20 03 TASTE OF RESEARCH SUMMER SCHOLARSHIPS Author: Wei Zhang Supervisor: Tim Moors Efficient Voice Over Wireless Network Abstract The objective of this.

Slides:



Advertisements
Similar presentations
IEEE INFOCOM 2004 MultiNet: Connecting to Multiple IEEE Networks Using a Single Wireless Card.
Advertisements

20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
6LoWPAN Extending IP to Low-Power WPAN 1 By: Shadi Janansefat CS441 Dr. Kemal Akkaya Fall 2011.
Umut Girit  One of the core members of the Internet Protocol Suite, the set of network protocols used for the Internet. With UDP, computer.
Business Data Communications Packetizing and Framing.
Chapter 7: Transport Layer
Multiple Access Methods. When nodes or stations are connected and use a common link (cable or air), called a multipoint or broadcast link, we need a.
Answers of Exercise 7 1. Explain what are the connection-oriented communication and the connectionless communication. Give some examples for each of the.
What's inside a router? We have yet to consider the switching function of a router - the actual transfer of datagrams from a router's incoming links to.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #2 Header Compression.
1 I.S Introduction to Telecommunication in Business Chapter 6 Network Hardware Components Dr. Jan Clark FALL, 2002.
1 Solutions to Performance Problems in VOIP over Wireless LAN Wei Wang, Soung C. Liew Presented By Syed Zaidi.
© 2006 Cisco Systems, Inc. All rights reserved. 2.3: Encapsulating Voice Packets for Transport.
802.11n MAC layer simulation Submitted by: Niv Tokman Aya Mire Oren Gur-Arie.
Wireless Audio Conferencing System (WACS) Mehmet Ali Abbasoğlu Furkan Çimen Aylin Deveci Kübra Gümüş.
In-Band Flow Establishment for End-to-End QoS in RDRN Saravanan Radhakrishnan.
Ethernet: CSMA/CD (Carrier Sense Multiple Access with Collision Detection) Access method: method of controlling how network nodes access communications.
1 Internet Networking Spring 2006 Tutorial 14 Header Compression.
K. Salah 1 Chapter 28 VoIP or IP Telephony. K. Salah 2 VoIP Architecture and Protocols Uses one of the two multimedia protocols SIP (Session Initiation.
Chapter 2 Network Models.
Gursharan Singh Tatla Transport Layer 16-May
Switching Techniques Student: Blidaru Catalina Elena.
Process-to-Process Delivery:
ISO Layer Model Lecture 9 October 16, The Need for Protocols Multiple hardware platforms need to have the ability to communicate. Writing communications.
NetSim ZigBee Simulation Code Walkthrough in 10 steps
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Network Services Networking for Home and Small Businesses – Chapter.
LWIP TCP/IP Stack 김백규.
NUS.SOC.CS2105 Ooi Wei Tsang Application Transport Network Link Physical you are here.
Internet Addresses. Universal Identifiers Universal Communication Service - Communication system which allows any host to communicate with any other host.
LWIP TCP/IP Stack 김백규.
Chapter 5 Transport layer With special emphasis on Transmission Control Protocol (TCP)
CMPT 471 Networking II Address Resolution IPv4 ARP RARP 1© Janice Regan, 2012.
10/8/2015CST Computer Networks1 IP Routing CST 415.
Voice Capacity analysis over Introducing VoIP and WLans IEEE based Wireless Local Area Networks (WLANs) are becoming popular While WLANs.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets, 5e By Douglas E. Comer Lecture PowerPoints.
1 Data Link Layer Lecture 20 Imran Ahmed University of Management & Technology.
Switching breaks up large collision domains into smaller ones Collision domain is a network segment with two or more devices sharing the same Introduction.
UDP and CBR Internet Engineering. 1 Contents Delivery Encode –Music or movie is converted to data (compress) CBR (Constant Bit Rate) –Constant bit assignment.
ﺑﺴﻢﺍﷲﺍﻠﺭﺣﻣﻥﺍﻠﺭﺣﻳﻡ. Group Members Nadia Malik01 Malik Fawad03.
Cyclic Redundancy Check (CRC).  An error detection mechanism in which a special number is appended to a block of data in order to detect any changes.
Vertical Optimization Of Data Transmission For Mobile Wireless Terminals MICHAEL METHFESSEL, KAI F. DOMBROWSKI, PETER LANGENDORFER, HORST FRANKENFELDT,
Multiple Access.
LOG Objectives  Describe some of the VoIP implementation challenges such as Delay/Latency, Jitter, Echo, and Packet Loss  Describe the voice encoding.
Presented by Rebecca Meinhold But How Does the Internet Work?
Prepared by Engr.Jawad Ali BSc(Hons)Computer Systems Engineering University of Engineering and Technology Peshawar.
CSE5803 Advanced Internet Protocols and Applications (14) Introduction Developed in recent years, for low cost phone calls (long distance in particular).
Unit III Bandwidth Utilization: Multiplexing and Spectrum Spreading In practical life the bandwidth available of links is limited. The proper utilization.
Mapping IP Addresses to Hardware Addresses Chapter 5.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 CH. 8: SWITCHING & DATAGRAM NETWORKS 7.1.
TCP/IP. The idea behind TCP/IP is exactly the same we explained about the OSI reference model: when transmitting data, programs talk to the Application.
Queuing Delay 1. Access Delay Some protocols require a sender to “gain access” to the channel –The channel is shared and some time is used trying to determine.
Rate-Adaptive MAC Protocol in High-Rate Personal Area Networks Byung-Seo Kim, Yuguang Fang and Tan F. Wong Department of Electrical and Computer Engineering.
UDP: User Datagram Protocol Chapter 12. Introduction Multiple application programs can execute simultaneously on a given computer and can send and receive.
CSMA/CD Simulation Carrier Sense Multiple Access (CSMA), although more efficient than ALOHA or slotted ALOHA, still has one glaring inefficiency: When.
Switching By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
The OSI Model. History of OSI Model ISO began developing the OSI model in It is widely accepted as a model for understanding network communication.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 OSI data link layer CCNA Exploration Semester 1 Chapter 7.
Data Link Layer.
LWIP TCP/IP Stack 김백규.
Networking for Home and Small Businesses – Chapter 6
Switching Techniques In large networks there might be multiple paths linking sender and receiver. Information may be switched as it travels through various.
Networking for Home and Small Businesses – Chapter 6
Chapter 11 Data Link Control (DLC)
Multiple Access Methods
Process-to-Process Delivery:
Net 323 D: Networks Protocols
Networking for Home and Small Businesses – Chapter 6
Investigation of Voice Traffic in Wi-Fi Environment
NET 323D: Networks Protocols
Data Link Layer. Position of the data-link layer.
Presentation transcript:

20 03 TASTE OF RESEARCH SUMMER SCHOLARSHIPS Author: Wei Zhang Supervisor: Tim Moors Efficient Voice Over Wireless Network Abstract The objective of this project is to make efficient voice transmission over wireless network. To achieve this goal, we changed the data unit that is sent down the protocol stack at the source node from packets to “trickles”, in order to reduce transmission overheads, minimise packetisation and synchronisation delays. Background VoIP application samples audio signals, encodes them into audio frames, then transmits them over a network. However, each packet has a certain transmission overhead and often it is much bigger than an audio frame even it is carrying multiple audio samples. For example, in WLAN, an 33B audio frame taking 24 us requires at least 145 us of overheads. Also audio compression occurs asynchronously with respect to network transmission opportunities, so that an audio packet once created may have to wait some time until there is a network transmission opportunity. This also leads to another source delay. Therefore, to make efficient voice over wireless network, we have to try to reduce transmission overheads and minimise source delays. What’s new ? - “TRICKLES” Trickles are a new source data unit that minimises source packetisation and synchronisation delays. In terms of data units, the idea of a trickle is to append new application content to the end of existing content that is still awaiting transmission, and update the headers as it goes down the protocol stack, so that it shares the same overheads. If we have frequent transmission opportunities, then short packets will be sent. However, if the transmission opportunities are less frequent, more application content will accumulate, and be aggregated for transmission in one packet when the opportunity comes. How good is it? Performance testing was carried out on both the traditional and Trickles implementation using the voice application “Linphone”. The result is shown in the following table: The end to end delay is the amount of time that passes between when new content is sent by the source application and when it is received by the target application. What is lost? Appending new content to the end of old content requires additional memory access, since the application will naturally do this itself. Conclusion “Trickles” has been successfully implemented in Linux kernel to reduce transmission overheads, minimise packetisation and synchronisation delays, and hence improves efficiency of voice transmission over wireless networks. In the future, we will be keep refining our implementation of this idea to improve its performance. UNSW UNSW Audio Frame RTP header UDP header IP header Link layer header How we did it To implement Trickles, we modified the Linux kernel. We introduced new socket options which provides communication between user application and kernel. We added a new field into the sock structure that keeps track of the last packet that has been put into the device transmission queue. We also modified the “send” function in each protocol stack inside the kernel to check whether there is a waiting packet, and if so, concatenate the new content to it and update the headers. What was hard? Updating the header information is a hard task. We have to update IP, UDP and MAC headers when doing concatenation. We also have to figure out a best way of appending new content and updating the headers so that it will take much less time than packetisation delay. This have to be done really carefully. If either of these headers are incorrectly updated, then the concatenated packet will be treated as damaged packet and be discarded at destination. OverheadPayload ImplementationTraditionalTrickles End-to-End Delay21 ms 0.5 ms Transport e.g. RTP + UDP Network e.g. IP MAC e.g Application e.g. Linphone Traditional Trickles Time Transmission opportunities Time Synchronisation boundary. Above: Driven by the application. Below: Driven by the Channel New content