An error recovery transmission mechanism for mobile multimedia

Size: px
Start display at page:

Download "An error recovery transmission mechanism for mobile multimedia"

Transcription

1 An error recovery transmission mechanism for moile multimedia Min Chen *, Ang i School of Computer Science and Technology, Hunan Institute of Technology, Hengyang, China Astract This paper presents a channel coding transmission mechanism in wireless and moile networks y using the cross-packet transmission method of the su-lock structure to solve the prolem of the poor quality of the network moile multimedia. The present channel coding technology has the protective effect aiming to the data transmission in the moile network. However, the present channel coding technology faces many kinds of network transmission phenomenon under the limited andwidth constraint, including those comprehensive prolems caused y the network congestion and the signal error. The poor efficiency of the data recovery and the andwidth utilization is still one of the channel coding s main defects. Compared with the present technologies, the experimental results demonstrate that the proposed method can achieve etter andwidth utilization y means of using su-lock coding structure to comat with small amount of transmission errors. Furthermore, the data recovery performance can e improved ased on the two following facts aout the cross -packet transmission: ) the channel coding capacity is eyond a single packet and 2) oth packet loss and signal error can e recovered simultaneously. Keywords: cross-packet, channel coding, forward error correction,, error recovery, moile multimedia Introduction With the increasing of the Internet popularizing rate, the source of the digital contents presents a prosperous development tendency through the wireless access technology. According to the statistics from the ministry of economic affairs digital content industry office, the output in the moile application service attained 2.86 illion dollars in 22 and its annual growth rate is 3.45%. Adding to the emerging digital converge service, the future moile users can receive several of data from the telecommunication, Internet and television. The investigating reports in the Google moile network and the user s ehavior also show that 9 percent of the smart phone users watch videos through the moile phones, and 3 percent of users use the video function once everyday. The traditional multimedia data transmission model easily causes the data loss under the influence of communication quality and the andwidth. For example, the lack of the andwidth under the network heterogeneity causes the packet loss and the poor efficiency of the communication environment causes the data error. The results make users can not otain the complete data so that the correct information can not e showed. The present network does not possess the quality of service mechanism, the channel coding technology and the low latency method can provide the reliale data transmission. The typical channel coding applications include the wireless communication protocol such as 82. Wireless AN and 82.6 WiMAX, and the video streaming service such as the video conference. The core technology of the channel coding is forward error correction. The original data is coded to the data in the transmission terminal and the two data are transmitted together. The receiving terminal conducts the decoding action to recover the original data within the tolerant data error numers in terms of the condition of the data reception. Although the utilization can offer the error recovery function, the cost of adding the andwidth should e paid off. When the coding data cannot recover the network transmission error, the prolem of wasting the andwidth can e caused. According to the advantages and the disadvantages analysis of the network transmission in the application, the high efficient mechanism in the data transmission system should e designed to improve the service quality in the moile network video in terms of the andwidth resources whose wireless moile network is relative precious. The present known channel code has two types: the signal packet model and the cross packet model. The Figure shows that the signal packet model merges the original data and the data into a signal transmission packet, and its advantage is that the decoding procedure can e conducted after the receiving terminal gets a packet. Therefore, it time delaying is low. While its disadvantage is that it just can deal with the data loss caused y the signal error. What s worse, the whole packet loss has no protective aility and the efficiency of the channel coding can e limited y the length of the maximum transmit unit in the network, namely, the size of the data numer in EFC is limited. When the condition of the signal error is severe, the data protective aility provided y the signal packet model will e lowed. The cross packet model regards the packet in the coding & decoding as unit and the * Corresponding author s chenminhit@63.com 54

2 original packet can codes packet so that the prolems of the packet loss and the data loss caused y the signal error can e solved simultaneously, its structure is shown as the Figure 2. The coding & decoding data numers in the are very large and the receiving terminal needs to wait for time to collect all transmitting packets, the time delaying is rather high. In addition, using the larger data numer packet to recover the signal error whose data numers are relative small in the andwidth utilization is also not economic. Under the limited transmission andwidth, the andwidth cost in the cross packet model has low economic enefit so that its protective aility is limited. The two different kinds of the models have advantages and disadvantages. In general, the signal packet model is fit for the wireless communication protocol to maintain a certain communication quality and the cross packet model is widely applied to all kinds of the network application service. With the variety of the network. The channel coding must adapt to the changing of all network environments and the accumulation of the transmission conditions. For example, the numers of the data loss may accumulate the final results formed y the different transmission factors. Therefore, no matter whether the effect of the signal packet model is not enough to handle the packet loss and the MTU limitations or low andwidth utilization in the cross packet model, all of these prolems are the needed improved ojects. source packe t it errors packe t Packet loss FIGURE The packet structure in the signal packet model source packet packet su locks and the coding su locks to form the transmission packets, namely, two kinds of the su locks can e assemled into the transmission packet individually. The two different assemling methods allow the coding su locks to cross many transmission packets. When the mechanism connects to the wireless moile network transmission system, the parameter and the formula can e set in terms of the target application s network environment. Moreover, the calculation of the su lock size, the numers of the coding su locks and the assemling of the transmission packet can e done so that the proposed mechanism can have the optimal efficiency. 2 The error recovery mechanism with the su lock structure Aiming to the signal packet model s and the cross packet model s efficiency limitation in the moile data transmission, the error recovery mechanism with the su lock structure is proposed to adapt to the coding unit in the wireless transmission environment, and the data s network transmission is conducted y the cross packet model. As shown in the Figure 3, the original data packet can e disassemled into a smaller source su lock and it regards coding as the unit, and the needed coding su locks can e produced according to the present network transmission conditions. Then the su locks can e assemled into the transmission packet, and the coding su locks are allowed to cross many transmission packets during the assemling procedure. On the one hand, the mechanism can effectively improve the utilization of the andwidth. On the other hand, the packet assemling method in the cross packet can avoid the MTU limitation and has a higher elasticity in the utilization. In order to make the su lock structure apply into the transmission system, the mechanism further design the needed data packet format and formulate the data transmission procedure. The related details are shown in the following su chapters. it errors Packet loss Source packet packet FIGURE 2 The packet structure in the cross packet model The coding mechanism with the su lock structure y connecting the wireless moile network transmission system is connected is proposed to minimum the coding data numers for protect the most common it errors and the packet loss so that the efficiency of the andwidth utilization and the efficiency of the data recovery can e considered simultaneously. The proposed mechanism in the operation can e divided into two parts:. the original data packet can e disassemled into a smaller source su lock and it regards coding as the unit, and the needed coding su locks can e produced according to the present network transmission conditions. 2. The su locks can e assemled into the transmission packet, and the assemling method can merge the source it errors Packet loss FIGURE 3 The cross packet model with the su lock structure 2. DATA PACKET FORMAT The length of the su lock is allowed to e changed so that how to define the positions of some individual su locks for correctly conducting the E\ coding & decoding procedure in a packet is the designing key point. Take the applied layer as an example, the Figure 4 illustrates that the data format in the transmission packet is applied with the use of the su lock coding structure. In 55

3 general, the s error recovery technology is applied in the multimedia data network transmission. The kind of the transmission uses UDP (User Datagram Protocol) as the transmission layer protocol. And then connects with the application layer protocol in the RTP (Real-time Transmission Protocol) to control and supervise the data s transmission conditions. In order to carry all kinds of the data flow patterns, RTP has formulated the s control header to conduct the data s coding & decoding procedure. The packet can e divided into header fields and data fields with the present multimedia data transmission structure. The header fields include data header, su lock header and header. The data header in the Figure 4 is compatile with the standard of the RTP/UDP protocol, and the header is compatile with the related standards of the RFC59 protocol. Code Amount Blocks (code=) Data header Su-lock header Checksum... Checksum n Data header Su-lock Source Data ( data) FIGURE 4 The packet format in the su lock... Su-lock n The su lock header can include the content source code segment which identify the composition source of the su locks in the packet, the amount segment which record and store the n numers of the su locks in the packet, multi validation and checksum segments which individually record the validation and the value in the ~n su lock. The validation and the value can e used to check whether the su lock can happen errors. The data fields put multi source su lock information or the su lock information. There are three packet kinds through the su lock coding in terms of the difference of the packet contents:. source data, 2. data and 3. Mixed source data with the data. The former two packets can e regarded as the transmission packet assemled y the source su lock and the su lock individually. Code segment can identify the packet types. For example, the Code segment is composed y two its: the first it is the source data it. When the it is remarked as I, the su lock in the data field includes the source su lock; the second it is data it. When the it is remarked as I, the su lock in the data field includes the su lock. Therefore, when the Code segment is, the transmission packet is the source data packet; while the Code segment is, the transmission packet is the data packet. When the Code segment is, the transmission packet is assemled y the source data packet and the data packet. The Code segment remains unused under the definition. When the Code segment is, the Amount segment needs a new extensional locks segment for remarking the numers of the data packet. original data su lock control unit coder packet encapsula tion unit network decapsula tion unit su lock assemly unit Feedack message original data decoder FIGURE 5 System structure and transmission procedure The display order of the su locks in the data field is further defined under the model of the mixture source su locks and the su locks, that is, the source su lock exists efore the su lock. Therefore, the former Amount Blocks in the transmission packet are source su lock and the later Blocks are the su lock. When the Code segment is not, the Blocks segment does not exist. The design considers that the mixture packet condition just appears in the convergence of the source su locks and the su locks. Therefore, the Blocks segment can e regarded as the need utilization for the effective use of the andwidth. The Figure 5 is the mechanism s structure and the operational procedure in the data transmission system, including six system units:. Su lock control unit: According to the recovery information in the su lock assemly unit, the size of the su lock can e decided and the numers of the su lock can e calculated. 2. EC coder: Conduct the coding procedure in the su lock. 3. Packet encapsulation unit: Encapsulate the su lock into the transmission packet. 4. De capsulation unit: De capsulate the transmission packet into su lock. 5. Su lock assemly unit: Filter the error su lock, collect the complete receiving su locks and recover the statistical information of the receiving data to the su lock control unit. 6. decoder: Conduct the decoding procedure and recover the original data. Compared with the traditional data transmission system, the mechanism adds the new specific units: Su lock control unit and Su lock assemly unit. The system can set the parameter and the formats in terms of the target application s network environment so that the method can otain the optimal effect in all network transmission environments. The main calculation is to determine the length of the su lock, the numer of the su lock and the needed su lock numers. The su lock length and the su lock numer are calculated 56

4 y the su lock control unit in reference to the su lock assemly unit, while the packet encapsulation unit and the de capsulation unit are according to the former descried packet format. In order to recover the packet loss caused y the network congestion, the coder and decoder can adopt to the common Reed-Solomon (RS) code. As to the RS code, when the su lock happens error, it can e regarded as the su lock loss and comine with the cross packet s transmission model. Therefore, the data recovery in the transmission error and the packet loss can e handled simultaneously. lock is k, the expected recovery rate in the source su lock is R. The following Equation can calculate the h numer in the su lock and its otained total su lock numer is (k+h). R k h ( k h k h i i )( P total ) ( P total ). (6) i k i If the k numer of the source su lock is 8, the packet total loss rate Ptotal is.2 and the expected data recovery rate R is.95, the minimun value of the h numer su lock is 5 in terms of the Equation (6). 3 The optimal calculation of the su lock The optimal calculation method is introduced and the performance verification can e conducted. If the current length of the su lock is it and the su lock error rate caused y the it errors is P, the it error rate is P. The Equation () is as follows: P ( P ) P P B B In the Equation (), the su lock error rate PB can e otained y the recovery information in the su lock assemly unit. According to the it error rate is P, the optimal su lock length can e calculated (opt) and the present su lock length can e updated. If the needed data header length in the su lock is d it, the transmission efficiency in the su lock can e defined as E: ( ) ( ) E P d d (). (2) The should e differential. If the differential result is set as, the opt can e otained as shown in the Equation (3) opt d In P d In P d In P 2 In( P ) 2 2 ( ) 4 ( ) ( ). (3) The new su lock error rate PB_new can e otained with the use of the su lock length opt. ater. The su lock error rate PB_new caused y the newly otained su lock length P can e predicted. P _ ( P) opt B new. (4) If the PB_new adds the packet loss rate PC caused y the packet loss in the su locks, the total loss rate Ptotal in all su locks can e otained. P P P. (5) total B _ new c In the meantime, the packet loss rate PC can e otained from the recovery information in the su lock assemly unit. The recovery condition in the source data is that the numers of the total su locks received from the coder is larger than or equal to the k numer in the source su lock. If the numer of the present source su 4. Experimental result and efficient analysis The validations of the experimental environment are as follows: The packet loss rate of the network is set as %, 2% and 3%, the loss numer of the average packet is set as 3, and the it error rate is set as -, -2, -3, -4, -5 and -6. According to the corresponding network from the %, 2% and 3% packet loss rate, the utilized andwidth is 224 KB/s, 45 KB/s, KB/s respectively. The fixed packet length is ytes, the original data source can e compressed into Foreman video whose format is MPEG4 QCIF and its frame per second is 3. The comparative oject in the experiment is the traditional cross packet model. The size and the numer of the su lock in the mechanism is determined y the aove optimal method discussed in the former chapters. In the setting expected recovery rate aspect, the unequal error protection mechanism is adopted in terms of the method in the reference []. The important data can e distriuted a large numer of packet and the unimportant data can e distriuted a small numer of packet. The negative effects of the data recovery caused y the limited andwidth can e reduced to the minimum. The efficient parameter adapts to the playale frame rate, and its definition is that if the present playale frame numer per second id f, and the playale frame rate is (f/3). Therefore, the higher the playale frame rate is, the more the source data in the video has, namely, the recovery affect in the etter. The testing video in the experiment in compressed through the 3 frame numers per second defined y the National Television Standards Committee, the conversion of the playale frame rate is.. The four kinds of the experiments are conducted successively. The former three mainly analyzes the difference of the playale frame rate y oserving the %, 2% and 3% packet loss rate. The Figure 6-8 present the three experimental results. The forth experiment counts the total utilization of the andwidth otained from the former three experiments whose experimental result is as shown in the Figure 9. The result in the first experiment is as shown in the Figure 6 whose packet loss rate is %. The higher playale frame rate under the condition of the transmission it error which is larger than -3 can e otained in the paper. The - it error usually represents the worst transmission environment so that nearly all 57

5 playael frame rate COMPUTER MODEING & NEW TECHNOOGIES 24 8(2B) transmission packet can happen errors. What s worse, the efficient difference can not e oserved. The result in the second experiment is as shown in the Figure 7 whose packet loss rate is 2%. The higher playale frame rate under the condition of the transmission it error which is larger than -3 can e otained in the paper. Compared with the first experiment, the packet loss rate in the transmission environment can e increased and the utilized andwidth can e reduced. The efficiency provided y the paper under the condition of the -2 it error rate can e improved largely, in which the playale frame rate is.8 and the frame numer per second is 25. In addition, the playale frame rate is. in the traditional cross packet model and its frame numer per second is just 3. The result in the third experiment is as shown in the Figure 8 whose packet loss rate is 3%. The higher playale frame rate under the condition of the transmission it error which is larger than -4 can e otained in the paper. The magnitude of the improvement can e increased with the increasing of the it error rates. The efficiency parameter in the forth experiment is data overhead whose definition is as follows: Overhead is equal to the packet header data size in all transmission packets plus to the data sizes of all su locks. The lower the Overhead s, the higher the efficiency of using the andwidth y the has. The Figure 9 shows the differences of the data usage etween the two comparative methods. The data sources are from the first experiment to the third experiment, and the packet loss rate is respectively the data usage under the %, 2% and 3% packet loss rate. Overhead(kiloytes) playael frame rate Bit error rate FIGURE 8 the third experimental result: the packet loss rate is 3% Congestion packet loss rate (%) FIGURE 9 the overhead statistical result from the first experiment to the third experiment Compared with the traditional packet model, the experiment results show that the data usage in the mechanism is lower. In fact, the mechanism can possessed etter transmission efficiency in the former experimental results. In addition, the mechanism can adopt the timesaving umer to finish the source data recovery so that the optimal efficiency under the limited andwidth can e otained. playale framerate FIGURE 6 The first experimental result: the packet loss rate is % Bit error rate FIGURE 7 The second experimental result: the packet loss rate is 2% 5 Conclusion Aiming to the limited andwidth, the transmission error and the network congestion suffered from the multimedia data transmission in the wireless moile network, the cross packet transmission mechanism with the su lock channel coding structure. Comining with the asic concepts etween the su lock structure and the cross packet transmission, the data packet format in the application layer is further formatted and the transmission system structure and the optimal calculation in the su lock can e illustrated so that the mechanism in the implement interface is complete. After the comparison and analysis of the related experiments, the mainly efficiency in the mechanism can e applied in the time-saving data sizes for recovering the error data so that the data recovery efficiency in the limited andwidth can e largely improved. The advantage makes the mechanism e applied in the multimedia application whose andwidth is limited in the moile network. 58

6 References [] Availale: [2] ser-ehavior-survey [3] ocal and metropolitan area networks Specific requirements Part : Wireless AN medium access control (MAC) and physical layer (PHY) specifications Amendment 8: medium access control (MAC) quality of Service enhancements IEEE Standard [4] Part 6: Air interface for fixed roadand wireless access systems IEEE Standard 82.6, Oct 24 [5] Rizzo 997 Effective erasure codes for reliale computer communication protocols ACM SIGCOMM Computer Communications 27(2) [6] Choi S, Choi Y, ee I 26 IEEE 82. MAC-level scheme with retransmission comining IEEE Trans on Wireless Communications 5 2 [7] Hwang S-h, Hwang S-O, Myung S, Yang H-K, Park K-M 23 Method for generating forward error correction packet in multimedia system and method and apparatus for transmitting and receiving forward error correction packet US Patent (issued) US A [8] Shan Y 25 Cross-layer techniques for adaptive video streaming over wireless networks EURASIP Journal on Applied Signal Processing [9] Tsai M-F, Shieh C-K, Ke C-H, Deng D-J 2 Su-packet forward error correction mechanism for video streaming over wireless networks Multimedia Tools and Applications 47() [] Park K, Wang W 2 QoS-sensitive transport of real-time MPEG video using adaptive redundancy control Computer Communications [] Wu H, Claypool M, Kinicki R 25 Adjusting Forward Error Correction with Temporal Scaling for TCP-Friendly Streaming MPEG ACM Transactions on Multimedia Computing Communications, and Applications (4) [2] Yuan Y, Cockurn B, Sikora T, Mand M 27 Efficient allocation of packet-level forward error correction in video streaming over the Internet Journal of Electronic Imaging 6(2) -2 [3] Shih C H, Shieh C K, Hwang W S 28 A Transparent oss Recovery Scheme Using Packet Redirection for Wireless Video Transmissions EURASIP Journal on Advances in Signal Processing Article ID [4] i A 27 RTP payload format for generic forward error correction RFC59 IETF [5] Plummer W W 989 TCP Checksum Function Design ACM SIGCOMM Computer Communication Review 9(2) 95- Authors Min Chen, 978-3, Hengyang Hunan, China. Current position, grades: associate professor. University studies: Central South University, China. Scientific interest: network technology, wireless sensor network. Ang i, , Yueyang Hunan, China. Current position, grades: associate professor. University studies: Central South University. Scientific interest: Network technology, Wireless sensor network. 59

Bandwidth Adaptation for MPEG-4 Video Streaming over the Internet

Bandwidth Adaptation for MPEG-4 Video Streaming over the Internet DICTA2002: Digital Image Computing Techniques and Applications, 21--22 January 2002, Melbourne, Australia Bandwidth Adaptation for MPEG-4 Video Streaming over the Internet K. Ramkishor James. P. Mammen

More information

IMPROVING QUALITY OF VIDEOS IN VIDEO STREAMING USING FRAMEWORK IN THE CLOUD

IMPROVING QUALITY OF VIDEOS IN VIDEO STREAMING USING FRAMEWORK IN THE CLOUD IMPROVING QUALITY OF VIDEOS IN VIDEO STREAMING USING FRAMEWORK IN THE CLOUD R.Dhanya 1, Mr. G.R.Anantha Raman 2 1. Department of Computer Science and Engineering, Adhiyamaan college of Engineering(Hosur).

More information

An Introduction to VoIP Protocols

An Introduction to VoIP Protocols An Introduction to VoIP Protocols www.netqos.com Voice over IP (VoIP) offers the vision of a converged network carrying multiple types of traffic (voice, video, and data, to name a few). To carry out this

More information

Audio and Video for the Internet

Audio and Video for the Internet RTP Audio and Video for the Internet Colin Perkins TT rvaddison-wesley Boston San Francisco New York Toronto Montreal London Munich Paris Madrid Capetown Sydney 'lokyo Singapore Mexico City CONTENTS PREFACE

More information

Broadband Networks. Prof. Dr. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Bombay. Lecture - 29.

Broadband Networks. Prof. Dr. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Bombay. Lecture - 29. Broadband Networks Prof. Dr. Abhay Karandikar Electrical Engineering Department Indian Institute of Technology, Bombay Lecture - 29 Voice over IP So, today we will discuss about voice over IP and internet

More information

QoS Provisioning in Mobile Internet Environment

QoS Provisioning in Mobile Internet Environment QoS Provisioning in Moile Internet Environment Salem Lepaja (salem.lepaja@tuwien.ac.at), Reinhard Fleck, Nguyen Nam Hoang Vienna University of Technology, Institute of Communication Networks, Favoritenstrasse

More information

Module 7 Internet And Internet Protocol Suite

Module 7 Internet And Internet Protocol Suite Module 7 Internet And Internet Protocol Suite Lesson 21 Internet and IPv4 LESSON OBJECTIVE General The lesson will discuss a popular network layer protocol, i.e. the Internet Protocol Specific The focus

More information

Digital Audio and Video Data

Digital Audio and Video Data Multimedia Networking Reading: Sections 3.1.2, 3.3, 4.5, and 6.5 CS-375: Computer Networks Dr. Thomas C. Bressoud 1 Digital Audio and Video Data 2 Challenges for Media Streaming Large volume of data Each

More information

Introduction VOIP in an 802.11 Network VOIP 3

Introduction VOIP in an 802.11 Network VOIP 3 Solutions to Performance Problems in VOIP over 802.11 Wireless LAN Wei Wang, Soung C. Liew Presented By Syed Zaidi 1 Outline Introduction VOIP background Problems faced in 802.11 Low VOIP capacity in 802.11

More information

Receiving the IP packets Decoding of the packets Digital-to-analog conversion which reproduces the original voice stream

Receiving the IP packets Decoding of the packets Digital-to-analog conversion which reproduces the original voice stream Article VoIP Introduction Internet telephony refers to communications services voice, fax, SMS, and/or voice-messaging applications that are transported via the internet, rather than the public switched

More information

VoIP in 802.11. Mika Nupponen. S-72.333 Postgraduate Course in Radio Communications 06/04/2004 1

VoIP in 802.11. Mika Nupponen. S-72.333 Postgraduate Course in Radio Communications 06/04/2004 1 VoIP in 802.11 Mika Nupponen S-72.333 Postgraduate Course in Radio Communications 06/04/2004 1 Contents Introduction VoIP & WLAN Admission Control for VoIP Traffic in WLAN Voice services in IEEE 802.11

More information

COMPARISONS OF FEC AND CODEC ROBUSTNESS ON VOIP QUALITY AND BANDWIDTH EFFICIENCY

COMPARISONS OF FEC AND CODEC ROBUSTNESS ON VOIP QUALITY AND BANDWIDTH EFFICIENCY COMPARISONS OF FEC AND CODEC ROBUSTNESS ON VOIP QUALITY AND BANDWIDTH EFFICIENCY WENYU JIANG AND HENNING SCHULZRINNE Columbia University, Department of Computer Science 121 Amsterdam Ave, Mail Code 001,

More information

Response time analysis in AFDX networks with sub-virtual links and prioritized switches

Response time analysis in AFDX networks with sub-virtual links and prioritized switches Response time analysis in AFDX networks with su-virtual links and prioritized switches J. Javier Gutiérrez, J. Carlos Palencia, and Michael González Harour Computers and Real-Time Group, Universidad de

More information

How To Analyze The Security On An Ipa Wireless Sensor Network

How To Analyze The Security On An Ipa Wireless Sensor Network Throughput Analysis of WEP Security in Ad Hoc Sensor Networks Mohammad Saleh and Iyad Al Khatib iitc Stockholm, Sweden {mohsaleh, iyad}@iitc.se ABSTRACT This paper presents a performance investigation

More information

Chapter 3 ATM and Multimedia Traffic

Chapter 3 ATM and Multimedia Traffic In the middle of the 1980, the telecommunications world started the design of a network technology that could act as a great unifier to support all digital services, including low-speed telephony and very

More information

Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network

Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Jianguo Cao School of Electrical and Computer Engineering RMIT University Melbourne, VIC 3000 Australia Email: j.cao@student.rmit.edu.au

More information

TCP for Wireless Networks

TCP for Wireless Networks TCP for Wireless Networks Outline Motivation TCP mechanisms Indirect TCP Snooping TCP Mobile TCP Fast retransmit/recovery Transmission freezing Selective retransmission Transaction oriented TCP Adapted

More information

Voice over IP. Presentation Outline. Objectives

Voice over IP. Presentation Outline. Objectives Voice over IP Professor Richard Harris Presentation Outline Brief overview of VoIP and applications Challenges of VoIP IP Support for Voice Protocols used for VoIP (current views) RTP RTCP RSVP H.323 Semester

More information

Application Note How To Determine Bandwidth Requirements

Application Note How To Determine Bandwidth Requirements Application Note How To Determine Bandwidth Requirements 08 July 2008 Bandwidth Table of Contents 1 BANDWIDTH REQUIREMENTS... 1 1.1 VOICE REQUIREMENTS... 1 1.1.1 Calculating VoIP Bandwidth... 2 2 VOIP

More information

Dynamic Netvalue Analyzer - A Pricing Plan Modeling Tool for ISPs Using Actual Network Usage Data

Dynamic Netvalue Analyzer - A Pricing Plan Modeling Tool for ISPs Using Actual Network Usage Data Dynamic Netvalue Analyzer - A Pricing Plan Modeling Tool for ISPs Using Actual Network Usage Data Jörn Altmann Internet and Moile Systems Department CMSL, Hewlett-Packard Las jorn_altmann@hpl.hp.com Lee

More information

A Transport Protocol for Multimedia Wireless Sensor Networks

A Transport Protocol for Multimedia Wireless Sensor Networks A Transport Protocol for Multimedia Wireless Sensor Networks Duarte Meneses, António Grilo, Paulo Rogério Pereira 1 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks Introduction Wireless

More information

A study of Skype over IEEE 802.16 networks: voice quality and bandwidth usage

A study of Skype over IEEE 802.16 networks: voice quality and bandwidth usage Iowa State University Digital Repository @ Iowa State University Graduate Theses and Dissertations Graduate College 2011 A study of Skype over IEEE 802.16 networks: voice quality and bandwidth usage Kuan-yu

More information

www.mindteck.com 6LoWPAN Technical Overview

www.mindteck.com 6LoWPAN Technical Overview www.mindteck.com 6LoWPAN Technical Overview 6LoWPAN : Slide Index Introduction Acronyms Stack Architecture Stack Layers Applications IETF documents References Confidential Mindteck 2009 2 6LoWPAN - Introduction

More information

Supporting VoIP in IEEE802.11 Distributed WLANs

Supporting VoIP in IEEE802.11 Distributed WLANs Supporting VoIP in IEEE802.11 Distributed WLANs Zuo Liu Supervisor: Dr. Nick Filer July 2012 1 Voice VoIP Applications Constant Streaming Traffic Packetize interval usually 10-30 ms 8 160 bytes each packet

More information

Unit 23. RTP, VoIP. Shyam Parekh

Unit 23. RTP, VoIP. Shyam Parekh Unit 23 RTP, VoIP Shyam Parekh Contents: Real-time Transport Protocol (RTP) Purpose Protocol Stack RTP Header Real-time Transport Control Protocol (RTCP) Voice over IP (VoIP) Motivation H.323 SIP VoIP

More information

VoIP Bandwidth Calculation

VoIP Bandwidth Calculation VoIP Bandwidth Calculation AI0106A VoIP Bandwidth Calculation Executive Summary Calculating how much bandwidth a Voice over IP call occupies can feel a bit like trying to answer the question; How elastic

More information

Video Transmission over Wireless LAN. Hang Liu Hang.liu@thomson.net

Video Transmission over Wireless LAN. Hang Liu Hang.liu@thomson.net Video Transmission over Wireless LAN Hang Liu Hang.liu@thomson.net Page 1 Introduction! Introduction! Wi-Fi Multimedia and IEEE 802.11e for QoS Enhancement! Error Control Techniques Page 2 Introduction!

More information

An architecture for the delivery. of DVB services over IP networks Rennes, January 2007 INTRODUCTION DIGITAL VIDEO TRANSPORT

An architecture for the delivery. of DVB services over IP networks Rennes, January 2007 INTRODUCTION DIGITAL VIDEO TRANSPORT An architecture for the delivery Datasheet User guide White paper þ of DVB services over IP networks Rennes, January 2007 INTRODUCTION Present paper proposes to look around technologies used today for

More information

Data Link Layer Overview

Data Link Layer Overview Data Link Layer Overview Date link layer deals with two basic issues: Part I How data frames can be reliably transmitted, and Part II How a shared communication medium can be accessed In many networks,

More information

TCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme

TCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme Chapter 2 Technical Basics: Layer 1 Methods for Medium Access: Layer 2 Chapter 3 Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Networks: GSM, GPRS, UMTS Chapter 4 Mobility on the

More information

Overview of Voice Over Internet Protocol

Overview of Voice Over Internet Protocol Overview of Voice Over Internet Protocol Purva R. Rajkotia, Samsung Electronics November 4,2004 Overview of Voice Over Internet Protocol Presentation Outline History of VoIP What is VoIP? Components of

More information

Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol

Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol 1 TCP/IP protocol suite A suite of protocols for networking for the Internet Transmission control protocol (TCP) or User Datagram protocol

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

A Novel Framework for Improving Bandwidth Utilization for VBR Video Delivery over Wide-Area Networks

A Novel Framework for Improving Bandwidth Utilization for VBR Video Delivery over Wide-Area Networks A Novel Framework for Improving Bandwidth Utilization for VBR Video Delivery over Wide-Area Networks Junli Yuan *, Sujoy Roy, Qibin Sun Institute for Infocomm Research (I 2 R), 21 Heng Mui Keng Terrace,

More information

Intelligent Multimedia Coding over Oblivious Networking Protocols A Case for a Cross Layer Multimedia Architecture.

Intelligent Multimedia Coding over Oblivious Networking Protocols A Case for a Cross Layer Multimedia Architecture. Intelligent Multimedia Coding over Oblivious Networking Protocols A Case for a Cross Layer Multimedia Architecture Syed Ali Khayam Assistant Professor School of Electrical Engineering & Computer Science

More information

QoS issues in Voice over IP

QoS issues in Voice over IP COMP9333 Advance Computer Networks Mini Conference QoS issues in Voice over IP Student ID: 3058224 Student ID: 3043237 Student ID: 3036281 Student ID: 3025715 QoS issues in Voice over IP Abstract: This

More information

Encapsulating Voice in IP Packets

Encapsulating Voice in IP Packets Encapsulating Voice in IP Packets Major VoIP Protocols This topic defines the major VoIP protocols and matches them with the seven layers of the OSI model. Major VoIP Protocols 15 The major VoIP protocols

More information

CS5008: Internet Computing

CS5008: Internet Computing CS5008: Internet Computing Lecture 6: Protocols and Standards A. O Riordan, latest revision 2015 Some slides from Fitzgerald and Dennis, 2010 Networking Protocols A networking protocol is a set of rules

More information

Network Layer IPv4. Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS. School of Computing, UNF

Network Layer IPv4. Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS. School of Computing, UNF Network Layer IPv4 Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF IPv4 Internet Protocol (IP) is the glue that holds the Internet together.

More information

TECHNICAL CHALLENGES OF VoIP BYPASS

TECHNICAL CHALLENGES OF VoIP BYPASS TECHNICAL CHALLENGES OF VoIP BYPASS Presented by Monica Cultrera VP Software Development Bitek International Inc 23 rd TELELCOMMUNICATION CONFERENCE Agenda 1. Defining VoIP What is VoIP? How to establish

More information

Analyzing 6LoWPAN/ZigBeeIP networks with the Perytons Protocol Analyzer May, 2012

Analyzing 6LoWPAN/ZigBeeIP networks with the Perytons Protocol Analyzer May, 2012 Analyzing 6LoWPAN/ZigBeeIP networks with the Perytons Protocol Analyzer May, 2012 Background While IP protocols are widely spread over broadband wireline and wireless communication means, transferring

More information

Sources: Chapter 6 from. Computer Networking: A Top-Down Approach Featuring the Internet, by Kurose and Ross

Sources: Chapter 6 from. Computer Networking: A Top-Down Approach Featuring the Internet, by Kurose and Ross Multimedia Communication Multimedia Systems(Module 5 Lesson 2) Summary: H Internet Phone Example Making the Best use of Internet s Best-Effort Service. Sources: H Chapter 6 from Computer Networking: A

More information

159.334 Computer Networks. Voice over IP (VoIP) Professor Richard Harris School of Engineering and Advanced Technology (SEAT)

159.334 Computer Networks. Voice over IP (VoIP) Professor Richard Harris School of Engineering and Advanced Technology (SEAT) Voice over IP (VoIP) Professor Richard Harris School of Engineering and Advanced Technology (SEAT) Presentation Outline Basic IP phone set up The SIP protocol Computer Networks - 1/2 Learning Objectives

More information

Ethernet. Ethernet. Network Devices

Ethernet. Ethernet. Network Devices Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking

More information

EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science

EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science Examination Computer Networks (2IC15) on Monday, June 22 nd 2009, 9.00h-12.00h. First read the entire examination. There

More information

Classes of multimedia Applications

Classes of multimedia Applications Classes of multimedia Applications Streaming Stored Audio and Video Streaming Live Audio and Video Real-Time Interactive Audio and Video Others Class: Streaming Stored Audio and Video The multimedia content

More information

2004-11-04 IEEE C802.16e-04/522. IEEE 802.16 Broadband Wireless Access Working Group <http://ieee802.org/16>

2004-11-04 IEEE C802.16e-04/522. IEEE 802.16 Broadband Wireless Access Working Group <http://ieee802.org/16> Project Title Date Submitted IEEE 802.16 Broadband Wireless Access Working Group Extended rtps for VoIP services 2004-11-04 Source(s) Re: Abstract Howon Lee, Jee-young Song, Taesoo

More information

Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks

Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks Vasilios A. Siris and Despina Triantafyllidou Institute of Computer Science (ICS) Foundation for Research and Technology - Hellas

More information

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages

More information

Combining Voice over IP with Policy-Based Quality of Service

Combining Voice over IP with Policy-Based Quality of Service TechBrief Extreme Networks Introduction Combining Voice over IP with Policy-Based Quality of Service Businesses have traditionally maintained separate voice and data networks. A key reason for this is

More information

Vorlesung Kommunikationsnetze Research Topics: Protocol Family for Control Data Communication in Heterogeneous Network Environments

Vorlesung Kommunikationsnetze Research Topics: Protocol Family for Control Data Communication in Heterogeneous Network Environments Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen Vorlesung Kommunikationsnetze Research Topics:

More information

Clearing the Way for VoIP

Clearing the Way for VoIP Gen2 Ventures White Paper Clearing the Way for VoIP An Alternative to Expensive WAN Upgrades Executive Overview Enterprises have traditionally maintained separate networks for their voice and data traffic.

More information

Link Layer. 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: ATM and MPLS

Link Layer. 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: ATM and MPLS Link Layer 5.1 Introduction and services 5.2 Error detection and correction 5.3Multiple access protocols 5.4 Link-Layer Addressing 5.5 Ethernet 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: and

More information

An Analysis of Error Handling Techniques in Voice over IP

An Analysis of Error Handling Techniques in Voice over IP An Analysis of Error Handling Techniques in Voice over IP Martin John Lipka ABSTRACT The use of Voice over IP (VoIP) has been growing in popularity, but unlike its wired circuit-switched telephone network

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

Keywords: VoIP calls, packet extraction, packet analysis

Keywords: VoIP calls, packet extraction, packet analysis Chapter 17 EXTRACTING EVIDENCE RELATED TO VoIP CALLS David Irwin and Jill Slay Abstract The Voice over Internet Protocol (VoIP) is designed for voice communications over IP networks. To use a VoIP service,

More information

VoIP QoS. Version 1.0. September 4, 2006. AdvancedVoIP.com. sales@advancedvoip.com support@advancedvoip.com. Phone: +1 213 341 1431

VoIP QoS. Version 1.0. September 4, 2006. AdvancedVoIP.com. sales@advancedvoip.com support@advancedvoip.com. Phone: +1 213 341 1431 VoIP QoS Version 1.0 September 4, 2006 AdvancedVoIP.com sales@advancedvoip.com support@advancedvoip.com Phone: +1 213 341 1431 Copyright AdvancedVoIP.com, 1999-2006. All Rights Reserved. No part of this

More information

IP-Telephony Real-Time & Multimedia Protocols

IP-Telephony Real-Time & Multimedia Protocols IP-Telephony Real-Time & Multimedia Protocols Bernard Hammer Siemens AG, Munich Siemens AG 2001 1 Presentation Outline Media Transport RTP Stream Control RTCP RTSP Stream Description SDP 2 Real-Time Protocol

More information

ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM

ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 Outline The transport service Elements of transport protocols A

More information

Performance Issues of TCP and MPEG-4 4 over UMTS

Performance Issues of TCP and MPEG-4 4 over UMTS Performance Issues of TCP and MPEG-4 4 over UMTS Anthony Lo A.Lo@ewi.tudelft.nl 1 Wiskunde end Informatica Outline UMTS Overview TCP and MPEG-4 Performance Summary 2 1 Universal Mobile Telecommunications

More information

Lost Packets Recovery during Video Broadcasting Over Data Network

Lost Packets Recovery during Video Broadcasting Over Data Network Lost Packets Recovery during Video Broadcasting Over Data Network Hassan H. Soliman, Hossam E. Mostafa and Eman A.E. Ahmed Department of Electronics and Communicatios Engineering, Faculty of Engineering

More information

920-803 - technology standards and protocol for ip telephony solutions

920-803 - technology standards and protocol for ip telephony solutions 920-803 - technology standards and protocol for ip telephony solutions 1. Which CODEC delivers the greatest compression? A. B. 711 C. D. 723.1 E. F. 726 G. H. 729 I. J. 729A Answer: C 2. To achieve the

More information

Saratoga: A Scalable File Transfer Protocol draft-wood-tsvwg-saratoga-09 http://saratoga.sf.net/

Saratoga: A Scalable File Transfer Protocol draft-wood-tsvwg-saratoga-09 http://saratoga.sf.net/ Saratoga: A Scalable File Transfer Protocol draft-wood-tsvwg-saratoga-09 http://saratoga.sf.net/ Lloyd Wood Centre for Communication Systems Research, University of Surrey l.wood@surrey.ac.uk Charles Smith

More information

Software Engineering 4C03 VoIP: The Next Telecommunication Frontier

Software Engineering 4C03 VoIP: The Next Telecommunication Frontier Software Engineering 4C03 VoIP: The Next Telecommunication Frontier Rudy Muslim 0057347 McMaster University Computing and Software Department Hamilton, Ontario Canada Introduction Voice over Internet Protocol

More information

AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK

AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Abstract AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Mrs. Amandeep Kaur, Assistant Professor, Department of Computer Application, Apeejay Institute of Management, Ramamandi, Jalandhar-144001, Punjab,

More information

AERONAUTICAL COMMUNICATIONS PANEL (ACP) ATN and IP

AERONAUTICAL COMMUNICATIONS PANEL (ACP) ATN and IP AERONAUTICAL COMMUNICATIONS PANEL (ACP) Working Group I - 7 th Meeting Móntreal, Canada 2 6 June 2008 Agenda Item x : ATN and IP Information Paper Presented by Naoki Kanada Electronic Navigation Research

More information

Using Virtual SIP Links to Enable QoS for Signalling

Using Virtual SIP Links to Enable QoS for Signalling Using Virtual SIP Links to Enale QoS for Signalling Alexander A. Kist and Richard J. Harris RMIT University Melourne BOX 2476V, Victoria 31, Australia Telephone: (+) 61 (3) 9925-5218, Fax: (+) 61 (3) 9925-3748

More information

CS268 Exam Solutions. 1) End-to-End (20 pts)

CS268 Exam Solutions. 1) End-to-End (20 pts) CS268 Exam Solutions General comments: ) If you would like a re-grade, submit in email a complete explanation of why your solution should be re-graded. Quote parts of your solution if necessary. In person

More information

Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks

Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,

More information

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.

More information

IPTV hit primetime. Main Topic

IPTV hit primetime. Main Topic Main Topic ivideo helps IPTV hit primetime ivideohelps IPTV hit primetime With the development of video services, users want to watch high quality video content through a terminal of their choice, and

More information

Understanding Latency in IP Telephony

Understanding Latency in IP Telephony Understanding Latency in IP Telephony By Alan Percy, Senior Sales Engineer Brooktrout Technology, Inc. 410 First Avenue Needham, MA 02494 Phone: (781) 449-4100 Fax: (781) 449-9009 Internet: www.brooktrout.com

More information

A Robust Multimedia Contents Distribution over IP based Mobile Networks

A Robust Multimedia Contents Distribution over IP based Mobile Networks , pp. 283-288 http://dx.doi.org/10.14257/ijseia.2015.9.9.24 A Robust Multimedia Contents Distribution over IP based Mobile Networks Ronnie D. Caytiles, Seungyong Shin and Byungjoo Park * Multimedia Engineering

More information

Reliable Multicast Protocol with Packet Forwarding in Wireless Internet

Reliable Multicast Protocol with Packet Forwarding in Wireless Internet Reliable Multicast Protocol with Packet Forwarding in Wireless Internet Taku NOGUCHI, Toru YOSHIKAWA and Miki YAMAMOTO College of Information Science and Engineering, Ritsumeikan University 1-1-1, Nojihigashi,

More information

TDM services over IP networks

TDM services over IP networks Keyur Parikh Junius Kim TDM services over IP networks 1. ABSTRACT Time Division Multiplexing (TDM) circuits have been the backbone of communications over the past several decades. These circuits which

More information

Fast Retransmission Mechanism for VoIP in IEEE 802.11e wireless LANs

Fast Retransmission Mechanism for VoIP in IEEE 802.11e wireless LANs Fast Mechanism for VoIP in IEEE 802.11e wireless LANs Gyung-Ho Hwang and Dong-Ho Cho Division of Electrical Engineering, Department of Electrical Engineering and Computer Science, KAIST, 373-1 Guseong-dong

More information

Performance of Video-Chat Applications Under Congestion

Performance of Video-Chat Applications Under Congestion 2009 11th IEEE International Symposium on Multimedia Performance of Video-Chat Applications Under Congestion Omer Boyaci, Andrea G. Forte, Henning Schulzrinne Department of Computer Science Columbia University

More information

Protocol Overhead in IP/ATM Networks

Protocol Overhead in IP/ATM Networks Protocol Overhead in IP/ATM Networks John David Cavanaugh * Minnesota Supercomputer Center, Inc. This paper discusses the sources of protocol overhead in an IP/ATM protocol stack. It quantifies the amount

More information

Mobile Communications Chapter 9: Mobile Transport Layer

Mobile Communications Chapter 9: Mobile Transport Layer Mobile Communications Chapter 9: Mobile Transport Layer Motivation TCP-mechanisms Classical approaches Indirect TCP Snooping TCP Mobile TCP PEPs in general Additional optimizations Fast retransmit/recovery

More information

Internet Video Streaming and Cloud-based Multimedia Applications. Outline

Internet Video Streaming and Cloud-based Multimedia Applications. Outline Internet Video Streaming and Cloud-based Multimedia Applications Yifeng He, yhe@ee.ryerson.ca Ling Guan, lguan@ee.ryerson.ca 1 Outline Internet video streaming Overview Video coding Approaches for video

More information

VoIP over WiMAX: Quality of Experience Evaluation

VoIP over WiMAX: Quality of Experience Evaluation VoIP over WiMAX: Quality of Experience Evaluation Vitor Bernardo, Bruno Sousa, Marilia Curado Laboratory of Communications and Telematics Department of Informatics Engineering, University of Coimbra {vmbern,bmsousa,marilia}@dei.uc.pt

More information

Indepth Voice over IP and SIP Networking Course

Indepth Voice over IP and SIP Networking Course Introduction SIP is fast becoming the Voice over IP protocol of choice. During this 3-day course delegates will examine SIP technology and architecture and learn how a functioning VoIP service can be established.

More information

Scalable Video Streaming in Wireless Mesh Networks for Education

Scalable Video Streaming in Wireless Mesh Networks for Education Scalable Video Streaming in Wireless Mesh Networks for Education LIU Yan WANG Xinheng LIU Caixing 1. School of Engineering, Swansea University, Swansea, UK 2. College of Informatics, South China Agricultural

More information

Mobile video streaming and sharing in social network using cloud by the utilization of wireless link capacity

Mobile video streaming and sharing in social network using cloud by the utilization of wireless link capacity www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 7 July, 2014 Page No. 7247-7252 Mobile video streaming and sharing in social network using cloud by

More information

Multimedia Data Transmission over Wired/Wireless Networks

Multimedia Data Transmission over Wired/Wireless Networks Multimedia Data Transmission over Wired/Wireless Networks Bharat Bhargava Gang Ding, Xiaoxin Wu, Mohamed Hefeeda, Halima Ghafoor Purdue University Website: http://www.cs.purdue.edu/homes/bb E-mail: bb@cs.purdue.edu

More information

Introduction to IP v6

Introduction to IP v6 IP v 1-3: defined and replaced Introduction to IP v6 IP v4 - current version; 20 years old IP v5 - streams protocol IP v6 - replacement for IP v4 During developments it was called IPng - Next Generation

More information

Curso de Telefonía IP para el MTC. Sesión 2 Requerimientos principales. Mg. Antonio Ocampo Zúñiga

Curso de Telefonía IP para el MTC. Sesión 2 Requerimientos principales. Mg. Antonio Ocampo Zúñiga Curso de Telefonía IP para el MTC Sesión 2 Requerimientos principales Mg. Antonio Ocampo Zúñiga Factors Affecting Audio Clarity Fidelity: Audio accuracy or quality Echo: Usually due to impedance mismatch

More information

Transport Layer Protocols

Transport Layer Protocols Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

More information

VOICE OVER IP AND NETWORK CONVERGENCE

VOICE OVER IP AND NETWORK CONVERGENCE POZNAN UNIVE RSITY OF TE CHNOLOGY ACADE MIC JOURNALS No 80 Electrical Engineering 2014 Assaid O. SHAROUN* VOICE OVER IP AND NETWORK CONVERGENCE As the IP network was primarily designed to carry data, it

More information

Prevention of Anomalous SIP Messages

Prevention of Anomalous SIP Messages International Journal of Future Computer and Communication, Vol., No., October 03 Prevention of Anomalous SIP Messages Ming-Yang Su and Chung-Chun Chen Abstract Voice over internet protocol (VoIP) communication

More information

Management of Telecommunication Networks. Prof. Dr. Aleksandar Tsenov akz@tu-sofia.bg

Management of Telecommunication Networks. Prof. Dr. Aleksandar Tsenov akz@tu-sofia.bg Management of Telecommunication Networks Prof. Dr. Aleksandar Tsenov akz@tu-sofia.bg Part 1 Quality of Services I QoS Definition ISO 9000 defines quality as the degree to which a set of inherent characteristics

More information

Extended-rtPS Algorithm for VoIP Services in IEEE 802.16 systems

Extended-rtPS Algorithm for VoIP Services in IEEE 802.16 systems Extended-rtPS Algorithm for VoIP Services in IEEE 802.16 systems Howon Lee, Taesoo Kwon and Dong-Ho Cho Department of Electrical Engineering and Computer Science Korea Advanced Institute of Science and

More information

Final for ECE374 05/06/13 Solution!!

Final for ECE374 05/06/13 Solution!! 1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -

More information

AN ANALYSIS OF DELAY OF SMALL IP PACKETS IN CELLULAR DATA NETWORKS

AN ANALYSIS OF DELAY OF SMALL IP PACKETS IN CELLULAR DATA NETWORKS AN ANALYSIS OF DELAY OF SMALL IP PACKETS IN CELLULAR DATA NETWORKS Hubert GRAJA, Philip PERRY and John MURPHY Performance Engineering Laboratory, School of Electronic Engineering, Dublin City University,

More information

REDUCING PACKET OVERHEAD IN MOBILE IPV6

REDUCING PACKET OVERHEAD IN MOBILE IPV6 REDUCING PACKET OVERHEAD IN MOBILE IPV6 ABSTRACT Hooshiar Zolfagharnasab 1 1 Department of Computer Engineering, University of Isfahan, Isfahan, Iran hoppico@eng.ui.ac.ir hozo19@gmail.com Common Mobile

More information

Power management of video transmission on wireless networks for multiple receivers

Power management of video transmission on wireless networks for multiple receivers Power management of video transmission on wireless networks for multiple receivers Christos Bouras, Kostas Stamos and Giannis Zaoudis Research Academic Computer Technology Institute and Computer Engineering

More information

Computer Networks CS321

Computer Networks CS321 Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics

More information

DeuceScan: Deuce-Based Fast Handoff Scheme in IEEE 802.11 Wireless Networks

DeuceScan: Deuce-Based Fast Handoff Scheme in IEEE 802.11 Wireless Networks : Deuce-Based Fast Handoff Scheme in IEEE 82.11 Wireless Networks Yuh-Shyan Chen, Chung-Kai Chen, and Ming-Chin Chuang Department of Computer Science and Information Engineering National Chung Cheng University,

More information

Voice over Internet Protocol (VoIP) systems can be built up in numerous forms and these systems include mobile units, conferencing units and

Voice over Internet Protocol (VoIP) systems can be built up in numerous forms and these systems include mobile units, conferencing units and 1.1 Background Voice over Internet Protocol (VoIP) is a technology that allows users to make telephone calls using a broadband Internet connection instead of an analog phone line. VoIP holds great promise

More information

IEEE 802.16 Broadband Wireless Access Working Group. ATM Based MAC Layer Proposal for the 802.16 Air Interface Specification

IEEE 802.16 Broadband Wireless Access Working Group. ATM Based MAC Layer Proposal for the 802.16 Air Interface Specification Project Title Date Submitted Source Re: Abstract Purpose Notice Release IEEE Patent Policy IEEE 802.16 Broadband Wireless Access Working Group ATM Based MAC Layer Proposal for the 802.16 Air Interface

More information