SlideShare a Scribd company logo
1 of 41
Download to read offline
London, 9th June 2014
R2D2: Network error control for
Rapid and Reliable Data Delivery
Project supported by EPSRC under the
First Grant scheme (EP/L006251/1)
Resource Allocation
Frameworks for Network-coded
Layered Multimedia Multicast
Services
UCL
Andrea Tassi*, Ioannis Chatzigeorgiou* and

Dejan Vukobratović+
+Dep. of Power, Electronics and
Communication Eng., Univ. of Novi Sad
dejanv@uns.ac.rs
* School of Computing and
Communications, Lancaster University 

{a.tassi, i.chatzigeorgiou}@lancaster.ac.uk
Starting Point and Goals
๏ Delivery of multimedia broadcast/multicast services over 4G
networks is a challenging task. This has propelled research into
delivery schemes.
๏ Multi-rate transmission strategies have been proposed as a
means of delivering layered services to users experiencing
different downlink channel conditions.
๏ Layered service consists of a basic layer and multiple
enhancement layers.
Goals
๏ Error control - Ensure that a predetermined fraction of users
achieve a certain service level with at least a given probability
๏ Resource optimisation - Minimise the total amount of radio
resources needed to deliver a layered service.
2
Index
1. System Parameters and Performance Analysis
2. Multi-Channel Resource Allocation Models
and Heuristic Strategies
3. H.264/SVC Service Delivery over LTE-A
eMBMS Networks
4. Analytical Results
5. Concluding Remarks and Future Extensions
3
1. System Parameters and Performance Analysis
System Model
๏ One-hop wireless communication system composed of one
source node and U users
5
UE 1
UE 3
UE 2
UE 4
UE U
Source
Node
ˆB3
ˆB2
ˆB1
subch. 1
subch. 2
subch. 3
๏ Each PtM layered service is delivered through C orthogonal
broadcast erasure subchannels
The$same$MCS
Capacity$of$subch.$3$
(no.$of$packets)
๏ Each subchannel delivers streams of (en)coded packets
(according to the RLNC principle).
6
k1 k2 k3
x1 x2 xK. . .. . .
๏ is a layered source message of K source
packets, classified into L service layers (packets are arranged 

in order of decreasing importance)
x = {x1, . . . , xK}
Non-Overlapping Layered RNC
6
๏ The source node will linearly combine the data packets
composing the l-th layer and will generate a
stream of coded packets , where
k1 k2 k3
x1 x2 xK. . .. . .
๏ is a layered source message of K source
packets, classified into L service layers (packets are arranged 

in order of decreasing importance)
x = {x1, . . . , xK}
Non-Overlapping Layered RNC
kl
xl = {xi}kl
i=1
nl kl y = {yj}nl
j=1
yj =
klX
i=1
gj,i xi
Random$coef<icient$
belonging$to$a$f.f.$Fq
Non-Overlapping Layered RNC
๏ User u recovers layer l if it will collect k_l linearly independent
coded packets. The prob. of this event is
7
kl
Pl(nl,u) =
nl,u
X
r=kl
✓
nl,u
r
◆
pnl,u r
(1 p)r
h(r)
=
nl,u
X
r=kl
✓
nl,u
r
◆
pnl,u r
(1 p)r
kl 1Y
i=0
h
1
1
qr i
i
| {z }
h(r)
Prob.$of$receiving$r$out$of$nl,u$coded$symbols
Prob.$of$decoding$

layer$l
๏ The probability that user u recover the first l service layers is
DNO,l(n1,u, . . . , nL,u) = DNO,l(nu) =
lY
i=1
Pi(ni,u)
PEP
8
๏ The source node (i) linearly combines data packets belonging to
the same window, (ii) repeats this process for all windows, and
(iii) broadcasts each stream of coded packets over one or more
subchannels
Expanding Window Layered RNC
๏ We define the l-th window as the set of source packets
belonging to the first l service layers. Namely, 

where
Xl
Xl ={xj}Kl
j=1
Kl =
Pl
i=1 ki
k1 k2 k3
K3
K2
K1
x1 x2 xK. . .. . .
Expanding Window Layered RNC
9
๏ The probability of user u recovering the first l layers
(namely, the l-th window) can be written as
DEW,l
L,u) =
=DEW,l(Nu)
=
N1,u
X
r1=0
· · ·
Nl 1,u
X
rl 1=0
Nl,u
X
rl=rmin,l
✓
N1,u
r1
◆
· · ·
✓
Nl,u
rl
◆
p
Pl
i=1(Ni,u ri)
(1 p)
Pl
i=1 ri
gl(r)
Prob.$of$receiving $out$
of$ coded$symbols
Prob.$of$decoding$

window$l
rl
DEW,l(Nu)
DEW,l(N1,u, . . . , NL,u) =
=DEW,l(Nu)
=
N1,u
X
r1=0
· · ·
Nl 1,u
X
rl 1=0
Nl,u
X
rl=rmin,l
✓
N1,u
r1
◆
· · ·
✓
Nl,u
rl
◆
p
Pl
i=1(Ni,u ri)
(
r = {r1, . . . , rl}
Expanding Window Layered RNC
๏ Sums allow us to consider all the possibilities of
9
๏ The probability of user u recovering the first l layers
(namely, the l-th window) can be written as
DEW,l
L,u) =
=DEW,l(Nu)
=
N1,u
X
r1=0
· · ·
Nl 1,u
X
rl 1=0
Nl,u
X
rl=rmin,l
✓
N1,u
r1
◆
· · ·
✓
Nl,u
rl
◆
p
Pl
i=1(Ni,u ri)
(1 p)
Pl
i=1 ri
gl(r)
Prob.$of$receiving $out$
of$ coded$symbols
Prob.$of$decoding$

window$l
rl
DEW,l(Nu)
DEW,l(N1,u, . . . , NL,u) =
=DEW,l(Nu)
=
N1,u
X
r1=0
· · ·
Nl 1,u
X
rl 1=0
Nl,u
X
rl=rmin,l
✓
N1,u
r1
◆
· · ·
✓
Nl,u
rl
◆
p
Pl
i=1(Ni,u ri)
(
r = {r1, . . . , rl}
2. Multi-Channel Resource Allocation Models and
Heuristic Strategies
Allocation Patterns
11
ˆB3
ˆB2
ˆB1
subchannel 1
subchannel 2
subchannel 3
Allocation Patterns
11
ˆB3
ˆB2
ˆB1
subchannel 1
subchannel 2
subchannel 3
coded packets
from x1
coded packets
from x2
coded packets
from x3
ˆB3
ˆB2
ˆB1
subchannel 1
subchannel 2
subchannel 3
Separated$
Allocation$
Pattern
Mixed$
Allocation$
Pattern
ˆB3
ˆB2
ˆB1
coded packets
from x3 or X3
coded packets
from x2 or X2
coded packets
from x1 or X1
subchannel 1
subchannel 2
subchannel 3
Allocation Patterns
11
ˆB3
ˆB2
ˆB1
subchannel 1
subchannel 2
subchannel 3
NO-SA Model
๏ Consider the indication variable

It is 1, if u can recover the first l layers with a probability value 

, otherwise it is 0.
12
u,l = I
⇣
DNO,l(nu) ˆD
⌘
ˆD
NO-SA Model
๏ Consider the indication variable

It is 1, if u can recover the first l layers with a probability value 

, otherwise it is 0.
๏ The RA problem for the NO-SA case is
12
u,l = I
⇣
DNO,l(nu) ˆD
⌘
ˆD
(NO-SA) min
m1,...,mC
n(1,c),...,n(L,c)
LX
l=1
CX
c=1
n(l,c)
(1)
subject to
UX
u=1
u,l U ˆtl l = 1, . . . , L (2)
mc 1 < mc c = 2, . . . , L (3)
0 
LX
l=1
n(l,c)
 ˆBc c = 1, . . . , C (4)
n(l,c)
= 0 for l 6= c (5)
No.$of$packets$of$layer$l$
delivered$over$c
Minimization$of$
resource$footprint
NO-SA Model
๏ Consider the indication variable

It is 1, if u can recover the first l layers with a probability value 

, otherwise it is 0.
๏ The RA problem for the NO-SA case is
12
u,l = I
⇣
DNO,l(nu) ˆD
⌘
ˆD
(NO-SA) min
m1,...,mC
n(1,c),...,n(L,c)
LX
l=1
CX
c=1
n(l,c)
(1)
subject to
UX
u=1
u,l U ˆtl l = 1, . . . , L (2)
mc 1 < mc c = 2, . . . , L (3)
0 
LX
l=1
n(l,c)
 ˆBc c = 1, . . . , C (4)
n(l,c)
= 0 for l 6= c (5)
Each$service$level$shall$be$
achieved$by$a$predetermined$
fraction$of$users
No.$of$users
Target$fraction$of$users
NO-SA Model
๏ Consider the indication variable

It is 1, if u can recover the first l layers with a probability value 

, otherwise it is 0.
๏ The RA problem for the NO-SA case is
12
u,l = I
⇣
DNO,l(nu) ˆD
⌘
ˆD
(NO-SA) min
m1,...,mC
n(1,c),...,n(L,c)
LX
l=1
CX
c=1
n(l,c)
(1)
subject to
UX
u=1
u,l U ˆtl l = 1, . . . , L (2)
mc 1 < mc c = 2, . . . , L (3)
0 
LX
l=1
n(l,c)
 ˆBc c = 1, . . . , C (4)
n(l,c)
= 0 for l 6= c (5)
DynamicI$and$
systemIrelated$
constraints
Because$of$the$SA$
pattern
NO-SA Heuristic
๏ The NO-SA is an hard integer optimisation problem because
of the coupling constraints among variables
๏ We propose a two-step heuristic strategy
i. MCSs optimisation ( )
ii. No. of coded packet per-subchannel optimization

( )
๏ The heuristic can provide a solution after a finite number of
steps
๏ It can be used in real time contexts.
13
m1, . . . , mC
n(1,c)
, . . . , n(L,c)
NO-MA Model
๏ The NO-SA problem can be easily extended to the MA pattern
by removing the last constraint
14
(NO-SA) min
m1,...,mC
n(1,c),...,n(L,c)
LX
l=1
CX
c=1
n(l,c)
(1)
subject to
UX
u=1
u,l U ˆtl l = 1, . . . , L (2)
mc 1 < mc c = 2, . . . , L (3)
0 
LX
l=1
n(l,c)
 ˆBc c = 1, . . . , C (4)
n(l,c)
= 0 for l 6= c (5)
NO-MA Model
๏ The NO-SA problem can be easily extended to the MA pattern
by removing the last constraint
14
(NO-SA) min
m1,...,mC
n(1,c),...,n(L,c)
LX
l=1
CX
c=1
n(l,c)
(1)
subject to
UX
u=1
u,l U ˆtl l = 1, . . . , L (2)
mc 1 < mc c = 2, . . . , L (3)
0 
LX
l=1
n(l,c)
 ˆBc c = 1, . . . , C (4)
n(l,c)
= 0 for l 6= c (5)
(NO-MA)
NO-MA Model
๏ The NO-SA problem can be easily extended to the MA pattern
by removing the last constraint
14
(NO-SA) min
m1,...,mC
n(1,c),...,n(L,c)
LX
l=1
CX
c=1
n(l,c)
(1)
subject to
UX
u=1
u,l U ˆtl l = 1, . . . , L (2)
mc 1 < mc c = 2, . . . , L (3)
0 
LX
l=1
n(l,c)
 ˆBc c = 1, . . . , C (4)
n(l,c)
= 0 for l 6= c (5)
(NO-MA)
๏ The NO-MA is still an hard integer optimisation problem. We
adapted the two-step heuristic strategy.
EW-MA Model
๏ We define the indicator variable









User u will recover the first l service layers (at least) with
probability if any of the windows l, l+1, …, L are recovered
(at least) with probability
15
µu,l = I
L_
t=l
n
DEW,t(Nu) ˆD
o
!
ˆD
ˆD
๏ Consider the EW delivery mode
k1 k2 k3
K3
K2
K1
x1 x2 xK. . .. . .
EW-MA Model
๏ The RA problem for the EW-SA case is
16
(EW-MA) min
m1,...,mC
N(1,c),...,N(L,c)
LX
l=1
CX
c=1
N(l,c)
(1)
subject to
UX
u=1
µu,l U ˆtl l = 1, . . . , L (2)
mc 1 < mc c = 2, . . . , L (3)
0 
LX
l=1
N(l,c)
 ˆBc c = 1, . . . , C (4)
No.$of$packets$of$
window$l$delivered$
over$c
๏ It is still an hard integer optimisation problem but the
proposed heuristic strategy can be still applied.
3. H.264/SVC Service Delivery over eMBMS Networks
Layered Video Streams
Video streams formed by multiple video layers:
๏ the base layer - provides basic reconstruction quality
๏ multiple enhancement layers - which gradually improves the
quality of the base layer
18
Considering a H.264/SVC video stream
base
e1
e2
GoP
๏ it is a GoP stream
๏ a GoP has fixed number of
frames
๏ it is characterised by a time
duration (to be watched)
๏ it has a layered nature
H.264/SVC and NC
๏ The decoding process of a H.264/SVC service is performed on a
GoP-basis
19
k1 k2 k3
K3
K2
K1
x1 x2 xK. . .. . .
๏ Hence, the can be defined as
The$basic$layer$
of$a$GoP
1st$enhancement$
layer$of$a$GoP
2nd$enhancement$
layer$of$a$GoP
kl =
⌃Rl dGoP
H
⌥
kl
Source/Coded$packet$
bit$size
Time$duration$of$a$
GoP
Bitrate$of$the$video$
layer
LTE-A System Model
radio frame
time
frequency
TB left for other services
eMBMS-capable subframes
TB of subchannel 1 TB of subchannel 2 TB of subchannel 3
๏ PtM communications managed by the eMBMS framework
๏ We refer to a SC-eMBMS system where a eNB delivers a 

H.264/SVC video service formed by L different layers to the
target MG
๏ The first and the L-th layers represents the basic and L-1 

H.264/SVC enhancement layers, respectively
20
TB$=$Coded$Packets
3. Analytical Results
Analytical Results
22
๏ We compared the proposed strategies with a classic Multi-
rate Transmission strategy
๏ System performance was evaluated in terms of
Resource$footprint QoS
PSNR$after$recovery$of$the$basic$and$
the$<irst$l$enhancement$layers
It$is$a$maximisation$of$the$
sum$of$the$user$QoS
⇢(u) =
8
><
>:
max
l=1,...,L
n
PSNRl D
(u)
NO,l
o
, for NO-RNC
max
l=1,...,L
n
PSNRl D
(u)
EW,l
o
, for EW-RNC
=
8
>>>><
>>>>:
LX
l=1
CX
c=1
n(l,c)
, for NO-RNC
LX
l=1
CX
c=1
N(l,c)
, for EW-RNC.
max
m1,...,mL
UX
u=1
PSNRu
Target cellTarget MG
eNB
Scenario$with$a$high$
heterogeneity.$There$are$80$UEs$
placed$along$the$radial$line$
representing$the$symmetry$axis$
of$one$sector$of$the$target$cell
Analytical Results
23
๏ A and B have 3 layers, bitrate of A is smaller than that of B
Finite field size q
TotalTBtransmissionsσ
2 22
24
26
2830
40
50
60
70
80
90
100 Dir. NO−SA, Stream A
Dir. NO−MA, Stream A
Heu. NO−SA and NO−MA, Stream A
Dir. EW−MA, Stream A
Heu. EW−MA, Stream A
Dir. NO−SA, Stream B
Dir. NO−MA, Stream B
Heu. NO−SA and NO−MA, Stream B
Dir. EW−MA, Stream B
Heu. EW−MA, Stream B
Footprint$of$opt.$and$heur.$
resource$allocation$solutions
The$performance$gap$
between$the$heuristic$and$the$
direct$solutions$is$negligible
Analytical Results
23
Distance (m)
MaximumPSNRρ(dB)
90 110 130 150 170 190 210 230 250 270 2900
5
15
25
35
45
55
ˆt1ˆt2ˆt3
MrT
Heu. NO−SA
Heu. NO−MA
Heu. EW−MA
= 60
= 60
= 43
Analytical Results
24
Stream$A$
q = 2
All$the$proposed$
strategies$meet$
the$coverage$
constraints
MrT
NOISA
EWIMA
NOIMA
Analytical Results
25
Stream$B$
q = 2
Distance (m)
MaximumPSNRρ(dB)
90 110 130 150 170 190 210 230 250 270 2900
5
15
25
35
45
55
ˆt1ˆt2ˆt3
MrT
Heu. NO−SA
Heu. NO−MA
Heu. EW−MA
= 73
= 88
= 88
All$the$proposed$
strategies$meet$
the$coverage$
constraints
MrT
NOISA
EWIMA
NOIMA
๏ The NO-MA and EW-MA strategies are equivalent both in
terms of resource footprint and service coverage
๏ The service coverage of NO-SA still diverges from that of
NO-MA and EW-MA.
Distance (m)
MaximumPSNRρ(dB)
90 110 130 150 170 190 210 230 250 270 2900
5
15
25
35
45
55
ˆt1ˆt2ˆt3
MrT
Heu. NO−SA
Heu. NO−MA
Heu. EW−MA
Stream A
Stream B
Streams$A$and$B$
q = 256
Analytical Results
26
4. Concluding Remarks and Future Extensions
Concluding Remarks
28
๏ Generic system model that can be easily adapted to practical
scenarios has been presented
๏ Derivation of the theoretical framework to assess user QoS
๏ Definition of efficient resource allocation frameworks, that
can jointly optimise both system parameters and the error
control strategy in use
๏ Development of efficient heuristic strategies that can derive
solutions in a finite number of steps.
Future Extensions
29
๏ LTE-A allows multiple contiguous BS to deliver (in a
synchronous fashion) the same services by means of the
same signals
๏ Users can combine multiple transmissions and does not need
of HO procedures.
eNB
eNB
eNB
eNB
M1/M2
MCE / MBMS-GW
SFN
3
2
1
B
UE3
UEMUE2
UE1
UE4
−400 −200 0 200 400 600
−200
−100
0
100
200
300
400
500
600
700
0
5
10
15
Distribution$of$the$maximum$
acceptable$user$MCSs
Single$Frequency$Network
Thank you for
your attention
London, 9th June 2014
R2D2: Network error control for
Rapid and Reliable Data Delivery
Project supported by EPSRC under the
First Grant scheme (EP/L006251/1)
Resource Allocation
Frameworks for Network-coded
Layered Multimedia Multicast
Services
UCL
Andrea Tassi*, Ioannis Chatzigeorgiou* and

Dejan Vukobratović+
+Dep. of Power, Electronics and
Communication Eng., Univ. of Novi Sad
dejanv@uns.ac.rs
* School of Computing and
Communications, Lancaster University 

{a.tassi, i.chatzigeorgiou}@lancaster.ac.uk

More Related Content

What's hot

Jacobi iterative method
Jacobi iterative methodJacobi iterative method
Jacobi iterative methodLuckshay Batra
 
Deformation 1
Deformation 1Deformation 1
Deformation 1anashalim
 
2012 mdsp pr06  hmm
2012 mdsp pr06  hmm2012 mdsp pr06  hmm
2012 mdsp pr06  hmmnozomuhamada
 
Using Principal Component Analysis to Remove Correlated Signal from Astronomi...
Using Principal Component Analysis to Remove Correlated Signal from Astronomi...Using Principal Component Analysis to Remove Correlated Signal from Astronomi...
Using Principal Component Analysis to Remove Correlated Signal from Astronomi...CvilleDataScience
 
Robust Control of Uncertain Switched Linear Systems based on Stochastic Reach...
Robust Control of Uncertain Switched Linear Systems based on Stochastic Reach...Robust Control of Uncertain Switched Linear Systems based on Stochastic Reach...
Robust Control of Uncertain Switched Linear Systems based on Stochastic Reach...Leo Asselborn
 
Markov Chain Monte Carlo Methods
Markov Chain Monte Carlo MethodsMarkov Chain Monte Carlo Methods
Markov Chain Monte Carlo MethodsFrancesco Casalegno
 
The what over the how (another way on android development with kotlin)
The what over the how (another way on android development with kotlin)The what over the how (another way on android development with kotlin)
The what over the how (another way on android development with kotlin)Jose Manuel Pereira Garcia
 
Sampling and Markov Chain Monte Carlo Techniques
Sampling and Markov Chain Monte Carlo TechniquesSampling and Markov Chain Monte Carlo Techniques
Sampling and Markov Chain Monte Carlo TechniquesTomasz Kusmierczyk
 
Markov chain monte_carlo_methods_for_machine_learning
Markov chain monte_carlo_methods_for_machine_learningMarkov chain monte_carlo_methods_for_machine_learning
Markov chain monte_carlo_methods_for_machine_learningAndres Mendez-Vazquez
 
MASSS_Presentation_20160209
MASSS_Presentation_20160209MASSS_Presentation_20160209
MASSS_Presentation_20160209Yimin Wu
 
Proof of Kraft-McMillan theorem
Proof of Kraft-McMillan theoremProof of Kraft-McMillan theorem
Proof of Kraft-McMillan theoremVu Hung Nguyen
 
Lecture7 channel capacity
Lecture7   channel capacityLecture7   channel capacity
Lecture7 channel capacityFrank Katta
 
Expert Lecture on GPS at UIET, CSJM, Kanpur
Expert Lecture on GPS at UIET, CSJM, KanpurExpert Lecture on GPS at UIET, CSJM, Kanpur
Expert Lecture on GPS at UIET, CSJM, KanpurSuddhasheel GHOSH, PhD
 
Ordinal Regression and Machine Learning: Applications, Methods, Metrics
Ordinal Regression and Machine Learning: Applications, Methods, MetricsOrdinal Regression and Machine Learning: Applications, Methods, Metrics
Ordinal Regression and Machine Learning: Applications, Methods, MetricsFrancesco Casalegno
 

What's hot (20)

Jacobi iterative method
Jacobi iterative methodJacobi iterative method
Jacobi iterative method
 
Deformation 1
Deformation 1Deformation 1
Deformation 1
 
5.n nmodels i
5.n nmodels i5.n nmodels i
5.n nmodels i
 
2012 mdsp pr06  hmm
2012 mdsp pr06  hmm2012 mdsp pr06  hmm
2012 mdsp pr06  hmm
 
QMC: Operator Splitting Workshop, Proximal Algorithms in Probability Spaces -...
QMC: Operator Splitting Workshop, Proximal Algorithms in Probability Spaces -...QMC: Operator Splitting Workshop, Proximal Algorithms in Probability Spaces -...
QMC: Operator Splitting Workshop, Proximal Algorithms in Probability Spaces -...
 
Codes and Isogenies
Codes and IsogeniesCodes and Isogenies
Codes and Isogenies
 
Using Principal Component Analysis to Remove Correlated Signal from Astronomi...
Using Principal Component Analysis to Remove Correlated Signal from Astronomi...Using Principal Component Analysis to Remove Correlated Signal from Astronomi...
Using Principal Component Analysis to Remove Correlated Signal from Astronomi...
 
Robust Control of Uncertain Switched Linear Systems based on Stochastic Reach...
Robust Control of Uncertain Switched Linear Systems based on Stochastic Reach...Robust Control of Uncertain Switched Linear Systems based on Stochastic Reach...
Robust Control of Uncertain Switched Linear Systems based on Stochastic Reach...
 
Markov Chain Monte Carlo Methods
Markov Chain Monte Carlo MethodsMarkov Chain Monte Carlo Methods
Markov Chain Monte Carlo Methods
 
Numerical Methods Solving Linear Equations
Numerical Methods Solving Linear EquationsNumerical Methods Solving Linear Equations
Numerical Methods Solving Linear Equations
 
The what over the how (another way on android development with kotlin)
The what over the how (another way on android development with kotlin)The what over the how (another way on android development with kotlin)
The what over the how (another way on android development with kotlin)
 
Sampling and Markov Chain Monte Carlo Techniques
Sampling and Markov Chain Monte Carlo TechniquesSampling and Markov Chain Monte Carlo Techniques
Sampling and Markov Chain Monte Carlo Techniques
 
Markov chain monte_carlo_methods_for_machine_learning
Markov chain monte_carlo_methods_for_machine_learningMarkov chain monte_carlo_methods_for_machine_learning
Markov chain monte_carlo_methods_for_machine_learning
 
Ijetr021233
Ijetr021233Ijetr021233
Ijetr021233
 
MASSS_Presentation_20160209
MASSS_Presentation_20160209MASSS_Presentation_20160209
MASSS_Presentation_20160209
 
Proof of Kraft-McMillan theorem
Proof of Kraft-McMillan theoremProof of Kraft-McMillan theorem
Proof of Kraft-McMillan theorem
 
Fluids_Final
Fluids_FinalFluids_Final
Fluids_Final
 
Lecture7 channel capacity
Lecture7   channel capacityLecture7   channel capacity
Lecture7 channel capacity
 
Expert Lecture on GPS at UIET, CSJM, Kanpur
Expert Lecture on GPS at UIET, CSJM, KanpurExpert Lecture on GPS at UIET, CSJM, Kanpur
Expert Lecture on GPS at UIET, CSJM, Kanpur
 
Ordinal Regression and Machine Learning: Applications, Methods, Metrics
Ordinal Regression and Machine Learning: Applications, Methods, MetricsOrdinal Regression and Machine Learning: Applications, Methods, Metrics
Ordinal Regression and Machine Learning: Applications, Methods, Metrics
 

Viewers also liked

Real-Coded Extended Compact Genetic Algorithm based on Mixtures of Models
Real-Coded Extended Compact Genetic Algorithm based on Mixtures of ModelsReal-Coded Extended Compact Genetic Algorithm based on Mixtures of Models
Real-Coded Extended Compact Genetic Algorithm based on Mixtures of ModelsPier Luca Lanzi
 
On Extended Compact Genetic Algorithm
On Extended Compact Genetic AlgorithmOn Extended Compact Genetic Algorithm
On Extended Compact Genetic Algorithmkknsastry
 
Parte 2 - Linux ed i sistemi embedded per le reti (di Massimiliano Toce)
Parte 2 - Linux ed i sistemi embedded per le reti (di Massimiliano Toce)Parte 2 - Linux ed i sistemi embedded per le reti (di Massimiliano Toce)
Parte 2 - Linux ed i sistemi embedded per le reti (di Massimiliano Toce)Andrea Tassi
 
Research techniques
Research techniquesResearch techniques
Research techniquesMia Buckley
 
Parte 1 - Linux ed i sistemi embedded per le reti (di Andrea Tassi)
Parte 1 - Linux ed i sistemi embedded per le reti (di Andrea Tassi)Parte 1 - Linux ed i sistemi embedded per le reti (di Andrea Tassi)
Parte 1 - Linux ed i sistemi embedded per le reti (di Andrea Tassi)Andrea Tassi
 
Optimized Network-coded Scalable Video Multicasting over eMBMS Networks
Optimized Network-coded Scalable Video Multicasting over eMBMS NetworksOptimized Network-coded Scalable Video Multicasting over eMBMS Networks
Optimized Network-coded Scalable Video Multicasting over eMBMS NetworksAndrea Tassi
 
On Optimization of Network-coded Scalable Multimedia Service Multicasting
On Optimization of Network-coded Scalable Multimedia Service MulticastingOn Optimization of Network-coded Scalable Multimedia Service Multicasting
On Optimization of Network-coded Scalable Multimedia Service MulticastingAndrea Tassi
 
Presentation of 'A Novel Convex Power Adaptation Strategy for Multicast Commu...
Presentation of 'A Novel Convex Power Adaptation Strategy for Multicast Commu...Presentation of 'A Novel Convex Power Adaptation Strategy for Multicast Commu...
Presentation of 'A Novel Convex Power Adaptation Strategy for Multicast Commu...Andrea Tassi
 
Silicon Cluster Optimization Using Extended Compact Genetic Algorithm
Silicon Cluster Optimization Using Extended Compact Genetic AlgorithmSilicon Cluster Optimization Using Extended Compact Genetic Algorithm
Silicon Cluster Optimization Using Extended Compact Genetic Algorithmkknsastry
 
Sleep Period Optimization Model For Layered Video Service Delivery Over eMBMS...
Sleep Period Optimization Model For Layered Video Service Delivery Over eMBMS...Sleep Period Optimization Model For Layered Video Service Delivery Over eMBMS...
Sleep Period Optimization Model For Layered Video Service Delivery Over eMBMS...Andrea Tassi
 
Parte 3 - Linux ed i sistemi embedded per le reti (di Riccardo Coppola)
Parte 3 - Linux ed i sistemi embedded per le reti (di Riccardo Coppola)Parte 3 - Linux ed i sistemi embedded per le reti (di Riccardo Coppola)
Parte 3 - Linux ed i sistemi embedded per le reti (di Riccardo Coppola)Andrea Tassi
 
R2D2 Project (EP/L006251/1) - Research Objectives & Outcomes
R2D2 Project (EP/L006251/1) - Research Objectives & OutcomesR2D2 Project (EP/L006251/1) - Research Objectives & Outcomes
R2D2 Project (EP/L006251/1) - Research Objectives & OutcomesAndrea Tassi
 
Sparse Random Network Coding for Reliable Multicast Services
Sparse Random Network Coding for Reliable Multicast ServicesSparse Random Network Coding for Reliable Multicast Services
Sparse Random Network Coding for Reliable Multicast ServicesAndrea Tassi
 
A short introduction to Network coding
A short introduction to Network codingA short introduction to Network coding
A short introduction to Network codingArash Pourdamghani
 
Presentation of 'Reliable Rate-Optimized Video Multicasting Services over LTE...
Presentation of 'Reliable Rate-Optimized Video Multicasting Services over LTE...Presentation of 'Reliable Rate-Optimized Video Multicasting Services over LTE...
Presentation of 'Reliable Rate-Optimized Video Multicasting Services over LTE...Andrea Tassi
 
Simple regenerating codes: Network Coding for Cloud Storage
Simple regenerating codes: Network Coding for Cloud StorageSimple regenerating codes: Network Coding for Cloud Storage
Simple regenerating codes: Network Coding for Cloud StorageKevin Tong
 

Viewers also liked (20)

PRINCE2 Practitioner
PRINCE2 PractitionerPRINCE2 Practitioner
PRINCE2 Practitioner
 
RLNC
RLNCRLNC
RLNC
 
Real-Coded Extended Compact Genetic Algorithm based on Mixtures of Models
Real-Coded Extended Compact Genetic Algorithm based on Mixtures of ModelsReal-Coded Extended Compact Genetic Algorithm based on Mixtures of Models
Real-Coded Extended Compact Genetic Algorithm based on Mixtures of Models
 
On Extended Compact Genetic Algorithm
On Extended Compact Genetic AlgorithmOn Extended Compact Genetic Algorithm
On Extended Compact Genetic Algorithm
 
Parte 2 - Linux ed i sistemi embedded per le reti (di Massimiliano Toce)
Parte 2 - Linux ed i sistemi embedded per le reti (di Massimiliano Toce)Parte 2 - Linux ed i sistemi embedded per le reti (di Massimiliano Toce)
Parte 2 - Linux ed i sistemi embedded per le reti (di Massimiliano Toce)
 
Research techniques
Research techniquesResearch techniques
Research techniques
 
Parte 1 - Linux ed i sistemi embedded per le reti (di Andrea Tassi)
Parte 1 - Linux ed i sistemi embedded per le reti (di Andrea Tassi)Parte 1 - Linux ed i sistemi embedded per le reti (di Andrea Tassi)
Parte 1 - Linux ed i sistemi embedded per le reti (di Andrea Tassi)
 
Optimized Network-coded Scalable Video Multicasting over eMBMS Networks
Optimized Network-coded Scalable Video Multicasting over eMBMS NetworksOptimized Network-coded Scalable Video Multicasting over eMBMS Networks
Optimized Network-coded Scalable Video Multicasting over eMBMS Networks
 
On Optimization of Network-coded Scalable Multimedia Service Multicasting
On Optimization of Network-coded Scalable Multimedia Service MulticastingOn Optimization of Network-coded Scalable Multimedia Service Multicasting
On Optimization of Network-coded Scalable Multimedia Service Multicasting
 
Presentation of 'A Novel Convex Power Adaptation Strategy for Multicast Commu...
Presentation of 'A Novel Convex Power Adaptation Strategy for Multicast Commu...Presentation of 'A Novel Convex Power Adaptation Strategy for Multicast Commu...
Presentation of 'A Novel Convex Power Adaptation Strategy for Multicast Commu...
 
Silicon Cluster Optimization Using Extended Compact Genetic Algorithm
Silicon Cluster Optimization Using Extended Compact Genetic AlgorithmSilicon Cluster Optimization Using Extended Compact Genetic Algorithm
Silicon Cluster Optimization Using Extended Compact Genetic Algorithm
 
Sleep Period Optimization Model For Layered Video Service Delivery Over eMBMS...
Sleep Period Optimization Model For Layered Video Service Delivery Over eMBMS...Sleep Period Optimization Model For Layered Video Service Delivery Over eMBMS...
Sleep Period Optimization Model For Layered Video Service Delivery Over eMBMS...
 
Lecture
LectureLecture
Lecture
 
Parte 3 - Linux ed i sistemi embedded per le reti (di Riccardo Coppola)
Parte 3 - Linux ed i sistemi embedded per le reti (di Riccardo Coppola)Parte 3 - Linux ed i sistemi embedded per le reti (di Riccardo Coppola)
Parte 3 - Linux ed i sistemi embedded per le reti (di Riccardo Coppola)
 
R2D2 Project (EP/L006251/1) - Research Objectives & Outcomes
R2D2 Project (EP/L006251/1) - Research Objectives & OutcomesR2D2 Project (EP/L006251/1) - Research Objectives & Outcomes
R2D2 Project (EP/L006251/1) - Research Objectives & Outcomes
 
Sparse Random Network Coding for Reliable Multicast Services
Sparse Random Network Coding for Reliable Multicast ServicesSparse Random Network Coding for Reliable Multicast Services
Sparse Random Network Coding for Reliable Multicast Services
 
A short introduction to Network coding
A short introduction to Network codingA short introduction to Network coding
A short introduction to Network coding
 
Presentation of 'Reliable Rate-Optimized Video Multicasting Services over LTE...
Presentation of 'Reliable Rate-Optimized Video Multicasting Services over LTE...Presentation of 'Reliable Rate-Optimized Video Multicasting Services over LTE...
Presentation of 'Reliable Rate-Optimized Video Multicasting Services over LTE...
 
Introduction to Network Coding
Introduction to Network CodingIntroduction to Network Coding
Introduction to Network Coding
 
Simple regenerating codes: Network Coding for Cloud Storage
Simple regenerating codes: Network Coding for Cloud StorageSimple regenerating codes: Network Coding for Cloud Storage
Simple regenerating codes: Network Coding for Cloud Storage
 

Similar to Talk on Resource Allocation Strategies for Layered Multimedia Multicast Services

MVPA with SpaceNet: sparse structured priors
MVPA with SpaceNet: sparse structured priorsMVPA with SpaceNet: sparse structured priors
MVPA with SpaceNet: sparse structured priorsElvis DOHMATOB
 
New data structures and algorithms for \\post-processing large data sets and ...
New data structures and algorithms for \\post-processing large data sets and ...New data structures and algorithms for \\post-processing large data sets and ...
New data structures and algorithms for \\post-processing large data sets and ...Alexander Litvinenko
 
SPU Optimizations - Part 2
SPU Optimizations - Part 2SPU Optimizations - Part 2
SPU Optimizations - Part 2Naughty Dog
 
Joint blind calibration and time-delay estimation for multiband ranging
Joint blind calibration and time-delay estimation for multiband rangingJoint blind calibration and time-delay estimation for multiband ranging
Joint blind calibration and time-delay estimation for multiband rangingTarik Kazaz
 
Tucker tensor analysis of Matern functions in spatial statistics
Tucker tensor analysis of Matern functions in spatial statistics Tucker tensor analysis of Matern functions in spatial statistics
Tucker tensor analysis of Matern functions in spatial statistics Alexander Litvinenko
 
machinelearning project
machinelearning projectmachinelearning project
machinelearning projectLianli Liu
 
Response Surface in Tensor Train format for Uncertainty Quantification
Response Surface in Tensor Train format for Uncertainty QuantificationResponse Surface in Tensor Train format for Uncertainty Quantification
Response Surface in Tensor Train format for Uncertainty QuantificationAlexander Litvinenko
 
Linear models for classification
Linear models for classificationLinear models for classification
Linear models for classificationSung Yub Kim
 
ON RUN-LENGTH-CONSTRAINED BINARY SEQUENCES
ON RUN-LENGTH-CONSTRAINED BINARY SEQUENCESON RUN-LENGTH-CONSTRAINED BINARY SEQUENCES
ON RUN-LENGTH-CONSTRAINED BINARY SEQUENCESijitjournal
 
Lecture 3 image sampling and quantization
Lecture 3 image sampling and quantizationLecture 3 image sampling and quantization
Lecture 3 image sampling and quantizationVARUN KUMAR
 
Digital Signal Processing[ECEG-3171]-Ch1_L03
Digital Signal Processing[ECEG-3171]-Ch1_L03Digital Signal Processing[ECEG-3171]-Ch1_L03
Digital Signal Processing[ECEG-3171]-Ch1_L03Rediet Moges
 
2014 vulnerability assesment of spatial network - models and solutions
2014   vulnerability assesment of spatial network - models and solutions2014   vulnerability assesment of spatial network - models and solutions
2014 vulnerability assesment of spatial network - models and solutionsFrancisco Pérez
 
20070823
2007082320070823
20070823neostar
 
Optimization Techniques
Optimization TechniquesOptimization Techniques
Optimization TechniquesAjay Bidyarthy
 
Digital Signal Processing
Digital Signal ProcessingDigital Signal Processing
Digital Signal Processingaj ahmed
 

Similar to Talk on Resource Allocation Strategies for Layered Multimedia Multicast Services (20)

MVPA with SpaceNet: sparse structured priors
MVPA with SpaceNet: sparse structured priorsMVPA with SpaceNet: sparse structured priors
MVPA with SpaceNet: sparse structured priors
 
New data structures and algorithms for \\post-processing large data sets and ...
New data structures and algorithms for \\post-processing large data sets and ...New data structures and algorithms for \\post-processing large data sets and ...
New data structures and algorithms for \\post-processing large data sets and ...
 
SPU Optimizations - Part 2
SPU Optimizations - Part 2SPU Optimizations - Part 2
SPU Optimizations - Part 2
 
Joint blind calibration and time-delay estimation for multiband ranging
Joint blind calibration and time-delay estimation for multiband rangingJoint blind calibration and time-delay estimation for multiband ranging
Joint blind calibration and time-delay estimation for multiband ranging
 
Program on Quasi-Monte Carlo and High-Dimensional Sampling Methods for Applie...
Program on Quasi-Monte Carlo and High-Dimensional Sampling Methods for Applie...Program on Quasi-Monte Carlo and High-Dimensional Sampling Methods for Applie...
Program on Quasi-Monte Carlo and High-Dimensional Sampling Methods for Applie...
 
Tucker tensor analysis of Matern functions in spatial statistics
Tucker tensor analysis of Matern functions in spatial statistics Tucker tensor analysis of Matern functions in spatial statistics
Tucker tensor analysis of Matern functions in spatial statistics
 
machinelearning project
machinelearning projectmachinelearning project
machinelearning project
 
Response Surface in Tensor Train format for Uncertainty Quantification
Response Surface in Tensor Train format for Uncertainty QuantificationResponse Surface in Tensor Train format for Uncertainty Quantification
Response Surface in Tensor Train format for Uncertainty Quantification
 
Linear models for classification
Linear models for classificationLinear models for classification
Linear models for classification
 
Unit 3
Unit 3Unit 3
Unit 3
 
Unit 3
Unit 3Unit 3
Unit 3
 
ON RUN-LENGTH-CONSTRAINED BINARY SEQUENCES
ON RUN-LENGTH-CONSTRAINED BINARY SEQUENCESON RUN-LENGTH-CONSTRAINED BINARY SEQUENCES
ON RUN-LENGTH-CONSTRAINED BINARY SEQUENCES
 
Lecture 3 image sampling and quantization
Lecture 3 image sampling and quantizationLecture 3 image sampling and quantization
Lecture 3 image sampling and quantization
 
Digital Signal Processing[ECEG-3171]-Ch1_L03
Digital Signal Processing[ECEG-3171]-Ch1_L03Digital Signal Processing[ECEG-3171]-Ch1_L03
Digital Signal Processing[ECEG-3171]-Ch1_L03
 
2014 vulnerability assesment of spatial network - models and solutions
2014   vulnerability assesment of spatial network - models and solutions2014   vulnerability assesment of spatial network - models and solutions
2014 vulnerability assesment of spatial network - models and solutions
 
residue
residueresidue
residue
 
20070823
2007082320070823
20070823
 
Optimization Techniques
Optimization TechniquesOptimization Techniques
Optimization Techniques
 
Digital Signal Processing
Digital Signal ProcessingDigital Signal Processing
Digital Signal Processing
 
Subquad multi ff
Subquad multi ffSubquad multi ff
Subquad multi ff
 

Recently uploaded

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 

Recently uploaded (20)

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 

Talk on Resource Allocation Strategies for Layered Multimedia Multicast Services

  • 1. London, 9th June 2014 R2D2: Network error control for Rapid and Reliable Data Delivery Project supported by EPSRC under the First Grant scheme (EP/L006251/1) Resource Allocation Frameworks for Network-coded Layered Multimedia Multicast Services UCL Andrea Tassi*, Ioannis Chatzigeorgiou* and
 Dejan Vukobratović+ +Dep. of Power, Electronics and Communication Eng., Univ. of Novi Sad dejanv@uns.ac.rs * School of Computing and Communications, Lancaster University 
 {a.tassi, i.chatzigeorgiou}@lancaster.ac.uk
  • 2. Starting Point and Goals ๏ Delivery of multimedia broadcast/multicast services over 4G networks is a challenging task. This has propelled research into delivery schemes. ๏ Multi-rate transmission strategies have been proposed as a means of delivering layered services to users experiencing different downlink channel conditions. ๏ Layered service consists of a basic layer and multiple enhancement layers. Goals ๏ Error control - Ensure that a predetermined fraction of users achieve a certain service level with at least a given probability ๏ Resource optimisation - Minimise the total amount of radio resources needed to deliver a layered service. 2
  • 3. Index 1. System Parameters and Performance Analysis 2. Multi-Channel Resource Allocation Models and Heuristic Strategies 3. H.264/SVC Service Delivery over LTE-A eMBMS Networks 4. Analytical Results 5. Concluding Remarks and Future Extensions 3
  • 4. 1. System Parameters and Performance Analysis
  • 5. System Model ๏ One-hop wireless communication system composed of one source node and U users 5 UE 1 UE 3 UE 2 UE 4 UE U Source Node ˆB3 ˆB2 ˆB1 subch. 1 subch. 2 subch. 3 ๏ Each PtM layered service is delivered through C orthogonal broadcast erasure subchannels The$same$MCS Capacity$of$subch.$3$ (no.$of$packets) ๏ Each subchannel delivers streams of (en)coded packets (according to the RLNC principle).
  • 6. 6 k1 k2 k3 x1 x2 xK. . .. . . ๏ is a layered source message of K source packets, classified into L service layers (packets are arranged 
 in order of decreasing importance) x = {x1, . . . , xK} Non-Overlapping Layered RNC
  • 7. 6 ๏ The source node will linearly combine the data packets composing the l-th layer and will generate a stream of coded packets , where k1 k2 k3 x1 x2 xK. . .. . . ๏ is a layered source message of K source packets, classified into L service layers (packets are arranged 
 in order of decreasing importance) x = {x1, . . . , xK} Non-Overlapping Layered RNC kl xl = {xi}kl i=1 nl kl y = {yj}nl j=1 yj = klX i=1 gj,i xi Random$coef<icient$ belonging$to$a$f.f.$Fq
  • 8. Non-Overlapping Layered RNC ๏ User u recovers layer l if it will collect k_l linearly independent coded packets. The prob. of this event is 7 kl Pl(nl,u) = nl,u X r=kl ✓ nl,u r ◆ pnl,u r (1 p)r h(r) = nl,u X r=kl ✓ nl,u r ◆ pnl,u r (1 p)r kl 1Y i=0 h 1 1 qr i i | {z } h(r) Prob.$of$receiving$r$out$of$nl,u$coded$symbols Prob.$of$decoding$
 layer$l ๏ The probability that user u recover the first l service layers is DNO,l(n1,u, . . . , nL,u) = DNO,l(nu) = lY i=1 Pi(ni,u) PEP
  • 9. 8 ๏ The source node (i) linearly combines data packets belonging to the same window, (ii) repeats this process for all windows, and (iii) broadcasts each stream of coded packets over one or more subchannels Expanding Window Layered RNC ๏ We define the l-th window as the set of source packets belonging to the first l service layers. Namely, 
 where Xl Xl ={xj}Kl j=1 Kl = Pl i=1 ki k1 k2 k3 K3 K2 K1 x1 x2 xK. . .. . .
  • 10. Expanding Window Layered RNC 9 ๏ The probability of user u recovering the first l layers (namely, the l-th window) can be written as DEW,l L,u) = =DEW,l(Nu) = N1,u X r1=0 · · · Nl 1,u X rl 1=0 Nl,u X rl=rmin,l ✓ N1,u r1 ◆ · · · ✓ Nl,u rl ◆ p Pl i=1(Ni,u ri) (1 p) Pl i=1 ri gl(r) Prob.$of$receiving $out$ of$ coded$symbols Prob.$of$decoding$
 window$l rl DEW,l(Nu) DEW,l(N1,u, . . . , NL,u) = =DEW,l(Nu) = N1,u X r1=0 · · · Nl 1,u X rl 1=0 Nl,u X rl=rmin,l ✓ N1,u r1 ◆ · · · ✓ Nl,u rl ◆ p Pl i=1(Ni,u ri) ( r = {r1, . . . , rl}
  • 11. Expanding Window Layered RNC ๏ Sums allow us to consider all the possibilities of 9 ๏ The probability of user u recovering the first l layers (namely, the l-th window) can be written as DEW,l L,u) = =DEW,l(Nu) = N1,u X r1=0 · · · Nl 1,u X rl 1=0 Nl,u X rl=rmin,l ✓ N1,u r1 ◆ · · · ✓ Nl,u rl ◆ p Pl i=1(Ni,u ri) (1 p) Pl i=1 ri gl(r) Prob.$of$receiving $out$ of$ coded$symbols Prob.$of$decoding$
 window$l rl DEW,l(Nu) DEW,l(N1,u, . . . , NL,u) = =DEW,l(Nu) = N1,u X r1=0 · · · Nl 1,u X rl 1=0 Nl,u X rl=rmin,l ✓ N1,u r1 ◆ · · · ✓ Nl,u rl ◆ p Pl i=1(Ni,u ri) ( r = {r1, . . . , rl}
  • 12. 2. Multi-Channel Resource Allocation Models and Heuristic Strategies
  • 14. Allocation Patterns 11 ˆB3 ˆB2 ˆB1 subchannel 1 subchannel 2 subchannel 3 coded packets from x1 coded packets from x2 coded packets from x3 ˆB3 ˆB2 ˆB1 subchannel 1 subchannel 2 subchannel 3 Separated$ Allocation$ Pattern
  • 15. Mixed$ Allocation$ Pattern ˆB3 ˆB2 ˆB1 coded packets from x3 or X3 coded packets from x2 or X2 coded packets from x1 or X1 subchannel 1 subchannel 2 subchannel 3 Allocation Patterns 11 ˆB3 ˆB2 ˆB1 subchannel 1 subchannel 2 subchannel 3
  • 16. NO-SA Model ๏ Consider the indication variable
 It is 1, if u can recover the first l layers with a probability value 
 , otherwise it is 0. 12 u,l = I ⇣ DNO,l(nu) ˆD ⌘ ˆD
  • 17. NO-SA Model ๏ Consider the indication variable
 It is 1, if u can recover the first l layers with a probability value 
 , otherwise it is 0. ๏ The RA problem for the NO-SA case is 12 u,l = I ⇣ DNO,l(nu) ˆD ⌘ ˆD (NO-SA) min m1,...,mC n(1,c),...,n(L,c) LX l=1 CX c=1 n(l,c) (1) subject to UX u=1 u,l U ˆtl l = 1, . . . , L (2) mc 1 < mc c = 2, . . . , L (3) 0  LX l=1 n(l,c)  ˆBc c = 1, . . . , C (4) n(l,c) = 0 for l 6= c (5) No.$of$packets$of$layer$l$ delivered$over$c Minimization$of$ resource$footprint
  • 18. NO-SA Model ๏ Consider the indication variable
 It is 1, if u can recover the first l layers with a probability value 
 , otherwise it is 0. ๏ The RA problem for the NO-SA case is 12 u,l = I ⇣ DNO,l(nu) ˆD ⌘ ˆD (NO-SA) min m1,...,mC n(1,c),...,n(L,c) LX l=1 CX c=1 n(l,c) (1) subject to UX u=1 u,l U ˆtl l = 1, . . . , L (2) mc 1 < mc c = 2, . . . , L (3) 0  LX l=1 n(l,c)  ˆBc c = 1, . . . , C (4) n(l,c) = 0 for l 6= c (5) Each$service$level$shall$be$ achieved$by$a$predetermined$ fraction$of$users No.$of$users Target$fraction$of$users
  • 19. NO-SA Model ๏ Consider the indication variable
 It is 1, if u can recover the first l layers with a probability value 
 , otherwise it is 0. ๏ The RA problem for the NO-SA case is 12 u,l = I ⇣ DNO,l(nu) ˆD ⌘ ˆD (NO-SA) min m1,...,mC n(1,c),...,n(L,c) LX l=1 CX c=1 n(l,c) (1) subject to UX u=1 u,l U ˆtl l = 1, . . . , L (2) mc 1 < mc c = 2, . . . , L (3) 0  LX l=1 n(l,c)  ˆBc c = 1, . . . , C (4) n(l,c) = 0 for l 6= c (5) DynamicI$and$ systemIrelated$ constraints Because$of$the$SA$ pattern
  • 20. NO-SA Heuristic ๏ The NO-SA is an hard integer optimisation problem because of the coupling constraints among variables ๏ We propose a two-step heuristic strategy i. MCSs optimisation ( ) ii. No. of coded packet per-subchannel optimization
 ( ) ๏ The heuristic can provide a solution after a finite number of steps ๏ It can be used in real time contexts. 13 m1, . . . , mC n(1,c) , . . . , n(L,c)
  • 21. NO-MA Model ๏ The NO-SA problem can be easily extended to the MA pattern by removing the last constraint 14 (NO-SA) min m1,...,mC n(1,c),...,n(L,c) LX l=1 CX c=1 n(l,c) (1) subject to UX u=1 u,l U ˆtl l = 1, . . . , L (2) mc 1 < mc c = 2, . . . , L (3) 0  LX l=1 n(l,c)  ˆBc c = 1, . . . , C (4) n(l,c) = 0 for l 6= c (5)
  • 22. NO-MA Model ๏ The NO-SA problem can be easily extended to the MA pattern by removing the last constraint 14 (NO-SA) min m1,...,mC n(1,c),...,n(L,c) LX l=1 CX c=1 n(l,c) (1) subject to UX u=1 u,l U ˆtl l = 1, . . . , L (2) mc 1 < mc c = 2, . . . , L (3) 0  LX l=1 n(l,c)  ˆBc c = 1, . . . , C (4) n(l,c) = 0 for l 6= c (5) (NO-MA)
  • 23. NO-MA Model ๏ The NO-SA problem can be easily extended to the MA pattern by removing the last constraint 14 (NO-SA) min m1,...,mC n(1,c),...,n(L,c) LX l=1 CX c=1 n(l,c) (1) subject to UX u=1 u,l U ˆtl l = 1, . . . , L (2) mc 1 < mc c = 2, . . . , L (3) 0  LX l=1 n(l,c)  ˆBc c = 1, . . . , C (4) n(l,c) = 0 for l 6= c (5) (NO-MA) ๏ The NO-MA is still an hard integer optimisation problem. We adapted the two-step heuristic strategy.
  • 24. EW-MA Model ๏ We define the indicator variable
 
 
 
 
 User u will recover the first l service layers (at least) with probability if any of the windows l, l+1, …, L are recovered (at least) with probability 15 µu,l = I L_ t=l n DEW,t(Nu) ˆD o ! ˆD ˆD ๏ Consider the EW delivery mode k1 k2 k3 K3 K2 K1 x1 x2 xK. . .. . .
  • 25. EW-MA Model ๏ The RA problem for the EW-SA case is 16 (EW-MA) min m1,...,mC N(1,c),...,N(L,c) LX l=1 CX c=1 N(l,c) (1) subject to UX u=1 µu,l U ˆtl l = 1, . . . , L (2) mc 1 < mc c = 2, . . . , L (3) 0  LX l=1 N(l,c)  ˆBc c = 1, . . . , C (4) No.$of$packets$of$ window$l$delivered$ over$c ๏ It is still an hard integer optimisation problem but the proposed heuristic strategy can be still applied.
  • 26. 3. H.264/SVC Service Delivery over eMBMS Networks
  • 27. Layered Video Streams Video streams formed by multiple video layers: ๏ the base layer - provides basic reconstruction quality ๏ multiple enhancement layers - which gradually improves the quality of the base layer 18 Considering a H.264/SVC video stream base e1 e2 GoP ๏ it is a GoP stream ๏ a GoP has fixed number of frames ๏ it is characterised by a time duration (to be watched) ๏ it has a layered nature
  • 28. H.264/SVC and NC ๏ The decoding process of a H.264/SVC service is performed on a GoP-basis 19 k1 k2 k3 K3 K2 K1 x1 x2 xK. . .. . . ๏ Hence, the can be defined as The$basic$layer$ of$a$GoP 1st$enhancement$ layer$of$a$GoP 2nd$enhancement$ layer$of$a$GoP kl = ⌃Rl dGoP H ⌥ kl Source/Coded$packet$ bit$size Time$duration$of$a$ GoP Bitrate$of$the$video$ layer
  • 29. LTE-A System Model radio frame time frequency TB left for other services eMBMS-capable subframes TB of subchannel 1 TB of subchannel 2 TB of subchannel 3 ๏ PtM communications managed by the eMBMS framework ๏ We refer to a SC-eMBMS system where a eNB delivers a 
 H.264/SVC video service formed by L different layers to the target MG ๏ The first and the L-th layers represents the basic and L-1 
 H.264/SVC enhancement layers, respectively 20 TB$=$Coded$Packets
  • 31. Analytical Results 22 ๏ We compared the proposed strategies with a classic Multi- rate Transmission strategy ๏ System performance was evaluated in terms of Resource$footprint QoS PSNR$after$recovery$of$the$basic$and$ the$<irst$l$enhancement$layers It$is$a$maximisation$of$the$ sum$of$the$user$QoS ⇢(u) = 8 >< >: max l=1,...,L n PSNRl D (u) NO,l o , for NO-RNC max l=1,...,L n PSNRl D (u) EW,l o , for EW-RNC = 8 >>>>< >>>>: LX l=1 CX c=1 n(l,c) , for NO-RNC LX l=1 CX c=1 N(l,c) , for EW-RNC. max m1,...,mL UX u=1 PSNRu
  • 33. ๏ A and B have 3 layers, bitrate of A is smaller than that of B Finite field size q TotalTBtransmissionsσ 2 22 24 26 2830 40 50 60 70 80 90 100 Dir. NO−SA, Stream A Dir. NO−MA, Stream A Heu. NO−SA and NO−MA, Stream A Dir. EW−MA, Stream A Heu. EW−MA, Stream A Dir. NO−SA, Stream B Dir. NO−MA, Stream B Heu. NO−SA and NO−MA, Stream B Dir. EW−MA, Stream B Heu. EW−MA, Stream B Footprint$of$opt.$and$heur.$ resource$allocation$solutions The$performance$gap$ between$the$heuristic$and$the$ direct$solutions$is$negligible Analytical Results 23
  • 34. Distance (m) MaximumPSNRρ(dB) 90 110 130 150 170 190 210 230 250 270 2900 5 15 25 35 45 55 ˆt1ˆt2ˆt3 MrT Heu. NO−SA Heu. NO−MA Heu. EW−MA = 60 = 60 = 43 Analytical Results 24 Stream$A$ q = 2 All$the$proposed$ strategies$meet$ the$coverage$ constraints MrT NOISA EWIMA NOIMA
  • 35. Analytical Results 25 Stream$B$ q = 2 Distance (m) MaximumPSNRρ(dB) 90 110 130 150 170 190 210 230 250 270 2900 5 15 25 35 45 55 ˆt1ˆt2ˆt3 MrT Heu. NO−SA Heu. NO−MA Heu. EW−MA = 73 = 88 = 88 All$the$proposed$ strategies$meet$ the$coverage$ constraints MrT NOISA EWIMA NOIMA
  • 36. ๏ The NO-MA and EW-MA strategies are equivalent both in terms of resource footprint and service coverage ๏ The service coverage of NO-SA still diverges from that of NO-MA and EW-MA. Distance (m) MaximumPSNRρ(dB) 90 110 130 150 170 190 210 230 250 270 2900 5 15 25 35 45 55 ˆt1ˆt2ˆt3 MrT Heu. NO−SA Heu. NO−MA Heu. EW−MA Stream A Stream B Streams$A$and$B$ q = 256 Analytical Results 26
  • 37. 4. Concluding Remarks and Future Extensions
  • 38. Concluding Remarks 28 ๏ Generic system model that can be easily adapted to practical scenarios has been presented ๏ Derivation of the theoretical framework to assess user QoS ๏ Definition of efficient resource allocation frameworks, that can jointly optimise both system parameters and the error control strategy in use ๏ Development of efficient heuristic strategies that can derive solutions in a finite number of steps.
  • 39. Future Extensions 29 ๏ LTE-A allows multiple contiguous BS to deliver (in a synchronous fashion) the same services by means of the same signals ๏ Users can combine multiple transmissions and does not need of HO procedures. eNB eNB eNB eNB M1/M2 MCE / MBMS-GW SFN 3 2 1 B UE3 UEMUE2 UE1 UE4 −400 −200 0 200 400 600 −200 −100 0 100 200 300 400 500 600 700 0 5 10 15 Distribution$of$the$maximum$ acceptable$user$MCSs Single$Frequency$Network
  • 40. Thank you for your attention
  • 41. London, 9th June 2014 R2D2: Network error control for Rapid and Reliable Data Delivery Project supported by EPSRC under the First Grant scheme (EP/L006251/1) Resource Allocation Frameworks for Network-coded Layered Multimedia Multicast Services UCL Andrea Tassi*, Ioannis Chatzigeorgiou* and
 Dejan Vukobratović+ +Dep. of Power, Electronics and Communication Eng., Univ. of Novi Sad dejanv@uns.ac.rs * School of Computing and Communications, Lancaster University 
 {a.tassi, i.chatzigeorgiou}@lancaster.ac.uk