Cross Layer Design for QoS Support in Multimedia Applications over Wireless Networks. Jaydip Sen Innovation Lab TCS Kolkata

Size: px
Start display at page:

Download "Cross Layer Design for QoS Support in Multimedia Applications over Wireless Networks. Jaydip Sen Innovation Lab TCS Kolkata"

Transcription

1 Cross Layer Design for QoS Support in Multimedia Applications over Wireless Networks Jaydip Sen Innovation Lab TCS Kolkata

2 Agenda Introduction Different approaches to Cross Layer Design Applications of Cross Layer Design Case Studies Undesirable effect of cross-layer design Conclusions

3 Cross Layer Design- Introduction Advanced applications like VOIP, web browsing, multimedia conferencing & video streaming demand Widely varying and diverse QoS guarantees Adaptability to dynamically varying networks & traffic conditions Modest buffer requirements within network High and effective capacity utilization Low processing overhead per packet High bandwidth requirements are coupled with tight delay constraints

4 Cross Layer design Introduction (contd..) The approach of any layered network is to treat the layers as different entities and perform layer specific operations independent of other layers. TCP is a point-to-point protocol that sets up a connection between two endpoints using a handshake signal; hence it cannot be used in multicast environment. QoS was not an issue for the application using layered approach for non real-time applications. FIFO buffers were used for resource handling and sharing. TCP Application UDP IP Physical and Data Link

5 Cross Layer Design- Introduction (contd..) CLD is a way of achieving information sharing between all the layers in order to obtain highest possible adaptivity of any application. This is required to meet the challenging data rates, higher performance gains and QoS requirements for various real time and non real time applications. CLD is a framework of co-operation between multiple layers to combine the resources and create a network that is highly adaptive.

6 Cross Layer Design Introduction (contd..) CLD approach allows upper layers to adapt their strategies in a more effective way to varying link and network conditions. This helps to improve the end-to-end performance. Each layer is characterized by some key parameters that are passed to its adjacent layers to help them determine the best operation modes under the current channel, network and application conditions.

7 Cross Functional Nature of CLD Wireless Networking Architecture: Connection-oriented vs Connectionless Energy efficient analysis of MANETs Traffic theory & protocols Scaling laws of large scale networks Signal processing Increasing the spectral efficiency Reducing BER Reducing transmission energy Detection and estimation algorithms for multi-access. Information Theory Developing capacity limits Designing efficient source coding and channel coding algorithms

8 Different Mechanisms Method I Packet Headers Method II ICMP Messages Method III Local Profiles Method IV Networks Services

9 Method I Packet Headers Interlayer Signaling Pipe stores the cross layer information in the wireless extension headers of IPv6 packets. It makes use of IP data packets as in-band message carriers. Hence does not need any dedicated message protocol for this purpose. Disadvantage an IP data packet can only be processed layer by layer and this leads to inefficiency.

10 Method I Packet Headers (contd..) Application Transport Network Link Physical Packet Headers

11 Method II ICMP Messages A message can be generated at any layer and propagated to any upper layer, by using holes rather than pipes as in Method I. The messages are propagated through the layers using the Internet Control Message Protocol (ICMP). This is more flexible and efficient method. Disadvantage - ICMP encapsulated messages have to pass through network layer even if the signaling is required between link and application layer. Only upward ICMP messages are reported.

12 Method II ICMP Messages (contd..) Application Transport Network Link Physical ICMP Messages

13 Method III Local Profiles Cross layer information is abstracted from related layer and stored in separate profiles within a Mobile Host (MH). Other interested layers can select profiles to fetch desired information. This is a flexible method since profile formats can be tailored to specific layers which can access information directly. Not suitable for time-stringent tasks like real-time applications.

14 Method III Local Profile (contd..) Application Transport High-Layer Profile Network Link Physical Low-Layer Profile Mobile Host

15 Method IV Networks Services Channel and link information from physical layer and link layer are gathered, abstracted and managed by WCI Wireless Channel Information Servers. Interested applications access WCI servers for their desired parameters. Interfaces have to be defined among the MH, the WCI server and the application servers.

16 Method IV Networks Services (contd..) Application Transport Network Link Physical Application Server WCI Server MH Air Network

17 Some Applications of Cross Layer Design QoS support in the wireless systems Ad Hoc networks for real-time video streaming QoS mapping architecture for video delivery in wireless network Multimedia over wireless Multi hop wireless networks

18 Cross-Layer Design of Ad Hoc Networks for Real-Time Video Streaming E. Setton, T. Yoo, X. Zhu, A. Glodsmith, and B. Girod IEEE Wireless Communications Magazine, August 2005

19 Challenges The lack of established infrastructure, the network and channel dynamics, and the nature of the wireless medium offer an unprecedented set of challenges in supporting demanding applications over ad hoc wireless networks. Wireless channel is a broadcast medium; transmissions from different nodes interfere. The quality of links vary over time and space due to interference, multi-path fading, and shadowing. Network conditions are highly dynamic as nodes join and leave the network in an unpredictable manner. Video streaming demands high bandwidth and stringent delay constraints.

20 Challenges (contd..) When packets are lost or arrive late, the picture quality suffers as decoding errors tend to propagate to subsequent portions of the video. Due to very high bit rate requirement, a media stream may congest the network significantly. It is imperative to account for the potential impact of each user on the network statistics and guarantee that the network is not operating beyond its capacity. Unfortunately most network designs do not provide mechanisms for protocol layers to optimally adapt to underlying channel conditions and specific application requirements. Meeting end-to-end performance requirements of demanding applications is extremely challenging without interaction between protocol layers.

21 Cross Layer Design Approach Interdependencies between layers are characterized and exploited by adapting to information exchanged between layers and building appropriate amount of robustness into each layer. For example, routing protocols can avoid links experiencing deep fades, or the application layer can adapt its transmission rate based on the underlying network throughput and latency. In this work, a cross-layer framework is presented that incorporates adaptation across all layers of the protocol stack: application, transport, resource allocation, and link layer. Results have shown that the proposed mechanism provide significant performance gains with manageable complexity.

22 Salient Features of the Scheme Link capacities are dynamically reallocated based on link state information and stream-based multi-path source routing. Scheduling is performed by balancing network congestion and distortion of realtime media streams. The framework includes techniques to jointly optimize error-resilient source coding, packet scheduling, stream-based routing, link capacity assignment, and adaptive link layer techniques. The optimization is carried out dynamically by all nodes, based on link state communication, to continuously adapt to the changing wireless link conditions and traffic flows.

23 Cross Layer Design Architecture Application Layer Transport Layer Secure Coding and Packetization Throughput Congestion-Distortion Optimized Scheduling Packet Deadlines Rate Distortion Preamble Network Layer MAC Layer Traffic Flows Congestion-Optimized Routing Capacity Assignment Link Capacities Link Layer Adaptive Modulation

24 Functions of Different Layers Link Layer Adaptive techniques are used to maximize the link rates under varying channel conditions. MAC Layer Assigns time slots, codes or frequency bands to each links. Network Layer Network layer operates jointly with MAC layer to determine the set of network flows that minimizes congestion. Transport Layer Congestion-Distortion Optimized Scheduling is performed to control the transmission and retransmission of packets. Application Layer It determines the most efficient encoding rate that will suite the given requirements for the application.

25 Adaptive Link Layer Technique Adaptive modulation is an efficient technique to improve the data rate of a link by adapting link layer design variables to the variations of the channel environment. The parameters for these purpose may be: Transmitter power Target BER Symbol rate Any combinations of the above Two adaptive link layer techniques are proposed: Adapting the packet length depending on the SINR and the link layer parameters to optimize throughput. For a fixed packet length, optimizing link layer parameters such as symbol rate and constellation size for maximal throughput. With larger packet length, packet error rate (PER) increases and throughput reduces due to frequent retransmissions. Smaller packets, on the other hand have larger overhead. A tradeoff is to be made.

26 Adaptive Link Layer Technique (contd..) The optimal packet length L* which maximizes throughput is given by H = size of a packet header b = number of bits per symbol P e = probability of symbol error. It depends on modulation type and link SINR. When the channel gain is high, maximum symbol rate should be used with highest tolerable constellation size. The corresponding optimal packet length increases as the channel quality improves. When SINR is low, the error rate should be decreased by adding redundancy in the transmission: Reduce the symbol rate Use a larger spreading factor or heavier coding.

27 Adaptive Link Layer Technique (contd..) A joint optimization of the packet length and link layer parameters yields the following rule of thumb: High SINR region when the channel gain is high, the maximum symbol rate should be used with the highest tolerable constellation size. The corresponding optimal packet size increases as the channel quality improves. Low SINR region the error rate should be decreased by adding redundancy in the transmission. Two methods of doing this are: Reduce the symbol rate Use a larger spreading factor or heavier coding After all parameters are optimally chosen, a point-to-point link throughput is computed using wireless channel bandwidth, SINR and a link layer design parameter.

28 Adaptive Link Layer Technique (contd..) Throughput Performance Comparison

29 Adaptive Link Layer Technique (contd..) A constant gap is observed from Shannon capacity for different types of channels. The gap could be reduced by using various channel coding techniques. For more than two nodes, the wireless medium should be shared among multiple sender-receiver pairs through a transmission strategy that coordinates medium access. For a given arrangement of nodes an achievable data rate on each link is computed for the adaptive link layer mechanism using the following equation W is the channel bandwidth, Γ is a link layer design parameter.

30 Adaptive Link Layer Technique (contd..) The time fraction during which each link will be active under a particular transmission strategy is also determined. By considering all the different transmission strategies between the senders and receivers, one can compute an achievable capacity region that characterizes the data rates that are simultaneously achievable between each source-destination pair. Only a limited number of these strategies are relevant in that they achieve rates that cannot be obtained by time-sharing between other strategies. For an ad hoc network of limited size (say ten nodes), this region can be computed exactly.* * [S. Toumpis and A.J. Goldsmith, Capacity regions for wireless ad hoc networks, IEEE Trans, on Wireless Communications, Vol 2, No 4, July 2003]

31 Adaptive Link Layer Technique (contd..) Figure in the next slide shows an example of this achievable capacity region depicting all the rate pairs simultaneously achievable between two specific sender-receiver pairs. More advanced transmission schemes will increase the achievable capacity region. A capacity as well as flow shall now be optimally assigned within this region so that traffic requests can be accommodated with minimal congestion.

32 Adaptive Link Layer Technique (contd..) Capacity region slices of an example ad hoc network (a) single-hop routing, no spatial reuse; (b) multihop routing, no spatial reuse; (c) multihop routing with spatial reuse; (d) two-level power control added to (c); (e) successive interference cancellation added to (c)

33 Joint Allocation of Capacity and Flow Given the network capacity, the network layer assigns traffic flows to each link. The closer the flow is to the link capacity, the higher will be the latency on the link. The optimal capacity and flow assignment may be computed to minimize any quasi-convex cost function, such as the maximum link utilization over the links of the network. The above metric of network congestion is a quasi-convex function of network flow (f) and capacities of the links (c). It can be minimized by a bisection algorithm that involves solving a sequence of convex feasibility problems.

34 Joint Allocation of Capacity and Flow (contd..) Typically, the flow between a sender and a receiver is split among multiple paths. Advantage: path diversity may provide higher aggregate data rate through spatial reuse of the wireless spectrum. Multiple routes have uncorrelated loss patterns which can be exploited at the application layer. Disadvantages: Use of higher number of links creates more contention at the MAC layer, and the complexity of maintaining multiple routes is higher. To asses advantages of cross-layer design, design with oblivious layers are also considered. For oblivious layers, capacity and flow are optimized independently. In oblivious layers designs, bidirectional links are established between neighboring nodes, and the minimum transmission rate supported by these links are maximized.

35 Joint Allocation of Capacity and Flow (contd..) Given this fixed capacity assignment, the flow assignment is computed by minimizing the link utilization metric (Δ (c, f)). For this design, some links are assigned wireless capacity, even though they do not have any traffic to support resulting in a waste of network resources. The effect of multipath routing is vastly different for each of the two designs. For cross-layer design, regardless of the number of paths, high rates can always be supported as resources are only allocated to active links. As an example, performances of the cross-layer design and oblivious layer design for video streaming over three paths between two nodes in a simulated wireless network are observed. In both cases the video stream is encoded at the highest sustainable rate and transmitted over UDP. The received video quality is measured in terms of Peak Signal-to-Noise Ratio (PSNR).

36 Joint Allocation of Capacity and Flow (contd..) PSNR Figures Cross layer design supports data rate up to 1.9 MBPS. Best PSNR: 39 db Oblivious design supports data rate up to 250 KBPS. Best PSNR: 33 db

37 Scheduling and Rate Allocation Chou et al have proposed an optimal scheduling algorithm based on importance of each packet of a video stream. This type of scheduling aims at maximizing the decoded video quality at the receiver while abiding with a rate constraint. In congestion-limited situations, it is beneficial to use a congestion-distortion optimized (CoDio) scheduler that limits end-to-end delay [ Setton et al]. This metric better reflects the impact of a user s transmissions on the congestion of a network. In addition, it is inherently adaptive to time-varying network conditions. CoDiO scheduler selects the most important packets in terms of video distortion reduction and transmits them in an order that minimizes the congestion created on the network. For example, I frames are transmitted with priority, whereas B frames might be dropped, and only the most important frames are retransmitted. CoDiO scheduler avoids transmitting packets in large bursts as this increases the queuing delays.

38 Determination of Optimal Operating Rate For low-latency streaming, when the transmitted rate exceeds a certain threshold, self-congestion causes too much delay in the network to meet the tight delay constraint, and the received video quality eventually degrades. With independent layers, the optimal operating rate is determined by algorithms such as TCP-friendly rate control based on end-to-end statistics. In the proposed cross-layer optimization scheme, the application layer determines the optimal rate for the video stream, based on rate-distortion characteristics, delay constraints, and current network conditions. Setton et al have derived a model that captures the impact of both encoder quantization and packet losses due to congestion on overall video quality. This model is used to determine the highest sustainable rate in conjunction with the optimization described before.

39 Determination of Optimal Operating Rate (contd..) Figure in the next slide shows decoded video quality for a sequence encoded at different rates and transmitted over six paths, according to the flow assignment performed earlier. When the encoding rate approaches the maximum aggregate data rate sustainable by the network (approximately 360 KBPS), the video quality drops as the end-to-end delay increases due to congestion. When the delay tolerance is small, this performance degradation occurs at rates well below network capacity, as even a slight increase in queuing delay affects the loss rate. In other words, delay constraints reduce the effective network capacity.

40 Determination of Optimal Operating Rate (contd..) Rate-PSNR performance for live video streaming using sixpath routing for different playout deadlines

41 A Cross-Layer Quality-of-Service Mapping Architecture for Video Delivery in Wireless Networks W. Kumwilaisak, Y. Thomas Hou, Qian Zhang, Wenwu Zhu, C.-C. Jay Kuo, and Ya-Qin Zhang IEEE Journal on Selected Areas in Communications, Vol 21, No 10 September 2003

42 Video Delivery in Wireless Networks An important issue in providing multiple QoS guarantees to video applications in wireless systems is dynamic QoS management with mobility support. A dynamic QoS management system allows video applications and the underlying prioritized transmission system to interact with each other in order to minimize service degradation in a resource constrained and time-varying wireless environment. A proper coordination mechanism should be in place between priority transmission system and video applications, since in Transmission Layer the QoS is expressed in terms of probability of buffer overflow and the probability of delay constraint violation at the link layer. Whereas, in Video Application Layer QoS is measured by mean square error (MSE) and Peak Signal-to-Noise Ratio (PSNR).

43 System Components Source video encoding module (at sender) Cross layer QoS mapping and adaptation module Link layer packet transmission module Wireless channel Adaptive wireless channel modeling module Video decoder module (at receiver)

44 Architecture of a Cross Layer QoS Management for Video Delivery over Wireless Video QoS Requirement Trans. QoS Provisioning Trans. Module Video Input Video Encoder QoS Mapping & QoS Adaptation QoS 1 QoS 2 QoS k Transmission Control Video Module Adaptive Channel Modeling Channel Feedback Video Output Video Decoder Time-Varying Non-Stationary Wireless Channel

45 QoS Mapping Technique The QoS Mapping and the Adaptation Module is the key component in this cross layer design. It is designed to optimally match the application layer QoS and the link (transmission layer) QoS. The video application layer QoS and link-layer QoS interact with each other and adapt themselves according to the wireless channel condition.

46 GOP Structure of MPEG-4 Video File Video Frame 1 Video Frame 2 Video Frame 3 Video Frame N I P P P Base Layer 1 st Enh Layer. 2 nd Enh Layer Mth Enh Layer T P TP + 1/F T P + 2/F T P + (N-1)/F Playback Deadline

47 QoS Mapping Issues Packets from the same GOP (Group of Picture) structure are to placed on the same QoS class. Loss of any video portion affects the end-to-end video quality due to interdependency within the encoding structure. Each video layer is packetized into several fixed-size packets before transmission. If the video playback frame rate at the end user is F frames/sec, and if the mobile terminal starts to play back the first video frame of GOP at time Tp, then for uninterrupted playback the video frame n in the same GOP should be received before Td(n) = Tp + ((n-1)/f)

48 QoS Mapping Issues Problem statement: Given the set of rate constraints under the priority transmission system and the expected channel service rate (which can be considered stationary in a time period corresponding to one GOP), what is the optimal mapping policy for one GOP with N scalable frames (coded in M video layers) to K priority classes such that the overall distortion is minimized.? Constraints: Source rate of video bitstreams under each priority class must not exceed the rate constraint of the corresponding priority class. Summation of rate constraints of all priority classes has to be bounded by the expected channel service rate.

49 Video Adaptation Algorithm Video coding module sets up a QoS bound r(t) in terms of expected video distortion (or expected PSNR). It then sends a transmit request (Txreq) to transmission module to set up the transmission process. Transmission module offers a set of statistical QoS guarantees for each priority class. The QoS parameters of the transmission module that provide the lowest distortion and satisfy the range of video quality requirement r(t) are chosen as the QoS parameters for the transmission. If there are no QoS parameters satisfying all the constraints, the available transmission capabilities cannot met the video quality requirement. The transmission module requests the video coding module to adjust the video quality requirement. The video coding module complies with this request and adjusts the QoS bounds and repeats the process in above step.

50 Video Adaptation Algorithm Video coding module sends the selected QoS parameters to the transmission module to set up QoS parameters of each priority. Transmission module send the acknowledgment to the video coding module after its QoS parameters are set up. The prioritized video bitstream is uploaded in the priority network based on agreed upon QoS parameters and the video layer mapping policy. If any change is detected in the service rate of the transmission channel, adaptation of the QoS parameters for both the video application and the priority network is called for. (Step 2 is activated).

51 Experimental Results The 100 video frames of CIF foreman sequence are used for simulation. Video sequence is encoded by PFGS video codec with frame rate of 10 frames/s and there are 10 frames in each GOP. The non-stationary behavior of wireless channel is simulated by randomly changing the normalized Doppler frequency and average power. The Doppler frequency is chosen from the set of {10-3, 5*10-3, 10-2 }. The average SNR of the received signal varies from 10 to 20 db. Two priority classes with strict priority scheduling is considered. The first class has the higher priority. The packet size is 200 bytes. The expected service rate of the channel is set to 380 kbps at normalized Doppler frequency of The rate constraint of the first priority class computed from the effective bandwidth and effective capacity and those obtained from simulations are close to each other over a wide range of packet loss probabilities.

52 Experimental Results (contd..) Rate constraint of a high priority class (of two priority classes) computed from wireless channel model with normalized Doppler frequency 10-2 and average power 16dB. Buffer sizes are 250 and 500 packets.

53 Experimental Results (contd..) The effect of buffer size on rate constraint is also studied. It is observed larger the buffers size, the more data rate we can transmit under the same packet loss probability guarantee. The rate constraints for priority class 2 over a wide range of packet loss probability is also studied. The rate constraint of this class with a buffer size of 250 packets is dependent on how much priority class 1 occupies the wireless link. The rate constraint of priority class 2 with a lower QoS guarantee of priority class 1 (with guaranteed packet loss probability = 10-2 and rate constraint = 109 kbps) can provide a higher transmission rate than that with a higher QoS guarantee of priority class 1 (with guaranteed packet loss probability = 10-1 and rate constraint = 54.5 KBPS).

54 Experimental Results (contd..) Rate constraint of a lower priority class (of two priority classes) and a buffer size of 250 packets based on absolute priority scheduling when the packet loss rate guarantee for class 1 is equal to 10-2 and 10-4

55 A Cross-Layer Design for QoS Support in the 3GPP2 Wireless Systems M. Bourouha, S. Ci, G. Ben Brahim, and M. Guizani IEEE Globecom 2004 Workshop

56 Cross Layer Design in 3GPP2 Wireless Systems In this work, a suite of cross-layer design modules fro QoS support in the 1xEV- DV system is proposed. The proposed design consists of several modules. The modules are: Priority Admission Control modules which admits users according to their QoS priority profiles Resource Allocation Control module which is responsible for allocating the optimal combination of all system parameters. Resource Scheduling Control module which aims at achieving a better overall throughput gain and guarantees the QoS requested by different users service levels. The mechanism is based on Effective Capacity concept.

57 QoS Provisioning Architecture Upper User QoS Profiles BS QoS Validation Control Layer Resource Scheduling Control To Users MAC Resource Allocation Control PHY Priority Admission Call Rejected Transmission Requests from Different Users

58 QoS Provisioning Architecture (contd..) Priority Admission Control: Its goal is to give more priority, during resource allocation, to users with better channel conditions. It classifies and prioritizes users transmission requests based on three major parameters: The user channel condition (CQI): users with high CQI are given high priority The user QoS profile, such as data rate, delay, loss rate etc. The amount of requested resources, which will be based on the class of service.

59 QoS Provisioning Architecture (contd..) Priority Admission Control: Scenario 1: A user with poor QoS profile or without QoS profile is requesting packet data services that are not sensitive to strict QoS requirements, the QoS mode will be in a Non-Assured mode. Such request could be either granted best effort resources according to the current CQI and the user priority or denied service. If, the user is requesting packet data services that are sensitive to minimum data rate, delay, or error rate, the request is immediately denied. Scenario 2: A user with good QoS profile (high data rate, low allowable delay etc.) requests services that are not sensitive to strict QoS requirements, the best transmission resources will be allocated. In this case, no further processing by upper modules will be required. If the user request for services that are sensitive to strict QoS requirements, the appropriate transmission resources will be allocated and the QoS service level will be in Assured QoS mode. Higher modules will be involved.

60 QoS Provisioning Architecture (contd..) Resource Allocation Control: It makes the best selection among all combinations of the overall system parameters. Some of the parameters are: Number of Walsh codes Number of time slots Modulation scheme Channel code rate The resource allocation control module allocates the optimum transmission resources to different users resource requests using their classification parameters which are: Diversity priority Type of traffic QoS profile QoS mode

61 QoS Provisioning Architecture (contd..) Resource Allocation Control: It works in two steps. Step 1: Based on user s diversity value describing the channel conditions, a lower bound of the Modulation and Coding Scheme (MCS) level is allocated to each user. Users with high diversity value ( good channel conditions) are typically assigned higher MCS level (higher order of modulation and higher data rate). Step 2: When the lower bound of the MCS level for each user has been selected based on the CQI values, the resource allocation control checks the QoS mode of each user. If the QoS mode is in the Non-Assured mode, then based on the diversity value and the available resources, the lower bound of the MCS level will be assigned and no further processing is needed. This reduces processing overhead at the BS. If the QoS mode of a user is the Assured QoS mode, then it sends the selected lower bound of the MCS level to upper modules for further QoS processing.

62 Dynamic Resource Allocation Algorithm The resource allocation algorithm uses Effective Capacity theory. The idea behind EC theory is to incorporate the concept of QoS in wireless links which was missing in Rayleigh and Rician models. By introducing two EC function- the probability of non-empty buffer and the QoS exponent of the connection, the EC link layer modeling and estimation can easily associate with QoS specification. Figure in the next slide shows the throughput using the proposed design versus a system using a fixed set of system parameters. The upper graph shows the throughput using the proposed scheme. The overall throughput using the dynamic resource allocation is improved as can be shown from the graph. The data rate is fixed at 480 kbps in the second part (fixed resource allocation).

63 Performance of Resource Allocation Algorithm System Throughput

64 A Cautionary Approach on Cross-Layer Design Vikas Kawadia and P.R. Kumar IEEE Wireless Communications Magazine February 2005

65 Undesirable Interactions in Cross Layer Design Whenever Cross Layer Design is implemented, problems like time asynchronization, instability and undesirable interactions between the layers have to be taken care of. This issue is illustrated by means of an example - Adaptive Rate MAC Layer.

66 Adaptive MAC and Minimum Hop Routing The rate adaptive protocol is a simple variation of IEEE MAC Protocol. The idea behind rate-adaptive MAC protocol is to send data at higher rates when the channel quality is good. Such higher rates are achieved by changing the modulation scheme. Such a scheme can lead to undesirable effects on the higher layers. For example, when combined with minimum-hop routing it can lead to a performance degradation.

67 Adaptive MAC & Minimum Hop Routing (contd..) The reason for the adverse impact is that minimum-hop routing chooses longer hops, for which the signal strength is lower, and thus the data rate achieved through channel quality adaptation is low. CLD can thus lead to unintended adverse interactions between the MAC and the network layer in this case. A routing protocol using some other metric is necessary when adaptive-rate MAC is used.

68 Adaptive MAC Protocol It is a modification of IEEE MAC protocol. A set of rates is available (i.e. modulation schemes), and the transmission rate can be chosen before each packet is sent. The RTS/CTS and broadcast packets are always transmitted at base rate (lowest data rate). Receiver measures the received signal strength of the RTS packet, and determines the maximum rate at which data can be received. This rate is then communicated to the sender in the CTS packet. Sender sends the subsequent ACK and DATA packets at this rate.

69 Adaptive MAC Protocol (contd..) Typically transmission to nodes which are near would occur at higher rates since the path loss attenuation of the signal is small. Lower data rates would be used for nodes located farther. If at higher layer, a minimum hop routing (say DSDV) is used, this scheme will have a very adverse effect. DSDV builds routing tables by sending hello packets that contain cumulative routing information (i.e., information that has been gathered from all the neighbors of a node). Hello packets are broadcast packets sent at the base rate and large range. Minimum hop routing thus chooses the longest possible hops on the path, which causes low received signal strength, which in turn implies a low data rate.

70 Rate Adaptive MAC Protocol (contd..) In fact, if we turn off the adaptive-rate MAC and use plain IEEE at the highest data rate (i.e., do not send any data when the channel is not good enough), we can get much better end-to-end throughput. In this case, longer hops simply do not exist, and thus minimum hop routing is forced to use a larger number of short hops, which provide higher data rates.

71 DSDV Routing Protocol DSDV chooses a small number of long hops : a lower data rate when an adaptive rate MAC is used

72 Plain IEEE Protocol Plain IEEE causes short hops of higher data rate to be used

73 Adaptive MAC Protocol Scheme 1 A fixed transmit power level of 0.28 W A receiver-transmitter distance of 0 99 m yields a data rate of 11 mbps, m yields a data rate of 5.5 mbps, a distance of m yields only 2 mbps. No communication is possible beyond 250 m. A simple opportunistic policy that gives an equal time share to each data rate is also in place. A max. of 5 packets are transmitted at 11 mbps, 3 packets at 5.5 mbps, and only 1 packet if the channel is good enough only for 2 mbps. Scheme 2 A plain IEEE A packet is sent at 11 mbps if the receivertransmitter distance is less than 100 m; otherwise no transmission.

74 Adaptive MAC and Plain IEEE Comparing Scheme 1 (adaptive-rate MAC) and Scheme 2 (plain IEEE ) for an 18-node linear topology Network

75 Conclusion The advantages of cross-layer design appear to be real and will be increasingly important in future. However, it will be useful to note some adverse possibilities and exercise appropriate caution in the CLD approach. Unbridled cross-layer design can lead to a spaghetti design and stifle further innovations since the number of new interactions introduced can be large. Every update may require complete redesign and replacement which can stifle proliferation. Cross-layer design proposals must therefore be holistic rather than fragmenting.

76 Thank You!

Video-Aware Wireless Networks (VAWN) Final Meeting January 23, 2014

Video-Aware Wireless Networks (VAWN) Final Meeting January 23, 2014 Video-Aware Wireless Networks (VAWN) Final Meeting January 23, 2014 1/26 ! Real-time Video Transmission! Challenges and Opportunities! Lessons Learned for Real-time Video! Mitigating Losses in Scalable

More information

Computation of Multiple Node Disjoint Paths

Computation of Multiple Node Disjoint Paths Chapter 5 Computation of Multiple Node Disjoint Paths 5.1 Introduction In recent years, on demand routing protocols have attained more attention in mobile Ad Hoc networks as compared to other routing schemes

More information

Chapter 7 CONCLUSION

Chapter 7 CONCLUSION 97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in

More information

Module objectives. Integrated services. Support for real-time applications. Real-time flows and the current Internet protocols

Module objectives. Integrated services. Support for real-time applications. Real-time flows and the current Internet protocols Integrated services Reading: S. Keshav, An Engineering Approach to Computer Networking, chapters 6, 9 and 4 Module objectives Learn and understand about: Support for real-time applications: network-layer

More information

Cross-Layer Architecture for H.264 Video Streaming in Heterogeneous DiffServ Networks

Cross-Layer Architecture for H.264 Video Streaming in Heterogeneous DiffServ Networks Cross-Layer Architecture for H.264 Video Streaming in Heterogeneous DiffServ Networks Gabriel Lazar, Virgil Dobrota, Member, IEEE, Tudor Blaga, Member, IEEE 1 Agenda I. Introduction II. Reliable Multimedia

More information

Abstract of the Book

Abstract of the Book Book Keywords IEEE 802.16, IEEE 802.16m, mobile WiMAX, 4G, IMT-Advanced, 3GPP LTE, 3GPP LTE-Advanced, Broadband Wireless, Wireless Communications, Cellular Systems, Network Architecture Abstract of the

More information

Supporting Service Differentiation for Real-Time and Best-Effort Traffic in Stateless Wireless Ad-Hoc Networks (SWAN)

Supporting Service Differentiation for Real-Time and Best-Effort Traffic in Stateless Wireless Ad-Hoc Networks (SWAN) Supporting Service Differentiation for Real-Time and Best-Effort Traffic in Stateless Wireless Ad-Hoc Networks (SWAN) G. S. Ahn, A. T. Campbell, A. Veres, and L. H. Sun IEEE Trans. On Mobile Computing

More information

Multi-path Forward Error Correction Control Scheme with Path Interleaving

Multi-path Forward Error Correction Control Scheme with Path Interleaving Multi-path Forward Error Correction Control Scheme with Path Interleaving Ming-Fong Tsai, Chun-Yi Kuo, Chun-Nan Kuo and Ce-Kuen Shieh Department of Electrical Engineering, National Cheng Kung University,

More information

Payload Length and Rate Adaptation for Throughput Optimization in Wireless LANs

Payload Length and Rate Adaptation for Throughput Optimization in Wireless LANs Payload Length and Rate Adaptation for Throughput Optimization in Wireless LANs Sayantan Choudhury and Jerry D. Gibson Department of Electrical and Computer Engineering University of Califonia, Santa Barbara

More information

CHAPTER 7 SIMULATION OBSERVATIONS

CHAPTER 7 SIMULATION OBSERVATIONS CHAPTER 7 CHAPTER 7 SIMULATION OBSERVATIONS Over a randomly distributed wireless network system with the specification is modeled with the suggested algorithms for communication from a selected source

More information

Basics (cont.) Characteristics of data communication technologies OSI-Model

Basics (cont.) Characteristics of data communication technologies OSI-Model 48 Basics (cont.) Characteristics of data communication technologies OSI-Model Topologies Packet switching / Circuit switching Medium Access Control (MAC) mechanisms Coding Quality of Service (QoS) 49

More information

CS 457 Multimedia Applications. Fall 2014

CS 457 Multimedia Applications. Fall 2014 CS 457 Multimedia Applications Fall 2014 Topics Digital audio and video Sampling, quantizing, and compressing Multimedia applications Streaming audio and video for playback Live, interactive audio and

More information

Spectrum Management in Cognitive Radio Networks

Spectrum Management in Cognitive Radio Networks Spectrum Management in Cognitive Radio Networks Jul 14,2010 Instructor: professor m.j omidi 1/60 BY : MOZHDEH MOLA & ZAHRA ALAVIKIA Contents Overview: Cognitive Radio Spectrum Sensing Spectrum Decision

More information

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS 28 CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS Introduction Measurement-based scheme, that constantly monitors the network, will incorporate the current network state in the

More information

Outline. Wireless Channel Characteristics. Multi-path Fading. Opportunistic Communication - with a focus on WLAN environments -

Outline. Wireless Channel Characteristics. Multi-path Fading. Opportunistic Communication - with a focus on WLAN environments - Outline Opportunistic Communication - with a focus on WLAN environments - Jong-won Lee 2006. 02.20. Background? Wireless Channels? Opportunistic communication? Examples? Basics of WLAN Previous Works?

More information

Wireless MACs: MACAW/802.11

Wireless MACs: MACAW/802.11 Wireless MACs: MACAW/802.11 Mark Handley UCL Computer Science CS 3035/GZ01 Fundamentals: Spectrum and Capacity A particular radio transmits over some range of frequencies; its bandwidth, in the physical

More information

Subject: Adhoc Networks

Subject: Adhoc Networks ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.

More information

Xiaoqing Zhu, Sangeun Han and Bernd Girod Information Systems Laboratory Department of Electrical Engineering Stanford University

Xiaoqing Zhu, Sangeun Han and Bernd Girod Information Systems Laboratory Department of Electrical Engineering Stanford University Congestion-aware Rate Allocation For Multipath Video Streaming Over Ad Hoc Wireless Networks Xiaoqing Zhu, Sangeun Han and Bernd Girod Information Systems Laboratory Department of Electrical Engineering

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

The Performance of MANET Routing Protocols for Scalable Video Communication

The Performance of MANET Routing Protocols for Scalable Video Communication Communications and Network, 23, 5, 9-25 http://dx.doi.org/.4236/cn.23.522 Published Online May 23 (http://www.scirp.org/journal/cn) The Performance of MANET Routing Protocols for Scalable Video Communication

More information

B. Bellalta Mobile Communication Networks

B. Bellalta Mobile Communication Networks IEEE 802.11e : EDCA B. Bellalta Mobile Communication Networks Scenario STA AP STA Server Server Fixed Network STA Server Upwnlink TCP flows Downlink TCP flows STA AP STA What is the WLAN cell performance

More information

Comparison of Shaping and Buffering for Video Transmission

Comparison of Shaping and Buffering for Video Transmission Comparison of Shaping and Buffering for Video Transmission György Dán and Viktória Fodor Royal Institute of Technology, Department of Microelectronics and Information Technology P.O.Box Electrum 229, SE-16440

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 Voice and Video over IP Slides derived from those available on the Web site of the book Computer Networking, by Kurose and Ross, PEARSON 2 Multimedia networking:

More information

PROPOSAL OF MULTI-HOP WIRELESS LAN SYSTEM FOR QOS GUARANTEED TRANSMISSION

PROPOSAL OF MULTI-HOP WIRELESS LAN SYSTEM FOR QOS GUARANTEED TRANSMISSION PROPOSAL OF MULTI-HOP WIRELESS LAN SYSTEM FOR QOS GUARANTEED TRANSMISSION Phuc Khanh KIEU, Shinichi MIYAMOTO Graduate School of Engineering, Osaka University 2-1 Yamada-oka, Suita, Osaka, 565-871 JAPAN

More information

Computer Networking. Queue Management and Quality of Service (QOS)

Computer Networking. Queue Management and Quality of Service (QOS) Computer Networking Queue Management and Quality of Service (QOS) Outline Previously:TCP flow control Congestion sources and collapse Congestion control basics - Routers 2 Internet Pipes? How should you

More information

CROSS-LAYER DESIGN OF AD HOC NETWORKS FOR REAL-TIME VIDEO STREAMING

CROSS-LAYER DESIGN OF AD HOC NETWORKS FOR REAL-TIME VIDEO STREAMING ADVANCES IN WIRELESS VIDEO CROSS-LAYER DESIGN OF AD HOC NETWORKS FOR REAL-TIME VIDEO STREAMING ERIC SETTON, TAESANG YOO, XIAOQING ZHU, ANDREA GOLDSMITH, AND BERND GIROD STANFORD UNIVERSITY coding and packetization

More information

Real-Time Protocol (RTP)

Real-Time Protocol (RTP) Real-Time Protocol (RTP) Provides standard packet format for real-time application Typically runs over UDP Specifies header fields below Payload Type: 7 bits, providing 128 possible different types of

More information

Joint PHY/MAC Based Link Adaptation for Wireless LANs with Multipath Fading

Joint PHY/MAC Based Link Adaptation for Wireless LANs with Multipath Fading Joint PHY/MAC Based Link Adaptation for Wireless LANs with Multipath Fading Sayantan Choudhury and Jerry D. Gibson Department of Electrical and Computer Engineering University of Califonia, Santa Barbara

More information

1480 IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 14, NO. 5, OCTOBER 2012

1480 IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 14, NO. 5, OCTOBER 2012 1480 IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 14, NO. 5, OCTOBER 2012 Wireless H.264 Video Quality Enhancement Through Optimal Prioritized Packet Fragmentation Kashyap K. R. Kambhatla, Student Member, IEEE,

More information

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Broch et al Presented by Brian Card 1 Outline Introduction NS enhancements Protocols: DSDV TORA DRS AODV Evaluation Conclusions

More information

COMPUTER NETWORK Model Test Paper

COMPUTER NETWORK Model Test Paper Model Test Paper Question no. 1 is compulsory. Attempt all parts. Q1. Each question carries equal marks. (5*5 marks) A) Difference between Transmission Control Protocol (TCP) and User Datagram Protocol.

More information

Transport layer issues

Transport layer issues Transport layer issues Dmitrij Lagutin, dlagutin@cc.hut.fi T-79.5401 Special Course in Mobility Management: Ad hoc networks, 28.3.2007 Contents Issues in designing a transport layer protocol for ad hoc

More information

Joint Capacity, Flow and Rate Allocation for Multiuser Video Streaming over Wireless Ad-Hoc Networks

Joint Capacity, Flow and Rate Allocation for Multiuser Video Streaming over Wireless Ad-Hoc Networks Joint Capacity, Flow and Rate Allocation for Multiuser Video Streaming over Wireless Ad-Hoc Networks Sachin Adlakha Wireless Systems Laboratory Department of Electrical Engineering 35 Serra Mall Stanford,

More information

ECE 598HH: Special Topics in Wireless Networks and Mobile Systems

ECE 598HH: Special Topics in Wireless Networks and Mobile Systems ECE 598HH: Special Topics in Wireless Networks and Mobile Systems Lecture 21: Opportunistic Routing Haitham Hassanieh *These slides are courtesy of Dina Katabi 1 Lecture Outline Single Path Routing Opportunistic

More information

Multimedia Networking

Multimedia Networking CMPT765/408 08-1 Multimedia Networking 1 Overview Multimedia Networking The note is mainly based on Chapter 7, Computer Networking, A Top-Down Approach Featuring the Internet (4th edition), by J.F. Kurose

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

Bandwidth Aggregation with Path Interleaving Forward Error Correction Mechanism for Delay-Sensitive Video Streaming in Wireless Multipath Environments

Bandwidth Aggregation with Path Interleaving Forward Error Correction Mechanism for Delay-Sensitive Video Streaming in Wireless Multipath Environments Tamkang Journal of Science and Engineering, Vol. 13, No. 1, pp. 1 9 (2010) 1 Bandwidth Aggregation with Path Interleaving Forward Error Correction Mechanism for Delay-Sensitive Video Streaming in Wireless

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

Performance of UMTS Radio Link Control

Performance of UMTS Radio Link Control Performance of UMTS Radio Link Control Qinqing Zhang, Hsuan-Jung Su Bell Laboratories, Lucent Technologies Holmdel, NJ 77 Abstract- The Radio Link Control (RLC) protocol in Universal Mobile Telecommunication

More information

Efficient Transmission of H.264 Video over WLANs

Efficient Transmission of H.264 Video over WLANs Efficient Transmission of H.264 Video over WLANs Yaser P. Fallah March 2007 UBC 1 Multimedia Communications Multimedia applications are becoming increasingly popular Video on mobile devices (cell phones,

More information

Multimedia Networking

Multimedia Networking CE443 Computer Networks Multimedia Networking Behnam Momeni Computer Engineering Department Sharif University of Technology Acknowledgments: Lecture slides are from Computer networks course thought by

More information

Lecture 9. Quality of Service in ad hoc wireless networks

Lecture 9. Quality of Service in ad hoc wireless networks Lecture 9 Quality of Service in ad hoc wireless networks Yevgeni Koucheryavy Department of Communications Engineering Tampere University of Technology yk@cs.tut.fi Lectured by Jakub Jakubiak QoS statement

More information

The Novel HWN on MANET Cellular networks using QoS & QOD

The Novel HWN on MANET Cellular networks using QoS & QOD The Novel HWN on MANET Cellular networks using QoS & QOD Abstract: - Boddu Swath 1 & M.Mohanrao 2 1 M-Tech Dept. of CSE Megha Institute of Engineering & Technology for Women 2 Assistant Professor Dept.

More information

CHAPTER 5. QoS RPOVISIONING THROUGH EFFECTIVE RESOURCE ALLOCATION

CHAPTER 5. QoS RPOVISIONING THROUGH EFFECTIVE RESOURCE ALLOCATION CHAPTER 5 QoS RPOVISIONING THROUGH EFFECTIVE RESOURCE ALLOCATION 5.1 PRINCIPLE OF RRM The success of mobile communication systems and the need for better QoS, has led to the development of 3G mobile systems

More information

different problems from other networks ITU-T specified restricted initial set Limited number of overhead bits ATM forum Traffic Management

different problems from other networks ITU-T specified restricted initial set Limited number of overhead bits ATM forum Traffic Management Traffic and Congestion Management in ATM 3BA33 David Lewis 3BA33 D.Lewis 2007 1 Traffic Control Objectives Optimise usage of network resources Network is a shared resource Over-utilisation -> congestion

More information

A Cross Layer Framework for WLANs: Joint Radio Propagation and MAC Protocol

A Cross Layer Framework for WLANs: Joint Radio Propagation and MAC Protocol A Cross Layer Framework for WLANs: Joint Radio Propagation and MAC Protocol Nurul I. Sarkar School of Computing and Mathematical Sciences, Auckland University of Technology, Auckland, New Zealand nurul.sarkar@aut.ac.nz

More information

ENHANCING THE PERFORMANCE OF MANET THROUGH MAC LAYER DESIGN

ENHANCING THE PERFORMANCE OF MANET THROUGH MAC LAYER DESIGN I J I T E ISSN: 2229-7367 3(1-2), 2012, pp. 19-24 ENHANCING THE PERFORMANCE OF MANET THROUGH MAC LAYER DESIGN 1 R. MANIKANDAN, 2 K. ARULMANI AND 3 K. SELVAKUMAR Department of Computer Science and Engineering,

More information

Multicast and Quality of Service. Internet Technologies and Applications

Multicast and Quality of Service. Internet Technologies and Applications Multicast and Quality of Service Internet Technologies and Applications Aims and Contents Aims Introduce the multicast and the benefits it offers Explain quality of service and basic techniques for delivering

More information

DiffServ Architecture: Impact of scheduling on QoS

DiffServ Architecture: Impact of scheduling on QoS DiffServ Architecture: Impact of scheduling on QoS Abstract: Scheduling is one of the most important components in providing a differentiated service at the routers. Due to the varying traffic characteristics

More information

Ad Hoc Networks: Introduction

Ad Hoc Networks: Introduction Ad Hoc Networks: Introduction Module A.int.1 Dr.M.Y.Wu@CSE Shanghai Jiaotong University Shanghai, China Dr.W.Shu@ECE University of New Mexico Albuquerque, NM, USA 1 Ad Hoc networks: introduction A.int.1-2

More information

Sample solution to Midterm

Sample solution to Midterm College of Computer & Information Science Spring 2007 Northeastern University Handout 10 CSG250: Wireless Networks 27 February 2007 Sample solution to Midterm Part I (4 4 = 16 points) 1. Explain how the

More information

Agenda. What are we looking at? Introduction. Aim of the project. IP Routing

Agenda. What are we looking at? Introduction. Aim of the project. IP Routing Agenda Handoffs in Cellular Wireless Networks: The Daedalus Implementation & Experience by Shrinivasan Seshan, Hari Balakrishnan Randy H. Katz A short presentation by Aishvarya Sharma Dept of Computer

More information

RECOMMENDATION ITU-R BT.1720 *

RECOMMENDATION ITU-R BT.1720 * Rec. ITU-R BT.1720 1 RECOMMENDATION ITU-R BT.1720 * Quality of service ranking and measurement methods for digital video broadcasting services delivered over broadband Internet protocol networks (Question

More information

Effect of Payload Length Variation and Retransmissions on Multimedia in a WLANs

Effect of Payload Length Variation and Retransmissions on Multimedia in a WLANs Effect of Payload Length Variation and Retransmissions on Multimedia in 8.a WLANs Sayantan Choudhury Dept. of Electrical and Computer Engineering sayantan@ece.ucsb.edu Jerry D. Gibson Dept. of Electrical

More information

To address these challenges, extensive research has been conducted and have introduced six key areas of streaming video, namely: video compression,

To address these challenges, extensive research has been conducted and have introduced six key areas of streaming video, namely: video compression, Design of an Application Layer Congestion Control for Reducing network load and Receiver based Buffering Technique for packet synchronization in Video Streaming over the Internet Protocol Mushfeq-Us-Saleheen

More information

Improving Reliable Transport and Handoff Performance in Cellular Wireless Networks

Improving Reliable Transport and Handoff Performance in Cellular Wireless Networks Improving Reliable Transport and Handoff Performance in Cellular Wireless Networks H. Balakrishnan, S. Seshan, and R. H. Katz ACM Wireless Networks Vol. 1, No. 4, pp. 469-482 Dec. 1995 P. 1 Introduction

More information

Collisions & Virtual collisions in IEEE networks

Collisions & Virtual collisions in IEEE networks Collisions & Virtual collisions in IEEE 82.11 networks Libin Jiang EE228a project report, Spring 26 Abstract Packet collisions lead to performance degradation in IEEE 82.11 [1] networks. The carrier-sensing

More information

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)

More information

Quality of Service Mechanism for MANET using Linux Semra Gulder, Mathieu Déziel

Quality of Service Mechanism for MANET using Linux Semra Gulder, Mathieu Déziel Quality of Service Mechanism for MANET using Linux Semra Gulder, Mathieu Déziel Semra.gulder@crc.ca, mathieu.deziel@crc.ca Abstract: This paper describes a QoS mechanism suitable for Mobile Ad Hoc Networks

More information

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking Wireless Challenges 15-441: Computer Networking Lecture 25: Wireless Networking Force us to rethink many assumptions Need to share airwaves rather than wire Don t know what hosts are involved Host may

More information

CERIAS Tech Report A Simulation Study on Multi-Rate Mobile Ad Hoc Networks by G Ding, X Wu, B Bhar Center for Education and Research

CERIAS Tech Report A Simulation Study on Multi-Rate Mobile Ad Hoc Networks by G Ding, X Wu, B Bhar Center for Education and Research CERIAS Tech Report 2004-115 A Simulation Study on Multi-Rate Mobile Ad Hoc Networks by G Ding, X Wu, B Bhar Center for Education and Research Information Assurance and Security Purdue University, West

More information

Module 6 STILL IMAGE COMPRESSION STANDARDS

Module 6 STILL IMAGE COMPRESSION STANDARDS Module 6 STILL IMAGE COMPRESSION STANDARDS Lesson 19 JPEG-2000 Error Resiliency Instructional Objectives At the end of this lesson, the students should be able to: 1. Name two different types of lossy

More information

Advanced Computer Networks

Advanced Computer Networks Advanced Computer Networks QoS in IP networks Prof. Andrzej Duda duda@imag.fr Contents QoS principles Traffic shaping leaky bucket token bucket Scheduling FIFO Fair queueing RED IntServ DiffServ http://duda.imag.fr

More information

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication

More information

Improving the quality of H.264 video transmission using the Intra-Frame FEC over IEEE e networks

Improving the quality of H.264 video transmission using the Intra-Frame FEC over IEEE e networks Improving the quality of H.264 video transmission using the Intra-Frame FEC over IEEE 802.11e networks Seung-Seok Kang 1,1, Yejin Sohn 1, and Eunji Moon 1 1Department of Computer Science, Seoul Women s

More information

Episode 5. Scheduling and Traffic Management

Episode 5. Scheduling and Traffic Management Episode 5. Scheduling and Traffic Management Part 3 Baochun Li Department of Electrical and Computer Engineering University of Toronto Outline What is scheduling? Why do we need it? Requirements of a scheduling

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 10 CMPE 257 Spring'15 1 Student Presentations Schedule May 21: Sam and Anuj May 26: Larissa

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?

More information

Lesson 2-3: The IEEE x MAC Layer

Lesson 2-3: The IEEE x MAC Layer Module 2: Establishing Wireless Connectivity Lesson 2-3: The IEEE 802.11x MAC Layer Lesson Overview This lesson describes basic IEEE 802.11x MAC operation, beginning with an explanation of contention schemes

More information

CIS 632 / EEC 687 Mobile Computing

CIS 632 / EEC 687 Mobile Computing CIS 632 / EEC 687 Mobile Computing TCP in Mobile Networks Prof. Chansu Yu Contents Physical layer issues Communication frequency Signal propagation Modulation and Demodulation Channel access issues Multiple

More information

Week 7: Traffic Models and QoS

Week 7: Traffic Models and QoS Week 7: Traffic Models and QoS Acknowledgement: Some slides are adapted from Computer Networking: A Top Down Approach Featuring the Internet, 2 nd edition, J.F Kurose and K.W. Ross All Rights Reserved,

More information

Issues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study

Issues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study Issues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study M. Tarique, A. Hossain, R. Islam and C. Akram Hossain Dept. of Electrical and Electronic Engineering, American

More information

An Implementation of Cross Layer Approach to Improve TCP Performance in MANET

An Implementation of Cross Layer Approach to Improve TCP Performance in MANET An Implementation of Cross Layer Approach to Improve TCP Performance in MANET 1 Rajat Sharma Pursuing M.tech(CSE) final year from USIT(GGSIPU), Dwarka, New Delhi E-mail address: rajatfit4it@gmail.com 2

More information

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과. Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과 ahn@venus.uos.ac.kr Data Link Layer Goals: understand principles behind data link layer services: error detection, correction sharing a broadcast channel: multiple

More information

A QoS Control Scheme for Voice and Data Services in cdma2000 System

A QoS Control Scheme for Voice and Data Services in cdma2000 System A QoS Control Scheme for Voice and Data Services in cdma System Omneya Issa and Jean-Charles Grégoire INRS-EMT, Place Bonaventure, 8, de la Gauchetière Ouest, bureau 69 Montréal (Québec), H5A 1K6 Canada

More information

MISB EG Motion Imagery Standards Board Engineering Guideline. 24 April Delivery of Low Bandwidth Motion Imagery. 1 Scope.

MISB EG Motion Imagery Standards Board Engineering Guideline. 24 April Delivery of Low Bandwidth Motion Imagery. 1 Scope. Motion Imagery Standards Board Engineering Guideline Delivery of Low Bandwidth Motion Imagery MISB EG 0803 24 April 2008 1 Scope This Motion Imagery Standards Board (MISB) Engineering Guideline (EG) provides

More information

Quality of Service II

Quality of Service II Quality of Service II Patrick J. Stockreisser p.j.stockreisser@cs.cardiff.ac.uk Lecture Outline Common QoS Approaches Best Effort Integrated Services Differentiated Services Integrated Services Integrated

More information

Performance and Evaluation of Integrated Video Transmission and Quality of Service for internet and Satellite Communication Traffic of ATM Networks

Performance and Evaluation of Integrated Video Transmission and Quality of Service for internet and Satellite Communication Traffic of ATM Networks Performance and Evaluation of Integrated Video Transmission and Quality of Service for internet and Satellite Communication Traffic of ATM Networks P. Rajan Dr. K.L.Shanmuganathan Research Scholar Prof.

More information

Wireless Networks (CSC-7602) Lecture 8 (22 Oct. 2007) Seung-Jong Park (Jay) Fair Queueing

Wireless Networks (CSC-7602) Lecture 8 (22 Oct. 2007) Seung-Jong Park (Jay)  Fair Queueing Wireless Networks (CSC-7602) Lecture 8 (22 Oct. 2007) Seung-Jong Park (Jay) http://www.csc.lsu.edu/~sjpark Fair Queueing 2 Today Wireline Queue Drop Wireless Queue Drop 3 Types of Congestion Control Strategies

More information

QoS and System Capacity Optimization in WiMAX Multi-hop Relay Using Flexible Tiered Control Technique

QoS and System Capacity Optimization in WiMAX Multi-hop Relay Using Flexible Tiered Control Technique 2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore QoS and System Capacity Optimization in WiMAX Multi-hop Relay Using Flexible Tiered

More information

Priority Traffic CSCD 433/533. Advanced Networks Spring Lecture 21 Congestion Control and Queuing Strategies

Priority Traffic CSCD 433/533. Advanced Networks Spring Lecture 21 Congestion Control and Queuing Strategies CSCD 433/533 Priority Traffic Advanced Networks Spring 2016 Lecture 21 Congestion Control and Queuing Strategies 1 Topics Congestion Control and Resource Allocation Flows Types of Mechanisms Evaluation

More information

Partial Reliable TCP

Partial Reliable TCP Partial Reliable TCP Yao-Nan Lien and Ming-Han Wu Computer Science Department,National Chengchi University, Taipei, Taiwan, R.O.C. lien@cs.nccu.edu.tw ABSTRACT-Some new information services over IPbased

More information

ADAPTIVE PICTURE SLICING FOR DISTORTION-BASED CLASSIFICATION OF VIDEO PACKETS

ADAPTIVE PICTURE SLICING FOR DISTORTION-BASED CLASSIFICATION OF VIDEO PACKETS ADAPTIVE PICTURE SLICING FOR DISTORTION-BASED CLASSIFICATION OF VIDEO PACKETS E. Masala, D. Quaglia, J.C. De Martin Λ Dipartimento di Automatica e Informatica/ Λ IRITI-CNR Politecnico di Torino, Italy

More information

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5

More information

Real-World Experience with a Mobile Broadband Network

Real-World Experience with a Mobile Broadband Network Real-World Experience with a Mobile Broadband Network Dr. Jin Yang Verizon Wireless jin.yang@ieee.org September 23, 2004 IEEE Communications Society Oakland-East Bay Chapter, CA Outline Introduction Overview

More information

CSCD 433/533 Advanced Networks Spring Lecture 22 Quality of Service

CSCD 433/533 Advanced Networks Spring Lecture 22 Quality of Service CSCD 433/533 Advanced Networks Spring 2016 Lecture 22 Quality of Service 1 Topics Quality of Service (QOS) Defined Properties Integrated Service Differentiated Service 2 Introduction Problem Overview Have

More information

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection: 1 Topics 2 LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS Multiple access: CSMA/CD, CSMA/CA, token passing, channelization LAN: characteristics, i basic principles i Protocol architecture Topologies

More information

CS 268: Computer Networking. Taking Advantage of Broadcast

CS 268: Computer Networking. Taking Advantage of Broadcast CS 268: Computer Networking L-12 Wireless Broadcast Taking Advantage of Broadcast Opportunistic forwarding Network coding Assigned reading XORs In The Air: Practical Wireless Network Coding ExOR: Opportunistic

More information

MAC LAYER. Murat Demirbas SUNY Buffalo

MAC LAYER. Murat Demirbas SUNY Buffalo MAC LAYER Murat Demirbas SUNY Buffalo MAC categories Fixed assignment TDMA (Time Division), CDMA (Code division), FDMA (Frequency division) Unsuitable for dynamic, bursty traffic in wireless networks Random

More information

High-Throughput Multicast Routing Metrics in Wireless Mesh Networks

High-Throughput Multicast Routing Metrics in Wireless Mesh Networks High-Throughput Multicast Routing Metrics in Wireless Mesh Networks Sabyasachi Roy Dimitrios Koutsonikolas Saumitra Das Y. Charlie Hu TR-ECE-05-7 September, 2005 School of Electrical and Computer Engineering

More information

Correct Bluetooth EDR FEC Performance with SEC-DAEC Decoding

Correct Bluetooth EDR FEC Performance with SEC-DAEC Decoding Correct Bluetooth EDR FEC Performance with SEC-DAEC Decoding R. Razavi, M. Fleury and M. Ghanbari By selecting from Bluetooth s Enhanced Data Rate (EDR) packet types according to channel conditions, optimal

More information

Wireless Medium Access Control Protocols

Wireless Medium Access Control Protocols Wireless Medium Access Control Protocols Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 Classification of wireless MAC protocols Wireless

More information

Generic Architecture. EECS 122: Introduction to Computer Networks Switch and Router Architectures. Shared Memory (1 st Generation) Today s Lecture

Generic Architecture. EECS 122: Introduction to Computer Networks Switch and Router Architectures. Shared Memory (1 st Generation) Today s Lecture Generic Architecture EECS : Introduction to Computer Networks Switch and Router Architectures Computer Science Division Department of Electrical Engineering and Computer Sciences University of California,

More information

Reliable Communication using Packet Coding for Underwater Acoustic Channels

Reliable Communication using Packet Coding for Underwater Acoustic Channels Reliable Communication using Packet Coding for Underwater Acoustic Channels Rameez Ahmed and Milica Stojanovic Northeastern University, Boston, MA 02115, USA Email: rarameez@ece.neu.edu, millitsa@ece.neu.edu

More information

CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007

CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007 CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007 Question 344 Points 444 Points Score 1 10 10 2 10 10 3 20 20 4 20 10 5 20 20 6 20 10 7-20 Total: 100 100 Instructions: 1. Question

More information

Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies

Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com Efficient

More information

Multimedia Networking. Network Support for Multimedia Applications

Multimedia Networking. Network Support for Multimedia Applications Multimedia Networking Network Support for Multimedia Applications Protocols for Real Time Interactive Applications Differentiated Services (DiffServ) Per Connection Quality of Services Guarantees (IntServ)

More information

Effectiveness of DSDV Protocol Under Hidden Node Environment

Effectiveness of DSDV Protocol Under Hidden Node Environment Computing For Nation Development, February 25 26, 2010 Bharati Vidyapeeth s Institute of Computer Applications and Management, New Delhi Effectiveness of DSDV Protocol Under Hidden Node Environment Ruchi

More information

HSPA+ Advanced Smart Networks: Multipoint Transmission

HSPA+ Advanced Smart Networks: Multipoint Transmission Qualcomm Incorporated February 2011 Table of Contents 1. Introduction... 1 2. Multipoint HSPA Description... 2 Single Frequency Multipoint HSPA... 2 Dual Frequency Multipoint HSPA... 3 3. Advantages...

More information

TCP PERFORMANCE FOR FUTURE IP-BASED WIRELESS NETWORKS

TCP PERFORMANCE FOR FUTURE IP-BASED WIRELESS NETWORKS TCP PERFORMANCE FOR FUTURE IP-BASED WIRELESS NETWORKS Deddy Chandra and Richard J. Harris School of Electrical and Computer System Engineering Royal Melbourne Institute of Technology Melbourne, Australia

More information