1 Video traffic optimization in mobile wireless environments using adaptive applications Phd Forum UBICOMM 2008 David Esteban.

Slides:



Advertisements
Similar presentations
Roma 17/10/08 WORLD Project KO Meeting Laura Galluccio WORLD Project – KO Meeting University of Catania.
Advertisements

Chapter 17 Networking Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles, 6/E William.
ATM Asynchronous Transfer Mode. ATM Networks Use optical fibre similar to that used for FDDI networks ATM runs on network hardware called SONET ATM cells.
The Network Layer Functions: Congestion Control
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 OSI Transport Layer Network Fundamentals – Chapter 4.
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
Chapter 20 Network Layer: Internet Protocol Stephen Kim 20.1.
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based.
6/3/ Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross-Layer Information Awareness CS495 – Spring 2005 Northwestern University.
Sang-Chun Han Hwangjun Song Jun Heo International Conference on Intelligent Hiding and Multimedia Signal Processing (IIH-MSP), Feb, /05 Feb 2009.
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based.
PROTOCOLS AND ARCHITECTURE Lesson 2 NETS2150/2850.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
Protocols and the TCP/IP Suite
Data Provisioning Services for mobile clients by Mustafa Ergen Authors: Mohit Agarwal and Anuj Puri Berkeley WOW Group University.
Introduction. 2 What Is SmartFlow? SmartFlow is the first application to test QoS and analyze the performance and behavior of the new breed of policy-based.
William Stallings Data and Computer Communications 7 th Edition Chapter 2 Protocols and Architecture.
COE 342: Data & Computer Communications (T042) Dr. Marwan Abu-Amara Chapter 2: Protocols and Architecture.
Chapter 2 Network Models.
Troubleshooting methods. Module contents  Avaya Wireless tools  Avaya Wireless Client Manager  Avaya Wireless AP Manager  Hardware indicators  Non.
Gursharan Singh Tatla Transport Layer 16-May
Protocols and the TCP/IP Suite Chapter 4. Multilayer communication. A series of layers, each built upon the one below it. The purpose of each layer is.
Process-to-Process Delivery:
QualNet 2014/05/ 尉遲仲涵. Outline Directory Structure QualNet Basic Message & Event QualNet simulation architecture Protocol Model Programming.
Network Architecture and Protocol Concepts. Network Architectures (1) The network provides one or more communication services to applications –A service.
Chapter 17 Networking Dave Bremer Otago Polytechnic, N.Z. ©2008, Prentice Hall Operating Systems: Internals and Design Principles, 6/E William Stallings.
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Introducing Network Standards
Protocols and the TCP/IP Suite
Internet Addresses. Universal Identifiers Universal Communication Service - Communication system which allows any host to communicate with any other host.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
William Stallings Data and Computer Communications 7 th Edition Data Communications and Networks Overview Protocols and Architecture.
Computer Networks with Internet Technology William Stallings Chapter 2 Protocols and the TCP/IP Protocol Suite.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Introduction Slide 1 A Communications Model Source: generates.
Introduction to Networks CS587x Lecture 1 Department of Computer Science Iowa State University.
Copyright © Lopamudra Roychoudhuri
Data and Computer Communications Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based Applications.
NetFlow: Digging Flows Out of the Traffic Evandro de Souza ESnet ESnet Site Coordinating Committee Meeting Columbus/OH – July/2004.
IEEE Wireless LAN Standard. Medium Access Control-CSMA/CA IEEE defines two MAC sublayers Distributed coordination function (DCF) Point coordination.
1 Networking Chapter Distributed Capabilities Communications architectures –Software that supports a group of networked computers Network operating.
COP 4930 Computer Network Projects Summer C 2004 Prof. Roy B. Levow Lecture 3.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
CSCI 465 D ata Communications and Networks Lecture 14 Martin van Bommel CSCI 465 Data Communications & Networks 1.
報告人:林祐沁 學生 指導教授:童曉儒 老師 March 2, Wireless Video Surveillance Server Based on CDMA1x and H.264.
SDN integrated scenarios and new PoA-related primitives Daniel Corujo Carlos Guimarães Rui L. Aguiar
William Stallings Data and Computer Communications
Wireless communications and mobile computing conference, p.p , July 2011.
CHAPTER 4 PROTOCOLS AND THE TCP/IP SUITE Acknowledgement: The Slides Were Provided By Cory Beard, William Stallings For Their Textbook “Wireless Communication.
Kyocera Corporation Enhance radio network connectivity and maintain a Quality of IP service application Proposal of extension of IEEE /7/16.
Configuration Mapper Sonja Vrcic Socorro,
Protocol Layering Chapter 11.
G.v. Bochmann, revised Jan Comm Systems Arch 1 Different system architectures Object-oriented architecture (only objects, no particular structure)
Data Communications is the Real World OSI Layers 1 & 2 a.k.a TCP/IP Network Interface Layer.
Week #8 OBJECTIVES Chapter #5. CHAPTER 5 Making Networks Work Two Networking Models –OSI OPEN SYSTEMS INTERCONNECTION PROPOSED BY ISO –INTERNATIONAL STANDARDS.
Network Models. The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding.
Data and Computer Communications Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based Applications.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Chap. 2 Network Models.
An IP-based multimedia traffic generator
PROTEAN: A Scalable Architecture for Active Networks
Layered Architectures
Understanding the OSI Reference Model
Lei Chen and Wendi B. Heinzelman , University of Rochester
Hubs Hubs are essentially physical-layer repeaters:
Process-to-Process Delivery:
Lecture 6: TCP/IP Networking 1nd semester By: Adal ALashban.
Net 323 D: Networks Protocols
Ch 17 - Binding Protocol Addresses
Process-to-Process Delivery: UDP, TCP
Presentation transcript:

1 Video traffic optimization in mobile wireless environments using adaptive applications Phd Forum UBICOMM 2008 David Esteban

2 Multimedia traffic : always very concrete characteristics Streaming data Availability = Priority Video traffic in Wireless networks

3 Wireless and mobile nature : – Optimization = Adaptation – Upper layers MUST know the current status of the network. – Vertical communication between layers

4 Cross layering Wireless networking : –Multilayer problem –Layer dependency (either directly or not)‏

5 Cross-layer Techniques Cross layering Wireless networking : –Multilayer problem –Layer dependency (either directly or not)‏

6 Cross-layer Techniques Cross layering Wireless networking : –Multilayer problem –Layer dependency (either directly or not)‏ Define a general concept of communication between layers.

7 Cross-layer Techniques Cross layering Wireless networking : –Multilayer problem –Layer dependency (either directly or not)‏ Define a general concept of communication between layers. Concrete Algorithm ??

8 Scenario definition AP based video conference environment: –One of the most common applications. –Indispensable tool to different scenarios. –Several kinds mobile wireless users is continuously increasing.

9 Previous work USING INTERMEDIATE HARDWARE

10 Previous work COMPARISON TABLE Costs ??? Using Intermediate HW Extra Traffic Algorithm definition OptimizationMobility

11 Previous work CONDITIONS SET BY THE APPLICATION In this case, there is a software system which is checking the network status. The application will register status conditions on that system. when the system recognize a registered condition has been met, it will notify the application. The application will change its behavior consequently.

12 Previous work COMPARISON TABLE Costs ?? Conditions set by application Using Intermediate HW Extra Traffic Algorithm definition OptimizationMobility

13 Previous work USING SIGNALING PACKETS Some other previous research proposed the use of signaling packets as reporters of the QoS in the network and then send the information to the application. Weak points : - Inject more packets into the network could be harmful in critical situations - There is no cross-layer algorithm specified to send the information from the lower levels to the application

14 Previous work COMPARISON TABLE Costs Using Signaling Packets Conditions set by application Using Intermediate HW Extra Traffic Algorithm definition OptimizationMobility

15 Current work Many approaches but weak points. Proposed project : –Check the status of the network : As know the environment conditions is key point in this project. –Inform to the video application : Because the higher layers MUST know this information. –Adapt of behavior In order to optimize the traffic injected into the network depending of the environment. –Avoid weak points So, we will be able to improve the given solutions.

Current Work Linux operating system Gnome Desktop in an Ubuntu distribution. Video App = Kopete v (Using KDE 3.5.8)‏

17 First Step HOW THE NETWORK IS MONITORED? -No use Control packets -Local Updated information : -/proc/net/dev/ -/proc/net/wireless/ -/proc/net/udp/ -/proc/net/tcp/

18 First Step HOW THE NETWORK IS MONITORED? -No use Control packets -Local Updated information : -/proc/net/dev/ -/proc/net/wireless/ -/proc/net/udp/ -/proc/net/tcp/ Bytes, Packets, Errors

19 First Step HOW THE NETWORK IS MONITORED? -No use Control packets -Local Updated information : -/proc/net/dev/ -/proc/net/wireless/ -/proc/net/udp/ -/proc/net/tcp/ Bytes, Packets, Errors IP addresses and ports

20 First Step HOW THE NETWORK IS MONITORED? -No use Control packets -Local Updated information : -/proc/net/dev/ -/proc/net/wireless/ -/proc/net/udp/ -/proc/net/tcp/ Bytes, Packets, Errors IP addresses and ports Interface Status

21 First Step HOW THE NETWORK IS MONITORED? -No use Control packets -Local Updated information : -/proc/net/dev/ -/proc/net/wireless/ -/proc/net/udp/ -/proc/net/tcp/ Bytes, Packets, Errors IP addresses and ports Interface Status Wireless Link & Signal

22 First Step HOW THE NETWORK IS MONITORED? Obtain this information in an organized way: - C library “Liblink”. - Look at the mentioned sources. - Convert into independent variables. - Easy format to operate with.

23 First Step HOW THE NETWORK IS MONITORED? SYNTAX : linkd – t [miliseconds] [OPTIONS] OPTIONS : -vVerbose Mode -i ifaceSet the polling interface -s sock_idSet the socket ID -f output_file Set the log file LINKD This library is invoked by a command called “linkd”

24 First Step HOW THE NETWORK IS MONITORED? -Use command : -Invoke library will be summoned -Get the required information in -intervals equal to the specified polling time -from the chosen interface. -If verbose flag -Store information in log file or -Show it in the standard output.

Next step Deal with this “organized” raw information

Next step Deal with this “organized” raw information Make the application change its behaviour on the fly

Next step Deal with this “organized” raw information Make the application change its behaviour on the fly Optimization = Adaptation

28 Second Step HOW THE APPLICATION IS INFORMED ABOUT THE NETWORK STATUS? Information is gathered and organized into variables

29 Second Step HOW THE APPLICATION IS INFORMED ABOUT THE NETWORK STATUS? Information is gathered and organized into variables “Quality Status”

30 Second Step HOW THE APPLICATION IS INFORMED ABOUT THE NETWORK STATUS? Information is gathered and organized into variables “Quality Status” Which information ??

31 Second Step HOW THE APPLICATION IS INFORMED ABOUT THE NETWORK STATUS? Information is gathered and organized into variables Which information ?? Priority = wireless parameters. -/proc/net/wireless/ “Quality States”

32 Second Step HOW THE APPLICATION IS INFORMED ABOUT THE NETWORK STATUS? The information obtained from that source would be : -Quality-link : Link quality info ( how good the reception is) -Quality-level : Signal strength at receiver (dBm)‏ -Quality-noise: Silence level (no packet) at the receiver (dBm)‏ -Discarded-nwid : Number of discarded packets due to invalid network id. -Discarded-crypt : Number of packets unable to decrypt. -Discarded-frag : Number of fragmented packets So a combination of these parameters will be use to define the “quality state” that will be the reference for the application.

Formula details SNR (Signal-Noise relation): 10 * Log10 (Quality-level / Quality-noise) -Bad values : between 0 and 1 -Good values : higher than 5 Adjust parameter Use to give a significative value to the SNR Ad = 5 Error relation : Given a interval t of time : Eparam == 0; If (nwid(t))>(nwid(t-1)) Eparam == Eparam+5; If (crypt(t))>(crypt(t-1)) Eparam == Eparam+5; If (frag (t))>(frag(t-1)) Eparam == Eparam+5; PREVIOUS PARAMETERS

Formula details FORMULA DEFINITION Qlink + SNR – Ad – Eparam 10 Qstate = I.e. LinkLevelNoiseNwidCryptFragSNRState (9.705)‏

Formula details FORMULA DEFINITION Qlink + SNR – Ad – Eparam 10 Qstate = I.e. LinkLevelNoiseNwidCryptFragSNRState (9.705)‏ (3.808)‏

Quality States Applying the formula we will obtain a number from 0 to 9. The state only depends of the network conditions at that moment. “Quality States” That number is the number of the “quality state”. 0 means the lowest quality state. 9 represents that the environment is in its best condition

Layer Communication To inform the application about the “Quality status”. We will need specify a concrete Cross- layer algorithm So it will be a kind of intra-layer message passing system

Third Step Sent the state to the application Use primitives for inter-layer messaging Primitives = Small units of information Types of primitives. COMMUNICATION BETWEEN LAYERS Layer N Layer N - m Indication Response

Third Step Structure of a primitive : –Five fields : Protocol layer ID (which layer)‏ Protocol ID (which protocol entity)‏ Primitive class ID (which kind)‏ Parameters ( information sent )‏ Portability of the primitives : Any information exchange method between layers can be used with this primitives. COMMUNICATION BETWEEN LAYERS

40 Forth Step HOW THE APPLICATION WORKS? Web Cam Yahoo! Protocol

41 Forth Step HOW THE APPLICATION WORKS? Web Cam Yahoo! Protocol

42 Forth Step HOW THE APPLICATION WORKS? Web Cam Yahoo! Protocol Converts

43 Forth Step HOW THE APPLICATION WORKS? Web Cam Yahoo! Protocol Converts Send to destination

44 Forth Step HOW THE APPLICATION WILL RESPONSE?

45 Forth Step HOW THE APPLICATION WILL RESPONSE? Conversion

46 Forth Step HOW THE APPLICATION WILL RESPONSE? Conversion “Quality States”

47 Forth Step HOW THE APPLICATION WILL RESPONSE? Conversion “Quality States”

48 Forth Step Interaction between parts System Folders Quality States

49 Forth Step Interaction between parts Web Cam Original Frame Converted Frame Store & Send System Folders Quality States

50 Forth Step Interaction between parts Web Cam Original Frame Converted Frame Store & Send System Folders Once per “-t” Quality States

51 Forth Step Interaction between parts Web Cam Original Frame Converted Frame Store & Send System Folders Once per frame Once per “-t” Quality States

52 Forth Step Interaction between parts Web Cam Original Frame Converted Frame Store & Send System Folders Once per frame Once per “-t” Quality States

53 Evaluation

Preliminary Results To check if the adaptation works we made real experiments establishing a video conference between a desktop and a laptop and checked the availability of the communication in different states for both adaptive and non adaptive models.

Preliminary Results To check the system was working better thanks to the adaptation we made real experiments establishing a video conference between a desktop and a laptop and checked the percentage of packet loss in different states for both adaptive and non adaptive models.

Preliminary Results [ Simulation ]

Future work How to get better results in the optimization (maybe adding or changing some sources, changing the formula, etc.). Test the adaptation of the information sent from the multi-conference server to the mobile nodes Implement the cross-layer algorithm details for the intra-layers messaging system from Application layer to Link layer.