 JWTs generated inside a Worker (no Cloudflare API call per token) provide time-bound, geo-restricted, per-client access control on recorded content. Signing keys are rotated independently; up to 1,000 keys can be active simultaneously.

Business Outcomes
Eliminate SFU server costs entirely

Self-managed SFU deployments (media servers, autoscaling groups, ops overhead) are replaced by a pay-per-use serverless model. There is no idle capacity to pay for between events. Infrastructure costs shift from fixed CapEx to variable costs that scale directly with revenue-generating events.

New premium content tiers with access control

Signed URLs unlock a commercial model where recordings are sold as time-limited access products. Geo-restricted tokens allow territory-based licensing. Download-enabled tokens can back a premium tier. All of this is implemented in a single Worker with no external auth service.

Faster remote production cycles

Sub-500ms real-time collaboration between remote directors, producers, and on-site crew eliminates the communication lag that adds hours to remote production days. Review cycles that currently require in-person meetings can be conducted remotely without quality loss.

TURN cost absorbed by SFU usage

Cloudflare TURN is $0 when used with the Realtime SFU — a managed relay service that would otherwise require dedicated TURN server infrastructure is included at no additional cost for the primary use case, reducing the total cost of the real-time stack.

Reduced vendor surface area

Stream, Realtime SFU, TURN, Workers, Pages, R2, and Durable Objects are all on one Cloudflare account, one contract, one billing surface. Replacing separate CDN, SFU-vendor, TURN vendor, and video hosting contracts reduces procurement complexity and creates leverage for negotiation.

Future-proof on open standards

WHIP/WHEP (IETF), MoQ Transport (IETF draft-14), and MLS (RFC 9420) are all open standards. Multi Media LLC's stack is not locked to proprietary protocols — the same encoder, player, and key management flows work across any standards-compliant infrastructure.

<500ms Live event latency
(vs 20–30s HLS)
$0 TURN cost
with Realtime SFU
100% WebRTC connectivity
any network, any venue
0 SFU servers
to provision
E2EE MLS RFC 9420
for confidential sessions
1 Platform for all
real-time & VOD needs

Technical resources

Everything you need to evaluate, prototype, and deploy — directly from Cloudflare's engineering and product teams.