A Model for Streaming 3D Meshes and Its Applications
|
|
- Bernard Doyle
- 6 years ago
- Views:
Transcription
1 A Model for Streaming D Meshes and Its Applications ABSTRACT Ong Yuh Shin and Ooi Wei Tsang Department of Computer Science, School of Computing, National University of Singapore In this paper, we present results on the effects of using forward error correction (FEC) with retransmission in the streaming of a progressive mesh. We showed analytically that it does not improve the number of received packets, but improves the number of decodable packets. We also propose a Dynamic FEC protocol, which maximizes the expected increase in number of decodable packets at any point in time. It adapts to loss rate and more importantly, to the packet dependency structure of the mesh. Simulation results show that the proposed scheme can double the number of decodable packets in the early stage of the streaming.. INTRODUCTION Progressively encoded objects are useful for streaming as they provide fine-grained refinements that are more quickly transmitted. However, due to dependencies introduced in the progressive encoding, network losses can cause subsequent refinements to be undecodable. Retransmission is a solution but this causes decoding delay due to the round trip time. Probability of losses can be reduced using forward error correction (FEC), which comes at the cost of increased bandwidth requirements. We have studied the following two issues. Firstly, given that retransmission is necessary, whether FEC is of any use when streaming a progressively encoded mesh. Secondly, if it is useful, what is the optimal FEC rate. We have found that FEC does not improve the number of received packets. However, it can improve the number of decodable packets initially. We propose an online adaptive protocol (Dynamic FEC) for finding the optimal FEC rate, which is designed to adapt to varying dependency structures and loss rates. Simulation results show that during the early stages of the streaming, Dynamic FEC can improve the expected number of decodable packets by 2 times that achieved by a pure retransmission scheme, as in Figure 4(a). An application of this scheme is for D streaming in a virtual environment. When users move, objects move out of view before finer refinements are decoded. FEC protects earlier refinements, but delays the sending of the finer ones. Even so, the viewer is more likely to see a reasonable representation of the object before it moves out of view since the earlier refinements are less likely to be due to FEC s protection. 2. RELATED WORK 2.. Forward Error Correction We use packet-level Reed-Solomon (RS) codes for forward error correction (FEC). The encoding process produces N packets from K input packets. The input packets are contained in the N output packets and are called data packets which containing vertex splits. The Student Supervisor
2 remaining N K packets are FEC packets. The FEC rate is denoted RS(N, K). If at least K packets are received, then all N packets are recoverable. Software implementation of RS codes can be computationally intensive. (Rizzo, 997) shows how such codes can be computed efficiently. The implementation encodes packets at rates of MB/s on a Pentium and decodes them between 6 to 9 MB/s Progressive Mesh Our model applies to the progressive mesh (Hoppe, 996). The encoding process is made up of a series of edge collapse operations, where two adjacent vertices of the mesh are combined into a single vertex. This is repeated until the mesh becomes small enough, resulting in a base mesh. To obtain the original mesh, the base mesh is decoded using vertex splits where a vertex is split into the original two vertices, forming the edge that was previously collapsed, and introducing faces that were removed. Figure (a) shows the results of the edge collapse and vertex split operations. As more vertex splits are decoded, the quality of the mesh improves. Figure (b) shows the Happy Buddha mesh as more and more vertex splits are decoded. vl vs vr edge collapse vl vs vt vertex split vr (a) Vertex split and edge collapse (b) Happy Buddha mesh - improving quality Figure. Progressive mesh and incremental refinements The progressive encoding introduces dependencies between vertex splits. A vertex split is decodable if it is received, and if all vertex splits it depends on have been received. 2.. Progressive Mesh Streaming Streaming of the compressed progressive mesh (Pajarola & Rossignac, 2) (CPM), a variant of the progressive mesh, has been considered in (Alregib, Altunbasak, & Rossignac, 25). The authors proposed using unequal error protection (UEP) which provides more redundancy to the earlier refinements. Simulation shows that UEP with FEC allows more levels of detail in the CPM to be decoded. However, there is no retransmission and refinements stop once packet losses occur. Also, (Cheng, Ooi, Mondet, Grigoras, & Morin, 27) has given an analytical model for streaming progressive meshes, using a retransmission based protocol. They have shown that dependencies have the greatest effect on the number of decodable packets in the initial stages. In the next section, we present a modified version of this protocol that uses FEC.. NETWORK, DEPENDENCIES AND STREAMING Before streaming the refinements of the progressive mesh, the sender packetizes the vertex splits using packetization algorithms (Cheng et al., 27). Each packet can be seen as a
3 set of vertex splits. This creates a packet dependency structure due to the vertex split dependencies. Formally, Definition. A packet dependency graph (Figure 2) is a directed acyclic graph (DAG). Each node represents a packet. A directed edge (u, v) exists if packet v contains vertex split(s) that depend directly on some vertex split(s) in packet u. A packet is decodable if all its ancestors in the packet dependency graph and itself are received Figure 2. Example of a packet dependency graph. We will assume that packet losses are independent and occur with probability p. Negative acknowledgements (NACK) from the receiver are never and the round trip time (RTT) is bounded. The RTT can be represented by T d, the number of unacknowledged packets... Streaming Protocols We compare two protocols - the FEC scheme and the NoFEC scheme. In both schemes, data packets are sent according to their topological order in the packet dependency graph.... FEC Scheme Under the FEC scheme, packets (data and FEC) are sent in batches of fixed size N, where N T d. Each batch is sent with FEC rate RS(N, K), where K N and need not be the same for each batch. We call such a batch of N packets a block. IDs are assigned to blocks, with the first block having ID. If a block is recoverable, all packets are recovered and considered received. Otherwise, the receiver sends a NACK containing the IDs of the data packets. We can also capture the RTT using T d, which denotes the number of unacknowledged blocks. On receiving the NACK, the sender retransmits the packets as soon as possible. Figure (a) shows an instance of the FEC scheme...2. NoFEC Scheme This scheme is the same as that described in (Cheng et al., 27). Packets are streamed continuously. When a packet loss is detected, the receiver replies with a NACK for the packet. On receiving the NACK, the sender retransmits the packet immediately. Figure (b) shows an instance of this scheme. For comparison, we also adopt the notion of a block. Suppose we run both schemes in parallel. For every block in the FEC scheme, the corresponding block in the NoFEC scheme will be the set of N packets sent in the NoFEC scheme during the time which the N packets were sent in the FEC scheme.
4 Block Block Sender 2 FEC FEC Receiver NACK (,) Recover (5) Block Block Sender Receiver NACK () NACK () NACK () (a) FEC Scheme (b) NoFEC Scheme Figure. FEC and NoFEC Schemes 4. EFFECTIVENESS OF FEC We first look at the effect of FEC on the number of received data packets. Theorem. The expected number of received data packets per block under the NoFEC scheme is at least as large as that under the FEC scheme. We also studied the effect of FEC under two extreme cases. The best-case packet dependency graph is an empty graph and all received packets are immediately decodable. A worst-case packet dependency graph is one in which packets are decodable if all packets sent before it are received. Intuitively, the graph has a chain that contains all packets. By Theorem we have that under the best case dependency, the use of FEC does not improve the expected number of decodable packets in any block. Also, using both analytical and simulation approaches, we have Theorem 2. Under the worst case dependencies, the use of FEC can improve the expected number of decodable packets before and after retransmission takes place in the initial stages. 5. ADAPTIVE FEC SCHEME - DYNAMIC FEC Theorem 2 tells us that FEC can improve the number of decodable packets in the intial stages. This leads to the question of what the optimal FEC rate is. Here, we define optimality to be the FEC rate that maximizes the expected increase in number of decodable packets in the next block to be sent. Intuitively, we are trying to increase the quality of the received mesh as quickly as possible. 5.. State of the Sender To capture the increase in number of decodable packets in the next block, we must know the current status of the packets sent and received. The sending time of a packet is the ID of the block in which the packet was last sent ( if not sent). The receiving time of a packet, is the ID of the block in which the packet was received ( if not received). In state j, the sender has sent block j but not block j. It is made up of () a mapping of each packet to its sending and receiving times as known by the sender, (2) the list of blocks sent up to block j with their FEC rates and () a retransmission queue. Given that the system is at state j, the optimal FEC rate for block j is that which maximizes the expected increase in number of decodable packets from block j to block j, measured at the end of each block.
5 5.2. Expected Increase in Number of Decodable Packets To compute this expected increase for each block, we first pick out packets that have a non-zero probability of contributing to this increase. This is the set of potentially decodable packets in block j, denoted S(j). A packet is in this set if it is sent in block j, or is a descendent of some packet(s) in block j, such that after the block is sent, all its ancestors and itself are either received, or are unacknowledged. Suppose some packet i S(j) has n i,j,k ancestors sent in block j T d +k for k T d (one of the T d unacknowledged blocks). Let r i,j,k be the probability that all n i,j,k ancestors are received (or recovered) in this block. Lemma. The probability that n i,j,k ancestors of packet i are received in block j T d +k is r i,j,k = ( p) n i,j,k N n i,j,k x=n K j,k + ( N ni,j,k x ) N K j,k p x ( p) N ni,j,k x + where RS(N, K j,k ) is the FEC rate used the block j T d + k. x= ( ) N p x ( p) N x x Let d i,j be the probability that some potentially decodable packet i S(j) is decodable by the time block j is sent. Theorem. The expected increase in no. of decodable packets from block j to block j, given that the system is in state j and is to send a set of packets P in block j, is E[D j] = T d i S(j) k= With this, we can compute the optimal FEC rate by performing a search on all possible values of K. 6. SIMULATION To compare Dynamic FEC to other possible schemes, we simulated Static FEC, No FEC, and Dynamic FEC. Static FEC finds the optimal FEC rate for block and uses it throughout. No FEC and Dynamic FEC are as described in the previous sections. The simulation was performed under two packet dependency graphs: the worst case, and a binary tree sent in breadth-first order, using N = 2, p =.5. From the second block onwards in the case of the binary tree, due to the breadth-first sending order, packet dependencies in each block resemble the best case in which No FEC is optimal (Theorem ). As for the worst case, by Theorem 2, we expect the FEC schemes to improve the number of decodable packets at least at the start. Figure 4 shows the average total number of decodable packets at the end of each block, measured over iterations, for N = 2, p =.5, T d = 6, T d =. Figure 4(a) represents the results for the worst case, while Figure 4(b) gives that for the binary tree. Our results show that Dynamic FEC is able to perform as well as the better of the two schemes under different situations and is capable of adapting FEC rate to dependency structure. r i,j,k
6 2 8 Static FEC Dynamic FEC No FEC 2 8 Static FEC Dynamic FEC No FEC Avg No. dcdb pkts 2 8 Avg No. dcdb pkts block block (a) Worst case dependency (b) Binary tree dependency Figure 4. Average total number of decodable packets vs. block ID, N = 2, p =.5, T d = 6, T d = 7. CONCLUSION To sum up, FEC does not improve the number of received data packets and is thus not useful under the best-case dependencies. However, it improves the expected number of decodable packets when dependencies exist among packets. With this, we proposed Dynamic FEC which adapts FEC rate to dependencies. An open question that remains is under what network conditions and what dependency structures will FEC necessarily, or sufficiently be useful. Aside from this, Dynamic FEC can easily be extended to cover stronger assumptions. Here, we assumed that all packets contribute equally to the quality of the decoded mesh. However, the model can be extended to give weights to each packet. Last but not least, the proposed scheme need not be restricted to progressive meshes. It is applicable to any progressively encoded data where dependencies are represented by a packet dependency graph. 8. REFERENCES [] Alregib, G., Altunbasak, Y., & Rossignac, J. (25). Error-resilent transmission of d models. ACM Transactions on Graphics, 24(2), April, 25, [2] Cheng, W., Ooi, W. T., Mondet, S., Grigoras, R., & Morin, G. (27). An analytical model for progressive mesh streaming. MULTIMEDIA 7: Proceedings of the 5th international conference on Multimedia (pp ), New York, NY, USA, Sep, 27: ACM. [] Hoppe, H. (996). Progressive meshes. Proceeding of SIGGRAPH 96 (pp. 99 8), New Orleans, USA, August, 996. [4] Pajarola, R., & Rossignac, J. (2). Compressed progressive meshes. Visualization and Computer Graphics, IEEE Transactions on, 6(), Jan-Mar, 2, [5] Rizzo, L. (997). Effective erasure codes for reliable computer communication protocols. ACM Computer Communication Review, 27(2), April, 997, 24 6.
An Analytical Model for Progressive Mesh Streaming. WEI TSANG OOI National University of Singapore
An Analytical Model for Progressive Mesh Streaming WEI TSANG OOI National University of Singapore 1 joint work with Cheng Wei National University of Singapore Sebastian Mondet Romulus Grigoras Geraldine
More informationError-Resilient Transmission of 3D Models
Error-Resilient Transmission of 3D Models Ghassan Al-Regib 1, Yucel Altunbasak 1, and Jarek Rossignac 2 1 Center for Signal and Image Processing Georgia Institute of Technology Atlanta, Georgia, 30332-0250
More informationCommunications Software. CSE 123b. CSE 123b. Spring Lecture 3: Reliable Communications. Stefan Savage. Some slides couresty David Wetherall
CSE 123b CSE 123b Communications Software Spring 2002 Lecture 3: Reliable Communications Stefan Savage Some slides couresty David Wetherall Administrativa Home page is up and working http://www-cse.ucsd.edu/classes/sp02/cse123b/
More informationStrongly Connected Components
Strongly Connected Components Let G = (V, E) be a directed graph Write if there is a path from to in G Write if and is an equivalence relation: implies and implies s equivalence classes are called the
More informationLecture 7: Sliding Windows. CSE 123: Computer Networks Geoff Voelker (guest lecture)
Lecture 7: Sliding Windows CSE 123: Computer Networks Geoff Voelker (guest lecture) Please turn in HW #1 Thank you From last class: Sequence Numbers Sender Receiver Sender Receiver Timeout Timeout Timeout
More informationUNIT IV -- TRANSPORT LAYER
UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission
More informationLec 19 - Error and Loss Control
ECE 5578 Multimedia Communication Lec 19 - Error and Loss Control Zhu Li Dept of CSEE, UMKC Office: FH560E, Email: lizhu@umkc.edu, Ph: x 2346. http://l.web.umkc.edu/lizhu slides created with WPS Office
More informationCSE 123: Computer Networks Alex C. Snoeren. HW 1 due NOW!
CSE 123: Computer Networks Alex C. Snoeren HW 1 due NOW! Automatic Repeat Request (ARQ) Acknowledgements (ACKs) and timeouts Stop-and-Wait Sliding Window Forward Error Correction 2 Link layer is lossy
More informationChannel-Adaptive Error Protection for Scalable Audio Streaming over Wireless Internet
Channel-Adaptive Error Protection for Scalable Audio Streaming over Wireless Internet GuiJin Wang Qian Zhang Wenwu Zhu Jianping Zhou Department of Electronic Engineering, Tsinghua University, Beijing,
More informationLecture 4: CRC & Reliable Transmission. Lecture 4 Overview. Checksum review. CRC toward a better EDC. Reliable Transmission
1 Lecture 4: CRC & Reliable Transmission CSE 123: Computer Networks Chris Kanich Quiz 1: Tuesday July 5th Lecture 4: CRC & Reliable Transmission Lecture 4 Overview CRC toward a better EDC Reliable Transmission
More informationLink Layer: Error detection and correction
Link Layer: Error detection and correction Topic Some bits will be received in error due to noise. What can we do? Detect errors with codes Correct errors with codes Retransmit lost frames Later Reliability
More informationMulti-path Forward Error Correction Control Scheme with Path Interleaving
Multi-path Forward Error Correction Control Scheme with Path Interleaving Ming-Fong Tsai, Chun-Yi Kuo, Chun-Nan Kuo and Ce-Kuen Shieh Department of Electrical Engineering, National Cheng Kung University,
More informationMeasurement Study of Lowbitrate Internet Video Streaming
Measurement Study of Lowbitrate Internet Video Streaming Dmitri Loguinov and Hayder Radha CS Dept at CUNY NY and EE/ECE at MSU. In Proceedings of ACM SIGCOMM Workshop on Internet Measurement November 2002
More informationDirect Link Communication I: Basic Techniques. Data Transmission. ignore carrier frequency, coding etc.
Direct Link Communication I: Basic Techniques Link speed unit: bps abstraction Data Transmission ignore carrier frequency, coding etc. Point-to-point link: wired or wireless includes broadcast case Interested
More informationVideo Streaming with Network Coding
J Sign Process Syst (2) 59:39 333 DOI 7/s265-9-342-7 Video Streaming with Network Coding Kien Nguyen Thinh Nguyen Sen-Ching Cheung Received: 5 February 28 / Revised: 6 September 28 / Accepted: 9 January
More informationEECS 122, Lecture 19. Reliable Delivery. An Example. Improving over Stop & Wait. Picture of Go-back-n/Sliding Window. Send Window Maintenance
EECS 122, Lecture 19 Today s Topics: More on Reliable Delivery Round-Trip Timing Flow Control Intro to Congestion Control Kevin Fall, kfall@cs cs.berkeley.eduedu Reliable Delivery Stop and Wait simple
More informationAdvanced Modulation and Coding Challenges
WHITE PAPER Accelerating from 100GE to 400GE in the Data Center Advanced Modulation and Coding Challenges Ever increasing demands for a connected world with instant data access continues to drive data
More informationRecap. TCP connection setup/teardown Sliding window, flow control Retransmission timeouts Fairness, max-min fairness AIMD achieves max-min fairness
Recap TCP connection setup/teardown Sliding window, flow control Retransmission timeouts Fairness, max-min fairness AIMD achieves max-min fairness 81 Feedback Signals Several possible signals, with different
More informationCSCI-1680 Link Layer Reliability Rodrigo Fonseca
CSCI-1680 Link Layer Reliability Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Last time Physical layer: encoding, modulation Link layer framing Today Getting
More information6.033 Spring 2015 Lecture #11: Transport Layer Congestion Control Hari Balakrishnan Scribed by Qian Long
6.033 Spring 2015 Lecture #11: Transport Layer Congestion Control Hari Balakrishnan Scribed by Qian Long Please read Chapter 19 of the 6.02 book for background, especially on acknowledgments (ACKs), timers,
More informationExercises TCP/IP Networking With Solutions
Exercises TCP/IP Networking With Solutions Jean-Yves Le Boudec Fall 2009 3 Module 3: Congestion Control Exercise 3.2 1. Assume that a TCP sender, called S, does not implement fast retransmit, but does
More informationLecture 7: Flow & Media Access Control"
Lecture 7: Flow & Media Access Control" CSE 123: Computer Networks Alex C. Snoeren HW 2 due next Wednesday! Lecture 7 Overview" Flow control Go-back-N Sliding window Methods to share physical media: multiple
More informationImproving Reliable Transport and Handoff Performance in Cellular Wireless Networks
Improving Reliable Transport and Handoff Performance in Cellular Wireless Networks H. Balakrishnan, S. Seshan, and R. H. Katz ACM Wireless Networks Vol. 1, No. 4, pp. 469-482 Dec. 1995 P. 1 Introduction
More informationThe Transport Layer Reliability
The Transport Layer Reliability CS 3, Lecture 7 http://www.cs.rutgers.edu/~sn4/3-s9 Srinivas Narayana (slides heavily adapted from text authors material) Quick recap: Transport Provide logical communication
More informationWei Wang, Mehul Motani and Vikram srinivasan Department of Electrical & Computer Engineering National University of Singapore, Singapore
Wei Wang, Mehul Motani and Vikram srinivasan Department of Electrical & Computer Engineering National University of Singapore, Singapore CCS '08: Proceedings of the 15th ACM conference on Computer and
More informationCSE 123: Computer Networks
Student Name: PID: UCSD email: CSE 123: Computer Networks Homework 1 Solution (Due 10/12 in class) Total Points: 30 Instructions: Turn in a physical copy at the beginning of the class on 10/10. Problems:
More informationCoding for the Network: Scalable and Multiple description coding Marco Cagnazzo
Coding for the Network: Scalable and Multiple description coding Marco Cagnazzo Overview Examples and motivations Scalable coding for network transmission Techniques for multiple description coding 2 27/05/2013
More informationDirect Link Communication I: Basic Techniques. Data Transmission. ignore carrier frequency, coding etc.
Direct Link Communication I: Basic Techniques Link speed unit: bps abstraction Data Transmission ignore carrier frequency, coding etc. Point-to-point link: wired or wireless includes broadcast case Interested
More informationCRC. Implementation. Error control. Software schemes. Packet errors. Types of packet errors
CRC Implementation Error control An Engineering Approach to Computer Networking Detects all single bit errors almost all 2-bit errors any odd number of errors all bursts up to M, where generator length
More informationSpirale Reversi: Reverse decoding of the Edgebreaker encoding
Spirale Reversi: Reverse decoding of the Edgebreaker encoding Martin Isenburg Jack Snoeyink University of North Carolina at Chapel Hill fisenburg j snoeyinkg@cs.unc.edu Abstract We present a simple linear
More informationAn undirected graph is a tree if and only of there is a unique simple path between any 2 of its vertices.
Trees Trees form the most widely used subclasses of graphs. In CS, we make extensive use of trees. Trees are useful in organizing and relating data in databases, file systems and other applications. Formal
More informationLecture 7: Flow Control"
Lecture 7: Flow Control" CSE 123: Computer Networks Alex C. Snoeren No class Monday! Lecture 7 Overview" Flow control Go-back-N Sliding window 2 Stop-and-Wait Performance" Lousy performance if xmit 1 pkt
More informationDistributed minimum spanning tree problem
Distributed minimum spanning tree problem Juho-Kustaa Kangas 24th November 2012 Abstract Given a connected weighted undirected graph, the minimum spanning tree problem asks for a spanning subtree with
More informationMesh-Based Content Routing Using XML
Outline Mesh-Based Content Routing Using XML Alex C. Snoeren, Kenneth Conley, and David K. Gifford MIT Laboratory for Computer Science Presented by: Jie Mao CS295-1 Fall 2005 2 Outline Motivation Motivation
More informationQuality of Service (QoS) Whitepaper
Quality of Service (QoS) Whitepaper PCS-Series Videoconferencing White Paper www.sonybiz.net/vc Introduction Currently, an estimated 5% of data packets sent over the Internet are lost. In a videoconferencing
More informationLossless Compression Algorithms
Multimedia Data Compression Part I Chapter 7 Lossless Compression Algorithms 1 Chapter 7 Lossless Compression Algorithms 1. Introduction 2. Basics of Information Theory 3. Lossless Compression Algorithms
More informationEpisode 4. Flow and Congestion Control. Baochun Li Department of Electrical and Computer Engineering University of Toronto
Episode 4. Flow and Congestion Control Baochun Li Department of Electrical and Computer Engineering University of Toronto Recall the previous episode Detailed design principles in: The link layer The network
More informationELEC 691X/498X Broadcast Signal Transmission Winter 2018
ELEC 691X/498X Broadcast Signal Transmission Winter 2018 Instructor: DR. Reza Soleymani, Office: EV 5.125, Telephone: 848 2424 ext.: 4103. Office Hours: Wednesday, Thursday, 14:00 15:00 Slide 1 In this
More informationLecture 10: Link layer multicast. Mythili Vutukuru CS 653 Spring 2014 Feb 6, Thursday
Lecture 10: Link layer multicast Mythili Vutukuru CS 653 Spring 2014 Feb 6, Thursday Unicast and broadcast Usually, link layer is used to send data over a single hop between source and destination. This
More informationImproving the quality of H.264 video transmission using the Intra-Frame FEC over IEEE e networks
Improving the quality of H.264 video transmission using the Intra-Frame FEC over IEEE 802.11e networks Seung-Seok Kang 1,1, Yejin Sohn 1, and Eunji Moon 1 1Department of Computer Science, Seoul Women s
More informationWireless Video Transmission: A Single Layer Distortion Optimal Approach
2009 Data Compression Conference Wireless Video Transmission: A Single Layer Distortion Optimal Approach Negar Nejati Homayoun Yousefi zadeh Hamid Jafarkhani Department of EECS University of California,
More informationTopics. TCP sliding window protocol TCP PUSH flag TCP slow start Bulk data throughput
Topics TCP sliding window protocol TCP PUSH flag TCP slow start Bulk data throughput 2 Introduction In this chapter we will discuss TCP s form of flow control called a sliding window protocol It allows
More informationAnalysis of TCP Latency over Wireless Links Supporting FEC/ARQ-SR for Error Recovery
Analysis of TCP Latency over Wireless Links Supporting FEC/ARQ-SR for Error Recovery Raja Abdelmoumen CRISTAL Laboratory, Tunisia Email: Raja.Abdelmoumen@ensi.rnu.tn Chadi Barakat Projet Planète, INRIA-Sophia
More informationAN ABSTRACT OF THE THESIS OF
AN ABSTRACT OF THE THESIS OF Richard Edgecombe for the degree of Master of Science in Computer Science presented on March 17, 2008. Title: An Implementation of a Reliable Broadcast Scheme for 802.11 using
More informationPacket-Level Forward Error Correction in Video Transmission
Packet-Level Forward Error Correction in Video Transmission Matteo Mazzotti, Enrico Paolini, Marco Chiani, Davide Dardari, and Andrea Giorgetti University of Bologna Wireless Communications Laboratory
More informationHybrid Control and Switched Systems. Lecture #17 Hybrid Systems Modeling of Communication Networks
Hybrid Control and Switched Systems Lecture #17 Hybrid Systems Modeling of Communication Networks João P. Hespanha University of California at Santa Barbara Motivation Why model network traffic? to validate
More informationModule 6 STILL IMAGE COMPRESSION STANDARDS
Module 6 STILL IMAGE COMPRESSION STANDARDS Lesson 19 JPEG-2000 Error Resiliency Instructional Objectives At the end of this lesson, the students should be able to: 1. Name two different types of lossy
More informationU.C. Berkeley CS170 : Algorithms Midterm 1 Lecturers: Alessandro Chiesa and Satish Rao September 18, Midterm 1
U.C. Berkeley CS170 : Algorithms Lecturers: Alessandro Chiesa and Satish Rao September 18, 2018 1 Connectivity in Graphs No justification is required on this problem. A B C D E F G H I J (a) (2 points)
More informationError Control Techniques for Interactive Low-bit Rate Video Transmission over the Internet.
Error Control Techniques for Interactive Low-bit Rate Video Transmission over the Internet. Injong Rhee Department of Computer Science North Carolina State University Video Conferencing over Packet- Switching
More informationDiversity Coloring for Distributed Storage in Mobile Networks
Diversity Coloring for Distributed Storage in Mobile Networks Anxiao (Andrew) Jiang and Jehoshua Bruck California Institute of Technology Abstract: Storing multiple copies of files is crucial for ensuring
More informationData Link Layer, Part 5 Sliding Window Protocols. Preface
Data Link Layer, Part 5 Sliding Window Protocols These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make a single machine-readable
More informationAn Unequal Packet Loss Protection Scheme for H.264/AVC Video Transmission
An Unequal Packet Loss Protection Scheme for H.4/AVC Video Transmission Xingjun Zhang, Xiaohong Peng School of Engineering and Applied Science, Aston University Aston Triangle, Birmingham, B4 7ET, UK {x.zhang,
More informationOutline. Basic ARQ schemes. S Capacity enhancement methods for radio interface ARQ Schemes. Classification of error control strategies
ARQ Schemes, March 26 24 ARQ Schemes, March 26 24 2 Outline Classification of error control strategies S-7263 Capacity enhancement methods for radio interface ARQ Schemes Markku Liinaharja March 25, 24
More information40 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 15, NO. 1, JANUARY 2006
40 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 15, NO. 1, JANUARY 2006 Rate-Distortion Optimized Hybrid Error Control for Real-Time Packetized Video Transmission Fan Zhai, Member, IEEE, Yiftach Eisenberg,
More information3-Dimensional Object Modeling with Mesh Simplification Based Resolution Adjustment
3-Dimensional Object Modeling with Mesh Simplification Based Resolution Adjustment Özgür ULUCAY Sarp ERTÜRK University of Kocaeli Electronics & Communication Engineering Department 41040 Izmit, Kocaeli
More informationGraph Algorithms. Andreas Klappenecker. [based on slides by Prof. Welch]
Graph Algorithms Andreas Klappenecker [based on slides by Prof. Welch] 1 Directed Graphs Let V be a finite set and E a binary relation on V, that is, E VxV. Then the pair G=(V,E) is called a directed graph.
More informationUnequal Packet Loss Protected Transmission for FGS Video. Lianji Cheng; Li Song; Songyu Yu
3c7.5 Unequal Packet Loss Protected Transmission for FGS Video Lianji Cheng; Li Song; Songyu Yu Institute of Image communication and Information Processing Shanghai Jiao Tong University Abstract Video
More informationBalanced Trees Part Two
Balanced Trees Part Two Outline for Today Recap from Last Time Review of B-trees, 2-3-4 trees, and red/black trees. Order Statistic Trees BSTs with indexing. Augmented Binary Search Trees Building new
More informationUniversity of Waterloo. Storing Directed Acyclic Graphs in Relational Databases
University of Waterloo Software Engineering Storing Directed Acyclic Graphs in Relational Databases Spotify USA Inc New York, NY, USA Prepared by Soheil Koushan Student ID: 20523416 User ID: skoushan 4A
More informationAnnouncements. IP Forwarding & Transport Protocols. Goals of Today s Lecture. Are 32-bit Addresses Enough? Summary of IP Addressing.
IP Forwarding & Transport Protocols EE 122: Intro to Communication Networks Fall 2007 (WF 4-5:30 in Cory 277) Vern Paxson TAs: Lisa Fowler, Daniel Killebrew & Jorge Ortiz http://inst.eecs.berkeley.edu/~ee122/
More informationTCP Congestion Control
6.033, Spring 2014 TCP Congestion Control Dina Katabi & Sam Madden nms.csail.mit.edu/~dina Sharing the Internet How do you manage resources in a huge system like the Internet, where users with different
More informationTCP Flavors Simulation Evaluations over Noisy Environment
International Journal of Information Engineering and Applications 2018; 1(1): 11-17 http://www.aascit.org/journal/information TCP Flavors Simulation Evaluations over Noisy Environment Elsadig Gamaleldeen
More informationRandom Early Drop with In & Out (RIO) for Asymmetrical Geostationary Satellite Links
Proc. Joint Int l Conf. IEEE MICC 001, LiSLO 001, ISCE 001, Kuala Lumpur, Malaysia Oct 1-4, 001 Random Early Drop with In & Out (RIO) for Asymmetrical Geostationary Satellite Links Tat Chee Wan, Member,
More informationS Capacity enhancement methods for radio interface ARQ Schemes
ARQ Schemes, March 26 2004 1 S-72.630 Capacity enhancement methods for radio interface ARQ Schemes Markku Liinaharja March 25, 2004 ARQ Schemes, March 26 2004 2 Outline Classification of error control
More informationNotes slides from before lecture. CSE 21, Winter 2017, Section A00. Lecture 10 Notes. Class URL:
Notes slides from before lecture CSE 21, Winter 2017, Section A00 Lecture 10 Notes Class URL: http://vlsicad.ucsd.edu/courses/cse21-w17/ Notes slides from before lecture Notes February 13 (1) HW5 is due
More informationEfficiency Optimisation Of Tor Using Diffie-Hellman Chain
Efficiency Optimisation Of Tor Using Diffie-Hellman Chain Kun Peng Institute for Infocomm Research, Singapore dr.kun.peng@gmail.com Abstract Onion routing is the most common anonymous communication channel.
More informationAd hoc and Sensor Networks Chapter 6: Link layer protocols. Holger Karl
Ad hoc and Sensor Networks Chapter 6: Link layer protocols Holger Karl Goals of this chapter Link layer tasks in general Framing group bit sequence into packets/frames Important: format, size Error control
More informationMultimedia Networking ECE 599
Multimedia Networking ECE 599 Prof. Thinh Nguyen School of Electrical Engineering and Computer Science Based on B. Lee s lecture notes. 1 Outline Compression basics Entropy and information theory basics
More informationThe Data Link Layer Chapter 3
The Data Link Layer Chapter 3 Data Link Layer Design Issues Error Detection and Correction Elementary Data Link Protocols Sliding Window Protocols Example Data Link Protocols Revised: August 2011 & February
More informationSONY S QOS TECHNOLOGY
SONY S QOS TECHNOLOGY ACHIEVE LOW-DELAY, HIGH-QUALITY STREAMING OVER MOBILE NETWORKS SONY CORPORATION PROFESSIONAL SOLUTION GROUP The use of high-speed mobile networks including LTE (Long Term Evolution)
More informationMesh Repairing and Simplification. Gianpaolo Palma
Mesh Repairing and Simplification Gianpaolo Palma Mesh Repairing Removal of artifacts from geometric model such that it becomes suitable for further processing Input: a generic 3D model Output: (hopefully)a
More informationAnalyzing Multi-Channel Medium Access Control Schemes With ALOHA Reservation
Analyzing Multi-Channel Medium Access Control Schemes With ALOHA Reservation Yunghsiang S. Han, Jing Deng and Zygmunt J. Haas Graduate Institute of Communication Engineering National Taipei University,
More informationByzantine Consensus in Directed Graphs
Byzantine Consensus in Directed Graphs Lewis Tseng 1,3, and Nitin Vaidya 2,3 1 Department of Computer Science, 2 Department of Electrical and Computer Engineering, and 3 Coordinated Science Laboratory
More informationLecture 5: Flow Control. CSE 123: Computer Networks Alex C. Snoeren
Lecture 5: Flow Control CSE 123: Computer Networks Alex C. Snoeren Pipelined Transmission Sender Receiver Sender Receiver Ignored! Keep multiple packets in flight Allows sender to make efficient use of
More informationTCP Congestion Control
TCP Congestion Control What is Congestion The number of packets transmitted on the network is greater than the capacity of the network Causes router buffers (finite size) to fill up packets start getting
More informationTCP Congestion Control
What is Congestion TCP Congestion Control The number of packets transmitted on the network is greater than the capacity of the network Causes router buffers (finite size) to fill up packets start getting
More informationLecture 6: Multicast
Lecture 6: Multicast Challenge: how do we efficiently send messages to a group of machines? Need to revisit all aspects of networking Last time outing This time eliable delivery Ordered delivery Congestion
More informationRequest for Comments: 5109 December 2007 Obsoletes: 2733, 3009 Category: Standards Track. RTP Payload Format for Generic Forward Error Correction
Network Working Group A. Li, Ed. Request for Comments: 5109 December 2007 Obsoletes: 2733, 3009 Category: Standards Track RTP Payload Format for Generic Forward Error Correction Status of This Memo This
More informationTransport Layer PREPARED BY AHMED ABDEL-RAOUF
Transport Layer PREPARED BY AHMED ABDEL-RAOUF TCP Flow Control TCP Flow Control 32 bits source port # dest port # head len sequence number acknowledgement number not used U A P R S F checksum Receive window
More informationCSCI-1680 Link Layer Reliability John Jannotti
CSCI-1680 Link Layer Reliability John Jannotti Based partly on lecture notes by David Mazières, Phil Levis, Rodrigo Fonseca Roadmap Last time Physical layer: encoding, modulation Link layer framing Today
More informationPrinciples of Reliable Data Transfer
Principles of Reliable Data Transfer 1 Reliable Delivery Making sure that the packets sent by the sender are correctly and reliably received by the receiver amid network errors, i.e., corrupted/lost packets
More information4. Error correction and link control. Contents
//2 4. Error correction and link control Contents a. Types of errors b. Error detection and correction c. Flow control d. Error control //2 a. Types of errors Data can be corrupted during transmission.
More informationTCP Over SoNIC. Xuke Fang Cornell University. XingXiang Lao Cornell University
TCP Over SoNIC Xuke Fang Cornell University XingXiang Lao Cornell University ABSTRACT SoNIC [1], a Software-defined Network Interface Card, which provides the access to the physical layer and data link
More informationCS144: Intro to Computer Networks Homework 1 Scan and submit your solution online. Due Friday January 30, 4pm
CS144: Intro to Computer Networks Homework 1 Scan and submit your solution online. Due Friday January 30, 2015 @ 4pm Your Name: SUNet ID: @stanford.edu Check if you would like exam routed back via SCPD:
More informationRecommended Readings
Lecture 11: Media Adaptation Scalable Coding, Dealing with Errors Some slides, images were from http://ip.hhi.de/imagecom_g1/savce/index.htm and John G. Apostolopoulos http://www.mit.edu/~6.344/spring2004
More informationSolutions to relevant spring 2000 exam problems
Problem 2, exam Here s Prim s algorithm, modified slightly to use C syntax. MSTPrim (G, w, r): Q = V[G]; for (each u Q) { key[u] = ; key[r] = 0; π[r] = 0; while (Q not empty) { u = ExtractMin (Q); for
More informationAdaptive Forward Error Correction for Real-time Internet Video
Adaptive Forward Error Correction for Real-time Internet Video Mathias Johanson Alkit Communications Sallarängsbacken 2 S-431 37 Mölndal, Sweden mathias@alkit.se Abstract Real-time video communication
More informationICS 451: Today's plan. Sliding Window Reliable Transmission Acknowledgements Windows and Bandwidth-Delay Product Retransmission Timers Connections
ICS 451: Today's plan Sliding Window Reliable Transmission Acknowledgements Windows and Bandwidth-Delay Product Retransmission Timers Connections Alternating Bit Protocol: throughput tied to latency with
More informationRPT: Re-architecting Loss Protection for Content-Aware Networks
RPT: Re-architecting Loss Protection for Content-Aware Networks Dongsu Han, Ashok Anand ǂ, Aditya Akella ǂ, and Srinivasan Seshan Carnegie Mellon University ǂ University of Wisconsin-Madison Motivation:
More informationWireless Sensornetworks Concepts, Protocols and Applications. Chapter 5b. Link Layer Control
Wireless Sensornetworks Concepts, Protocols and Applications 5b Link Layer Control 1 Goals of this cha Understand the issues involved in turning the radio communication between two neighboring nodes into
More informationOutline Computer Networking. TCP slow start. TCP modeling. TCP details AIMD. Congestion Avoidance. Lecture 18 TCP Performance Peter Steenkiste
Outline 15-441 Computer Networking Lecture 18 TCP Performance Peter Steenkiste Fall 2010 www.cs.cmu.edu/~prs/15-441-f10 TCP congestion avoidance TCP slow start TCP modeling TCP details 2 AIMD Distributed,
More informationFEC Performance in Large File Transfer over Bursty Channels
FEC Performance in Large File Transfer over Bursty Channels Shuichiro Senda, Hiroyuki Masuyama, Shoji Kasahara and Yutaka Takahashi Graduate School of Informatics, Kyoto University, Kyoto 66-85, Japan
More informationDepartment of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGY Spring Quiz III
6.02 Spring 2010, Quiz 3 Page 1 of 11 Name: Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.02 Spring 2010 Quiz III There are 12 questions (many with multiple
More informationCongestion Control. Brighten Godfrey CS 538 January Based in part on slides by Ion Stoica
Congestion Control Brighten Godfrey CS 538 January 31 2018 Based in part on slides by Ion Stoica Announcements A starting point: the sliding window protocol TCP flow control Make sure receiving end can
More informationTo address these challenges, extensive research has been conducted and have introduced six key areas of streaming video, namely: video compression,
Design of an Application Layer Congestion Control for Reducing network load and Receiver based Buffering Technique for packet synchronization in Video Streaming over the Internet Protocol Mushfeq-Us-Saleheen
More informationLecture 4 September 17
CS 559: Algorithmic Aspects of Computer Networks Fall 2007 Lecture 4 September 17 Lecturer: John Byers BOSTON UNIVERSITY Scribe: Sowmya Manjanatha In today s lecture, we discussed and characterized the
More informationDetecting negative cycles with Tarjan s breadth-first scanning algorithm
Detecting negative cycles with Tarjan s breadth-first scanning algorithm Tibor Ásványi asvanyi@inf.elte.hu ELTE Eötvös Loránd University Faculty of Informatics Budapest, Hungary Abstract The Bellman-Ford
More informationCongestion Control in TCP
Congestion Control in TCP Antonio Carzaniga Faculty of Informatics University of Lugano May 6, 2005 Outline Intro to congestion control Input rate vs. output throughput Congestion window Congestion avoidance
More informationLecture 2. 1 Introduction. 2 The Set Cover Problem. COMPSCI 632: Approximation Algorithms August 30, 2017
COMPSCI 632: Approximation Algorithms August 30, 2017 Lecturer: Debmalya Panigrahi Lecture 2 Scribe: Nat Kell 1 Introduction In this lecture, we examine a variety of problems for which we give greedy approximation
More informationAnalyzing the Peeling Decoder
Analyzing the Peeling Decoder Supplemental Material for Advanced Channel Coding Henry D. Pfister January 5th, 01 1 Introduction The simplest example of iterative decoding is the peeling decoder introduced
More information