An error recovery transmission mechanism for mobile multimedia
|
|
- Brett Wiggins
- 8 years ago
- Views:
Transcription
1 An error recovery transmission mechanism for moile multimedia Min Chen *, Ang i School of Computer Science and Technology, Hunan Institute of Technology, Hengyang, China Astract This paper presents a channel coding transmission mechanism in wireless and moile networks y using the cross-packet transmission method of the su-lock structure to solve the prolem of the poor quality of the network moile multimedia. The present channel coding technology has the protective effect aiming to the data transmission in the moile network. However, the present channel coding technology faces many kinds of network transmission phenomenon under the limited andwidth constraint, including those comprehensive prolems caused y the network congestion and the signal error. The poor efficiency of the data recovery and the andwidth utilization is still one of the channel coding s main defects. Compared with the present technologies, the experimental results demonstrate that the proposed method can achieve etter andwidth utilization y means of using su-lock coding structure to comat with small amount of transmission errors. Furthermore, the data recovery performance can e improved ased on the two following facts aout the cross -packet transmission: ) the channel coding capacity is eyond a single packet and 2) oth packet loss and signal error can e recovered simultaneously. Keywords: cross-packet, channel coding, forward error correction,, error recovery, moile multimedia Introduction With the increasing of the Internet popularizing rate, the source of the digital contents presents a prosperous development tendency through the wireless access technology. According to the statistics from the ministry of economic affairs digital content industry office, the output in the moile application service attained 2.86 illion dollars in 22 and its annual growth rate is 3.45%. Adding to the emerging digital converge service, the future moile users can receive several of data from the telecommunication, Internet and television. The investigating reports in the Google moile network and the user s ehavior also show that 9 percent of the smart phone users watch videos through the moile phones, and 3 percent of users use the video function once everyday. The traditional multimedia data transmission model easily causes the data loss under the influence of communication quality and the andwidth. For example, the lack of the andwidth under the network heterogeneity causes the packet loss and the poor efficiency of the communication environment causes the data error. The results make users can not otain the complete data so that the correct information can not e showed. The present network does not possess the quality of service mechanism, the channel coding technology and the low latency method can provide the reliale data transmission. The typical channel coding applications include the wireless communication protocol such as 82. Wireless AN and 82.6 WiMAX, and the video streaming service such as the video conference. The core technology of the channel coding is forward error correction. The original data is coded to the data in the transmission terminal and the two data are transmitted together. The receiving terminal conducts the decoding action to recover the original data within the tolerant data error numers in terms of the condition of the data reception. Although the utilization can offer the error recovery function, the cost of adding the andwidth should e paid off. When the coding data cannot recover the network transmission error, the prolem of wasting the andwidth can e caused. According to the advantages and the disadvantages analysis of the network transmission in the application, the high efficient mechanism in the data transmission system should e designed to improve the service quality in the moile network video in terms of the andwidth resources whose wireless moile network is relative precious. The present known channel code has two types: the signal packet model and the cross packet model. The Figure shows that the signal packet model merges the original data and the data into a signal transmission packet, and its advantage is that the decoding procedure can e conducted after the receiving terminal gets a packet. Therefore, it time delaying is low. While its disadvantage is that it just can deal with the data loss caused y the signal error. What s worse, the whole packet loss has no protective aility and the efficiency of the channel coding can e limited y the length of the maximum transmit unit in the network, namely, the size of the data numer in EFC is limited. When the condition of the signal error is severe, the data protective aility provided y the signal packet model will e lowed. The cross packet model regards the packet in the coding & decoding as unit and the * Corresponding author s chenminhit@63.com 54
2 original packet can codes packet so that the prolems of the packet loss and the data loss caused y the signal error can e solved simultaneously, its structure is shown as the Figure 2. The coding & decoding data numers in the are very large and the receiving terminal needs to wait for time to collect all transmitting packets, the time delaying is rather high. In addition, using the larger data numer packet to recover the signal error whose data numers are relative small in the andwidth utilization is also not economic. Under the limited transmission andwidth, the andwidth cost in the cross packet model has low economic enefit so that its protective aility is limited. The two different kinds of the models have advantages and disadvantages. In general, the signal packet model is fit for the wireless communication protocol to maintain a certain communication quality and the cross packet model is widely applied to all kinds of the network application service. With the variety of the network. The channel coding must adapt to the changing of all network environments and the accumulation of the transmission conditions. For example, the numers of the data loss may accumulate the final results formed y the different transmission factors. Therefore, no matter whether the effect of the signal packet model is not enough to handle the packet loss and the MTU limitations or low andwidth utilization in the cross packet model, all of these prolems are the needed improved ojects. source packe t it errors packe t Packet loss FIGURE The packet structure in the signal packet model source packet packet su locks and the coding su locks to form the transmission packets, namely, two kinds of the su locks can e assemled into the transmission packet individually. The two different assemling methods allow the coding su locks to cross many transmission packets. When the mechanism connects to the wireless moile network transmission system, the parameter and the formula can e set in terms of the target application s network environment. Moreover, the calculation of the su lock size, the numers of the coding su locks and the assemling of the transmission packet can e done so that the proposed mechanism can have the optimal efficiency. 2 The error recovery mechanism with the su lock structure Aiming to the signal packet model s and the cross packet model s efficiency limitation in the moile data transmission, the error recovery mechanism with the su lock structure is proposed to adapt to the coding unit in the wireless transmission environment, and the data s network transmission is conducted y the cross packet model. As shown in the Figure 3, the original data packet can e disassemled into a smaller source su lock and it regards coding as the unit, and the needed coding su locks can e produced according to the present network transmission conditions. Then the su locks can e assemled into the transmission packet, and the coding su locks are allowed to cross many transmission packets during the assemling procedure. On the one hand, the mechanism can effectively improve the utilization of the andwidth. On the other hand, the packet assemling method in the cross packet can avoid the MTU limitation and has a higher elasticity in the utilization. In order to make the su lock structure apply into the transmission system, the mechanism further design the needed data packet format and formulate the data transmission procedure. The related details are shown in the following su chapters. it errors Packet loss Source packet packet FIGURE 2 The packet structure in the cross packet model The coding mechanism with the su lock structure y connecting the wireless moile network transmission system is connected is proposed to minimum the coding data numers for protect the most common it errors and the packet loss so that the efficiency of the andwidth utilization and the efficiency of the data recovery can e considered simultaneously. The proposed mechanism in the operation can e divided into two parts:. the original data packet can e disassemled into a smaller source su lock and it regards coding as the unit, and the needed coding su locks can e produced according to the present network transmission conditions. 2. The su locks can e assemled into the transmission packet, and the assemling method can merge the source it errors Packet loss FIGURE 3 The cross packet model with the su lock structure 2. DATA PACKET FORMAT The length of the su lock is allowed to e changed so that how to define the positions of some individual su locks for correctly conducting the E\ coding & decoding procedure in a packet is the designing key point. Take the applied layer as an example, the Figure 4 illustrates that the data format in the transmission packet is applied with the use of the su lock coding structure. In 55
3 general, the s error recovery technology is applied in the multimedia data network transmission. The kind of the transmission uses UDP (User Datagram Protocol) as the transmission layer protocol. And then connects with the application layer protocol in the RTP (Real-time Transmission Protocol) to control and supervise the data s transmission conditions. In order to carry all kinds of the data flow patterns, RTP has formulated the s control header to conduct the data s coding & decoding procedure. The packet can e divided into header fields and data fields with the present multimedia data transmission structure. The header fields include data header, su lock header and header. The data header in the Figure 4 is compatile with the standard of the RTP/UDP protocol, and the header is compatile with the related standards of the RFC59 protocol. Code Amount Blocks (code=) Data header Su-lock header Checksum... Checksum n Data header Su-lock Source Data ( data) FIGURE 4 The packet format in the su lock... Su-lock n The su lock header can include the content source code segment which identify the composition source of the su locks in the packet, the amount segment which record and store the n numers of the su locks in the packet, multi validation and checksum segments which individually record the validation and the value in the ~n su lock. The validation and the value can e used to check whether the su lock can happen errors. The data fields put multi source su lock information or the su lock information. There are three packet kinds through the su lock coding in terms of the difference of the packet contents:. source data, 2. data and 3. Mixed source data with the data. The former two packets can e regarded as the transmission packet assemled y the source su lock and the su lock individually. Code segment can identify the packet types. For example, the Code segment is composed y two its: the first it is the source data it. When the it is remarked as I, the su lock in the data field includes the source su lock; the second it is data it. When the it is remarked as I, the su lock in the data field includes the su lock. Therefore, when the Code segment is, the transmission packet is the source data packet; while the Code segment is, the transmission packet is the data packet. When the Code segment is, the transmission packet is assemled y the source data packet and the data packet. The Code segment remains unused under the definition. When the Code segment is, the Amount segment needs a new extensional locks segment for remarking the numers of the data packet. original data su lock control unit coder packet encapsula tion unit network decapsula tion unit su lock assemly unit Feedack message original data decoder FIGURE 5 System structure and transmission procedure The display order of the su locks in the data field is further defined under the model of the mixture source su locks and the su locks, that is, the source su lock exists efore the su lock. Therefore, the former Amount Blocks in the transmission packet are source su lock and the later Blocks are the su lock. When the Code segment is not, the Blocks segment does not exist. The design considers that the mixture packet condition just appears in the convergence of the source su locks and the su locks. Therefore, the Blocks segment can e regarded as the need utilization for the effective use of the andwidth. The Figure 5 is the mechanism s structure and the operational procedure in the data transmission system, including six system units:. Su lock control unit: According to the recovery information in the su lock assemly unit, the size of the su lock can e decided and the numers of the su lock can e calculated. 2. EC coder: Conduct the coding procedure in the su lock. 3. Packet encapsulation unit: Encapsulate the su lock into the transmission packet. 4. De capsulation unit: De capsulate the transmission packet into su lock. 5. Su lock assemly unit: Filter the error su lock, collect the complete receiving su locks and recover the statistical information of the receiving data to the su lock control unit. 6. decoder: Conduct the decoding procedure and recover the original data. Compared with the traditional data transmission system, the mechanism adds the new specific units: Su lock control unit and Su lock assemly unit. The system can set the parameter and the formats in terms of the target application s network environment so that the method can otain the optimal effect in all network transmission environments. The main calculation is to determine the length of the su lock, the numer of the su lock and the needed su lock numers. The su lock length and the su lock numer are calculated 56
4 y the su lock control unit in reference to the su lock assemly unit, while the packet encapsulation unit and the de capsulation unit are according to the former descried packet format. In order to recover the packet loss caused y the network congestion, the coder and decoder can adopt to the common Reed-Solomon (RS) code. As to the RS code, when the su lock happens error, it can e regarded as the su lock loss and comine with the cross packet s transmission model. Therefore, the data recovery in the transmission error and the packet loss can e handled simultaneously. lock is k, the expected recovery rate in the source su lock is R. The following Equation can calculate the h numer in the su lock and its otained total su lock numer is (k+h). R k h ( k h k h i i )( P total ) ( P total ). (6) i k i If the k numer of the source su lock is 8, the packet total loss rate Ptotal is.2 and the expected data recovery rate R is.95, the minimun value of the h numer su lock is 5 in terms of the Equation (6). 3 The optimal calculation of the su lock The optimal calculation method is introduced and the performance verification can e conducted. If the current length of the su lock is it and the su lock error rate caused y the it errors is P, the it error rate is P. The Equation () is as follows: P ( P ) P P B B In the Equation (), the su lock error rate PB can e otained y the recovery information in the su lock assemly unit. According to the it error rate is P, the optimal su lock length can e calculated (opt) and the present su lock length can e updated. If the needed data header length in the su lock is d it, the transmission efficiency in the su lock can e defined as E: ( ) ( ) E P d d (). (2) The should e differential. If the differential result is set as, the opt can e otained as shown in the Equation (3) opt d In P d In P d In P 2 In( P ) 2 2 ( ) 4 ( ) ( ). (3) The new su lock error rate PB_new can e otained with the use of the su lock length opt. ater. The su lock error rate PB_new caused y the newly otained su lock length P can e predicted. P _ ( P) opt B new. (4) If the PB_new adds the packet loss rate PC caused y the packet loss in the su locks, the total loss rate Ptotal in all su locks can e otained. P P P. (5) total B _ new c In the meantime, the packet loss rate PC can e otained from the recovery information in the su lock assemly unit. The recovery condition in the source data is that the numers of the total su locks received from the coder is larger than or equal to the k numer in the source su lock. If the numer of the present source su 4. Experimental result and efficient analysis The validations of the experimental environment are as follows: The packet loss rate of the network is set as %, 2% and 3%, the loss numer of the average packet is set as 3, and the it error rate is set as -, -2, -3, -4, -5 and -6. According to the corresponding network from the %, 2% and 3% packet loss rate, the utilized andwidth is 224 KB/s, 45 KB/s, KB/s respectively. The fixed packet length is ytes, the original data source can e compressed into Foreman video whose format is MPEG4 QCIF and its frame per second is 3. The comparative oject in the experiment is the traditional cross packet model. The size and the numer of the su lock in the mechanism is determined y the aove optimal method discussed in the former chapters. In the setting expected recovery rate aspect, the unequal error protection mechanism is adopted in terms of the method in the reference []. The important data can e distriuted a large numer of packet and the unimportant data can e distriuted a small numer of packet. The negative effects of the data recovery caused y the limited andwidth can e reduced to the minimum. The efficient parameter adapts to the playale frame rate, and its definition is that if the present playale frame numer per second id f, and the playale frame rate is (f/3). Therefore, the higher the playale frame rate is, the more the source data in the video has, namely, the recovery affect in the etter. The testing video in the experiment in compressed through the 3 frame numers per second defined y the National Television Standards Committee, the conversion of the playale frame rate is.. The four kinds of the experiments are conducted successively. The former three mainly analyzes the difference of the playale frame rate y oserving the %, 2% and 3% packet loss rate. The Figure 6-8 present the three experimental results. The forth experiment counts the total utilization of the andwidth otained from the former three experiments whose experimental result is as shown in the Figure 9. The result in the first experiment is as shown in the Figure 6 whose packet loss rate is %. The higher playale frame rate under the condition of the transmission it error which is larger than -3 can e otained in the paper. The - it error usually represents the worst transmission environment so that nearly all 57
5 playael frame rate COMPUTER MODEING & NEW TECHNOOGIES 24 8(2B) transmission packet can happen errors. What s worse, the efficient difference can not e oserved. The result in the second experiment is as shown in the Figure 7 whose packet loss rate is 2%. The higher playale frame rate under the condition of the transmission it error which is larger than -3 can e otained in the paper. Compared with the first experiment, the packet loss rate in the transmission environment can e increased and the utilized andwidth can e reduced. The efficiency provided y the paper under the condition of the -2 it error rate can e improved largely, in which the playale frame rate is.8 and the frame numer per second is 25. In addition, the playale frame rate is. in the traditional cross packet model and its frame numer per second is just 3. The result in the third experiment is as shown in the Figure 8 whose packet loss rate is 3%. The higher playale frame rate under the condition of the transmission it error which is larger than -4 can e otained in the paper. The magnitude of the improvement can e increased with the increasing of the it error rates. The efficiency parameter in the forth experiment is data overhead whose definition is as follows: Overhead is equal to the packet header data size in all transmission packets plus to the data sizes of all su locks. The lower the Overhead s, the higher the efficiency of using the andwidth y the has. The Figure 9 shows the differences of the data usage etween the two comparative methods. The data sources are from the first experiment to the third experiment, and the packet loss rate is respectively the data usage under the %, 2% and 3% packet loss rate. Overhead(kiloytes) playael frame rate Bit error rate FIGURE 8 the third experimental result: the packet loss rate is 3% Congestion packet loss rate (%) FIGURE 9 the overhead statistical result from the first experiment to the third experiment Compared with the traditional packet model, the experiment results show that the data usage in the mechanism is lower. In fact, the mechanism can possessed etter transmission efficiency in the former experimental results. In addition, the mechanism can adopt the timesaving umer to finish the source data recovery so that the optimal efficiency under the limited andwidth can e otained. playale framerate FIGURE 6 The first experimental result: the packet loss rate is % Bit error rate FIGURE 7 The second experimental result: the packet loss rate is 2% 5 Conclusion Aiming to the limited andwidth, the transmission error and the network congestion suffered from the multimedia data transmission in the wireless moile network, the cross packet transmission mechanism with the su lock channel coding structure. Comining with the asic concepts etween the su lock structure and the cross packet transmission, the data packet format in the application layer is further formatted and the transmission system structure and the optimal calculation in the su lock can e illustrated so that the mechanism in the implement interface is complete. After the comparison and analysis of the related experiments, the mainly efficiency in the mechanism can e applied in the time-saving data sizes for recovering the error data so that the data recovery efficiency in the limited andwidth can e largely improved. The advantage makes the mechanism e applied in the multimedia application whose andwidth is limited in the moile network. 58
6 References [] Availale: [2] ser-ehavior-survey [3] ocal and metropolitan area networks Specific requirements Part : Wireless AN medium access control (MAC) and physical layer (PHY) specifications Amendment 8: medium access control (MAC) quality of Service enhancements IEEE Standard [4] Part 6: Air interface for fixed roadand wireless access systems IEEE Standard 82.6, Oct 24 [5] Rizzo 997 Effective erasure codes for reliale computer communication protocols ACM SIGCOMM Computer Communications 27(2) [6] Choi S, Choi Y, ee I 26 IEEE 82. MAC-level scheme with retransmission comining IEEE Trans on Wireless Communications 5 2 [7] Hwang S-h, Hwang S-O, Myung S, Yang H-K, Park K-M 23 Method for generating forward error correction packet in multimedia system and method and apparatus for transmitting and receiving forward error correction packet US Patent (issued) US A [8] Shan Y 25 Cross-layer techniques for adaptive video streaming over wireless networks EURASIP Journal on Applied Signal Processing [9] Tsai M-F, Shieh C-K, Ke C-H, Deng D-J 2 Su-packet forward error correction mechanism for video streaming over wireless networks Multimedia Tools and Applications 47() [] Park K, Wang W 2 QoS-sensitive transport of real-time MPEG video using adaptive redundancy control Computer Communications [] Wu H, Claypool M, Kinicki R 25 Adjusting Forward Error Correction with Temporal Scaling for TCP-Friendly Streaming MPEG ACM Transactions on Multimedia Computing Communications, and Applications (4) [2] Yuan Y, Cockurn B, Sikora T, Mand M 27 Efficient allocation of packet-level forward error correction in video streaming over the Internet Journal of Electronic Imaging 6(2) -2 [3] Shih C H, Shieh C K, Hwang W S 28 A Transparent oss Recovery Scheme Using Packet Redirection for Wireless Video Transmissions EURASIP Journal on Advances in Signal Processing Article ID [4] i A 27 RTP payload format for generic forward error correction RFC59 IETF [5] Plummer W W 989 TCP Checksum Function Design ACM SIGCOMM Computer Communication Review 9(2) 95- Authors Min Chen, 978-3, Hengyang Hunan, China. Current position, grades: associate professor. University studies: Central South University, China. Scientific interest: network technology, wireless sensor network. Ang i, , Yueyang Hunan, China. Current position, grades: associate professor. University studies: Central South University. Scientific interest: Network technology, Wireless sensor network. 59
Bandwidth Adaptation for MPEG-4 Video Streaming over the Internet
DICTA2002: Digital Image Computing Techniques and Applications, 21--22 January 2002, Melbourne, Australia Bandwidth Adaptation for MPEG-4 Video Streaming over the Internet K. Ramkishor James. P. Mammen
More informationIMPROVING QUALITY OF VIDEOS IN VIDEO STREAMING USING FRAMEWORK IN THE CLOUD
IMPROVING QUALITY OF VIDEOS IN VIDEO STREAMING USING FRAMEWORK IN THE CLOUD R.Dhanya 1, Mr. G.R.Anantha Raman 2 1. Department of Computer Science and Engineering, Adhiyamaan college of Engineering(Hosur).
More informationAn Introduction to VoIP Protocols
An Introduction to VoIP Protocols www.netqos.com Voice over IP (VoIP) offers the vision of a converged network carrying multiple types of traffic (voice, video, and data, to name a few). To carry out this
More informationAudio and Video for the Internet
RTP Audio and Video for the Internet Colin Perkins TT rvaddison-wesley Boston San Francisco New York Toronto Montreal London Munich Paris Madrid Capetown Sydney 'lokyo Singapore Mexico City CONTENTS PREFACE
More informationBroadband Networks. Prof. Dr. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Bombay. Lecture - 29.
Broadband Networks Prof. Dr. Abhay Karandikar Electrical Engineering Department Indian Institute of Technology, Bombay Lecture - 29 Voice over IP So, today we will discuss about voice over IP and internet
More informationQoS Provisioning in Mobile Internet Environment
QoS Provisioning in Moile Internet Environment Salem Lepaja (salem.lepaja@tuwien.ac.at), Reinhard Fleck, Nguyen Nam Hoang Vienna University of Technology, Institute of Communication Networks, Favoritenstrasse
More informationModule 7 Internet And Internet Protocol Suite
Module 7 Internet And Internet Protocol Suite Lesson 21 Internet and IPv4 LESSON OBJECTIVE General The lesson will discuss a popular network layer protocol, i.e. the Internet Protocol Specific The focus
More informationDigital Audio and Video Data
Multimedia Networking Reading: Sections 3.1.2, 3.3, 4.5, and 6.5 CS-375: Computer Networks Dr. Thomas C. Bressoud 1 Digital Audio and Video Data 2 Challenges for Media Streaming Large volume of data Each
More informationIntroduction VOIP in an 802.11 Network VOIP 3
Solutions to Performance Problems in VOIP over 802.11 Wireless LAN Wei Wang, Soung C. Liew Presented By Syed Zaidi 1 Outline Introduction VOIP background Problems faced in 802.11 Low VOIP capacity in 802.11
More informationReceiving the IP packets Decoding of the packets Digital-to-analog conversion which reproduces the original voice stream
Article VoIP Introduction Internet telephony refers to communications services voice, fax, SMS, and/or voice-messaging applications that are transported via the internet, rather than the public switched
More informationVoIP in 802.11. Mika Nupponen. S-72.333 Postgraduate Course in Radio Communications 06/04/2004 1
VoIP in 802.11 Mika Nupponen S-72.333 Postgraduate Course in Radio Communications 06/04/2004 1 Contents Introduction VoIP & WLAN Admission Control for VoIP Traffic in WLAN Voice services in IEEE 802.11
More informationCOMPARISONS OF FEC AND CODEC ROBUSTNESS ON VOIP QUALITY AND BANDWIDTH EFFICIENCY
COMPARISONS OF FEC AND CODEC ROBUSTNESS ON VOIP QUALITY AND BANDWIDTH EFFICIENCY WENYU JIANG AND HENNING SCHULZRINNE Columbia University, Department of Computer Science 121 Amsterdam Ave, Mail Code 001,
More informationResponse time analysis in AFDX networks with sub-virtual links and prioritized switches
Response time analysis in AFDX networks with su-virtual links and prioritized switches J. Javier Gutiérrez, J. Carlos Palencia, and Michael González Harour Computers and Real-Time Group, Universidad de
More informationHow To Analyze The Security On An Ipa Wireless Sensor Network
Throughput Analysis of WEP Security in Ad Hoc Sensor Networks Mohammad Saleh and Iyad Al Khatib iitc Stockholm, Sweden {mohsaleh, iyad}@iitc.se ABSTRACT This paper presents a performance investigation
More informationChapter 3 ATM and Multimedia Traffic
In the middle of the 1980, the telecommunications world started the design of a network technology that could act as a great unifier to support all digital services, including low-speed telephony and very
More informationPerformance Evaluation of VoIP Services using Different CODECs over a UMTS Network
Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Jianguo Cao School of Electrical and Computer Engineering RMIT University Melbourne, VIC 3000 Australia Email: j.cao@student.rmit.edu.au
More informationTCP for Wireless Networks
TCP for Wireless Networks Outline Motivation TCP mechanisms Indirect TCP Snooping TCP Mobile TCP Fast retransmit/recovery Transmission freezing Selective retransmission Transaction oriented TCP Adapted
More informationVoice over IP. Presentation Outline. Objectives
Voice over IP Professor Richard Harris Presentation Outline Brief overview of VoIP and applications Challenges of VoIP IP Support for Voice Protocols used for VoIP (current views) RTP RTCP RSVP H.323 Semester
More informationApplication Note How To Determine Bandwidth Requirements
Application Note How To Determine Bandwidth Requirements 08 July 2008 Bandwidth Table of Contents 1 BANDWIDTH REQUIREMENTS... 1 1.1 VOICE REQUIREMENTS... 1 1.1.1 Calculating VoIP Bandwidth... 2 2 VOIP
More informationDynamic Netvalue Analyzer - A Pricing Plan Modeling Tool for ISPs Using Actual Network Usage Data
Dynamic Netvalue Analyzer - A Pricing Plan Modeling Tool for ISPs Using Actual Network Usage Data Jörn Altmann Internet and Moile Systems Department CMSL, Hewlett-Packard Las jorn_altmann@hpl.hp.com Lee
More informationA Transport Protocol for Multimedia Wireless Sensor Networks
A Transport Protocol for Multimedia Wireless Sensor Networks Duarte Meneses, António Grilo, Paulo Rogério Pereira 1 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks Introduction Wireless
More informationA study of Skype over IEEE 802.16 networks: voice quality and bandwidth usage
Iowa State University Digital Repository @ Iowa State University Graduate Theses and Dissertations Graduate College 2011 A study of Skype over IEEE 802.16 networks: voice quality and bandwidth usage Kuan-yu
More informationwww.mindteck.com 6LoWPAN Technical Overview
www.mindteck.com 6LoWPAN Technical Overview 6LoWPAN : Slide Index Introduction Acronyms Stack Architecture Stack Layers Applications IETF documents References Confidential Mindteck 2009 2 6LoWPAN - Introduction
More informationSupporting VoIP in IEEE802.11 Distributed WLANs
Supporting VoIP in IEEE802.11 Distributed WLANs Zuo Liu Supervisor: Dr. Nick Filer July 2012 1 Voice VoIP Applications Constant Streaming Traffic Packetize interval usually 10-30 ms 8 160 bytes each packet
More informationUnit 23. RTP, VoIP. Shyam Parekh
Unit 23 RTP, VoIP Shyam Parekh Contents: Real-time Transport Protocol (RTP) Purpose Protocol Stack RTP Header Real-time Transport Control Protocol (RTCP) Voice over IP (VoIP) Motivation H.323 SIP VoIP
More informationVoIP Bandwidth Calculation
VoIP Bandwidth Calculation AI0106A VoIP Bandwidth Calculation Executive Summary Calculating how much bandwidth a Voice over IP call occupies can feel a bit like trying to answer the question; How elastic
More informationVideo Transmission over Wireless LAN. Hang Liu Hang.liu@thomson.net
Video Transmission over Wireless LAN Hang Liu Hang.liu@thomson.net Page 1 Introduction! Introduction! Wi-Fi Multimedia and IEEE 802.11e for QoS Enhancement! Error Control Techniques Page 2 Introduction!
More informationAn architecture for the delivery. of DVB services over IP networks Rennes, January 2007 INTRODUCTION DIGITAL VIDEO TRANSPORT
An architecture for the delivery Datasheet User guide White paper þ of DVB services over IP networks Rennes, January 2007 INTRODUCTION Present paper proposes to look around technologies used today for
More informationData Link Layer Overview
Data Link Layer Overview Date link layer deals with two basic issues: Part I How data frames can be reliably transmitted, and Part II How a shared communication medium can be accessed In many networks,
More informationTCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme
Chapter 2 Technical Basics: Layer 1 Methods for Medium Access: Layer 2 Chapter 3 Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Networks: GSM, GPRS, UMTS Chapter 4 Mobility on the
More informationOverview of Voice Over Internet Protocol
Overview of Voice Over Internet Protocol Purva R. Rajkotia, Samsung Electronics November 4,2004 Overview of Voice Over Internet Protocol Presentation Outline History of VoIP What is VoIP? Components of
More informationMobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol
Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol 1 TCP/IP protocol suite A suite of protocols for networking for the Internet Transmission control protocol (TCP) or User Datagram protocol
More informationPerformance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com
More informationA Novel Framework for Improving Bandwidth Utilization for VBR Video Delivery over Wide-Area Networks
A Novel Framework for Improving Bandwidth Utilization for VBR Video Delivery over Wide-Area Networks Junli Yuan *, Sujoy Roy, Qibin Sun Institute for Infocomm Research (I 2 R), 21 Heng Mui Keng Terrace,
More informationIntelligent Multimedia Coding over Oblivious Networking Protocols A Case for a Cross Layer Multimedia Architecture.
Intelligent Multimedia Coding over Oblivious Networking Protocols A Case for a Cross Layer Multimedia Architecture Syed Ali Khayam Assistant Professor School of Electrical Engineering & Computer Science
More informationQoS issues in Voice over IP
COMP9333 Advance Computer Networks Mini Conference QoS issues in Voice over IP Student ID: 3058224 Student ID: 3043237 Student ID: 3036281 Student ID: 3025715 QoS issues in Voice over IP Abstract: This
More informationEncapsulating Voice in IP Packets
Encapsulating Voice in IP Packets Major VoIP Protocols This topic defines the major VoIP protocols and matches them with the seven layers of the OSI model. Major VoIP Protocols 15 The major VoIP protocols
More informationCS5008: Internet Computing
CS5008: Internet Computing Lecture 6: Protocols and Standards A. O Riordan, latest revision 2015 Some slides from Fitzgerald and Dennis, 2010 Networking Protocols A networking protocol is a set of rules
More informationNetwork Layer IPv4. Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS. School of Computing, UNF
Network Layer IPv4 Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF IPv4 Internet Protocol (IP) is the glue that holds the Internet together.
More informationTECHNICAL CHALLENGES OF VoIP BYPASS
TECHNICAL CHALLENGES OF VoIP BYPASS Presented by Monica Cultrera VP Software Development Bitek International Inc 23 rd TELELCOMMUNICATION CONFERENCE Agenda 1. Defining VoIP What is VoIP? How to establish
More informationAnalyzing 6LoWPAN/ZigBeeIP networks with the Perytons Protocol Analyzer May, 2012
Analyzing 6LoWPAN/ZigBeeIP networks with the Perytons Protocol Analyzer May, 2012 Background While IP protocols are widely spread over broadband wireline and wireless communication means, transferring
More informationSources: Chapter 6 from. Computer Networking: A Top-Down Approach Featuring the Internet, by Kurose and Ross
Multimedia Communication Multimedia Systems(Module 5 Lesson 2) Summary: H Internet Phone Example Making the Best use of Internet s Best-Effort Service. Sources: H Chapter 6 from Computer Networking: A
More information159.334 Computer Networks. Voice over IP (VoIP) Professor Richard Harris School of Engineering and Advanced Technology (SEAT)
Voice over IP (VoIP) Professor Richard Harris School of Engineering and Advanced Technology (SEAT) Presentation Outline Basic IP phone set up The SIP protocol Computer Networks - 1/2 Learning Objectives
More informationEthernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
More informationEINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science
EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science Examination Computer Networks (2IC15) on Monday, June 22 nd 2009, 9.00h-12.00h. First read the entire examination. There
More informationClasses of multimedia Applications
Classes of multimedia Applications Streaming Stored Audio and Video Streaming Live Audio and Video Real-Time Interactive Audio and Video Others Class: Streaming Stored Audio and Video The multimedia content
More information2004-11-04 IEEE C802.16e-04/522. IEEE 802.16 Broadband Wireless Access Working Group <http://ieee802.org/16>
Project Title Date Submitted IEEE 802.16 Broadband Wireless Access Working Group Extended rtps for VoIP services 2004-11-04 Source(s) Re: Abstract Howon Lee, Jee-young Song, Taesoo
More informationSeamless Congestion Control over Wired and Wireless IEEE 802.11 Networks
Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks Vasilios A. Siris and Despina Triantafyllidou Institute of Computer Science (ICS) Foundation for Research and Technology - Hellas
More informationNote! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages
Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages
More informationCombining Voice over IP with Policy-Based Quality of Service
TechBrief Extreme Networks Introduction Combining Voice over IP with Policy-Based Quality of Service Businesses have traditionally maintained separate voice and data networks. A key reason for this is
More informationVorlesung Kommunikationsnetze Research Topics: Protocol Family for Control Data Communication in Heterogeneous Network Environments
Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen Vorlesung Kommunikationsnetze Research Topics:
More informationClearing the Way for VoIP
Gen2 Ventures White Paper Clearing the Way for VoIP An Alternative to Expensive WAN Upgrades Executive Overview Enterprises have traditionally maintained separate networks for their voice and data traffic.
More informationLink Layer. 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: ATM and MPLS
Link Layer 5.1 Introduction and services 5.2 Error detection and correction 5.3Multiple access protocols 5.4 Link-Layer Addressing 5.5 Ethernet 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: and
More informationAn Analysis of Error Handling Techniques in Voice over IP
An Analysis of Error Handling Techniques in Voice over IP Martin John Lipka ABSTRACT The use of Voice over IP (VoIP) has been growing in popularity, but unlike its wired circuit-switched telephone network
More informationComputer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
More informationKeywords: VoIP calls, packet extraction, packet analysis
Chapter 17 EXTRACTING EVIDENCE RELATED TO VoIP CALLS David Irwin and Jill Slay Abstract The Voice over Internet Protocol (VoIP) is designed for voice communications over IP networks. To use a VoIP service,
More informationVoIP QoS. Version 1.0. September 4, 2006. AdvancedVoIP.com. sales@advancedvoip.com support@advancedvoip.com. Phone: +1 213 341 1431
VoIP QoS Version 1.0 September 4, 2006 AdvancedVoIP.com sales@advancedvoip.com support@advancedvoip.com Phone: +1 213 341 1431 Copyright AdvancedVoIP.com, 1999-2006. All Rights Reserved. No part of this
More informationIP-Telephony Real-Time & Multimedia Protocols
IP-Telephony Real-Time & Multimedia Protocols Bernard Hammer Siemens AG, Munich Siemens AG 2001 1 Presentation Outline Media Transport RTP Stream Control RTCP RTSP Stream Description SDP 2 Real-Time Protocol
More informationICOM 5026-090: Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM
ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 Outline The transport service Elements of transport protocols A
More informationPerformance Issues of TCP and MPEG-4 4 over UMTS
Performance Issues of TCP and MPEG-4 4 over UMTS Anthony Lo A.Lo@ewi.tudelft.nl 1 Wiskunde end Informatica Outline UMTS Overview TCP and MPEG-4 Performance Summary 2 1 Universal Mobile Telecommunications
More informationLost Packets Recovery during Video Broadcasting Over Data Network
Lost Packets Recovery during Video Broadcasting Over Data Network Hassan H. Soliman, Hossam E. Mostafa and Eman A.E. Ahmed Department of Electronics and Communicatios Engineering, Faculty of Engineering
More information920-803 - technology standards and protocol for ip telephony solutions
920-803 - technology standards and protocol for ip telephony solutions 1. Which CODEC delivers the greatest compression? A. B. 711 C. D. 723.1 E. F. 726 G. H. 729 I. J. 729A Answer: C 2. To achieve the
More informationSaratoga: A Scalable File Transfer Protocol draft-wood-tsvwg-saratoga-09 http://saratoga.sf.net/
Saratoga: A Scalable File Transfer Protocol draft-wood-tsvwg-saratoga-09 http://saratoga.sf.net/ Lloyd Wood Centre for Communication Systems Research, University of Surrey l.wood@surrey.ac.uk Charles Smith
More informationSoftware Engineering 4C03 VoIP: The Next Telecommunication Frontier
Software Engineering 4C03 VoIP: The Next Telecommunication Frontier Rudy Muslim 0057347 McMaster University Computing and Software Department Hamilton, Ontario Canada Introduction Voice over Internet Protocol
More informationAN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK
Abstract AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Mrs. Amandeep Kaur, Assistant Professor, Department of Computer Application, Apeejay Institute of Management, Ramamandi, Jalandhar-144001, Punjab,
More informationAERONAUTICAL COMMUNICATIONS PANEL (ACP) ATN and IP
AERONAUTICAL COMMUNICATIONS PANEL (ACP) Working Group I - 7 th Meeting Móntreal, Canada 2 6 June 2008 Agenda Item x : ATN and IP Information Paper Presented by Naoki Kanada Electronic Navigation Research
More informationUsing Virtual SIP Links to Enable QoS for Signalling
Using Virtual SIP Links to Enale QoS for Signalling Alexander A. Kist and Richard J. Harris RMIT University Melourne BOX 2476V, Victoria 31, Australia Telephone: (+) 61 (3) 9925-5218, Fax: (+) 61 (3) 9925-3748
More informationCS268 Exam Solutions. 1) End-to-End (20 pts)
CS268 Exam Solutions General comments: ) If you would like a re-grade, submit in email a complete explanation of why your solution should be re-graded. Quote parts of your solution if necessary. In person
More informationAdaptive DCF of MAC for VoIP services using IEEE 802.11 networks
Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,
More informationImproving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.
More informationIPTV hit primetime. Main Topic
Main Topic ivideo helps IPTV hit primetime ivideohelps IPTV hit primetime With the development of video services, users want to watch high quality video content through a terminal of their choice, and
More informationUnderstanding Latency in IP Telephony
Understanding Latency in IP Telephony By Alan Percy, Senior Sales Engineer Brooktrout Technology, Inc. 410 First Avenue Needham, MA 02494 Phone: (781) 449-4100 Fax: (781) 449-9009 Internet: www.brooktrout.com
More informationA Robust Multimedia Contents Distribution over IP based Mobile Networks
, pp. 283-288 http://dx.doi.org/10.14257/ijseia.2015.9.9.24 A Robust Multimedia Contents Distribution over IP based Mobile Networks Ronnie D. Caytiles, Seungyong Shin and Byungjoo Park * Multimedia Engineering
More informationReliable Multicast Protocol with Packet Forwarding in Wireless Internet
Reliable Multicast Protocol with Packet Forwarding in Wireless Internet Taku NOGUCHI, Toru YOSHIKAWA and Miki YAMAMOTO College of Information Science and Engineering, Ritsumeikan University 1-1-1, Nojihigashi,
More informationTDM services over IP networks
Keyur Parikh Junius Kim TDM services over IP networks 1. ABSTRACT Time Division Multiplexing (TDM) circuits have been the backbone of communications over the past several decades. These circuits which
More informationFast Retransmission Mechanism for VoIP in IEEE 802.11e wireless LANs
Fast Mechanism for VoIP in IEEE 802.11e wireless LANs Gyung-Ho Hwang and Dong-Ho Cho Division of Electrical Engineering, Department of Electrical Engineering and Computer Science, KAIST, 373-1 Guseong-dong
More informationPerformance of Video-Chat Applications Under Congestion
2009 11th IEEE International Symposium on Multimedia Performance of Video-Chat Applications Under Congestion Omer Boyaci, Andrea G. Forte, Henning Schulzrinne Department of Computer Science Columbia University
More informationProtocol Overhead in IP/ATM Networks
Protocol Overhead in IP/ATM Networks John David Cavanaugh * Minnesota Supercomputer Center, Inc. This paper discusses the sources of protocol overhead in an IP/ATM protocol stack. It quantifies the amount
More informationMobile Communications Chapter 9: Mobile Transport Layer
Mobile Communications Chapter 9: Mobile Transport Layer Motivation TCP-mechanisms Classical approaches Indirect TCP Snooping TCP Mobile TCP PEPs in general Additional optimizations Fast retransmit/recovery
More informationInternet Video Streaming and Cloud-based Multimedia Applications. Outline
Internet Video Streaming and Cloud-based Multimedia Applications Yifeng He, yhe@ee.ryerson.ca Ling Guan, lguan@ee.ryerson.ca 1 Outline Internet video streaming Overview Video coding Approaches for video
More informationVoIP over WiMAX: Quality of Experience Evaluation
VoIP over WiMAX: Quality of Experience Evaluation Vitor Bernardo, Bruno Sousa, Marilia Curado Laboratory of Communications and Telematics Department of Informatics Engineering, University of Coimbra {vmbern,bmsousa,marilia}@dei.uc.pt
More informationIndepth Voice over IP and SIP Networking Course
Introduction SIP is fast becoming the Voice over IP protocol of choice. During this 3-day course delegates will examine SIP technology and architecture and learn how a functioning VoIP service can be established.
More informationScalable Video Streaming in Wireless Mesh Networks for Education
Scalable Video Streaming in Wireless Mesh Networks for Education LIU Yan WANG Xinheng LIU Caixing 1. School of Engineering, Swansea University, Swansea, UK 2. College of Informatics, South China Agricultural
More informationMobile video streaming and sharing in social network using cloud by the utilization of wireless link capacity
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 7 July, 2014 Page No. 7247-7252 Mobile video streaming and sharing in social network using cloud by
More informationMultimedia Data Transmission over Wired/Wireless Networks
Multimedia Data Transmission over Wired/Wireless Networks Bharat Bhargava Gang Ding, Xiaoxin Wu, Mohamed Hefeeda, Halima Ghafoor Purdue University Website: http://www.cs.purdue.edu/homes/bb E-mail: bb@cs.purdue.edu
More informationIntroduction to IP v6
IP v 1-3: defined and replaced Introduction to IP v6 IP v4 - current version; 20 years old IP v5 - streams protocol IP v6 - replacement for IP v4 During developments it was called IPng - Next Generation
More informationCurso de Telefonía IP para el MTC. Sesión 2 Requerimientos principales. Mg. Antonio Ocampo Zúñiga
Curso de Telefonía IP para el MTC Sesión 2 Requerimientos principales Mg. Antonio Ocampo Zúñiga Factors Affecting Audio Clarity Fidelity: Audio accuracy or quality Echo: Usually due to impedance mismatch
More informationTransport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
More informationVOICE OVER IP AND NETWORK CONVERGENCE
POZNAN UNIVE RSITY OF TE CHNOLOGY ACADE MIC JOURNALS No 80 Electrical Engineering 2014 Assaid O. SHAROUN* VOICE OVER IP AND NETWORK CONVERGENCE As the IP network was primarily designed to carry data, it
More informationPrevention of Anomalous SIP Messages
International Journal of Future Computer and Communication, Vol., No., October 03 Prevention of Anomalous SIP Messages Ming-Yang Su and Chung-Chun Chen Abstract Voice over internet protocol (VoIP) communication
More informationManagement of Telecommunication Networks. Prof. Dr. Aleksandar Tsenov akz@tu-sofia.bg
Management of Telecommunication Networks Prof. Dr. Aleksandar Tsenov akz@tu-sofia.bg Part 1 Quality of Services I QoS Definition ISO 9000 defines quality as the degree to which a set of inherent characteristics
More informationExtended-rtPS Algorithm for VoIP Services in IEEE 802.16 systems
Extended-rtPS Algorithm for VoIP Services in IEEE 802.16 systems Howon Lee, Taesoo Kwon and Dong-Ho Cho Department of Electrical Engineering and Computer Science Korea Advanced Institute of Science and
More informationFinal for ECE374 05/06/13 Solution!!
1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -
More informationAN ANALYSIS OF DELAY OF SMALL IP PACKETS IN CELLULAR DATA NETWORKS
AN ANALYSIS OF DELAY OF SMALL IP PACKETS IN CELLULAR DATA NETWORKS Hubert GRAJA, Philip PERRY and John MURPHY Performance Engineering Laboratory, School of Electronic Engineering, Dublin City University,
More informationREDUCING PACKET OVERHEAD IN MOBILE IPV6
REDUCING PACKET OVERHEAD IN MOBILE IPV6 ABSTRACT Hooshiar Zolfagharnasab 1 1 Department of Computer Engineering, University of Isfahan, Isfahan, Iran hoppico@eng.ui.ac.ir hozo19@gmail.com Common Mobile
More informationPower management of video transmission on wireless networks for multiple receivers
Power management of video transmission on wireless networks for multiple receivers Christos Bouras, Kostas Stamos and Giannis Zaoudis Research Academic Computer Technology Institute and Computer Engineering
More informationComputer Networks CS321
Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics
More informationDeuceScan: Deuce-Based Fast Handoff Scheme in IEEE 802.11 Wireless Networks
: Deuce-Based Fast Handoff Scheme in IEEE 82.11 Wireless Networks Yuh-Shyan Chen, Chung-Kai Chen, and Ming-Chin Chuang Department of Computer Science and Information Engineering National Chung Cheng University,
More informationVoice over Internet Protocol (VoIP) systems can be built up in numerous forms and these systems include mobile units, conferencing units and
1.1 Background Voice over Internet Protocol (VoIP) is a technology that allows users to make telephone calls using a broadband Internet connection instead of an analog phone line. VoIP holds great promise
More informationIEEE 802.16 Broadband Wireless Access Working Group. ATM Based MAC Layer Proposal for the 802.16 Air Interface Specification
Project Title Date Submitted Source Re: Abstract Purpose Notice Release IEEE Patent Policy IEEE 802.16 Broadband Wireless Access Working Group ATM Based MAC Layer Proposal for the 802.16 Air Interface
More information