This document discusses providing quality of service (QoS) for scalable video streaming over ad-hoc networks using cross-layer design. It begins by introducing multi-hop wireless networks and ad-hoc networks, noting their advantages and challenges. It then discusses QoS and cross-layer design approaches. The document proposes using cross-layer design to provision QoS for scalable video streaming over ad-hoc networks in order to overcome challenges like variable topology, limited resources and interference.
UNIT IV WIRELESS SENSOR NETWORKS (WSNS) AND MAC PROTOCOLS 9 Single node architecture: hardware and software components of a sensor node - WSN Network architecture: typical network architectures-data relaying and aggregation strategies -MAC layer protocols: self-organizing, Hybrid TDMA/FDMA and CSMA based MAC- IEEE 802.15.4.
UNIT IV WIRELESS SENSOR NETWORKS (WSNS) AND MAC PROTOCOLS 9 Single node architecture: hardware and software components of a sensor node - WSN Network architecture: typical network architectures-data relaying and aggregation strategies -MAC layer protocols: self-organizing, Hybrid TDMA/FDMA and CSMA based MAC- IEEE 802.15.4.
MAC PROTOCOLS FOR AD HOC WIRELESS NETWORKS
Issues in designing a MAC Protocol- Classification of MAC Protocols- Contention based protocols- Contention based protocols with Reservation Mechanisms- Contention based protocols with Scheduling Mechanisms – Multi channel MAC-IEEE 802.11
UNIT III ROUTING PROTOCOLS AND TRANSPORT LAYER IN AD HOC WIRELESS NETWORKS -Issues in designing a routing and Transport Layer protocol for Ad hoc networks- proactive routing, reactive routing (on-demand), hybrid routing- Classification of Transport Layer solutions-TCP over Ad hoc wireless Networks.
CDMA Transmitter and Receiver Implementation Using FPGAIOSR Journals
Abstract: Code Division Multiple Access (CDMA) is a spread spectrum technique that uses neither frequency channels nor time slots. With CDMA, the narrow band message (typically digitized voice data) is multiplied by a large bandwidth signal that is a pseudo random noise code (PN code). All users in a CDMA system use the same frequency band and transmit simultaneously. The transmitted signal is recovered by correlating the received signal with the PN code used by the transmitter. The DS - CDMA is expected to be the major medium access technology in the future mobile systems owing to its potential capacity enhancement and the robustness against noise. The CDMA is uniquely featured by its spectrum-spreading randomization process employing a pseudo-noise (PN) sequence, thus is often called the spread spectrum multiple access (SSMA). As different CDMA users take different PN sequences, each CDMA receiver can discriminate and detect its own signal, by regarding the signals transmitted by other users as noise- like interferences. In this project direct sequence principle based CDMA transmitter and receiver is implemented in VHDL for FPGA. Modelsim 6.2(MXE) tool will be used for functional and logic verification at each block. The Xilinx synthesis technology (XST) of Xilinx ISE 9.2i tool will be used for synthesis of transmitter and receiver on FPGA Spartan 3E. Keywords: CDMA, DSSS, BPSK, GOLD code.
MAC PROTOCOLS FOR AD HOC WIRELESS NETWORKS
Issues in designing a MAC Protocol- Classification of MAC Protocols- Contention based protocols- Contention based protocols with Reservation Mechanisms- Contention based protocols with Scheduling Mechanisms – Multi channel MAC-IEEE 802.11
UNIT III ROUTING PROTOCOLS AND TRANSPORT LAYER IN AD HOC WIRELESS NETWORKS -Issues in designing a routing and Transport Layer protocol for Ad hoc networks- proactive routing, reactive routing (on-demand), hybrid routing- Classification of Transport Layer solutions-TCP over Ad hoc wireless Networks.
CDMA Transmitter and Receiver Implementation Using FPGAIOSR Journals
Abstract: Code Division Multiple Access (CDMA) is a spread spectrum technique that uses neither frequency channels nor time slots. With CDMA, the narrow band message (typically digitized voice data) is multiplied by a large bandwidth signal that is a pseudo random noise code (PN code). All users in a CDMA system use the same frequency band and transmit simultaneously. The transmitted signal is recovered by correlating the received signal with the PN code used by the transmitter. The DS - CDMA is expected to be the major medium access technology in the future mobile systems owing to its potential capacity enhancement and the robustness against noise. The CDMA is uniquely featured by its spectrum-spreading randomization process employing a pseudo-noise (PN) sequence, thus is often called the spread spectrum multiple access (SSMA). As different CDMA users take different PN sequences, each CDMA receiver can discriminate and detect its own signal, by regarding the signals transmitted by other users as noise- like interferences. In this project direct sequence principle based CDMA transmitter and receiver is implemented in VHDL for FPGA. Modelsim 6.2(MXE) tool will be used for functional and logic verification at each block. The Xilinx synthesis technology (XST) of Xilinx ISE 9.2i tool will be used for synthesis of transmitter and receiver on FPGA Spartan 3E. Keywords: CDMA, DSSS, BPSK, GOLD code.
Ctcp a cross layer information based tcp for manetijasuc
Traditional TCP cannot detect link contention losses and route failure losses which occur in MANET and
considers every packet loss as congestion. This results in severe degradation of TCP performance. In this
research work, we modified the operations of TCP to adapt to network states. The cross-layer notifications
are used for adapting the congestion window and achieving better performance. We propose Cross-layer
information based Transmission Control Protocol (CTCP) which consists of four network states.
Decelerate state to recover from contention losses, Cautionary state to deal with route failures, Congested
state to handle network congestion and Normal state to be compatible with traditional TCP. Decelerate
state makes TCP slow down if the packet loss is believed to be due to contention rather than congestion.
Cautionary state suspends the TCP variables and after route reestablishment resumes with conservative
values. Congestion state calls congestion control when network is actually congested and normal state
works as standard TCP. Simulation results show that network state based CTCP is more appropriate for
MANET than packet loss based traditional TCP.
HANDLING CROSS-LAYER ATTACKS USING NEIGHBORS MONITORING SCHEME AND SWARM INTE...Editor IJCATR
The standard MAC protocol widely used for Mobile Adhoc Networks (MANETs) is IEEE 802.11.
When attacks in MAC layer are left as such without paying attention, it could possibly disturb channel access and
consequently may cause wastage of resources in terms of bandwidth and power. In this paper, a swarm based detection
and defense technique is proposed for routing and MAC layer attacks in MANET. Using forward and backward ants,
the technique obtains mean value of nodes between the first received RREQ and RREP packets. Based on this
estimation, the source node decides the node as valid or malicious. Moreover the MAC layer parameters namely
number of neighbors identified by the MAC layer, number of neighbors identified by the routing layer, the number of
recent MAC receptions and the number of recent routing protocol receptions are used to determine the node state. The
source node uses these two node state estimation techniques to construct the reliable path to the destination. This
proposed technique improves the network performance and at the same time prevents attackers intelligently.
Improved Video Transmission over MANETs using MDSR with MDCijsrd.com
MANET does not have any fixed infrastructure, so the mobile nodes are free to move within a network which results in dynamic change of network topology. The Real-time video transport has rigid bandwidth, delay, and a loss requirement to support this application in Mobile Ad-Hoc Networks is a challenge. MANET consists of mobile nodes that cause frequent link failures. This link failure causes two main problems. First, when a route break occurs, all packets that have already transmitted on that route are dropped which degrades the video quality and it decreases the average packet delivery ratio (PDR). Second, the transmission of data traffic is halted for the time till a new route is discovered and it increasing the average end-to-end delay. For that we have proposed Node-Disjoint Multipath Routing Based on DSR Protocol with Multiple Description Coding Technique (MDC). Node-Disjoint Path means there is no common node between two paths and MDC encode a media source into two or more sub-bit streams. The sub-streams, also called descriptions. The experiment has been done using NS2 simulator with Evalvid for evaluating the video quality. Our proposed scheme will improve Packet Delivery Ratio, Throughput and Decreased Average End-to-End Delay.
Transport layer protocol for urgent data transmission in wsneSAT Journals
Abstract wireless sensor networks is a growing class of highly dynamic, complex network environment on top of which a wide range of applications, such as habitat monitoring, object tracking, precision agriculture, building monitoring and military systems are built. The real time applications often generate urgent data and one-time event notifications that need to be communicated reliably. The successful delivery of such information has a direct effect on the overall performance of the system. Reliable communication is important for sensor networks. Urgent data transmission has been a serious problem for Wireless sensor networks. WSN face difficulties in handling urgent data like congestion and reliability due to their unique requirements and constraints. Various protocols for congestion avoidance and reliability achievement for WSN have been proposed recently. Few of them have also worked on congestion elimination. These protocols try to minimize the problem using different mechanism. This paper explores these mechanisms and tries to find their features and limitations which directed us for our research. Keywords: Congestion, Reliability, Transport layer Protocol, Urgent data transmission, Wireless Sensor Network.
Efficient and stable route selection by using cross layer concept for highly...Roopali Singh
Efficient and stable route selection by using cross layer concept for highly mobile network with predictive features by Rupali Singh, Gajendra Singh Dhakad
published in International Journal of Research & Technology, Volume 3, Issue 4_November_2015
Wifi Direct Based Chat And File Transfer Android ApplicationNitin Bhasin
This App allows you to share any kind of file present in SD card to other mobile phone directly at speed of 5+MBps. It even allows to click images shoot videos and directly dend to other device.It also allows to send drawings by having drawing pad in it in various colours and various brush sizes. Web-View is also implemented in it.
Link Of App At Amazon Store: http://www.amazon.com/Wifi-Direct-Chat-Transfer-Application/dp/B00TKFFMZO/ref=sr_1_1?s=mobile-apps&ie=UTF8&qid=1424009545&sr=1-1&keywords=Wifi+Direct+Chat+and+File+Transfer+Application
A Review of Routing Protocols for Wireless Sensor NetworkIJMER
A wireless sensor network is a collection of nodes organized into a cooperative network. Each node consists of processing capability, may contain multiple types of memory, have a RF transceiver, have a power source, and accommodate various sensors and actuators. The nodes
communicate wirelessly and often self-organize after being deployed in an ad hoc fashion. Routing protocols for wireless sensor networks are responsible for maintaining the routes in the network and have to ensure reliable multi-hop communication .The performance of the network is
greatly influenced by the routing techniques. Routing is to find out the path to route the sensed data to the base station. In this paper the features of WSNs are introduced and routing protocols are reviewed for Wireless Sensor Network
Evaluation of Virtualization Models for Optical Connectivity Service ProvidersADVA
Our Advanced Technology team was invited to present these slides at the Optical Network Design and Modeling (ONDM) conference in Stockholm, Sweden, along with a representative from the Technical University in Munich. Check out what they had to say about virtualization models
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 SimulationIDES Editor
Ad-hoc networks are basically peer to peer multihop
mobile wireless networks in which the information packets
are transmitted in a ‘store and forward’ manner from a source
to an arbitrary destination via intermediate nodes. The main
objective of this paper is to evaluate the performance of various
ad-hoc networks routing protocols viz. DSDV (Destination
Sequence Distance Vector), DSR (Dynamic Source Routing)
and AODV (Ad-hoc On Demand Distance Vector). The
comparison of these protocols is based on different
performance metrics, which are throughput, packet delivery
ratio, routing overheads, packet drop and average end to end
delay. The performance evaluation has been done by using
simulation tool NS2 (Network Simulator) which is the main
simulator.
Zigbee Based Wireless Sensor Networks for Smart CampusIJMER
A network which connects a bunch of distributed low-power sensor nodes together, with each node dedicated to a predefined operation can be visualized as a Wireless Sensor Network (WSN).
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
20240605 QFM017 Machine Intelligence Reading List May 2024
Qo s provisioning for scalable video streaming over ad hoc networks using cross-layer design
1. Computer and Information Sciences
Computer Engineering Department
QoS Provisioning for Scalable Video Streaming Over
Ad-Hoc Networks Using Cross-Layer Design
1
2. Multi-hop Wireless Networks.
Quality of Service (QoS).
Cross-layer Design.
Scalable Video Coding.
Simulation Environment.
Proposed Solution.
Results and Findings.
Future Works.
Publications from this Thesis.
2
4. Multi-hop Wireless Networks (MHWNs):
It is defined as a collection of nodes that communicate with each
other wirelessly by using radio signals with a shared common
channel.
Source Destination
Hop
Path, chain or route
Host Switching Unit
4
5. There are several names for MHWNs; it could be called packet
radio network, Ad-Hoc network or mobile network.
The nodes here could be named stations or radio transmitters
and receivers.
MHWNs
Ad-Hoc
Networks
Mesh Networks
Wireless Sensor
Networks
5
6. Ad-Hoc Networks:
Nodes in the network are mobile in general.
The wireless hosts in such networks, communicate with each
other without the existing of a fixed infrastructure and without a
central control.
A mobile ad-hoc network can be connected to other fixed
networks or to the Internet.
Most of the Ad-Hoc networks use the allocated frequencies for
the Industrial, Scientific and Medical (ISM) band.
6
7. Ad-hoc networks have several advantages over the traditional
networks, like:
Ad-hoc networks can have more flexibility.
It is better in mobility.
It can be turn up and turn down in a very short time.
It can be more economical.
It considered a robust network because of its non-hierarchical
distributed control and management mechanisms.
7
8. The main challenges face the Ad-Hoc networks are the following:
Energy conservation: Nodes in Ad-Hoc networks are equipped
with limited batteries.
Unstructured and/or time-varying network topology: Because of
the nodes mobility, that makes the network topology usually
unstructured and makes the optimizing process a difficult task.
Scalability & heterogeneity: In some cases, there will be a huge
number of nodes.
8
9. Low-quality communications: In general, the wireless channel is
weak, unreliable, unprotected from outside interferences, and the
quality of the network can be affected by the environmental
factors.
Resource-constrained computation: The resources in Ad-Hoc
networks “such as network bandwidth” are available in limited
amounts.
Ease of snooping on wireless transmissions (security hazard).
9
10. In addition to that, Ad-Hoc networks inherit some of the issues
which are faced by the traditional wireless networks, like:
There are no known boundaries for the maximum range that
nodes will be able to receive network frames.
The wireless channel has time-varying and asymmetric
propagation properties.
Hidden-node and exposed-node problems may occur.
COLLISION Blocked
By The
Transmitter
Receiver Transmitter Exposed Node
Sender 1 Receiver Sender 2
10
13. ZigBee is a new standard for the ad-hoc networks based on the
IEEE 802.15.4 standard.
The ZigBee standard is a specification for Low Rate Wireless
Personal Area Networks (LR-WPANs) that are formed and
maintained under the ZigBee working alliance.
13
14. Application Layer
Slotted
(beacon enabled mode) Defined in the
ZigBee Specification
Based on CSMA/CA Network Layer
Un-Slotted
(beaconless mode)
MAC Sub-Layer
Based on DSSS Defined in the
IEEE 802.15.4 Standard
Physical Layer
Data rate for each channel is 250 kbps
Three physical layers:
• 2.4 GHz
• 915 MHz
• 868 MHz
14
16. Ad-Hoc On-Demand Distance Vector Routing (AODV):
The AODV routing protocol is based on the Destination
Sequenced Distance Vector (DSDV) algorithm.
It can minimize the number of required broadcasts by creating
routes in on-demand basis.
It is considered as a pure on-demand route acquisition system.
16
17. Route Discovery Process in AODV:
Last Sequence
RREQ
Number for the
Destination
Destination
RREQ RREQ
Source
RREQ
The intermediate nodes reply to the
Broadcast ID RREQ only if they have a route to the
destination with a sequence number
* Route Request (RREQ)
equal or greater than the one included
Node’s IP Address in the RREQ. 17
19. The source node needs to reinitiate the
route discovery protocol every time it
moves.
If any node in the route moves away, its
upstream neighbor propagates a link failure
notification message (RREP with ∞ metric).
Nodes in AODV use hello messages to
inform about their neighbors in the
network, and for maintaining the
connectivity of nodes.
19
21. In general, QoS is defined as a measure of how well the network
performs its tasks and satisfies the users’ requirements.
QoS represents the set of parameters which should be
implemented in the network infrastructure to meet the service
performance requirements.
Performance
Parameters
Throughput Delay Jitter Packet Loss Availability
Transmission Propagation Queuing Processing
21
22. The QoS requirements can be differ based on the provided
service.
Transferring a file Multimedia Streaming
There are another important problems in Ad-Hoc network when
providing QoS such as routing, maintenance and variable
resource problems .
22
23. The QoS in multi-hop network can be classified based on the
QoS approaches or based on the layer at which nodes operate in
the network protocol stack.
QoS QoS
Approaches Approaches
Coupled Decoupled Independent Dependent
23
25. In the early stage of the multi-hop wireless Application
networks, the network protocol design was
Presentation
based on the layered architecture.
Session
The main feature of this approach was the
Transport
simplicity of the protocol design.
Network
However, this approach was not ideal for the
Data Link
multi-hop wireless networks, because of its
inflexibility which result in poor performance. Physical
OSI Model
25
26. In the layered architectures, the Layer 3 Task 3
networking task will be divided and Layer 2 Task 2
distributed among layers, and each layer
will be assigned to provide certain services. Layer 1 Task 1
The communication between nonadjacent Layer 3
layers is forbidden, while the adjacent
layers can only communicate procedure Layer 2
calls and responses.
Layer 1
Protocols in the layered architecture are
designed by respecting the rules of the
reference architecture.
26
27. The cross-layer design can be defined as a protocol design by the
violation of the reference layered communication architecture
with respect to a certain layered architecture.
The violation of a layered architecture can be done in many
different ways.
After the violation of the layered architecture, the layers will be
no longer separated.
27
28. Categories of cross-layer designs:
Hints
Notifications
Interface
to set a
lower
layer
Interface for
parameter
explicit
notification
from a
lower layer Upward Downward Back-and-forth
to higher information flow
information flow information flow
layer
1 Creation of New Interfaces
28
29. Categories of cross-layer designs:
Designed layer
Fixed layer
Super
layer
Merging of Coupling without Vertical
2 3 4
adjacent layers new interfaces calibration
29
30. Based on the number of layers involved in optimizations
(single, multiple or full), the cross-layer design can be
categorized to three types:
• Layer trigger scheme.
• Joint optimization scheme.
• Full cross-layer design.
30
31. QoS Support With Cross-layer Design:
Network Status
Transport Layer
Traffic Volume
Rate Control Congestion Control
Network Layer
Admission Control Routing
Flow Distribution
MAC Layer
Scheduling Channel Assignment Space and Time
Physical Layer
Modulation / Rate
Ideas
Power Control
Adaptation Network Topology
31
33. The video stream consists of multiple
frames that are displayed in a certain
frame rate.
The size of the frames is specified by the
format of the frame.
Y U V
Luminance Component Two chrominance components, hue Intensity
Format Video Resolution (in pixels)
Size Used in This Thesis
Quarter CIF (QCIF)
96 × 80
176 × 144
Common Intermediate Format (CIF) 352 × 288
33
34. The constraints on the multimedia applications can be different
from one device to another.
This issue, is one of the reasons which makes the video
compression plays a major role in video transmission nowadays.
The main goal of the video compression algorithms is to achieve
an optimal compression while maintaining a low level of
distortion from the compression process.
34
35. Video compression or what is known as video coding is the
process of compacting a digital video signal into a fewer number
of bits.
Compression
Process
Compressor De-compressor
(Encoder) (Decoder)
The reduction of the video size by the compression process is
achieved by removing redundancy (unnecessary components for
reproduction process).
35
36. Residual
Temporal Frames Spatial Coefficients
video
Input Model Model
Stored Entropy Encoded
Motion Vectors
Frames Encoder Output
Video Coding
36
37. Scalability means it is possible to remove some parts of the
stream while maintaining a result that forms another valid bit
stream for some target decoder, and represents the original
content with a reconstruction quality that is less than the original
bit stream.
It allows recipients, and other network
elements, to adjust the video stream
according to their capabilities.
It can help in protecting
the more important parts
of the bit stream from
being dropped or lost in
case of congestion. 37
39. Quality scalability:
The quality scalability a.k.a. "SNR scalability" is similar to the
spatial scalability but without changing of resolution between
layers.
Quality
Scalability
Coarse Grain
Scalability
Medium Grain
Scalability
Fine Grain
Scalability
39
40. Scalable Video Coding (SVC) is an encoding technique that
allows adapting to the variable network conditions.
It has been standardized by the Joint Video Team (JVT) of the
ISO/IEC Moving Pictures Experts Group (MPEG) and the ITU-T
Video Coding Experts Group (VCEG) as an extension for the
H.264/AVC standard.
40
42. Tools Used in This Thesis:
Network Simulator 2: It is an open source object oriented
discrete-event simulator. It is written in C++, and it uses Object
Tool Command Language (OTcl) as a command and
configuration interface.
Network
Scenario
42
43. Joint Scalable Video Model (JSVM): It is an open source project
written in C++ and used as the reference software for the
Scalable Video Coding (SVC) project.
Scalable Video-streaming Evaluation Framework (SVEF): It is a
mixed online/offline open-source framework used to evaluate
the performance of H.264/SVC video streaming. SVEF is written
in C and Python and released under the GNU General Public
License.
43
44. myEvalSVC & myEvalSVC_Sink: They are a customized agents
used to evaluate H.264/SVC transmission over NS2 simulator.
Cygwin: It is software provides Linux look and feel environment
for Microsoft Windows.
Visual C++ 2008 Express Edition: Microsoft Visual C++ is an
Integrated Development Environment (IDE) product from
Microsoft for the C, C++, and C++/CLI programming languages.
44
45. Simulation Parameters:
Parameter Used Value
Network Queue
Number Dimensions
Transmitted SignalFactor (Gt)
CarrierRoutingofType Type(Pt_)
AntennaPropagation Model
Transmit Data ofSize Size (CS)
Radio ChannelDuration Z_)
Network Interface Type
Interface LossNodes
Max Fragmented Y_,
Operating Protocol
SimulationRateGain
System Frequency
Number Threshold
Antenna Model
Sensing Sources
Traffic Type
Location (X_,
Queue Power
Antenna DropTwo80802.15.4m
Scalable3,×dBi (SVC)
20000.0012000Queue
m0, 2s
WirelessKbps
OmniPriority
Tail2.4Bytes
IEEEAODV
(0, 1,GHz
250Antenna
50, 20w
Ray100
1.0 Channel
-1000.5)
1.0
Video
Ground
Receive MAC TypeFOREMAN
Antenna Gain (Gr)
YUV VideoReceiver Threshold (RX)
Sequence Z YUV Video Sequence802.15.4 BUS
IEEE dBi
1.0
Number of Frames 150 Number of Frames 150
Frame Rate 15 fps Frame Rate 15 fps
Resolution (in pixels) 96 × 80
MAX Resolution (in pixels) 96 × 80
Y
X 45
46. Preparing Input Trace • YUV Video
• Main Configuration File
1 • Layer Configuration File
JSVM 9.19.14 Decoder
---------- new ACCESS UNIT Length LId TId QId Packet-Type GENERAL =======================================
Start-Pos. #==============================
---------- Discardable Truncatable
========== ====== 24] OutputFile
JSVM Encoder
NON-VCL: SEI NAL UNIT [message(s): === === === ============ =========== ===========
Bitstream.264 # Bitstream file (Specifies the filename
0x00000000 PARAMETER SET (ID=0) (ID=0) 0 StreamHeader
NON-VCL: SEQUENCE
NON-VCL: SUBSET SEQUENCE57 (H264AVCEncoderLibTestStatic)
PARAMETER SET 0
0 No No
# for the bit-stream to be encoded)
0x00000039PARAMETER SET (ID=0)
NON-VCL: PICTURE 12
FrameRate 0 0 0 ParameterSet
15.0 No
# Maximum frame rateNo [Hz]
0x00000045PARAMETER SET (ID=1)
NON-VCL: PICTURE
8 10]0
#MaxDelay
NON-VCL: SEI NAL UNIT [message(s): 0 0 ParameterSet
1200.0 No No
# Maximum structural delay [ms]
0x0000004d 0, QL 0, 18 BId-1,0 0, QP 32 ) 0 SliceData
Frame 0 ( LId 0, TL AVC-I, AP
FramesToBeEncoded 0 150 No No
# Number of frames (at input frame rate)
Frame 0 ( LId 0, TL 0, QL 1, SVC-I, BId 0, AP 0, QP 32 )
.Frame .0.( LId.0, TL . .QL 2, SVC-I, BId 1, AP.0, QP.32 ). . . . . . . . . .
. . . . . . 0, . . . . . . . . . . . .
ReconFile Original # (Specifies the number of frames of the
Frame 0 ( LId 0, TL 0, QL 3, SVC-I, BId 2, AP 0, QP 32 ) Encoding Process
rec.yuv
........................................ Bitstream.264 # input sequence to be encoded)
encoding.txt
. . . . . . . . . . . . . . . . . . . . . Video . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
......
Reconstructed file
JSVM 9.19.14 Encoder
Info: MaxDeltaQP was set to 0 for layer with MGSVectorMode
#====================== INPUT / OUTPUT =========================================
JSVM Decoder
profile & level info:
JSVM BitStreamExtractor
===================== SourceWidth 96 # Input frame width
(H264AVCDecoderLibTestStatic)
DQ= 0: Main @ Level 1
SourceHeight 80 (BitStreamExtractorStatic)
# Input frame height
DQ= 1: Scalable High Intra @ Level 1
DQ= 2: Scalable High Intra @ FrameRateIn Level 1 15 # Input frame rate [Hz]
DQ= 3: Scalable High Intra @ Level 1
AU 0: I T0 L0 Q0 QP 32 Y 33.6156 U 39.4929 V FrameRateOut 39.9656156032 bit # Output frame rate [Hz]
0: I T0 L0 Q1 QP 32 InputFile 240 bit FOREMAN_96x80_15.yuv
# Input file
Decoding
0: I T0 L0 Q2 QP 32
Reconstructed 200 bit
0: I T0 L0 Q3 QP 32 Y 33.6427 U 39.4929 V 40.0422 rec_layer.yuv
#ReconFile NALUReconstructed file
176 bit # Trace File
Process Video Sequence
. . . . . . . . . . . . . . . . . . . . . . . . . . .#SymbolMode
............. 0 # 0=CAVLC, 1=CABAC
originaltrace.txt
decoding.txt. . . . . . . Bitstream.yuv. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
..............
46
47. Preparing Input Frame
Trace Decoding Process Frame NALU Trace File
decoding.txt Originaltrace.txt
2
Time Size LId TId QId Number
0.000000 787 0 0 0 0
0.033333 240 0 0 0 2
0.066667 275 0 F-N Stamp
0 0 3
0.100000 244 0 0
(f-nstamp) 0 4
0.133333 262 0 0 0 5
0.166667 283 0 0 0 6
0.200000 303 0 0 0 7
................................................................
sendingtrace.txt Frame
Sending
Number
Time
0x00000000 57 0 0 0 StreamHeader No No -1 0
0x00000039 12 0 0 0 ParameterSet No No -1 0
0x00000045 8 0 0 0 ParameterSet No No -1 0
NS2_Trace.awk
0x0000004d 18 0 0 0 SliceData No No 0 0
0x0000005f 745 0 0 0 SliceData No No 0 0
...........................................................
NS2_Trace.txt
47
48. NS2_Trace.txt
Simulation Flow VideoTrace
Application myEvalSVC myEvalSVC_Sink Application
Transport UDP UDP Transport
Network AODV AODV Network
Logical Link Control Logical Link Control
PriQueue / PriQueue /
Interface Queue Interface Queue
MyPriQueue MyPriQueue
Medium Access Control IEEE 802.15.4 IEEE 802.15.4 Medium Access Control
Network Interface Network Interface
Physical IEEE 802.15.4 IEEE 802.15.4 Physical
Simulated
Source Network Sink
48
Node Node
50. Start-Pos. Length LId TId QId Packet-Type Discardable Truncatable
========== ====== === === === ============ =========== ===========
0x00000000 57 0 0 0 StreamHeader No No -1 0
Reconstructing Video
0x00000039
0x00000045
12
8
0
0
0 0 ParameterSet No
0 Prepare_ReceivedTrace_Step2.exe
0 ParameterSet No
No
No
-1
-1
0
0
0x0000004d 18 0 0 0 SliceData No No 0 40558
2
0x0000005f 745 0 0 0 SliceData No No 0 40558
0x00000348 18 0 0 0 SliceData No No 2 40575
0x0000035a 198 0 0 0 SliceData No No 2 40575
....................................................................................
Start Frame Packet-
received.txt Frame
Sending
sendingtrace.txt
Position Size LId TId Id Type
Q Discardable Number
Truncatable Time
0x0000004d 18 0 0 0 SliceData No No 0 40558
0x0000005f 745 0 0 0 SliceData No No 0 40558
0x00000348 18 0 0 0 SliceData nalufilter No
SVEF No 2 40575
0x0000035a 198 0 0 0 SliceData No No 2 40575
0x00000420 18 0 0 0 SliceData No No 3 40597
0x00000432 233 0 0 0 SliceData No No 3 40597
........................................................... Original
filteredtrace.txt Bitstream.264
Video
JSVM BitStreamExtractor
(BitStreamExtractorStatic)
50
53. 1) Reducing the total number of the
dropped base frames.
2) Reducing the total number of
useless enhancement frames.
Goals
3) Giving the base frame a high Simplicity
priority when network is congested.
Efficiency
4) Reducing the average delay as
much as possible. Creative
5) Maintaining an acceptable jitter
value.
6) Balancing between the simplicity of
the design and the performance.
7) Maintain the layering principle as
much as possible.
53
54. Proposed Cross Layer Design Framework:
Application
Transport
Qid Value
Network
Queue Length Logical Link Control
Interface Queue
NB
Medium Access Control
Network Interface
Physical
54
57. In Simulation Scenarios, the following points have been
considered:
Evaluating the proposed design on stressed networks.
Study the effect of queue size on the proposed solution.
Evaluate the proposed design with different movement
scenarios.
Evaluate the proposed design with different number of nodes.
Evaluate the proposed design with different number of senders.
57
58. Acronyms and Notations:
PriQueue: represent the results for the original system.
MyPriQueue: represent the results when the proposed design is applied.
Qid0: Base frames.
Qid1: First enhancement frames.
Qid2: Second enhancement frames.
Qid3: Third enhancement frames.
UQid: Useless enhancement frames.
58
67. Some of the interesting open issues and future work for this
thesis:
Deploying the proposed framework in a real environment.
Consider the noise in the design and in the evaluation process.
Prevent the useless frames from being sent.
Find a way to reduce the effect of the proposed design on the
average jitter.
Increase the number of simultaneous senders while maintaining
good video quality.
67
69. Conference:
International Conference on Wireless
Communications, Networking and Mobile Computing
Paper Title:
QoS Provisioning for H.264/SVC Streams over Ad-Hoc
ZigBee Networks using Cross-Layer Design
Founded by:
King Abdulaziz City for Science and Technology under
grant number ARB-29-54
69
In some cases, the node or the network cannot support the uncompressed video stream. Also, video compression enables a more efficient use of transmission resources.
Network with heterogeneous clients.
Medium Grain Scalability (MGS): it increases the efficiency by using a flexible prediction module, where all layers can be referenced.
The transmitted power is the power that is transmitted from the antenna into space.The receiver threshold is the parameter used to specify the communication range of the wireless nodes and the threshold is the minimal power of the packet required for successful reception.The carrier sensing threshold describes the sensing range of a node.The two-ray ground model considers the received power from both the direct path and a ground reflection path.
Encoder can be used for generating SVC bit-stream.-pf: specifies the name of the config file to be used.BitStreamExtractor to generate the original NALU trace file.-pt: generates a packet trace file from the given stream.NALU: Network Abstraction Layer Unit.rec.yuv: Specifies the filename of the coded and reconstructed input sequence for the layer. This sequence is provided for debugging purposes.
nalufiltertool to filter the NAL units that have unsatisfied dependencies and emulate a play-out buffer, dropping NAL units that were received too late.nalufilter<sent stream trace file> <received trace file> <play out buffer in milliseconds> <frames per second> > <filtered trace file>
The current version of JSVM cannot decode video streams affected by out of order, corrupted, or missing NALUs.<bytes per frame>: length in bytes of each YUV frame, obtained from width*height*1.5.