Index. peer-to-peer systems, PPFEED (see Peer-to-peer file sharing (PPFEED)) ARQ schemes, 30. B Butterfly networks, 30
|
|
- Cordelia Byrd
- 5 years ago
- Views:
Transcription
1 Index A Adaptive network coding (ANC) bandwidth utilization, 164 cumulative encoding technique, 163 LC, 163, 164 MDC, 164 overlay topology construction, peer joining, average satisfaction, control overhead, GT-ITM software, 171 LION, 171 resilience, problem formalization, random network coding, 163, receivers, 163 theoretical analysis, 163 AF-SoftNC. See Amplify-and-forward SoftNC (AF-SoftNC) ALM. See Application layer multicast (ALM) Amplify and forward (AF) protocol, 8 Amplify-and-forward SoftNC (AF-SoftNC) MAIR performance analysis, virtual channel approximation, 14 ANC. See Adaptive network coding (ANC) Application layer multicast (ALM) heterogeneous peer-to-peer streaming system, network coding advantages, 119 deterministic vs. random, 124 linear, multicast networks, peer-to-peer systems, PPFEED (see Peer-to-peer file sharing (PPFEED)) ARQ schemes, 30 B Butterfly networks, 30 C CCACK. See Cumulative coded acknowledgment (CCACK) CDN. See Content distribution network (CDN) Channel assignment and network-coded opportunistic routing (CANCOR) CR transmission, 70 CTT, 70 electromagnetic spectrum, 69 half-duplex model, 71 heuristic algorithm, NLP problem, 72, 75 opportunistic routing, 70 SCAOR, 71 simulation and performance evaluation protocols, 78 throughput comparison vs. batch size, 81, 82 throughput comparison vs. buffer size, throughput comparison vs. number of channels, throughput comparison vs. number of radios, 79 Channel coding, 2 4, 6, 11, 12 Springer International Publishing Switzerland 2016 Y. Qin (ed.), Network Coding at Different Layers In Wireless Networks, DOI /
2 180 Index CNCOR. See Combined network coding and opportunistic routing (CNCOR) CoAOR, Coding-aware routing candidate selection algorithm, coding rules and modeling assumptions, forwarding timer, 88 performance evaluation bandwidth efficiency vs. difference in spectrum changing, 89, 90 NS2, 88 simulation parameters, 88, 89 throughput vs. packet loss rate, 89, 90 prioritization, SuDR, Coding in opportunistic routing (CodeOR), 64 Cognitive radio networks (CRNs), 60 Cognitive radio opportunistic routing (CROR) coding-aware routing, CRNs, intersession network coding, 81 nums SUs and nump PUs, 83 throughput vs. packet loss rate, WMNs, 81 Cognitive transport throughput (CTT), 70 Combined network coding and opportunistic routing (CNCOR), 62 Content distribution network (CDN), 146 COPE, 61, 62, CORE, CoRET, 66 CTT. See Cognitive transport throughput (CTT) Cumulative coded acknowledgment (CCACK), D Data-driven Overlay Network (DONet), 148 DCAR. See Distributed coding-aware routing (DCAR) Deterministic vs. random network coding, 124 Distributed coding-aware routing (DCAR) characteristics, 62 k-hop coding model, DONet. See Data-driven Overlay Network (DONet) E Error-control techniques, 30 ETX. See Expected transmission count (ETX) Expected transmission count (ETX), 71, 74, F FCS. See Forwarding candidate set (FCS) Feedback-based adaptive broadcast coding scheme, 30 File sharing services, 125 Finite-state machine (FSM), 31, 36 37, Forwarding candidate set (FCS), 84, Free-ride-oriented routing (FORM) availability, 62 compatibility, 62 G Go-Back-N automatic repeat request (GBN-ARQ) assumptions, analysis, HISO network coding system, 41, 52, 54 NACK, 31 steady-state throughput finite-state machine modeling, HISO network coding system, 41, 52 law of total probability, 40 Perron-Frobenius theorem, 40 state transitions, 37 39, 52 system model abstract source node, HISO coding node, 32 throughput performance, nth time-chip, 35 transmission operations, GRANT message, 158 GT-ITM software, 158, 171 H HELLO messages, 157 Heterogeneous peer-to-peer streaming ANC, CDN, 146 live media steaming systems, mesh-based, 147 network layer multicast, 145 optimal overlay topology construction (see Overlay topology construction, peer-to-peer streaming systems) requirements, server-client transmission model, 146 unicast connection, 145 Heuristic algorithm candidate selection algorithm, channel assignment, H-Inputs-Single-Output (HISO) network, 31, 32, 41, 52 56
3 Index 181 I Intersession network coding, 60, 63, 82, 83 Intra-session network coding CANCOR (see Channel assignment and (CANCOR)) coding-aware scheme, 69 K k-hop coding model, 62 L Lagrange dual problems, 65 Law of total probability, 40 Layered coding (LC), 163, 164 LC. See Layered coding (LC) LEAVE messages, 157 Linear network coding, multicast assignment, capacity, 123 flow, 120 link capacity function, 119 max-flow min-cut, theories, 119 Lyapunov optimization, 65 M MAIR. See Maximum achievable information rate (MAIR) Maximum achievable information rate (MAIR) AF-SoftNC and SBF-SoftNC, performance, analysis steps, 12 performance comparison AF-NNC, SBF-NNC, 21 SNC protocol, 21, 22 SNR, 22 Maximum ratio combination (MRC), 6 MCMR. See Multichannel multi-radio (MCMR) Minimum delay mesh (MDM) problem, 150 MRORNC. See Multi-rate opportunistic routing-aware network coding (MRORNC) Multicast coding subgraphs, 65 CoRET, 66 Hamming distance, 66 optimal encoding number, rate control, Multichannel multi-radio (MCMR), 70, 71 Multi-hop CRNs CANCOR (see Channel assignment and (CANCOR)) CROR (see Cognitive radio opportunistic routing (CROR)) Multiple description coding (MDC), 164 Multi-rate opportunistic routing-aware network coding (MRORNC), 63 Mutual information for demodulate and forward, N Network coding (NC) algebraic approach, 59 applications (see Wireless networks) CRNs, 60 I2NC, 60 intersession network coding, 60 intra-session network coding, 60 satellite networks, 59 scheme, 5, 30, 163, 164, 175 Network coding nodes communication systems, 30 feedback, 30 GBN-ARQ, 32, 56 HISO, 31 SR-ARQ, 32, 43, 56 state transitions, throughput and delay performance, 30 Network layer multicast, 118 Network simulator (NS2), 78, 88, 158 Network switching, NLP problem. See Nonlinear programming (NLP) problem Nonlinear programming (NLP) problem, 72, 75 O OCR. See Opportunistic cognitive routing (OCR) One-way channel (OWRC), 1 2, 8, 9, 17 Opportunistic cognitive routing (OCR), 70 Overlay topology construction, peer-to-peer streaming systems distributed algorithm, DONet, 148 greedy heuristic algorithm, MDM problem, 150 NICE protocol, peer joining, 156
4 182 Index Overlay topology construction, peer-to-peer streaming systems (cont.) peer leaving, end-to-end delay, 161, 162 GT-ITM software, 158 link stress, satisfaction, different system sizes, problem formalization conditions, 152 downloading rate, 151 link heterogeneity, 150, 151 Steiner tree packing, 153 uplink and downlik bandwidth, SplitStream, topology adjustment procedure, tree-based and mesh-based, 148 ZIGZAG, 149 P Packet transmission modeling, Peer-to-peer file sharing (PPFEED) advantages, random network coding, 125 combination networks linear network coding assignment, network coding gain, node types, 126 properties, 127 random network coding, 127 data dissemination, 134 decoding, 130 development, reliability and resilience, friendly/abruptly leaving, group ID, 129 joining process, 131 link heterogeneity, 136 local topology adjustment, multicast graph construction, 125 overlay network construction, 129 parameters, 129 baseline configuration, dynamic peer join/leave configuration, heterogeneity configuration, link stress, 138 reliability, 138 throughput, 137 topology awareness configuration, retransmission, 130 scalability and resilience, mesh network, services, topology awareness, Tornado code, 130 web-based applications, 124 Performance analysis, SoftNC with direct link AF-SoftNC, bounds and approximations, MAIR analysis, 12 MAIR performance comparison, SBF-SoftNC, without direct link, Perron-Frobenius theorem, 40 Physical layer network coding (PNC), 1 PPFEED. See Peer-to-peer file sharing (PPFEED) R Random loss, 103, 107, 110 Request indicator bits (RIBs), 66 REQUEST message, 157 RIBs. See Request indicator bits (RIBs) Round trip time (RTT) GBN-ARQ, 34 SR-ARQ, 35 TCP-Vegas, 98 Routing. See also Channel assignment and (CANCOR) CCACK, CNCOR, 62 CoAOR, CodeOR, 64 COPE, 61 CORE, DCAR, FORM, 62 multicast network, RTT. See Round trip time (RTT) S SBF. See Soft bit forward (SBF) SBF-SoftNC. See Soft-bit-forward SoftNC (SBF-SoftNC) SCAOR. See Simple channel assignment for opportunistic routing (SCAOR)
5 Index 183 Selective-repeat ARQ (SR-ARQ) HISO network coding node, 31 NACK, 31, 36 system model, 33 throughput performance, time-chip, 35, 36 Server-client model, 117, 118 Simple channel assignment for opportunistic routing (SCAOR), 71 Soft bit forward (SBF), 8 10, 20 Soft-bit-forward SoftNC (SBF-SoftNC) analysis procedure, MAIR performance, 12, TWRC, 9 Soft network coding (SoftNC) AF-SoftNC, 2 design in fading channels, 8 10 SNC scheme, 6 system diagram, 7 MAIR, 2 numerical simulation bounds and approximations, MAIR performance comparison, SBF-SoftNC, 2 SplitStream, SR-ARQ. See Selective-repeat ARQ (SR-ARQ) State transitions GBN-ARQ, 37 39, 52 SR-ARQ calculation of P C, calculation of P 0, conditions for state, 45 Steady-state throughput, SR-ARQ network coding system, packet transmission modeling, state transitions calculation of P C, calculation of P 0, conditions for state, 45 Stop-and-Wait (SW-ARQ), 30, 31 Straightforward network coding (SNC) MAIR, 22 SoftNC, 7 system diagram, 5 Successful delivery ratio (SuDR) ETX, 85 FCS, 87 MORE and CORE, 84 T TCP. See Transmission control protocol (TCP) TCP-Vega congestion detection, 96 RTT-aware characteristic, 98 TCP-DNC, 108 TCP-Veno, 96 Topology awareness finish time and retransmissions, 144, 145 link stress, 144, 146 PPFEED, , 144 Transmission control protocol (TCP) adaptive method, digital fountain codes, 97 dynamic method, 102 effectiveness, linear network coding, 98 MRTT and RTT, 96 multi-flows hybrid network, 110, wired network, network switching, packet format, soundness, static method, transport layer, 95 Transmission operations, GBN-ARQ/ SR-ARQ, Two-way relay channel (TWRC) BPSK modulation, 4 half-duplex mode, 3 network coding, 3, 5 SNC scheme, 2 wireless TWRC, 4 W WACA. See Workload-Aware Channel Assignment algorithm (WACA) Wireless channel codes, 7 Wireless channel fading effect, 6 Wireless mesh networks (WMNs), 82 Wireless networks multicast flows (see Multicast) routing scheme-based NC (see Routing) scheme-based network coding, 60 WMNs. See Wireless mesh networks (WMNs) Workload-Aware Channel Assignment algorithm (WACA), 70 X XCOR, 63
PRESENTED BY SARAH KWAN NETWORK CODING
PRESENTED BY SARAH KWAN NETWORK CODING NETWORK CODING PRESENTATION OUTLINE What is Network Coding? Motivation and Approach Network Coding with Lossless Networks Challenges in Developing Coding Algorithms
More informationDirect Link Communication I: Basic Techniques. Data Transmission. ignore carrier frequency, coding etc.
Direct Link Communication I: Basic Techniques Link speed unit: bps abstraction Data Transmission ignore carrier frequency, coding etc. Point-to-point link: wired or wireless includes broadcast case Interested
More informationCE693: Adv. Computer Networking
CE693: Adv. Computer Networking L-10 Wireless Broadcast Fall 1390 Acknowledgments: Lecture slides are from the graduate level Computer Networks course thought by Srinivasan Seshan at CMU. When slides are
More informationUNIT IV -- TRANSPORT LAYER
UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission
More informationPrinciples of Reliable Data Transfer
Principles of Reliable Data Transfer 1 Reliable Delivery Making sure that the packets sent by the sender are correctly and reliably received by the receiver amid network errors, i.e., corrupted/lost packets
More informationDTN Interworking for Future Internet Presented by Chang, Dukhyun
DTN Interworking for Future Internet 2008.02.20 Presented by Chang, Dukhyun Contents 1 2 3 4 Introduction Project Progress Future DTN Architecture Summary 2/29 DTN Introduction Delay and Disruption Tolerant
More informationPRIORITY-BASED BROADCASTING OF SENSITIVE DATA IN ERROR-PRONE WIRELESS NETWORKS
PRIORITY-BASED BROADCASTING OF SENSITIVE DATA IN ERROR-PRONE WIRELESS NETWORKS Pouya Ostovari, Jie Wu, and Ying Dai Center for Networked Computing http://www.cnc.temple.edu Agenda 2 Introduction Motivation
More informationFall 2012: FCM 708 Bridge Foundation I
Fall 2012: FCM 708 Bridge Foundation I Prof. Shamik Sengupta Instructor s Website: http://jjcweb.jjay.cuny.edu/ssengupta/ Blackboard Website: https://bbhosted.cuny.edu/ Intro to Computer Networking Transport
More informationComputer Networking. Reliable Transport. Reliable Transport. Principles of reliable data transfer. Reliable data transfer. Elements of Procedure
Computer Networking Reliable Transport Prof. Andrzej Duda duda@imag.fr Reliable Transport Reliable data transfer Data are received ordered and error-free Elements of procedure usually means the set of
More informationOptimizing Joint Erasure- and Error-Correction Coding for Wireless Packet Transmissions
Optimizing Joint Erasure- and Error-Correction Coding for Wireless Packet Transmissions 2007 IEEE Communication Theory Workshop Christian R. Berger 1, Shengli Zhou 1, Yonggang Wen 2, Peter Willett 1 and
More informationCS 268: Computer Networking. Taking Advantage of Broadcast
CS 268: Computer Networking L-12 Wireless Broadcast Taking Advantage of Broadcast Opportunistic forwarding Network coding Assigned reading XORs In The Air: Practical Wireless Network Coding ExOR: Opportunistic
More informationLecture 4: CRC & Reliable Transmission. Lecture 4 Overview. Checksum review. CRC toward a better EDC. Reliable Transmission
1 Lecture 4: CRC & Reliable Transmission CSE 123: Computer Networks Chris Kanich Quiz 1: Tuesday July 5th Lecture 4: CRC & Reliable Transmission Lecture 4 Overview CRC toward a better EDC Reliable Transmission
More informationXORs in the Air: Practical Wireless Network Coding
XORs in the Air: Practical Wireless Network Coding S. Katti, H. Rahul, W. Hu, D. Katabi, M. Medard, J. Crowcroft MIT & University of Cambridge Can we use 3 transmissions to send traffic? 1 2 4 3 Can we
More informationPeer-to-Peer Streaming Systems. Behzad Akbari
Peer-to-Peer Streaming Systems Behzad Akbari 1 Outline Introduction Scaleable Streaming Approaches Application Layer Multicast Content Distribution Networks Peer-to-Peer Streaming Metrics Current Issues
More informationUNIVERSITY OF CALIFORNIA, IRVINE. Cross-Layer Optimization of Coded Wireless Networks DISSERTATION
UNIVERSITY OF CALIFORNIA, IRVINE Cross-Layer Optimization of Coded Wireless Networks DISSERTATION submitted in partial satisfaction of the requirements for the degree of DOCTOR OF PHILOSOPHY in Electrical
More informationLecture 7: Sliding Windows. CSE 123: Computer Networks Geoff Voelker (guest lecture)
Lecture 7: Sliding Windows CSE 123: Computer Networks Geoff Voelker (guest lecture) Please turn in HW #1 Thank you From last class: Sequence Numbers Sender Receiver Sender Receiver Timeout Timeout Timeout
More informationETSF10 Internet Protocols Transport Layer Protocols
ETSF10 Internet Protocols Transport Layer Protocols 2012, Part 2, Lecture 2.1 Kaan Bür, Jens Andersson Transport Layer Protocols Process-to-process delivery [ed.4 ch.23.1] [ed.5 ch.24.1] Transmission Control
More informationScalable Video Transport over Wireless IP Networks. Dr. Dapeng Wu University of Florida Department of Electrical and Computer Engineering
Scalable Video Transport over Wireless IP Networks Dr. Dapeng Wu University of Florida Department of Electrical and Computer Engineering Bandwidth Fluctuations Access SW Domain B Domain A Source Access
More informationDirect Link Communication I: Basic Techniques. Data Transmission. ignore carrier frequency, coding etc.
Direct Link Communication I: Basic Techniques Link speed unit: bps abstraction Data Transmission ignore carrier frequency, coding etc. Point-to-point link: wired or wireless includes broadcast case Interested
More information1. The Internet 2. Principles 3. Ethernet 4. WiFi 5. Routing 6. Internetworking 7. Transport 8. Models 9. WiMAX & LTE 10. QoS 11. Physical Layer 12.
Lecture Slides 1. The Internet 2. Principles 3. Ethernet 4. WiFi 5. Routing 6. Internetworking 7. Transport 8. Models 9. WiMAX & LTE 10. QoS 11. Physical Layer 12. Additional Topics 1.1. Basic Operations
More informationStreaming Video over the Internet. Dr. Dapeng Wu University of Florida Department of Electrical and Computer Engineering
Streaming Video over the Internet Dr. Dapeng Wu University of Florida Department of Electrical and Computer Engineering What is Streaming Video? Download mode: no delay bound Streaming mode: delay bound
More informationError Control System for Parallel Multichannel Using Selective Repeat ARQ
Error Control System for Parallel Multichannel Using Selective Repeat ARQ M.Amal Rajan 1, M.Maria Alex 2 1 Assistant Prof in CSE-Dept, Jayamatha Engineering College, Aralvaimozhi, India, 2 Assistant Prof
More informationBroadcasting with Hard Deadlines in Wireless Multi-hop Networks Using Network Coding
WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 0000; 00: 6 Broadcasting with Hard Deadlines in Wireless Multi-hop Networks Using Network Coding Pouya Ostovari, Abdallah Khreishah,
More informationChapter 3: Transport Layer Part A
Chapter 3: Transport Layer Part A Course on Computer Communication and Networks, CTH/GU The slides are adaptation of the slides made available by the authors of the course s main textbook 3: Transport
More informationComputer Networks รศ.ดร.อน นต ผลเพ ม. Assoc. Prof. Anan Phonphoem, Ph.D. Kasetsart University, Bangkok, Thailand
Jan May 2018 Computer Networks รศ.ดร.อน นต ผลเพ ม Assoc. Prof. Anan Phonphoem, Ph.D. anan.p@ku.ac.th http://www.cpe.ku.ac.th/~anan Computer Engineering Department Kasetsart University, Bangkok, Thailand
More informationPreface List of Acronyms
Contents Preface List of Acronyms xxi Chapter 1 Next Generation Wireless Technologies 1 1.1 Introduction 1 1.2 Wireless Networking Standardization Process 5 1.2.1 Wireless Personal Area Networks 5 1.2.2
More informationApplying Network Coding to Peer-to-Peer File Sharing
1938 IEEE TRANSACTIONS ON COMPUTERS, VOL. 63, NO. 8, AUGUST 2014 Applying Network Coding to Peer-to-Peer File Sharing Min Yang and Yuanyuan Yang, Fellow, IEEE Abstract Network coding is a promising enhancement
More informationChapter 12 Network Protocols
Chapter 12 Network Protocols 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems Interconnection (OSI) Transmission Control Protocol/Internetworking Protocol (TCP/IP)
More informationCMPE 257: Wireless and Mobile Networking
CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 10 CMPE 257 Spring'15 1 Student Presentations Schedule May 21: Sam and Anuj May 26: Larissa
More informationLecture 7: Flow Control"
Lecture 7: Flow Control" CSE 123: Computer Networks Alex C. Snoeren No class Monday! Lecture 7 Overview" Flow control Go-back-N Sliding window 2 Stop-and-Wait Performance" Lousy performance if xmit 1 pkt
More informationIntroduction Multirate Multicast Multirate multicast: non-uniform receiving rates. 100 M bps 10 M bps 100 M bps 500 K bps
Stochastic Optimal Multirate Multicast in Socially Selfish Wireless Networks Hongxing Li 1, Chuan Wu 1, Zongpeng Li 2, Wei Huang 1, and Francis C.M. Lau 1 1 The University of Hong Kong, Hong Kong 2 University
More informationMSHCS-MAC: A MAC Protocol for Multihop Cognitive Radio Networks based on Slow Hopping and Cooperative Sensing approach
MSHCS-MAC: A MAC Protocol for Multihop Cognitive Radio Networks based on Slow Hopping and Cooperative Sensing approach Nhat Pham, Kiwoong Kwon, Daeyoung Kim School of Computing, Korea Advanced Institute
More informationLecture 7: Flow & Media Access Control"
Lecture 7: Flow & Media Access Control" CSE 123: Computer Networks Alex C. Snoeren HW 2 due next Wednesday! Lecture 7 Overview" Flow control Go-back-N Sliding window Methods to share physical media: multiple
More informationCSE 123: Computer Networks Alex C. Snoeren. HW 1 due NOW!
CSE 123: Computer Networks Alex C. Snoeren HW 1 due NOW! Automatic Repeat Request (ARQ) Acknowledgements (ACKs) and timeouts Stop-and-Wait Sliding Window Forward Error Correction 2 Link layer is lossy
More informationNETWORK coding [1] [3] has attracted much interest in
1714 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 60, NO. 4, MAY 2011 Analysis of General Network Coding Conditions and Design of a Free-Ride-Oriented Routing Metric Bin Guo, Student Member, IEEE, Hongkun
More informationFast, Efficient, and Robust Multicast in Wireless Mesh Networks
fast efficient and robust networking FERN Fast, Efficient, and Robust Multicast in Wireless Mesh Networks Ian Chakeres Chivukula Koundinya Pankaj Aggarwal Outline IEEE 802.11s mesh multicast FERM algorithms
More informationChapter 09 Network Protocols
Chapter 09 Network Protocols Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems
More informationChapter 24. Transport-Layer Protocols
Chapter 24. Transport-Layer Protocols 23.1 Introduction 23.2 User Datagram Protocol 23.3 Transmission Control Protocol 23.4 SCTP Computer Networks 24-1 Position of Transport-Layer Protocols UDP is an unreliable
More informationECE 598HH: Special Topics in Wireless Networks and Mobile Systems
ECE 598HH: Special Topics in Wireless Networks and Mobile Systems Lecture 21: Opportunistic Routing Haitham Hassanieh *These slides are courtesy of Dina Katabi 1 Lecture Outline Single Path Routing Opportunistic
More informationWireless Internet Routing. Learning from Deployments Link Metrics
Wireless Internet Routing Learning from Deployments Link Metrics 1 Learning From Deployments Early worked focused traditional routing issues o Control plane: topology management, neighbor discovery o Data
More informationpresented by: [ THE TECHNOLOGY LIAISON TEAM ORKTS CUHK ]
presented by: [ THE TECHNOLOGY LIAISON TEAM ORKTS CUHK ] Category Application Invention Title Principle Investigator CUHK Tech ID HTTP-based Video Streaming Devices and Methods for Scheduling Transmission
More informationRecommended Readings
Lecture 11: Media Adaptation Scalable Coding, Dealing with Errors Some slides, images were from http://ip.hhi.de/imagecom_g1/savce/index.htm and John G. Apostolopoulos http://www.mit.edu/~6.344/spring2004
More informationMULTI-LAYER VIDEO STREAMING WITH HELPER NODES USING NETWORK CODING
MULTI-LAYER VIDEO STREAMING WITH HELPER NODES USING NETWORK CODING Pouya Ostovari, Abdallah Khreishah, and Jie Wu Computer and Information Sciences Temple University IEEE MASS 2013 Center for Networked
More informationImproving the Robustness of TCP to Non-Congestion Events
Improving the Robustness of TCP to Non-Congestion Events Presented by : Sally Floyd floyd@acm.org For the Authors: Sumitha Bhandarkar A. L. Narasimha Reddy {sumitha,reddy}@ee.tamu.edu Problem Statement
More informationThe Importance of Being Opportunistic
High Performance Switching and Routing Telecom Center Workshop: Sept 4, 1997. The Importance of Being Opportunistic Sachin Katti Dina Katabi, Wenjun Hu, Hariharan Rahul, and Muriel Medard Bandwidth is
More informationCommunications Software. CSE 123b. CSE 123b. Spring Lecture 3: Reliable Communications. Stefan Savage. Some slides couresty David Wetherall
CSE 123b CSE 123b Communications Software Spring 2002 Lecture 3: Reliable Communications Stefan Savage Some slides couresty David Wetherall Administrativa Home page is up and working http://www-cse.ucsd.edu/classes/sp02/cse123b/
More informationTo address these challenges, extensive research has been conducted and have introduced six key areas of streaming video, namely: video compression,
Design of an Application Layer Congestion Control for Reducing network load and Receiver based Buffering Technique for packet synchronization in Video Streaming over the Internet Protocol Mushfeq-Us-Saleheen
More informationLec 19 - Error and Loss Control
ECE 5578 Multimedia Communication Lec 19 - Error and Loss Control Zhu Li Dept of CSEE, UMKC Office: FH560E, Email: lizhu@umkc.edu, Ph: x 2346. http://l.web.umkc.edu/lizhu slides created with WPS Office
More informationMulti-Hop ARQ 林咨銘 2006/8/24.
Multi-Hop ARQ 林咨銘 2006/8/24 tmlin@itri.org.tw Outline Introduction Multi-Hop Scenario Multi-Hop Issues Multi-Hop ARQ Schemes Multi-hop ARQ [1] VTC 2005 Spring Relay ARQ[2] VTC 2005 Fall Summary Multi-Hop
More informationOne More Bit Is Enough
One More Bit Is Enough Yong Xia, RPI Lakshmi Subramanian, UCB Ion Stoica, UCB Shiv Kalyanaraman, RPI SIGCOMM 05, Philadelphia, PA 08 / 23 / 2005 Motivation #1: TCP doesn t work well in high b/w or delay
More informationEEC-484/584 Computer Networks
EEC-484/584 Computer Networks Lecture 2 Wenbing Zhao wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Misc. Interested in research? Secure
More informationVideo-Aware Opportunistic Network Coding over Wireless Networks
1 Video-Aware Opportunistic Network Coding over Wireless Networks Hulya Seferoglu, IEEE Student Member, Athina Markopoulou, IEEE Member Abstract In this paper, we study video streaming over wireless networks
More informationThe Open System Interconnect model
The Open System Interconnect model Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 1 Layered network design Data networks are usually
More informationMultimedia Networking
Multimedia Networking Victor Gau Information Processing Lab. 2008/03/07 Outline Introduction Network Basics Quality of Service Applications VoIP IPTV Telematics Multimedia Multimedia (Lat. Multum + Medium)
More informationCS Transport. Outline. Window Flow Control. Window Flow Control
CS 54 Outline indow Flow Control (Very brief) Review of TCP TCP throughput modeling TCP variants/enhancements Transport Dr. Chan Mun Choon School of Computing, National University of Singapore Oct 6, 005
More informationCHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS
28 CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS Introduction Measurement-based scheme, that constantly monitors the network, will incorporate the current network state in the
More informationTCP over Wireless. Protocols and Networks Hadassah College Spring 2018 Wireless Dr. Martin Land 1
TCP over Wireless Protocols and Networks Hadassah College Spring 218 Wireless Dr. Martin Land 1 Classic TCP-Reno Ideal operation in-flight segments = cwnd (send cwnd without stopping) Cumulative ACK for
More informationContents. Overview Multicast = Send to a group of hosts. Overview. Overview. Implementation Issues. Motivation: ISPs charge by bandwidth
EECS Contents Motivation Overview Implementation Issues Ethernet Multicast IGMP Routing Approaches Reliability Application Layer Multicast Summary Motivation: ISPs charge by bandwidth Broadcast Center
More informationImproving Reliable Transport and Handoff Performance in Cellular Wireless Networks
Improving Reliable Transport and Handoff Performance in Cellular Wireless Networks H. Balakrishnan, S. Seshan, and R. H. Katz ACM Wireless Networks Vol. 1, No. 4, pp. 469-482 Dec. 1995 P. 1 Introduction
More informationSubject: Adhoc Networks
ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.
More informationQUESTION BANK EVEN SEMESTER
Fatima Michael College of Engineering and Technology DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING QUESTION BANK EVEN SEMESTER SUB CODE & NAME: EC2352 COMPUTER NETWORKS YEAR / SEM: III / VI Staff
More informationYarmouk University Hijjawi Faculty for Engineering Technology Telecommunication Engineering Department
Yarmouk University Hijjawi Faculty for Engineering Technology Telecommunication Engineering Department A DYNAMIC MULTI-CAST ROUTING ALGORITHM FOR OPPORTUNISTIC NETWORKS: IMPLEMENTING THE EXPECTED TRANSMISSION
More informationMulticasting in ad hoc networks: Energy efficient
Multicasting in ad hoc networks: Energy efficient Blerta Bishaj Helsinki University of Technology 1. Introduction...2 2. Sources of power consumption... 3 3. Directional antennas... 3 4. TCP... 3 5. Energy-efficient
More informationOn Network Dimensioning Approach for the Internet
On Dimensioning Approach for the Internet Masayuki Murata ed Environment Division Cybermedia Center, (also, Graduate School of Engineering Science, ) e-mail: murata@ics.es.osaka-u.ac.jp http://www-ana.ics.es.osaka-u.ac.jp/
More informationImplementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM)
CS230: DISTRIBUTED SYSTEMS Project Report on Implementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM) Prof. Nalini Venkatasubramanian Project Champion: Ngoc Do Vimal
More informationPerformance of UMTS Radio Link Control
Performance of UMTS Radio Link Control Qinqing Zhang, Hsuan-Jung Su Bell Laboratories, Lucent Technologies Holmdel, NJ 77 Abstract- The Radio Link Control (RLC) protocol in Universal Mobile Telecommunication
More informationInternet II. CS10 : Beauty and Joy of Computing. cs10.berkeley.edu. !!Senior Lecturer SOE Dan Garcia!!! Garcia UCB!
cs10.berkeley.edu CS10 : Beauty and Joy of Computing Internet II!!Senior Lecturer SOE Dan Garcia!!!www.cs.berkeley.edu/~ddgarcia CS10 L17 Internet II (1)! Why Networks?! Originally sharing I/O devices
More informationScalable Application Layer Multicast
Scalable Application Layer Multicast Suman Banerjee Bobby Bhattacharjee Christopher Kommareddy http://www.cs.umd.edu/projects/nice Group Communication A C A C 1 2 1 2 B D B D Network-layer Multicast Replication
More informationMobile Communications. Ad-hoc and Mesh Networks
Ad-hoc+mesh-net 1 Mobile Communications Ad-hoc and Mesh Networks Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto Ad-hoc+mesh-net 2 What is an ad-hoc network? What are differences between
More informationChapter 1 - Introduction
Chapter 1-lntroduction Chapter 1 - Introduction The aim of this chapter is to provide a background to topics which are relevant to the subject of this thesis. The motivation for writing a thesis regarding
More informationSONY S QOS TECHNOLOGY
SONY S QOS TECHNOLOGY ACHIEVE LOW-DELAY, HIGH-QUALITY STREAMING OVER MOBILE NETWORKS SONY CORPORATION PROFESSIONAL SOLUTION GROUP The use of high-speed mobile networks including LTE (Long Term Evolution)
More informationUniversity of Warwick institutional repository: A Thesis Submitted for the Degree of PhD at the University of Warwick
University of Warwick institutional repository: http://go.warwick.ac.uk/wrap A Thesis Submitted for the Degree of PhD at the University of Warwick http://go.warwick.ac.uk/wrap/72647 This thesis is made
More informationData and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications
Data and Computer Communications Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based s 1 Need For Protocol Architecture data exchange can involve complex procedures better if task broken into subtasks
More informationCooperative Communications
Cooperative Wideband Radio Fabio Belloni fbelloni@wooster.hut.fi Outline Introduction. Historical Background. Cooperative : cellular and ad-hoc networks. relay channel. performance evaluation. Functions
More informationRAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY
RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING QUESTION BANK SUBJECT NAME: COMPUTER NETWORKS SUBJECT CODE: CST52 UNIT-I 2 MARKS 1. What is Network? 2.
More informationTCP over Wireless PROF. MICHAEL TSAI 2016/6/3
TCP over Wireless PROF. MICHAEL TSAI 2016/6/3 2 TCP Congestion Control (TCP Tahoe) Only ACK correctly received packets Congestion Window Size: Maximum number of bytes that can be sent without receiving
More informationTransport Layer. Application / Transport Interface. Transport Layer Services. Transport Layer Connections
Application / Transport Interface Application requests service from transport layer Transport Layer Application Layer Prepare Transport service requirements Data for transport Local endpoint node address
More informationLayered Multicast with Forward Error Correction (FEC) for Internet Video
Layered Multicast with Forward Error Correction (FEC) for Internet Video ZaiChen Zhang and Victor O. K. Li The University of Hong Kong Hong Kong, China Abstract In this paper, we propose RALF, a new FEC-based
More informationPredicting connection quality in peer-to-peer real-time video streaming systems
Predicting connection quality in peer-to-peer real-time video streaming systems Alex Giladi Jeonghun Noh Information Systems Laboratory, Department of Electrical Engineering Stanford University, Stanford,
More informationCache and Forward Architecture
Cache and Forward Architecture Shweta Jain Research Associate Motivation Conversation between computers connected by wires Wired Network Large content retrieval using wireless and mobile devices Wireless
More informationc) With the selective repeat protocol, it is possible for the sender to receive an ACK for a packet that falls outside of its current window.
Part 1 Question 1 [0.5 Marks] Suppose an application generates chunks of 40 bytes of data every 20 msec, and each chunk gets encapsulated by a TCP segment and then an IP datagram. What percentage of each
More informationUNIVERSITY OF OSLO Department of informatics. Investigating the limitations of video stream scheduling in the Internet. Master thesis.
UNIVERSITY OF OSLO Department of informatics Investigating the limitations of video stream scheduling in the Internet Master thesis Espen Jacobsen May, 2009 Investigating the limitations of video stream
More informationVideo-Aware Wireless Networks (VAWN) Final Meeting January 23, 2014
Video-Aware Wireless Networks (VAWN) Final Meeting January 23, 2014 1/26 ! Real-time Video Transmission! Challenges and Opportunities! Lessons Learned for Real-time Video! Mitigating Losses in Scalable
More informationRCRT:Rate-Controlled Reliable Transport Protocol for Wireless Sensor Networks
RCRT:Rate-Controlled Reliable Transport Protocol for Wireless Sensor Networks JEONGYEUP PAEK, RAMESH GOVINDAN University of Southern California 1 Applications that require the transport of high-rate data
More informationAd hoc and Sensor Networks Chapter 13a: Protocols for dependable data transport
Ad hoc and Sensor Networks Chapter 13a: Protocols for dependable data transport Holger Karl Computer Networks Group Universität Paderborn Overview Dependability requirements Delivering single packets Delivering
More informationMaking Friends with Broadcast. Administrivia
Making Friends with Broadcast CMU 15-744 David Andersen Administrivia Midterm Mean 66.5, Median 70, Stddev 13.7 Histo: 35-39 37 38 40-44 45-49 50-54 54 54 54 55-59 56 57 60-64 61 64 64 65-69 69 70-74 71
More informationMesh-Based Content Routing Using XML
Outline Mesh-Based Content Routing Using XML Alex C. Snoeren, Kenneth Conley, and David K. Gifford MIT Laboratory for Computer Science Presented by: Jie Mao CS295-1 Fall 2005 2 Outline Motivation Motivation
More informationProxy-based TCP-friendly streaming over mobile networks
Proxy-based TCP-friendly streaming over mobile networks Frank Hartung Uwe Horn Markus Kampmann Presented by Rob Elkind Proxy-based TCP over mobile nets 1 Outline Introduction TCP Friendly Rate Control
More informationTransport layer issues
Transport layer issues Dmitrij Lagutin, dlagutin@cc.hut.fi T-79.5401 Special Course in Mobility Management: Ad hoc networks, 28.3.2007 Contents Issues in designing a transport layer protocol for ad hoc
More informationProf. Dr. Abdulmotaleb El Saddik. site.uottawa.ca mcrlab.uottawa.ca. Quality of Media vs. Quality of Service
Multimedia Communications Multimedia Technologies & Applications Prof. Dr. Abdulmotaleb El Saddik Multimedia Communications Research Laboratory School of Information Technology and Engineering University
More informationA SDN-like Loss Recovery Solution in Application Layer Multicast Wenqing Lei 1, Cheng Ma 1, Xinchang Zhang 2, a, Lu Wang 2
5th International Conference on Information Engineering for Mechanics and Materials (ICIMM 2015) A SDN-like Loss Recovery Solution in Application Layer Multicast Wenqing Lei 1, Cheng Ma 1, Xinchang Zhang
More informationEquation-based Congestion Control
Equation-based Congestion Control for Unicast and Multicast Applications Jörg Widmer Praktische Informatik IV, University of Mannheim / AT&T Center for Internet Research at ICSI (ACIRI) Feb 05, 2001 Why
More informationHousekeeping. Fall /5 CptS/EE 555 1
Housekeeping Lab access HW turn-in Jin? Class preparation for next time: look at the section on CRCs 2.4.3. Be prepared to explain how/why the shift register implements the CRC Skip Token Rings section
More informationThe Effects of Asymmetry on TCP Performance
The Effects of Asymmetry on TCP Performance Hari Balakrishnan Venkata N. Padmanabhan Randy H. Katz University of California at Berkeley Daedalus/BARWAN Retreat June 1997 Outline Overview Bandwidth asymmetry
More informationIEEE TRANSACTIONS ON MULTIMEDIA, VOL. 6, NO. 1, FEBRUARY
IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 6, NO. 1, FEBRUARY 24 87 An End-to-End Adaptation Protocol for Layered Video Multicast Using Optimal Rate Allocation Jiangchuan Liu, Member, IEEE, BoLi, Senior Member,
More informationPerformance Estimation on Opportunistic Routing Protocol based on Reliability Analysis
Performance Estimation on Opportunistic Routing Protocol based on Reliability Analysis Prof. SmitaShukla Patel 1, Dr. M.Mohanpriya 2 1 Computer Science Department,Karpagam University,India 2 Computer Science
More informationHybrid Control and Switched Systems. Lecture #17 Hybrid Systems Modeling of Communication Networks
Hybrid Control and Switched Systems Lecture #17 Hybrid Systems Modeling of Communication Networks João P. Hespanha University of California at Santa Barbara Motivation Why model network traffic? to validate
More informationIslamic University of Gaza Faculty of Engineering Department of Computer Engineering ECOM 4021: Networks Discussion. Chapter 1.
Islamic University of Gaza Faculty of Engineering Department of Computer Engineering ECOM 4021: Networks Discussion Chapter 1 Foundation Eng. Haneen El-Masry February, 2014 A Computer Network A computer
More informationMobile Communications Chapter 9: Mobile Transport Layer
Prof. Dr.-Ing Jochen H. Schiller Inst. of Computer Science Freie Universität Berlin Germany Mobile Communications Chapter 9: Mobile Transport Layer Motivation, TCP-mechanisms Classical approaches (Indirect
More informationGraph Theoretic Models for Ad hoc Wireless Networks
Graph Theoretic Models for Ad hoc Wireless Networks Prof. Srikrishnan Divakaran DA-IICT 10/4/2009 DA-IICT 1 Talk Outline Overview of Ad hoc Networks Design Issues in Modeling Ad hoc Networks Graph Theoretic
More information