Video Streaming Over Multi-hop Wireless Networks

Size: px
Start display at page:

Download "Video Streaming Over Multi-hop Wireless Networks"

Transcription

1 Video Streaming Over Multi-hop Wireless Networks Hao Wang Dept. of Computer Information System, Cameron University Andras Farago, Subbarayan Venkatesan Dept. of Computer Science, The University of Texas at Dallas P.O. Box 83688, Richardson, TX Abstract In this paper, we considered the problem of transporting layered video over erroneous multi-hop wireless networks and proposed a Distributed System. Our proposed Distributed Scheme is comprised of Distributed Control (DC), Distributed Buffer (DB) and Distributed Error Control schemes. The DC scheme improves the efficiency of the network bandwidth usage and reduces the end-to-end delay of the streaming application. End-to-end delay jitter can be reduced by proper use of the DB nodes buffer. Replacing the traditional FEC and ARQ with our distributed FEC and ARQ scheme reduces the errorprotection overhead and ARQ delay and improves the wireless channel throughput. A Layered Video module is developed in GlomoSim 2.3 for video streaming application. We simulated our Distributed Scheme employing the Layered Video module in GlomoSim 2.3. Our simulation results confirm that QoS of Streaming Video over erroneous multi-hop wireless network can be improved using our proposed Distributed Scheme. I. Introduction Most of the nomadic applications today are built using a single wireless hop to a wired network. In parallel with the single hop model, another type of model, based on radio to radio multi-hopping, has been evolving to serve a growing number of applications, which rely on a rapidly deployable, multi-hop, wireless infrastructure [5]. In this paper, we are addressing the video streaming application over multi-hop wireless networks. In this paper, we considered the problem of transporting layered video over erroneous multi-hop wireless networks and proposed a Distributed Scheme. In our proposed distributed control scheme, a subset of nodes along the streaming path is chosen dynamically as distributed control (DC) nodes. These DC nodes drop the video packets whose timestamps indicate that there is no benefit in further transmission. The early drop scheme saves wireless bandwidth and hence video packets transmitted subsequently experience small end-to-end delays. The DC nodes improve the efficiency of the network bandwidth usage and reduce the end-to-end delay of the streaming application. In the proposed distributed buffer scheme, we pre-select some intermediate nodes as distributed buffer (DB) nodes, which are used to pre-buffer video packets before the video streaming starts. End-toend delay jitter can be reduced by proper use of the DB nodes buffer, and our simulation results confirm this. Video playback quality is very sensitive to wireless channel errors. Traditionally, to deal with the transmission errors in the wireless channel, forward error correction (FEC) is employed at the sender by adding redundancy information to packets before they are transmitted. The receiver manages to decode the erroneous packets relying on redundant FEC codes. If a packet is beyond the FEC error correction capability, ARQ (automatic repeat) is used to handle the retransmission of the corrupted packet all the way from the sender to the receiver [1][2][3]. In our proposed scheme, besides the sender, FEC is also employed at all DB nodes. Each DB node is capable of correcting some error bits by using previously added FEC code and adding new FEC code to the original video packet for further transmission. Employing FEC scheme at each DB node requires the addition of small FEC code to the video packet (to combat wireless channel errors). Therefore the FEC error-protection overhead and overall video bit rate can be reduced. For those video packets which are beyond the error correction capability at a certain DB node, instead of retransmission from the sender, only retransmission from previous DB node is needed. Replacing the traditional FEC and ARQ with our distributed FEC and ARQ scheme reduces the errorprotection overhead and ARQ delay and improves the wireless channel throughput. II. The Distributed System 1. Layered Video Background In the video compression standards, generally, an I frame leads a GOP. All P and B frames of the same GOP basically depend on that I frame. GOP length can be constant or variable. In this chapter, we assume that a new GOP starts when the scene changes.

2 We use layered video coding to encode I, P and B frames into a hierarchy of X, Y and Z layers respectively, shown in Figure 1. We denote the layers of I, P and B frames as {I(BL), I(EL 1 ) I(EL X-1 )}, {P(BL), P(EL 1 ) P(EL Y-1 )} and {B(BL), B(EL 1 ) B(EL Z-1 )}. Values X, Y and Z can be chosen such that each layer of I, P or B frames is of the same size. Since I frame is statically larger (in size) than P frame and P frame is larger than B frame, X Y Z. Each layer of video frame is transmitted in one packet. In ideal scenario (no transmission errors), I, P and B frames can be transmitted in X, Y and Z packets respectively. To reduce the amount of the computation performed at the sender when transmitting, we order packets of each GOP. The sequencing is based on the decoding dependency of all packets. For example, enhancement layer of I frame can only be decoded based on the base layer of the I frame. Base layer of a P frame can not be decoded until the base layer of the related I frame is decoded. Given the video sequence IBBP, the decoding dependency of packets of IB 1 B 2 P 1 can be drawn as a directed graph shown in Figure 2. Assume that X, Y and Z equals to 3, 3 and 2. In the directed graph, each node represents a layer of a certain frame. For example, I(BL) represents base layer of I frame. Directed link from node X i (Y j ) to node X p (Y q ) means that layer Y j of frame X i depends on layer Y q of frame X p. To determine all the dependent packets for a certain packet, find all the paths from node I(BL) to the corresponding node in the graph and every node along each path is a dependent packet. To sequence all the packets of a GOP, we start from node I(BL) on the top. Then order all directly connected nodes in temporal order. We keep doing this until all packets are ordered. Then we have sequenced packets at the sender. The ordered packets for video sequence IB 1 B 2 P 1 are listed below: delay, the DC node early-drops that packet. Otherwise, the DC node forwards it to the next hop. Without these DC nodes, the outdated video packets are still forwarded to the next hop even though they may be no longer useful for the receiver. Precious wireless bandwidth is wasted. The early drop scheme saves the wireless bandwidth so that the video playback quality at the receiver side can be improved. Frame type B frame Z P frame I frame Y X Fig. 1 Layered video of I, P and B frame I(EL1) I(BL) P1(BL) Num of layers I(BL), I(EL 1 ), P 1 (BL), I(EL 2 ), P 1 (EL 1 ), B 1 (BL), B 2 (BL), P 1 (EL 2 ), B 1 (EL), B 2 (EL) 2. Distributed Control Scheme A subset of the nodes along the streaming path from the server to the client is chosen dynamically as the set of distributed control nodes. The DC nodes provide control functions. The DC nodes are used to control network bandwidth usage and QoS of the streaming application and are set up by a self-learning scheme. Each intermediate node periodically checks its wireless link condition. When a node detects severe fading, the node becomes the DC node. The node will keep serving as the control node until the wireless link condition goes back to normal. Each DC node makes decision on whether to drop the recently received video packet or continue to transmit the packet to the destination. When the packet s current delay plus DC node delay threshold exceeds a preset end-to-end I(EL2) P1(EL1) P1(EL2) B1(BL) B2(BL) B1(EL1) B2(EL1) Fig. 2 Dependency graph of frame sequence IB 1 B 2 P 1

3 The early-dropping decision is based on the following criteria: 1) If a packet contains I-frame base layer, the DC node schedules that packet at the head of the forwarding queue and forward it immediately. 2) For all other packets, if the current delay plus DC node delay threshold exceeds the end-to-end delay bound, that packet becomes outdated and is early-dropped. 3) Each DC node keeps a look-up table that stores the correctly received video information of each GOP. The table indicates which layer of which frame is received correctly and what has been ruined. The DC node can drop some layers of P or B frames when the corresponding layers of the dependent I or P frames are not received correctly. To make accurate early-dropping decision, a DC node needs to update its delay threshold frequently, which is critical to packet early-dropping. Inaccurate delay threshold can either unnecessarily drop packets or push some outdated packets into the forwarding queue, resulting in a situation where the receiver either fails to receive video packets or receives outdated video packets. In either case, video playback quality is lowered at the receiver side. Therefore, more accurate the delay threshold of DC node is, better is the video playback quality that can be achieved. The delay threshold of each DC node can be updated by packet timestamps. Before video streaming starts, all intermediate nodes along the path need to be synchronized. Each DC node time-stamps the packet which is located at the head of its forwarding queue. In every t second interval, from the most-recently received video packet, the receiver retrieves all the timestamps marked by intermediate DC nodes. It compares them against its current clock to calculate the delay thresholds for each DC node. The receiver constructs an Update message, which contains the newly-computed delay thresholds for all DC nodes, and sends the Update message along the video streaming path all the way back to the video server. When the Update message is transmitted, each DC node reads the corresponding delay threshold information and updates the delay threshold to be used for later packet early-dropping decision. The variance of the streaming throughput is caused by the variance of wireless link conditions. In order that DC nodes employ accurate delay threshold for packet early drop, the interval t for collecting timestamps at the receiver can be tuned down when larger variance of wireless link throughput exists. The receiver will send Update messages more frequently and each DC node will be able to employ more accurate delay threshold for early-dropping. On the other hand, when a smaller variance appears, the interval t can be tuned up to avoid unnecessary signaling traffic. The variance of the video streaming throughput can be measured by the timestamps of video packets. In our study, propagation delay is assumed to be relatively small and is neglected. Also we assume that all the video packets are of the same size S and all video packets experience similar queuing delays (layer 2 forwarding queuing delay). The variance of delay D reflects the variance of the throughput B. The receiver keeps track of the timestamps of all the received video packets in the current interval and the variance of delay D can be calculated from the timestamp record. The distributed control system early-drops the updated video packets and saves the bandwidth for next significant video packets. However, delay jitter can lower video playback quality even when end-to-end delay can be tolerated by the receiver. To overcome the difficulty of large delay jitter, distributed buffer nodes are introduced next. 3. Distributed Buffer System Large delay jitter is generated when the wireless links experience good-bad state transitions. Traditionally, the video streaming delay jitter can be reduced by prebuffering a large number of video frames at the receiver side. However, in mobile wireless networks, there is no guarantee that a mobile device has enough buffering capacity. In this case, overflow occurs at the receiver buffer and video packets are dropped. In our proposed scheme, we pre-select some intermediate nodes along the video streaming route which have relatively larger buffering and computing capacity as the distributed buffer nodes (DB nodes). At the beginning of video streaming, each DB node fills up its buffer to some extents (say, 5% of the full capacity). Since each DB node has pre-buffered video data, delay jitter can be reduced at each distributed buffer node. From the receiver point of view, the end-to-end jitter is reduced step-by-step by the collaborative work of all the DB nodes. The DB nodes need to signal the streaming server before the streaming application starts. The signal includes the corresponding DB node s buffer capacity and node location. The streaming server then decides how much video data can be pre-stored at each DB node. Upon prebuffering a small amount of video data at pre-selected DB nodes, the video streaming starts. 4. Distributed Error Control In multi-hop wireless networks, video data is transmitted over multiple erroneous wireless links. Traditionally, FEC error correction and ARQ are performed only by the receiver. The receiver tries to use the redundant FEC code to correct the transmission errors in the received video packet. If errors are beyond the error correction capability, ARQ retransmission from the video streaming server to the client is required, even though

4 some of wireless links on the steaming path may be good. In the multi-hop scenario, the traditional FEC error correction needs large FEC codes in order to cope with the worst possible link and ARQ delay is the end-to-end delay from the video streaming server to the client. In our proposed error control scheme, each DB node functions as the traditional receiver regarding how to control transmission errors. First, each DB node tries to correct bit errors in the received video packets. If the packet is error-free or the error bits can be corrected by the previously added FEC code, then the DB node corrects error bits by exploiting the old FEC code and adds new FEC codes (of possibly different length) to the original video packet and forwards the error-protected packet to the downstream node. Therefore, wireless channel errors occurring between two consecutive DB nodes could be corrected by the error detection/correction capability of the downstream DB node. For a heavily corrupted packet beyond the recovering capability of the DB node, ARQ request is initiated by the downstream DB node and the corrupted packet is retransmitted by the upstream DB node. Since each DB node only deals with the channel errors between two consecutive DB nodes, the FEC code is of shorter length than the one used in the traditional FEC in order to achieve the same error correction capability. On the other hand, in respond to the heavily corrupted packet, traditional ARQ scheme retransmits the packet from the video streaming server to the client even through many of the wireless links in the streaming path are very good. Instead of retransmitting over these good wireless links, our distributed FEC/ARQ scheme localizes the retransmission within two consecutive DB nodes. Unnecessary retransmission over good wireless channels is avoided. 5. Cross-Layer Design The proposed distributed scheme can be implemented by careful cross-layer design of the Protocol Stack including layer, Network Layer, Transport Layer and Application layer, shown in Figure 3. Traditionally, upon receiving each frame, an intermediate node of a video streaming traffic removes the header, retrieves source and destination addresses from the header. Based on the destination address, it looks for next hop in its routing table to route the packets to the next hop. The transmission of packets from video streaming source to the destination is accomplished hop by hop. In our proposed distributed control scheme, the flow of video streaming traffic from the video server to the client through intermediate nodes is represented by the Figure3. Instead of processing video streaming traffic only by Physical Layer, Layer and Network Layer at each intermediate node in traditional way, video streaming traffic flows through Physical Layer to Application Layer at each intermediate node in our scheme. At the video server, video data is divided into a sequence of segments. Each segment is encapsulated by application header. The application header contains server ID, starting transmission time, and sequence number. Each encapsulated segment is further encapsulated by header, header, header and transmitted over physical radio link to the intermediate node. Upon receiving data at the physical layer, each intermediate node removes, and headers and retrieves transmission time and sequence number from the application header. The current delay can be computed by the difference between current time and starting transmission time. The current delay is kept at the intermediate node and is refreshed every time a new video segment is received. The intermediate node makes earlydrop decision for received video segments based on their current delay. If the current delay exceeds the delay bound set up by the control protocol, the video segment is earlydropped at the intermediate node. Otherwise, the video segment is encapsulated by,, headers and routed to the next intermediate node. Each video segment needs to pass the early-drop decision at all intermediate nodes before it arrives to the video client. Video client decodes received video data and playback in real-time. The control protocol is used to help intermediate nodes to refresh the delay bound and make early-drop decision. The video client initiates the control protocol by constructing control messages and sending them all the way back to the video server periodically. The control message is routed along the reverse route of video streaming traffic. The video client retrieves transmission time from newly received video segment and computes the end-to-end delay. The end-to-end delay information is used to construct a control message. When the control message is routed to an intermediate node, the end-to-end delay in the control message is retrieved and the delay bound is nothing but a linear function of the difference of end-to-end delay bound and the current delay kept at that intermediate node.

5 APP APP APP APP the starting transmission time included in the video packet header. At the end of simulation, video server reports traditional QoS parameters like packets drop ratio, average end-to-end delay and delay jitter. 3. GlomoSim Simulation Setting Video Server Intermediate Node Figure 3. Cross-Layer Design III. Simulation 1. Video Packet Generation A Layered Video module is developed in GlomoSim 2.3 for video streaming application. We simulated our distributed control and distributed buffer schemes employing the Layered Video module in GlomoSim 2.3. Our Layered Video module is implemented in the application layer of network stack of GlomoSim. The input to the Layered Video module is video profile, which stores packet ID, layer ID, frame ID and timestamp of each video packet. Packet ID is a unique identification for each video packet. Layer ID refers different layer of a certain frame. It only has some fixed integers like, 1, 2 and 3. Layer ID means base layer and Layer ID 1 means enhancement layer 1 and so on. The video profile can be generated prior to simulation given video coding pattern and layering coding scheme. For example, if we choose video coding pattern IBBPBBPBBPBB for GOP and encode I, P and B frame into 4, 2, 1 layer respectively. Then each GOP has 18 ( ) video packets (each packet contains only one layer of a certain frame) and each packet has the same timestamp as that of the frame it belongs to. 2. Video Packet Transmission Intermediate Node Video Client The video packets corresponding to a certain video profile is first ordered before the video streaming starts. The ordering is implemented at video server side based on the traversal algorithm running on the dependency graph. The server passes the ordered packet down along the ///Physical network stack for transmission. Each intermediate node routes the received packets to the next hop. The distributed control nodes reconstruct original video packets from the corresponding packets and it makes early-drop decisions based on the current delay. Current delay can be computed from current local time and The wireless network in the simulation is WLAN. There are 12 nodes in the network in a meter region, shown in Figure 4. There is no movement of nodes in our simulation. We use protocol in layer. The channel has bandwidth 2 Mb/s. The path loss model used in the simulation is two-ray propagation model. The heights of transmitter and receiver antennas are h t and h r, which are preset to 1.5m in our simulation. During the simulation, radio transmission power, radio receiver threshold, antenna gain of transmitter and receiver are unchanged. The transmission power and radio receiver threshold are 15 dbm. Antenna gain of transmitter and receiver are all set to. If the sender is within the radio range of the receiver and the sender successfully access the channel during the transmission period, the packet is regarded as correctly received. The maximum number of link layer retransmission is seven, after which the packet is dropped. protocol is used in the transport layer. meters Wireless Network Topology VBR Traffic CBR Traf f ic meters Figure 4. Wireless Network Topology in Simulation 4. Simulation Result We have multiple VBR and CBR application in the simulation. Multi-hop VBR application carries video streaming application while CBR application is regarded as the background traffic. Background traffic shares the network resource with VBR application. By adjusting the background traffic, the performance of the proposed

6 distributed schemes for VBR application can be studied under different network conditions. The performance of the distributed control scheme is studied by measuring QoS parameters of VBR application. In the first experiment, we compared case of no distributed control scheme with the case of distributed control scheme. The distributed control scheme chose 2ms as the delay bound at the first DC node and 4ms as the delay bound at the second DC node. The experiment result showed that average end-to-end delay and jitter are significantly lowered from 193ms, 13.6ms to 112.5ms and 48.6ms respectively. The cost of employing distributed control scheme is that packet drop ratio is increased from 3.7% to 5.1%, which is still acceptable. In the second experiment, we studied how delay bound of the distributed control node affect performance of VBR application. We found that when the delay bound is increased, the VBR traffic will have smaller packet drop ratio but larger end-to-end delay and delay jitter. The objective of our experiment is to minimize average end-to-end delay and delay jitter of VBR application with the constraint that unsuccessful transmission of video packets must be within a preconfigured packet drop ratio in order to meet certain video playback quality at the client side. By tuning the parameter of delay bound of distributed control node, the objective can be achieved. The simulation result is shown in Figure 5 and Figure 6. IV. Conclusion A Distributed Scheme for layered video transmission over multi-hop wireless networks has been proposed. The DC scheme early-drops outdated video packets. The DB nodes buffers some video packets at intermediate nodes and provides distributed FEC and ARQ scheme to localize error control between two consecutive DB nodes. Simulation results show that Qos of Video Streaming over erroneous multi-hop wireless network can be improved by our proposed Distributed Scheme. video compression standard. [5] C.R.Lin Multimedia transport in multihop wireless networks, IEE Proc.-Communication, vol.145, pp No.5, Oct 1998 Delay(ms) Jitter(ms) Early_Drop Threshold vs. End-to-end Delay Threshold(ms) Early_Drop Threshold vs. Jitter Threshold(ms) Figure 5. Delay and Jitter of Early-drop Scheme 1.2 Early_Drop Threshold vs. Percentage of Early_drop Pkts over Overall Drop Pkts 1 REFERENCES [1] J.Y.Pyun, J.J.Shim, S.J.Ko, S.H.Park, Packet loss resilience for video stream over the Internet IEEE Trans. Consumer Electronics Vol.48 No.3.pp Aug. 22. [2] M.Podolsky, S.McCanne, M.Vetterli soft ARQ for layered streaming video Tech.rep. UCB/CSD , University of California, Computer Science Department, Berkeley, CA, Nov [3] S. Wang, H..Zheng, J.A.Copeland, An error control design for multimedia wireless networks, IEEE Vehicular Technology Conference (VTC2- Spring).Vol, 2 pp , 2, Tokyo. [4] Joan L. Mitchell, William B.Pennebaker, MPEG Percentage Threshold(ms) Figure 6. Packet Drop Ratio of Early-drop Scheme

ELEC 691X/498X Broadcast Signal Transmission Winter 2018

ELEC 691X/498X Broadcast Signal Transmission Winter 2018 ELEC 691X/498X Broadcast Signal Transmission Winter 2018 Instructor: DR. Reza Soleymani, Office: EV 5.125, Telephone: 848 2424 ext.: 4103. Office Hours: Wednesday, Thursday, 14:00 15:00 Slide 1 In this

More information

Module 6 STILL IMAGE COMPRESSION STANDARDS

Module 6 STILL IMAGE COMPRESSION STANDARDS Module 6 STILL IMAGE COMPRESSION STANDARDS Lesson 19 JPEG-2000 Error Resiliency Instructional Objectives At the end of this lesson, the students should be able to: 1. Name two different types of lossy

More information

Data Link Control Protocols

Data Link Control Protocols Protocols : Introduction to Data Communications Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 23 May 2012 Y12S1L07, Steve/Courses/2012/s1/its323/lectures/datalink.tex,

More information

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS 28 CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS Introduction Measurement-based scheme, that constantly monitors the network, will incorporate the current network state in the

More information

Multi-path Forward Error Correction Control Scheme with Path Interleaving

Multi-path Forward Error Correction Control Scheme with Path Interleaving Multi-path Forward Error Correction Control Scheme with Path Interleaving Ming-Fong Tsai, Chun-Yi Kuo, Chun-Nan Kuo and Ce-Kuen Shieh Department of Electrical Engineering, National Cheng Kung University,

More information

Module 10 MULTIMEDIA SYNCHRONIZATION

Module 10 MULTIMEDIA SYNCHRONIZATION Module 10 MULTIMEDIA SYNCHRONIZATION Lesson 36 Packet architectures and audio-video interleaving Instructional objectives At the end of this lesson, the students should be able to: 1. Show the packet architecture

More information

UNIT IV -- TRANSPORT LAYER

UNIT IV -- TRANSPORT LAYER UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission

More information

Wireless Sensornetworks Concepts, Protocols and Applications. Chapter 5b. Link Layer Control

Wireless Sensornetworks Concepts, Protocols and Applications. Chapter 5b. Link Layer Control Wireless Sensornetworks Concepts, Protocols and Applications 5b Link Layer Control 1 Goals of this cha Understand the issues involved in turning the radio communication between two neighboring nodes into

More information

Basics (cont.) Characteristics of data communication technologies OSI-Model

Basics (cont.) Characteristics of data communication technologies OSI-Model 48 Basics (cont.) Characteristics of data communication technologies OSI-Model Topologies Packet switching / Circuit switching Medium Access Control (MAC) mechanisms Coding Quality of Service (QoS) 49

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

Comparison of Shaping and Buffering for Video Transmission

Comparison of Shaping and Buffering for Video Transmission Comparison of Shaping and Buffering for Video Transmission György Dán and Viktória Fodor Royal Institute of Technology, Department of Microelectronics and Information Technology P.O.Box Electrum 229, SE-16440

More information

RECOMMENDATION ITU-R BT.1720 *

RECOMMENDATION ITU-R BT.1720 * Rec. ITU-R BT.1720 1 RECOMMENDATION ITU-R BT.1720 * Quality of service ranking and measurement methods for digital video broadcasting services delivered over broadband Internet protocol networks (Question

More information

UBR Congestion controlled Video Transmission over ATM Eltayeb Omer Eltayeb, Saudi Telecom Company

UBR Congestion controlled Video Transmission over ATM Eltayeb Omer Eltayeb, Saudi Telecom Company UBR Congestion controlled Video Transmission over ATM Eltayeb Omer Eltayeb, Saudi Telecom Company ABSTRACT The ATM unspecified bit rate (UBR) class of service some times referred to as best effort service-

More information

Digital Asset Management 5. Streaming multimedia

Digital Asset Management 5. Streaming multimedia Digital Asset Management 5. Streaming multimedia 2015-10-29 Keys of Streaming Media Algorithms (**) Standards (*****) Complete End-to-End systems (***) Research Frontiers(*) Streaming... Progressive streaming

More information

Multimedia Networking

Multimedia Networking Multimedia Networking 1 Multimedia, Quality of Service (QoS): What is it? Multimedia applications: Network audio and video ( continuous media ) QoS Network provides application with level of performance

More information

CMPE150 Midterm Solutions

CMPE150 Midterm Solutions CMPE150 Midterm Solutions Question 1 Packet switching and circuit switching: (a) Is the Internet a packet switching or circuit switching network? Justify your answer. The Internet is a packet switching

More information

Real-Time Protocol (RTP)

Real-Time Protocol (RTP) Real-Time Protocol (RTP) Provides standard packet format for real-time application Typically runs over UDP Specifies header fields below Payload Type: 7 bits, providing 128 possible different types of

More information

Ad hoc and Sensor Networks Chapter 6: Link layer protocols. Holger Karl

Ad hoc and Sensor Networks Chapter 6: Link layer protocols. Holger Karl Ad hoc and Sensor Networks Chapter 6: Link layer protocols Holger Karl Goals of this chapter Link layer tasks in general Framing group bit sequence into packets/frames Important: format, size Error control

More information

Delay Constrained ARQ Mechanism for MPEG Media Transport Protocol Based Video Streaming over Internet

Delay Constrained ARQ Mechanism for MPEG Media Transport Protocol Based Video Streaming over Internet Delay Constrained ARQ Mechanism for MPEG Media Transport Protocol Based Video Streaming over Internet Hong-rae Lee, Tae-jun Jung, Kwang-deok Seo Division of Computer and Telecommunications Engineering

More information

Final Exam for ECE374 05/03/12 Solution!!

Final Exam for ECE374 05/03/12 Solution!! ECE374: Second Midterm 1 Final Exam for ECE374 05/03/12 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam.

More information

Fathelalem F.Ali Meio University, Nago, Okinawa , Japan Tel: (81) Fax : (81)

Fathelalem F.Ali Meio University, Nago, Okinawa , Japan Tel: (81) Fax : (81) Performance Evaluation of VoIP over Wireless LAN Limbran Sampebatu Meio University, Nago, Okinawa 95-8585, Japan Tel: (8)98-5- Fax : (8)98-5-24 lsampebatu@yahoo.com Fathelalem F.Ali Meio University, Nago,

More information

Analyzing the Receiver Window Modification Scheme of TCP Queues

Analyzing the Receiver Window Modification Scheme of TCP Queues Analyzing the Receiver Window Modification Scheme of TCP Queues Visvasuresh Victor Govindaswamy University of Texas at Arlington Texas, USA victor@uta.edu Gergely Záruba University of Texas at Arlington

More information

Chapter -6 IMPROVED CONGESTION CONTROL MECHANISM FOR REAL TIME DATA TRANSMISSION

Chapter -6 IMPROVED CONGESTION CONTROL MECHANISM FOR REAL TIME DATA TRANSMISSION Chapter -6 IMPROVED CONGESTION CONTROL MECHANISM FOR REAL TIME DATA TRANSMISSION Chapter 6 IMPROVED CONGESTION CONTROL MECHANISM FOR REAL TIME DATA TRANSMISSION 6.1 Introduction Supporting Quality of Service

More information

Impact of transmission errors on TCP performance. Outline. Random Errors

Impact of transmission errors on TCP performance. Outline. Random Errors Impact of transmission errors on TCP performance 1 Outline Impact of transmission errors on TCP performance Approaches to improve TCP performance Classification Discussion of selected approaches 2 Random

More information

CSC 4900 Computer Networks: Multimedia Applications

CSC 4900 Computer Networks: Multimedia Applications CSC 4900 Computer Networks: Multimedia Applications Professor Henry Carter Fall 2017 Last Time What is a VPN? What technology/protocol suite is generally used to implement them? How much protection does

More information

Cross-Layer Perceptual ARQ for H.264 Video Streaming over Wireless Networks

Cross-Layer Perceptual ARQ for H.264 Video Streaming over Wireless Networks Cross-Layer Perceptual ARQ for H.264 Video Streaming over 802.11 Wireless Networks P. Bucciol,G.Davini, E. Masala, E. Filippi and J.C. De Martin IEIIT-CNR / Dipartimento di Automatica e Informatica Politecnico

More information

Subject: Adhoc Networks

Subject: Adhoc Networks ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.

More information

Network Management & Monitoring

Network Management & Monitoring Network Management & Monitoring Network Delay These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) End-to-end

More information

Performance Analysis of the Intertwined Effects between Network Layers for g Transmissions

Performance Analysis of the Intertwined Effects between Network Layers for g Transmissions Performance Analysis of the Intertwined Effects between Network Layers for 802.11g Transmissions Jon Gretarsson, Feng Li, Mingzhe Li, Ashish Samant, Huahui Wu, Mark Claypool and Robert Kinicki WPI Computer

More information

Multi-Hop ARQ 林咨銘 2006/8/24.

Multi-Hop ARQ 林咨銘 2006/8/24. Multi-Hop ARQ 林咨銘 2006/8/24 tmlin@itri.org.tw Outline Introduction Multi-Hop Scenario Multi-Hop Issues Multi-Hop ARQ Schemes Multi-hop ARQ [1] VTC 2005 Spring Relay ARQ[2] VTC 2005 Fall Summary Multi-Hop

More information

Chapter 13 TRANSPORT. Mobile Computing Winter 2005 / Overview. TCP Overview. TCP slow-start. Motivation Simple analysis Various TCP mechanisms

Chapter 13 TRANSPORT. Mobile Computing Winter 2005 / Overview. TCP Overview. TCP slow-start. Motivation Simple analysis Various TCP mechanisms Overview Chapter 13 TRANSPORT Motivation Simple analysis Various TCP mechanisms Distributed Computing Group Mobile Computing Winter 2005 / 2006 Distributed Computing Group MOBILE COMPUTING R. Wattenhofer

More information

Multimedia networked applications: standards, protocols and research trends

Multimedia networked applications: standards, protocols and research trends Multimedia networked applications: standards, protocols and research trends Maria Teresa Andrade FEUP / INESC Porto mandrade@fe.up.pt ; maria.andrade@inescporto.pt http://www.fe.up.pt/~mandrade/ ; http://www.inescporto.pt

More information

Network-Adaptive Video Coding and Transmission

Network-Adaptive Video Coding and Transmission Header for SPIE use Network-Adaptive Video Coding and Transmission Kay Sripanidkulchai and Tsuhan Chen Department of Electrical and Computer Engineering, Carnegie Mellon University, Pittsburgh, PA 15213

More information

Cache and Forward Architecture

Cache and Forward Architecture Cache and Forward Architecture Shweta Jain Research Associate Motivation Conversation between computers connected by wires Wired Network Large content retrieval using wireless and mobile devices Wireless

More information

Performance of UMTS Radio Link Control

Performance of UMTS Radio Link Control Performance of UMTS Radio Link Control Qinqing Zhang, Hsuan-Jung Su Bell Laboratories, Lucent Technologies Holmdel, NJ 77 Abstract- The Radio Link Control (RLC) protocol in Universal Mobile Telecommunication

More information

Analyzation of Automatic Repeat Request (ARQ) Protocols

Analyzation of Automatic Repeat Request (ARQ) Protocols RESEARCH ARTICLE OPEN ACCESS Analyzation of Automatic Repeat Request (ARQ) Protocols 1 Jeshvina.S, 2 Sneha.P, 3 Saraanya.S Final year BCA, Dept of Computer Science New Horizon College Kasturinagar, Bangalore

More information

II. Principles of Computer Communications Network and Transport Layer

II. Principles of Computer Communications Network and Transport Layer II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part

More information

Figure 1: Ad-Hoc routing protocols.

Figure 1: Ad-Hoc routing protocols. Performance Analysis of Routing Protocols for Wireless Ad-Hoc Networks Sukhchandan Lally and Ljiljana Trajković Simon Fraser University Vancouver, British Columbia Canada E-mail: {lally, ljilja}@sfu.ca

More information

CS640: Introduction to Computer Networks. Application Classes. Application Classes (more) 11/20/2007

CS640: Introduction to Computer Networks. Application Classes. Application Classes (more) 11/20/2007 CS640: Introduction to Computer Networks Aditya Akella Lecture 21 - Multimedia Networking Application Classes Typically sensitive to delay, but can tolerate packet loss (would cause minor glitches that

More information

CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007

CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007 CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007 Question 344 Points 444 Points Score 1 10 10 2 10 10 3 20 20 4 20 10 5 20 20 6 20 10 7-20 Total: 100 100 Instructions: 1. Question

More information

Effect of RED and different packet sizes on Multimedia performance over wireless networks

Effect of RED and different packet sizes on Multimedia performance over wireless networks Effect of RED and different packet sizes on Multimedia performance over wireless networks T. Vu TU Ilmenau, Germany Abstract. We consider the adaptation of random early detection (RED) as an active queue

More information

Solutions to Performance Problems in VoIP Over a Wireless LAN

Solutions to Performance Problems in VoIP Over a Wireless LAN Solutions to Performance Problems in VoIP Over a 802.11 Wireless LAN Wei Wang, Soung C. Liew, and VOK Li, Solutions to Performance Problems in VoIP over a 802.11 Wireless LAN, IEEE Transactions On Vehicular

More information

TCP PERFORMANCE FOR FUTURE IP-BASED WIRELESS NETWORKS

TCP PERFORMANCE FOR FUTURE IP-BASED WIRELESS NETWORKS TCP PERFORMANCE FOR FUTURE IP-BASED WIRELESS NETWORKS Deddy Chandra and Richard J. Harris School of Electrical and Computer System Engineering Royal Melbourne Institute of Technology Melbourne, Australia

More information

Real-time and Reliable Video Transport Protocol (RRVTP) for Visual Wireless Sensor Networks (VSNs)

Real-time and Reliable Video Transport Protocol (RRVTP) for Visual Wireless Sensor Networks (VSNs) Real-time and Reliable Video Transport Protocol (RRVTP) for Visual Wireless Sensor Networks (VSNs) Dr. Mohammed Ahmed Abdala, Mustafa Hussein Jabbar College of Information Engineering, Al-Nahrain University,

More information

QoS-Aware IPTV Routing Algorithms

QoS-Aware IPTV Routing Algorithms QoS-Aware IPTV Routing Algorithms Patrick McDonagh, Philip Perry, Liam Murphy. School of Computer Science and Informatics, University College Dublin, Belfield, Dublin 4. {patrick.mcdonagh, philip.perry,

More information

TOPOLOGY CONTROL IN MOBILE AD HOC NETWORKS WITH COOPERATIVE COMMUNICATIONS

TOPOLOGY CONTROL IN MOBILE AD HOC NETWORKS WITH COOPERATIVE COMMUNICATIONS IEEE 2012 Transactions on Wireless Communications, Volume: 9, Issue: 2 TOPOLOGY CONTROL IN MOBILE AD HOC NETWORKS WITH COOPERATIVE COMMUNICATIONS Abstract Cooperative communication has received tremendous

More information

WITH the evolution and popularity of wireless devices,

WITH the evolution and popularity of wireless devices, Network Coding with Wait Time Insertion and Configuration for TCP Communication in Wireless Multi-hop Networks Eiji Takimoto, Shuhei Aketa, Shoichi Saito, and Koichi Mouri Abstract In TCP communication

More information

PROPOSAL OF MULTI-HOP WIRELESS LAN SYSTEM FOR QOS GUARANTEED TRANSMISSION

PROPOSAL OF MULTI-HOP WIRELESS LAN SYSTEM FOR QOS GUARANTEED TRANSMISSION PROPOSAL OF MULTI-HOP WIRELESS LAN SYSTEM FOR QOS GUARANTEED TRANSMISSION Phuc Khanh KIEU, Shinichi MIYAMOTO Graduate School of Engineering, Osaka University 2-1 Yamada-oka, Suita, Osaka, 565-871 JAPAN

More information

Outline 9.2. TCP for 2.5G/3G wireless

Outline 9.2. TCP for 2.5G/3G wireless Transport layer 9.1 Outline Motivation, TCP-mechanisms Classical approaches (Indirect TCP, Snooping TCP, Mobile TCP) PEPs in general Additional optimizations (Fast retransmit/recovery, Transmission freezing,

More information

Parameter Equipment Motivation Monitoring method. Smooth play-out Test stream

Parameter Equipment Motivation Monitoring method. Smooth play-out Test stream IP transport requirements Packet Loss Ratio The ratio between the number of the packets lost in the network total and number the of transmitted packets1. Latency The time interval between initial transmission

More information

Mobile Transport Layer

Mobile Transport Layer Mobile Transport Layer 1 Transport Layer HTTP (used by web services) typically uses TCP Reliable transport between TCP client and server required - Stream oriented, not transaction oriented - Network friendly:

More information

Optimizing IP Networks for Acquisition. Presented by Henry Quintana, Director of Solutions TVU Networks

Optimizing IP Networks for Acquisition. Presented by Henry Quintana, Director of Solutions TVU Networks Optimizing IP Networks for Acquisition Presented by Henry Quintana, Director of Solutions TVU Networks More Content, Less Cost IP-based Infrastructure Limitations All transmission mediums have compromises

More information

Double Feedback Streaming Agent for Real-time Delivery of Media over 3G Wireless Networks

Double Feedback Streaming Agent for Real-time Delivery of Media over 3G Wireless Networks Double Feedback Streaming Agent for Real-time Delivery of Media over 3G Wireless Networks Gene Cheung, Wai-Tian Tan Hewlett-Packard Laboratories Takeshi Yoshimura NTT DoCoMo, Inc. Abstract A network agent

More information

SONY S QOS TECHNOLOGY

SONY S QOS TECHNOLOGY SONY S QOS TECHNOLOGY ACHIEVE LOW-DELAY, HIGH-QUALITY STREAMING OVER MOBILE NETWORKS SONY CORPORATION PROFESSIONAL SOLUTION GROUP The use of high-speed mobile networks including LTE (Long Term Evolution)

More information

Congestion in Data Networks. Congestion in Data Networks

Congestion in Data Networks. Congestion in Data Networks Congestion in Data Networks CS420/520 Axel Krings 1 Congestion in Data Networks What is Congestion? Congestion occurs when the number of packets being transmitted through the network approaches the packet

More information

Introduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15

Introduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15 Introduction to Real-Time Communications Real-Time and Embedded Systems (M) Lecture 15 Lecture Outline Modelling real-time communications Traffic and network models Properties of networks Throughput, delay

More information

Unit 2 Packet Switching Networks - II

Unit 2 Packet Switching Networks - II Unit 2 Packet Switching Networks - II Dijkstra Algorithm: Finding shortest path Algorithm for finding shortest paths N: set of nodes for which shortest path already found Initialization: (Start with source

More information

Reliable Multicast Scheme Based on Busy Signal in Wireless LANs

Reliable Multicast Scheme Based on Busy Signal in Wireless LANs Journal of Modern Science and Technology Vol.2 No.1 March 2014. Pp.18-25 Reliable Multicast Scheme Based on Busy Signal in Wireless LANs Sunmyeng For unicast transmissions, the IEEE 802.11 WLAN MAC (Medium

More information

Mobile Routing : Computer Networking. Overview. How to Handle Mobile Nodes? Mobile IP Ad-hoc network routing Assigned reading

Mobile Routing : Computer Networking. Overview. How to Handle Mobile Nodes? Mobile IP Ad-hoc network routing Assigned reading Mobile Routing 15-744: Computer Networking L-10 Ad Hoc Networks Mobile IP Ad-hoc network routing Assigned reading Performance Comparison of Multi-Hop Wireless Ad Hoc Routing Protocols A High Throughput

More information

TDM Backhaul Over Unlicensed Bands

TDM Backhaul Over Unlicensed Bands White Paper TDM Backhaul Over Unlicensed Bands advanced radio technology for native wireless tdm solution in sub-6 ghz Corporate Headquarters T. +972.3.766.2917 E. sales@radwin.com www.radwin.com PAGE

More information

Last Lecture. Network Architecture: Layers. This Lecture. In the sending host (2) In the sending host

Last Lecture. Network Architecture: Layers. This Lecture. In the sending host (2) In the sending host Chapter 7.B and 7.C Architecture: Layers Prof. Dina Katabi Last Lecture We learned how to share the network infrastructure between many connections/flows We also learned about the implications of the sharing

More information

QoE Characterization for Video-On-Demand Services in 4G WiMAX Networks

QoE Characterization for Video-On-Demand Services in 4G WiMAX Networks QoE Characterization for Video-On-Demand Services in 4G WiMAX Networks Amitabha Ghosh IBM India Research Laboratory Department of Electrical Engineering University of Southern California, Los Angeles http://anrg.usc.edu/~amitabhg

More information

CHAPTER 3 ENHANCEMENTS IN DATA LINK LAYER

CHAPTER 3 ENHANCEMENTS IN DATA LINK LAYER 32 CHAPTER 3 ENHANCEMENTS IN DATA LINK LAYER This proposed work describes the techniques used in the data link layer to improve the performance of the TCP in wireless networks and MANETs. In the data link

More information

Error Control Techniques for Interactive Low-bit Rate Video Transmission over the Internet.

Error Control Techniques for Interactive Low-bit Rate Video Transmission over the Internet. Error Control Techniques for Interactive Low-bit Rate Video Transmission over the Internet. Injong Rhee Department of Computer Science North Carolina State University Video Conferencing over Packet- Switching

More information

CS 457 Multimedia Applications. Fall 2014

CS 457 Multimedia Applications. Fall 2014 CS 457 Multimedia Applications Fall 2014 Topics Digital audio and video Sampling, quantizing, and compressing Multimedia applications Streaming audio and video for playback Live, interactive audio and

More information

CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments

CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments Stream Control Transmission Protocol (SCTP) uses the 32-bit checksum in the common header, by which a corrupted

More information

Chapter 9. Multimedia Networking. Computer Networking: A Top Down Approach

Chapter 9. Multimedia Networking. Computer Networking: A Top Down Approach Chapter 9 Multimedia Networking A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;

More information

Network Layer Enhancements

Network Layer Enhancements Network Layer Enhancements EECS 122: Lecture 14 Department of Electrical Engineering and Computer Sciences University of California Berkeley Today We have studied the network layer mechanisms that enable

More information

Multimedia Networking

Multimedia Networking CE443 Computer Networks Multimedia Networking Behnam Momeni Computer Engineering Department Sharif University of Technology Acknowledgments: Lecture slides are from Computer networks course thought by

More information

Medium Access Protocols

Medium Access Protocols Medium Access Protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division,Code Division, Frequency Division Random partitioning

More information

15-441: Computer Networking. Wireless Networking

15-441: Computer Networking. Wireless Networking 15-441: Computer Networking Wireless Networking Outline Wireless Challenges 802.11 Overview Link Layer Ad-hoc Networks 2 Assumptions made in Internet Host are (mostly) stationary Address assignment, routing

More information

Computer Networking. Reliable Transport. Reliable Transport. Principles of reliable data transfer. Reliable data transfer. Elements of Procedure

Computer Networking. Reliable Transport. Reliable Transport. Principles of reliable data transfer. Reliable data transfer. Elements of Procedure Computer Networking Reliable Transport Prof. Andrzej Duda duda@imag.fr Reliable Transport Reliable data transfer Data are received ordered and error-free Elements of procedure usually means the set of

More information

ES623 Networked Embedded Systems

ES623 Networked Embedded Systems ES623 Networked Embedded Systems Introduction to Network models & Data Communication 16 th April 2013 OSI Models An ISO standard that covers all aspects of network communication is the Open Systems Interconnection

More information

Transport layer issues

Transport layer issues Transport layer issues Dmitrij Lagutin, dlagutin@cc.hut.fi T-79.5401 Special Course in Mobility Management: Ad hoc networks, 28.3.2007 Contents Issues in designing a transport layer protocol for ad hoc

More information

A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver

A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver 1 A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois

More information

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP CS 5520/ECE 5590NA: Network Architecture I Spring 2008 Lecture 13: UDP and TCP Most recent lectures discussed mechanisms to make better use of the IP address space, Internet control messages, and layering

More information

AODV-PA: AODV with Path Accumulation

AODV-PA: AODV with Path Accumulation -PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications

More information

Lecture 9. Quality of Service in ad hoc wireless networks

Lecture 9. Quality of Service in ad hoc wireless networks Lecture 9 Quality of Service in ad hoc wireless networks Yevgeni Koucheryavy Department of Communications Engineering Tampere University of Technology yk@cs.tut.fi Lectured by Jakub Jakubiak QoS statement

More information

TCP/IP-2. Transmission control protocol:

TCP/IP-2. Transmission control protocol: TCP/IP-2 Transmission control protocol: TCP and IP are the workhorses in the Internet. In this section we first discuss how TCP provides reliable, connectionoriented stream service over IP. To do so, TCP

More information

Lec 19 - Error and Loss Control

Lec 19 - Error and Loss Control ECE 5578 Multimedia Communication Lec 19 - Error and Loss Control Zhu Li Dept of CSEE, UMKC Office: FH560E, Email: lizhu@umkc.edu, Ph: x 2346. http://l.web.umkc.edu/lizhu slides created with WPS Office

More information

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dodda Sunitha Dr.A.Nagaraju Dr. G.Narsimha Assistant Professor of IT Dept. Central University

More information

Radio Resource Management for Broadcast Services in OFDMA-Based Networks

Radio Resource Management for Broadcast Services in OFDMA-Based Networks Radio Resource Management for Broadcast Services in OFDMA-Based Networks Patrick Hosein and Thawatt Gopal Huawei Technologies Co., Ltd. 10180 Telesis Court, Suite 365, San Diego, CA 92121, USA Tel: 858.882.0332,

More information

Peer-to-Peer Protocols and Data Link Layer. Chapter 5 from Communication Networks Leon-Gracia and Widjaja

Peer-to-Peer Protocols and Data Link Layer. Chapter 5 from Communication Networks Leon-Gracia and Widjaja Peer-to-Peer Protocols and Data Link Layer Chapter 5 from Communication Networks Leon-Gracia and Widjaja Peer-to-Peer Protocols At each layer two (or more) entities execute These are peer processes For

More information

CSE 123: Computer Networks Alex C. Snoeren. HW 2 due Thursday 10/21!

CSE 123: Computer Networks Alex C. Snoeren. HW 2 due Thursday 10/21! CSE 123: Computer Networks Alex C. Snoeren HW 2 due Thursday 10/21! Finishing up media access Contention-free methods (rings) Moving beyond one wire Link technologies have limits on physical distance Also

More information

CS 641 Project Report Error resilient video transmission over wireless networks. December Gang Ding

CS 641 Project Report Error resilient video transmission over wireless networks. December Gang Ding CS 64 Project Report Error resilient video transmission over wireless networks December 00 Gang Ding Abstract This report proposes a general architecture for error resilient video transmission over mobile

More information

Partial Reliable TCP

Partial Reliable TCP Partial Reliable TCP Yao-Nan Lien and Ming-Han Wu Computer Science Department,National Chengchi University, Taipei, Taiwan, R.O.C. lien@cs.nccu.edu.tw ABSTRACT-Some new information services over IPbased

More information

A study of Skype over IEEE networks: voice quality and bandwidth usage

A study of Skype over IEEE networks: voice quality and bandwidth usage Graduate Theses and Dissertations Graduate College 2011 A study of Skype over IEEE 802.16 networks: voice quality and bandwidth usage Kuan-yu Chen Iowa State University Follow this and additional works

More information

Advances in Efficient Resource Allocation for Packet-Based Real-Time Video Transmission

Advances in Efficient Resource Allocation for Packet-Based Real-Time Video Transmission Advances in Efficient Resource Allocation for Packet-Based Real-Time Video Transmission AGGELOS K. KATSAGGELOS, FELLOW, IEEE, YIFTACH EISENBERG, MEMBER, IEEE, FAN ZHAI, MEMBER, IEEE, RANDALL BERRY, MEMBER,

More information

Department of Computer and IT Engineering University of Kurdistan. Data Communication Netwotks (Graduate level) Data Link Layer

Department of Computer and IT Engineering University of Kurdistan. Data Communication Netwotks (Graduate level) Data Link Layer Department of Computer and IT Engineering University of Kurdistan Data Communication Netwotks (Graduate level) Data Link Layer By: Dr. Alireza Abdollahpouri Data Link Layer 2 Data Link Layer Application

More information

Performance Enhanced Proxy Solutions for Satellite Networks: State of the Art, Protocol Stack and Possible Interfaces

Performance Enhanced Proxy Solutions for Satellite Networks: State of the Art, Protocol Stack and Possible Interfaces Performance Enhanced Proxy Solutions for Satellite Networks: State of the Art, Protocol Stack and Possible s Igor Bisio, Mario Marchese, and Maurizio Mongelli Abstract. There are many types of Performance

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK REVIEW ON CONGESTION CONTROL IN WIRELESS SENSOR NETWORK MR. HARSHAL D. WANKHADE,

More information

RECHOKe: A Scheme for Detection, Control and Punishment of Malicious Flows in IP Networks

RECHOKe: A Scheme for Detection, Control and Punishment of Malicious Flows in IP Networks > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < : A Scheme for Detection, Control and Punishment of Malicious Flows in IP Networks Visvasuresh Victor Govindaswamy,

More information

Mobile Communications Chapter 9: Mobile Transport Layer

Mobile Communications Chapter 9: Mobile Transport Layer Prof. Dr.-Ing Jochen H. Schiller Inst. of Computer Science Freie Universität Berlin Germany Mobile Communications Chapter 9: Mobile Transport Layer Motivation, TCP-mechanisms Classical approaches (Indirect

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

CS244a: An Introduction to Computer Networks

CS244a: An Introduction to Computer Networks Name: Student ID #: Campus/SITN-Local/SITN-Remote? MC MC Long 18 19 TOTAL /20 /20 CS244a: An Introduction to Computer Networks Final Exam: Thursday February 16th, 2000 You are allowed 2 hours to complete

More information

A Quota Transfer Protocol for Upstream Transmissions in Wireless Mesh Networks

A Quota Transfer Protocol for Upstream Transmissions in Wireless Mesh Networks A Quota Transfer Protocol for Upstream Transmissions in Wireless Mesh Networks Yen-Bin Lee and Wen-Shyang Hwang Department of Electrical Engineering, National Kaohsiung University of Applied Sciences,

More information

To address these challenges, extensive research has been conducted and have introduced six key areas of streaming video, namely: video compression,

To address these challenges, extensive research has been conducted and have introduced six key areas of streaming video, namely: video compression, Design of an Application Layer Congestion Control for Reducing network load and Receiver based Buffering Technique for packet synchronization in Video Streaming over the Internet Protocol Mushfeq-Us-Saleheen

More information

Lecture 9 and 10. Source coding for packet networks

Lecture 9 and 10. Source coding for packet networks Lecture 9 and 10 Source coding for packet networks Outline Motivation/situation Source coding (representing the same information with less bits) (extremely short intro) Packet losses: - Packet loss measurements

More information

Enhanced Power Saving Scheme for IEEE DCF Based Wireless Networks

Enhanced Power Saving Scheme for IEEE DCF Based Wireless Networks Enhanced Power Saving Scheme for IEEE 802.11 DCF Based Wireless Networks Jong-Mu Choi, Young-Bae Ko, and Jai-Hoon Kim Graduate School of Information and Communication Ajou University, Republic of Korea

More information

A link layer adaptive pacing scheme for improving throughput of transport protocols in wireless mesh networks

A link layer adaptive pacing scheme for improving throughput of transport protocols in wireless mesh networks Available online at www.sciencedirect.com Computer Networks 52 (28) 1583 162 www.elsevier.com/locate/comnet A link layer adaptive pacing scheme for improving throughput of transport protocols in wireless

More information