Real-Time Caption Streaming over WiFi Network Balaji Vasu Joseph Joswig CS 218.

Slides:



Advertisements
Similar presentations
Chapter 3 The Data Link Layer.
Advertisements

The Data Link Layer Chapter 3. Data Link Layer Design Issues Services Provided to the Network Layer Framing Error Control Flow Control.
Review of Topology and Access Techniques / Switching Concepts BSAD 141 Dave Novak Sources: Network+ Guide to Networks, Dean 2013.
TCP/IP MODEL Maninder Kaur
CCNA – Network Fundamentals
Intermediate TCP/IP TCP Operation.
UDP & TCP Where would we be without them!. UDP User Datagram Protocol.
Introduction to Network Analysis and Sniffer Pro
Copyright 1999, S.D. Personick. All Rights Reserved. Telecommunications Networking II Lecture 32 Transmission Control Protocol (TCP) Ref: Tanenbaum pp:
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
Network Services Networking for Home & Small Business.
UDP - User Datagram Protocol UDP – User Datagram Protocol Author : Nir Shafrir Reference The TCP/IP Guide - ( Version Version.
Transport Layer TCP and UDP IS250 Spring 2010
CS 218 F 2003 Nov 3 lecture:  Streaming video/audio  Adaptive encoding (eg, layered encoding)  TCP friendliness References: r J. Padhye, V.Firoiu, D.
1 CMSCD1011 Introduction to Computer Audio Lecture 10: Streaming audio for Internet transmission Dr David England School of Computing and Mathematical.
CIS679: RTP and RTCP r Review of Last Lecture r Streaming from Web Server r RTP and RTCP.
Lect3..ppt - 09/12/04 CIS 4100 Systems Performance and Evaluation Lecture 3 by Zornitza Genova Prodanoff.
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
THE OSI MODEL AND THE TCP/IP PROTOCOL SUITE CS 1202 Lectur3 part2.
CS 4396 Computer Networks Lab
Network Services Networking for Home & Small Business.
The OSI Model and the TCP/IP Protocol Suite Outline: 1.Protocol Layers 2.OSI Model 3.TCP/IP Model 4.Addressing 1.
Asstt. Professor Adeel Akram.  Motivation  TCP mechanisms  Indirect TCP  Snooping TCP  Mobile TCP  Fast retransmit/recovery  Transmission freezing.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Transport Layer Network Fundamentals – Chapter 4.
Final Year Project Presentation by Daire O’Neill 4EE.
Copyright 2002, S.D. Personick. All Rights Reserved.1 Telecommunications Networking II Topic 20 Transmission Control Protocol (TCP) Ref: Tanenbaum pp:
TCP1 Transmission Control Protocol (TCP). TCP2 Outline Transmission Control Protocol.
Transmission Control Protocol
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 15.
1 TCP III - Error Control TCP Error Control. 2 ARQ Error Control Two types of errors: –Lost packets –Damaged packets Most Error Control techniques are.
The data link layer. Data Link Layer Design Issues Services Provided to the Network Layer Framing Error Control Flow Control.
Vertical Optimization Of Data Transmission For Mobile Wireless Terminals MICHAEL METHFESSEL, KAI F. DOMBROWSKI, PETER LANGENDORFER, HORST FRANKENFELDT,
Lecture 4 Overview. Ethernet Data Link Layer protocol Ethernet (IEEE 802.3) is widely used Supported by a variety of physical layer implementations Multi-access.
Institute of Technology Sligo - Dept of Computing Chapter 12 The Transport Layer.
1 CS 4396 Computer Networks Lab TCP – Part II. 2 Flow Control Congestion Control Retransmission Timeout TCP:
1 Microsoft Windows 2000 Network Infrastructure Administration Chapter 4 Monitoring Network Activity.
Fs Streaming Media a presentation by Florian Seidel.
Advanced UNIX programming Fall 2002, lecture 16 Instructor: Ashok Srinivasan Acknowledgements: The syllabus and power point presentations are modified.
ECE 4110 – Internetwork Programming
INTERNET AND PROTOCOLS For more notes and topics visit: eITnotes.com.
UDP & TCP Where would we be without them!. UDP User Datagram Protocol.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
Transmission Control Protocol (TCP) TCP Flow Control and Congestion Control CS 60008: Internet Architecture and Protocols Department of CSE, IIT Kharagpur.
Digital Planet: Tomorrow’s Technology and You Chapter 8 Networking and Digital Communication Copyright © 2012 Pearson Education, Inc. publishing as Prentice.
2: Transport Layer 11 Transport Layer 1. 2: Transport Layer 12 Part 2: Transport Layer Chapter goals: r understand principles behind transport layer services:
The Data Link Layer RIS 251 Dr. ir. S.S. Msanjila.
Advanced Computer Networks
Chapter 3 Transport Layer
Fast Retransmit For sliding windows flow control we waited for a timer to expire before beginning retransmission of a packet TCP uses an additional mechanism.
Development of a Simulator for the HANARO Research Reactor (Communication Protocol) H.S. Jung.
Data Link Layer.
The OSI Model and the TCP/IP Protocol Suite
The OSI Model and the TCP/IP Protocol Suite
Chapter 3 – Part 1 The Data Link Layer.
Chapter 23 Introduction To Transport Layer
Process-to-Process Delivery:
IT351: Mobile & Wireless Computing
The OSI Model and the TCP/IP Protocol Suite
The OSI Model and the TCP/IP Protocol Suite
TCP for Wireless Networks
CS4470 Computer Networking Protocols
Computer Networks Topic :User datagram protocol Transmission Control Protocol -Hemashree S( )
The Transport Layer Reliability
TCP III - Error Control TCP Error Control.
The OSI Model and the TCP/IP Protocol Suite
Chapter 5 Peer-to-Peer Protocols and Data Link Layer
Lecture 4 Peer-to-Peer Protocols and Data Link Layer
Process-to-Process Delivery: UDP, TCP
Computer Networks Protocols
Data Link Layer. Position of the data-link layer.
Presentation transcript:

Real-Time Caption Streaming over WiFi Network Balaji Vasu Joseph Joswig CS 218

Outline Project Description Assumptions Demo Results

Motivation for Caption Streaming Each student can visualize in real-time and store the captions of the ongoing lesson Useful in many real situations:  to help the comprehension of  foreign students, students with hearing impairment, or just as  a support to notes taking during classes (students can focus on the lecture)

Project Overview Speech recognition algorithm running in the central host Multicast transmission via IEEE802.11b from the central host (sender) to the devices (receivers) Receivers do not acknowledge receipt of packets

Streaming Protocol Instructor is equipped with a headset and an IEEE802.11b enabled station, running a speech detection software. The voice of the lecturer is captured by the headset, converted into a text file by the speech recognition software Sent via a IEEE802.11b multicast transmission to all the students. The lecturer’s host runs a client program which handles the multicast transmission Wirelessly connected to the receiving stations that run a server program able to receive the packets and display the speech in a real- time fashion.

Redundant Transmission Protocol Each multicast packet contains N fragments of spoken text. Fragments sent within a packet are determined by a sliding window protocol. First packet delivers P to P + 3, second P + 1 to P + 4 etc. Even if one out of 4 packets reaches the receiver, all the fragments would reach the receiver.

Redundant Transmission Protocol (cont’d) Greater the N, the greater the channel is robust to errors. Larger the N, the more bandwidth is wasted on redundancy. At the end of the lecture, receivers can ask for any missing packets from the host. These will be retransmitted over TCP.

Redundant Packet Protocol SS+1S+2S+3S+1S+2S+3S+4S+2S+3S+4S+5

Platform Choices Java  Operating System Independence  Easy to use networking tools. Speech Recognition  Sphinx  Dragon Naturally Speaking  IBM ViaVoice

Programming Notes Speech to text program writes to an ascii file, and holds a write lock on the file. N = 4, in this case, with results for other values of N shown later Packet size is 512 bytes + 4 bytes for sequence number. Each segment is 128 bytes.

Simulation Simulated program by pulling data from a text file. Measure the percentage of packets that different window sizes and different error rates. Calculate the number of packets that are lost during the broadcast. Simulated Error is much larger than anticipated actual transmission error.

Simulation Results

Remaining Issues PDA’s Robust Speech Recognition Program