SlideShare a Scribd company logo
1 of 14
Download to read offline
412 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 23, NO. 2, APRIL 2015
A Distortion-Resistant Routing Framework for Video
Traffic in Wireless Multihop Networks
George Papageorgiou, Member, IEEE, ACM, Shailendra Singh, Srikanth V. Krishnamurthy, Fellow, IEEE,
Ramesh Govindan, Fellow, IEEE, and Tom La Porta, Fellow, IEEE
Abstract—Traditional routing metrics designed for wireless net-
works are application-agnostic. In this paper, we consider a wire-
less network where the application flows consist of video traffic.
From a user perspective, reducing the level of video distortion is
critical. We ask the question “Should the routing policies change
if the end-to-end video distortion is to be minimized?” Popular
link-quality-based routing metrics (such as ETX) do not account
for dependence (in terms of congestion) across the links of a path;
as a result, they can cause video flows to converge onto a few paths
and, thus, cause high video distortion. To account for the evolu-
tion of the video frame loss process, we construct an analytical
framework to, first, understand and, second, assess the impact of
the wireless network on video distortion. The framework allows us
to formulate a routing policy for minimizing distortion, based on
which we design a protocol for routing video traffic. We find via
simulations and testbed experiments that our protocol is efficient
in reducing video distortion and minimizing the user experience
degradation.
Index Terms—Protocol design, routing, video communications,
video distortion minimization, wireless networks.
I. INTRODUCTION
WITH the advent of smartphones, video traffic has be-
come very popular in wireless networks. In tactical net-
works or disaster recovery, one can envision the transfer of
video clips to facilitate mission management. From a user per-
spective, maintaining a good quality of the transferred video is
critical. The video quality is affected by: 1) the distortion due
to compression at the source, and 2) the distortion due to both
wireless channel induced errors and interference.
Video encoding standards, like MPEG-4 [1] or
H.264/AVC [2], define groups of I-, P-, and B-type frames
that provide different levels of encoding and, thus, protection
against transmission losses. In particular, the different
levels of encoding refer to: 1) either information encoded
Manuscript received May 24, 2013; revised November 15, 2013; accepted
December 24, 2013; approved by IEEE/ACM TRANSACTIONS ON NETWORKING
Editor M. Reisslein. Date of publication February 11, 2014; date of current ver-
sion April 14, 2015. This work was supported by the Army Research Laboratory
and was accomplished under Cooperative Agreement No. W911NF-09-2-0053.
G. Papageorgiou, S. Singh, and S. V. Krishnamurthy are with the Depart-
ment of Computer Science and Engineering, University of California, Riverside,
Riverside, CA 92521 USA (e-mail: gpapag@cs.ucr.edu; singhs@cs.ucr.edu;
krish@cs.ucr.edu).
R. Govindan is with the Department of Computer Science, University of
Southern California, Los Angeles, CA 90089 USA (e-mail: ramesh@usc.edu).
T. La Porta is with the Department of Computer Science and Engineering,
The Pennsylvania State University, University Park, PA 16802 USA (e-mail:
tlp@cse.psu.edu).
Color versions of one or more of the figures in this paper are available online
at http://ieeexplore.ieee.org.
Digital Object Identifier 10.1109/TNET.2014.2302815
Fig. 1. Multilayer approach.
independently, in the case of I-frames, or 2) encoding relative
to the information encoded within other frames, as is the case
for P- and B-frames. This Group of Pictures (GOP) allows for
the mapping of frame losses into a distortion metric that can
be used to assess the application-level performance of video
transmissions.
One of the critical functionalities that is often neglected, but
affects the end-to-end quality of a video flow, is routing. Typ-
ical routing protocols, designed for wireless multihop settings,
are application-agnostic and do not account for correlation
of losses on the links that compose a route from a source to
a destination node. Furthermore, since flows are considered
independently, they can converge onto certain links that then
become heavily loaded (thereby increasing video distortion),
while others are significantly underutilized. The decisions made
by such routing protocols are based on only network (and not
application) parameters.
In this paper, our thesis is that the user-perceived video
quality can be significantly improved by accounting for ap-
plication requirements, and specifically the video distortion
experienced by a flow, end-to-end. Typically, the schemes used
to encode a video clip can accommodate a certain number of
packet losses per frame. However, if the number of lost packets
in a frame exceeds a certain threshold, the frame cannot be
decoded correctly. A frame loss will result in some amount
of distortion. The value of distortion at a hop along the path
from the source to the destination depends on the positions of
the unrecoverable video frames (simply referred to as frames)
in the GOP, at that hop. As one of our main contributions,
we construct an analytical model to characterize the dynamic
behavior of the process that describes the evolution of frame
losses in the GOP (instead of just focusing on a network quality
metric such as the packet-loss probability) as video is delivered
on an end-to-end path. Specifically, with our model, we capture
how the choice of path for an end-to-end flow affects the
performance of a flow in terms of video distortion. Our model
is built based on a multilayer approach as shown in Fig. 1. The
packet-loss probability on a link is mapped to the probability
of a frame loss in the GOP. The frame-loss probability is
then directly associated with the video distortion metric. By
using the above mapping from the network-specific property
(i.e., packet-loss probability) to the application-specific quality
1063-6692 © 2014 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
For More Details Contact G.Venkat Rao
8143271457
PAPAGEORGIOU et al.: DISTORTION-RESISTANT ROUTING FRAMEWORK FOR VIDEO TRAFFIC 413
metric (i.e., video distortion), we pose the problem of routing
as an optimization problem where the objective is to find the
path from the source to the destination that minimizes the
end-to-end distortion.
In our formulation, we explicitly take into account the history
of losses in the GOP along the path. This is in stark contrast
with traditional routing metrics (such as the total expected
transmission count (ETX) [3]) wherein the links are treated in-
dependently. Our solution to the problem is based on a dynamic
programming approach that effectively captures the evolution
of the frame-loss process. We then design a practical routing
protocol, based on the above solution, to minimize routing
distortion. In a nutshell, since the loss of the longer I-frames
that carry fine-grained information affects the distortion metric
more, our approach ensures that these frames are carried on the
paths that experience the least congestion; the latter frames in
a GOP are sent out on relatively more congested paths. Our
routing scheme is optimized for transferring video clips on
wireless networks with minimum video distortion. Since opti-
mizing for video streaming is not an objective of our scheme,
constraints relating to time (such as jitter) are not directly taken
into account in the design.
Specifically, our contributions in this paper are as follows.
• Developing an analytical framework to capture the impact
of routing on video distortion: As our primary contribution,
we develop an analytical framework that captures the im-
pact of routing on the end-to-end video quality in terms of
distortion. Specifically, the framework facilitates the com-
putation of routes that are optimal in terms of achieving
the minimum distortion. The model takes into account the
joint impact of the PHY and MAC layers and the applica-
tion semantics on the video quality.
• Design of a practical routing protocol for distortion-re-
silient video delivery: Based on our analysis, we design a
practical routing protocol for a network that primarily car-
ries wireless video. The practical protocol allows a source
to collect distortion information on the links in the network
and distribute traffic across the different paths in accor-
dance to: 1) the distortion, and 2) the position of a frame
in the GOP.
• Evaluations via extensive experiments: We demonstrate via
extensive simulations and real testbed experiments on a
multihop 802.11a testbed that our protocol is extremely
effective in reducing the end-to-end video distortion and
keeping the user experience degradation to a minimum. In
particular, the use of the protocol increases the peak signal-
to-noise ratio (PSNR) of video flows by as much as 20%,
producing flows with a mean opinion score (MOS) that
is on the average 2–3 times higher compared to the case
when traditional routing schemes are used. These PSNR
and MOS gains project significant improvements in the
perceived video quality at the destination of a flow [4]. We
also evaluate our protocol with respect to various system
parameters.
Organization: The paper is organized as follows. Related
work is presented in Section II. Our analytical models are in
Section III, followed by the problem formulation in Section IV.
In Section V, we discuss how our framework can be used
to route video flows in practice. Section VI contains results
from our simulations and testbed experiments. We conclude in
Section VII.
II. RELATED WORK
The plethora of recommendations from the standardization
bodies regarding the encoding and transmission of video indi-
cates the significance of video communications. Different ap-
proaches exist in handling such an encoding and transmission.
The Multiple Description Coding (MDC) technique fragments
the initial video clip into a number of substreams called descrip-
tions. The descriptions are transmitted on the network over dis-
joint paths. These descriptions are equivalent in the sense that
any one of them is sufficient for the decoding process to be suc-
cessful, however the quality improves with the number of de-
coded substreams. Layered Coding (LC) produces a base layer
and multiple enhancement layers. The enhancement layers serve
only to refine the base-layer quality and are not useful on their
own. Therefore, the base layer represents the most critical part
of the encoded signal [5], [6]. In this paper, we focus on the lay-
ered coding due to its popularity in applications and adoption in
standards.
Standards like the MPEG-4 [1] and the H.264/AVC [2] pro-
vide guidelines on how a video clip should be encoded for a
transmission over a communication system based on layered
coding. Typically, the initial video clip is separated into a se-
quence of frames of different importance with respect to quality
and, hence, different levels of encoding. The frames are called
I-, P-, and B-frames, and groups of such frames constitute a
structure named the GOP. In each such GOP, the first frame is an
I-frame that can be decoded independently of any other informa-
tion carried within the same GOP. After the I-frame, a sequence
of P- and possibly B-frames follows. The P- and B-frames use
the I-frame as a reference to encode information. However, note
that the P-frames can also be used as references for other frames.
There has been a body of work on packet-loss-resilient
video coding in the signal processing research community [7].
In [4], the video stream is split into high- and low-priority
partitions, and FEC is used to protect the high-priority data.
To account for temporal and spatial error propagation due to
quantization and packet losses, an algorithm is proposed in [8]
to produce estimates of the overall video distortion that can
be used for switching between inter- and intracoding modes
per macroblock, achieving higher PSNR. In [9], an enhance-
ment to the transmission robustness of the coded bitstream
is achieved through the introduction of inter/intracoding with
redundant macroblocks. The coding parameters are determined
by a rate-distortion optimization scheme. These schemes are
evaluated using simulation where the effect of the network
transmission is represented by a constant packet-loss rate,
and therefore fails to capture the idiosyncrasies of real-world
systems.
In [10], an analytical framework is developed to model the
effects of wireless channel fading on video distortion. The
model is, however, only valid for single-hop communication.
In [11], the authors examine the effects of packet-loss patterns
and specifically the length of error bursts on the distortion
of compressed video. The work, although on a single link,
showcases the importance of accounting for the correlation of
For More Details Contact G.Venkat Rao
8143271457
414 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 23, NO. 2, APRIL 2015
errors across frames. The performance of video streaming over
a multihop IEEE 802.11 wireless network is studied in [12],
and a two-dimensional Markov chain model is proposed. The
model is used not only for performance evaluation, but also as
a guide for deploying video streaming services with end-to-end
quality-of-service (QoS) provisioning. Finally, a recursion
model is derived in [13] to relate the average transmission
distortion across successive P-frames. None of these efforts
considers the impact of routing on video distortion.
There have also been studies on the performance of video
transmissions over 4G wireless networks that have been de-
signed to support high QoS for multimedia applications. In [14],
an assessment of the recently defined video coding scheme
(H.264/SVC) is performed over mobile WiMAX. Metrics such
as the PSNR and the MOS are used to represent the quality of
experience perceived by the end-user. The results show that the
performance is sensitive to the different encoding options in
the protocols and responds differently to the loss of data in the
network. Again, these are single-link wireless networks, and
routing is not a factor.
Cross-layer optimization and QoS routing is not new. An
extensive body of research exists on routing algorithms for
wireless ad hoc and mesh networks [15]. Furthermore, the
survey in [16] provides various ways of classifying QoS routing
schemes based on protocol evaluation metrics (transport/ap-
plication, network- and MAC-layer metrics). However, none
of the routing schemes presented in these surveys takes into
account performance metrics defined for an application and
specifically for video transfers. Even when a QoS routing is
defined as application-aware, the applications need to specify
throughput and delay constraints. This is in contrast to our
approach, where an application-related performance metric,
namely the video distortion, is directly incorporated into the
route selection mechanism.
Prior work on routing for video communications focuses on
Multiple Description Coding (MDC). In [17] and [18], multi-
path routing schemes are considered to improve the quality of
video transfer. In [17], an extension to the Dynamic Source
Routing is proposed to support multipath video communica-
tions. The basic idea is to use the information collected at the
destination node to compute nearly disjoint paths. In contrast
with our approach, no analysis is provided in [17], and the eval-
uation of the scheme is based solely on simulations. In [18], the
computation of disjoint paths is achieved by proper scheduling
given a set of path lengths. As is the case in [17], the work in [18]
does not take into account any performance metric directly asso-
ciated with video quality; in contrast, the optimization is based
on delay constraints. In [19] and [20], MDC is considered for
video multicast in wireless ad hoc networks. A rate-distortion
model is defined and used in an optimization problem where
the objective is to minimize the overall video distortion by prop-
erly selecting routing paths. Due to the complexity of the opti-
mization problem, a genetic-algorithm-based heuristic approach
is used to compute the routes. Although the approach in [19]
and [20] takes into account the distortion of the video, it does
so using MDC. Our approach differs not only on the way we
model video distortion, but also on the fact that we focus on LC,
which is more popular in applications today. In [21], a multi-
path routing scheme for video delivery over IEEE 802.11-based
wireless mesh networks is proposed. To achieve good traffic en-
gineering, the scheme relies on maximally disjoint paths. How-
ever, this work does not consider distortion as a user-perceived
metric. It simply aims to reduce the latency of video transmis-
sions, and thus, its objective is different from what we consider
here.
The work in [22] proposes a scheme for energy-efficient
video communications with minimum QoS degradation for LC.
However, the routing scheme is based on a hierarchical model.
To support such a hierarchy, the nodes need to be grouped
in clusters, and a process of electing a cluster head has to
be executed periodically, increasing the processing and data
communication load of the network. In contrast, our proposed
scheme assumes a flat model where all nodes in the network
are equivalent and perform the same set of tasks.
III. MODEL FORMULATION
Our analytical model couples the functionality of the phys-
ical and MAC layers of the network with the application layer
for a video clip that is sent from a source to a destination node.
The model for the lower layers computes the packet-loss prob-
ability through a set of equations that characterize multiuser in-
terference, physical path conditions, and traffic rates between
source–destination pairs in the network. This packet-loss prob-
ability is then input to a second model to compute the frame-loss
probability and, from that, the corresponding distortion. The
value of the distortion at a hop along the path from the source
to the destination node depends on the position of the first un-
recoverable frame in the GOP.
A. PHY- and MAC-Layer Modeling
We consider an IEEE 802.11 network that consists of a set
of nodes denoted by N . For each node
N , denote by P the set of paths that pass via node . For
simplicity, we assume a constant packet length of bits for all
source–destination paths. There are various models [23]–[26]
that attempt to capture the operations of the IEEE 802.11 pro-
tocol. These models are application-agnostic and provide an es-
timate of the packet-loss probability due to interference from
background traffic in the network. We use the model in [26] to
represent the operations of the PHY and MAC layers; specifics
can be found in [26].
The approach followed in [26] is based on network-loss
models. Three sets of equations are derived. The first corre-
sponds to a scheduling model that computes the serving rate
of a path at each node , as a function of the scheduler
coefficient and the service time
(1)
The second captures the IEEE 802.11 MAC and PHY models
and associates the probability of a transmission failure with
the channel access probability
(2)
For More Details Contact G.Venkat Rao
8143271457
PAPAGEORGIOU et al.: DISTORTION-RESISTANT ROUTING FRAMEWORK FOR VIDEO TRAFFIC 415
where is the number of backoff stages and is the minimum
window size. Finally, the third set of equations describes the
routing model and computes the incoming traffic rate to the
next-hop node based on scheduling and transmission failures
for all N P (3)
A fixed-point method is used to couple the equations in an
iteration, until convergence to a consistent solution is achieved
and satisfied. The solution is an approximation to the packet-loss
probability per link and the throughput of the network. Note
here that any other method can be used to find , which can then
be used in our video distortion estimation framework described
in Section III-B.
B. Video Distortion Model
Our analysis is based on the model for video transmission
distortion in [10]. The distortion is broken down into source
distortion and wireless transmission distortion over a single hop.
Instead of focusing on a single hop, we significantly extend the
analysis by developing a model that captures the evolution of
the transmission distortion along the links of a route from the
source node to the destination node.
We consider a GOP structure that consists of an I-frame fol-
lowed by P-frames. We index each frame in the GOP
structure starting from 0, i.e., the I-frame corresponds to index
0, and the P-frames correspond to indices from 1 up to .
We focus on predictive source coding where, if the th frame
is the first lost frame in a GOP, then the th frame and all its
successors in the GOP are replaced by the st frame at
the destination node. Assuming that the sequence of frames is
stationary, the average distortion introduced by such a frame re-
placement depends on the temporal proximity of the replaced
frame to the st frame and not on the actual position of
the frame (in the GOP) to be replaced. In [10], a linear model,
which corresponds to empirical data, is used to provide the av-
erage mean squared error (MSE) as a function of the temporal
distance between frames. Using this model, the average distor-
tion is computed in [10] to be
(4)
for . The minimum distortion
is achieved when the last frame in the GOP is lost and
the maximum, , is attained if the first frame is
lost. The values and depend on the actual video
sequence and have to be determined by measurement. To auto-
mate the computation of the distortion, however, we compute
the minimum and maximum values, and , respec-
tively, of the distortion over different GOPs for each clip and
use their average values.
If is the source coding rate, and are the percentage
of bits in the GOP that belong to an I-frame and a P-frame,
respectively, then:
• the number of packets per an I-frame ;
• the number of packets per a P-frame ;
where and is the duration of a GOP.
We define the sensitivity of a frame to lost packets to be the
minimum number of packets that belong to a frame that, if lost,
can prevent the correct decoding of the frame. We denote by
the sensitivity of an I-frame, and by , that of a P-frame. For
the sensitivity of the I-frame, it holds that ,
and for the P-frame it is . Note that any
further packet losses beyond for the I-frame and for the
P-frame do not cause any additional distortion for that particular
GOP because, in that case, the corresponding frame is already
considered lost and cannot be correctly decoded.
We extend the wireless transmission distortion introduced
in [10] and defined in (4) for the multihop case. We define the
sequence to represent the wireless
transmission distortion along the path from the source to the
destination, where is the wireless transmission video distor-
tion at the th hop. In general, at the th hop, the distortion
can take one of the following discrete values given by (4):
(5)
The sequence of values the process takes depends on the
number of lost packets per frame in the GOP at each link.
Clearly, w.p.1, for all .
We track the packet losses per frame by defining a multidi-
mensional counting process
(6)
where the index is again the hop count along the path from
the source to the destination. The first component of the
counting process tracks the number of lost packets from
the I-frame at the th hop along the path, and the components
count the lost packets that belong to the sub-
sequent P-frames in the GOP at the th hop. The state space for
each of these components is given by
(7)
(8)
for .
Assuming that the packet losses in different frames in the
GOP are independent events (likely if the fading patterns change
in between), the transition probabilities for the process , can
be computed. Suppose that is the packet-loss probability pro-
vided by the analytical model that describes the MAC layer (in
Section III-A). Furthermore, let the value of at hop be
and at hop be
. Since each of the components of is
a counting process, the corresponding sample paths are non-
decreasing w.p.1,, and therefore
. Regarding the transitions of that correspond to the
I-frame, we have that
(9)
The corresponding transition probability is equal to the
probability of losing packets out of the
remaining packets in the I-frame. Therefore, the transition
For More Details Contact G.Venkat Rao
8143271457
416 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 23, NO. 2, APRIL 2015
probabilities for the first component are given by the
following binomial distribution:
otherwise
(10)
Similar to the transitions of , the transitions of
that correspond to the P-frames in the GOP
are specified by the transition probabilities
otherwise
(11)
From the transition probabilities (10) and (11), one can com-
pute the distribution of lost packets
in each frame at hop assuming that there are no lost packets at
the source. In particular, for the I-frame, we have
(12)
for . We define the row vector
(13)
Then, (12), in vector form, becomes
(14)
for , where is the transition matrix for
the process . To make the dependence of the matrix
to the packet-loss probability explicit, we use the notation
.
It follows then from (14) that
(15)
for a sequence of packet-loss probabilities ,
where . Following the same process, we can
compute the corresponding distribution for the th P-frame
in the GOP
(16)
where and is the transition
matrix for the process . As one can
immediately see, the packet-loss probabilities, computed after
accounting for the PHY and MAC, in Section III-A, can be used
here to compute the probabilities .
C. Video Distortion Dynamics
The value of the distortion at hop along the path from the
source to the destination node depends on the position of the
first unrecoverable frame in the GOP. We define the process
such that is the index of the first un-
recoverable frame in the GOP structure at hop . At each hop ,
the process takes values in the set
C (17)
The value 0 indicates that the first (I-frame) is lost, and therefore
the whole GOP is unrecoverable. A value between 1 and
denotes that the corresponding P-frame is the first frame in the
GOP that cannot be decoded correctly, and the value indicates
that no frame has been lost thus far, yielding a distortion .
The definition of the process suggests that the sample paths
of the process are nonincreasing w.p.1., which means that
, for all .
The dynamics of the process and therefore of the video
distortion depend on the process . The value of the process
at each hop indicates the number of lost packets up to that
point along the path from the source to the destination node.
These losses specify the first unrecoverable frame in the GOP
and, hence, the value of the distortion at that point on the path.
The transition probabilities at hop of the process
for C (18)
specifying the likelihood that the first unrecoverable frame at
hop is given that the first unrecoverable frame at hop is ,
can be computed using the distributions
given by (15) and (16). In particular, we consider the following
cases.
1) For : In this case, the first unrecoverable frame at hop
is the first frame (I-frame) in the GOP. This means that
the GOP is unrecoverable, and the value of the process
for the rest of the path cannot be anything else other than 0.
Therefore, the transition probabilities in this case are given
by
(19)
2) For : When the first unrecoverable
frame in the GOP at hop is a P-frame, it is possible during
the transition to the next hop to have packet losses
that make an earlier frame in the GOP unrecoverable. This
will happen if the number of lost packets in an earlier frame
is such that the total number of lost packets for the partic-
ular frame reaches the sensitivity of that frame type. This is
used to compute the transition probabilities in (20), shown
at the bottom of the next page.
3) For : This corresponds to the case where no frames
have been lost in the GOP up to hop . The transition to the
next hop may cause packet losses such that either a frame
in the GOP becomes unrecoverable, or none is lost and no
transition of happens. The transition probabilities in this
case are given by (21), shown at the bottom of the next
page.
For More Details Contact G.Venkat Rao
8143271457
PAPAGEORGIOU et al.: DISTORTION-RESISTANT ROUTING FRAMEWORK FOR VIDEO TRAFFIC 417
The value of the video transmission distortion depends on the
value of the process at hop . More specifically
if
if and
(22)
where is given by (4). Therefore, the dynamics of the video
transmission distortion are defined by the transition probabili-
ties given by (19)–(21).
IV. OPTIMAL ROUTING POLICY
Next, our objective is to find the path that yields the minimum
video transmission distortion between any source and destina-
tion. By using the analysis presented in Section III, we pose the
problem as a stochastic optimal control problem where the con-
trol is the selection of the next node to be visited at each inter-
mediate node from the source to the destination.
If N is the set of nodes in the network and
C is the set of possible values for the
process described in Section III-C, we define the state space
of our problem as
X N C (23)
Each state X is a tuple such that . The first
component N represents the current node on the path
from the source to the destination. The second component C
points to the first unrecoverable frame in the GOP and, there-
fore, specifies the video distortion at the current node.
Suppose that at the th hop of the path between the source
and the destination the node is . Suppose furthermore that the
first unrecoverable frame in the GOP structure is . Then, the
current state of the system is . At this point, the
system needs to select the next node to be visited. Denote this
selection by . Clearly, the node to be selected next should
belong to the set U of the one-hop neighbors of . This
means that if at stage the state is and a decision
is made such that U , the new state at the next
stage will be . The selection of as the
next node specifies the packet-loss probability from the anal-
ysis in Section III-B and accounts for both channel-induced and
interference-related failures. Moreover, it specifies the transi-
tion probabilities for the second component of the
state. To make the dependence of these transition probabilities
to the selection explicit, we use the notation .
We seek to find the optimal sequence of states
that minimizes the total video transmission distortion from the
source to the destination node. The first component of each state
that belongs to such an optimal sequence of states indicates the
node that has to be visited next in the optimal path.
For the initial state and the sequence of decisions
, the cost to be minimized is defined as
X
(24)
where is the length of the path, the function is the run-
ning cost, and the function is the final cost. We call this
optimization problem the Minimum Distortion Routing (MDR)
problem.
The running cost is the video transmission distortion at state
if
if
(25)
(20)
(21)
For More Details Contact G.Venkat Rao
8143271457
418 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 23, NO. 2, APRIL 2015
The final cost is defined to be
if is the destination node and
if is the destination node and
otherwise
(26)
If is the source and is the destination of the connection,
then the initial state for the optimization problem is defined
as . Any state in the boundary set
B X (27)
is a terminating state for the optimization problem.
If is an optimal decision sequence, we define the value
function as
(28)
for an initial state X . If at some stage the state is
, we define the minimum cost-to-go as
(29)
and for the final stage
(30)
The MDR problem has the following properties.
Lemma 1: MDR satisfies the overlapping property, i.e., the
problem can be broken down into smaller problems that retain
the same structure.
Proof: From (29), it is clear that computing the cost-to-go
requires the calculation of the cost-to-go . This
means that the initial problem of finding the optimal route be-
tween a source and a destination node can be solved if the sub-
problem of finding an optimal path between an intermediate
node and the destination can be solved.
Lemma 2: MDR satisfies the optimal substructure property,
i.e., the subpath of an optimal path is optimal for the corre-
sponding subproblem.
Proof: This is immediate from the definition of the cost-
to-go function defined in (29).
Theorem 1.: The MDR problem is solvable by dynamic
programming.
Proof: An optimization problem can be solved by dynamic
programming if the problem satisfies both the overlapping and
the optimal substructure properties [27]. The proof is immediate
from Lemmas 1 and 2.
Since the state space X is of finite dimension, the opti-
mization problem can be solved via dynamic programming by
back-propagating the computation of the value of the cost-to-go
function [28], [29] starting from the terminating states of the
boundary set B and moving backwards toward the initial state
. If at some stage the state is , we consider all
possible neighbors of node that are one hop away. For
each link , a packet-loss probability characterizes
the quality of this specific link. Using this , we can compute
the transition probability from the current state
to a new state through the probability
that is defined in Section III-C for all
possible values of the second component of the state. Among
the neighboring nodes of node , we choose as the next hop
toward the destination node, the node that corresponds to the
minimum cost-to-go at stage defined in (29).
Discussion: In essence, the MDR routing policy distributes
the video frames (and the packets contained therein) across mul-
tiple paths and in particular minimizes the interference experi-
enced by the frames that are at the beginning of a GOP (to min-
imize distortion). The I-frames are longer than other frames.
Their loss impacts distortion more, and thus these are trans-
mitted on relatively interference-free paths. The higher protec-
tion rendered to I-frames is the key contributing factor in de-
creasing the distortion with MDR (we also observe this in both
our simulations and testbed experiments).
V. PROTOCOL DESIGN
To compute the solution to the MDR problem described in
Section IV, knowledge of the complete network (the nodes that
are present in the network and the quality of the links between
these nodes) is necessary. However, because of the dynamic
nature and distributed operations of a network, such complete
knowledge of the global state is not always available to the
nodes. In practice, the solution to the MDR problem can be com-
puted by the source node based on partial information regarding
the global state that it gathers. The source node has to sample
the network during a path discovery process in order to collect
information regarding the state of the network.
The sampling process includes the estimation of the ETX
metric [3] for each wireless link in the network. These esti-
mates provide a measure of the quality of the links. The esti-
mation process can be implemented by tracking the successful
broadcasting of probe messages in periodic time intervals. The
ETX estimates computed locally in the neighborhood of a node
are then appended in the Route Request messages during
the Route Discovery phase. Upon reception of this message by
the destination, a Route Reply message is sent back to the
source that contains the computed ETX estimates, which are us-
able to compute .
The source node then can solve the optimization problem
(Section IV) by using the information gathered via the sam-
pling process described above. Specifically, upon receiving the
Route Reply messages, the source node follows the steps
presented in Algorithm 1. It defines the initial state of the opti-
mization problem as , where is the GOP size. It
defines the boundary set B that serves as the terminating set for
the optimization process. Next, a call to Algorithm 2 produces
the next node in the path. Because of the stochastic nature of
the second component of the state, its next value has to be es-
timated. The estimation is based on the transition probabilities
given by (19)–(21). In particular, the estimated value
is the expected value of the second component given its current
value
(31)
For More Details Contact G.Venkat Rao
8143271457
PAPAGEORGIOU et al.: DISTORTION-RESISTANT ROUTING FRAMEWORK FOR VIDEO TRAFFIC 419
Algorithm 1: Path discovery (Uses Algorithm 2)
Input: source node , destination node
Input: frame size
Output: route from to
1: /* DSR Route Discovery Phase */
2: send
3: receive messages
4: N node-ids from messages
5:
6: /*Path Discovery Initialization Phase*/
7:
8:
9: B
10:
11:
12: append to
13:
14: /* Path Computation /*
15: repeat
16: Next_node_in_optimal path( B N )
17:
18:
19:
20:
21: append to
22: N N
23: until B
To avoid loops in the produced route, node is removed
from the set N of available nodes. The process is repeated
with a new initial state until the boundary set B
is reached. In each iteration, Algorithm 2 is called to determine
the next node on the path from the source to the destination .
Algorithm 2 takes as an input an initial state , a boundary
set B , the GOP size and the set N . It solves the dynamic
programming problem described in Section IV by first creating
the state space of the system and then using the value iteration
method, starting from the boundary set and moving backwards.
At each stage of the process, it also computes the optimal policy.
At the end of the computation, the ID of the best node to be se-
lected is returned by using the optimal policy for the first stage.
In the source routing scheme, the routing decisions are made
at the source node ahead of time and before the packet enters
the network. Therefore, source routing is an open-loop control
problem where all decisions have to be made in the beginning.
The decisions are taken sequentially; a decision at a stage cor-
responds to the choice of the next-hop node at the node corre-
sponding to the stage. The source node cannot know exactly the
state at the th stage of the selection process be-
cause of the randomness of the second component of the state.
It has to estimate at each stage the value of and use this esti-
mate to make a decision for that stage.
The sequence of steps followed by each node in the network
is shown in Fig. 2.
Algorithm 2: Next node in optimal path
Input: initial state , boundary set B
Input: set of available nodes N
Input: frame size
Output: next node in the optimal path
1: /* Initialization Phase */
2: C
3: X N C
4: X
5:
6: /* Optimal Control Computation */
7: for TO 1 do
8: if then
9: for all X do
10:
11: end for
12: else
13: for all X do
14:
15:
16:
17:
18: end for
19: end if
20: end for
21:
22: return
The flowchart that corresponds to the operation of the source
node is depicted in Fig. 2(a), while the flowcharts for an inter-
mediate node and the destination node are shown in Fig. 2(b).
VI. RESULTS
We show the performance gains of the proposed routing
scheme via extensive simulations and testbed experiments.
For the simulation experiments, we use the network simulator
ns-2 [30]. The simulator provides a full protocol stack for a
wireless multihop network based on IEEE 802.11. We extend
the functionality of ns-2 by implementing our proposed routing
scheme on top of the current protocol stack. For the testbed ex-
periments, we implement our scheme using the Click modular
router [31], [32]. We implement two different mechanisms and
experiment with each, one after another. The first mechanism
estimates the ETX value for each link between a node and its
neighbors for all the nodes in the network. The mechanism
broadcasts periodically (every 1 s) small probe messages of
size 32 B and checks for acknowledgments from the neighbors
of the node. The routing policy computes the minimum ETX
path from the source to a destination and uses that path to
transfer the video packets. The second mechanism implements
the protocol defined in Section V in order to compute the routes
on the wireless network that achieve minimum video distortion.
Furthermore, we use EvalVid [33], which consists of a set of
tools for the evaluation of the quality of video that is transmitted
over a real or simulated network. The toolset supports different
For More Details Contact G.Venkat Rao
8143271457
420 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 23, NO. 2, APRIL 2015
Fig. 2. Flowchart for application-aware routing. (a) Source node. (b) Interme-
diate and destination node.
performance metrics such as the PSNR and the MOS [34]. To
adapt the EvalVid to the ns-2 simulator, we follow the procedure
described in [35]. Specifically, for each simulated video flow be-
tween two nodes in the network, we need to produce a sequence
of files. We start with the initial uncompressed video file that
consists of a sequence of YUV frames [36]. Using the EvalVid
toolset, we transform the YUV format first to the MP4 and then
to the MPEG4 format, which contains hints of how the video file
should be transmitted over a network. When we do this, we do
not constrain the GOP size to be the same from GOP to GOP,
but rather, we let the tool decide the appropriate size for each
GOP based on the video clip content. We then need to capture
a log from an attempted transmission over a real network. This
log indicates which frame and at what time instance was trans-
mitted over the network. The log is fed as an input to the ns-2
simulation, which plays back the video transmission, producing
at the end two sets of statistics regarding the transmission, one
for the sender and one for the receiver. By applying the EvalVid
toolset on this sequence of files, we can reconstruct the video
file as it is received by the destination and compare it to the ini-
tial video file. The comparison provides a measure of the video
quality degradation due to the transmissions over the network.
A. Simulation Results
To evaluate the performance of the MDR protocol, we com-
pare it against the minimum ETX routing scheme. We con-
sider a wireless multihop network that covers an area of 1000
1000 m . The nodes are distributed over this area according
to a Poisson random field. The pair of nodes that constitute the
Fig. 3. Average PSNR for 5 and 10 video connections (Set-I).
TABLE I
VIDEO ENCODING PARAMETERS
source and destination in each case are selected at random. If
they happen to be neighbors, we discard that pair and repeat the
process until we select a source and destination that are more
than one hop apart. Each node uses the IEEE 802.11b protocol
where the propagation model is the Two Ray Ground, yielding a
communication range of about 250 m. Each set of experiments
is repeated 10 times, and the average value is reported in each
case.
In Table I, three sets of values are defined for the video en-
coding parameters. We vary the GOP size and the frame rate
and thus, effectively, the video encoding rate. We keep the frame
size constant as per the QCIF standard (176 144 pixels) and
set the maximum packet size to 1024 B. Our simulation exper-
iments focus on three metrics: 1) the PSNR, which is an objec-
tive quality measure; 2) the MOS, which is a subjective quality
metric; and 3) the delay experienced by each video connection.
The effect of the node density on the PSNR is shown in Fig. 3.
We plot the average PSNR for 5 and 10 concurrent video con-
nections for different node densities and for Set-I of the video
encoding parameters of Table I. We also plot the performance
of our proposed scheme (MDR) when instead of estimating the
per-link packet-loss probabilities through the ETX metric, we
use the model in Section III-A to do so. In this case, we assume
full knowledge of the network topology, and so the state space
where we solve the optimal control problem of Section IV is a
superset of the state space when we collect the local estimates
of ETX through the network.
We then fix the number of nodes to 20 (distributed as de-
scribed earlier) and compute the PSNR of each video connec-
tion when: 1) the network serves four concurrent connections,
and 2) when the number of concurrent connections is 8. In each
case, the source–destination pairs are chosen uniformly from
among the nodes in the network. We define the tail distribu-
tion of PSNR as the probability and plot it
in Fig. 4 for the different traffic loads. The tail distribution of
PSNR that corresponds to Set-II of the video encoding param-
eters is shown in Fig. 4(a). For both the light and heavy traffic
For More Details Contact G.Venkat Rao
8143271457
PAPAGEORGIOU et al.: DISTORTION-RESISTANT ROUTING FRAMEWORK FOR VIDEO TRAFFIC 421
Fig. 4. Tail distribution of PSNR. (a) Set-II. (b) Set-III.
loads (four and eight concurrent connections, respectively), the
MDR protocol performs better, providing a higher percentage
of paths that have a given PSNR value. As expected, a perfor-
mance degradation is observed for both schemes when the traffic
load increases. This is due to the fact that under heavier traffic
conditions in the network, the interference becomes more preva-
lent; furthermore, interference across adjacent links can be cor-
related in some cases. Under such network conditions, the bene-
fits from the distortion-based optimization have a greater impact
on the path selection process for the different types of frames in
a video GOP as discussed earlier. The I-frames are sent on rela-
tively uncongested paths. With fur concurrent connections, the
median of PSNR is 17 for the minimum ETX policy and 18 for
the MDR protocol. The median decreases when the traffic load
increases, and it is 9.5 and 10 for the minimum ETX and the ap-
plication-aware schemes, respectively. The tail distribution of
PSNR that corresponds to the parameters of Set-III is shown in
Fig. 4(b). As is the case for Set-II, a large GOP size results in
a denser state space, and therefore a better performance for the
MDR protocol. In the case of the light traffic loads (four concur-
rent connections), the median for the PSNR is 15 for the min-
imum ETX scheme and 17 for MDR. Under heavier traffic loads
(eight concurrent connections), Pthe median for the PSNR is 9
for the minimum ETX scheme and 10.5 for the MDR protocol.
The effects of the sensitivities, and , on the MDR-pro-
tocol are shown in Fig. 5. As before, the number of randomly
placed nodes is set to 20. We compare the performance of the
MDR protocol when and . In
the first case, the sensitivity to the packet losses per frame is set
to the maximum; in this case, a single packet loss in a frame
causes the frame to be unrecoverable. Fig. 5(a) and (b) presents
the same comparison for Set-II and Set-III of the encoding pa-
rameters, respectively. In both cases, relaxing the sensitivity of
an I- or P-frame to packet losses (i.e., increasing the value of
and ) deteriorates the performance of the scheme. A lower
sensitivity (larger values of and ) diminishes the impact of
packet losses on the video distortion, thus limiting the perfor-
mance gains from using the scheme. For Set-II, the median of
the PSNR is 17 for the minimum ETX scheme and 18 and 16 for
MDR for and , respectively.
When the video encoding parameters of Set-III are used, the
median values of the PSNR are 15 for the minimum ETX case
and 17 and 15 for the MDR protocol when and
, respectively.
Although the PSNR is the most widespread objective metric
to measure the digital video quality, it does not always capture
user experience. A subjective quality measure that tries to cap-
ture human impression regarding the video quality is the MOS.
Fig. 5. PSNR dependence on packet-loss sensitivity. (a) Set-II.. (b) Set-III.
Fig. 6. Average mean opinion score.
The metric uses a scale from 1 (worst) to 5 (best) to represent
user satisfaction when watching a video clip [34].
To evaluate the MOS with the MDR and ETX-based routing,
we consider the wireless multihop network with the average
number of nodes equal to 20 (distributed as discussed earlier).
The initial raw video is processed using the H.264 encoder with
a maximum GOP size of 30 frames and a sampling frequency
of 30 frames per second. Fig. 6 shows the average MOS as
the number of concurrent video flows in the network increases.
When the number of connections is three, the traffic load is low,
and so both the ETX-based routing and MDR provide similar
user experience regarding video quality. As the traffic load in-
creases, the distortion-based routing distributes the load across
the network, causing the I-frames to avoid highly congested
areas. When a moderate number of video flows are concurrently
active in the network, there is a significant gap in video quality
in favor of MDR. However, no significant gains are possible
with MDR when congestion is high (more than nine concur-
rent video flows are active). In such cases, there are no con-
gestion-free routes available to be used by MDR. This results in
higher MOS values, which translates to a better user experience.
The delay characteristics of the two routing schemes are
shown in Fig. 7 for Set-II of the video encoding parameters.
The nodes are again randomly distributed according to a
Poisson random field with varying density with values 14, 16,
and 18. The traffic load corresponds to five concurrent video
connections. We compute and plot the mean and variance
of the end-to-end delay for the five connections along with
the 95% confidence intervals. As seen in Fig. 7, for all three
different node densities, the MDR protocol produces routes that
exhibit less variability compared to the routes computed by the
minimum ETX scheme. Smaller variability implies less jitter,
which in turn suggests a better video quality as perceived by
the end-user. Moreover, because of the smaller variability, the
required sizes of buffers at the intermediate nodes is smaller.
For More Details Contact G.Venkat Rao
8143271457
422 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 23, NO. 2, APRIL 2015
Fig. 7. Delay characteristics for five concurrent connections (Set-II). (a) Mean
delay. (b) Variance of delay.
Note that this benefit is in addition in the reduction in distortion
as discussed above. The primary reason for this reduction in
the delay is that the distortion-aware approach tries to avoid
paths that are congested; ETX, on the other hand, results in
convergence of flows onto a few good paths. For both routing
schemes, the mean and variance of the delay increase with
the average number of nodes in the network. As the network
becomes denser, the effect of interference becomes more
profound, increasing the number of retransmissions and, thus,
the delay. In contrast, a sparser network topology provides a
smaller number of “good” routes, and thus it is more difficult to
separate flows and cope with congestion. It is in the moderate
density regions, where the MDR protocol provides the most
benefits in terms of delay and jitter.
In order to understand how the characteristics of the video
traffic and, in particular, the motion level affect the distortion,
we experiment with two classes of video clips: slow- and fast-
motion video. The motion level of a video clip can be computed
through appropriate detection algorithms; typically, these algo-
rithms classify a video clip as a slow-motion or a fast-motion
video. Tools such as PhysMo [37] and AForge [38] can be used
to perform this classification.
We evaluate the MOS of slow- and fast-motion video flows
when the MDR routing scheme is used. We consider a wireless
multihop network with an average number of nodes equal to 20
(distributed as discussed above). Fig. 8(a) shows the average
MOS for Set-II, and Fig. 8(b) shows the MOS in the case of
Set-III. In both cases, the slow-motion flows experience slightly
lower distortion compared to the fast-motion videos and, thus,
higher MOS. This is the result of the fact that in the slow-motion
video clips, the I-frames carry most of the information. Due to
rapid changes in the content of a fast-motion clip, the P-frames
are larger and contain more information than the P-frames for
slow-motion video flows. The MDR routing scheme protects
the I-frames by routing the corresponding packets through less
congested paths. The P-frames are packed together on congested
paths and could be lost. As evident from Fig. 8, such losses af-
fect fast-motion video to a greater extent. However, as we in-
crease the traffic to extremely high levels (11 flows), the per-
formance of slow- and fast-motion videos is similar due to high
frame losses.
Next, we compare the behavior of MDR against a routing
protocol that chooses routes so as to minimize the overall
expected transmission time (ETT) [39]. The ETT is a function
of the loss rate and the bandwidth of the link. Therefore, it can
capture delays due to transmissions in multirate settings, unlike
ETX, which only estimates the packet-loss ratio at the base rate.
Fig. 8. Average value of the MOS for slow- and fast-motion video flows.
(a) Set-II. (b) Set-III.
Fig. 9. Comparison between the MDR and the ETT-based routing scheme.
(a) Mean opinion score. (b) Mean delay.
In Fig. 9, the comparison between MDR and the ETT-based
scheme is shown. The mean opinion score is shown in Fig. 9(a),
where we observe a behavior similar to the one shown in Fig. 6.
The average end-to-end delay is shown in Fig. 9(b). In contrast
to what happens when the ETX is used, the routing mechanism
that minimizes the total ETT on the path from the source to
the destination yields smaller delays. However, the delays with
MDR are comparable to those with ETT-based routing; in other
words, the video quality is improved with minimum impact on
delay with MDR.
B. Testbed Experiments
Next, we evaluate the MDR protocol on a wireless indoor
testbed composed of 41 nodes [40]. The nodes are based on
the Soekris net5501 hardware configuration and run a Debian
Linux distribution. Each node is equipped with 500 MHz CPU,
512 MB of RAM, and a WN-CM9 wireless mini-PCI card,
which carries the AR5213 Atheros main chip. Each node uses
IEEE 802.11a to avoid interference from co-located campus
networks. To further minimize interference from these other
networks, all experiments were performed at night. The net-
work topology of the testbed is shown in Fig. 10.
The experiment setup consists of an initial raw video pro-
cessed using the H.264 encoder with a maximum GOP size
of 30 frames. The traffic load ranges from 2 to 12 concurrent
video flows, where the sender and receiver pairs are randomly
selected. Each scenario is repeated five times.
To capture the effect of the ETX-based and MDR routing
schemes on the user experience, we measure the average MOS
as the number of concurrent video flows in the network in-
creases. Fig. 11 shows that as the number of video connections
in the network increases, the average MOS for both schemes
decreases. However, when the traffic load increases, the MDR
protocol computes multiple paths between the source and the
For More Details Contact G.Venkat Rao
8143271457
PAPAGEORGIOU et al.: DISTORTION-RESISTANT ROUTING FRAMEWORK FOR VIDEO TRAFFIC 423
Fig. 10. Network topology of the wireless network testbed.
Fig. 11. Average value of MOS for a different number of concurrent video
flows.
destination nodes and is better in distributing the load across
the network such that the frames at the beginning of a GOP
avoid congestion. On the other hand, the shorter paths computed
through the ETX-based scheme become quickly congested, re-
sulting in heavy packet losses. As discussed, we observe that
this primarily has a negative impact on correctly decoding the
relatively longer (but more important) I-frames, resulting in a
worse user experience.
A visual comparison between Figs. 6 and 11 immediately
shows the similarity in behaviors between our simulations and
real experiments, thereby validating the realism of our simu-
lations. Fig. 12 shows snapshots from video clips transmitted
over the testbed under different traffic conditions for both the
ETX-based and the MDR protocols. As shown in Fig. 11, when
there are two connections in the network, the MOS for both
routing schemes is the same. This is reflected in Fig. 12(a) and
(b), where both snapshots are of very similar quality; in this
case, the traffic load is fairly low, and congestion is not a big
issue (the flows do not cause high levels of interference to each
other). When there are eight concurrent video connections (and
interference across connections is more prevalent), the MDR
protocol achieves a higher MOS compared to the ETX-based
scheme. This is visually depicted in Fig. 12(c) and (d), where
the snapshot in the case of MDR is much clearer than the noisy
snapshot form the ETX-based protocol. Specifically, our pro-
tocol distributes the I-frames across diverse paths with low in-
terference; P-frames that are toward the end of GOPs are rel-
atively packed together onto more congested paths. The ETX
Fig. 12. User experience under different traffic loads. (a) Video snap-
shot—MDR (two connections). (b) Video snapshot—ETX (two connections).
(c) Video snapshot—MDR (eight connections). (d) Video snapshot—ETX
(eight connections).
Fig. 13. Routes for I- and P-frames.
metric, which is agnostic to video semantics, does not distin-
guish between frames and packs them together, causing high
distortion. It is difficult to explicitly prove that I- and P-frames
follow somewhat disjoint paths due to the stochastic nature of
the process. The intuition, however, is based on the fact that the
sensitivities and of the I- and P-frames, respectively, are, in
general, different. This has as a consequence that the frame-loss
probability for an I-frame is different from that of a P-frame,
resulting in their choosing different routes.
To illustrate this, we consider a simple network as shown in
Fig. 13 and perform an experiment with eight concurrent flows.
For each video flow , we show in Fig. 13 the
corresponding sender and receiver denoted by and , re-
spectively. We focus on flow 3 and show the different routes
for the I- and P-frames for both the MDR and the ETX-based
routing protocols. We notice that when MDR is used, the routes
for the I- and P-frames are different. Specifically, the routes for
the packets that belong to I-frames, and the corresponding frac-
tions of the I-frame traffic they serve are as follows: 58.4% of
the I-frame packets are routed through
For More Details Contact G.Venkat Rao
8143271457
424 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 23, NO. 2, APRIL 2015
; 14.6% of the I-frame traffic is routed
through ; 16% is
routed through ; and 11% through
. Meanwhile,
the routes and traffic split for P-frame packets are as follows:
56.7% of the P-frame packets use the path
; 6.3% is using ;
24% is routed through ; and 13%
through . Notice
that the majority of I-frames are routed via a path that is dis-
joint from the path followed by the majority of the P-frames.
In contrast to the MDR case, when the ETX-based scheme is
used, both the I- and P-frames are routed through the same path:
.
VII. CONCLUSION
In this paper, we argue that a routing policy that is appli-
cation-aware is likely to provide benefits in terms of user-per-
ceived performance. Specifically, we consider a network that
primarily carries video flows. We seek to understand the impact
of routing on the end-to-end distortion of video flows. Toward
this, we construct an analytical model that ties video distortion
to the underlying packet-loss probabilities. Using this model,
we find the optimal route (in terms of distortion) between a
source and a destination node using a dynamic programming
approach. Unlike traditional metrics such as ETX, our approach
takes into account correlation across packet losses that influence
video distortion. Based on our approach, we design a practical
routing scheme that we then evaluate via extensive simulations
and testbed experiments. Our simulation study shows that the
distortion (in terms of PSNR) is decreased by 20% compared to
ETX-based routing. Moreover, the user experience degradation
due to increased traffic load in the network is kept to a minimum.
REFERENCES
[1] ISO/IEC JTC1/SC29/WG11, “ISO/IEC 14496—Coding of audio-vi-
sual objects,” [Online]. Available: http://mpeg.chiariglione.org/
standards/mpeg-4/mpeg-4.htm
[2] T. Wiegand, G. J. Sullivan, G. Bjontegaard, and A. Luthra, “Overview
of the H.264/AVC video coding standard,” IEEE Trans. Circuits Syst.
Video Technol., vol. 13, no. 7, pp. 560–576, Jul. 2003.
[3] D. S. J. D. Couto, D. Aguayo, J. Bicket, and R. Morris, “A high-
throughput path metric for multi-hop wireless routing,” in Proc. 9th
MobiCom, San Diego, CA, USA, Sep. 2003, pp. 134–146.
[4] J. M. Boyce, “Packet loss resilient transmission of MPEG video over
the internet,” Signal Process., Image Commun., vol. 15, no. 1–2, pp.
7–24, Sep. 1999.
[5] Y.-C. Lee, J. Kim, Y. Altunbasak, and R. M. Mersereau, “Layered
coded vs. multiple description coded video over error-prone networks,”
Signal Process., Image Commun., vol. 18, no. 5, pp. 337–356, May
2003.
[6] J. Chakareski, S. Han, and B. Girod, “Layered coding vs. multiple de-
scriptions for video streaming over multiple paths,” Multimedia Syst.,
vol. 10, pp. 275–285, 2005.
[7] Y. Wang, S. Wenger, J. Wen, and A. K. Katsaggelos, “Real-time com-
munications over unreliable networks,” IEEE Signal Process. Mag.,
vol. 17, no. 4, pp. 61–82, Jul. 2000.
[8] R. Zhang, S. L. Regunathan, and K. Rose, “Video coding with op-
timal inter/intra-mode switching for packet loss resilience,” IEEE J.
Sel. Areas Commun., vol. 18, no. 6, pp. 966–976, Jun. 2000.
[9] J. Xiao, T. Tillo, and Y. Zhao, “Error-resilient video coding with
end-to-end rate-distortion optimized at macroblock level,” EURASIP
J. Adv. Signal Process., vol. 2011, no. 1, p. 80, 2011.
[10] M. T. Ivrla˘c, L. U. Choi, E. Steinbach, and J. A. Nossek, “Models and
analysis of streaming video transmission over wireless fading chan-
nels,” Signal Process., Image Commun., vol. 24, no. 8, pp. 651–665,
Sep. 2009.
[11] Y. J. Liang, J. G. Apostolopoulos, and B. Girod, “Analysis of packet
loss for compressed video: Effect of burst losses and correlation be-
tween error frames,” IEEE Trans. Circuits Syst. Video Technol., vol.
18, no. 7, pp. 861–874, Jul. 2008.
[12] D. Li and J. Pan, “Performance evaluation of video streaming over
multi-hop wireless networks,” IEEE Trans. Wireless Commun., vol. 9,
no. 1, pp. 338–347, Jan. 2010.
[13] Y. Wang, Z. Wu, and J. M. Boyce, “Modeling of transmission-loss-
induced distortion in decoded video,” IEEE Trans. Circuits Syst. Video
Technol., vol. 16, no. 6, pp. 716–732, Jun. 2006.
[14] D. Migliorini, E. Mingozzi, and C. Vallati, “Performance evaluation of
H.264/SVC video streaming over mobile WiMAX,” Comput. Netw.,
vol. 55, no. 15, pp. 3578–3591, Oct. 2011.
[15] E. Alotaibi and B. Mukherjee, “A survey on routing algorithms for
wireless ad-hoc and mesh networks,” Comput. Netw., vol. 56, no. 2,
pp. 940–965, Feb. 2012.
[16] L. Hanzo and R. Tafazolli, “A survey of QoS routing solutions for mo-
bile ad hoc networks,” IEEE Commun. Surveys Tuts., vol. 9, no. 2, pp.
50–70, Apr. 2007.
[17] W. Wei and A. Zakhor, “Robust multipath source routing protocol
(RMPSR) for video communication over wireless ad hoc networks,”
in Proc. IEEE ICME, Taipei, Taiwan, Jun. 2004, pp. 1379–1382.
[18] J. Chen, S.-H. G. Chan, and V. O. Li, “Multipath routing for video de-
livery over bandwidth-limited networks,” IEEE J. Sel. Areas Commun.,
vol. 22, no. 10, pp. 1920–1932, Dec. 2010.
[19] S. Mao, Y. T. Hou, X. Cheng, H. D. Sherali, S. F. Midkiff, and Y.-Q.
Zhang, “On routing for multiple description video over wireless ad hoc
networks,” IEEE Trans. Multimedia, vol. 8, no. 5, pp. 1063–1074, Oct.
2006.
[20] S. Mao, X. Cheng, Y. T. Hou, and H. D. Sherali, “Multiple description
video multicast in wireless ad hoc networks,” Mobile Netw. Appl., vol.
11, no. 1, pp. 63–73, Feb. 2006.
[21] B. Rong, Y. Qian, K. Lu, R. Qingyang, and M. Kadoch, “Multipath
routing over wireless mesh networks for multiple description video
transmission,” IEEE J. Sel. Areas Commun., vol. 28, no. 3, pp.
321–331, Apr. 2010.
[22] D. Kandris, M. Tsagkaropoulos, I. Politis, A. Tzes, and S. Kotsopoulos,
“Energy efficient and perceived QoS aware video routing over wireless
multimedia sensor networks,” Ad Hoc Netw., vol. 9, no. 4, pp. 591–607,
2011.
[23] M. M. Hira, F. A. Tobagi, and K. Medepalli, “Throughput analysis of
a path in an IEEE 802.11 multihop wireless network,” in Proc. IEEE
WCNC, Hong Kong, Mar. 2007, pp. 441–446.
[24] M. Garetto, T. Salonidis, and E. W. Knightly, “Modeling per-flow
throughput and capturing starvation in CSMA multi-hop wireless net-
works,” in Proc. IEEE INFOCOM, Barcelona, Spain, Apr. 2006, pp.
1–13.
[25] K. Medepalli and F. A. Tobagi, “Towards performance modeling of
IEEE 802.11 based wireless networks: A unified framework and its
applications,” in Pro. IEEE INFOCOM, Barcelona, Spain, Apr. 2006,
pp. 1–12.
[26] J. S. Baras, V. Tabatabaee, G. Papageorgiou, and N. Rentz, “Perfor-
mance metric sensitivity computation for optimization and trade-off
analysis in wireless networks,” in Proc. IEEE GLOBECOM, New Or-
leans, LA, USA, Nov. 2008, pp. 1–5.
[27] T. H. Cormen, C. E. Leiserson, and R. L. Rivest, Introduction to Algo-
rithms. New York, NY, USA: McGraw-Hill, 2000.
[28] D. P. Bertsekas, Dynamic Programming and Optimal Control, Vol I,
ser. Optimization and Computation Series, 2nd ed. Belmont, MA,
USA: Athena Scientific, 2000.
[29] M. L. Puterman, Markov Decision Processes: Discrete Stochastic Dy-
namic Programming. Hoboken, NJ, USA: Wiley-Interscience, 2005.
[30] “The Network Simulator, ns-2,” 2011 [Online]. Available:
http://nsnam.isi.edu/nsnam/index.php/Main_Page
[31] “The Click Modular Router Project,” 2013 [Online]. Available: http://
www.read.cs.ucla.edu/click
[32] E. Kohler, R. Morris, B. Chen, J. Jannotti, and M. F. Kaashoek, “The
click modular router,” Trans. Comput. Syst., vol. 18, no. 3, pp. 263–297,
Aug. 2000.
[33] J. Klaue, B. Rathke, and A. Wolisz, “EvalVid-A framework for video
transmission and quality evaluation,” in Proc. 13th Int. Conf. Model.
Tech. Tools Comput. Perform. Eval., Urbana, IL, USA, Sep. 2003.
For More Details Contact G.Venkat Rao
8143271457
PAPAGEORGIOU et al.: DISTORTION-RESISTANT ROUTING FRAMEWORK FOR VIDEO TRAFFIC 425
[34] A. Bovik, The Essential Guide to Video Processing. New York, NY,
USA: Academic, 2009.
[35] C.-H. Ke, C.-K. Shieh, W.-S. Hwang, and A. Ziviani, “An evaluation
framework for more realistic simulations of MPEG video transmis-
sion,” J. Inf. Sci. Eng., vol. 24, no. 2, pp. 425–440, Mar. 2008.
[36] C. A. Poynton, A Technical Introduction to Digital Video. New York,
NY, USA: Wiley, 1996.
[37] “PhysMo: Video motion analysis,” [Online]. Available: http://physmo.
sourceforge.net
[38] “AForge.NET,” [Online]. Available: http://www.aforgenet.com/
framework/features/motion_detection/_2.0.html
[39] R. Draves, J. Padhye, and B. Zill, “Routing in multi-radio, multi-hop
wireless mesh networks,” in Proc. 10th MobiCom, Philadelphia, PA,
USA, Sep. 2004, pp. 114–128.
[40] University of California, Riverside, CA, USA, “Wireless networking
research testbed,” 2011 [Online]. Available: http://networks.cs.ucr.
edu/testbed/
George Papageorgiou (M'10) received the B.S. and
M.S. degrees in computer science from the Univer-
sity of Athens, Athens, Greece, in 1997 and 2000,
respectively, and the M.S. and Ph.D. degrees in elec-
trical and computer engineering from the University
of Maryland, College Park, MD, USA, in 2005 and
2010, respectively.
Since 2010, he has been a Postdoctoral Scholar
with the University of California, Riverside, CA,
USA. His research interests include various aspects
of wireless networking such as video communica-
tions on wireless networks, routing, flow control, and network security.
Dr. Papageorgiou is a member of the Association for Computing Machinery
(ACM). He coauthored a paper that received the IEEE GLOBECOM 2008 Best
Paper Award for wireless networks.
Shailendra Singh received the B.Tech. degree in
computer science and engineering from the Gautam
Buddh Technical University (GBTU), Lucknow,
India, in 2007, and the M.S. in computer science
from the State University of New York, Binghamton,
NY, USA, in 2009, and is currently pursuing the
Ph.D. degree in computer science at the University
of California, Riverside, CA, USA.
His research interests include wireless networks
and mobile computing with an emphasis on design
and implementation of flexible and adaptive wireless
communication systems.
Srikanth V. Krishnamurthy (S'94–M'00–SM'07–
F'12) received the Ph.D. degree in electrical and
computer engineering from the University of Cali-
fornia at San Diego, La Jolla, CA, USA, in 1997.
From 1998 to 2000, he was a Research Staff Scien-
tist with the Information Sciences Laboratory, HRL
Laboratories, LLC, Malibu, CA, USA. Currently, he
is a Professor of computer science with the Univer-
sity of California, Riverside, CA, USA. His research
interests are in wireless networks, online social net-
works, and network security.
Dr. Krishnamurthy was the Editor-in-Chief for Mobile Computing and Com-
munications Review from 2007 to 2009 and is currently the Associate Editor-in-
Chief for the IEEE TRANSACTIONS ON MOBILE COMPUTING. He is the recipient
of the NSF CAREER Award from ANI in 2003.
Ramesh Govindan (F'14) received the B.Tech. de-
gree from the Indian Institute of Technology, Madras,
India, in 1987, and the M.S. and Ph.D. degrees from
the University of California, Berkeley, CA, USA, in
1989 and 1992, respectively, all in computer science.
He is a Professor with the Computer Science
Department, University of Southern California, Los
Angeles, CA, USA. His research interests include
routing and measurements in large internets, wireless
sensor networks, and mobile computing systems.
Thomas F. La Porta (M'87–SM'99–F'02) received
the B.S.E.E. and M.S.E.E. degrees from The Cooper
Union, New York, NY, USA, in 1986 and 1987, re-
spectively, and the Ph.D. degree in electrical engi-
neering from Columbia University, New York, NY,
USA, in 1992.
He is the William E. Leonhard Chair Professor
with the Computer Science and Engineering De-
partment, Pennsylvania State University (Penn
State), University Park, PA, USA. He joined Penn
State in 2002. He is the Director of the Institute of
Networking and Security Research, Penn State. Prior to joining Penn State,
he was with Bell Laboratories, Holmdel, NJ, USA, where he was the Director
of the Mobile Networking Research Department, Bell Laboratories, Lucent
Technologies, where he led various projects in wireless and mobile networking.
He holds 35 patents. His research interests include mobility management,
signaling and control for wireless networks, security for wireless systems,
mobile data systems, and protocol design.
Dr. La Porta is a Bell Labs Fellow. He was the founding Editor-in-Chief of
the IEEE TRANSACTIONS ON MOBILE COMPUTING. He served as Editor-in-Chief
of IEEE Personal Communications. He was the Director of Magazines for the
IEEE Communications Society and was on its Board of Governors for 3 years.
He received the Bell Labs Distinguished Technical Staff Award in 1996, and an
Eta Kappa Nu Outstanding Young Electrical Engineer Award in 1996. He also
won Thomas Alva Edison Patent Awards in 2005 and 2009.
For More Details Contact G.Venkat Rao
8143271457

More Related Content

What's hot

A hybrid push pull overlay network for
A hybrid push pull overlay network forA hybrid push pull overlay network for
A hybrid push pull overlay network forijp2p
 
Superfast Broadband. The Engineering of High Speed over existing tracks
Superfast Broadband. The Engineering of High Speed over existing tracksSuperfast Broadband. The Engineering of High Speed over existing tracks
Superfast Broadband. The Engineering of High Speed over existing tracksJohn Marshall
 
Stabilization of Variable Bit Rate Video Streams Using Linear Lyapunov Functi...
Stabilization of Variable Bit Rate Video Streams Using Linear Lyapunov Functi...Stabilization of Variable Bit Rate Video Streams Using Linear Lyapunov Functi...
Stabilization of Variable Bit Rate Video Streams Using Linear Lyapunov Functi...ijait
 
Video Streaming Compression for Wireless Multimedia Sensor Networks
Video Streaming Compression for Wireless Multimedia Sensor NetworksVideo Streaming Compression for Wireless Multimedia Sensor Networks
Video Streaming Compression for Wireless Multimedia Sensor NetworksIOSR Journals
 
An Overview on Multimedia Transcoding Techniques on Streaming Digital Contents
An Overview on Multimedia Transcoding Techniques on Streaming Digital ContentsAn Overview on Multimedia Transcoding Techniques on Streaming Digital Contents
An Overview on Multimedia Transcoding Techniques on Streaming Digital Contentsidescitation
 
Lte sae-certification-course
Lte sae-certification-courseLte sae-certification-course
Lte sae-certification-courseKannan Selvam
 
Mpls vpn using vrf virtual routing and forwarding
Mpls vpn using vrf virtual routing and forwardingMpls vpn using vrf virtual routing and forwarding
Mpls vpn using vrf virtual routing and forwardingIJARIIT
 
Wireless communication and Network
Wireless communication and Network Wireless communication and Network
Wireless communication and Network Chanaka Lasantha
 
Robust Video Watermarking Scheme Based on Intra-Coding Process in MPEG-2 Style
Robust Video Watermarking Scheme Based on Intra-Coding Process in MPEG-2 Style Robust Video Watermarking Scheme Based on Intra-Coding Process in MPEG-2 Style
Robust Video Watermarking Scheme Based on Intra-Coding Process in MPEG-2 Style IJECEIAES
 
Segment Combination based Approach for Energy- Aware Multipath Communication ...
Segment Combination based Approach for Energy- Aware Multipath Communication ...Segment Combination based Approach for Energy- Aware Multipath Communication ...
Segment Combination based Approach for Energy- Aware Multipath Communication ...ijsrd.com
 
A Cross-Layer Based Multipath Routing Protocol To Improve QoS In Mobile Adhoc...
A Cross-Layer Based Multipath Routing Protocol To Improve QoS In Mobile Adhoc...A Cross-Layer Based Multipath Routing Protocol To Improve QoS In Mobile Adhoc...
A Cross-Layer Based Multipath Routing Protocol To Improve QoS In Mobile Adhoc...IDES Editor
 

What's hot (20)

A hybrid push pull overlay network for
A hybrid push pull overlay network forA hybrid push pull overlay network for
A hybrid push pull overlay network for
 
Superfast Broadband. The Engineering of High Speed over existing tracks
Superfast Broadband. The Engineering of High Speed over existing tracksSuperfast Broadband. The Engineering of High Speed over existing tracks
Superfast Broadband. The Engineering of High Speed over existing tracks
 
B010410411
B010410411B010410411
B010410411
 
Presentation Crosshaul (Nem Summit, Madrid) - 29Nov2017
Presentation Crosshaul (Nem Summit, Madrid) - 29Nov2017Presentation Crosshaul (Nem Summit, Madrid) - 29Nov2017
Presentation Crosshaul (Nem Summit, Madrid) - 29Nov2017
 
Stabilization of Variable Bit Rate Video Streams Using Linear Lyapunov Functi...
Stabilization of Variable Bit Rate Video Streams Using Linear Lyapunov Functi...Stabilization of Variable Bit Rate Video Streams Using Linear Lyapunov Functi...
Stabilization of Variable Bit Rate Video Streams Using Linear Lyapunov Functi...
 
Video Streaming Compression for Wireless Multimedia Sensor Networks
Video Streaming Compression for Wireless Multimedia Sensor NetworksVideo Streaming Compression for Wireless Multimedia Sensor Networks
Video Streaming Compression for Wireless Multimedia Sensor Networks
 
Resume_santosh
Resume_santoshResume_santosh
Resume_santosh
 
An Overview on Multimedia Transcoding Techniques on Streaming Digital Contents
An Overview on Multimedia Transcoding Techniques on Streaming Digital ContentsAn Overview on Multimedia Transcoding Techniques on Streaming Digital Contents
An Overview on Multimedia Transcoding Techniques on Streaming Digital Contents
 
Lte sae-certification-course
Lte sae-certification-courseLte sae-certification-course
Lte sae-certification-course
 
Mpls vpn using vrf virtual routing and forwarding
Mpls vpn using vrf virtual routing and forwardingMpls vpn using vrf virtual routing and forwarding
Mpls vpn using vrf virtual routing and forwarding
 
Wireless communication and Network
Wireless communication and Network Wireless communication and Network
Wireless communication and Network
 
5 data link-lan.key
5 data link-lan.key5 data link-lan.key
5 data link-lan.key
 
Robust Video Watermarking Scheme Based on Intra-Coding Process in MPEG-2 Style
Robust Video Watermarking Scheme Based on Intra-Coding Process in MPEG-2 Style Robust Video Watermarking Scheme Based on Intra-Coding Process in MPEG-2 Style
Robust Video Watermarking Scheme Based on Intra-Coding Process in MPEG-2 Style
 
3 transport.key
3 transport.key3 transport.key
3 transport.key
 
Chapter3
Chapter3Chapter3
Chapter3
 
4 network.key
4 network.key4 network.key
4 network.key
 
1 introduction.key
1 introduction.key1 introduction.key
1 introduction.key
 
Segment Combination based Approach for Energy- Aware Multipath Communication ...
Segment Combination based Approach for Energy- Aware Multipath Communication ...Segment Combination based Approach for Energy- Aware Multipath Communication ...
Segment Combination based Approach for Energy- Aware Multipath Communication ...
 
A Cross-Layer Based Multipath Routing Protocol To Improve QoS In Mobile Adhoc...
A Cross-Layer Based Multipath Routing Protocol To Improve QoS In Mobile Adhoc...A Cross-Layer Based Multipath Routing Protocol To Improve QoS In Mobile Adhoc...
A Cross-Layer Based Multipath Routing Protocol To Improve QoS In Mobile Adhoc...
 
Cp Fu03a
Cp Fu03aCp Fu03a
Cp Fu03a
 

Similar to A distortion resistant routing framework for video traffic in wireless multihop networks

A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMING
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMINGA HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMING
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMINGijp2p
 
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMING
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMINGA HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMING
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMINGijp2p
 
The impact of jitter on the HEVC video streaming with Multiple Coding
The impact of jitter on the HEVC video streaming with  Multiple CodingThe impact of jitter on the HEVC video streaming with  Multiple Coding
The impact of jitter on the HEVC video streaming with Multiple CodingHakimSahour
 
Internet Path Selection on Video QoE Analysis and Improvements
Internet Path Selection on Video QoE Analysis and ImprovementsInternet Path Selection on Video QoE Analysis and Improvements
Internet Path Selection on Video QoE Analysis and ImprovementsIJTET Journal
 
Revamping quality of service of video streaming over wireless lan
Revamping quality of service of video streaming over wireless lanRevamping quality of service of video streaming over wireless lan
Revamping quality of service of video streaming over wireless laneSAT Publishing House
 
Performance evaluation of mpeg 4 video transmission over ip-networks
Performance evaluation of mpeg 4 video transmission over ip-networksPerformance evaluation of mpeg 4 video transmission over ip-networks
Performance evaluation of mpeg 4 video transmission over ip-networksAlexander Decker
 
11.performance evaluation of mpeg 0004www.iiste.org call for-paper video tran...
11.performance evaluation of mpeg 0004www.iiste.org call for-paper video tran...11.performance evaluation of mpeg 0004www.iiste.org call for-paper video tran...
11.performance evaluation of mpeg 0004www.iiste.org call for-paper video tran...Alexander Decker
 
IBM VideoCharger and Digital Library MediaBase.doc
IBM VideoCharger and Digital Library MediaBase.docIBM VideoCharger and Digital Library MediaBase.doc
IBM VideoCharger and Digital Library MediaBase.docVideoguy
 
JPJ1445 Traffic Pattern-Based Content Leakage Detection for Trusted Content D...
JPJ1445 Traffic Pattern-Based Content Leakage Detection for Trusted Content D...JPJ1445 Traffic Pattern-Based Content Leakage Detection for Trusted Content D...
JPJ1445 Traffic Pattern-Based Content Leakage Detection for Trusted Content D...chennaijp
 
TRAFFIC PATTERN-BASED CONTENT LEAKAGE DETECTION FOR TRUSTED CONTENT DELIVERY ...
TRAFFIC PATTERN-BASED CONTENT LEAKAGE DETECTION FOR TRUSTED CONTENT DELIVERY ...TRAFFIC PATTERN-BASED CONTENT LEAKAGE DETECTION FOR TRUSTED CONTENT DELIVERY ...
TRAFFIC PATTERN-BASED CONTENT LEAKAGE DETECTION FOR TRUSTED CONTENT DELIVERY ...Shakas Technologies
 
VIDEO QUALITY ASSESSMENT USING LAPLACIAN MODELING OF MOTION VECTOR DISTRIBUTI...
VIDEO QUALITY ASSESSMENT USING LAPLACIAN MODELING OF MOTION VECTOR DISTRIBUTI...VIDEO QUALITY ASSESSMENT USING LAPLACIAN MODELING OF MOTION VECTOR DISTRIBUTI...
VIDEO QUALITY ASSESSMENT USING LAPLACIAN MODELING OF MOTION VECTOR DISTRIBUTI...sipij
 
MODELLING AND PREFORMANCE ANALYSIS FOR VIDEO ON DEMAND PRIOR STORING SERVER
MODELLING AND PREFORMANCE ANALYSIS FOR VIDEO ON DEMAND PRIOR STORING SERVER MODELLING AND PREFORMANCE ANALYSIS FOR VIDEO ON DEMAND PRIOR STORING SERVER
MODELLING AND PREFORMANCE ANALYSIS FOR VIDEO ON DEMAND PRIOR STORING SERVER ijwmn
 
RESPONSIVE VIDEO FORMAT FOR ADAPTIVE STREAMING
RESPONSIVE VIDEO FORMAT FOR ADAPTIVE STREAMINGRESPONSIVE VIDEO FORMAT FOR ADAPTIVE STREAMING
RESPONSIVE VIDEO FORMAT FOR ADAPTIVE STREAMINGJournal For Research
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
B E M E Projects M C A Projects B
B E  M E  Projects  M C A  Projects  BB E  M E  Projects  M C A  Projects  B
B E M E Projects M C A Projects Bncct
 

Similar to A distortion resistant routing framework for video traffic in wireless multihop networks (20)

report
reportreport
report
 
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMING
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMINGA HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMING
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMING
 
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMING
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMINGA HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMING
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMING
 
The impact of jitter on the HEVC video streaming with Multiple Coding
The impact of jitter on the HEVC video streaming with  Multiple CodingThe impact of jitter on the HEVC video streaming with  Multiple Coding
The impact of jitter on the HEVC video streaming with Multiple Coding
 
Internet Path Selection on Video QoE Analysis and Improvements
Internet Path Selection on Video QoE Analysis and ImprovementsInternet Path Selection on Video QoE Analysis and Improvements
Internet Path Selection on Video QoE Analysis and Improvements
 
05999528
0599952805999528
05999528
 
Revamping quality of service of video streaming over wireless lan
Revamping quality of service of video streaming over wireless lanRevamping quality of service of video streaming over wireless lan
Revamping quality of service of video streaming over wireless lan
 
[32]
[32][32]
[32]
 
Cg25492495
Cg25492495Cg25492495
Cg25492495
 
Performance evaluation of mpeg 4 video transmission over ip-networks
Performance evaluation of mpeg 4 video transmission over ip-networksPerformance evaluation of mpeg 4 video transmission over ip-networks
Performance evaluation of mpeg 4 video transmission over ip-networks
 
11.performance evaluation of mpeg 0004www.iiste.org call for-paper video tran...
11.performance evaluation of mpeg 0004www.iiste.org call for-paper video tran...11.performance evaluation of mpeg 0004www.iiste.org call for-paper video tran...
11.performance evaluation of mpeg 0004www.iiste.org call for-paper video tran...
 
IBM VideoCharger and Digital Library MediaBase.doc
IBM VideoCharger and Digital Library MediaBase.docIBM VideoCharger and Digital Library MediaBase.doc
IBM VideoCharger and Digital Library MediaBase.doc
 
JPJ1445 Traffic Pattern-Based Content Leakage Detection for Trusted Content D...
JPJ1445 Traffic Pattern-Based Content Leakage Detection for Trusted Content D...JPJ1445 Traffic Pattern-Based Content Leakage Detection for Trusted Content D...
JPJ1445 Traffic Pattern-Based Content Leakage Detection for Trusted Content D...
 
QoE in DASH
QoE in DASHQoE in DASH
QoE in DASH
 
TRAFFIC PATTERN-BASED CONTENT LEAKAGE DETECTION FOR TRUSTED CONTENT DELIVERY ...
TRAFFIC PATTERN-BASED CONTENT LEAKAGE DETECTION FOR TRUSTED CONTENT DELIVERY ...TRAFFIC PATTERN-BASED CONTENT LEAKAGE DETECTION FOR TRUSTED CONTENT DELIVERY ...
TRAFFIC PATTERN-BASED CONTENT LEAKAGE DETECTION FOR TRUSTED CONTENT DELIVERY ...
 
VIDEO QUALITY ASSESSMENT USING LAPLACIAN MODELING OF MOTION VECTOR DISTRIBUTI...
VIDEO QUALITY ASSESSMENT USING LAPLACIAN MODELING OF MOTION VECTOR DISTRIBUTI...VIDEO QUALITY ASSESSMENT USING LAPLACIAN MODELING OF MOTION VECTOR DISTRIBUTI...
VIDEO QUALITY ASSESSMENT USING LAPLACIAN MODELING OF MOTION VECTOR DISTRIBUTI...
 
MODELLING AND PREFORMANCE ANALYSIS FOR VIDEO ON DEMAND PRIOR STORING SERVER
MODELLING AND PREFORMANCE ANALYSIS FOR VIDEO ON DEMAND PRIOR STORING SERVER MODELLING AND PREFORMANCE ANALYSIS FOR VIDEO ON DEMAND PRIOR STORING SERVER
MODELLING AND PREFORMANCE ANALYSIS FOR VIDEO ON DEMAND PRIOR STORING SERVER
 
RESPONSIVE VIDEO FORMAT FOR ADAPTIVE STREAMING
RESPONSIVE VIDEO FORMAT FOR ADAPTIVE STREAMINGRESPONSIVE VIDEO FORMAT FOR ADAPTIVE STREAMING
RESPONSIVE VIDEO FORMAT FOR ADAPTIVE STREAMING
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
B E M E Projects M C A Projects B
B E  M E  Projects  M C A  Projects  BB E  M E  Projects  M C A  Projects  B
B E M E Projects M C A Projects B
 

More from Pvrtechnologies Nellore

A High Throughput List Decoder Architecture for Polar Codes
A High Throughput List Decoder Architecture for Polar CodesA High Throughput List Decoder Architecture for Polar Codes
A High Throughput List Decoder Architecture for Polar CodesPvrtechnologies Nellore
 
Performance/Power Space Exploration for Binary64 Division Units
Performance/Power Space Exploration for Binary64 Division UnitsPerformance/Power Space Exploration for Binary64 Division Units
Performance/Power Space Exploration for Binary64 Division UnitsPvrtechnologies Nellore
 
Hybrid LUT/Multiplexer FPGA Logic Architectures
Hybrid LUT/Multiplexer FPGA Logic ArchitecturesHybrid LUT/Multiplexer FPGA Logic Architectures
Hybrid LUT/Multiplexer FPGA Logic ArchitecturesPvrtechnologies Nellore
 
Input-Based Dynamic Reconfiguration of Approximate Arithmetic Units for Video...
Input-Based Dynamic Reconfiguration of Approximate Arithmetic Units for Video...Input-Based Dynamic Reconfiguration of Approximate Arithmetic Units for Video...
Input-Based Dynamic Reconfiguration of Approximate Arithmetic Units for Video...Pvrtechnologies Nellore
 
2016 2017 ieee ece embedded- project titles
2016   2017 ieee ece  embedded- project titles2016   2017 ieee ece  embedded- project titles
2016 2017 ieee ece embedded- project titlesPvrtechnologies Nellore
 
A High-Speed FPGA Implementation of an RSD-Based ECC Processor
A High-Speed FPGA Implementation of an RSD-Based ECC ProcessorA High-Speed FPGA Implementation of an RSD-Based ECC Processor
A High-Speed FPGA Implementation of an RSD-Based ECC ProcessorPvrtechnologies Nellore
 
6On Efficient Retiming of Fixed-Point Circuits
6On Efficient Retiming of Fixed-Point Circuits6On Efficient Retiming of Fixed-Point Circuits
6On Efficient Retiming of Fixed-Point CircuitsPvrtechnologies Nellore
 
Pre encoded multipliers based on non-redundant radix-4 signed-digit encoding
Pre encoded multipliers based on non-redundant radix-4 signed-digit encodingPre encoded multipliers based on non-redundant radix-4 signed-digit encoding
Pre encoded multipliers based on non-redundant radix-4 signed-digit encodingPvrtechnologies Nellore
 
Quality of-protection-driven data forwarding for intermittently connected wir...
Quality of-protection-driven data forwarding for intermittently connected wir...Quality of-protection-driven data forwarding for intermittently connected wir...
Quality of-protection-driven data forwarding for intermittently connected wir...Pvrtechnologies Nellore
 
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...Pvrtechnologies Nellore
 
Control cloud data access privilege and anonymity with fully anonymous attrib...
Control cloud data access privilege and anonymity with fully anonymous attrib...Control cloud data access privilege and anonymity with fully anonymous attrib...
Control cloud data access privilege and anonymity with fully anonymous attrib...Pvrtechnologies Nellore
 
Cloud keybank privacy and owner authorization
Cloud keybank  privacy and owner authorizationCloud keybank  privacy and owner authorization
Cloud keybank privacy and owner authorizationPvrtechnologies Nellore
 
Circuit ciphertext policy attribute-based hybrid encryption with verifiable
Circuit ciphertext policy attribute-based hybrid encryption with verifiableCircuit ciphertext policy attribute-based hybrid encryption with verifiable
Circuit ciphertext policy attribute-based hybrid encryption with verifiablePvrtechnologies Nellore
 

More from Pvrtechnologies Nellore (20)

A High Throughput List Decoder Architecture for Polar Codes
A High Throughput List Decoder Architecture for Polar CodesA High Throughput List Decoder Architecture for Polar Codes
A High Throughput List Decoder Architecture for Polar Codes
 
Performance/Power Space Exploration for Binary64 Division Units
Performance/Power Space Exploration for Binary64 Division UnitsPerformance/Power Space Exploration for Binary64 Division Units
Performance/Power Space Exploration for Binary64 Division Units
 
Hybrid LUT/Multiplexer FPGA Logic Architectures
Hybrid LUT/Multiplexer FPGA Logic ArchitecturesHybrid LUT/Multiplexer FPGA Logic Architectures
Hybrid LUT/Multiplexer FPGA Logic Architectures
 
Input-Based Dynamic Reconfiguration of Approximate Arithmetic Units for Video...
Input-Based Dynamic Reconfiguration of Approximate Arithmetic Units for Video...Input-Based Dynamic Reconfiguration of Approximate Arithmetic Units for Video...
Input-Based Dynamic Reconfiguration of Approximate Arithmetic Units for Video...
 
2016 2017 ieee matlab project titles
2016 2017 ieee matlab project titles2016 2017 ieee matlab project titles
2016 2017 ieee matlab project titles
 
2016 2017 ieee vlsi project titles
2016   2017 ieee vlsi project titles2016   2017 ieee vlsi project titles
2016 2017 ieee vlsi project titles
 
2016 2017 ieee ece embedded- project titles
2016   2017 ieee ece  embedded- project titles2016   2017 ieee ece  embedded- project titles
2016 2017 ieee ece embedded- project titles
 
A High-Speed FPGA Implementation of an RSD-Based ECC Processor
A High-Speed FPGA Implementation of an RSD-Based ECC ProcessorA High-Speed FPGA Implementation of an RSD-Based ECC Processor
A High-Speed FPGA Implementation of an RSD-Based ECC Processor
 
6On Efficient Retiming of Fixed-Point Circuits
6On Efficient Retiming of Fixed-Point Circuits6On Efficient Retiming of Fixed-Point Circuits
6On Efficient Retiming of Fixed-Point Circuits
 
Pre encoded multipliers based on non-redundant radix-4 signed-digit encoding
Pre encoded multipliers based on non-redundant radix-4 signed-digit encodingPre encoded multipliers based on non-redundant radix-4 signed-digit encoding
Pre encoded multipliers based on non-redundant radix-4 signed-digit encoding
 
Quality of-protection-driven data forwarding for intermittently connected wir...
Quality of-protection-driven data forwarding for intermittently connected wir...Quality of-protection-driven data forwarding for intermittently connected wir...
Quality of-protection-driven data forwarding for intermittently connected wir...
 
11.online library management system
11.online library management system11.online library management system
11.online library management system
 
06.e voting system
06.e voting system06.e voting system
06.e voting system
 
New web based projects list
New web based projects listNew web based projects list
New web based projects list
 
Power controlled medium access control
Power controlled medium access controlPower controlled medium access control
Power controlled medium access control
 
IEEE PROJECTS LIST
IEEE PROJECTS LIST IEEE PROJECTS LIST
IEEE PROJECTS LIST
 
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
 
Control cloud data access privilege and anonymity with fully anonymous attrib...
Control cloud data access privilege and anonymity with fully anonymous attrib...Control cloud data access privilege and anonymity with fully anonymous attrib...
Control cloud data access privilege and anonymity with fully anonymous attrib...
 
Cloud keybank privacy and owner authorization
Cloud keybank  privacy and owner authorizationCloud keybank  privacy and owner authorization
Cloud keybank privacy and owner authorization
 
Circuit ciphertext policy attribute-based hybrid encryption with verifiable
Circuit ciphertext policy attribute-based hybrid encryption with verifiableCircuit ciphertext policy attribute-based hybrid encryption with verifiable
Circuit ciphertext policy attribute-based hybrid encryption with verifiable
 

Recently uploaded

POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 

Recently uploaded (20)

Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 

A distortion resistant routing framework for video traffic in wireless multihop networks

  • 1. 412 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 23, NO. 2, APRIL 2015 A Distortion-Resistant Routing Framework for Video Traffic in Wireless Multihop Networks George Papageorgiou, Member, IEEE, ACM, Shailendra Singh, Srikanth V. Krishnamurthy, Fellow, IEEE, Ramesh Govindan, Fellow, IEEE, and Tom La Porta, Fellow, IEEE Abstract—Traditional routing metrics designed for wireless net- works are application-agnostic. In this paper, we consider a wire- less network where the application flows consist of video traffic. From a user perspective, reducing the level of video distortion is critical. We ask the question “Should the routing policies change if the end-to-end video distortion is to be minimized?” Popular link-quality-based routing metrics (such as ETX) do not account for dependence (in terms of congestion) across the links of a path; as a result, they can cause video flows to converge onto a few paths and, thus, cause high video distortion. To account for the evolu- tion of the video frame loss process, we construct an analytical framework to, first, understand and, second, assess the impact of the wireless network on video distortion. The framework allows us to formulate a routing policy for minimizing distortion, based on which we design a protocol for routing video traffic. We find via simulations and testbed experiments that our protocol is efficient in reducing video distortion and minimizing the user experience degradation. Index Terms—Protocol design, routing, video communications, video distortion minimization, wireless networks. I. INTRODUCTION WITH the advent of smartphones, video traffic has be- come very popular in wireless networks. In tactical net- works or disaster recovery, one can envision the transfer of video clips to facilitate mission management. From a user per- spective, maintaining a good quality of the transferred video is critical. The video quality is affected by: 1) the distortion due to compression at the source, and 2) the distortion due to both wireless channel induced errors and interference. Video encoding standards, like MPEG-4 [1] or H.264/AVC [2], define groups of I-, P-, and B-type frames that provide different levels of encoding and, thus, protection against transmission losses. In particular, the different levels of encoding refer to: 1) either information encoded Manuscript received May 24, 2013; revised November 15, 2013; accepted December 24, 2013; approved by IEEE/ACM TRANSACTIONS ON NETWORKING Editor M. Reisslein. Date of publication February 11, 2014; date of current ver- sion April 14, 2015. This work was supported by the Army Research Laboratory and was accomplished under Cooperative Agreement No. W911NF-09-2-0053. G. Papageorgiou, S. Singh, and S. V. Krishnamurthy are with the Depart- ment of Computer Science and Engineering, University of California, Riverside, Riverside, CA 92521 USA (e-mail: gpapag@cs.ucr.edu; singhs@cs.ucr.edu; krish@cs.ucr.edu). R. Govindan is with the Department of Computer Science, University of Southern California, Los Angeles, CA 90089 USA (e-mail: ramesh@usc.edu). T. La Porta is with the Department of Computer Science and Engineering, The Pennsylvania State University, University Park, PA 16802 USA (e-mail: tlp@cse.psu.edu). Color versions of one or more of the figures in this paper are available online at http://ieeexplore.ieee.org. Digital Object Identifier 10.1109/TNET.2014.2302815 Fig. 1. Multilayer approach. independently, in the case of I-frames, or 2) encoding relative to the information encoded within other frames, as is the case for P- and B-frames. This Group of Pictures (GOP) allows for the mapping of frame losses into a distortion metric that can be used to assess the application-level performance of video transmissions. One of the critical functionalities that is often neglected, but affects the end-to-end quality of a video flow, is routing. Typ- ical routing protocols, designed for wireless multihop settings, are application-agnostic and do not account for correlation of losses on the links that compose a route from a source to a destination node. Furthermore, since flows are considered independently, they can converge onto certain links that then become heavily loaded (thereby increasing video distortion), while others are significantly underutilized. The decisions made by such routing protocols are based on only network (and not application) parameters. In this paper, our thesis is that the user-perceived video quality can be significantly improved by accounting for ap- plication requirements, and specifically the video distortion experienced by a flow, end-to-end. Typically, the schemes used to encode a video clip can accommodate a certain number of packet losses per frame. However, if the number of lost packets in a frame exceeds a certain threshold, the frame cannot be decoded correctly. A frame loss will result in some amount of distortion. The value of distortion at a hop along the path from the source to the destination depends on the positions of the unrecoverable video frames (simply referred to as frames) in the GOP, at that hop. As one of our main contributions, we construct an analytical model to characterize the dynamic behavior of the process that describes the evolution of frame losses in the GOP (instead of just focusing on a network quality metric such as the packet-loss probability) as video is delivered on an end-to-end path. Specifically, with our model, we capture how the choice of path for an end-to-end flow affects the performance of a flow in terms of video distortion. Our model is built based on a multilayer approach as shown in Fig. 1. The packet-loss probability on a link is mapped to the probability of a frame loss in the GOP. The frame-loss probability is then directly associated with the video distortion metric. By using the above mapping from the network-specific property (i.e., packet-loss probability) to the application-specific quality 1063-6692 © 2014 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information. For More Details Contact G.Venkat Rao 8143271457
  • 2. PAPAGEORGIOU et al.: DISTORTION-RESISTANT ROUTING FRAMEWORK FOR VIDEO TRAFFIC 413 metric (i.e., video distortion), we pose the problem of routing as an optimization problem where the objective is to find the path from the source to the destination that minimizes the end-to-end distortion. In our formulation, we explicitly take into account the history of losses in the GOP along the path. This is in stark contrast with traditional routing metrics (such as the total expected transmission count (ETX) [3]) wherein the links are treated in- dependently. Our solution to the problem is based on a dynamic programming approach that effectively captures the evolution of the frame-loss process. We then design a practical routing protocol, based on the above solution, to minimize routing distortion. In a nutshell, since the loss of the longer I-frames that carry fine-grained information affects the distortion metric more, our approach ensures that these frames are carried on the paths that experience the least congestion; the latter frames in a GOP are sent out on relatively more congested paths. Our routing scheme is optimized for transferring video clips on wireless networks with minimum video distortion. Since opti- mizing for video streaming is not an objective of our scheme, constraints relating to time (such as jitter) are not directly taken into account in the design. Specifically, our contributions in this paper are as follows. • Developing an analytical framework to capture the impact of routing on video distortion: As our primary contribution, we develop an analytical framework that captures the im- pact of routing on the end-to-end video quality in terms of distortion. Specifically, the framework facilitates the com- putation of routes that are optimal in terms of achieving the minimum distortion. The model takes into account the joint impact of the PHY and MAC layers and the applica- tion semantics on the video quality. • Design of a practical routing protocol for distortion-re- silient video delivery: Based on our analysis, we design a practical routing protocol for a network that primarily car- ries wireless video. The practical protocol allows a source to collect distortion information on the links in the network and distribute traffic across the different paths in accor- dance to: 1) the distortion, and 2) the position of a frame in the GOP. • Evaluations via extensive experiments: We demonstrate via extensive simulations and real testbed experiments on a multihop 802.11a testbed that our protocol is extremely effective in reducing the end-to-end video distortion and keeping the user experience degradation to a minimum. In particular, the use of the protocol increases the peak signal- to-noise ratio (PSNR) of video flows by as much as 20%, producing flows with a mean opinion score (MOS) that is on the average 2–3 times higher compared to the case when traditional routing schemes are used. These PSNR and MOS gains project significant improvements in the perceived video quality at the destination of a flow [4]. We also evaluate our protocol with respect to various system parameters. Organization: The paper is organized as follows. Related work is presented in Section II. Our analytical models are in Section III, followed by the problem formulation in Section IV. In Section V, we discuss how our framework can be used to route video flows in practice. Section VI contains results from our simulations and testbed experiments. We conclude in Section VII. II. RELATED WORK The plethora of recommendations from the standardization bodies regarding the encoding and transmission of video indi- cates the significance of video communications. Different ap- proaches exist in handling such an encoding and transmission. The Multiple Description Coding (MDC) technique fragments the initial video clip into a number of substreams called descrip- tions. The descriptions are transmitted on the network over dis- joint paths. These descriptions are equivalent in the sense that any one of them is sufficient for the decoding process to be suc- cessful, however the quality improves with the number of de- coded substreams. Layered Coding (LC) produces a base layer and multiple enhancement layers. The enhancement layers serve only to refine the base-layer quality and are not useful on their own. Therefore, the base layer represents the most critical part of the encoded signal [5], [6]. In this paper, we focus on the lay- ered coding due to its popularity in applications and adoption in standards. Standards like the MPEG-4 [1] and the H.264/AVC [2] pro- vide guidelines on how a video clip should be encoded for a transmission over a communication system based on layered coding. Typically, the initial video clip is separated into a se- quence of frames of different importance with respect to quality and, hence, different levels of encoding. The frames are called I-, P-, and B-frames, and groups of such frames constitute a structure named the GOP. In each such GOP, the first frame is an I-frame that can be decoded independently of any other informa- tion carried within the same GOP. After the I-frame, a sequence of P- and possibly B-frames follows. The P- and B-frames use the I-frame as a reference to encode information. However, note that the P-frames can also be used as references for other frames. There has been a body of work on packet-loss-resilient video coding in the signal processing research community [7]. In [4], the video stream is split into high- and low-priority partitions, and FEC is used to protect the high-priority data. To account for temporal and spatial error propagation due to quantization and packet losses, an algorithm is proposed in [8] to produce estimates of the overall video distortion that can be used for switching between inter- and intracoding modes per macroblock, achieving higher PSNR. In [9], an enhance- ment to the transmission robustness of the coded bitstream is achieved through the introduction of inter/intracoding with redundant macroblocks. The coding parameters are determined by a rate-distortion optimization scheme. These schemes are evaluated using simulation where the effect of the network transmission is represented by a constant packet-loss rate, and therefore fails to capture the idiosyncrasies of real-world systems. In [10], an analytical framework is developed to model the effects of wireless channel fading on video distortion. The model is, however, only valid for single-hop communication. In [11], the authors examine the effects of packet-loss patterns and specifically the length of error bursts on the distortion of compressed video. The work, although on a single link, showcases the importance of accounting for the correlation of For More Details Contact G.Venkat Rao 8143271457
  • 3. 414 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 23, NO. 2, APRIL 2015 errors across frames. The performance of video streaming over a multihop IEEE 802.11 wireless network is studied in [12], and a two-dimensional Markov chain model is proposed. The model is used not only for performance evaluation, but also as a guide for deploying video streaming services with end-to-end quality-of-service (QoS) provisioning. Finally, a recursion model is derived in [13] to relate the average transmission distortion across successive P-frames. None of these efforts considers the impact of routing on video distortion. There have also been studies on the performance of video transmissions over 4G wireless networks that have been de- signed to support high QoS for multimedia applications. In [14], an assessment of the recently defined video coding scheme (H.264/SVC) is performed over mobile WiMAX. Metrics such as the PSNR and the MOS are used to represent the quality of experience perceived by the end-user. The results show that the performance is sensitive to the different encoding options in the protocols and responds differently to the loss of data in the network. Again, these are single-link wireless networks, and routing is not a factor. Cross-layer optimization and QoS routing is not new. An extensive body of research exists on routing algorithms for wireless ad hoc and mesh networks [15]. Furthermore, the survey in [16] provides various ways of classifying QoS routing schemes based on protocol evaluation metrics (transport/ap- plication, network- and MAC-layer metrics). However, none of the routing schemes presented in these surveys takes into account performance metrics defined for an application and specifically for video transfers. Even when a QoS routing is defined as application-aware, the applications need to specify throughput and delay constraints. This is in contrast to our approach, where an application-related performance metric, namely the video distortion, is directly incorporated into the route selection mechanism. Prior work on routing for video communications focuses on Multiple Description Coding (MDC). In [17] and [18], multi- path routing schemes are considered to improve the quality of video transfer. In [17], an extension to the Dynamic Source Routing is proposed to support multipath video communica- tions. The basic idea is to use the information collected at the destination node to compute nearly disjoint paths. In contrast with our approach, no analysis is provided in [17], and the eval- uation of the scheme is based solely on simulations. In [18], the computation of disjoint paths is achieved by proper scheduling given a set of path lengths. As is the case in [17], the work in [18] does not take into account any performance metric directly asso- ciated with video quality; in contrast, the optimization is based on delay constraints. In [19] and [20], MDC is considered for video multicast in wireless ad hoc networks. A rate-distortion model is defined and used in an optimization problem where the objective is to minimize the overall video distortion by prop- erly selecting routing paths. Due to the complexity of the opti- mization problem, a genetic-algorithm-based heuristic approach is used to compute the routes. Although the approach in [19] and [20] takes into account the distortion of the video, it does so using MDC. Our approach differs not only on the way we model video distortion, but also on the fact that we focus on LC, which is more popular in applications today. In [21], a multi- path routing scheme for video delivery over IEEE 802.11-based wireless mesh networks is proposed. To achieve good traffic en- gineering, the scheme relies on maximally disjoint paths. How- ever, this work does not consider distortion as a user-perceived metric. It simply aims to reduce the latency of video transmis- sions, and thus, its objective is different from what we consider here. The work in [22] proposes a scheme for energy-efficient video communications with minimum QoS degradation for LC. However, the routing scheme is based on a hierarchical model. To support such a hierarchy, the nodes need to be grouped in clusters, and a process of electing a cluster head has to be executed periodically, increasing the processing and data communication load of the network. In contrast, our proposed scheme assumes a flat model where all nodes in the network are equivalent and perform the same set of tasks. III. MODEL FORMULATION Our analytical model couples the functionality of the phys- ical and MAC layers of the network with the application layer for a video clip that is sent from a source to a destination node. The model for the lower layers computes the packet-loss prob- ability through a set of equations that characterize multiuser in- terference, physical path conditions, and traffic rates between source–destination pairs in the network. This packet-loss prob- ability is then input to a second model to compute the frame-loss probability and, from that, the corresponding distortion. The value of the distortion at a hop along the path from the source to the destination node depends on the position of the first un- recoverable frame in the GOP. A. PHY- and MAC-Layer Modeling We consider an IEEE 802.11 network that consists of a set of nodes denoted by N . For each node N , denote by P the set of paths that pass via node . For simplicity, we assume a constant packet length of bits for all source–destination paths. There are various models [23]–[26] that attempt to capture the operations of the IEEE 802.11 pro- tocol. These models are application-agnostic and provide an es- timate of the packet-loss probability due to interference from background traffic in the network. We use the model in [26] to represent the operations of the PHY and MAC layers; specifics can be found in [26]. The approach followed in [26] is based on network-loss models. Three sets of equations are derived. The first corre- sponds to a scheduling model that computes the serving rate of a path at each node , as a function of the scheduler coefficient and the service time (1) The second captures the IEEE 802.11 MAC and PHY models and associates the probability of a transmission failure with the channel access probability (2) For More Details Contact G.Venkat Rao 8143271457
  • 4. PAPAGEORGIOU et al.: DISTORTION-RESISTANT ROUTING FRAMEWORK FOR VIDEO TRAFFIC 415 where is the number of backoff stages and is the minimum window size. Finally, the third set of equations describes the routing model and computes the incoming traffic rate to the next-hop node based on scheduling and transmission failures for all N P (3) A fixed-point method is used to couple the equations in an iteration, until convergence to a consistent solution is achieved and satisfied. The solution is an approximation to the packet-loss probability per link and the throughput of the network. Note here that any other method can be used to find , which can then be used in our video distortion estimation framework described in Section III-B. B. Video Distortion Model Our analysis is based on the model for video transmission distortion in [10]. The distortion is broken down into source distortion and wireless transmission distortion over a single hop. Instead of focusing on a single hop, we significantly extend the analysis by developing a model that captures the evolution of the transmission distortion along the links of a route from the source node to the destination node. We consider a GOP structure that consists of an I-frame fol- lowed by P-frames. We index each frame in the GOP structure starting from 0, i.e., the I-frame corresponds to index 0, and the P-frames correspond to indices from 1 up to . We focus on predictive source coding where, if the th frame is the first lost frame in a GOP, then the th frame and all its successors in the GOP are replaced by the st frame at the destination node. Assuming that the sequence of frames is stationary, the average distortion introduced by such a frame re- placement depends on the temporal proximity of the replaced frame to the st frame and not on the actual position of the frame (in the GOP) to be replaced. In [10], a linear model, which corresponds to empirical data, is used to provide the av- erage mean squared error (MSE) as a function of the temporal distance between frames. Using this model, the average distor- tion is computed in [10] to be (4) for . The minimum distortion is achieved when the last frame in the GOP is lost and the maximum, , is attained if the first frame is lost. The values and depend on the actual video sequence and have to be determined by measurement. To auto- mate the computation of the distortion, however, we compute the minimum and maximum values, and , respec- tively, of the distortion over different GOPs for each clip and use their average values. If is the source coding rate, and are the percentage of bits in the GOP that belong to an I-frame and a P-frame, respectively, then: • the number of packets per an I-frame ; • the number of packets per a P-frame ; where and is the duration of a GOP. We define the sensitivity of a frame to lost packets to be the minimum number of packets that belong to a frame that, if lost, can prevent the correct decoding of the frame. We denote by the sensitivity of an I-frame, and by , that of a P-frame. For the sensitivity of the I-frame, it holds that , and for the P-frame it is . Note that any further packet losses beyond for the I-frame and for the P-frame do not cause any additional distortion for that particular GOP because, in that case, the corresponding frame is already considered lost and cannot be correctly decoded. We extend the wireless transmission distortion introduced in [10] and defined in (4) for the multihop case. We define the sequence to represent the wireless transmission distortion along the path from the source to the destination, where is the wireless transmission video distor- tion at the th hop. In general, at the th hop, the distortion can take one of the following discrete values given by (4): (5) The sequence of values the process takes depends on the number of lost packets per frame in the GOP at each link. Clearly, w.p.1, for all . We track the packet losses per frame by defining a multidi- mensional counting process (6) where the index is again the hop count along the path from the source to the destination. The first component of the counting process tracks the number of lost packets from the I-frame at the th hop along the path, and the components count the lost packets that belong to the sub- sequent P-frames in the GOP at the th hop. The state space for each of these components is given by (7) (8) for . Assuming that the packet losses in different frames in the GOP are independent events (likely if the fading patterns change in between), the transition probabilities for the process , can be computed. Suppose that is the packet-loss probability pro- vided by the analytical model that describes the MAC layer (in Section III-A). Furthermore, let the value of at hop be and at hop be . Since each of the components of is a counting process, the corresponding sample paths are non- decreasing w.p.1,, and therefore . Regarding the transitions of that correspond to the I-frame, we have that (9) The corresponding transition probability is equal to the probability of losing packets out of the remaining packets in the I-frame. Therefore, the transition For More Details Contact G.Venkat Rao 8143271457
  • 5. 416 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 23, NO. 2, APRIL 2015 probabilities for the first component are given by the following binomial distribution: otherwise (10) Similar to the transitions of , the transitions of that correspond to the P-frames in the GOP are specified by the transition probabilities otherwise (11) From the transition probabilities (10) and (11), one can com- pute the distribution of lost packets in each frame at hop assuming that there are no lost packets at the source. In particular, for the I-frame, we have (12) for . We define the row vector (13) Then, (12), in vector form, becomes (14) for , where is the transition matrix for the process . To make the dependence of the matrix to the packet-loss probability explicit, we use the notation . It follows then from (14) that (15) for a sequence of packet-loss probabilities , where . Following the same process, we can compute the corresponding distribution for the th P-frame in the GOP (16) where and is the transition matrix for the process . As one can immediately see, the packet-loss probabilities, computed after accounting for the PHY and MAC, in Section III-A, can be used here to compute the probabilities . C. Video Distortion Dynamics The value of the distortion at hop along the path from the source to the destination node depends on the position of the first unrecoverable frame in the GOP. We define the process such that is the index of the first un- recoverable frame in the GOP structure at hop . At each hop , the process takes values in the set C (17) The value 0 indicates that the first (I-frame) is lost, and therefore the whole GOP is unrecoverable. A value between 1 and denotes that the corresponding P-frame is the first frame in the GOP that cannot be decoded correctly, and the value indicates that no frame has been lost thus far, yielding a distortion . The definition of the process suggests that the sample paths of the process are nonincreasing w.p.1., which means that , for all . The dynamics of the process and therefore of the video distortion depend on the process . The value of the process at each hop indicates the number of lost packets up to that point along the path from the source to the destination node. These losses specify the first unrecoverable frame in the GOP and, hence, the value of the distortion at that point on the path. The transition probabilities at hop of the process for C (18) specifying the likelihood that the first unrecoverable frame at hop is given that the first unrecoverable frame at hop is , can be computed using the distributions given by (15) and (16). In particular, we consider the following cases. 1) For : In this case, the first unrecoverable frame at hop is the first frame (I-frame) in the GOP. This means that the GOP is unrecoverable, and the value of the process for the rest of the path cannot be anything else other than 0. Therefore, the transition probabilities in this case are given by (19) 2) For : When the first unrecoverable frame in the GOP at hop is a P-frame, it is possible during the transition to the next hop to have packet losses that make an earlier frame in the GOP unrecoverable. This will happen if the number of lost packets in an earlier frame is such that the total number of lost packets for the partic- ular frame reaches the sensitivity of that frame type. This is used to compute the transition probabilities in (20), shown at the bottom of the next page. 3) For : This corresponds to the case where no frames have been lost in the GOP up to hop . The transition to the next hop may cause packet losses such that either a frame in the GOP becomes unrecoverable, or none is lost and no transition of happens. The transition probabilities in this case are given by (21), shown at the bottom of the next page. For More Details Contact G.Venkat Rao 8143271457
  • 6. PAPAGEORGIOU et al.: DISTORTION-RESISTANT ROUTING FRAMEWORK FOR VIDEO TRAFFIC 417 The value of the video transmission distortion depends on the value of the process at hop . More specifically if if and (22) where is given by (4). Therefore, the dynamics of the video transmission distortion are defined by the transition probabili- ties given by (19)–(21). IV. OPTIMAL ROUTING POLICY Next, our objective is to find the path that yields the minimum video transmission distortion between any source and destina- tion. By using the analysis presented in Section III, we pose the problem as a stochastic optimal control problem where the con- trol is the selection of the next node to be visited at each inter- mediate node from the source to the destination. If N is the set of nodes in the network and C is the set of possible values for the process described in Section III-C, we define the state space of our problem as X N C (23) Each state X is a tuple such that . The first component N represents the current node on the path from the source to the destination. The second component C points to the first unrecoverable frame in the GOP and, there- fore, specifies the video distortion at the current node. Suppose that at the th hop of the path between the source and the destination the node is . Suppose furthermore that the first unrecoverable frame in the GOP structure is . Then, the current state of the system is . At this point, the system needs to select the next node to be visited. Denote this selection by . Clearly, the node to be selected next should belong to the set U of the one-hop neighbors of . This means that if at stage the state is and a decision is made such that U , the new state at the next stage will be . The selection of as the next node specifies the packet-loss probability from the anal- ysis in Section III-B and accounts for both channel-induced and interference-related failures. Moreover, it specifies the transi- tion probabilities for the second component of the state. To make the dependence of these transition probabilities to the selection explicit, we use the notation . We seek to find the optimal sequence of states that minimizes the total video transmission distortion from the source to the destination node. The first component of each state that belongs to such an optimal sequence of states indicates the node that has to be visited next in the optimal path. For the initial state and the sequence of decisions , the cost to be minimized is defined as X (24) where is the length of the path, the function is the run- ning cost, and the function is the final cost. We call this optimization problem the Minimum Distortion Routing (MDR) problem. The running cost is the video transmission distortion at state if if (25) (20) (21) For More Details Contact G.Venkat Rao 8143271457
  • 7. 418 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 23, NO. 2, APRIL 2015 The final cost is defined to be if is the destination node and if is the destination node and otherwise (26) If is the source and is the destination of the connection, then the initial state for the optimization problem is defined as . Any state in the boundary set B X (27) is a terminating state for the optimization problem. If is an optimal decision sequence, we define the value function as (28) for an initial state X . If at some stage the state is , we define the minimum cost-to-go as (29) and for the final stage (30) The MDR problem has the following properties. Lemma 1: MDR satisfies the overlapping property, i.e., the problem can be broken down into smaller problems that retain the same structure. Proof: From (29), it is clear that computing the cost-to-go requires the calculation of the cost-to-go . This means that the initial problem of finding the optimal route be- tween a source and a destination node can be solved if the sub- problem of finding an optimal path between an intermediate node and the destination can be solved. Lemma 2: MDR satisfies the optimal substructure property, i.e., the subpath of an optimal path is optimal for the corre- sponding subproblem. Proof: This is immediate from the definition of the cost- to-go function defined in (29). Theorem 1.: The MDR problem is solvable by dynamic programming. Proof: An optimization problem can be solved by dynamic programming if the problem satisfies both the overlapping and the optimal substructure properties [27]. The proof is immediate from Lemmas 1 and 2. Since the state space X is of finite dimension, the opti- mization problem can be solved via dynamic programming by back-propagating the computation of the value of the cost-to-go function [28], [29] starting from the terminating states of the boundary set B and moving backwards toward the initial state . If at some stage the state is , we consider all possible neighbors of node that are one hop away. For each link , a packet-loss probability characterizes the quality of this specific link. Using this , we can compute the transition probability from the current state to a new state through the probability that is defined in Section III-C for all possible values of the second component of the state. Among the neighboring nodes of node , we choose as the next hop toward the destination node, the node that corresponds to the minimum cost-to-go at stage defined in (29). Discussion: In essence, the MDR routing policy distributes the video frames (and the packets contained therein) across mul- tiple paths and in particular minimizes the interference experi- enced by the frames that are at the beginning of a GOP (to min- imize distortion). The I-frames are longer than other frames. Their loss impacts distortion more, and thus these are trans- mitted on relatively interference-free paths. The higher protec- tion rendered to I-frames is the key contributing factor in de- creasing the distortion with MDR (we also observe this in both our simulations and testbed experiments). V. PROTOCOL DESIGN To compute the solution to the MDR problem described in Section IV, knowledge of the complete network (the nodes that are present in the network and the quality of the links between these nodes) is necessary. However, because of the dynamic nature and distributed operations of a network, such complete knowledge of the global state is not always available to the nodes. In practice, the solution to the MDR problem can be com- puted by the source node based on partial information regarding the global state that it gathers. The source node has to sample the network during a path discovery process in order to collect information regarding the state of the network. The sampling process includes the estimation of the ETX metric [3] for each wireless link in the network. These esti- mates provide a measure of the quality of the links. The esti- mation process can be implemented by tracking the successful broadcasting of probe messages in periodic time intervals. The ETX estimates computed locally in the neighborhood of a node are then appended in the Route Request messages during the Route Discovery phase. Upon reception of this message by the destination, a Route Reply message is sent back to the source that contains the computed ETX estimates, which are us- able to compute . The source node then can solve the optimization problem (Section IV) by using the information gathered via the sam- pling process described above. Specifically, upon receiving the Route Reply messages, the source node follows the steps presented in Algorithm 1. It defines the initial state of the opti- mization problem as , where is the GOP size. It defines the boundary set B that serves as the terminating set for the optimization process. Next, a call to Algorithm 2 produces the next node in the path. Because of the stochastic nature of the second component of the state, its next value has to be es- timated. The estimation is based on the transition probabilities given by (19)–(21). In particular, the estimated value is the expected value of the second component given its current value (31) For More Details Contact G.Venkat Rao 8143271457
  • 8. PAPAGEORGIOU et al.: DISTORTION-RESISTANT ROUTING FRAMEWORK FOR VIDEO TRAFFIC 419 Algorithm 1: Path discovery (Uses Algorithm 2) Input: source node , destination node Input: frame size Output: route from to 1: /* DSR Route Discovery Phase */ 2: send 3: receive messages 4: N node-ids from messages 5: 6: /*Path Discovery Initialization Phase*/ 7: 8: 9: B 10: 11: 12: append to 13: 14: /* Path Computation /* 15: repeat 16: Next_node_in_optimal path( B N ) 17: 18: 19: 20: 21: append to 22: N N 23: until B To avoid loops in the produced route, node is removed from the set N of available nodes. The process is repeated with a new initial state until the boundary set B is reached. In each iteration, Algorithm 2 is called to determine the next node on the path from the source to the destination . Algorithm 2 takes as an input an initial state , a boundary set B , the GOP size and the set N . It solves the dynamic programming problem described in Section IV by first creating the state space of the system and then using the value iteration method, starting from the boundary set and moving backwards. At each stage of the process, it also computes the optimal policy. At the end of the computation, the ID of the best node to be se- lected is returned by using the optimal policy for the first stage. In the source routing scheme, the routing decisions are made at the source node ahead of time and before the packet enters the network. Therefore, source routing is an open-loop control problem where all decisions have to be made in the beginning. The decisions are taken sequentially; a decision at a stage cor- responds to the choice of the next-hop node at the node corre- sponding to the stage. The source node cannot know exactly the state at the th stage of the selection process be- cause of the randomness of the second component of the state. It has to estimate at each stage the value of and use this esti- mate to make a decision for that stage. The sequence of steps followed by each node in the network is shown in Fig. 2. Algorithm 2: Next node in optimal path Input: initial state , boundary set B Input: set of available nodes N Input: frame size Output: next node in the optimal path 1: /* Initialization Phase */ 2: C 3: X N C 4: X 5: 6: /* Optimal Control Computation */ 7: for TO 1 do 8: if then 9: for all X do 10: 11: end for 12: else 13: for all X do 14: 15: 16: 17: 18: end for 19: end if 20: end for 21: 22: return The flowchart that corresponds to the operation of the source node is depicted in Fig. 2(a), while the flowcharts for an inter- mediate node and the destination node are shown in Fig. 2(b). VI. RESULTS We show the performance gains of the proposed routing scheme via extensive simulations and testbed experiments. For the simulation experiments, we use the network simulator ns-2 [30]. The simulator provides a full protocol stack for a wireless multihop network based on IEEE 802.11. We extend the functionality of ns-2 by implementing our proposed routing scheme on top of the current protocol stack. For the testbed ex- periments, we implement our scheme using the Click modular router [31], [32]. We implement two different mechanisms and experiment with each, one after another. The first mechanism estimates the ETX value for each link between a node and its neighbors for all the nodes in the network. The mechanism broadcasts periodically (every 1 s) small probe messages of size 32 B and checks for acknowledgments from the neighbors of the node. The routing policy computes the minimum ETX path from the source to a destination and uses that path to transfer the video packets. The second mechanism implements the protocol defined in Section V in order to compute the routes on the wireless network that achieve minimum video distortion. Furthermore, we use EvalVid [33], which consists of a set of tools for the evaluation of the quality of video that is transmitted over a real or simulated network. The toolset supports different For More Details Contact G.Venkat Rao 8143271457
  • 9. 420 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 23, NO. 2, APRIL 2015 Fig. 2. Flowchart for application-aware routing. (a) Source node. (b) Interme- diate and destination node. performance metrics such as the PSNR and the MOS [34]. To adapt the EvalVid to the ns-2 simulator, we follow the procedure described in [35]. Specifically, for each simulated video flow be- tween two nodes in the network, we need to produce a sequence of files. We start with the initial uncompressed video file that consists of a sequence of YUV frames [36]. Using the EvalVid toolset, we transform the YUV format first to the MP4 and then to the MPEG4 format, which contains hints of how the video file should be transmitted over a network. When we do this, we do not constrain the GOP size to be the same from GOP to GOP, but rather, we let the tool decide the appropriate size for each GOP based on the video clip content. We then need to capture a log from an attempted transmission over a real network. This log indicates which frame and at what time instance was trans- mitted over the network. The log is fed as an input to the ns-2 simulation, which plays back the video transmission, producing at the end two sets of statistics regarding the transmission, one for the sender and one for the receiver. By applying the EvalVid toolset on this sequence of files, we can reconstruct the video file as it is received by the destination and compare it to the ini- tial video file. The comparison provides a measure of the video quality degradation due to the transmissions over the network. A. Simulation Results To evaluate the performance of the MDR protocol, we com- pare it against the minimum ETX routing scheme. We con- sider a wireless multihop network that covers an area of 1000 1000 m . The nodes are distributed over this area according to a Poisson random field. The pair of nodes that constitute the Fig. 3. Average PSNR for 5 and 10 video connections (Set-I). TABLE I VIDEO ENCODING PARAMETERS source and destination in each case are selected at random. If they happen to be neighbors, we discard that pair and repeat the process until we select a source and destination that are more than one hop apart. Each node uses the IEEE 802.11b protocol where the propagation model is the Two Ray Ground, yielding a communication range of about 250 m. Each set of experiments is repeated 10 times, and the average value is reported in each case. In Table I, three sets of values are defined for the video en- coding parameters. We vary the GOP size and the frame rate and thus, effectively, the video encoding rate. We keep the frame size constant as per the QCIF standard (176 144 pixels) and set the maximum packet size to 1024 B. Our simulation exper- iments focus on three metrics: 1) the PSNR, which is an objec- tive quality measure; 2) the MOS, which is a subjective quality metric; and 3) the delay experienced by each video connection. The effect of the node density on the PSNR is shown in Fig. 3. We plot the average PSNR for 5 and 10 concurrent video con- nections for different node densities and for Set-I of the video encoding parameters of Table I. We also plot the performance of our proposed scheme (MDR) when instead of estimating the per-link packet-loss probabilities through the ETX metric, we use the model in Section III-A to do so. In this case, we assume full knowledge of the network topology, and so the state space where we solve the optimal control problem of Section IV is a superset of the state space when we collect the local estimates of ETX through the network. We then fix the number of nodes to 20 (distributed as de- scribed earlier) and compute the PSNR of each video connec- tion when: 1) the network serves four concurrent connections, and 2) when the number of concurrent connections is 8. In each case, the source–destination pairs are chosen uniformly from among the nodes in the network. We define the tail distribu- tion of PSNR as the probability and plot it in Fig. 4 for the different traffic loads. The tail distribution of PSNR that corresponds to Set-II of the video encoding param- eters is shown in Fig. 4(a). For both the light and heavy traffic For More Details Contact G.Venkat Rao 8143271457
  • 10. PAPAGEORGIOU et al.: DISTORTION-RESISTANT ROUTING FRAMEWORK FOR VIDEO TRAFFIC 421 Fig. 4. Tail distribution of PSNR. (a) Set-II. (b) Set-III. loads (four and eight concurrent connections, respectively), the MDR protocol performs better, providing a higher percentage of paths that have a given PSNR value. As expected, a perfor- mance degradation is observed for both schemes when the traffic load increases. This is due to the fact that under heavier traffic conditions in the network, the interference becomes more preva- lent; furthermore, interference across adjacent links can be cor- related in some cases. Under such network conditions, the bene- fits from the distortion-based optimization have a greater impact on the path selection process for the different types of frames in a video GOP as discussed earlier. The I-frames are sent on rela- tively uncongested paths. With fur concurrent connections, the median of PSNR is 17 for the minimum ETX policy and 18 for the MDR protocol. The median decreases when the traffic load increases, and it is 9.5 and 10 for the minimum ETX and the ap- plication-aware schemes, respectively. The tail distribution of PSNR that corresponds to the parameters of Set-III is shown in Fig. 4(b). As is the case for Set-II, a large GOP size results in a denser state space, and therefore a better performance for the MDR protocol. In the case of the light traffic loads (four concur- rent connections), the median for the PSNR is 15 for the min- imum ETX scheme and 17 for MDR. Under heavier traffic loads (eight concurrent connections), Pthe median for the PSNR is 9 for the minimum ETX scheme and 10.5 for the MDR protocol. The effects of the sensitivities, and , on the MDR-pro- tocol are shown in Fig. 5. As before, the number of randomly placed nodes is set to 20. We compare the performance of the MDR protocol when and . In the first case, the sensitivity to the packet losses per frame is set to the maximum; in this case, a single packet loss in a frame causes the frame to be unrecoverable. Fig. 5(a) and (b) presents the same comparison for Set-II and Set-III of the encoding pa- rameters, respectively. In both cases, relaxing the sensitivity of an I- or P-frame to packet losses (i.e., increasing the value of and ) deteriorates the performance of the scheme. A lower sensitivity (larger values of and ) diminishes the impact of packet losses on the video distortion, thus limiting the perfor- mance gains from using the scheme. For Set-II, the median of the PSNR is 17 for the minimum ETX scheme and 18 and 16 for MDR for and , respectively. When the video encoding parameters of Set-III are used, the median values of the PSNR are 15 for the minimum ETX case and 17 and 15 for the MDR protocol when and , respectively. Although the PSNR is the most widespread objective metric to measure the digital video quality, it does not always capture user experience. A subjective quality measure that tries to cap- ture human impression regarding the video quality is the MOS. Fig. 5. PSNR dependence on packet-loss sensitivity. (a) Set-II.. (b) Set-III. Fig. 6. Average mean opinion score. The metric uses a scale from 1 (worst) to 5 (best) to represent user satisfaction when watching a video clip [34]. To evaluate the MOS with the MDR and ETX-based routing, we consider the wireless multihop network with the average number of nodes equal to 20 (distributed as discussed earlier). The initial raw video is processed using the H.264 encoder with a maximum GOP size of 30 frames and a sampling frequency of 30 frames per second. Fig. 6 shows the average MOS as the number of concurrent video flows in the network increases. When the number of connections is three, the traffic load is low, and so both the ETX-based routing and MDR provide similar user experience regarding video quality. As the traffic load in- creases, the distortion-based routing distributes the load across the network, causing the I-frames to avoid highly congested areas. When a moderate number of video flows are concurrently active in the network, there is a significant gap in video quality in favor of MDR. However, no significant gains are possible with MDR when congestion is high (more than nine concur- rent video flows are active). In such cases, there are no con- gestion-free routes available to be used by MDR. This results in higher MOS values, which translates to a better user experience. The delay characteristics of the two routing schemes are shown in Fig. 7 for Set-II of the video encoding parameters. The nodes are again randomly distributed according to a Poisson random field with varying density with values 14, 16, and 18. The traffic load corresponds to five concurrent video connections. We compute and plot the mean and variance of the end-to-end delay for the five connections along with the 95% confidence intervals. As seen in Fig. 7, for all three different node densities, the MDR protocol produces routes that exhibit less variability compared to the routes computed by the minimum ETX scheme. Smaller variability implies less jitter, which in turn suggests a better video quality as perceived by the end-user. Moreover, because of the smaller variability, the required sizes of buffers at the intermediate nodes is smaller. For More Details Contact G.Venkat Rao 8143271457
  • 11. 422 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 23, NO. 2, APRIL 2015 Fig. 7. Delay characteristics for five concurrent connections (Set-II). (a) Mean delay. (b) Variance of delay. Note that this benefit is in addition in the reduction in distortion as discussed above. The primary reason for this reduction in the delay is that the distortion-aware approach tries to avoid paths that are congested; ETX, on the other hand, results in convergence of flows onto a few good paths. For both routing schemes, the mean and variance of the delay increase with the average number of nodes in the network. As the network becomes denser, the effect of interference becomes more profound, increasing the number of retransmissions and, thus, the delay. In contrast, a sparser network topology provides a smaller number of “good” routes, and thus it is more difficult to separate flows and cope with congestion. It is in the moderate density regions, where the MDR protocol provides the most benefits in terms of delay and jitter. In order to understand how the characteristics of the video traffic and, in particular, the motion level affect the distortion, we experiment with two classes of video clips: slow- and fast- motion video. The motion level of a video clip can be computed through appropriate detection algorithms; typically, these algo- rithms classify a video clip as a slow-motion or a fast-motion video. Tools such as PhysMo [37] and AForge [38] can be used to perform this classification. We evaluate the MOS of slow- and fast-motion video flows when the MDR routing scheme is used. We consider a wireless multihop network with an average number of nodes equal to 20 (distributed as discussed above). Fig. 8(a) shows the average MOS for Set-II, and Fig. 8(b) shows the MOS in the case of Set-III. In both cases, the slow-motion flows experience slightly lower distortion compared to the fast-motion videos and, thus, higher MOS. This is the result of the fact that in the slow-motion video clips, the I-frames carry most of the information. Due to rapid changes in the content of a fast-motion clip, the P-frames are larger and contain more information than the P-frames for slow-motion video flows. The MDR routing scheme protects the I-frames by routing the corresponding packets through less congested paths. The P-frames are packed together on congested paths and could be lost. As evident from Fig. 8, such losses af- fect fast-motion video to a greater extent. However, as we in- crease the traffic to extremely high levels (11 flows), the per- formance of slow- and fast-motion videos is similar due to high frame losses. Next, we compare the behavior of MDR against a routing protocol that chooses routes so as to minimize the overall expected transmission time (ETT) [39]. The ETT is a function of the loss rate and the bandwidth of the link. Therefore, it can capture delays due to transmissions in multirate settings, unlike ETX, which only estimates the packet-loss ratio at the base rate. Fig. 8. Average value of the MOS for slow- and fast-motion video flows. (a) Set-II. (b) Set-III. Fig. 9. Comparison between the MDR and the ETT-based routing scheme. (a) Mean opinion score. (b) Mean delay. In Fig. 9, the comparison between MDR and the ETT-based scheme is shown. The mean opinion score is shown in Fig. 9(a), where we observe a behavior similar to the one shown in Fig. 6. The average end-to-end delay is shown in Fig. 9(b). In contrast to what happens when the ETX is used, the routing mechanism that minimizes the total ETT on the path from the source to the destination yields smaller delays. However, the delays with MDR are comparable to those with ETT-based routing; in other words, the video quality is improved with minimum impact on delay with MDR. B. Testbed Experiments Next, we evaluate the MDR protocol on a wireless indoor testbed composed of 41 nodes [40]. The nodes are based on the Soekris net5501 hardware configuration and run a Debian Linux distribution. Each node is equipped with 500 MHz CPU, 512 MB of RAM, and a WN-CM9 wireless mini-PCI card, which carries the AR5213 Atheros main chip. Each node uses IEEE 802.11a to avoid interference from co-located campus networks. To further minimize interference from these other networks, all experiments were performed at night. The net- work topology of the testbed is shown in Fig. 10. The experiment setup consists of an initial raw video pro- cessed using the H.264 encoder with a maximum GOP size of 30 frames. The traffic load ranges from 2 to 12 concurrent video flows, where the sender and receiver pairs are randomly selected. Each scenario is repeated five times. To capture the effect of the ETX-based and MDR routing schemes on the user experience, we measure the average MOS as the number of concurrent video flows in the network in- creases. Fig. 11 shows that as the number of video connections in the network increases, the average MOS for both schemes decreases. However, when the traffic load increases, the MDR protocol computes multiple paths between the source and the For More Details Contact G.Venkat Rao 8143271457
  • 12. PAPAGEORGIOU et al.: DISTORTION-RESISTANT ROUTING FRAMEWORK FOR VIDEO TRAFFIC 423 Fig. 10. Network topology of the wireless network testbed. Fig. 11. Average value of MOS for a different number of concurrent video flows. destination nodes and is better in distributing the load across the network such that the frames at the beginning of a GOP avoid congestion. On the other hand, the shorter paths computed through the ETX-based scheme become quickly congested, re- sulting in heavy packet losses. As discussed, we observe that this primarily has a negative impact on correctly decoding the relatively longer (but more important) I-frames, resulting in a worse user experience. A visual comparison between Figs. 6 and 11 immediately shows the similarity in behaviors between our simulations and real experiments, thereby validating the realism of our simu- lations. Fig. 12 shows snapshots from video clips transmitted over the testbed under different traffic conditions for both the ETX-based and the MDR protocols. As shown in Fig. 11, when there are two connections in the network, the MOS for both routing schemes is the same. This is reflected in Fig. 12(a) and (b), where both snapshots are of very similar quality; in this case, the traffic load is fairly low, and congestion is not a big issue (the flows do not cause high levels of interference to each other). When there are eight concurrent video connections (and interference across connections is more prevalent), the MDR protocol achieves a higher MOS compared to the ETX-based scheme. This is visually depicted in Fig. 12(c) and (d), where the snapshot in the case of MDR is much clearer than the noisy snapshot form the ETX-based protocol. Specifically, our pro- tocol distributes the I-frames across diverse paths with low in- terference; P-frames that are toward the end of GOPs are rel- atively packed together onto more congested paths. The ETX Fig. 12. User experience under different traffic loads. (a) Video snap- shot—MDR (two connections). (b) Video snapshot—ETX (two connections). (c) Video snapshot—MDR (eight connections). (d) Video snapshot—ETX (eight connections). Fig. 13. Routes for I- and P-frames. metric, which is agnostic to video semantics, does not distin- guish between frames and packs them together, causing high distortion. It is difficult to explicitly prove that I- and P-frames follow somewhat disjoint paths due to the stochastic nature of the process. The intuition, however, is based on the fact that the sensitivities and of the I- and P-frames, respectively, are, in general, different. This has as a consequence that the frame-loss probability for an I-frame is different from that of a P-frame, resulting in their choosing different routes. To illustrate this, we consider a simple network as shown in Fig. 13 and perform an experiment with eight concurrent flows. For each video flow , we show in Fig. 13 the corresponding sender and receiver denoted by and , re- spectively. We focus on flow 3 and show the different routes for the I- and P-frames for both the MDR and the ETX-based routing protocols. We notice that when MDR is used, the routes for the I- and P-frames are different. Specifically, the routes for the packets that belong to I-frames, and the corresponding frac- tions of the I-frame traffic they serve are as follows: 58.4% of the I-frame packets are routed through For More Details Contact G.Venkat Rao 8143271457
  • 13. 424 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 23, NO. 2, APRIL 2015 ; 14.6% of the I-frame traffic is routed through ; 16% is routed through ; and 11% through . Meanwhile, the routes and traffic split for P-frame packets are as follows: 56.7% of the P-frame packets use the path ; 6.3% is using ; 24% is routed through ; and 13% through . Notice that the majority of I-frames are routed via a path that is dis- joint from the path followed by the majority of the P-frames. In contrast to the MDR case, when the ETX-based scheme is used, both the I- and P-frames are routed through the same path: . VII. CONCLUSION In this paper, we argue that a routing policy that is appli- cation-aware is likely to provide benefits in terms of user-per- ceived performance. Specifically, we consider a network that primarily carries video flows. We seek to understand the impact of routing on the end-to-end distortion of video flows. Toward this, we construct an analytical model that ties video distortion to the underlying packet-loss probabilities. Using this model, we find the optimal route (in terms of distortion) between a source and a destination node using a dynamic programming approach. Unlike traditional metrics such as ETX, our approach takes into account correlation across packet losses that influence video distortion. Based on our approach, we design a practical routing scheme that we then evaluate via extensive simulations and testbed experiments. Our simulation study shows that the distortion (in terms of PSNR) is decreased by 20% compared to ETX-based routing. Moreover, the user experience degradation due to increased traffic load in the network is kept to a minimum. REFERENCES [1] ISO/IEC JTC1/SC29/WG11, “ISO/IEC 14496—Coding of audio-vi- sual objects,” [Online]. Available: http://mpeg.chiariglione.org/ standards/mpeg-4/mpeg-4.htm [2] T. Wiegand, G. J. Sullivan, G. Bjontegaard, and A. Luthra, “Overview of the H.264/AVC video coding standard,” IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 7, pp. 560–576, Jul. 2003. [3] D. S. J. D. Couto, D. Aguayo, J. Bicket, and R. Morris, “A high- throughput path metric for multi-hop wireless routing,” in Proc. 9th MobiCom, San Diego, CA, USA, Sep. 2003, pp. 134–146. [4] J. M. Boyce, “Packet loss resilient transmission of MPEG video over the internet,” Signal Process., Image Commun., vol. 15, no. 1–2, pp. 7–24, Sep. 1999. [5] Y.-C. Lee, J. Kim, Y. Altunbasak, and R. M. Mersereau, “Layered coded vs. multiple description coded video over error-prone networks,” Signal Process., Image Commun., vol. 18, no. 5, pp. 337–356, May 2003. [6] J. Chakareski, S. Han, and B. Girod, “Layered coding vs. multiple de- scriptions for video streaming over multiple paths,” Multimedia Syst., vol. 10, pp. 275–285, 2005. [7] Y. Wang, S. Wenger, J. Wen, and A. K. Katsaggelos, “Real-time com- munications over unreliable networks,” IEEE Signal Process. Mag., vol. 17, no. 4, pp. 61–82, Jul. 2000. [8] R. Zhang, S. L. Regunathan, and K. Rose, “Video coding with op- timal inter/intra-mode switching for packet loss resilience,” IEEE J. Sel. Areas Commun., vol. 18, no. 6, pp. 966–976, Jun. 2000. [9] J. Xiao, T. Tillo, and Y. Zhao, “Error-resilient video coding with end-to-end rate-distortion optimized at macroblock level,” EURASIP J. Adv. Signal Process., vol. 2011, no. 1, p. 80, 2011. [10] M. T. Ivrla˘c, L. U. Choi, E. Steinbach, and J. A. Nossek, “Models and analysis of streaming video transmission over wireless fading chan- nels,” Signal Process., Image Commun., vol. 24, no. 8, pp. 651–665, Sep. 2009. [11] Y. J. Liang, J. G. Apostolopoulos, and B. Girod, “Analysis of packet loss for compressed video: Effect of burst losses and correlation be- tween error frames,” IEEE Trans. Circuits Syst. Video Technol., vol. 18, no. 7, pp. 861–874, Jul. 2008. [12] D. Li and J. Pan, “Performance evaluation of video streaming over multi-hop wireless networks,” IEEE Trans. Wireless Commun., vol. 9, no. 1, pp. 338–347, Jan. 2010. [13] Y. Wang, Z. Wu, and J. M. Boyce, “Modeling of transmission-loss- induced distortion in decoded video,” IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 6, pp. 716–732, Jun. 2006. [14] D. Migliorini, E. Mingozzi, and C. Vallati, “Performance evaluation of H.264/SVC video streaming over mobile WiMAX,” Comput. Netw., vol. 55, no. 15, pp. 3578–3591, Oct. 2011. [15] E. Alotaibi and B. Mukherjee, “A survey on routing algorithms for wireless ad-hoc and mesh networks,” Comput. Netw., vol. 56, no. 2, pp. 940–965, Feb. 2012. [16] L. Hanzo and R. Tafazolli, “A survey of QoS routing solutions for mo- bile ad hoc networks,” IEEE Commun. Surveys Tuts., vol. 9, no. 2, pp. 50–70, Apr. 2007. [17] W. Wei and A. Zakhor, “Robust multipath source routing protocol (RMPSR) for video communication over wireless ad hoc networks,” in Proc. IEEE ICME, Taipei, Taiwan, Jun. 2004, pp. 1379–1382. [18] J. Chen, S.-H. G. Chan, and V. O. Li, “Multipath routing for video de- livery over bandwidth-limited networks,” IEEE J. Sel. Areas Commun., vol. 22, no. 10, pp. 1920–1932, Dec. 2010. [19] S. Mao, Y. T. Hou, X. Cheng, H. D. Sherali, S. F. Midkiff, and Y.-Q. Zhang, “On routing for multiple description video over wireless ad hoc networks,” IEEE Trans. Multimedia, vol. 8, no. 5, pp. 1063–1074, Oct. 2006. [20] S. Mao, X. Cheng, Y. T. Hou, and H. D. Sherali, “Multiple description video multicast in wireless ad hoc networks,” Mobile Netw. Appl., vol. 11, no. 1, pp. 63–73, Feb. 2006. [21] B. Rong, Y. Qian, K. Lu, R. Qingyang, and M. Kadoch, “Multipath routing over wireless mesh networks for multiple description video transmission,” IEEE J. Sel. Areas Commun., vol. 28, no. 3, pp. 321–331, Apr. 2010. [22] D. Kandris, M. Tsagkaropoulos, I. Politis, A. Tzes, and S. Kotsopoulos, “Energy efficient and perceived QoS aware video routing over wireless multimedia sensor networks,” Ad Hoc Netw., vol. 9, no. 4, pp. 591–607, 2011. [23] M. M. Hira, F. A. Tobagi, and K. Medepalli, “Throughput analysis of a path in an IEEE 802.11 multihop wireless network,” in Proc. IEEE WCNC, Hong Kong, Mar. 2007, pp. 441–446. [24] M. Garetto, T. Salonidis, and E. W. Knightly, “Modeling per-flow throughput and capturing starvation in CSMA multi-hop wireless net- works,” in Proc. IEEE INFOCOM, Barcelona, Spain, Apr. 2006, pp. 1–13. [25] K. Medepalli and F. A. Tobagi, “Towards performance modeling of IEEE 802.11 based wireless networks: A unified framework and its applications,” in Pro. IEEE INFOCOM, Barcelona, Spain, Apr. 2006, pp. 1–12. [26] J. S. Baras, V. Tabatabaee, G. Papageorgiou, and N. Rentz, “Perfor- mance metric sensitivity computation for optimization and trade-off analysis in wireless networks,” in Proc. IEEE GLOBECOM, New Or- leans, LA, USA, Nov. 2008, pp. 1–5. [27] T. H. Cormen, C. E. Leiserson, and R. L. Rivest, Introduction to Algo- rithms. New York, NY, USA: McGraw-Hill, 2000. [28] D. P. Bertsekas, Dynamic Programming and Optimal Control, Vol I, ser. Optimization and Computation Series, 2nd ed. Belmont, MA, USA: Athena Scientific, 2000. [29] M. L. Puterman, Markov Decision Processes: Discrete Stochastic Dy- namic Programming. Hoboken, NJ, USA: Wiley-Interscience, 2005. [30] “The Network Simulator, ns-2,” 2011 [Online]. Available: http://nsnam.isi.edu/nsnam/index.php/Main_Page [31] “The Click Modular Router Project,” 2013 [Online]. Available: http:// www.read.cs.ucla.edu/click [32] E. Kohler, R. Morris, B. Chen, J. Jannotti, and M. F. Kaashoek, “The click modular router,” Trans. Comput. Syst., vol. 18, no. 3, pp. 263–297, Aug. 2000. [33] J. Klaue, B. Rathke, and A. Wolisz, “EvalVid-A framework for video transmission and quality evaluation,” in Proc. 13th Int. Conf. Model. Tech. Tools Comput. Perform. Eval., Urbana, IL, USA, Sep. 2003. For More Details Contact G.Venkat Rao 8143271457
  • 14. PAPAGEORGIOU et al.: DISTORTION-RESISTANT ROUTING FRAMEWORK FOR VIDEO TRAFFIC 425 [34] A. Bovik, The Essential Guide to Video Processing. New York, NY, USA: Academic, 2009. [35] C.-H. Ke, C.-K. Shieh, W.-S. Hwang, and A. Ziviani, “An evaluation framework for more realistic simulations of MPEG video transmis- sion,” J. Inf. Sci. Eng., vol. 24, no. 2, pp. 425–440, Mar. 2008. [36] C. A. Poynton, A Technical Introduction to Digital Video. New York, NY, USA: Wiley, 1996. [37] “PhysMo: Video motion analysis,” [Online]. Available: http://physmo. sourceforge.net [38] “AForge.NET,” [Online]. Available: http://www.aforgenet.com/ framework/features/motion_detection/_2.0.html [39] R. Draves, J. Padhye, and B. Zill, “Routing in multi-radio, multi-hop wireless mesh networks,” in Proc. 10th MobiCom, Philadelphia, PA, USA, Sep. 2004, pp. 114–128. [40] University of California, Riverside, CA, USA, “Wireless networking research testbed,” 2011 [Online]. Available: http://networks.cs.ucr. edu/testbed/ George Papageorgiou (M'10) received the B.S. and M.S. degrees in computer science from the Univer- sity of Athens, Athens, Greece, in 1997 and 2000, respectively, and the M.S. and Ph.D. degrees in elec- trical and computer engineering from the University of Maryland, College Park, MD, USA, in 2005 and 2010, respectively. Since 2010, he has been a Postdoctoral Scholar with the University of California, Riverside, CA, USA. His research interests include various aspects of wireless networking such as video communica- tions on wireless networks, routing, flow control, and network security. Dr. Papageorgiou is a member of the Association for Computing Machinery (ACM). He coauthored a paper that received the IEEE GLOBECOM 2008 Best Paper Award for wireless networks. Shailendra Singh received the B.Tech. degree in computer science and engineering from the Gautam Buddh Technical University (GBTU), Lucknow, India, in 2007, and the M.S. in computer science from the State University of New York, Binghamton, NY, USA, in 2009, and is currently pursuing the Ph.D. degree in computer science at the University of California, Riverside, CA, USA. His research interests include wireless networks and mobile computing with an emphasis on design and implementation of flexible and adaptive wireless communication systems. Srikanth V. Krishnamurthy (S'94–M'00–SM'07– F'12) received the Ph.D. degree in electrical and computer engineering from the University of Cali- fornia at San Diego, La Jolla, CA, USA, in 1997. From 1998 to 2000, he was a Research Staff Scien- tist with the Information Sciences Laboratory, HRL Laboratories, LLC, Malibu, CA, USA. Currently, he is a Professor of computer science with the Univer- sity of California, Riverside, CA, USA. His research interests are in wireless networks, online social net- works, and network security. Dr. Krishnamurthy was the Editor-in-Chief for Mobile Computing and Com- munications Review from 2007 to 2009 and is currently the Associate Editor-in- Chief for the IEEE TRANSACTIONS ON MOBILE COMPUTING. He is the recipient of the NSF CAREER Award from ANI in 2003. Ramesh Govindan (F'14) received the B.Tech. de- gree from the Indian Institute of Technology, Madras, India, in 1987, and the M.S. and Ph.D. degrees from the University of California, Berkeley, CA, USA, in 1989 and 1992, respectively, all in computer science. He is a Professor with the Computer Science Department, University of Southern California, Los Angeles, CA, USA. His research interests include routing and measurements in large internets, wireless sensor networks, and mobile computing systems. Thomas F. La Porta (M'87–SM'99–F'02) received the B.S.E.E. and M.S.E.E. degrees from The Cooper Union, New York, NY, USA, in 1986 and 1987, re- spectively, and the Ph.D. degree in electrical engi- neering from Columbia University, New York, NY, USA, in 1992. He is the William E. Leonhard Chair Professor with the Computer Science and Engineering De- partment, Pennsylvania State University (Penn State), University Park, PA, USA. He joined Penn State in 2002. He is the Director of the Institute of Networking and Security Research, Penn State. Prior to joining Penn State, he was with Bell Laboratories, Holmdel, NJ, USA, where he was the Director of the Mobile Networking Research Department, Bell Laboratories, Lucent Technologies, where he led various projects in wireless and mobile networking. He holds 35 patents. His research interests include mobility management, signaling and control for wireless networks, security for wireless systems, mobile data systems, and protocol design. Dr. La Porta is a Bell Labs Fellow. He was the founding Editor-in-Chief of the IEEE TRANSACTIONS ON MOBILE COMPUTING. He served as Editor-in-Chief of IEEE Personal Communications. He was the Director of Magazines for the IEEE Communications Society and was on its Board of Governors for 3 years. He received the Bell Labs Distinguished Technical Staff Award in 1996, and an Eta Kappa Nu Outstanding Young Electrical Engineer Award in 1996. He also won Thomas Alva Edison Patent Awards in 2005 and 2009. For More Details Contact G.Venkat Rao 8143271457