Video on Demand (VOD) system over the wireless mobile network is a system that provides video services to mobile clients. The main problem with these systems is the high service delay where the mobile clients have to wait to view their favorite movie. The importance of this paper is based on finding a solution on how to reduce the delay time in the VOD system. This paper introduces a novel caching mechanism named
Proxy Server Cache mechanism to tackle the issue of service delay. This delay happens when the broadcasting phase that is related to the first segment is missed by a client from the current broadcasting channels. In this mechanism, the video’s first segment is stored on a server of a stationary proxy type. The
delayed clients will directly acquire the first segment from the proxy server instead of waiting for the following broadcasting channel pertaining to the first segment. The proposed scheme ensuresobtaining the first segment from mobile clients when they arrive. Additionally, the performance of the proposed scheme is validated by applying the VOD system, which can involve the balancing mechanism to retain particular requests through to the local proxy server to provide a fair dissemination for these requests. The obtained result confirms that the proposed scheme reduces the time delay of the system in comparison with the best existing schemes. The results of the average time delay in the Proxy-Cache scheme is 179.2505
milliseconds when 10 clients arrive each minute (Client/minute), the average time delay is 140 milliseconds when the video lengths are 30, 60 and 90. Meanwhile, the failure probability for obtaining the first segment of the video remains zero when the number of arrived requests is set to2, 4, 6, 8 and 10.
Using Bandwidth Aggregation to Improve the Performance of Video Quality- Adap...paperpublications3
1. The document discusses using bandwidth aggregation to improve video streaming quality over multiple wireless access networks. It formulates the multi-link video streaming process as a reinforcement learning task using a Markov Decision Process to determine optimal actions.
2. It proposes a quality-adaptive streaming approach that uses an adaptive search algorithm to obtain sub-optimal solutions in real time. The approach aims to achieve smooth, high quality video streaming while avoiding interruptions.
3. The approach considers metrics like startup latency, playback fluency, average playback quality, playback smoothness, and wireless service cost in its reward function to balance video quality of service with cost. It was evaluated using a realistic testbed with an Android phone.
This document proposes a distributed video-on-demand (DVoD) system using a grid-based architecture. The key components are a media splitter, scheduler, and streaming servers distributed across grid nodes. The media is split into parts and distributed to nodes for storage. When a client requests a video, the scheduler coordinates streaming the split parts from multiple nodes to the client. This distributed approach aims to address issues like load balancing, scalability, and fault tolerance in a cost-effective manner compared to centralized systems. Related work on distributed streaming, peer-to-peer architectures, and adaptive encoding is also discussed.
Opportunistic and playback sensitive scheduling for video streamingijwmn
Given the strict Quality of Service (QoS) requirements of video streaming, this paper proposes a novel
solution for simultaneous streaming of multiple video sessions over a mobile cellular system. The proposed
solution combines a buffer management strategy with a packet scheduling algorithm. The buffer
management strategy selectively discards packets of a user from base station buffer whereas the packet
scheduling algorithm schedules packets of a user according to its instantaneous channel quality, average
throughput and playback buffer information. Simulation results demonstrate that the proposed solution is
effective in providing a continuous video playback with good perceptual quality for more users. If at least a
good perceptual quality is to be satisfied for all users (QoS constraint of video streaming), then the
proposed solution improves the system capacity by 40% over a conventional packet scheduling algorithm.
This document proposes a bandwidth degradation technique to reduce call dropping probability in mobile
networks. It aims to dynamically adjust bandwidth allocation to multiple users according to network conditions
to increase utilization. The technique allows for degrading the quality of existing calls to admit new calls
while maintaining quality of service. Key performance metrics analyzed include degradation ratio, degraded
bandwidth, throughput, and propagation delay. The approach is intended to be implemented using MATLAB
to simulate various mobility patterns for verification.
EFFECTIVE VOICE CALLS ADMISSION FOR AUTHORIZED USER IN INTER VOIP NETWORKIJNSA Journal
IP based voice transmission technology is a flexible, simpler and a cost effective implementation of voice transmission. It provides a real convergence of various networks. This voice transmission technology does not support a quality that is equivalent to digitized voice, which is available in the existing PSTN networks. In addition to this, data network vulnerabilities affect the VOIP service causing a drop in the utilization of voice communication. In this paper, the quality of service for voice calls is ensured with the integration of CAC mechanism with the bandwidth link utilization which makes an estimation of the demanded bandwidth. In terms of security, prevention of ARP cache poisoning attack is achieved by use of the signed MAC address response in local area networks. It makes the network confident that the admitted user is an authorized user and also it verifies that only the authorized users’ information is exchanged over the local area network. Also an approach that makes it difficult for the hacker’s to hack the data exchanged over the quality channel has been proposed.
Multimedia networking:
The term ‘multimedia’ refers to diverse classes of media employed to represent information.
The term ‘Networked Multimedia’ refers to the transmission and distribution of multimedia information on the network
This document discusses providing quality of service (QoS) assurances for multimedia streaming in mobile ad hoc networks (MANETs). It proposes using a dynamically controlled coefficient of variance (CV) to determine the optimal client buffer size at the receiver. The CV is the ratio of the standard deviation to the mean of end-to-end delay for transmitted packet ensembles. Simulation results show that dynamically adjusting the client buffer size based on measured bandwidth variation achieves negligible jitter in video streaming, providing an acceptable viewing experience. The minimum buffer size is determined by simulating video playout and increasing the buffer until there are no playback interruptions due to empty buffers.
Using Bandwidth Aggregation to Improve the Performance of Video Quality- Adap...paperpublications3
1. The document discusses using bandwidth aggregation to improve video streaming quality over multiple wireless access networks. It formulates the multi-link video streaming process as a reinforcement learning task using a Markov Decision Process to determine optimal actions.
2. It proposes a quality-adaptive streaming approach that uses an adaptive search algorithm to obtain sub-optimal solutions in real time. The approach aims to achieve smooth, high quality video streaming while avoiding interruptions.
3. The approach considers metrics like startup latency, playback fluency, average playback quality, playback smoothness, and wireless service cost in its reward function to balance video quality of service with cost. It was evaluated using a realistic testbed with an Android phone.
This document proposes a distributed video-on-demand (DVoD) system using a grid-based architecture. The key components are a media splitter, scheduler, and streaming servers distributed across grid nodes. The media is split into parts and distributed to nodes for storage. When a client requests a video, the scheduler coordinates streaming the split parts from multiple nodes to the client. This distributed approach aims to address issues like load balancing, scalability, and fault tolerance in a cost-effective manner compared to centralized systems. Related work on distributed streaming, peer-to-peer architectures, and adaptive encoding is also discussed.
Opportunistic and playback sensitive scheduling for video streamingijwmn
Given the strict Quality of Service (QoS) requirements of video streaming, this paper proposes a novel
solution for simultaneous streaming of multiple video sessions over a mobile cellular system. The proposed
solution combines a buffer management strategy with a packet scheduling algorithm. The buffer
management strategy selectively discards packets of a user from base station buffer whereas the packet
scheduling algorithm schedules packets of a user according to its instantaneous channel quality, average
throughput and playback buffer information. Simulation results demonstrate that the proposed solution is
effective in providing a continuous video playback with good perceptual quality for more users. If at least a
good perceptual quality is to be satisfied for all users (QoS constraint of video streaming), then the
proposed solution improves the system capacity by 40% over a conventional packet scheduling algorithm.
This document proposes a bandwidth degradation technique to reduce call dropping probability in mobile
networks. It aims to dynamically adjust bandwidth allocation to multiple users according to network conditions
to increase utilization. The technique allows for degrading the quality of existing calls to admit new calls
while maintaining quality of service. Key performance metrics analyzed include degradation ratio, degraded
bandwidth, throughput, and propagation delay. The approach is intended to be implemented using MATLAB
to simulate various mobility patterns for verification.
EFFECTIVE VOICE CALLS ADMISSION FOR AUTHORIZED USER IN INTER VOIP NETWORKIJNSA Journal
IP based voice transmission technology is a flexible, simpler and a cost effective implementation of voice transmission. It provides a real convergence of various networks. This voice transmission technology does not support a quality that is equivalent to digitized voice, which is available in the existing PSTN networks. In addition to this, data network vulnerabilities affect the VOIP service causing a drop in the utilization of voice communication. In this paper, the quality of service for voice calls is ensured with the integration of CAC mechanism with the bandwidth link utilization which makes an estimation of the demanded bandwidth. In terms of security, prevention of ARP cache poisoning attack is achieved by use of the signed MAC address response in local area networks. It makes the network confident that the admitted user is an authorized user and also it verifies that only the authorized users’ information is exchanged over the local area network. Also an approach that makes it difficult for the hacker’s to hack the data exchanged over the quality channel has been proposed.
Multimedia networking:
The term ‘multimedia’ refers to diverse classes of media employed to represent information.
The term ‘Networked Multimedia’ refers to the transmission and distribution of multimedia information on the network
This document discusses providing quality of service (QoS) assurances for multimedia streaming in mobile ad hoc networks (MANETs). It proposes using a dynamically controlled coefficient of variance (CV) to determine the optimal client buffer size at the receiver. The CV is the ratio of the standard deviation to the mean of end-to-end delay for transmitted packet ensembles. Simulation results show that dynamically adjusting the client buffer size based on measured bandwidth variation achieves negligible jitter in video streaming, providing an acceptable viewing experience. The minimum buffer size is determined by simulating video playout and increasing the buffer until there are no playback interruptions due to empty buffers.
Priority scheduling for multipath video transmission in wmsnsIJCNCJournal
This document proposes a priority scheduling mechanism for multipath video transmission over wireless multimedia sensor networks (WMSNs). It assigns different priorities to different types of video frames (I, P, B frames) and schedules them over multiple paths based on path conditions. Higher priority I and P frames are scheduled along higher quality paths. It divides node buffers into queues and uses round-robin scheduling between the queues based on frame type to prioritize transmission of higher priority frames. Path scores are calculated based on metrics like bandwidth, delay and energy to identify highest quality paths for important video packets. Simulation results show this approach improves video quality at the receiver.
This document analyzes the impact of different router queuing disciplines, specifically Packet-ordered FIFO (PFIFO) and Time-ordered FIFO (TFIFO), on multimedia quality of experience (QoE) in internet protocol television (IPTV) deployments. The analysis is based on objective QoE metrics measured in over 500 test scenarios that varied user, application, and network factors. Key results showed that PFIFO and TFIFO can impact QoE differently by changing the inter-packet jitter experienced by IPTV traffic. Specifically, PFIFO processing may reduce perceived audio and video impairments compared to TFIFO but could also cause frame freezing due to buffer starvation at the receiver.
This document discusses quality of service (QoS) provisioning in wireless multimedia networks. It describes QoS challenges in wireless networks due to limited bandwidth, unreliable links, and varying channel conditions. It also discusses the characteristics of multimedia services and traffic modeling challenges. The document outlines IEEE 802.11 MAC layer enhancements including the distributed coordination function, point coordination function, and IEEE 802.11e standard for supporting QoS through enhanced distributed channel access and hybrid coordination function. It emphasizes the need for end-to-end QoS, adaptive frameworks, and call admission control for wireless multimedia networks.
The document describes the development and testing of a "Quality Probe" virtual network function to evaluate video quality in 5G networks. The Quality Probe assesses video quality using metrics like frozen frames, color errors, and packet loss. It was tested using sequences with different degradation levels from the ReTRiEVED database. The tests showed it could accurately detect common errors like packet loss and freezing. The Quality Probe will help optimize content delivery and ensure the best user experience in 5G networks.
The document discusses quality of service (QoS) in multimedia communication networks, including QoS parameters and classes, deterministic and predictive QoS parameters, guaranteed and best effort QoS, QoS-aware service models, scheduling and policing mechanisms like priority scheduling and weighted fair queueing, and QoS architectures like Integrated Services and Differentiated Services.
This document discusses key aspects of providing Quality of Service (QoS) and priority access for public safety in LTE networks. It covers:
1. Controlling access to the air interface through mechanisms like access class barring which allow reserving access for priority users.
2. Controlling the use of network resources by mapping applications to EPS bearers that have QoS Class Identifiers and Allocation Retention Priority levels assigned.
3. Ensuring roaming and handover do not impact the QoS and priority access provided to public safety users.
The leading method of correspondence is clearly through voice trade. There are essentially two different ways through which voice can be effortlessly communicated on an organization: PSTN (Public Switched Telephone Network) and VoIP (Voice over Internet Protocol).
Mainly represented by SIP, VoIP protocols and implementations contain several vulnerabilities, particularly related to their complexities and in the face of interoperability of telephony equipment’s.
It was by identifying a lack of literature with focus in security and potential vulnerabilities of the SIP Protocol that we propose in this document. We attempt to provide a theoretical analysis from security aspects used by one of the signaling call protocols, Session Initiation Protocol (SIP).
It is intended to lucidly illustrate and identify threats, vulnerabilities, security mechanisms, developed methods and protocols and, finally over time improvements.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
RESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKSijwmn
This document summarizes research on resource allocation algorithms for quality of service (QoS) optimization in mobile WiMAX networks. It discusses the Swapping Min-Max (SWIM) algorithm and Cooperative Multicast Scheduling (CMS) technique. SWIM performs scheduling for real-time polling service to meet QoS criteria like optimal throughput, latency guarantees, minimal delay jitter and number of bursts. CMS enhances throughput for multicast video by dividing transmission bursts into two phases where selected stations retransmit to nearby members for cooperation. Simulation results show SWIM has less bursts, zero jitter and optimal throughput, while CMS further improves throughput for each multicast group member.
In order to simplify and consolidate HLS installations, Visionary Solutions created the PackeTV® Mobile HLS, a single device that performs content preparation and delivery. This integrated file server can support hundreds of users, eliminating the need for content delivery network (CDN) services.
Equipped with two gigabit Ethernet ports that provide a substantial amount of network bandwidth, the unit can store hundreds of hours of pre-recorded content. The entry-level system is housed in a single, compact 1RU chassis that fits perfectly into any standard 20-inch deep AV rack.
The PackeTV® Mobile HLS server supports all of the functions needed to accept H.264 video streams (real-time or file-based) and deliver HLS streams, including content
preparation, file storage, and content delivery. All of this functionality is contained within a server that has been specifically designed to optimize throughput and ease of use. PackeTV® Mobile HLS dramatically lowers operational costs compared with systems that use traditional streaming CDNs to simultaneously distribute video to multiple clients. System ownership ensures seamless, around-the-clock availability of the video streams. Each video stream can be published once and made available to all viewers with a simple set of user commands. Occasional users will find that this single, integrated system eliminates much of the configuration complexity that normally occurs when multiple subsystems from different manufacturers and service providers need to be integrated to form a complete solution. Heavy users will appreciate the flexibility that is available within the device configuration menus, which allow system operations to be customized to accommodate a wide range of bit rates, signal formats, and target devices. Also, because standard HTTP
Web-server technologies are used for content delivery, the added fees required for high throughput streaming service providers such as CDNs are eliminated, saving the content
provider money. With an on-site PackeTV® Mobile HLS, content asset management can be greatly simplified and centralized on a single server. A single video file can be created and delivered to an organization’s internal and external viewers, eliminating the need to manage multiple streams on different servers. Network bandwidth is also used more efficiently, as chunks can be downloaded quickly, and each client device only consumes as much data as the quality of their network connection allows More than half of all overall video consumption is consumed on a Wi-Fi device, according to Streaming Media, so content providers must make mobile content delivery an immediate priority.
Live Streaming With Receiver-Based P2P Multiplexing for Future IPTV NetworkIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
Chaining Algorithm and Protocol for Peer-to-Peer Streaming Video on Demand Sy...ijwmn
As the various architectures and protocol have been implemented a true VoD system has great demand in the global users. The traditional VoD system does not provide the needs and demands of the global users. The major problem in the traditional VoD system is serving of video stream among clients is duplicated and streamed to the different clients, which consumes more server bandwidth and the client uplink bandwidth is not utilized and the performance of the system degrades. Our objective in this paper is to send one server stream sufficient to serve the many clients without duplicating the server stream. Hence we have proposed a protocol and algorithm that chains the proxy servers and subscribed clients utilize client’s uplink bandwidth such that the load on the server is reduced. We have also proved that less rejection ratio of the clients and better utilization of the buffer and bandwidth for the entire VoD system.
Live multimedia streaming and video on demand issues and challengeseSAT Journals
Live streaming and video on demand face challenges in providing quality service over the internet. The key issues are quality of service due to network instability and degraded performance when serving large numbers of users. While peer-to-peer architectures can help solve issues of limited server resources, they introduce challenges such as ensuring sufficient upload bandwidth from peers and maintaining stable connectivity. Additional issues include firewalls and internet service provider throttling impacting streaming quality, and challenges in peer discovery and storage overhead in peer-to-peer video on demand systems. Addressing these architectural and performance issues is important for providing the best experience of streaming and video on demand services.
Video contents prior storing server forIJCNCJournal
This document proposes a new architecture for multicasting live IPTV traffic in optical access networks. It involves assigning a unique logical link identifier (CLLID) to each IPTV channel. A prior storing server is constructed in the optical line terminal (OLT) and each optical network unit (ONU) to manage multicasting. The document proposes a partial prior storing strategy that considers changes in video content segment popularity over time and user access patterns to compute stored object utility. It also proposes partitioning the prior storage to avoid popular objects being evicted by unpopular objects accessed with higher frequency. Simulation results show the proposed architecture can improve performance and quality of service parameters.
The main problem is to avoid the complexity of retrieving the video content without streaming problem in multi network clients. The proposed work is to improve Collaboration among streaming contents on server resources in order to improve the network performance. Implementing network collaboration on a content delivery scenario, with a strong reduction of data transferred via servers. Audio and video files are transmitted in blocks to clients through the peer using the Network Coding Equivalent Content Distribution scheme. The objective of the system is to tolerate out-of-order arrival of blocks in the stream and is resilient to transmission losses of an arbitrary number of intermediate blocks, without affecting the verifiability of remaining blocks in the stream. To formulate the joint rate control and packet scheduling problem as an integer program where the objective is to minimize a cost function of the expected video distortion. Suggestions of cost functions are proposed in order to provide service differentiation and address fairness among users.
This document summarizes a study on simulating video streaming in multi-hop networks. It discusses using multiple access networks to stream video from a server to clients to aggregate bandwidth. The study formulates the problem of optimizing video streaming over internet packet traces as an integer program to minimize distortion. It proposes authenticating initial video streams using signatures and fragmenting/encoding content into blocks stored across peers to improve security and efficiency of content distribution in the presence of packet loss. Simulation results show this approach can reduce downloading time and avoid data loss during multi-hop video streaming.
This document proposes a new retrieval strategy called CoRe for peer-to-peer video-on-demand systems. CoRe aims to minimize response time and maximize throughput. It does this by selecting multiple serving peers to collaboratively service each request based on factors like distance and available resources. The document outlines limitations of existing strategies, describes the CoRe algorithm in detail, and presents experimental results showing CoRe performs better than the Least Load First algorithm, especially under heavy workloads.
Mobile-Based Video Caching Architecture Based on Billboard Manager csandit
Video streaming services are very popular today. Increasingly, users can now access multimedia applications and video playback wirelessly on their mobile devices. However, a significant challenge remains in ensuring smooth and uninterrupted transmission of almost any
size of video file over a 3G network, and as quickly as possible in order to optimize bandwidth consumption. In this paper, we propose to position our Billboard Manager to provide an optimal transmission rate to enable smooth video playback to a mobile device user connected to
a 3G network. Our work focuses on serving user requests by mobile operators from cached resource managed by Billboard Manager, and transmitting the video files from this pool. The
aim is to reduce the load placed on bandwidth resources of a mobile operator by routing away as much user requests away from the internet for having to search a video and, subsequently, if located, have it transferred back to the user.
Iaetsd adaptive and well-organized mobile video streaming publicIaetsd Iaetsd
The document proposes a new mobile video streaming framework called AMES-Cloud that leverages cloud computing. It has two parts: Adaptive Mobile Video Streaming (AMoV) and Efficient Communal Video Sharing (ESoV). AMoV allows each user's private agent to adaptively adjust their streaming flow based on link quality feedback. ESoV monitors social networks between users, and their agents prefetch video content. The framework aims to provide high quality mobile video streaming services by adapting to varying network conditions and enabling social video sharing through cloud resources.
An SDN Based Approach To Measuring And Optimizing ABR Video Quality Of Experi...Cisco Service Provider
Reprinted with permission of NCTA, from the 2014 Cable Connection Spring Technical Forum Conference Proceedings. For more information on Cisco video solutions, visit: http://www.cisco.com/c/en/us/products/video/index.html
An Admission Control Algorithm For Providing Quality-Of-Service Guarantee For...Jennifer Daniel
This document summarizes an admission control algorithm for providing quality-of-service guarantees in a video-on-demand system. The algorithm can guarantee quality-of-service requirements for individual connections, considering both the storage sub-system and network sub-system. It is a two-step admission control algorithm that statistically guarantees bandwidth requirements and derives an admissible region for packet dropping rates using strong conservation laws. Experiments show the algorithm achieves high bandwidth utilization while satisfying quality-of-service demands.
Priority scheduling for multipath video transmission in wmsnsIJCNCJournal
This document proposes a priority scheduling mechanism for multipath video transmission over wireless multimedia sensor networks (WMSNs). It assigns different priorities to different types of video frames (I, P, B frames) and schedules them over multiple paths based on path conditions. Higher priority I and P frames are scheduled along higher quality paths. It divides node buffers into queues and uses round-robin scheduling between the queues based on frame type to prioritize transmission of higher priority frames. Path scores are calculated based on metrics like bandwidth, delay and energy to identify highest quality paths for important video packets. Simulation results show this approach improves video quality at the receiver.
This document analyzes the impact of different router queuing disciplines, specifically Packet-ordered FIFO (PFIFO) and Time-ordered FIFO (TFIFO), on multimedia quality of experience (QoE) in internet protocol television (IPTV) deployments. The analysis is based on objective QoE metrics measured in over 500 test scenarios that varied user, application, and network factors. Key results showed that PFIFO and TFIFO can impact QoE differently by changing the inter-packet jitter experienced by IPTV traffic. Specifically, PFIFO processing may reduce perceived audio and video impairments compared to TFIFO but could also cause frame freezing due to buffer starvation at the receiver.
This document discusses quality of service (QoS) provisioning in wireless multimedia networks. It describes QoS challenges in wireless networks due to limited bandwidth, unreliable links, and varying channel conditions. It also discusses the characteristics of multimedia services and traffic modeling challenges. The document outlines IEEE 802.11 MAC layer enhancements including the distributed coordination function, point coordination function, and IEEE 802.11e standard for supporting QoS through enhanced distributed channel access and hybrid coordination function. It emphasizes the need for end-to-end QoS, adaptive frameworks, and call admission control for wireless multimedia networks.
The document describes the development and testing of a "Quality Probe" virtual network function to evaluate video quality in 5G networks. The Quality Probe assesses video quality using metrics like frozen frames, color errors, and packet loss. It was tested using sequences with different degradation levels from the ReTRiEVED database. The tests showed it could accurately detect common errors like packet loss and freezing. The Quality Probe will help optimize content delivery and ensure the best user experience in 5G networks.
The document discusses quality of service (QoS) in multimedia communication networks, including QoS parameters and classes, deterministic and predictive QoS parameters, guaranteed and best effort QoS, QoS-aware service models, scheduling and policing mechanisms like priority scheduling and weighted fair queueing, and QoS architectures like Integrated Services and Differentiated Services.
This document discusses key aspects of providing Quality of Service (QoS) and priority access for public safety in LTE networks. It covers:
1. Controlling access to the air interface through mechanisms like access class barring which allow reserving access for priority users.
2. Controlling the use of network resources by mapping applications to EPS bearers that have QoS Class Identifiers and Allocation Retention Priority levels assigned.
3. Ensuring roaming and handover do not impact the QoS and priority access provided to public safety users.
The leading method of correspondence is clearly through voice trade. There are essentially two different ways through which voice can be effortlessly communicated on an organization: PSTN (Public Switched Telephone Network) and VoIP (Voice over Internet Protocol).
Mainly represented by SIP, VoIP protocols and implementations contain several vulnerabilities, particularly related to their complexities and in the face of interoperability of telephony equipment’s.
It was by identifying a lack of literature with focus in security and potential vulnerabilities of the SIP Protocol that we propose in this document. We attempt to provide a theoretical analysis from security aspects used by one of the signaling call protocols, Session Initiation Protocol (SIP).
It is intended to lucidly illustrate and identify threats, vulnerabilities, security mechanisms, developed methods and protocols and, finally over time improvements.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
RESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKSijwmn
This document summarizes research on resource allocation algorithms for quality of service (QoS) optimization in mobile WiMAX networks. It discusses the Swapping Min-Max (SWIM) algorithm and Cooperative Multicast Scheduling (CMS) technique. SWIM performs scheduling for real-time polling service to meet QoS criteria like optimal throughput, latency guarantees, minimal delay jitter and number of bursts. CMS enhances throughput for multicast video by dividing transmission bursts into two phases where selected stations retransmit to nearby members for cooperation. Simulation results show SWIM has less bursts, zero jitter and optimal throughput, while CMS further improves throughput for each multicast group member.
In order to simplify and consolidate HLS installations, Visionary Solutions created the PackeTV® Mobile HLS, a single device that performs content preparation and delivery. This integrated file server can support hundreds of users, eliminating the need for content delivery network (CDN) services.
Equipped with two gigabit Ethernet ports that provide a substantial amount of network bandwidth, the unit can store hundreds of hours of pre-recorded content. The entry-level system is housed in a single, compact 1RU chassis that fits perfectly into any standard 20-inch deep AV rack.
The PackeTV® Mobile HLS server supports all of the functions needed to accept H.264 video streams (real-time or file-based) and deliver HLS streams, including content
preparation, file storage, and content delivery. All of this functionality is contained within a server that has been specifically designed to optimize throughput and ease of use. PackeTV® Mobile HLS dramatically lowers operational costs compared with systems that use traditional streaming CDNs to simultaneously distribute video to multiple clients. System ownership ensures seamless, around-the-clock availability of the video streams. Each video stream can be published once and made available to all viewers with a simple set of user commands. Occasional users will find that this single, integrated system eliminates much of the configuration complexity that normally occurs when multiple subsystems from different manufacturers and service providers need to be integrated to form a complete solution. Heavy users will appreciate the flexibility that is available within the device configuration menus, which allow system operations to be customized to accommodate a wide range of bit rates, signal formats, and target devices. Also, because standard HTTP
Web-server technologies are used for content delivery, the added fees required for high throughput streaming service providers such as CDNs are eliminated, saving the content
provider money. With an on-site PackeTV® Mobile HLS, content asset management can be greatly simplified and centralized on a single server. A single video file can be created and delivered to an organization’s internal and external viewers, eliminating the need to manage multiple streams on different servers. Network bandwidth is also used more efficiently, as chunks can be downloaded quickly, and each client device only consumes as much data as the quality of their network connection allows More than half of all overall video consumption is consumed on a Wi-Fi device, according to Streaming Media, so content providers must make mobile content delivery an immediate priority.
Live Streaming With Receiver-Based P2P Multiplexing for Future IPTV NetworkIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
Chaining Algorithm and Protocol for Peer-to-Peer Streaming Video on Demand Sy...ijwmn
As the various architectures and protocol have been implemented a true VoD system has great demand in the global users. The traditional VoD system does not provide the needs and demands of the global users. The major problem in the traditional VoD system is serving of video stream among clients is duplicated and streamed to the different clients, which consumes more server bandwidth and the client uplink bandwidth is not utilized and the performance of the system degrades. Our objective in this paper is to send one server stream sufficient to serve the many clients without duplicating the server stream. Hence we have proposed a protocol and algorithm that chains the proxy servers and subscribed clients utilize client’s uplink bandwidth such that the load on the server is reduced. We have also proved that less rejection ratio of the clients and better utilization of the buffer and bandwidth for the entire VoD system.
Live multimedia streaming and video on demand issues and challengeseSAT Journals
Live streaming and video on demand face challenges in providing quality service over the internet. The key issues are quality of service due to network instability and degraded performance when serving large numbers of users. While peer-to-peer architectures can help solve issues of limited server resources, they introduce challenges such as ensuring sufficient upload bandwidth from peers and maintaining stable connectivity. Additional issues include firewalls and internet service provider throttling impacting streaming quality, and challenges in peer discovery and storage overhead in peer-to-peer video on demand systems. Addressing these architectural and performance issues is important for providing the best experience of streaming and video on demand services.
Video contents prior storing server forIJCNCJournal
This document proposes a new architecture for multicasting live IPTV traffic in optical access networks. It involves assigning a unique logical link identifier (CLLID) to each IPTV channel. A prior storing server is constructed in the optical line terminal (OLT) and each optical network unit (ONU) to manage multicasting. The document proposes a partial prior storing strategy that considers changes in video content segment popularity over time and user access patterns to compute stored object utility. It also proposes partitioning the prior storage to avoid popular objects being evicted by unpopular objects accessed with higher frequency. Simulation results show the proposed architecture can improve performance and quality of service parameters.
The main problem is to avoid the complexity of retrieving the video content without streaming problem in multi network clients. The proposed work is to improve Collaboration among streaming contents on server resources in order to improve the network performance. Implementing network collaboration on a content delivery scenario, with a strong reduction of data transferred via servers. Audio and video files are transmitted in blocks to clients through the peer using the Network Coding Equivalent Content Distribution scheme. The objective of the system is to tolerate out-of-order arrival of blocks in the stream and is resilient to transmission losses of an arbitrary number of intermediate blocks, without affecting the verifiability of remaining blocks in the stream. To formulate the joint rate control and packet scheduling problem as an integer program where the objective is to minimize a cost function of the expected video distortion. Suggestions of cost functions are proposed in order to provide service differentiation and address fairness among users.
This document summarizes a study on simulating video streaming in multi-hop networks. It discusses using multiple access networks to stream video from a server to clients to aggregate bandwidth. The study formulates the problem of optimizing video streaming over internet packet traces as an integer program to minimize distortion. It proposes authenticating initial video streams using signatures and fragmenting/encoding content into blocks stored across peers to improve security and efficiency of content distribution in the presence of packet loss. Simulation results show this approach can reduce downloading time and avoid data loss during multi-hop video streaming.
This document proposes a new retrieval strategy called CoRe for peer-to-peer video-on-demand systems. CoRe aims to minimize response time and maximize throughput. It does this by selecting multiple serving peers to collaboratively service each request based on factors like distance and available resources. The document outlines limitations of existing strategies, describes the CoRe algorithm in detail, and presents experimental results showing CoRe performs better than the Least Load First algorithm, especially under heavy workloads.
Mobile-Based Video Caching Architecture Based on Billboard Manager csandit
Video streaming services are very popular today. Increasingly, users can now access multimedia applications and video playback wirelessly on their mobile devices. However, a significant challenge remains in ensuring smooth and uninterrupted transmission of almost any
size of video file over a 3G network, and as quickly as possible in order to optimize bandwidth consumption. In this paper, we propose to position our Billboard Manager to provide an optimal transmission rate to enable smooth video playback to a mobile device user connected to
a 3G network. Our work focuses on serving user requests by mobile operators from cached resource managed by Billboard Manager, and transmitting the video files from this pool. The
aim is to reduce the load placed on bandwidth resources of a mobile operator by routing away as much user requests away from the internet for having to search a video and, subsequently, if located, have it transferred back to the user.
Iaetsd adaptive and well-organized mobile video streaming publicIaetsd Iaetsd
The document proposes a new mobile video streaming framework called AMES-Cloud that leverages cloud computing. It has two parts: Adaptive Mobile Video Streaming (AMoV) and Efficient Communal Video Sharing (ESoV). AMoV allows each user's private agent to adaptively adjust their streaming flow based on link quality feedback. ESoV monitors social networks between users, and their agents prefetch video content. The framework aims to provide high quality mobile video streaming services by adapting to varying network conditions and enabling social video sharing through cloud resources.
An SDN Based Approach To Measuring And Optimizing ABR Video Quality Of Experi...Cisco Service Provider
Reprinted with permission of NCTA, from the 2014 Cable Connection Spring Technical Forum Conference Proceedings. For more information on Cisco video solutions, visit: http://www.cisco.com/c/en/us/products/video/index.html
An Admission Control Algorithm For Providing Quality-Of-Service Guarantee For...Jennifer Daniel
This document summarizes an admission control algorithm for providing quality-of-service guarantees in a video-on-demand system. The algorithm can guarantee quality-of-service requirements for individual connections, considering both the storage sub-system and network sub-system. It is a two-step admission control algorithm that statistically guarantees bandwidth requirements and derives an admissible region for packet dropping rates using strong conservation laws. Experiments show the algorithm achieves high bandwidth utilization while satisfying quality-of-service demands.
This document discusses using network coding to improve live video streaming over peer-to-peer mesh networks. It begins by introducing live video streaming and its challenges. It then discusses peer-to-peer and wireless mesh networks as infrastructures for video distribution. Network coding is presented as a technique to increase bandwidth utilization, robustness, and video quality by allowing intermediate nodes to combine packets before forwarding. The results showed that network coding can reduce delay and jitter, increase data localization, and improve bandwidth utilization and network scalability.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
Server-based and Network-assisted Solutions for Adaptive Video StreamingEswar Publications
This document discusses server-based and network-assisted solutions for adaptive video streaming. It begins with an abstract that outlines server-based adaptive streaming is gaining popularity as clients and network devices are not powerful enough to run advanced adaptation algorithms. The document then provides a taxonomy that categorizes adaptive video streaming solutions and focuses on server-based and network-assisted solutions. It discusses various classical computing approaches relevant to server-based solutions such as traffic shaping, video pacing, and rate limiting. The document also proposes a taxonomy of server-based approaches and discusses state-of-the-art solutions for traffic management and protocol/parameter-centric categories. Finally, it discusses network-assisted solutions and recent approaches that show the advantages of using network-
Decision Making Analysis of Video Streaming Algorithm for Private Cloud Compu...IJECEIAES
The issue on how to effectively deliver video streaming contents over cloud computing infrastructures is tackled in this study. Basically, quality of service of video streaming is strongly influenced by bandwidth, jitter and data loss problems. A number of intelligent video streaming algorithms are proposed by using different techniques to deal with such issues. This study aims to propose and demonstrate a novel decision making analysis which combines ISO 9126 (international standard for software engineering) and Analytic Hierarchy Process to help experts selecting the best video streaming algorithm for the case of private cloud computing infrastructure. The given case study concluded that Scalable Streaming algorithm is the best algorithm to be implemented for delivering high quality of service of video streaming over the private cloud computing infrastructure.
Optimizing cloud resources for delivering iptv services through virtualizationJPINFOTECH JAYAPRAKASH
The document discusses optimizing cloud resources for delivering IPTV services through virtualization. It proposes using a cloud computing infrastructure with virtualization to flexibly handle the combined workload of multiple services like live TV and video-on-demand. The system would intelligently time-shift selected services to take advantage of different deadlines and effectively multiplex the services. An optimization formulation is constructed to compute resource needs to support multiple services without missing any deadlines. Results from a simulator using real IPTV network traces show the approach can significantly reduce server load compared to existing systems.
This white paper introduces a new peer-assisted approach to video streaming designed to overcome limitations of content delivery networks (CDNs). It explains how peer-to-peer streaming can represent a key advantage for broadcasters by enabling them to scale up, improve quality, and handle traffic peaks while reducing costs and network burden. A case study showed the solution achieved up to 58% peer streaming and ensured continued streaming for 50% of users during a server outage. Peer-assisted streaming optimizes video delivery as demand increases by leveraging growing numbers of viewers to share content.
SECURITY IMPLEMENTATION IN MEDIA STREAMING APPLICATIONS USING OPEN NETWORK AD...Journal For Research
Media has been a very important medium for entertainment and communications and the captured media was transmitted in analog form. Media providers do not want their end users to store and duplicate the streamed media because the end user can freely distribute the streamed media without any control from the source. Hence while dealing with media streaming, replay protection and integrity protection are the most important factors. The main aim of this paper is to implement the concept of WebRTC to stream the media between the participating end points which is a powerful tool used to incorporate RTC capabilities into browsers and mobile applications. The aim is to develop a secure media stream from an end point that flows through the Open Network Adapter to the Avaya Media Server (AMS) and is hosted by an application on the Engagement Development Platform. The Open Network Adapter with Avaya Fabric Attach is capable of securing the required flow.
Dynamic Chunks Distribution Scheme for Multiservice Load Balancing Using Fibo...Editor IJCATR
This document describes a proposed dynamic chunks distribution scheme for multiservice load balancing in cloud computing using a Fibonacci bases approach. Videos are split into chunks that are distributed across hosts for storage. The chunk sizes increase to reduce delay and improve performance. A Fibonacci-based splitting strategy is used to divide video files into chunks to reduce provisioning delay for users and optimize resource utilization. The scheme allows users to view entire videos without delays by gathering chunks from different servers in parallel.
This document provides an overview of multimedia networking. It discusses various multimedia applications including streaming stored video, voice over IP, and protocols for real-time conversational applications. It describes key characteristics of video and audio, different multimedia network applications, challenges of streaming stored video including continuous playback and client-side buffering. The document also discusses protocols for multimedia networking including UDP streaming, HTTP streaming, and adaptive HTTP streaming. It covers topics such as content distribution networks, voice over IP, limitations of VoIP including packet loss and end-to-end delay, and techniques for removing jitter like fixed and adaptive playout delay.
The document discusses the transition from analog tape-based broadcast monitoring to digital transport stream monitoring. It notes that digital monitoring provides greater functionality than analog systems by allowing instant access to live and archived content. Transport stream monitoring in particular allows isolation and troubleshooting of issues at the final product level. It also enables monitoring of various types of metadata and quality of experience metrics. Transport stream logging combined with analysis tools improves troubleshooting and regulatory compliance capabilities.
Similar to A NOVEL ADAPTIVE CACHING MECHANISM FOR VIDEO ON DEMAND SYSTEM OVER WIRELESS MOBILE NETWORK (20)
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...IJCNCJournal
Recent natural disasters have inflicted tremendous damage on humanity, with their scale progressively increasing and leading to numerous casualties. Events such as earthquakes can trigger secondary disasters, such as tsunamis, further complicating the situation by destroying communication infrastructures. This destruction impedes the dissemination of information about secondary disasters and complicates post-disaster rescue efforts. Consequently, there is an urgent demand for technologies capable of substituting for these destroyed communication infrastructures. This paper proposes a technique for generating rendezvous sequences to swiftly reconnect communication infrastructures in post-disaster scenarios. We compare the time required for rendezvous using the proposed technique against existing methods and analyze the average time taken to establish links with the rendezvous technique, discussing its significance. This research presents a novel approach enabling rapid recovery of destroyed communication infrastructures in disaster environments through Cognitive Radio Network (CRN) technology, showcasing the potential to significantly improve disaster response and recovery efforts. The proposed method reduces the time for the rendezvous compared to existing methods, suggesting that it can enhance the efficiency of rescue operations in post-disaster scenarios and contribute to life-saving efforts.
Blockchain Enforced Attribute based Access Control with ZKP for Healthcare Se...IJCNCJournal
The relationship between doctors and patients is reinforced through the expanded communication channels provided by remote healthcare services, resulting in heightened patient satisfaction and loyalty. Nonetheless, the growth of these services is hampered by security and privacy challenges they confront. Additionally, patient electronic health records (EHR) information is dispersed across multiple hospitals in different formats, undermining data sovereignty. It allows any service to assert authority over their EHR, effectively controlling its usage. This paper proposes a blockchain enforced attribute-based access control in healthcare service. To enhance the privacy and data-sovereignty, the proposed system employs attribute-based access control, zero-knowledge proof (ZKP) and blockchain. The role of data within our system is pivotal in defining attributes. These attributes, in turn, form the fundamental basis for access control criteria. Blockchain is used to keep hospital information in public chain but EHR related data in private chain. Furthermore, EHR provides access control by using the attributed based cryptosystem before they are stored in the blockchain. Analysis shows that the proposed system provides data sovereignty with privacy provision based on the attributed based access control.
EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...IJCNCJournal
A revolutionary idea that has gained significance in technology for Internet of Things (IoT) networks backed by WSNs is the " Energy-Efficient Cluster-Based Routing Protocol with a Secure Intrusion Detection" (EECRPSID). A WSN-powered IoT infrastructure's hardware foundation is hardware with autonomous sensing capabilities. The significant features of the proposed technology are intelligent environment sensing, independent data collection, and information transfer to connected devices. However, hardware flaws and issues with energy consumption may be to blame for device failures in WSN-assisted IoT networks. This can potentially obstruct the transfer of data. A reliable route significantly reduces data retransmissions, which reduces traffic and conserves energy. The sensor hardware is often widely dispersed by IoT networks that enable WSNs. Data duplication could occur if numerous sensor devices are used to monitor a location. Finding a solution to this issue by using clustering. Clustering lessens network traffic while retaining path dependability compared to the multipath technique. To relieve duplicate data in EECRPSID, we applied the clustering technique. The multipath strategy might make the provided protocol more dependable. Using the EECRPSID algorithm, will reduce the overall energy consumption, minimize the End-to-end delay to 0.14s, achieve a 99.8% Packet Delivery Ratio, and the network's lifespan will be increased. The NS2 simulator is used to run the whole set of simulations. The EECRPSID method has been implemented in NS2, and simulated results indicate that comparing the other three technologies improves the performance measures.
Analysis and Evolution of SHA-1 Algorithm - Analytical TechniqueIJCNCJournal
A 160-bit (20-byte) hash value, sometimes called a message digest, is generated using the SHA-1 (Secure Hash Algorithm 1) hash function in cryptography. This value is commonly represented as 40 hexadecimal digits. It is a Federal Information Processing Standard in the United States and was developed by the National Security Agency. Although it has been cryptographically cracked, the technique is still in widespread usage. In this work, we conduct a detailed and practical analysis of the SHA-1 algorithm's theoretical elements and show how they have been implemented through the use of several different hash configurations.
Optimizing CNN-BiGRU Performance: Mish Activation and Comparative AnalysisIJCNCJournal
Deep learning is currently extensively employed across a range of research domains. The continuous advancements in deep learning techniques contribute to solving intricate challenges. Activation functions (AF) are fundamental components within neural networks, enabling them to capture complex patterns and relationships in the data. By introducing non-linearities, AF empowers neural networks to model and adapt to the diverse and nuanced nature of real-world data, enhancing their ability to make accurate predictions across various tasks. In the context of intrusion detection, the Mish, a recent AF, was implemented in the CNN-BiGRU model, using three datasets: ASNM-TUN, ASNM-CDX, and HOGZILLA. The comparison with Rectified Linear Unit (ReLU), a widely used AF, revealed that Mish outperforms ReLU, showcasing superior performance across the evaluated datasets. This study illuminates the effectiveness of AF in elevating the performance of intrusion detection systems.
An Hybrid Framework OTFS-OFDM Based on Mobile Speed EstimationIJCNCJournal
The Future wireless communication systems face the challenging task of simultaneously providing high-quality service (QoS) and broadband data transmission, while also minimizing power consumption, latency, and system complexity. Although Orthogonal Frequency Division Multiplexing (OFDM) has been widely adopted in 4G and 5G systems, it struggles to cope with a significant delay and Doppler spread in high mobility scenarios. To address these challenges, a novel waveform named Orthogonal Time Frequency Space (OTFS). Designers aim to outperform OFDM by closely aligning signals with the channel behaviour. In this paper, we propose a switching strategy that empowers operators to select the most appropriate waveform based on an estimated speed of the mobile user. This strategy enables the base station to dynamically choose the waveform that best suits the mobile user’s speed. Additionally, we suggest retaining an Integrated Sensing and Communication (ISAC) radar approach for accurate Doppler estimation. This provides precise information to facilitate the waveform selection procedure. By leveraging the switching strategy and harnessing the Doppler estimation capabilities of an ISAC radar.Our proposed approach aims to enhance the performance of wireless communication systems in high mobility cases. Considering the complexity of waveform processing, we introduce an optimized hybrid system that combines OTFS and OFDM, resulting in reduced complexity while still retaining performance benefits.This hybrid system presents a promising solution for improving the performance of wireless communication systems in higher mobility.The simulation results validate the effectiveness of our approach, demonstrating its potential advantages for future wireless communication systems. The effectiveness of the proposed approach is validated by simulation results as it will be illustrated.
Enhanced Traffic Congestion Management with Fog Computing - A Simulation-Base...IJCNCJournal
Accurate latency computation is essential for the Internet of Things (IoT) since the connected devices generate a vast amount of data that is processed on cloud infrastructure. However, the cloud is not an optimal solution. To overcome this issue, fog computing is used to enable processing at the edge while still allowing communication with the cloud. Many applications rely on fog computing, including traffic management. In this paper, an Intelligent Traffic Congestion Mitigation System (ITCMS) is proposed to address traffic congestion in heavily populated smart cities. The proposed system is implemented using fog computing and tested in a crowdedCairo city. The results obtained indicate that the execution time of the simulation is 4,538 seconds, and the delay in the application loop is 49.67 seconds. The paper addresses various issues, including CPU usage, heap memory usage, throughput, and the total average delay, which are essential for evaluating the performance of the ITCMS. Our system model is also compared with other models to assess its performance. A comparison is made using two parameters, namely throughput and the total average delay, between the ITCMS, IOV (Internet of Vehicle), and STL (Seasonal-Trend Decomposition Procedure based on LOESS). Consequently, the results confirm that the proposed system outperforms the others in terms of higher accuracy, lower latency, and improved traffic efficiency.
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...IJCNCJournal
Recent natural disasters have inflicted tremendous damage on humanity, with their scale progressively increasing and leading to numerous casualties. Events such as earthquakes can trigger secondary disasters, such as tsunamis, further complicating the situation by destroying communication infrastructures. This destruction impedes the dissemination of information about secondary disasters and complicates post-disaster rescue efforts. Consequently, there is an urgent demand for technologies capable of substituting for these destroyed communication infrastructures. This paper proposes a technique for generating rendezvous sequences to swiftly reconnect communication infrastructures in post-disaster scenarios. We compare the time required for rendezvous using the proposed technique against existing methods and analyze the average time taken to establish links with the rendezvous technique, discussing its significance. This research presents a novel approach enabling rapid recovery of destroyed communication infrastructures in disaster environments through Cognitive Radio Network (CRN) technology, showcasing the potential to significantly improve disaster response and recovery efforts. The proposed method reduces the time for the rendezvous compared to existing methods, suggesting that it can enhance the efficiency of rescue operations in post-disaster scenarios and contribute to life-saving efforts.
Vehicle Ad Hoc Networks (VANETs) have become a viable technology to improve traffic flow and safety on the roads. Due to its effectiveness and scalability, the Wingsuit Search-based Optimised Link State Routing Protocol (WS-OLSR) is frequently used for data distribution in VANETs. However, the selection of MultiPoint Relays (MPRs) plays a pivotal role in WS-OLSR's performance. This paper presents an improved MPR selection algorithm tailored to WS-OLSR, designed to enhance the overall routing efficiency and reduce overhead. The analysis found that the current OLSR protocol has problems such as redundancy of HELLO and TC message packets or failure to update routing information in time, so a WS-OLSR routing protocol based on improved-MPR selection algorithm was proposed. Firstly, factors such as node mobility and link changes are comprehensively considered to reflect network topology changes, and the broadcast cycle of node HELLO messages is controlled through topology changes. Secondly, a new MPR selection algorithm is proposed, considering link stability issues and nodes. Finally, evaluate its effectiveness in terms of packet delivery ratio, end-to-end delay, and control message overhead. Simulation results demonstrate the superior performance of our improved MR selection algorithm when compared to traditional approaches.
May 2024, Volume 16, Number 3 - The International Journal of Computer Network...IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Vehicle Ad Hoc Networks (VANETs) have become a viable technology to improve traffic flow and safety on the roads. Due to its effectiveness and scalability, the Wingsuit Search-based Optimised Link State Routing Protocol (WS-OLSR) is frequently used for data distribution in VANETs. However, the selection of MultiPoint Relays (MPRs) plays a pivotal role in WS-OLSR's performance. This paper presents an improved MPR selection algorithm tailored to WS-OLSR, designed to enhance the overall routing efficiency and reduce overhead. The analysis found that the current OLSR protocol has problems such as redundancy of HELLO and TC message packets or failure to update routing information in time, so a WS-OLSR routing protocol based on improved-MPR selection algorithm was proposed. Firstly, factors such as node mobility and link changes are comprehensively considered to reflect network topology changes, and the broadcast cycle of node HELLO messages is controlled through topology changes. Secondly, a new MPR selection algorithm is proposed, considering link stability issues and nodes. Finally, evaluate its effectiveness in terms of packet delivery ratio, end-to-end delay, and control message overhead. Simulation results demonstrate the superior performance of our improved MR selection algorithm when compared to traditional approaches.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdfIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
The efficient use of energy in wireless sensor networks is critical for extending node lifetime. The network topology is one of the factors that have a significant impact on the energy usage at the nodes and the quality of transmission (QoT) in the network. We propose a topology control algorithm for software-defined wireless sensor networks (SDWSNs) in this paper. Our method is to formulate topology control algorithm as a nonlinear programming (NP) problem with the objective to optimizing two metrics, maximum communication range, and desired degree. This NP problem is solved at the SDWSN controller by employing the genetic algorithm (GA) to determine the best topology. The simulation results show that the proposed algorithm outperforms the MaxPower algorithm in terms of average node degree and energy expansion ratio.
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
The integration of artificial intelligence technology with a scalable Internet of Things (IoT) platform facilitates diverse smart communication services, allowing remote users to access services from anywhere at any time. The multi-server environment within IoT introduces a flexible security service model, enabling users to interact with any server through a single registration. To ensure secure and privacy preservation services for resources, an authentication scheme is essential. Zhao et al. recently introduced a user authentication scheme for the multi-server environment, utilizing passwords and smart cards, claiming resilience against well-known attacks. This paper conducts cryptanalysis on Zhao et al.'s scheme, focusing on denial of service and privacy attacks, revealing a lack of user-friendliness. Subsequently, we propose a new multi-server user authentication scheme for privacy preservation with fuzzy commitment over the IoT environment, addressing the shortcomings of Zhao et al.'s scheme. Formal security verification of the proposed scheme is conducted using the ProVerif simulation tool. Through both formal and informal security analyses, we demonstrate that the proposed scheme is resilient against various known attacks and those identified in Zhao et al.'s scheme.
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
Malware is one of the threats to security of computer networks and information systems. Since malware instances are available sufficiently, there is increased interest among researchers on usage of Artificial Intelligence (AI). Of late AI-enabled methods such as machine learning (ML) and deep learning paved way for solving many real-world problems. As it is a learning-based approach, accumulated training samples help in improving thequality of training and thus leveraging malware detection accuracy. Existing deep learning methods are focusing on learning-based malware detection systems. However, there is need for improving the state of the art through ensemble approach. Towards this end, in this paper we proposed a framework known as Deep Ensemble Framework (DEF) for automatic malware detection. The framework obtains features from training samples. From given malware instance a grayscale image is generated. There is another process to extract the opcode sequences. Convolutional Neural Network (CNN) and Long Short Term Memory (LSTM) techniques are used to obtain grayscale image and opcode sequence respectively. Afterwards, a stacking ensemble is employed in order to achieve efficient malware detection and classification. Malware samples collected fromthe Internet sources and Microsoft are used for theempirical study. An algorithm known as Ensemble Learning for Automatic Malware Detection (EL-AML) is proposed to realize our framework. Another algorithm named Pre-Process is proposed to assist the EL-AML algorithm for obtaining intermediate features required by CNN and LSTM.Empirical study reveals that our framework outperforms many existing methods in terms of speed-up and accuracy.
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
With the emergence of smart devices and the Internet of Things (IoT), millions of users connected to the network produce massive network traffic datasets. These vast datasets of network traffic, Big Data are challenging to store, deal with and analyse using a single computer. In this paper we developed parallel implementation using a High Performance Computer (HPC) for the Non-Negative Matrix Factorization technique as an engine for an Intrusion Detection System (HPC-NMF-IDS). The large IoT traffic datasets of order of millions samples are distributed evenly on all the computing cores for both storage and speedup purpose. The distribution of computing tasks involved in the Matrix Factorization takes into account the reduction of the communication cost between the computing cores. The experiments we conducted on the proposed HPC-IDS-NMF give better results than the traditional ML-based intrusion detection systems. We could train the HPC model with datasets of one million samples in only 31 seconds instead of the 40 minutes using one processor), that is a speed up of 87 times. Moreover, we have got an excellent detection accuracy rate of 98% for KDD dataset.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...University of Maribor
Slides from talk presenting:
Aleš Zamuda: Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapter and Networking.
Presentation at IcETRAN 2024 session:
"Inter-Society Networking Panel GRSS/MTT-S/CIS
Panel Session: Promoting Connection and Cooperation"
IEEE Slovenia GRSS
IEEE Serbia and Montenegro MTT-S
IEEE Slovenia CIS
11TH INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONIC AND COMPUTING ENGINEERING
3-6 June 2024, Niš, Serbia
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSIJNSA Journal
The smart irrigation system represents an innovative approach to optimize water usage in agricultural and landscaping practices. The integration of cutting-edge technologies, including sensors, actuators, and data analysis, empowers this system to provide accurate monitoring and control of irrigation processes by leveraging real-time environmental conditions. The main objective of a smart irrigation system is to optimize water efficiency, minimize expenses, and foster the adoption of sustainable water management methods. This paper conducts a systematic risk assessment by exploring the key components/assets and their functionalities in the smart irrigation system. The crucial role of sensors in gathering data on soil moisture, weather patterns, and plant well-being is emphasized in this system. These sensors enable intelligent decision-making in irrigation scheduling and water distribution, leading to enhanced water efficiency and sustainable water management practices. Actuators enable automated control of irrigation devices, ensuring precise and targeted water delivery to plants. Additionally, the paper addresses the potential threat and vulnerabilities associated with smart irrigation systems. It discusses limitations of the system, such as power constraints and computational capabilities, and calculates the potential security risks. The paper suggests possible risk treatment methods for effective secure system operation. In conclusion, the paper emphasizes the significant benefits of implementing smart irrigation systems, including improved water conservation, increased crop yield, and reduced environmental impact. Additionally, based on the security analysis conducted, the paper recommends the implementation of countermeasures and security approaches to address vulnerabilities and ensure the integrity and reliability of the system. By incorporating these measures, smart irrigation technology can revolutionize water management practices in agriculture, promoting sustainability, resource efficiency, and safeguarding against potential security threats.
Low power architecture of logic gates using adiabatic techniquesnooriasukmaningtyas
The growing significance of portable systems to limit power consumption in ultra-large-scale-integration chips of very high density, has recently led to rapid and inventive progresses in low-power design. The most effective technique is adiabatic logic circuit design in energy-efficient hardware. This paper presents two adiabatic approaches for the design of low power circuits, modified positive feedback adiabatic logic (modified PFAL) and the other is direct current diode based positive feedback adiabatic logic (DC-DB PFAL). Logic gates are the preliminary components in any digital circuit design. By improving the performance of basic gates, one can improvise the whole system performance. In this paper proposed circuit design of the low power architecture of OR/NOR, AND/NAND, and XOR/XNOR gates are presented using the said approaches and their results are analyzed for powerdissipation, delay, power-delay-product and rise time and compared with the other adiabatic techniques along with the conventional complementary metal oxide semiconductor (CMOS) designs reported in the literature. It has been found that the designs with DC-DB PFAL technique outperform with the percentage improvement of 65% for NOR gate and 7% for NAND gate and 34% for XNOR gate over the modified PFAL techniques at 10 MHz respectively.
A review on techniques and modelling methodologies used for checking electrom...nooriasukmaningtyas
The proper function of the integrated circuit (IC) in an inhibiting electromagnetic environment has always been a serious concern throughout the decades of revolution in the world of electronics, from disjunct devices to today’s integrated circuit technology, where billions of transistors are combined on a single chip. The automotive industry and smart vehicles in particular, are confronting design issues such as being prone to electromagnetic interference (EMI). Electronic control devices calculate incorrect outputs because of EMI and sensors give misleading values which can prove fatal in case of automotives. In this paper, the authors have non exhaustively tried to review research work concerned with the investigation of EMI in ICs and prediction of this EMI using various modelling methodologies and measurement setups.
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
A NOVEL ADAPTIVE CACHING MECHANISM FOR VIDEO ON DEMAND SYSTEM OVER WIRELESS MOBILE NETWORK
1. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.6, November 2018
DOI: 10.5121/ijcnc.2018.10604 53
A NOVEL ADAPTIVE CACHING MECHANISM FOR
VIDEO ON DEMAND SYSTEM OVER WIRELESS
MOBILE NETWORK
Saleh Ali Alomari
Faculty of Sciences and Information Technology, Jadara University, Irbid, Jordan
ABSTRACT
Video on Demand (VOD) system over the wireless mobile network is a system that provides video services
to mobile clients. The main problem with these systems is the high service delay where the mobile clients
have to wait to view their favorite movie. The importance of this paper is based on finding a solution on
how to reduce the delay time in the VOD system. This paper introduces a novel caching mechanism named
Proxy Server Cache mechanism to tackle the issue of service delay. This delay happens when the
broadcasting phase that is related to the first segment is missed by a client from the current broadcasting
channels. In this mechanism, the video’s first segment is stored on a server of a stationary proxy type. The
delayed clients will directly acquire the first segment from the proxy server instead of waiting for the
following broadcasting channel pertaining to the first segment. The proposed scheme ensuresobtaining the
first segment from mobile clients when they arrive. Additionally, the performance of the proposed scheme is
validated by applying the VOD system, which can involve the balancing mechanism to retain particular
requests through to the local proxy server to provide a fair dissemination for these requests. The obtained
result confirms that the proposed scheme reduces the time delay of the system in comparison with the best
existing schemes. The results of the average time delay in the Proxy-Cache scheme is 179.2505
milliseconds when 10 clients arrive each minute (Client/minute), the average time delay is 140 milliseconds
when the video lengths are 30, 60 and 90. Meanwhile, the failure probability for obtaining the first segment
of the video remains zero when the number of arrived requests is set to2, 4, 6, 8 and 10.
KEYWORDS
VOD, Proxy-Cache, All-Cache, PoR-Cache, Random-Cache, DSC-Cache, SB, LF’s, LPS
1. INTRODUCTION
The Video on Demand (VOD) system is considered to bean emerging system, which allows a
user to be able to view any video anywhere and anytime. This system can be implemented under
several approaches according to the technique that is used to design the VOD system. The design
of this system is classified into three approaches, which comprises the Client/Server, Peer-to-Peer
(P2P) and Periodic Broadcast (PB) [1-3].Some limitations are included within these approaches.
In the first approach, the Client/Server approach is incompatible with the Mobile Ad Hoc
Network (MANETs), the reason behind that the limitation of the wireless bandwidth. Further, this
limitation produces many issues when an increment occurs on the number of requests. The second
approach implements the P2P approach such that it is not suggested to transmit long videos over
more than a single wireless hop due to the inefficient energy and bandwidth being used through
the requested process. In the third approach, the Periodic Broadcast approach is efficiently used in
order to tackle the bottleneck problem through the server and client, and meantime, through the
vulnerable service of the P2P approach. Compared to the previous approaches, the periodic
broadcast approach is considered an efficient approach based on its bandwidth since any number
of mobile clients can be served in efficient manners [4-6]. In particular, the client can switch to
2. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.6, November 2018
54
one or multiple server channels and could provide the ability for the client to view the video
seamlessly. Accordingly, the number of requests will not put an impact on the server bandwidth.
The entire broadcasting protocols such as those protocols mentioned in [7-14] classify the video
into different numbers of segments and frequently broadcast these segments throughout the
number of channels. Mobile wireless technologies allow users to enjoy viewing what they
wantanytime and anywhere within the coverage area. “After developing and utilizing the VOD
system as an interactive multimedia system, a lot of practical applications such as movies-on-
demand, video conferencing, distance learning, interactive video games, etc., can be implemented
due to the advancement of the wireless technology. Some of these applications are utilized to
make users enjoy and provide entertainment services, such as playing an online game or viewing
an online video of their interest wherever they are. Universities can also apply such a system
throughout their campuses in order to enable students to view the videoin advance when the video
is being recorded from seminars/lectures who are unable to attend them.
Current trends have drastically made an impact on VOD services due to the deployment of
various types of network infrastructures and the availability of different types of mobile devices.
These services have become interactive and efficient multimedia services, which assists clients to
playback any large collections of videos anytime within public communication networks in a
simple way after waiting for a short time. Hence, these clients could effectively use many
interactive services and could be able to seamlessly download as many videos as possible at the
same time [15]. These video files are stored in a set of servers related to the central video and are
disseminated over networks that are of high-speed communications in order to geographically
make clients be dispersed. Mobile computing devices and wireless technologies provide more
convenient and flexible services to clients to enjoy viewing more efficient videos. Additionally,
such technologies provide flexible services derived from a distant video server when they are
seamlessly moving within their wireless network transmission coverage. The proposal of
appropriate system architecture relies on the server’s location, available storage, communication
systems and other related factors. The main elements of the VOD system comprise user display
equipment, networks and servers. The server stores a large number of videos and broadcasts them
all for users. Users request the videos and view them by applying the display equipment into the
network, such as PDA’s, iPad, smart phones and many other devices. The features of the VOD
system that involve the requirements of the high bandwidth, QoS-sensitive service and long-lived
session make the design of the VOD system be more challenging. The reason behind this refers
back to the nature of the video data. The data of a video involves the real-time data that should
meet the requirements of a particular Quality of Service (QoS). Additionally, the issues emerge
when fast videos can be viewed once a client requests a desired video. Consequently, this case
refers to the time delay, which is called the average period of time for which a client should wait
until being served. It selects an end-to-end time, which is considered to represent the difference
between the times of requests when a packet transfers from the source (server) to the time of
arrival to the user’s destination. There exist several elements that influence the problem of the
time delay. The choice of the system architecture is considered to be one of the elements, which
puts an impact on the overall performance, particularly, the storage availability, the servers’
locations, the protocol of communication systems and other related factors that are likely capable
to contribute to the time delay.
The following sections are structured as follows. Section 2 presents the related research. In
Section 3, the cache proxy server mechanism is shown. In Section 4, the broadcasting techniques
along with its characteristics for the proposed scheme are provided. The proposed novel caching
mechanism scheme is thoroughly discussed in Section 5. The scenario of the playback pertaining
to the proposed scheme for the VOD system is introduced in Section 6. The experimental
environments and system parameters are presented in Sections 7 and 8. The experimental results
and discussions are given in Section 9. Finally, the conclusions are all drawn in Section 10.
3. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.6, November 2018
55
2. RELATED RESEARCH
The Video on Demand (VOD) system is improved by using multicast or broadcast schemes
where most of the multicasting protocols [16-18]are reactive in the sense that they transmit data
in response to users’ requests. Multicasting protocols attempt at making users share the same
stream of data as much as possible. While some of the multicast approaches can provide an
immediate service and save server bandwidth by avoiding unnecessary transmission of data, they
are subject to data loss and cannot guarantee an on-time delivery of data if users’ requests are
extremely high. Broadcasting protocols can address this problem by periodically transmitting the
video segment in a proactive way and by ensuring the service latency within a certain amount of
time. In order to provide different VOD services, many VOD Periodic Broadcasting (PB)
protocols are proposed, such as the Staggered Broadcast [19], skyscraper [20] the Harmonic
Broadcasting [21]and Fast Data Broadcasting [22], etc. The main idea for the PB protocols is to
partition the video into several segments and broadcast each segment periodically on dedicated
server channels. While the user is playing the current video segment, it is guaranteed that the next
segment is downloaded on time and the whole video can be played out continuously. In this case,
the user will have to wait for the occurrence of the first segment before they can start playing the
video. The user waiting time usually represents the first segment’s length. The broadcasting
method of the server is considered another element, which contributes to the waiting time,
including the number of concurrent users that are supported by the VOD system. Broadcasting is
based on the scenario of handling clients who are viewing many different portions related to the
same video at any provided time. The server must have an effective broadcasting mechanism in
order to broadcast the video to as many users as possible in a form of a simultaneous fashion with
according to the requirements of a stringent delay.
In general, the broadcasting technique is considered to be a method that disseminates a video
from a server to several simultaneous users. Broadcasting schemes are proposed to efficiently be
implemented with many different network infrastructures [23] including Local Area Network
(LAN), direct broadcast satellite and cable TV. The broadcasting schemes aim at providing
efficient ways of reducing the delay time among clients. As previously indicated this time is
based on the interval time between the requests for a video and receiving that video from the start.
Over the past two decades, many researches use the VOD system for providing optimal services
to mobile ad hoc devices. The MobiVoD system [4] [5] is considered to be one of the up-to-date
VOD system, which provides video services to different homogeneous devices within the
homogeneous network. This system allows mobile clients to view their desired movies.
Additionally, the system is comprised of three major components, which are Mobile Clients,
Local Forwarder (LF) and Video Server. Basically, all video files are stored on the main server.
The LF indicates to the number of disseminated stationary devices that is used as a relay for the
video to mobile clients through broadcasting video segments to its coverage service area. The
server does not transmit the video by using the wireless technique to different wide coverage
areas. Sub sequently, the LF is used to enlarge the transmission around the coverage area. The
Staggered Broadcast (SB) protocol is repeatedly broadcast video segments through to mobile
clients on differentnumbers of wireless broadcasting channels. The SB is known to be the most
effective selection for broadcasting the video through to the mobile devices due to the limitation
of the mobile devices [4]. Several researchers propose many different caching techniques that
could solve the problem of time delay. In [24] introduced a novel caching technique caching
technique that can be applied to numerous applications of the client-server interaction model for
an optimized storage and transmission of data, which can support mainly three data types, images,
video and XML document. Cached elements are accessible via a local proxy by neighboring
nodes requesting similar data, the proposed caching discussed for the scalability and increased
lifetime of mobile ad hoc networks. In [4][15], several types of caching, such asRandom Caching,
DSC Cashing, PoR Cashing and All Caching, are proposed. Random Caching and All Cache
4. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.6, November 2018
56
schemes are also proposed in [4-6]. In the All-Cache scheme, the entire clients of the LF coverage
must store the first segment. However, a random number of clients have to store the first segment
in the Random Caching. In both schemes, the late clients can cache the first missed segment from
its neighbor who already stores the first segment into their buffer. The advantage of this caching
scheme is the saving process on the caching space and the disadvantage is that it contains a higher
service delay. The DSC-Cache scheme is proposed in [4] where the current Client X can obtain
the first segment from Client Y within the same transmission area, and Y must not transmit the
segment to any other clients at the same time. Nonetheless, if Client Y does not appear within the
transmission area of Client X, after that, Client Y finds Client Z who shares the same
transmission area with Client X and the same client (i.e. Client Z).Client Y transmits the first
segment to Client X through Client Z. In [17], the PCSB protocol is produced in order to
overcome the encountered issue of the late clients who loses the first segment pertaining to the
current broadcasting channel. In order to solve this issue and provide the possibility for the client
to obtain the video segment (the first segment) without the need to wait for the following
broadcasting channel, the PCSB assists the clients to directly obtain it from the Pool of RAM
(PoR) of an available Media Forwarders (MF), where it utilized as a process for storing the first
segment of all videos that exist in the PoR of the MF once these videos are broadcasted to the
viewers. The PCSB scheme can reduce the time delay by ensuring that the late client can obtain
the first segment once it arrives. In [25], the cache is enhanced by providing the on-going video
streaming through to the Relay Station (RS) in order to reduce the delay time. The Proxy Prefix
Caching for Multimedia Streams is introduced in[26]in order to minimize the network resource
requirements and the user-perceived latency through the Internet where a proxy is utilized to store
initial frames of video or audio. The proxy directly transmits the data to the client whenever it is
requested. Additionally, in [27], the peer-to-peer caching techniques use the Radius Based Binary
Search Algorithm (RBBSA) and mobile management in order to solve the problem of mobility
constantly, which makes an interruption of the video packets transmission.” The results show that
the hit ratio of the P2P caching techniques can increase the caching and reduce the cache distance
where the cluster head for the node mechanism can provide the video to another node such that
the node acts as a server. In[28], initial caching schemes (i.e. PSCM scheme) are proposed to
overcome the service delay time issue through mobile clients where this issue is caused based on
the use of a broadcasting technique over the mobile VOD system of the Ad Hoc network. This
issue is accursed when a client loses the broadcasting phase of the first segment that is
transmitting from the broadcasting channels. In the first segment of the PSCM scheme, the entire
videos are stored in a stationary server. The late clients immediately request the first segment
from the proxy server instead of waiting for the following broadcast of this segment. Moreover,
there exist several proposed caching techniques such as those indicated in[29-35].
3. SYSTEM OVERVIEW FOR THE CACHE PROXY SERVER MECHANISM
The new caching mechanism is proposed to reduce the start-up delay through VOD systems
where the first segments of the whole broadcasted videos are efficiently stored in the local Proxy
Server. If the client arrives when the LF broadcasts its first segment, the clients will not be able to
obtain it. Hence, the client shall wait untilthe following broadcasting channel could broadcast the
first segment. In order to tackle this problem, installing a stationary proxy is suggested in this
paper, and which is also suggested to be called as the Local Proxy Server. This type of server
ensuresthat late mobile clients could certainly obtain the first segment once they arrive with a
reduced start-up time delay in comparison with other related techniques. In this paper, the VOD
system is categorized into four components, which include the number of mobile clients, LFs, the
main server and the Local Proxy Server (LPS). The main server is a type of server that is being
utilized to store several types of video files as shown in Figure 1. The LF is considered a
stationary device that is being utilized to relay the videos through to their wireless coverage area.
The LPS is considered a stationary server that is being utilized to store the first segment of each
5. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.6, November 2018
57
broadcasting video for the purpose of reducing the delay. Clients are considered to be mobile
devices that can view and receive videos.
Figure 1. The overall system of the newly proposed caching scheme
3.1 FEATURES OF THE LOCAL FORWARDER (LF)
In the proxy server cache scheme, the main task of the LF is to manage the VOD system. This
task includes utilizing the Staggered Broadcasting (SB) protocol for broadcasting the videos over
multiple numbers of logical channels, assigning the clients to a proper broadcasting channels,
passing the first segment of the videos being broadcasted to the LPS and managing the requests of
the late clients over the LPSs to balance the load of the LPSs. Figure 2, shows the scenario when
the LF broadcasts a video over its logical channels. Each client requests the video directly from
the LF by tuning to one of these channels.
Figure 2. Logical broadcasting channels of the LF
Figure2 illustrates the logical broadcasting channels of the LF where clients receive the video
form the LF when they arrive at a suitable time of broadcasting the first segment. Each client
joins one particular channel. This channel is assigned to the client depending on the client arrival
time. Moreover, this figure depicts that Client 1 joins Channel 1of the LF, Client 2 joins Channel
K and Client 3 joins Channel 2. Each client starts streaming the video after joining their channels.
3.2 FEATURES OF THE LOCAL PROXY SERVER (LPS)
In the proposed scheme, a proxy server is a device that acts as a caching buffer to speed up the
access through to the first segment of the videos. This device is recognized as one of the most
effective schemes for alleviating server bottlenecks, reducing the network traffic and minimizing
6. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.6, November 2018
58
the access time. This technique is mostly being used to reduce the network traffic between the
client/server networks where the proxy server is always located between the client and the server
in order to hold the data which is frequently being used. In the proposed scheme, the LPS is a
stationary device that is used for streaming the first segments of the videos to multiple clients at
one time. Adding LPS to the system ensures obtaining the first segment immediately since the
first segment is available anytime. Consequently, this saves time for clients and makes the service
of video broadcasting as an actual on-demand service. In the proxy server caching scheme, the
LPS allows clients to obtain the first segment when they arrive at time (T0+s). This time
represents the arrival time of the client after broadcasting the first segment when the LF starts.
The LPS is exploited for handling the timing issue in a way that allows late clients to obtain the
first segment even after missing the current first segment that is broadcasted by the LF.”
3.3 FEATURES OF THE MOBILE CLIENT DEVICES
Client devices include portable computers and phones that can make use of the video service.
These devices are required to be capable of receiving and viewing videos so that a seamless video
streaming can be provided to the users. In this paper, the VOD system is designed to provide the
VOD service for two types of mobile phone devices that are 3G and 4G mobile phones. These
types of devices are capable of rendering the video (receiving the packet, decoding the packet and
displaying the video). These devices can connect through the Wi-Fi (IEEE 802.11) technique.
The memory of the mobile phone is logically divided into two buffers. The first one is the initial
buffer and the second is the per-fetch buffer. The initial buffer is used as a temporary buffer while
streaming the first segment of the video from either the LF or the LPS, whereas the per-fetch
buffer is used as a temporary buffer when streaming the rest of segments from the LF. The size of
the initial buffer is equal to the first segment of the video, whereas the size of the per-fetch buffer
is equal to the missing portion of the broadcasted data. Figure 3 shows a mobile client’s phone.
Figure 3. The buffer at the mobile client device
The interconnection between the LF and the main server can either serve an infrastructure-based
wireless network or a wired LAN. “The devices LF, LPS and Clients are entirely equipped with a
Wireless Network Interface Card (WNIC) to provide communications with each other within the
IEEE 802.11b technique. The video file is classified into a number of equal-sized segments,
which are broadcasted to LFs via the main server. The LF distributes the video within its
coverage area based on broadcasting such segments within a number of transmitting channels.
One of these logical channels are communicated by the clients who view the video as illustrated
in Figure1, which shows the LF’s logical broadcasting channels, and which demonstrated how the
clients communicate with these channels. Let define video k with Qth quality, it is denoted as
(VkQ), which is encoded at a rate thatis denoted as follows: , , , . . . , .
We first consider how to determine whether the video is stored in the LMF or not. It is assumed
that p R denotes the probability of the users who are requesting the VkQ∀∀∀∀k where
7. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.6, November 2018
59
,∑ = . In the proposed system, the LMF simply stores the most popular videos in
order to maximize the caching hits. We define the media forwarder map as , which is used
to describe the subsets of video replicas within its cache. The is set to 1 if the VkQ is in the
media forwarder. Otherwise, it is set to 0. Therefore, the cache hits the optimization problem,
which can be expressed as follows Equation 1 and Equation 2:
! ! "#$%
&'(
& )
*
* )
+ ∗ "#$%-. ∗ /01& (1)
Where, 5 denotes the probability of the video and 5 denotes the probability of the
user's request.
! ! 61& ∗ /01& ≤ 689 (2)
&';
& )
*
* )
Where, denotes the size of the video k encoded in Qth quality (bits) and S=>denotes the size
of the media forwarder.
Figure 4. The procedure of determining which video should be cached in the LMF
Based on Figure 4,” VkQ is broadcasted from the main server to the LMFs. After that, the VkQ is
sorted by the LMFs in an ascending order into the stack based on the popularity 5 ∗ 5 .
In the stack, each value contains a ( VKQ, P K ∗ P R ) pair. From the top of the stack, one
value is selected by each loop. If the cache is high inside the LMF to accommodate the related
video content, the VkQ for this video is set to value “1”. Otherwise, the process continues and the
following value is selected by this process from the stack until the entire caching space is
allocated. Once VkQis found by maximizing the efficiency of the cache, the fraction of requests
can be identified. This fraction rises to the main server for the dedicated streams. Since the LMF
is already saturated by a number of requests, the remains of the request get through the LPS
where Equation 3 can compute the arrival rate of these requests. Since the deliveries of the
multiple qualities of the video streams are at different data rates from the main server, LMF and
LPS of the mobile clients, Equation 4 can calculate the average streaming rate.
CDE#FG
#FEH
= C I1 − ! ! "#$%+ ∗ "#$%-. ∗ K1&
&';
& )
1
1 )
L (3)
WhereNO P denotes the arrival rate of the dedicated stream (request/second) of the
broadcasting.
8. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.6, November 2018
60
Q6#FEH
=
C
CDE#FG
#FEH ! ! "#$%+ ∗ "#$%-. ∗
&';
& )
1
1 )
61&
#FEH
∗ /01& (4)
Where AS TUV
denotes the average stream rate of the detected stream (bit/ second) of the
broadcasting, denotes the streaming rate of Video k having a Qth quality level (bits/ second)
and denotes the complement of . The scalability issues can be raised by the main
server. The reason for this is that it is considered to be the bottleneck of the system itself when
numerous numbers of video streams are being served. Therefore, we particularly concentrate on
the performance of both the LMF/LPS and the main server to provide VOD services.
The available bandwidth between the main server and LMF is referred to as b. The number of
video streams WXYis supported by both of them at the same time according to Equation 5.
Moreover, we assume that the service time (T) of each video stream is exponentially distributed
with the service rateZ = [
by considering the varying length of different videos.
]^ =
_
Q6#FEH
`ℎbcb, d^ = e1,2,3, … , +g (5)
As shown in Equation 6, the blocking probability is formalized. If the bandwidth from the media
forwarder to the clients is large enough and no requests are blocked, the overall of the blocking
probability of the system is given by Equation 7.
"#$%_#
=
i
j
klmnop
nomq
r
s
tuvw
uvw
x
∑ i
j
klmnop
nomq
r
s
ty
y
x
uvw
y z
(6)
"#$%|Q#FEH
=
CDE#FG ∗
#FEH
"#$%_#
C
(7)
Where, 5 ~• denotes the overall blocking probability of the system and λdenotes the
system arrival rate (request/ second).
4. BROADCASTING TECHNIQUE FOR PROXY SERVER CACHE MECHANISM
The main server transmits the videos through to the LF, which uses the SB protocol as a
broadcasting technique that could broadcast the video through to its clients such that this video is
divided into a number of equal-sized segments. These segments are regularly broadcasted on a
number of logical channels based on the scheduled time of the SB protocol where the number of
logical broadcasting channels is equivalent to the number of segments. The number of logical
broadcasting channels is selected based on the bandwidth pertaining to the transmission media.
This bandwidth is partitioned into K logical broadcasting channels. Every video is broadcasted
through K logical channels for the purpose of increasing the opportunity for the clients to
efficiently obtain the video at a determined time. The bandwidth that is needed by the system is
constant and the system can meet any number of requests. This explains the use of the
9. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.6, November 2018
61
broadcasting technique within the system. In the Proxy Server Cache mechanism, the entire video
is partitioned into equal K size segments•6b‚)
, 6b‚ƒ
, 6b‚„
, … . , 6b‚1
…. The duration of every
segment is Di = V/K. The number of each logical broadcasting (Channeli) must be ranged
as(Channel^ = 1 ≤ Œ ≤ +).I suggested that the provider bandwidth is set toPb*K for the second
video and beyond that. This bandwidth is frequently divided into physical channels (Channeli) by
broadcasting the video beginning with (Seg1
) and ending at the video (SegK
) within a
transmission rate (Tr) that is equal to the rate of the playback (Pb) (see Figure4). Client_x can
join Channel1 and wait for the start of the first segment (Seg1
) in order to download it and play it
back. Accordingly, Client_xtransfers to the following segment (Seg2
) for the playback. This
process is frequently being performed for the subsequent segments until the last segment (SegK
) is
downloaded from Channel1. Equations 1 and 2 follow the definition of Equations 8 and 9.
•Œ =
K
+
(8)
V = ! •Œ
1
^ )
(9)
Where,•Œ denotes the duration of each segment, V denotes the length of the video and K denotes
the number of the channels. The equation that is used to determine the number of logical channels
(k) is given by Equation 10.
T# ∗ + ∗ ]^ ≤ _‘’ , Œ = e1,2,3, … , “g (10)
Where,Trdenotes the bandwidth transmission media, Nvidenotes the number of videos, K denotes
the number of logical channels and b denotes the bandwidth.
Figure 5 illustrates the specifics of the SB mechanism for the video broadcasting within the logical
channels where Channel 1 begins broadcasting the video segments in a sequential way. After some
time (equals to the time of the segment), Channel 2 also begins broadcasting the segments in the
same way as occurring in Channel 1. The same mechanism is performed for the other
remainingchannels. The video can be directly viewed in the SB technique once the client arrives at
time T0 when the video is broadcasted on the LF channel. T0 represents the time in which the start
of the video broadcasting of the first segment takes place. The client should wait for a period of
time until the following broadcasting of the first segment begins on another channel, if this client
arrives at T0+s of the first segment broadcasting.
Figure 5.The broadcasting mechanism of the proxy server caching scheme
“
10. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.6, November 2018
62
By employing the caching and broadcasting techniques, the enhancement in the performance can
be gained. Apart from storing the popular videos in the LMF, some popular videos are also
broadcasted to the clients over the backbone network and over the LPS. For example, a low-
quality video can be delivered through the broadcasting channels, while the higher encoded
version of the same video is transmitted to the clients through the dedicated streams. It is
necessary to determine which video can be delivered over the broadcasted channels. Since our
goal is to improve the overall performance of the system, the broadcasting and caching
techniques. In general, any efficient protocols, such as in[6][15][36][37],can be applied to the
framework as the broadcasting bandwidth and caching requirement are based on the transmission
schedule and user bandwidth constraints. The LPS channels are denoted as KLPS (KLPS=
{Channel
1
, Channel
2
,…Channel
k
}) as the number of channels are required for the LPS to broadcast a
video such that the start-up delay is insensitive to the clients. It is also assumed that each receiver
is equipped with enough buffers to implement the efficient broadcasting protocol. In order to
determine which popular video should be sent over the broadcasting channels, we use •1& to
check as to whether the K1& is already broadcasted or not. The consumption bandwidth for
broadcasting is calculated according to Equation 11 as follows:
_%#$– = ! ! 61&
#FEH
∗ +'—˜ ∗ /01& ∗ •1& (11)
&';
& )
1
1 )
Where,b š
denotes the bandwidth that is required for broadcasting, 5
denotes the number of
the channels, denotes the complement of the streaming rate if require video k have Qth
quality level per-bits ( ).
Similarly, •1& is selected for the broadcasting channels in the LMF caching according to their
popularity. For example, based on the previous explanation, the videos are sorted depending on
their popularity where the most popular video, which is the “first video in the stack”is
broadcasted. Assume that the broadcasting bandwidth is preserved; it is found that the video •1&
with the broadcasting bandwidth does not exceed the capacity of the existing bandwidth. This
implies that the required broadcasting bandwidth needs to be less or equal to the reserved
broadcasting bandwidth (b<= preserved). This occurs due to some replicated videos, which are
being broadcasted. Equation 12 demonstrates the arrival rate for the dedicated channels. This rate
is equal to the arrival rate to the system minus the arrival rate to the LMF and the arrival rate to
the broadcasting channels itself. The average streaming rate of the dedicated channels can thus be
found by Equation 13.
CDE#FG
%#$–
= C I1 − ! ! "#$%+ ∗ "#$%-. ∗ /01&
&';
& )
−
1
1 )
! ! "#$%+ ∗ "#$%-. ∗ /01& ∗ K1&
&';
& )
1
1 )
L (12)
Q6%#$F–
=
C
CDE#FG
%#$F– ! ! "#$%+ ∗ "#$%-. ∗
&';
& )
1
1 )
61&
#FEH
∗ •1& (13)
Where, λ›U Tœ
Tš
denotes the arrival rate to the broadcast channels, AS Tš
denotes the average
streaming rate of the dedicated channels and • denotes the completion of the• .
Furthermore, as b is the available bandwidth, the number of streams that can be concurrently
supported by the main server is calculated as follows:W ž
=
Ÿ ž
• ž , and in Equations 6 and 7,
the overall blocking probability can be found accordingly [6][38].
11. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.6, November 2018
63
5. CACHING MECHANISM OF THE PROXY SERVER CACHE SCHEME
In this paper, the proposed caching technique aims at minimizing the time delay that is caused
when using the broadcasting technique. This type of delay happens once the client loses the video
broadcast of the first segment. In order to view the video, the client must wait for the following
video broadcast based on the first segment within a different or the same channel. In order to
minimize the time delay for this video, a novel caching mechanism is produced where it is called
in this paper as the Proxy Server Cache mechanism. Figure 6 shows a representation of a single
VOD system within a service area where two clients (PDA 2 and PDA5) cache the first segment
from the LPS once it is lost from the LF. When these clients lose the first segment being
broadcasted by LF1, the clients are accordinglycached through to the first segment from LPS1.
The remaining segments must be retrieved from the LF after switching into any LF logical
broadcasting channels.
Figure 6. A representation of one VOD system service area
The novel mechanism is proposed based on the use of the LPS, which provides the first segment
to the late clients who lose broadcasting the first segment once they arrive. The direct provision of
the first segment saves the time of the clients. This can be conducted in order to avoid the time
delay when the clients are waiting for the following video broadcast pertaining to the first
segment. In this mechanism, every LF should pass a copy of the first segment of the videos
through to the neighboring LPS based on the coverage of its area. Figure 7 illustrates the way on
how the LF passes the first segment of the broadcasted videos through to the neighboring LPS.
Figure 7. The Process of sharing the first segment videos of the LF with LPS
12. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.6, November 2018
64
5.1. MANAGING THE LOAD OF THE LPSS
In the proposed scheme, a high number of clients may request the video concurrently. The LPS in
a VOD system has the ability to accommodate these requests. ” LPSs have to serve late clients by
sending the first segments anytime. A mechanism should be presented to maintain the resources
of these LPSs. In the proxy server caching scheme, every LF retains information regarding the
LPSs, which are located within the coverage of its area. Table 1 represents the information that is
used to manage the requests of the LPSs by assigning the requests to the LPSs in order to balance
the requests among these LPSs for the sake of maintaining the resources of the LPSs. This
information includes the name of the LPSs, the address of each LPS, the number of clients who
are being served by the LPS and the IDs of the clients.
Table 1. The LPS Information of the LF Table
By using this mechanism, the VOD system ensures a fair distribution of requests or a balanced
load between the LPSs where none of them has more load over the others. When a late client
requests a video, the LF checks the table to identify which LPS has the least number of requests.
After that, the LF retrieves information of the appropriate LPS and transmits it to that particular
client. The client caches the first segment from the LPS that has the least number of clients. If all
the LPSs have an equal number of requests, the LF sends the request to the LPS that has a smaller
ID address number. By managing the load over the LPSs of the VOD system can work effectively
when the number ofclients increases. This is due to the limitation of wireless transmission media.
6. SCENARIOS OF THE PLAYBACK VIDEO IN THE PROXY SERVER CACHE
MECHANISM FOR THE VOD SYSTEM
In the proposed scheme, the client requests for a video after accessing one of the LF’s areas. The
LF checks the arrival time of the current client in order to differentiate between the cases on
whether or not this client loses the first segment of the broadcasted video or not. The starting time
of the broadcasted video is set to T0. If the client arrives at T0, it can join that channel and view
the video. If the client arrives between the times T0 and T0+s of the broadcasting time, the client
will accordingly lose the first segment. Based on this case, the LF traces its table to determine
which LPS is appropriate for streaming the video of the first segment through to the late client
and transmits the information of the LPS to its client. After that, the client sends a request for the
first segment to the LPS. After that, the client joins one of the LF’s channels to obtain the rest of
the segments. According to the schedule of the SB protocol, the mobile client arrives either at
time T0 or at a time between T0 and T0+s of the SB scheduler. Therefore, there are two scenarios
to playback the video in the proxy server caching mechanism. Sections 6.1 and 6.2 elaborate
these two scenarios.
6.1 THE FIRST SCENARIO OF THE PLAYBACK VIDEO (V3) BY CLIENT J
In this scenario, Client J arrives at T0 (the beginning of video (V3) broadcasting), so the
procedure of V3 playback by Client J is performed according to the following steps:
Proxy Name Proxy Info No. of requests Clients IDs
LPS1 IP address, port 5 C1, C3, C5, C7, and C9
LPS2 IP address, port 4 C2, C4, C6 and C8
13. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.6, November 2018
65
Procedure One of the Playback Video
Begin
Client J accesses the LF area and requests V3.
LF checks the arrival time to find Channel r that broadcasts the first segment of V3.
IF the arrival time of Client J is listed in the LF
Then, the LF informs the client about Channel r.
Client J joins the Channel r.
Else The LF will keep checks the arrival time
IF the initial buffer and per-fetch buffer is available in the Client J buffer
- The Client J receives the first segment into the initial buffer.
- The Client J receives the rest of the segments into the per-fetch
buffer.
- And then, Client J plays the first segment from the initial buffer, then
switches to the per-fetch buffer and plays the remaining segments.
- Client J releases Channel r.
Else The Client J cant receives segment into the buffer.
End.
The first scenario when a Client J arrives at time T0 of broadcasting the first segment of Video V3
on Channel r. Client J requests the first segment of V3 from the LF and the LF informs Client J
that Channel r will broadcast the first segment accordingly. Hence, Client J has to join this
channel. After that, Client J joins Channel r and starts streaming Video V3.
6.2. SECOND SCENARIO OF PLAYBACK VIDEO (V3) BY CLIENT J
In this scenario, Client J arrives at a time between time T0 and T0+s (the case of missing the
broadcast of Video V3of the first segment).
Figure 8. The second scenario of Video V3 playback by client J
The procedure of viewing Video V3 by Client J is performed according to the following steps:
14. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.6, November 2018
66
Procedure Two of the Playback Video
Begin
Client J accesses the LF area and requests V3.
The LF checks the arrival time in order to find the channel that will broadcast
the first segment of Video V3.
IF the arrival time of Client J is NOT listed in the LF.
- The LF informs Client J it loses the first segment on Channel r.
- The LF traces its table for a suitable LPS.
- The LF sends information about the LPS (i) that has the least number of requests.
IF the Client J got the information about LPS from LF
- Client J requests the first segment of Video V3 from the LPS.
IF the initial buffer and per-fetch buffer is available in the Client J buffer
- Client J receives the first segment of Video V3 into the initial buffer.
- Client J informs the LF that is streaming the first segment of V3 from
LPS i in order to update the value of the number of LPSs’ requests
within its table.
Else The Client J cant receives segment into the buffer.
- The LF increases the number of requests of LPS (i) by one.
- Client J joins Channel r.
- Client J receives the rest of the segments from channel r into the per-
fetch buffer.
- Client J plays the first segment from the initial buffer then switches
to the per-fetch buffer and plays the remaining segments.
Else Client J keeps waiting the information about LPS
Else Client J releases Channel r.
End.
Figure 8 shows the second scenario of Video V3 playbacks when Client J arrives between the
times (T0 and T0+s) where this client caches the first segment from the LPS. Client J requests
Video V3 from the LF. The LF traces its table since Client J loses broadcasting the first segment
from its channels. The table shows that LPS2 has a less number of requests, so the LF informs
Client J that it loses broadcasting the first segment of V3 and it should request it from LPS2.
After that, Client J sends back a message to inform the LF that it is currently obtaining the first
segment of Video V3 from the LPS2. The LF increases the number of LPS2’s requests by one.
Finally, Client J joins Channelr in order to obtain the remainingsegments.
6.3 THE FULL PROCEDURE OF VIDEO V3 PLAYBACK BY CLIENT J
This section shows the complete procedure of Video V3 playbacks by Client J with two cases of
the arrival time (either at T0 or between T0 and T0+s) to the VOD system as follows:
Procedure 3 of the Playback Video
Begin
Client J accesses the area of the LF and requests Video V3.
The LF checks the arrival time of Client J and searches for a channel that will
broadcast the first segment of VideoV3.
IF the arrival time is between T0 and T0+s, then:
- The LF informs Client J that it has missed the first segment on Channel r.
- The LF traces its table to find the suitable LPS.
- The LF sends the information about the LPS (i) to Client J.
- Client J requests the first segment of VideoV3 from LPS (i).
15. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.6, November 2018
67
- LPS(i) pass the first segment to Client J.
- Client J receives the first segment into the initial buffer.
- Client J informs the LF that it is streaming the first segment from LPS i in order
to update the value number of requests of LPS (i) in the LF table.
- The LF increases the number of requests of LPS(i) by one.
- Client J waits to join Channel rin order to obtain the rest of the segments.
Else IF the arrival time is T0:
- Client J joins Channel r.
- Client J receives the first segment into the initial buffer and the rest segments
into the pre-fetch buffer.
-Client J receives the rest of the segments into the pre-fetch buffer.
-Client J plays the first segment from the initial buffer, then switches to the per-
buffer and plays the rest of the segments.
Else Client J releases Channel r.
End.
The video playback procedure is performed in the proxy server caching mechanism. This
procedure states the full scenario of the arrival time of any clients. In the proposed scheme for the
VOD system, the main server starts broadcasting the video to the LFs. The LF classifies the video
into a number of segments and then broadcasts it over a number of logical broadcasting channels
so that any new client can request the video and view it. The client may arrive in either of two
cases. The first case emerges once the client loses broadcasting the first segment and the second
case emerges when the client does not. If the client arrives at time T0when Channel r is
broadcasting, the client can be included in this channel and streams the entire segments. If the
client arrives at the time after the channels have started broadcasting the first segments, the client
has to request the missed segment from the LPS (i) that is assigned by the LF. After that, the
client requests the first segment from LPS i. Consequently, the LF increases the requests number
of LPS (i) by one. The rest of the video segments are obtained from Channel r of the LF.
7. SYSTEM PARAMETERS
This section elaborates the parameters as shown in Table 2, which are used to evaluate the
proposed Proxy-Cache scheme for theVOD system. The 60-minute-video of the MPEG-1
encoding is divided into K segments of an equal size. The number of segments depends on the
number of logical broadcasting channels that are based on the bandwidth of transmission media.
According to Equation 8 that is represented for the SB protocol, the length of each segment will
be 12 minutes when the video length is set to 60 minutes and the number of logical broadcasting
channels is equal to 5 logical channels. The number of segments of the SB protocol must be equal
to the number of logical broadcasting channels. The number of these channels per each video is
identified according to the bandwidth of the IEEE802.11g. According to the parameters of
Equation 9, the bandwidth (K) of the transmission media (IEEE802.11g) isB = 45 /_¡¢, and
which is used to transmit the videos among the system devices.” The consumption rate video is
r = 1.5 of the MPEG-1 encoding. The maximum number of videos of the Proxy-Cache scheme
for the VOD system that can be handled is N<=5 videos. By applying the parameters of Equation
2, the parameters are comprised as follows:1.5 ∗ + ∗ 5 < 45. The value of K should be less than 7
logical channels for each video in order to achieve the requirement of this formula. A better
number of logical channels of each video can be K=5.Based on the SB protocol’s scheduler, the
number of segments related to every video should be equal to the number of logical channels,
which are 5 segments allocated for each video. Every broadcasting channel broadcasts the video
segments based on a transmission rate are less or equal to the consumption rate.” This is in order to
avoid the client to buffer a big portion of a video in its buffer during the streaming process. Table
2 illustrates the evaluation parameters of the Proxy-Cache scheme for the VOD system where the
16. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.6, November 2018
68
Wi-Fi IEEE802.11g (54 Mbps) technique is used to provide the video service to the clients. Five
segments of the video are broadcasted over five logical broadcasting channels and at different
video lengths of 30, 60 and 90 minutes in order to evaluate the delay of the service under these
lengths. The consumption rate of the MPEG-1 encoding is 1.5 Mbps. Different numbers of clients
arrive at different periods of time, where {1,2,3,4,5,6,7,8,9,10} clients arrive at each minute.
Table 2. Evaluation Parameters
Parameters Notation Values
System bandwidth B 54 Mbps
The number of logical broadcasting
channels
K 5 logical Channels
The number of video segments K 5 Segments
Video length L {30, 60 and 90} minutes
Video consumption rate V 1.5 Mbps
Client arrival rate C arrival {1, 2, 3, 4, 5, 6, 7, 8, 9 and10}
(Clients/minute)
The number of videos N 1-5
8. EXPERIMENTAL ENVIRONMENT
In this section, the equipment that is used for applying the PSCM caching scheme pertaining to
the VOD system is presented in detail. The implementation of this scheme is divided into three
classifications, which comprise verified tools, developing tools and hardware environments. More
discussions regarding these classifications are highlighted in the following sections.
8.1. VERIFIED TOOLS
The VLC (Video LAN) software is an open source cross-platform that is used as a verified tool to
test the behavior of the system and to ensure a proper stream for the video through the system
devices. The server in the system handles the video to be streamed into multiple numbers of
mobile clients by using the VLC framework. This framework has the capability to work with
various types of video encoding, such asthe MPEG-2, H.264, WMV, DivX, MPEG-4and FLV.
Additionally, it can efficiently work with several operating system platforms.
8.2. DEVELOPMENT TOOL
The tool that is being used to develop the Proxy-Cache scheme of the VOD system is the
Microsoft Visual C# 2010. This development environment allows the programmer to have a
flexible capability to deal with streaming the video though to the networks.
8.3. HARDWARE ENVIRONMENTS
This section represents the hardware devices that are used to evaluate the Proxy-Cache scheme of
the VOD system. The implementation focuses on one LF service area where multiple mobile
clients efficiently join the requested videos. Table 3 illustrates the environments that are located
in the LF service area accompanied with the specifications of each of these hardware devices.
17. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.6, November 2018
69
Table 3. Hardware Environments
Types of Devices No. of Devices The Specification of the Device
Client Devices 5-10
Tested on mobile devices (laptop), Inspiron 5559, Intel
Core i7-6500 U Inside Processor 3Ghz, 4G Cache
Local Forwarder (LF) 1 Intel (R) Core(TM)2 Duo CPU T6600, 2.20Ghz
Local Proxy
Server(LPS)
2
Stationary device, Intel Dual-Core AMD Opteron (tm),
Processor 2214 2.20 GHz (2 Processors )
Operation Systems 13 Windows 7, 64-bit OS
Wireless Transmission 1 Wi-Fi IEEE802.11g, 54Mbps, WIMAX, 72 Mbps
9. EXPERIMENTAL RESULTS AND DISCUSSIONS
This section introduces the produced findings that are obtained by applying the proxy server
cache scheme for the VOD system. Additionally, the service delay of ordering the video based on
several effective cases is discussed. The time delay is considered to be the time average for which
a client should begin from ordering the video until the recipient of its service. The time average
measures how the VOD system functions as effectively through anon-demand video service.
9.1. THE EFFECTS OF THE NUMBER OF ARRIVAL REQUESTS WITH DELAY
The obtained findings of the time delay put an impact on the VOD system after its measurement
relies on the number of clients’ requests within a particular time as shown in Figures 9 (a) and 9
(b) . It is found to be proven from the obtained results that the average time delay of the five
caching techniques comprises All-Cache, DSC-Cache, Random-Cache, Proxy-CacheandPoR-
Cache. The average service delay without caching represents half of the duration of the first
segment (V/K/2 = 60/5/2=6 minutes for 60 minutes of a video length). It is found to be proven
from the results that the caching process helps to reduce the waiting time of the mobile clients
substantially. In all types of caching, the system needs at least 2 clients to be situated within the
area in order to cache the first segment and to reduce the time delay. Accordingly, the request
arrival number starts from number two as the arrival request number. In all five caching
techniques the client population is sparse (Parrival= 2), the delay is less than 90 seconds and when
we test it in the (Parrival= 6), it is seen to be less than 40 seconds, which is 4 times better than
without caching. These improvements are even more notable as the request rate increases. This is
because when a client population becomes denser a client has a better chance to find a cache, thus
reducing the service delay. In the new scheme, the time delay is considered effective regardless of
the existence of a single client within a particular area. This scheme aims atobtaining a video
service that has the same service for the entire clients. This implies that the client could obtain the
first segment regardless there are previous clients within the indicated area or not. Proxy-Cache
almost provides TVOD services since it offers a delay that is less than 5 seconds in most
scenarios as shown below. When the arrival rate either increases or decreases, mobile clients can
find the first segment smoothly. In the All-Cache, DCS-Cache, Random-Cache and PoR-Cache
scheme, the system needs at least two clients to be situated in the area in order to cache the first
segment and to reduce the time delay. Consequently, the request arrival number starts from
number two as the arrival request number. In the Proxy-Cache scheme, the late client can cache
the first segments regardless of the availability of other clients located in the area. Hence, the
arrival request number starts from number one, which indicates to the late client who obtains the
first segment regardless of the existence of previous clients within the area.
18. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.6, November 2018
70
Figure 9 (a). The average time delay of the All-Cache, DSC-Cache and Random-Cache scheme based on
the number of arrival requests (Client/minute)
As shown in the All-Cache scheme, the average delay of viewing a video is 5.61374 seconds, in
the DCS 29.757682 seconds, and in the Random-Cache37.672158 seconds when the number of
arrival requests is (Parrival= 6) per one second and PoR-Caching is 478.3601 milliseconds.
Meanwhile, in the Proxy-Cache scheme, the average delay is 142.2766 milliseconds when the
number of clients is set to 2. In the Proxy-Cache scheme, the service delay is 164.3577
milliseconds when 6 clients arrive at every minute. Moreover, the average delay in the Proxy-
Cache scheme is 179.2505 milliseconds when 10 clients arrive every minute. The delay that
occurs in the All-Cache, DCS and Random-Cache scheme is due to the reason that the late client
has a less chance to search for a client who catches the same first segment of the video. In the
Proxy-Cache scheme, the late clients have a higher chance to cache the same first segment of the
video from the LPS. The results show that the average delay of the Proxy-Cache scheme is
slightly increasing at a time the number of clients is increased. Nonetheless, the increase of the
delay is still reasonable in comparison with other caching schemes.
Figure 9 (b). The average time delay of the PoR-Cache and Proxy-Cache Scheme based on the number of
arrival requests (Client/minute)
9.2. THE EFFECTIVE OF THE AVERAGE DELAY DEPENDING ON THE LENGTH OF THE
VIDEO
The effect of the average time delay relies on several different video lengths where the VOD
system is could manage different video lengths. Based on Equation 2, the length of every segment
can be increased or reduced according to the total length of the video length and to the number of
logical broadcasts. Figures10 (a) and 10 (b) show the impacts of the video length on the service
time delay through the All-Cache, DSC-Cache, Random-Cache, Proxy-Cache scheme and PoR-
Cache, respectively. The average time delay reaches 5.362536 seconds when the video length
reaches 60 minutes in the All-Cache scheme, 23.342363 seconds in the DSC-Cache, 35.303746
19. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.6, November 2018
71
seconds in the Random-Cache and 476.2478 milliseconds in the PoR-Cache. The average service
delay in the new scheme is 140 milliseconds. Further, the average service delay is 7 seconds
when the video length reaches 90 minutes. The average service delay of the new scheme, in
return, retains the same (i.e. 140 milliseconds) when the video length reaches 90 minutes. It can
be inferred from the results that the average service delay of the All-Cache, DSC, Random-Cache
and PoR-Cache schemes are increased by raising the length of the video. The increase in the
delay is due to the fact that the size of the first segment, which caches from the neighbor, is
increased. This, in turn, leads to disconnect the transmission when the cache is a mobile device.
The transmission disconnection of a long segment causes an increase on the start-up overhead
that is needed to find another new free client who has a cache of the same first segment video
after the current cache has failed. However, when the failure rate increases, the start-up overhead
will be increased as well. Thus, the longer length delay also increases. The results of the Proxy-
Cache scheme show that the average service delay is considered to be the same when the length
of the video increases. The reason of this is that the late client could directly cache the first
segment from the stationary device where there is no start-up overhead to trace for another new
cache after the current one moves away or terminates the system. Consequently, the Proxy-Cache
scheme outperforms the failure in order to obtain the first segment so that there is no start-up
overhead. Therefore, the delay of different video lengths maintains the same.
Figure 10 (a).The average delay of the All-Cache DSC and Random-Cache based on different video lengths
Figure 10 (b).The average delay of the PoR-Cache and Proxy-Cache scheme based on different video
lengths (30, 60, and 90)
9.3. THE RESULTS OF THE FAIL PROBABILITY DEPENDING ON THE NUMBER OF
ARRIVAL REQUESTS
The findings related to the failure probability that has the first segment video of the f caching
schemes comprise the All-Cache, DSC-Cache, Random-Cache, PoR-Cache and the Proxy-Cache
scheme based on the received request number. In the All-Cache scheme, a failure is identified
20. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.6, November 2018
72
when the new client fails to search for a free neighboring client who caches the first segment as
shown in Figure11. Additionally, a failure is identified when the new clients fail to obtain the first
segment of the video from the new cache. The reason behind this failure refers back to that the
client who caches the first segment is found to be moving or is ended from the system.Figure11
illustrates comparative results of the failure probability for obtaining the first segment in the PoR-
Cache and the Proxy-Cache schemes. Both schemes have close results to the newly proposed
scheme. “This probability of the PoR-Cache scheme is 0.0603173 and the All-Cache scheme as
illustrated indicates 0.3903173 when the number of arrival requests is 2. At the same time, the
failure probability for obtaining the first segment is 0 in the Proxy-Cache scheme, whereas the
failure probability in the PoR-Cache is 0.01927233 and the All-Cache scheme is 0.03427786
when the number of arrival requests is 10. Meanwhile, the probability of failure in the Proxy-
Cache scheme remains at 0. Since the probability of obtaining the first segment in the PoR-Cache
and All-Cache schemes depends on the previous clients, the worst case of this failure arises
whenever there is no any client who caches the first segment to the late clients. In the Proxy-
Cache scheme, there is no any failure probability as the number of clients that is taken by the
system is reasonable to the Wi-Fi bandwidth. Nonetheless, the probability of failure in the Proxy-
Cache scheme is encountered when a high number of clients arrive at the same time and all of
these clients attempt to obtain the first segment from the LPSs.
Figure 11. The findings of the failure probability when obtaining the first segment of the video and when
the number of arrival request (2, 4, 6, 8 and 10)
10. CONCLUSION
The importance of this paper is to present a solution on how to minimize the time delay through
the Video on Demand (VOD) system. Therefore, this paper proposes a new caching scheme in
order to minimize the start-up delay in the VOD, which is called theProxy Server Caching
Mechanism where the first segments of the entire broadcasting movies are kept in a stationary
LPS server. If the client arrives after the first segment is broadcasted by the local forwarder, the
clients will not obtain it. Hence, the client should wait for the following broadcasting channel,
which can broadcast the first segment. In order to tackle this issue, aninstalling stationary LPS
Server is suggested in this paper in order to ensurethat the late mobile client can obtain the first
segment when it arrives with a less start-up time delay in comparison with the other schemes.
This caching reduces the time delay by ensuring that the late client obtains the first segment once
it arrives. In order to retain the resources of the LPSs within the system, a load balancing method
is applied with the new scheme. The results show that the new proposed caching scheme is much
better than other caching schemes where this is based on the impacts of the number of arrival
requests with the time delay, the impact of the average time delay based on the length of the video
and the findings of the failure probability based on the number of arrival requests.
21. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.6, November 2018
73
REFERENCES
[1] Duc AT, Thinh N. (2008). Broadcasting Techniques for Video-on-Demand in Wireless Networks.
Book Chapter 1, department of Computer Science, University of Dayton, Dayton, OH 45469. Oregon
State University, Corvallis, OR 97331.
[2] Gruber S, Rexford J, Basso A. (2000). Protocol considerations for a pre-caching proxy for multimedia
streams, in Proc. of the 9th International WWW Conference, pp. 657-668.
[3] Park YW, Baek KH, Chung KD.(2000). Reducing network traffic using two-layered cache servers for
continuous media on the internet, in Proc.Of the IEEE Int'l Conf. on Computer Software and
Applications, pp. 389-394.
[4] Duc AT, Minh L, Kien AH. (2004). MobiVoD: A Video-on Demand System Design for Mobile Ad
hoc Networks. Proceedings of the 2004 IEEE International Conference on MobileData Management
(MDM’04). Berkeley, CA, pp. 212 223.
[5] Saleh Ali Alomari, Putra Sumari. (2010). A Video on Demand System Architecture for
Heterogeneous Mobile Ad Hoc Networks for Different Devices. International Conference on
Computer Engineering and Technology, Vol.7, pp.700 – 707.
[6] Saleh Ali Alomari, Putra Sumari. (2012). A Novel Optimized Design of Popularity Cushion
Staggered Broadcast over Video on Demand System. International Journal of Physical Sciences Vol.
7, No.9, pp. 1435 - 1453, 23 February, 2012
[7] Li-Shen J, Li-Ming T. (1998). Fast data broadcasting and recive scheme for polpular video service.
IEEE transactions on broadcasting, Vol. 44, No. 1, 1998.
[8] Paris JF, Carter SW, Long DDE. (1999). A hybrid broadcasting protocol for video on demand. In
Proc. 1999 Multimedia Computing and Networking Conference, San Jose, CA, pp: 317-326.
[9] kien AH, Simon S. (1997) skyscraper broadcasting, A new broadcasting scheme for metroplitan
Video on Demand systems. In Proceedings of ACM SIGCOMM 1997, Cannes, France.
[10] Hee J, Seong-min J, Sung-kwon P, Seung-hwan S, Dong-hwa Y. (2008). Interleaving harmonic
staggered broadcasting scheme for video-on-demand services. Tenth IEEE International Symposium
on Multimedia.
[11] Kwon JB, Heom HY. (2002).Providing vcr functionality in staggered video broadcasting. IEEE
Transactions on Consumer Electronics, Vol.48, No.1, pp.41–48.
[12] GuiYQ, Jung E, Choi Y, Choi HK. (2007). an efficient periodic broadcast scheme for mobile video –
on demand system “In Proc. International Conference on Information Technology, pp. 888-889.
[13] L. Juhn and L. Tseng. Harmonic broadcasting for videoon- demand service. IEEE Transactions on
Broadcasting.Vol 43, No.3, pp.268–271.
[14] Saleh Ali Alomari, Putra Sumari, Sadik Ali Taweel. (2011). An Efficient Popularity Cushion
Staggered Broadcasting for Homogeneous and Heterogeneous Mobile Video-on-Demand System.
International Conference on Wireless and Optical Communications, Vol.4, pp.272-277.
[15] Saleh Ali Alomari and PutraSumari.,(2012), Effective Broadcasting and Caching Technique for Video
on Demand over Wireless Mobile Network. KSII Transactions on Internet and Information Systems
(TIIS), Vol. 6, No. 3, pp. 919- 940.
[16] R. Asoreyand F.J. Gonzalez Castano, “A Multicast nVoD Schema with Zero-Overhead Implicit Error
Correction,” in Proc. Of IEEE ICC 2008, pp. 2017-2020, May. 2008.
22. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.6, November 2018
74
[17] A. Dan, D. Sitaram and P. Shahabuddin. Scheduling policies for an on demand video server with
batching.In Proc. 6th Int’l. Multimedia Conf. (ACM Multimedia’94), San Francisco, CA, , pp.15-23.
[18] K. A. Hua, Y. Cai and S. Sheu. Patching: a multicast technique for true video-on-demand services.In
Proc. 6th ACM Int’l. Multimedia Conf. (ACM Multimedia ’98), Bristol, U.K., pp 191-200.
[19] Z. Fei, I. Kamel, S. Mukherjee, and M. H. Ammar, “Providing Interactive Functions for Staggered
Multicast Near Video-on-Demand Systems,” Proc. IEEE Conf. on Multimedia and Computing
Systems (ICMCS99), pages 949-953, 1999.
[20] K.A. Hua, S. Sheu, Skyscraper broadcasting: a new broadcasting scheme for metropolitan video-on
demand systems, Proceedings SIGCOMM 97, pp. 98 100, 1997.
[21] L. Juhn, L. Tseng, Harmonic broadcasting protocols for video on demand service, IEEE Transactions
on Broadcasting 43 (3) pp.268-271, 1997.
[22] L. Juhn, L. Tseng, Fast data broadcasting and receiving scheme for popular video service, IEEE
Transactions on Broadcasting 44 (1) pp.100– 105. 1998.
[23] Liao, W. and Li, V. O. K. (1997). The split and merge protocol for interactive video on demand. IEEE
Multimedia , Vol. 4, No. 4, pp.51-62.
[24] ParamasivenA, (2011).,SAMPCAN: A novel caching technique forClient-server interaction modelIn
large ad hoc networks Using resampling methods, International Journal of Wireless & Mobile
Networks (IJWMN) Vol. 3, No. 2, April 2011.
[25] Xie F, Hua K. (2009). A caching-based video-on-demand service in wireless relay networks. IEEE
International Conference on Wireless Communications and Signal Processing, , pp. 1–5.
[26] Subhabrata S, Jennifer YR, Don T. (1999). Proxy Prefix Caching for Multimedia Streams, CMPSCI
Technical Report 98-27 University of Massachusetts.
[27] Saleh Ali Alomari, Putra Sumari. (2010). A new Peer to Peer Caching Techniques for Transmitting
the Video over Wireless Ad Hoc Network. (IJCSIS) International Journal of Computer Science and
Information Security, Vol. 8, No. 3,pp. 239-245.
[28] Saleh Ali Alomari, and Putra Sumari (2014). “PSCM: Proxy Server Cache Mechanism for VOD
System” International Conference on Communications, Signal Processing and Computers (CSPC
2014). Interlaken, Switzerland, February 22-24 2014.(ISSN: 1790-5117) PP: 138-144.
[29] Saleh Ali Alomari, Putra Sumari. (2010). A Video on Demand System Architecture for
Heterogeneous Mobile Ad Hoc Networks for Different Devices. International Conference on
Computer Engineering and Technology, Vol.7, pp.700 – 707.
[30] Vaithegy D, Saleh Ali Alomari, Putra S. (2011). Video on Demand Caching System using NIPBCS
over Mobile Ad Hoc Network, JDCTA: International Journal of Digital Content Technology and its
Applications, Vol.5, No.6, pp. 142 -154.
[31] Georgios S. Paschos, George Iosifidis., (2018)., The Role of Caching in Future Communication
Systems and Networks, IEEE Journal on Selected Areas in Communications, Special Issue on
Caching for Communication Systems and Networks, 2018.
[32] G. Paschos, E. Bastug, I. Land, G. Caire and M. Debbah, (2016)., “Wireless Caching: Technical
Misconceptions and Business Barriers,” IEEE Communications Magazine, vol. 54, no. 8, pp. 16-22.
23. International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.6, November 2018
75
[33] K. Zhang, C. Tian, (2018)., “Fundamental Limits of Coded Caching: From Uncoded Prefetching to
Coded Prefetching”, IEEE Journal on Selected Areas in Communications, Special Issue on Caching
for Communication Systems and Networks, 2018.
[34] J. Sahoo, M. A. Salahuddin, R. Glitho, H. Elbiaze, and W. Ajib, (2017)., “A Survey on Replica Server
Placement Algorithms for Content Delivery Networks”, IEEE Communications Surveys And
Tutorials, vol. 19, no. 2, pp. 1002-1026, 2017.
[35] C.SriguruLakshmi, G.sivakumar, V.Venkatachalam, (2013).,Survey on caching and replication
Algorithm for content distributionIn peer to peer networks,International Journal of Computer Science,
Engineering and Information Technology (IJCSEIT), Vol.3,No.5,October 2013.
[36] Hua, K. A and Sheu, S. (1998).An efficient periodic broadcast technique for digital video libraries,
Journal of Multimedia Tools and Applications, Vol. 5, No.3, pp.1-20.
[37] Liu, W. C. and Jack, Y. B. (2003). Constrained Consonant Broadcasting – AGeneralized Periodic
Broadcasting Scheme for Large Scale Video streaming. Proceedings IEEE International Conference
on Multimedia & Expo, Baltimore, U.S.A, Vol.1 pp.805-808.
[38] Branch, P., Egan, G. and Tonkin, B. (1999)., A client caching scheme for interactive video-on-
demand, Proceedings in IEEE International Conference on Networks, pp. 391 – 397.
AUTHOR
Saleh Ali Alomari obtained his MSc and Ph.D. in Computer Science from
UniversitiSains Malaysia (USM), Pulau Penang, Malaysia in 2008 and 2013
respectively. He is a lecturer at the Faculty of Science and Information Technology,
Jadara University, Irbid, Jordan. He is Assistance Professor at Jadara University, Irbid,
Jordan 2013. He was the head of the Computer Network Department at Jadara University
from 2014 until 2016. He is the candidate of the Multimedia Computing Research
Group, School of Computer Science, USM. He is research assistant with Prof. Dr. Putra,
Sumari. He is managing director of ICT Technology and Research and Development Division (R&D) in
D&D Professional Consulting Company, Malaysia. He has published over 40 papers in international
journals and refereed conferences at the same research area. He is a member and reviewer of several
international journals and conferences (IEICE, ACM, KSII, JDCTA, IEEE, IACSIT, etc). His research
interest is in the area of multimedia networking, video communications system design, multimedia
communication specifically on Video on Demand system, P2P media streaming, MANETs, caching
techniques and for advanced mobile broadcasting networks as well.