UDP-Lite Enhancement Through Checksum Protection

Similar documents
Energy consumption model on WiMAX subscriber station

Optimizing the hotspot performances by using load and resource balancing method

Measuring the power consumption of social media applications on a mobile device

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print,

Minimizing Energy Consumption on Mobile Phone by Rearranging Transport Protocol Load

Module 7 Internet And Internet Protocol Suite

Multi-path Forward Error Correction Control Scheme with Path Interleaving

MITIGATING THE EFFECT OF PACKET LOSSES ON REAL-TIME VIDEO STREAMING USING PSNR AS VIDEO QUALITY ASSESSMENT METRIC ABSTRACT

Audio/Video Transport Working Group. Document: draft-miyazaki-avt-rtp-selret-01.txt. RTP Payload Format to Enable Multiple Selective Retransmissions

OSI Network Layer. Network Fundamentals Chapter 5. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

ADAPTIVE PICTURE SLICING FOR DISTORTION-BASED CLASSIFICATION OF VIDEO PACKETS

Adapting TCP Segment Size in Cellular Networks

Achieving QOS Guarantee s over IP Networks Using Differentiated Services

Monitoring and Indentification Packet in Wireless With Deep Packet Inspection Method

UDP Lite for Real Time Multimedia Applications

Improving the quality of H.264 video transmission using the Intra-Frame FEC over IEEE e networks

Need For Protocol Architecture

Need For Protocol Architecture

CS 641 Project Report Error resilient video transmission over wireless networks. December Gang Ding

Data Link Layer (1) Networked Systems 3 Lecture 6

Survey on Concurrent Multipath Scheduling for Real Time Video Streaming in Wireless Network

Streaming Video and Throughput Uplink and Downlink

Business Data Networks and Security 10th Edition by Panko Test Bank

Experience with SDI Contribution over IP Network

ELEC 691X/498X Broadcast Signal Transmission Winter 2018

RSVP Support for RTP Header Compression, Phase 1

Partial Reliable TCP

Internet Protocol version 6

MA5400 IP Video Gateway. Introduction. Summary of Features

Optimal Estimation for Error Concealment in Scalable Video Coding

precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level)

Data and Computer Communications

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061. Lecture 2. Internetworking IPv4, IPv6

Background: IP Protocol Stack

The Performance of MANET Routing Protocols for Scalable Video Communication

Multimedia. Multimedia Networks and Applications

RECOMMENDATION ITU-R BT.1720 *

Effect of SCTP Multistreaming over Satellite Links

Chapter 9. Multimedia Networking. Computer Networking: A Top Down Approach

Robust IP and UDP-lite header recovery for packetized multimedia transmission

Introduction to Networked Multimedia An Introduction to RTP p. 3 A Brief History of Audio/Video Networking p. 4 Early Packet Voice and Video

Analysis of Packet-Level Forward Error Correction for Video Transmission

(a) Figure 1: Inter-packet gaps between data packets. (b)

Digital Asset Management 5. Streaming multimedia

Chapter 5 OSI Network Layer

Network-Adaptive Video Coding and Transmission

ETSF10 Internet Protocols Transport Layer Protocols

IEEE P Working Group for Wireless Personal Area Networks TM

Internetwork Protocols

Transport protocols Introduction

CS 218 F Nov 3 lecture: Streaming video/audio Adaptive encoding (eg, layered encoding) TCP friendliness. References:

Cross-Layer Optimization for Efficient Delivery of Scalable Video over WiMAX Lung-Jen Wang 1, a *, Chiung-Yun Chang 2,b and Jen-Yi Huang 3,c

Request for Comments: 5109 December 2007 Obsoletes: 2733, 3009 Category: Standards Track. RTP Payload Format for Generic Forward Error Correction

Experimental Evaluation of Large Scale WiFi Multicast Rate Control

QoE Characterization for Video-On-Demand Services in 4G WiMAX Networks

CompSci 356: Computer Network Architectures. Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch & 3.2. Xiaowei Yang

Transporting Voice by Using IP

Transport Layer. Gursharan Singh Tatla. Upendra Sharma. 1

AN ENGINEER S GUIDE TO TMoIP

5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A

Samara State Aerospace University, 2011

Optimization Model of K-Means Clustering Using Artificial Neural Networks to Handle Class Imbalance Problem

Packet-Level Forward Error Correction in Video Transmission

2 Framework of The Proposed Voice Quality Assessment System

Chapter 5 End-to-End Protocols

CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments

Computer Networks (Unit wise Questions)

Impact of Voice Coding in Performance of VoIP

Load balancing factor using greedy algorithm in the routing protocol for improving internet access

CSE 461 MIDTERM REVIEW

Performance Evaluation of CoAP and UDP using NS-2 for Fire Alarm System

Lecture 3: The Transport Layer: UDP and TCP

CS640: Introduction to Computer Networks. Application Classes. Application Classes (more) 11/20/2007

CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 6 OSI MODEL TRANSPORT LAYER

Real-time and Reliable Video Transport Protocol (RRVTP) for Visual Wireless Sensor Networks (VSNs)

Implementation and Evaluation of Transport Layer Protocol Executing Error Correction (ECP)

A Review of IP Packet Compression Techniques

TCP/IP and the OSI Model

II. Principles of Computer Communications Network and Transport Layer

Network dimensioning for voice over IP

CS519: Computer Networks. Lecture 9: May 03, 2004 Media over Internet

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Impact of Voice Payload Size on Behaviour of the Field Network of the Armed Forces of the Czech Republic

Internet. 1) Internet basic technology (overview) 3) Quality of Service (QoS) aspects

SSL/TLS Vulnerability Detection Using Black Box Approach

Chapter 5 Network Layer

CS 4390 Computer Networks. Transport Services and Protocols

A Simulation Study on the Performance of Hierarchical Mobile IPv6

[MS-ICE2]: Interactive Connectivity Establishment (ICE) Extensions 2.0

Performance of UMTS Radio Link Control

Request for Comments: 2004 Category: Standards Track October Minimal Encapsulation within IP. Status of This Memo

TCP /IP Fundamentals Mr. Cantu

Part 5: Link Layer Technologies. CSE 3461: Introduction to Computer Networking Reading: Chapter 5, Kurose and Ross

CODING METHOD FOR EMBEDDING AUDIO IN VIDEO STREAM. Harri Sorokin, Jari Koivusaari, Moncef Gabbouj, and Jarmo Takala

Multimedia Networking

Chapter 6. What happens at the Transport Layer? Services provided Transport protocols UDP TCP Flow control Congestion control

Lecture 2 Communication services The Trasport Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Subject: Adhoc Networks

Multimedia Networking

GUARANTEED END-TO-END LATENCY THROUGH ETHERNET

Transcription:

IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS UDP-Lite Enhancement Through Checksum Protection To cite this article: Suherman et al 2017 IOP Conf. Ser.: Mater. Sci. Eng. 180 012146 View the article online for updates and enhancements. This content was downloaded from IP address 46.3.197.23 on 12/01/2018 at 16:06

International Conference on Recent Trends in Physics 2016 (ICRTP2016) Journal of Physics: Conference Series 755 (2016) 011001 doi:10.1088/1742-6596/755/1/011001 UDP-Lite Enhancement Through Checksum Protection Suherman*, H Abdurrahman, O S Sitompul and N Mubarakah Electrical Engineering Department, University of Sumatera Utara *suherman@usu.ac.id Abstract. UDP drops packet when checksum bits in header does not match the checksum bits calculated from the receive data. UDP-Late improves UDP by using partial checksum coverage. However, checksum error in both UDP and UDP-Lite headers is potentially leading to wrong decision in dropping part(s) of packet. This article proposes protocol to avoid the problem by using Forward Error Correction (FEC) code to protect checksum bits. The evaluation results show that the number of the received bytes increases up to 0.3% compared to UDP-Lite, which leads to 3 db increment of the received image quality. 1. Introduction Checksum is a method to detect bit error within a bit sequence. Basically, checksum adds the bit sequence and folds the results up to 16 digits. User Datagram Protocol (UDP) [1] employs checksum to check error within its packets. If error exists, packet is discharged. On the other hand, many multimedia codecs allow information with error(s) to be decoded. Dropping packets caused by checksum error is not suitable for multimedia applications. Therefore, checksum is often ignored and left empty by using zero padding. However, Internet Protocol version 6 (IPv6) does not allow zero padding on checksum [2], so that UDP should activate the checksum field. The UDP-Lite [3] tackles UDP problem by reducing checksum coverage only for sensitive data which potentially degrades encoding process if error occurred. The UDP-Lite replaces length field on UDP header to be coverage field. Length field in UDP means the number of octets of all UDP data, while coverage field in UDP-Lite means the octet position of data which is covered by the checksum. There is a research to improve UDP-Lite performance by adding the same functionality in medium access layer (MAC) which is referred as to mac_lite [4]. The mac_lite treats voice as a priority which removes the MAC layer checksum on voice packets but applies checksum to other types of traffics. Even though it improves UDP-Lite, the mac_lite works only in a single link, depending on the type of mac. If the mac_lite is implemented on all links, the mac_lite potentially degrades the overall performances as each link is busy with error corrections. Furthermore, the mac_lite works in MAC layer, UDP-Lite is on transport layer. Alfredsson [5] implements UDP-Lite idea on TCP. TCP-lite intercepts the received data to determine acknowledgement packet be sent or not. However, TCP_lite is a reliable protocol for connection oriented application, while UDP-Lite is an unreliable protocol for connectionless application. This paper focuses on UDP-Lite improvement by avoiding error in checksum bits. Schmidt et al [6] proofs that there is a significant error percentage within UDP header. An error on checksum bits may lead wrong decision on dropping parts of packet. This weakness exists on both UDP and UDP-Lite. On the other hand, length field on UDP header is not fully used by the coverage bits of UDP-Lite [7], this empty space can be used for UDP-Lite improvement purpose. As far as the study has been done, there is no work improving Content from this work may be used under the terms of the Creative Commons Attribution 3.0 licence. Any further distribution of this work must maintain attribution to the author(s) and the title of the work, journal citation and DOI. Published under licence by Ltd 1

UDP and UDP-Lite by protecting checksum header using Forward Error Correction (FEC) code. This article is expected to fill the gap. 2. Proposed Method In order to avoid performance degradation from the wrong decision of dropping part(s) of UDP-Lite packet that is covered by the checksum bits; this paper proposes the use of FEC code for protecting checksum bits. For evaluation purpose, this article employs Hamming code. The addition of FEC code within UDP-Lite generates redundant or parity bits. However, as aforementioned in Section II, the coverage field on UDP-Lite does not use the whole space of length field; this article allocates the space for FEC redundant bits. 3. Research Method In order to evaluate the proposed method impact to the streamed data, this article employs NS-2 simulator with network configuration as depicted in Figure 1. The evaluated traffic is taken from akiyo_cif.yuv, encoded using MPEG4 with bitrates 540 Kbps. The 802.11 media is used to introduce error about 5%, 10% and 15%. Constant bit rate (CBR) traffic is employed as background traffic. Figure 1. Simulated Network The performance metrics are the average of delay, packet loss, throughput and PSNR (Peak Signal to Noise Ratio). The proposed protocol is compared to UDP and UDP-Lite. All protocols employ checksum on their payload. a. Delay for error probability of 5% b. Delay for error probability of 10% c. Delay for error probability of 15% Figure 2. Delay Characteristics 2

4. Results and Analysis 4.1. Delay and Jitter Delay characteristics are shown in Figure 2 for each error probability. Protocols delays vary around 45 ms. All protocols have almost similar delay. UDP-Lite and the proposed improvement have more stable jitter than UDP (Figure 3). UDP jitter is more than 8 ms, while UDP-Lite and the proposed one are less than 8 ms. Figure 3. Jitter Figure 4. Packet Loss 4.2. Packet Loss UDP drops packet once it detects checksum error. Packet will be discharged even there is only 1 bit error. It causes UDP experience tremendous packet loss. The UDP packet loss achieves 4.8% for link error rate 5%. The loss increases linearly to link error, which causes UDP suffer 9.25% and 14.64% for link error 10% and 15% (Figure 4). On the other hand, UDP-Lite is successfully reducing packet loss up to 0.09%, 0.71% and 0.09% subsequently for link error 5%, 10% and 15%. Since UDP-Lite has the capability of avoiding drop packets, checksum error only causes byte reduction in packet. 3

The proposed protocol is able to improve UDP-Lite further as the proposed protocol avoids misinterpretation of the checksum error. Packet loss of the proposed protocol is stable around 0.09% for all link error values. Figure 5. Throughput 4.3. Throughput and PSNR UDP-Lite drops part(s) of the received packet when checksum detects error. The dropped byte causes the number of received bytes reduced. UDP-Lite has no capability to determine whether error occurs in data or in header. The proposed protocol improves this weakness which avoids byte reduction within the received packet when error occurs in header, so that the overall throughput improved (Figure 5). The proposed protocol is able to increase throughput from 0.13% to 0.4% over UDP-Lite and 3.8% to 13.2% over UDP (Figure 5). In average, checksum protection using FEC within the proposed method is able to increase throughput up to 0.3% over the basic UDP-Lite. Although this improvement is relatively small, the dropped bytes reduction within video frame avoids the frame quality degradation. 4

Figure 6. PSNR When the received packet is reconstructed and decoded to video image, and then compared to the original image, the result is PSNR improvement on the received image where FEC is applied. Figure 6 shows the average PSNR values for the three protocols. PSNR of the proposed protocol increases 1.12% to 6.46% over UDP-Lite and 41.8% to 75% over UDP. 5. Conclusion To conclude, the FEC protection over the checksum bytes is able to avoid the wrong decision in dropping part(s) of UDP-Lite packet. It is proven by the increase of throughput up to 0.4% over the base UDP- Lite. Even though this increment is relatively small, it is able to improve image quality up to 3 db in average. On the other hand, delay and jitter are not affected by the FEC insertion. Delay and jitter are relatively similar. This article uses a simple Hamming code as FEC which results small improvement and stable delay. Future works may apply more complicated FEC codes that may increase the performance even more and its impact on delay can be explored deeper. References [1] Postel J 1980 User datagram protocol 1-3 [2] Deering S E 1998 Internet protocol, version 6 (IPv6) specifications [3] Larzon L A 2002 The UDP lite protocol (Internet Engineering Task Force-Internet Draft). [4] Yang B and Zhang Z 2011 An improved UDP-lite protocol for 3D model transmission over wireless network Proceedings of the 2011, International Conference on Informatics, Cybernetics, and Computer Engineering (ICCE2011) November 19 20 2011 Melbourne Australia 351-357 Springer Berlin Heidelberg. [5] Alfredsson S 2001 TCP lite-a bit error transparent modification of TCP Master's thesis June [6] Schmidt F Orlea D and Wehrle K 2013 A heuristic header error recovery scheme for RTP In Wireless On-demand Network Systems and Services (WONS), 2013 10th Annual Conference on IEEE 186-190 5

[7] Fairhurst G and Westerlund M 2013 Applicability statement for the use of IPv6 UDP datagrams with zero checksums (RFC 6936) 6