A Dynamic Rate Control Scheme for Video Streaming on Inter-Building Wireless Networks

Size: px
Start display at page:

Download "A Dynamic Rate Control Scheme for Video Streaming on Inter-Building Wireless Networks"

Transcription

1 A Dynamic Rate Control Scheme for Video Streaming on Inter-Building Wireless Networks Takeyuki SUGIMOTO Yuichi TAKAHASHI Saneyasu YAMAGUCHI and Koichi ASATANI Graduate School of Electric & Electronic Engineering. Kogakuin University Dept. of Comp Science & Comm., Kogakuin University Nishishinjuku, Shinjukuku, Tokyo, Japan {cm623, {sane, Abstract 2.4 GHz radio band is commonly used by many systems and appliances such as IEEE82.11b, Bluetooth, RFID, and even microwave ovens. Radio interference among these is often observed. Therefore, in 2.4 GHz inter-building wireless networks, available throughput temporally changes, which could yield serious packet error and/or packet loss. In this paper, we propose a new dynamic source rate control scheme by using ICMP (Internet Control Message Protocol) echo success rate, RTT (Round Trip Time) and scalable-coded-video source to reduce packet error and packet loss for video streaming applications. We apply the scheme to the inter-building wireless system installed between Kogakuin University and Waseda University in Tokyo. It is shown that the proposed scheme significantly reduces PER and increases effective throughput. IEEE82.11b inter-building wireless network system, which we built between Kogakuin University and Waseda University [3]. The results show that the proposed scheme decreases packet loss rate and increases effective throughput. This paper is organized as follows. Section 2 describes the inter-building wireless system which we installed. Section 3 explains a scalable video coding scheme with independent layers, which is deployed by the multi-layer transcoder. Section 4 shows an available throughput of the inter-building wireless system and its issues. Section 5 describes a new proposed dynamic source bit control scheme using ICMP echo success rate and RTTs. It also presents experimental evaluation results. Section 6 summarizes the results and describes a future issue. Index terms Video Streaming,Inter-Building Wireless Systems, Rate Control,Wireless Networks in Urban Environments I. INTRODUCTION The 2.4 GHz radio band is called ISM (Industrial Scientific and Medical) band, and used for household electrical appliances, medical equipment, Bluetooth, VICS (Vehicle Information and Communication System), and RFID (Radio Frequency Identification), as well as wireless LAN. Radio waves from these equipments may cause packet losses, delays and jitters in the wireless LAN [1] [2].Especially in inter-building wireless networks in urban environments, packet losses, jitters and delays are often caused by the interference. Packet losses deteriorate qualities of received real-time streaming videos signals. In addition, large delays and jitters may stop playing the video streams [3]. Therefore, it is important to control source video bit rate according to the communication channel condition. In this paper, we propose a new dynamic video source rate control scheme. The purpose is to achieve the high quality video streaming by adjusting video source bit rate according to the communication channel condition of wireless LANs under urban environments. The proposed method uses ICMP echo success rate and RTTs, as control indices, and the scalable transcoder [4] in order to maximize qualities of real-time streaming videos. We evaluated the proposed scheme on the II. THE INTER-BUILDING WIRELESS NETWORK SYSTEM The inter-building wireless system is installed between Shinjuku building of Kogakuin University and No. 55 building in Okubo campus of Waseda University in Tokyo. The system deploys IEEE82.11b. The wireless system configuration is shown in Figure1. The distance is approximately 2. km. There are railways, stations, office buildings, shopping malls, and hospitals between them. It is observed that radio interference from ISM equipments in these buildings cause packet losses and fluctuations of available throughput [3]. III. SCALABLE CODING SCHEME WITH INDEPENDENT LAYERS A video stream is divided into five layers by the scalable coding scheme with independent layers [4]. Each layer is independent. With multiple layer coding schemes using non-independent layers, the upper layers depended on the lower layers. Therefore, if a lower layer is lost, the upper layers cannot de decoded. However, in the scalable coding scheme with independent layers, each layer can be decoded independently. This encoding scheme is realized by an extended DCT (Discrete Cosine Transform) index transcoder method [4]. Therefore, it is possible to decode all received layers, even if any layer is lost. The quality of the decoded video streaming improves as number of received layers increases [5] /8/$ IEEE

2 Table 1 Minimum, Maximum and Average Bit Rates Number of Source Layer Min.rate Max.rate rate Figure.1 The Inter-building Wireless System Configuration 6 Available throughput[kbps] Figure 2 Temporal Fluctuation of the Available Throughput Table 2 Average Sent and Received Bit Rates and Packet Loss Rate for Fixed Source Layer Send bit rate [%] Fixed source layer number = Fixed source layer number = Fixed source layer number = IV. AN EXPERIMENT WITH FIXED SOURCE RATE SCHEME IN THE INTER-BUILDING WIRELESS SYSTEM IV-1 Fluctuations of Available Throughput The available throughput was measured of the inter-building wireless system. The temporal fluctuation of the available throughput changes between 2. Mbps and 5. Mbps, as shown in Figure 2. IV-2 Experimental Evaluation of Fixed Number of Source Layers Scheme We measured the received throughput with the fixed source layers scheme using the multi-layer transcoder on the inter-building wireless system. The experimental block diagram is shown in Figure 3. The sender has video data and sends them to the controller. The video data are encoded into five layers. The controller determined the number of source layers to be sent. The selected layers are transmitted from Kogakuin University to Waseda University on the wireless link. Minimum, maximum and average bit rates at sending one layer to five layers are summarized in Table 1. Transition of sent and received bit rates and packet loss rate with the fixed source layers scheme are shown in Figures 4, 5 and 6. Fixed number of source layers is 1, 2 and 3 in each figure. Average sent and received bit rates and packet loss rate with the fixed source bit rate scheme is summarized in Table 2. The experimental results show that packet loss rate is low for the fixed number of source layers of 1. On the other hand, they show that the bit rate of the source stream sometimes exceeds the available throughput for number of the source layers of 2 and 3. is accordingly high. Bit rate[kbps] Figure 3 Experimental Block Diagram Figure 4 Sent and Received Bit Rates and Packet Loss Rate (Fixed Number of Source Layer=1) IV-3 Issue of the Fixed Number of Source Layers The available throughput of the wireless system fluctuates between Mbps. The experimental results show that the available throughput fluctuation causes packet losses, when the number of source layers is large. The available throughput is not used effectively for 1 layer source. Consequently, transmitting video source with fixed number of layers causes deterioration of quality of the streaming video, or does not use available throughput effectively. Therefore, source bit rate adjustment to the available throughput is useful. [%]

3 Bit rate[kbps] Time[m] Figure 5 Sent and Received Bit Rates and Packet Loss Rate (Fixed Number of Source Layer=2) Figure 6 Sent and Received Bit Rates and Packet Loss Rate (Fixed Number of Source Layer=3) V. A PROPOSAL OF A NEW DYNAMIC SOURCE BIT RATE CONTROL SCHEME USING ICMP ECHO SUCCESS RATE AND RTT V-1 Relationships among ICMP Echo Success Rate, RTTs and Available Throughput In the proposed dynamic source bit rate control scheme, ICMP echo success rate and RTTs are used as indexes. The ICMP echo success rate and RTTs are measured for a fixed bit rate source stream transmission on the wireless system. The experimental result is shown in Figure 7. The received bit rate is equal to the available bit rate. The result shows that ICMP echo success rate decreases as received bit rate decreases, and the RTTs are large when the received bit rate is low. Therefore, in the proposed scheme, ICMP echo success rate and RTTs are used as indices in order to extrapolate the available throughput. Detailed discussion is described the Section V.4. V-2 A New Source Rate Control Scheme A new source bit rate control scheme uses ICMP echo success rate and RTTs as feedback information in order to estimate available throughput. Block diagram of the proposed dynamic rate control scheme is shown in Figure 8. The proposed control scheme behaves as follows. Firstly, the transcoder in the sending part encodes a video stream into five layers, and input all layers to the receiving thread of the controller [%] [%] Bit rate[kbps] RTTaverage[msec] RTTaverage ICMP echo success rate Figure 7 Relationships among RTT, Received Bit Rate and ICMP Success Rate Figure 8 Block Diagram of the Proposed Source Rate Control System for Video Streaming over the Wireless System Secondly, the controller determines the number of layers to be sent, from one to five, according to the throughput information obtained from the link monitor. Finally, the transmitting thread in the controller sends the selected layers to the wireless link, and the receiver receives these layers and decodes them into one video stream. The link monitor extrapolates the available throughput with use of ICMP echo packets and reply packets. ICMP packets are issued by a ping tool. If the source bit rate exceeds the available throughput, the echo and reply packets are delayed or lost. If the available throughput is higher than the source bit rate, delays and packet loss rate are low. Thus, the controller finds the suitable source bit rate by observing ICMP echo success rate and RTTs. V-3 Determination of Source Layer Numbers The number of source layers is determined as follows. PingSR (ping success rate) and RTTavr (RTT average) are periodically calculated by the following equations. PingSR = ( Pings / Pingtotal ) RTTavr = RTTtotal / Pings ICMP echo success rate[%] (4-1) (4-2)

4 where Pings is ICMP echo/reply success times, Pingtotal is defined as the total number of transmitted ICMP echo packets in the calculation interval. The condition for decrease in number of source layers is given by PingSR Pingthd (4-3) or RTT > RTTthd. (4-4) The condition for increase in number of source layers is given by PingSR Pingthu (4-5) and RTTavr < RTTthu. (4-6) The RTTthd is a threshold for decrease in the number of source layers. The RTTthu is a threshold for increase in the number of source layers. If PingSR is smaller than Pingthd or RTT is larger than RTTthd, the number of source layers is decreased. If PingSR is larger than Pingthu, and RTTavr is smaller than RTTthu, the number of source layers is increased. This scheme reduces the number of source layers without waiting for the calculation interval by comparing last RTT and RTTthd individually. Increase in the number of source layers is achieved according to RTTavr and Pingthu, which are calculated periodically. The interval length is discussed in Section V.4. V-4 Determination of Thresholds We investigated the relationship between RTTs and received bit rate in order to determine the suitable thresholds on the inter-building environment. The received bit rate and RTTs are measured for 1. Mbps, 2. Mbps, 3. Mbps, 3.7 Mbps, 4. Mbps and 5. Mbps streams. The results are shown in Figures 9 and 1. For 1. Mbps stream, received bit rate is approximately 1. Mbps and RTTs are less than 1ms. For 5. Mbps stream, received bit rates ranges from 4. Mbps to 5. Mbps, and RTTs are mostly larger than 1ms. We determined the threshold for increase based on these experiments. Source bit rate incremental increase of a layer is approximately 1.3Mbps (see Table 1). The number of source layers should be increased only if the available throughput is higher than the source bit rate by 1.3 Mbps. Since, the available throughput cannot be measured directly, thus the available throughput is estimated by Measuring RTTs. These experiments show that the available throughput is approximately 4.8 Mbps. Thus, the boundary of increase or keeping of the number of source layers is 3.5 Mbps. Correlation between the available throughput and each RTT is not strong enough. Hence, we investigated the relationship between average RTT and received bit rate. The relationship is shown in Figure 1. The horizontal axis is average RTT, and the vertical axis is integral of probability density function of RTT. The threshold should be determined to detect whether the source bit rate is larger than 3.5 Mbps. Consequently, we determined RTTthu of 25 ms. Figure 9 Relationships between RTT and Received Bit Rate for Fixed Bit Rate Streams Integrals of probability density function of RTT Mbps 2.Mbps.4 3.Mbps 3.7Mbps.2 4.Mbps 5.Mbps RTT average[msec] Figure1 Relationship between Average RTT and Received Bit Rate (Calculation Interval=5 sec) The 99.3 % of RTTs are larger than 16 ms when the transmitted bit rate is 5. Mbps as shown in Figure 9. In this case, the source bit rate is higher than the available bit rate (4.8 Mbps), thus the number of source layers is decreased. On the other hand, 99.9% of RTTs are less than 14 ms when source bit rate is lower than 4.5 Mbps. Therefore, we chose RTTthd of 15ms to detect that the source bit rate is higher than the available bit rate The calculating interval of 5 sec is chosen based on the following investigation. For the calculating intervals of 1 sec, 3 sec, 5 sec, 1 sec, and 15 sec, the probabilities of correct detection are.841,.89,.91,.915, and.913, respectively. The longer interval gives the higher probability of correct detection. The probabilities for 5 sec, 1 sec, and 15 sec intervals are similar. Therefore, the interval of 5 seconds is chosen for source layer number change. V-5 Evaluation of the Proposed Scheme on a Network Emulator The performance evaluation of the proposed scheme is made by using an emulated network. The network emulation uses Dummynet [6], which can emulate available throughput. We emulated throughputs conditions of the inter-building wireless system. The experimental parameters are shown in Table 3. The experimental block diagram is shown in Figure 11.

5 6 Figure 11 An Experimental Configuration for Performance Evaluation Using Network Emulator Table3 Experimental Parameters Pingthu 1% RTTthu 25[msec] RTTthd 15[msec] Echo packet frequency 5[times/s] PingSR,RTTavr caluculation interval 5[sec] At the network emulator, the available throughput is changed every 1 ms to emulate the wireless system. The available throughput behavior of the network emulator is shown in Figure 12. Average sent and received bit rates and packet loss rate with the proposed scheme and fixed number of source layers (1, 2, and 3 layers) scheme are summarized in Table 4. The measurement results are shown in Figures 13 and 14, which include sent and received bit rates and packet loss rate with the proposed scheme and fixed number of source layers scheme of 2 layers. The available throughput is not used effectively with the fixed source layer scheme of 1 layer. is high with fixed source layer scheme of 2 layers, because this scheme does not follow temporal fluctuation of the available throughput. In the proposed scheme, the average packet loss rate is as low as the fixed source bit rate scheme of 1 layer, and 7% lower than that of the fixed source bit rate scheme of 2 layers. The throughput of the proposed scheme is higher than that of the fixed source bit rate scheme of 1 layer. These results show that the proposed scheme controls source bit rate, and suppress packet loss rate by accommodating the available throughput fluctuation. V-6 Evaluation of the Proposed Scheme on the Inter-Building Wireless Network The performance evaluation configuration for the inter-building wireless system is shown in Figure 3. The experimental parameters are shown in Table 3. Average sent and received bit rates and packet loss rate with the proposed scheme and fixed number of source layers (1, 2 and 3 layers) scheme is summarized in Table 5. The sent and received bit rates and packet loss rate with the proposed scheme are shown in Figure 15. They show that the proposed scheme controls source bit rate accommodating the fluctuation of the available throughput. The average packet loss rate of the proposed scheme is as low as the fixed source bit rate scheme of 1 layer, and is 7% lower than that of the fixed source bit rate scheme of 2 layers. Additionally, the throughput of the proposed scheme is almost same as that of the fixed source bit rate scheme of 2 layers. The results show that the proposed scheme makes source bit rate adapted to the fluctuation of the available throughput in the inter-building wireless system. Available throughput[kbps] Time[s] Figure 12 Temporal Fluctuation of the Available Throughput on the Network Emulator Table 4 Average Sent and Received Bit Rates and Packet Loss Rate Send bit rate [%] Proposed scheme Fixed source layer number = Fixed source layer number = Fixed source layer number = Available throughput Time[s] Figure 13 Sent and Received Bit Rates and Packet Loss Rate (Proposed Scheme) Available throughput Time[s] Figure 14 Sent and Received Bit Rates and Packet Loss Rate (Fixed Number of Source Layer=2) [%] [%]

6 Table 5 Average Sent and Received Bit Rates and Packet Loss Rate Send bit rate [%] Proposed scheme Fixed source layer number = Fixed source layer number = Fixed source layer number = Consideration on parameters of Dynamic Rate Control for Streaming Signal over 2.4GHz Band Wireless Systems,IPSJ SIG Notes,AVM-44,pp.25-3,Mar.24. [6] Figure 15 Sent and Received Bit Rates and Packet Loss Rate (Proposed Scheme) [%] VI. CONCLUSION Authors installed an inter-building communication system using 82.11b wireless network in an urban environment, and found that the available throughput fluctuates temporally. A new dynamic source bit rate control scheme is proposed, which controls video source bit rate based on the estimated available bit rate with use of the measured RTT. The proposed scheme applied to video streaming over the inter-building wireless system achieves low packet loss rate and higher throughput as compared with the fixed source rate scheme. The subjective quality evaluation for the received video stream is to be studied. REFERENCES [1]. Axel Sikora, Voicu F. Groza, Coexistence of IEEE with other Systems in the 2.4 GHz-ISM-Band,pp IMTC 25,May 25. [2]. Shinichi Miyamoto, Satoru Harada,Norihiko Morinaga Performance of 2.4GHz-band Wireless LAN System using Orthogonal Frequency Division Multiplexing Scheme under Microwave Oven Noise Environment, pp , IEEE International Symposium on Electromagnetic Compatibility, May 25 [3]. J.Nagata,A.Osawa,Y.Mukai,N.Nakatani,T.Wakahara, M.Matsumoto,K.Asatani, A Dynamic Rate Control of MPEG-4 Streaming for 2.4GHz Band Wireless Systems under Urban Environments,Technical Report of IEICE,CQ23-117, pp17-pp22,feb.24. [4]. Nagayoshi,T.Hanamura,H.Kasai,H.Tominaga, Scalable video transmission by separating and merging of MPEG-2 Bit stream,multimedia and Expo, pp 16-19, ICME Aug. 21 [5]. M.Wakui,I.Nagayoshi,T.Hanamura,H.Tominaga,

Evaluation of DSSS WLAN Beacon Caused by Interference with BLE Advertising Packet Considering the Difference in Frequency

Evaluation of DSSS WLAN Beacon Caused by Interference with BLE Advertising Packet Considering the Difference in Frequency Journal of Signal Processing, Vol.21, No.6, pp.249-256, November 2017 PAPER Evaluation of DSSS WLAN Beacon Caused by Interference with BLE Advertising Packet Considering the Difference in Frequency Junya

More information

PROPOSAL OF MULTI-HOP WIRELESS LAN SYSTEM FOR QOS GUARANTEED TRANSMISSION

PROPOSAL OF MULTI-HOP WIRELESS LAN SYSTEM FOR QOS GUARANTEED TRANSMISSION PROPOSAL OF MULTI-HOP WIRELESS LAN SYSTEM FOR QOS GUARANTEED TRANSMISSION Phuc Khanh KIEU, Shinichi MIYAMOTO Graduate School of Engineering, Osaka University 2-1 Yamada-oka, Suita, Osaka, 565-871 JAPAN

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

Interference Mitigation Technique for Performance Enhancement in Coexisting Bluetooth and WLAN

Interference Mitigation Technique for Performance Enhancement in Coexisting Bluetooth and WLAN 2012 International Conference on Information and Computer Networks (ICICN 2012) IPCSIT vol. 27 (2012) (2012) IACSIT Press, Singapore Interference Mitigation Technique for Performance Enhancement in Coexisting

More information

Outline. Performance Evaluation of Traffic in a Interfering Wireless LANs Environment for Bluetooth and IEEE

Outline. Performance Evaluation of Traffic in a Interfering Wireless LANs Environment for Bluetooth and IEEE Performance Evaluation of Traffic in a Interfering Wireless LANs Environment for Bluetooth and IEEE 82.11 Wuyi YUE, Koichi HATOGAI, Koji MIYAZAKI and Shinya OOKA Department of Information Science and Systems

More information

Strengthening Unlicensed Band Wireless Backhaul

Strengthening Unlicensed Band Wireless Backhaul be in charge Strengthening Unlicensed Band Wireless Backhaul Use TDD/TDMA Based Channel Access Mechanism WHITE PAPER Strengthening Unlicensed Band Wireless Backhaul: Use TDD/TDMA Based Channel Access Mechanism

More information

SONY S QOS TECHNOLOGY

SONY S QOS TECHNOLOGY SONY S QOS TECHNOLOGY ACHIEVE LOW-DELAY, HIGH-QUALITY STREAMING OVER MOBILE NETWORKS SONY CORPORATION PROFESSIONAL SOLUTION GROUP The use of high-speed mobile networks including LTE (Long Term Evolution)

More information

A video streaming technique, in which video content is played back while the video data is being downloaded from an origin server, is useful for the

A video streaming technique, in which video content is played back while the video data is being downloaded from an origin server, is useful for the Video Transcoding Introduction At present, mobile phones can also process video data and mobile users can enjoy video content on mobile phones. In current services for video content distribution to mobile

More information

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5

More information

Learning Objectives. Introduction. Advantages of WLAN. Information Technology. Mobile Computing. Module: Wireless Local Area Network: IEEE 802.

Learning Objectives. Introduction. Advantages of WLAN. Information Technology. Mobile Computing. Module: Wireless Local Area Network: IEEE 802. Information Technology Mobile Computing Module: Wireless Local Area Network: IEEE 802.11 Learning Objectives Introduction to Wireless Local Area Network Advantages of WLAN Types of WLAN IEEE 802.11 standards

More information

Storage access optimization with virtual machine migration during execution of parallel data processing on a virtual machine PC cluster

Storage access optimization with virtual machine migration during execution of parallel data processing on a virtual machine PC cluster Storage access optimization with virtual machine migration during execution of parallel data processing on a virtual machine PC cluster Shiori Toyoshima Ochanomizu University 2 1 1, Otsuka, Bunkyo-ku Tokyo

More information

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115 CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications Dr Shahedur Rahman s.rahman@mdx.ac.uk Room: T115 1 Recap of Last Session Described the physical layer Analogue and Digital signal

More information

Progress Report of NTT DOCOMO LTE Trials January 26, 2009 Takehiro Nakamura NTT DOCOMO

Progress Report of NTT DOCOMO LTE Trials January 26, 2009 Takehiro Nakamura NTT DOCOMO ATIS-3GPP LTE Conference January 26, 2009 Progress Report of NTT DOCOMO LTE Trials January 26, 2009 NTT DOCOMO LTE History and Status in 3GPP 2004 2005 2006 2007 2008 4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3

More information

Public Wireless LAN Service.

Public Wireless LAN Service. Public Wireless LAN Service touch@coe.psu.ac.th Radio Wave Wave Frequency Amplitude Wave Length Radio Wave Band Frequency Wavelength VLF 3-30 khz > 10 km LF 30-300 khz 1-10 km MF 300-3,000 khz 100-1000

More information

Video Streaming in Wireless Environments

Video Streaming in Wireless Environments Video Streaming in Wireless Environments Manoj Kumar C Advisor Prof. Sridhar Iyer Kanwal Rekhi School of Information Technology Indian Institute of Technology, Bombay Mumbai 1 Motivation Refers to real-time

More information

IEEE Romel Rudyard J. Lucentales, ECE 5

IEEE Romel Rudyard J. Lucentales, ECE 5 IEEE 802.11 Romel Rudyard J. Lucentales, ECE 5 IEEE 802.11 a set of standards for wireless local area network (WLAN) computer communication developed by the IEEE LAN/MAN Standards Committee (IEEE 802)

More information

Network Management & Monitoring

Network Management & Monitoring Network Management & Monitoring Network Delay These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) End-to-end

More information

Computer Networks. Wireless and Mobile Networks. László Böszörményi Computer Networks Mobile - 1

Computer Networks. Wireless and Mobile Networks. László Böszörményi Computer Networks Mobile - 1 Computer Networks Wireless and Mobile Networks László Böszörményi Computer Networks Mobile - 1 Background Number of wireless (mobile) phone subscribers now exceeds number of wired phone subscribers! Computer

More information

ENSC 427: COMMUNICATION NETWORKS

ENSC 427: COMMUNICATION NETWORKS ENSC 427: COMMUNICATION NETWORKS Simulation of ZigBee Wireless Sensor Networks Final Report Spring 2012 Mehran Ferdowsi Mfa6@sfu.ca Table of Contents 1. Introduction...2 2. Project Scope...2 3. ZigBee

More information

Wireless LAN. Access Point. Provides network connectivity over wireless media

Wireless LAN. Access Point. Provides network connectivity over wireless media LAN Technologies 802.11 Wireless LAN Network connectivity to the legacy wired LAN Access Point Desktop with PCI 802.11 LAN card Laptop with PCMCIA 802.11 LAN card Provides network connectivity over wireless

More information

CCNA 1 Capítulo 8 OSI Physical Layer. 2004, Cisco Systems, Inc. All rights reserved.

CCNA 1 Capítulo 8 OSI Physical Layer. 2004, Cisco Systems, Inc. All rights reserved. CCNA 1 Capítulo 8 OSI Physical Layer 1 Physical Layer Protocols & Services There are three basic forms of network media on which data is represented: Copper cable Fiber Wireless 2 Physical Layer Protocols

More information

Wireless Networks. Authors: Marius Popovici Daniel Crişan Zagham Abbas. Technical University of Cluj-Napoca Group Cluj-Napoca, 24 Nov.

Wireless Networks. Authors: Marius Popovici Daniel Crişan Zagham Abbas. Technical University of Cluj-Napoca Group Cluj-Napoca, 24 Nov. Wireless Networks Authors: Marius Popovici Daniel Crişan Zagham Abbas Technical University of Cluj-Napoca Group 3250 Cluj-Napoca, 24 Nov. 2003 Presentation Outline Wireless Technology overview The IEEE

More information

Two-Tier WBAN/WLAN Healthcare Networks; Priority Considerations

Two-Tier WBAN/WLAN Healthcare Networks; Priority Considerations Two-Tier WBAN/WLAN Healthcare Networks; Priority Considerations Saeed Rashwand Department of Computer Science University of Manitoba Jelena Mišić Department of Computer Science Ryerson University Abstract

More information

The Efficient Point to Point or Multipoint Live Video Streaming in Wireless Devices Mahesh 1 R Rajkumar 2 Dr M V Sudhamani 3

The Efficient Point to Point or Multipoint Live Video Streaming in Wireless Devices Mahesh 1 R Rajkumar 2 Dr M V Sudhamani 3 IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 04, 2015 ISSN (online): 2321-0613 The Efficient Point to Point or Multipoint Live Video Streaming in Wireless Devices Mahesh

More information

Impact of IEEE n Operation on IEEE Operation

Impact of IEEE n Operation on IEEE Operation 2009 International Conference on Advanced Information Networking and Applications Workshops Impact of IEEE 802.11n Operation on IEEE 802.15.4 Operation B Polepalli, W Xie, D Thangaraja, M Goyal, H Hosseini

More information

Chapter 10: Wireless LAN & VLANs

Chapter 10: Wireless LAN & VLANs Chapter 10: Wireless LAN & VLANs Abdullah Konak School of Information Sciences and Technology Penn State Berks Wireless Transmission for LAN Radio Frequency Transmission (RF) Infrared Transmission 2 1

More information

Dual-Band VoIP With Walls. Dual-Band VoIP With Walls

Dual-Band VoIP With Walls. Dual-Band VoIP With Walls Dual-Band VoIP With Walls Dual-Band VoIP With Walls 1 1. 5th Map Survey routes and Access Points for 5th Map 2 1.1. Requirements - Coverage and Performance Requirement criteria for Voice: Cisco 802.11n

More information

ENSC 427: Communication Networks Spring Final Project HTTP 1.1 Over WiMAX Daphne Mui

ENSC 427: Communication Networks Spring Final Project HTTP 1.1 Over WiMAX   Daphne Mui ENSC 427: Communication Networks Spring 2011 Final Project HTTP 1.1 Over WiMAX www.sfu.ca/~dlm3 Daphne Mui 301021622 dlm3@sfu.ca Team 7 Abstract WiMAX is IEEE Standard 802.16 [1]; a wireless technology

More information

Transporting Voice by Using IP

Transporting Voice by Using IP Transporting Voice by Using IP Voice over UDP, not TCP Speech Small packets, 10 40 ms Occasional packet loss is not a catastrophe Delay-sensitive TCP: connection set-up, ack, retransmit delays 5 % packet

More information

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices

More information

CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007

CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007 CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007 Question 344 Points 444 Points Score 1 10 10 2 10 10 3 20 20 4 20 10 5 20 20 6 20 10 7-20 Total: 100 100 Instructions: 1. Question

More information

Wireless Local Area Networks. Networks: Wireless LANs 1

Wireless Local Area Networks. Networks: Wireless LANs 1 Wireless Local Area Networks Networks: Wireless LANs 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices (PDAs and cell phones) created an obvious application

More information

Announcements. TAs office hours: Mohamed Grissa: Mohamed Alkalbani:

Announcements. TAs office hours: Mohamed Grissa: Mohamed Alkalbani: Announcements TAs office hours: Mohamed Grissa: grissam@oregonstate.edu Tuesday: 4-5 Friday: 11-12 Mohamed Alkalbani: alkalbmo@oregonstate.edu Wednesday: 11-12 Thursday: 11-12 Lecture slides: Will be posted

More information

StripComm. Interference-resilient Cross-technology Communication in Coexisting Environments. Tsinghua University. Xiaolong Zheng, Yuan He, Xiuzhen Guo

StripComm. Interference-resilient Cross-technology Communication in Coexisting Environments. Tsinghua University. Xiaolong Zheng, Yuan He, Xiuzhen Guo StripComm Interference-resilient Cross-technology Communication in Coexisting Environments Xiaolong Zheng, Yuan He, Xiuzhen Guo Tsinghua University Wireless Coexistence Heterogeneous devices coexist Contention

More information

End-to-End Mechanisms for QoS Support in Wireless Networks

End-to-End Mechanisms for QoS Support in Wireless Networks End-to-End Mechanisms for QoS Support in Wireless Networks R VS Torsten Braun joint work with Matthias Scheidegger, Marco Studer, Ruy de Oliveira Computer Networks and Distributed Systems Institute of

More information

Congestion Control For Coded TCP. Doug Leith

Congestion Control For Coded TCP. Doug Leith Congestion Control For Coded TCP Doug Leith Outline Why do error-correction coding at the transport layer? Congestion control on lossy paths Implementation & performance measurements Why error-correction

More information

TFRC and RTT Thresholds Interdependence in a Selective Retransmission Scheme

TFRC and RTT Thresholds Interdependence in a Selective Retransmission Scheme TFRC and RTT s Interdependence in a Selective Retransmission Scheme Árpád Huszák, Sándor Imre Budapest University of Technology and Economics, Department of Telecommunications Budapest, Hungary Email:

More information

CHAPTER 6 SOLUTION TO NETWORK TRAFFIC PROBLEM IN MIGRATING PARALLEL CRAWLERS USING FUZZY LOGIC

CHAPTER 6 SOLUTION TO NETWORK TRAFFIC PROBLEM IN MIGRATING PARALLEL CRAWLERS USING FUZZY LOGIC CHAPTER 6 SOLUTION TO NETWORK TRAFFIC PROBLEM IN MIGRATING PARALLEL CRAWLERS USING FUZZY LOGIC 6.1 Introduction The properties of the Internet that make web crawling challenging are its large amount of

More information

CS/ECE 438: Communication Networks for Computers Spring 2018 Midterm Examination Online

CS/ECE 438: Communication Networks for Computers Spring 2018 Midterm Examination Online 1 CS/ECE 438: Communication Networks for Computers Spring 2018 Midterm Examination Online Solutions 1. General Networking a. In traditional client-server communication using TCP, a new socket is created.

More information

A Dynamic Channel Allocation Mechanism for IEEE Networks

A Dynamic Channel Allocation Mechanism for IEEE Networks A Dynamic Channel Allocation Mechanism for IEEE 802.11 Networks Marcel William Rocha da Silva, José Ferreira de Rezende Abstract The great popularity of IEEE 802.11 along with channel scarcity may lead

More information

JPEG 2000 vs. JPEG in MPEG Encoding

JPEG 2000 vs. JPEG in MPEG Encoding JPEG 2000 vs. JPEG in MPEG Encoding V.G. Ruiz, M.F. López, I. García and E.M.T. Hendrix Dept. Computer Architecture and Electronics University of Almería. 04120 Almería. Spain. E-mail: vruiz@ual.es, mflopez@ace.ual.es,

More information

Proxy-based TCP-friendly streaming over mobile networks

Proxy-based TCP-friendly streaming over mobile networks Proxy-based TCP-friendly streaming over mobile networks Frank Hartung Uwe Horn Markus Kampmann Presented by Rob Elkind Proxy-based TCP over mobile nets 1 Outline Introduction TCP Friendly Rate Control

More information

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer 1 Wireless Local Area Networks (WLANs) The proliferation of laptop computers and other mobile devices (PDAs and cell phones)

More information

MPEG4 VIDEO OVER PACKET SWITCHED CONNECTION OF THE WCDMA AIR INTERFACE

MPEG4 VIDEO OVER PACKET SWITCHED CONNECTION OF THE WCDMA AIR INTERFACE MPEG4 VIDEO OVER PACKET SWITCHED CONNECTION OF THE WCDMA AIR INTERFACE Jamil Y. Khan 1, Pratik Das 2 School of Electrical Engineering and Computer Science, University of Newcastle, Callaghan, NSW 238,

More information

A cluster based interference mitigation scheme for performance enhancement in IEEE

A cluster based interference mitigation scheme for performance enhancement in IEEE 756 Journal of Scientific & Industrial Research J SCI IND RES VOL 7 SEPTEMBER 2 Vol. 7, September 2, pp. 756-76 A cluster based interference mitigation scheme for performance enhancement in IEEE 82.5.4

More information

FIELD EXPERIMENT TO IDENTIFY POTENTIALS OF APPLYING BLUETOOTH TECHNOLOGY TO COLLECT PASSENGER VEHICLE CROSSING TIMES AT T H E U. S.

FIELD EXPERIMENT TO IDENTIFY POTENTIALS OF APPLYING BLUETOOTH TECHNOLOGY TO COLLECT PASSENGER VEHICLE CROSSING TIMES AT T H E U. S. FIELD EXPERIMENT TO IDENTIFY POTENTIALS OF APPLYING BLUETOOTH TECHNOLOGY TO COLLECT PASSENGER VEHICLE CROSSING TIMES AT T H E U. S. -MEXICO BORDER by Rajat Rajbhandari Texas Transportation Institute Project

More information

Wireless Terms. Uses a Chipping Sequence to Provide Reliable Higher Speed Data Communications Than FHSS

Wireless Terms. Uses a Chipping Sequence to Provide Reliable Higher Speed Data Communications Than FHSS How to Set Up a Secure Home Wireless Network What you don t know about setting up a home wireless network can hurt you. 2008 APCUG Convention Session Tom Jones, P.E., RCDD-NTS CQS-CWLSS AGENDA Some Terms

More information

A transport-layer approach for achieving predictable throughput for Internet applications

A transport-layer approach for achieving predictable throughput for Internet applications Seventh International Conference on Networking A transport-layer approach for achieving predictable throughput for Internet applications Go Hasegawa, Kana Yamanegi and Masayuki Murata Graduate School of

More information

EVALUATING ADJACENT CHANNEL INTERFERENCE IN IEEE NETWORKS

EVALUATING ADJACENT CHANNEL INTERFERENCE IN IEEE NETWORKS EVALUATING ADJACENT CHANNEL INTERFERENCE IN IEEE 802.11 NETWORKS Wee Lum Tan 1, Konstanty Bialkowski 1 1 Queensland Research Laboratory National ICT Australia Brisbane, QLD, Australia Email: {weelum.tan,

More information

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE 802.11 networks Christos Chousidis, Rajagopal Nilavalan School of Engineering and Design Brunel University London, UK {christos.chousidis,

More information

A Framework for Video Streaming to Resource- Constrained Terminals

A Framework for Video Streaming to Resource- Constrained Terminals A Framework for Video Streaming to Resource- Constrained Terminals Dmitri Jarnikov 1, Johan Lukkien 1, Peter van der Stok 1 Dept. of Mathematics and Computer Science, Eindhoven University of Technology

More information

Delay Performance Evaluation of WIFI Release (IEEE a, b, g and n) Using OPNET for Data Types (Voice, , File Transfer, Video Convergence)

Delay Performance Evaluation of WIFI Release (IEEE a, b, g and n) Using OPNET for Data Types (Voice,  , File Transfer, Video Convergence) Delay Performance Evaluation of WIFI Release (IEEE 802.11 a, b, g and n) Using OPNET for Data Types (Voice, email, File Transfer, Video Convergence) Amel Aboud Ali mohamed Alswelih 1 and Dr. Amin Babiker

More information

Data Communication & Networks G Session 5 - Main Theme Wireless Networks. Dr. Jean-Claude Franchitti

Data Communication & Networks G Session 5 - Main Theme Wireless Networks. Dr. Jean-Claude Franchitti Data Communication & Networks G22.2262-001 Session 5 - Main Theme Wireless Networks Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute of Mathematical Sciences

More information

On the Optimizing of LTE System Performance for SISO and MIMO Modes

On the Optimizing of LTE System Performance for SISO and MIMO Modes 2015 Third International Conference on Artificial Intelligence, Modelling and Simulation On the Optimizing of LTE System Performance for SISO and MIMO Modes Ali Abdulqader Bin Salem, Yung-Wey Chong, Sabri

More information

LTE and IEEE802.p for vehicular networking: a performance evaluation

LTE and IEEE802.p for vehicular networking: a performance evaluation LTE and IEEE802.p for vehicular networking: a performance evaluation Zeeshan Hameed Mir* Fethi Filali EURASIP Journal on Wireless Communications and Networking 1 Presenter Renato Iida v2 Outline Introduction

More information

Wireless LAN Tester Conformable to IEEE802.11ac

Wireless LAN Tester Conformable to IEEE802.11ac Practical Field Information about Field Telecommunication Information Technologies about Telecommunication Technologies Wireless LAN Tester Conformable to IEEE802.11ac Abstract This article describes the

More information

LXRS and LXRS+ Wireless Sensor Protocol

LXRS and LXRS+ Wireless Sensor Protocol LORD TECHNICAL NOTE LXRS and LXRS+ Wireless Sensor Protocol Using LXRS and LXRS+ For Long-Term Monitoring and High Bandwidth Test and Measurement Introduction LORD Sensing has developed and deployed two

More information

estadium Project Lab 2: Iperf Command

estadium Project Lab 2: Iperf Command estadium Project Lab 2: Iperf Command Objectives Being familiar with the command iperf. In this Lab, we will set up two computers (PC1 and PC2) as an ad-hoc network and use the command iperf to measure

More information

Comparing TCP Congestion Control Algorithms Based on Passively Collected Packet Traces

Comparing TCP Congestion Control Algorithms Based on Passively Collected Packet Traces Comparing TCP Congestion Control Algorithms Based on Passively Collected Packet Traces Toshihiko Kato, Atsushi Oda, Celimuge Wu, and Satoshi Ohzahata Graduate School of Information Systems University of

More information

Traffic Modeling of Wireless Body Area Network

Traffic Modeling of Wireless Body Area Network IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 5, Ver. IV (Sep. - Oct. 2016), PP 102-109 www.iosrjournals.org Traffic Modeling of Wireless Body Area

More information

Problem 7. Problem 8. Problem 9

Problem 7. Problem 8. Problem 9 Problem 7 To best answer this question, consider why we needed sequence numbers in the first place. We saw that the sender needs sequence numbers so that the receiver can tell if a data packet is a duplicate

More information

Performance Analysis of the Intertwined Effects between Network Layers for g Transmissions

Performance Analysis of the Intertwined Effects between Network Layers for g Transmissions Performance Analysis of the Intertwined Effects between Network Layers for 802.11g Transmissions Jon Gretarsson, Feng Li, Mingzhe Li, Ashish Samant, Huahui Wu, Mark Claypool and Robert Kinicki WPI Computer

More information

ECS 15; Lectures 17 and 18. The Internet. What is the internet, and how does it work? TA feedback

ECS 15; Lectures 17 and 18. The Internet. What is the internet, and how does it work? TA feedback ECS 15; Lectures 17 and 18 The Internet What is the internet, and how does it work? TA feedback Python -- Run your code!! Term paper: Start a paragraph with the point of the paragraph, not in modern times

More information

Study on Compatibility of Diffusion- Type Flow Control and TCP

Study on Compatibility of Diffusion- Type Flow Control and TCP Study on Compatibility of Diffusion- Type Flow Control and TCP Kaori Muranaka*, Chisa Takano*, Masaki Aida** *NTT Advanced Technology Corporation, 2-4-15, Naka-cho, Musashino-shi, 18-6 Japan. TEL: +81

More information

ADIVIS: A NOVEL ADAPTIVE ALGORITHM FOR VIDEO STREAMING OVER THE INTERNET

ADIVIS: A NOVEL ADAPTIVE ALGORITHM FOR VIDEO STREAMING OVER THE INTERNET The 18th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 7) ADIVIS: A NOVEL ADAPTIVE ALGORITHM FOR VIDEO STREAMING OVER THE INTERNET Pavlos Antoniou, Vasos

More information

Error characteristics and their prediction in ZigBee transmission at coexistence conditions

Error characteristics and their prediction in ZigBee transmission at coexistence conditions Error characteristics and their prediction in ZigBee transmission at coexistence conditions BOHUSLAVEK ZDENEK and MASIK ILJA Department of Electrical Engineering and Automation, Faculty of Engineering

More information

Employing Wireless Bluetooth for C 3 in Industrial Automation C. Norz C. Miller

Employing Wireless Bluetooth for C 3 in Industrial Automation C. Norz C. Miller 1 Employing Wireless Bluetooth for C 3 in Industrial Automation C. Norz C. Miller Abstract: This paper discusses the use of wireless Bluetooth for controllerto-controller coordination (C 3 ) within industrial

More information

LANCOM Techpaper Active Radio Control

LANCOM Techpaper Active Radio Control LANCOM Techpaper Active Radio Control Flexible and reliable design of wireless networks becomes more important with a steadily increasing number of clients. The main goal for network administrators always

More information

Scalable Video Coding

Scalable Video Coding Introduction to Multimedia Computing Scalable Video Coding 1 Topics Video On Demand Requirements Video Transcoding Scalable Video Coding Spatial Scalability Temporal Scalability Signal to Noise Scalability

More information

Experimental Validation of a Coexistence Model of IEEE and IEEE b/g Networks

Experimental Validation of a Coexistence Model of IEEE and IEEE b/g Networks Experimental Validation of a Coexistence Model of IEEE 802.15.4 and IEEE 802.11b/g Networks Wei Yuan, Xiangyu Wang, Jean-Paul M. G. Linnartz and Ignas G. M. M. Niemegeers Philips Research, High Tech Campus

More information

Increase-Decrease Congestion Control for Real-time Streaming: Scalability

Increase-Decrease Congestion Control for Real-time Streaming: Scalability Increase-Decrease Congestion Control for Real-time Streaming: Scalability Dmitri Loguinov City University of New York Hayder Radha Michigan State University 1 Motivation Current Internet video streaming

More information

A Seamless Handover Mechanism for IEEE e Broadband Wireless Access

A Seamless Handover Mechanism for IEEE e Broadband Wireless Access A Seamless Handover Mechanism for IEEE 802.16e Broadband Wireless Access Kyung-ah Kim 1, Chong-Kwon Kim 2, and Tongsok Kim 1 1 Marketing & Technology Lab., KT, Seoul, Republic of Korea {kka1, tongsok}@kt.co.kr

More information

Perceptual Quality Measurement and Control: Definition, Application and Performance

Perceptual Quality Measurement and Control: Definition, Application and Performance Perceptual Quality Measurement and Control: Definition, Application and Performance A. R. Prasad, R. Esmailzadeh, S. Winkler, T. Ihara, B. Rohani, B. Pinguet and M. Capel Genista Corporation Tokyo, Japan

More information

Why Your Application only Uses 10Mbps Even the Link is 1Gbps?

Why Your Application only Uses 10Mbps Even the Link is 1Gbps? Why Your Application only Uses 10Mbps Even the Link is 1Gbps? Contents Introduction Background Information Overview of the Issue Bandwidth-Delay Product Verify Solution How to Tell Round Trip Time (RTT)

More information

end systems, access networks, links 1.3 network core

end systems, access networks, links 1.3 network core Chapter 1: roadmap 1.1 what is the Inter? 1.2 work edge end systems, works, links 1.3 work core packet switching, circuit switching, work structure 1.4 delay, loss, throughput in works 1.5 protocol layers,

More information

II. Principles of Computer Communications Network and Transport Layer

II. Principles of Computer Communications Network and Transport Layer II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part

More information

WITH the evolution and popularity of wireless devices,

WITH the evolution and popularity of wireless devices, Network Coding with Wait Time Insertion and Configuration for TCP Communication in Wireless Multi-hop Networks Eiji Takimoto, Shuhei Aketa, Shoichi Saito, and Koichi Mouri Abstract In TCP communication

More information

Performance Analysis of FTP, HTTP and Database for IEEE802.11, IEEE802.11a, IEEE802.11b and IEEE802.11g using OPNET Simulator

Performance Analysis of FTP, HTTP and Database for IEEE802.11, IEEE802.11a, IEEE802.11b and IEEE802.11g using OPNET Simulator Performance Analysis of FTP, HTTP and Database for IEEE802.11, IEEE802.11a, IEEE802.11b and IEEE802.11g using OPNET Simulator Almutaz Ali Mohammed 1, Ibrahim Elimam Abdalla 2 Faculty of Engineering, Neelain

More information

Recommended Readings

Recommended Readings Lecture 11: Media Adaptation Scalable Coding, Dealing with Errors Some slides, images were from http://ip.hhi.de/imagecom_g1/savce/index.htm and John G. Apostolopoulos http://www.mit.edu/~6.344/spring2004

More information

Wireless LAN Performance Under Varied Stress Conditions in Vehicular Traffic Scenarios

Wireless LAN Performance Under Varied Stress Conditions in Vehicular Traffic Scenarios Wireless LAN Performance Under Varied Stress Conditions in Vehicular Traffic Scenarios Jatinder Pal Singh, Nicholas Bambos Department of Electrical Engineering Stanford University, CA 943 {jatinder, bambos}@stanford.edu

More information

Chapter 8 OSI Physical Layer

Chapter 8 OSI Physical Layer Chapter 8 OSI Physical Layer Upper OSI layer protocols prepare data from the human network for transmission to its destination. The Physical layer controls how data is placed on the communication media.

More information

Energy-Aware MPEG-4 4 FGS Streaming

Energy-Aware MPEG-4 4 FGS Streaming Energy-Aware MPEG-4 4 FGS Streaming Kihwan Choi and Massoud Pedram University of Southern California Kwanho Kim Seoul National University Outline! Wireless video streaming! Scalable video coding " MPEG-2

More information

A COLLOCATED APPROACH FOR COEXISTENCE RESOLUTION IN WIRELESS HOME NETWORKING

A COLLOCATED APPROACH FOR COEXISTENCE RESOLUTION IN WIRELESS HOME NETWORKING A COLLOCATED APPROACH FOR COEXISTENCE RESOLUTION IN WIRELESS HOME NETWORKING Md Enamul Islam, Sanjay Jha, Dr. Paul W.H. Kwan, Monzurur Rahman School of Mathematics, Statistics and Computer Science, University

More information

Lecture 3: Modulation & Layering"

Lecture 3: Modulation & Layering Lecture 3: Modulation & Layering" CSE 123: Computer Networks Alex C. Snoeren HW 1 out Today, due 10/09! Lecture 3 Overview" Encoding schemes Shannon s Law and Nyquist Limit Clock recovery Manchester, NRZ,

More information

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross Wireless Networks CSE 3461: Introduction to Computer Networking Reading: 6.1 6.3, Kurose and Ross 1 Wireless Networks Background: Number of wireless (mobile) phone subscribers now exceeds number of wired

More information

MOBILE COMPUTING. Jan-May,2012. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala.

MOBILE COMPUTING. Jan-May,2012. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala. WPAN: Bluetooth MOBILE COMPUTING Jan-May,2012 ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala Email-alakroy.nerist@gmail.com EM Spectrum ISM band 902 928 Mhz 2.4 2.4835 Ghz 5.725 5.85 Ghz LF MF

More information

A Simulation Study of the PLC-MAC Performance using Network Simulator-2

A Simulation Study of the PLC-MAC Performance using Network Simulator-2 A Simulation Study of the PLC-MAC Performance using Network Simulator-2 Min-Soo Kim, Dong-Min Son*, Young-Bae Ko and Young-Hyun Kim** Graduate School of Information & Communication, Ajou University, Korea

More information

Effect of TCP and UDP Parameters on the quality of Video streaming delivery over The Internet

Effect of TCP and UDP Parameters on the quality of Video streaming delivery over The Internet Effect of TCP and UDP Parameters on the quality of Video streaming delivery over The Internet MAZHAR B. TAYEL 1, ASHRAF A. TAHA 2 1 Electrical Engineering Department, Faculty of Engineering 1 Alexandria

More information

Introduction to Network Technologies & Layered Architecture BUPT/QMUL

Introduction to Network Technologies & Layered Architecture BUPT/QMUL Introduction to Network Technologies & Layered Architecture BUPT/QMUL 2015-3-5 Review What is the Internet? How does it work? When & how did it come about? Who controls it? Where is it going? 2 Agenda

More information

Wireless LANs. The Protocol Stack The Physical Layer The MAC Sublayer Protocol The Frame Structure Services 802.

Wireless LANs. The Protocol Stack The Physical Layer The MAC Sublayer Protocol The Frame Structure Services 802. Wireless LANs The 802.11 Protocol Stack The 802.11 Physical Layer The 802.11 MAC Sublayer Protocol The 802.11 Frame Structure Services 56 802.11 The 802.11 Working Group The IEEE 802.11 was formed in July

More information

Outline. A Professional Company in Software-Defined Networking (SDN) Copyright , EstiNet Technologies Inc. All Rights Reserved..

Outline. A Professional Company in Software-Defined Networking (SDN) Copyright , EstiNet Technologies Inc. All Rights Reserved.. Physical Layer Outline Signal Propagation Media The Calculation of Signal Delivery Time The Evaluation of End-to-end Delay Signal Encoding and Modulation Wired Signal s Encoding, Decoding and Decoding

More information

White Paper Broadband Multimedia Servers for IPTV Design options with ATCA

White Paper Broadband Multimedia Servers for IPTV Design options with ATCA Internet channels provide individual audiovisual content on demand. Such applications are frequently summarized as IPTV. Applications include the traditional programmed Video on Demand from a library of

More information

Performance Evaluation of Active Route Time-Out parameter in Ad-hoc On Demand Distance Vector (AODV)

Performance Evaluation of Active Route Time-Out parameter in Ad-hoc On Demand Distance Vector (AODV) Performance Evaluation of Active Route Time-Out parameter in Ad-hoc On Demand Distance Vector (AODV) WADHAH AL-MANDHARI, KOICHI GYODA 2, NOBUO NAKAJIMA Department of Human Communications The University

More information

Chapter 6 Wireless and Mobile Networks

Chapter 6 Wireless and Mobile Networks Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2004. 6: Wireless and Mobile Networks 6

More information

Timestamp Retransmission Algorithm for TCP-Cherry over InterPlaNetary Internet

Timestamp Retransmission Algorithm for TCP-Cherry over InterPlaNetary Internet Network and Communication Technologies; Vol. 1, No. 2; 2012 ISSN 1927-064X E-ISSN 1927-0658 Published by Canadian Center of Science and Education Timestamp Retransmission Algorithm for TCP-Cherry over

More information

Step-by-Step: Handling RF Interference Challenges

Step-by-Step: Handling RF Interference Challenges WHITE PAPER Step-by-Step: Handling RF Interference Challenges TABLE OF CONTENTS» Introduction» STEP ONE: Identify non-wi-fi interferers» STEP TWO: Locate non-wi-fi interferers» STEP THREE: Identify Wi-Fi

More information

Shared Access Networks Wireless. 1/27/14 CS mywireless 1

Shared Access Networks Wireless. 1/27/14 CS mywireless 1 Shared Access Networks Wireless 1 Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected devices equals

More information

REDUCTION OF PACKET LOSS BY OPTIMIZING THE ANTENNA SYSTEM AND LAYER 3 CODING

REDUCTION OF PACKET LOSS BY OPTIMIZING THE ANTENNA SYSTEM AND LAYER 3 CODING REDUCTION OF PACKET LOSS BY OPTIMIZING THE ANTENNA SYSTEM AND LAYER 3 CODING Petr CHLUMSKY 1, Zbynek KOCUR 1, Jiri VODRAZKA 1, Tomas KORINEK 2, 1 Department of Telecommunication Engineering, Faculty of

More information

Configure IP SLA Tracking for IPv4 Static Routes on an SG550XG Switch

Configure IP SLA Tracking for IPv4 Static Routes on an SG550XG Switch Configure IP SLA Tracking for IPv4 Static Routes on an SG550XG Switch Introduction When using static routing, you may experience a situation where a static route is active, but the destination network

More information

ITP 140 Mobile Applications Technologies. Networks

ITP 140 Mobile Applications Technologies. Networks ITP 140 Mobile Applications Technologies Networks A First Look Under the Hood 2 3 Communication Channels Mediums for transporting data from one system to another Physical Twisted Pair (CAT-3, CAT-5/6)

More information