482 research outputs found

    Adjusting WiMAX for a Dedicated Surveillance Network

    Get PDF
    WiMAX (Worldwide Interoperability for Microwave Access) devices have been used widely in the market. WiMAX-based video surveillance products have also been available. The acceptance of WiMAX in the market, as well as the availability of WiMAX products, contributes to the possibility of implementing it for dedicated video surveillance application. However, since WiMAX is designed to accommodate various applications with different quality of service (QoS) requirements, WiMAX–based dedicated surveillance network may not achieve optimum performance, as all SSs generate the same QoS requirements. The scheduler cannot implement traffic type priority; therefore, service classification does not work as expected. This paper proposes WiMAX adjustment to transform a multi-purpose WiMAX network into a network dedicated to video surveillance. NS-2 simulations show that the proposed adjustment is able to deliver low delay and high quality video surveillance.DOI:http://dx.doi.org/10.11591/ijece.v3i4.318

    Topics in access, storage, and sensor networks

    Get PDF
    In the first part of this dissertation, Data Over Cable Service Interface Specification (DOCSIS) and IEEE 802.3ah Ethernet Passive Optical Network (ETON), two access networking standards, are studied. We study the impact of two parameters of the DOCSIS protocol and derive the probability of message collision in the 802.3ah device discovery scheme. We survey existing bandwidth allocation schemes for EPONs, derive the average grant size in one such scheme, and study the performance of the shortest-job-first heuristic. In the second part of this dissertation, we study networks of mobile sensors. We make progress towards an architecture for disconnected collections of mobile sensors. We propose a new design abstraction called tours which facilitates the combination of mobility and communication into a single design primitive and enables the system of sensors to reorganize into desirable topologies alter failures. We also initiate a study of computation in mobile sensor networks. We study the relationship between two distributed computational models of mobile sensor networks: population protocols and self-similar functions. We define the notion of a self-similar predicate and show when it is computable by a population protocol. Transition graphs of population protocols lead its to the consideration of graph powers. We consider the direct product of graphs and its new variant which we call the lexicographic direct product (or the clique product). We show that invariants concerning transposable walks in direct graph powers and transposable independent sets in graph families generated by the lexicographic direct product are uncomputable. The last part of this dissertation makes contributions to the area of storage systems. We propose a sequential access detect ion and prefetching scheme and a dynamic cache sizing scheme for large storage systems. We evaluate the cache sizing scheme theoretically and through simulations. We compute the expected hit ratio of our and competing schemes and bound the expected size of our dynamic cache sufficient to obtain an optimal hit ratio. We also develop a stand-alone simulator for studying our proposed scheme and integrate it with an empirically validated disk simulator

    Research of Proxy Cache Algorithm in Multi-media Education System

    Get PDF
    Multi-media education system is more and more widely used in all levels of education. In order to decrease cost of multi-media system and keep efficiency with increasing multi-media materials, proxy cache algorithm has been widely studied. Based on analysis of existing research of proxy cache results, an improved proxy coaching strategy of prefix cache and postfix merging is proposed. The strategy can dynamically adjust prefix cache size with the object access change. A more effective method of steaming merging has been proposed with multicast used in postfix portion. The results show that the improved strategy can effectively utilize proxy cache resource, shorten time delay and save band width

    System sizing and resource allocation for video-on-demand systems.

    Get PDF
    by Mary Y.Y. Leung.Thesis (M.Phil.)--Chinese University of Hong Kong, 1997.Includes bibliographical references (leaves 64-66).Abstract --- p.iAcknowledgments --- p.iiiChapter 1 --- Introduction --- p.1Chapter 1.1 --- Video-On-Demand Environment --- p.1Chapter 1.2 --- Problem Definition --- p.3Chapter 2 --- Related Work --- p.7Chapter 2.1 --- Data Sharing Techniques --- p.7Chapter 2.1.1 --- Batching --- p.7Chapter 2.1.2 --- Buffering --- p.9Chapter 2.1.3 --- Static Partitioning --- p.10Chapter 2.1.4 --- Adaptive Piggybacking --- p.10Chapter 2.2 --- Providing VCR Functionalities --- p.12Chapter 3 --- System Model --- p.15Chapter 3.1 --- Operations involved in VCR Control --- p.15Chapter 3.2 --- Normal Playback Model --- p.17Chapter 3.3 --- VCR Model --- p.18Chapter 4 --- Resource Allocation for Normal Playback --- p.21Chapter 4.1 --- Mathematical Model --- p.22Chapter 4.1.1 --- Hits occurring within the same partition (hit w) --- p.24Chapter 4.1.2 --- Jump to other partitions (hito) --- p.27Chapter 4.1.3 --- Fast-forwarding to the end of a movie --- p.30Chapter 4.1.4 --- The expected hit probability P(hit) --- p.31Chapter 4.2 --- Model Verification --- p.32Chapter 5 --- Resource Allocation for VCR mode --- p.35Chapter 5.1 --- Scheme 1: No merging --- p.36Chapter 5.2 --- Scheme 2: Merging by adaptive piggybacking and buffering --- p.36Chapter 5.2.1 --- Resuming within the threshold (Δ ≤ k) --- p.38Chapter 5.2.2 --- Resuming beyond the threshold (Δ > k) --- p.39Chapter 5.3 --- Verification --- p.42Chapter 6 --- Applications to System sizing --- p.45Chapter 6.1 --- Cost of Resources for Normal Playback --- p.46Chapter 6.2 --- Cost of Resources for VCR functions --- p.48Chapter 6.3 --- Overall system cost --- p.49Chapter 6.4 --- Comparison --- p.50Chapter 6.4.1 --- Scheme 1 vs. Scheme 2 --- p.51Chapter 6.4.2 --- Scheme 2 vs. pure I/O & pure buffer --- p.54Chapter 6.4.3 --- Different values of k --- p.58Chapter 6.4.4 --- Different values of ψ --- p.60Chapter 7 --- Conclusions --- p.62Bibliography --- p.64Chapter A --- Appendix --- p.67Chapter A.l --- Rewind --- p.67Chapter A.1.1 --- Hits occurring within the same partition (hit w) --- p.67Chapter A.1.2 --- Jump to other partitions (hit0) --- p.68Chapter A.2 --- Pause --- p.7

    Finding perceptually optimal operating points of a real time interactive video-conferencing system

    Get PDF
    This research aims to address issues faced by real time video-conferencing systems in locating a perceptually optimal operating point under various network and conversational conditions. In order to determine the perceptually optimal operating point of a video-conferencing system, we must first be able to conduct a fair assessment of the quality of the current operating point in the system and compare it with another operating point to determine if one is better than the other in terms of perceptual quality. However at this point in time, there does not exist one objective quality metric that can accurately and fully describe the perceptual quality of a real time video conversation. Hence there is a need for a controlled environment to allow tests to be conducted in and in which we can study different metrics and identify the best trade-offs between them. We begin by studying the components of a typical setup of a real time video-conferencing system and the impacts that various network and conversation conditions can have on the overall perceptual quality. We also look into different metrics available to measure those impacts. We then created a platform to perform black box testing on current video conferencing systems and observe how they handle the changes in operating conditions. The platform is then used to conduct a brief evaluation of the performance of Skype, a popular commercial video-conferencing system. However, we are not able to modify the system parameters of Skype. The main contribution of this thesis is the design of a new testbed that provides a controlled environment to allow tests to be conducted to determine the perceptual optimum operating point of a video conversation under specified network and conversation conditions. This testbed will allow us to modify certain parameters, such as frame rate and frame size, which were not previously possible. The testbed takes as input, two recorded videos of the two speakers of a face-to-face conversation and desired output video parameters, such as frame rate, frame size and delay. A video generation algorithm is designed as part of the testbed to handle modifications to frame rate and frame size of the videos as well as delays inserted into the recorded video conversation to simulate the effects of network delays. The most important issue addressed is the generation of new frames to fill up the gaps created due to a change in frame rate or delay inserted, unlike as in the case of voice, where a period of silence can simply be used to handle these situations. The testbed uses a packetization strategy designed on the basis of an uneven packet transmission rate (UPTR) and that handles the packetization of interleaved video and audio data; it also uses piggybacking to provide redundancy if required. Losses can be injected either randomly or based on packet traces collected via PlanetLab. The processed videos will then be pieced together side-by-side to give the viewpoint of a third-party observing the video conversation from the site of the first speaker. Hence the first speaker will be observed to have a faster reaction time without network delays than that of the second speaker who is simulated to be located at the remote end. The video of the second speaker will also reflect the degradations in perceptual quality induced by the network conditions, whereas the first speaker will be of perfect quality. Hence with the testbed, we are able to generate output videos for different operating points under the same network and conversational conditions and thus able to make comparisons between two operating points. With the testbed in place, we demonstrate how it can be used to evaluate the effects of various parameters on the overall perceptual quality. Lastly, we demonstrate the results of applying an existing efficient search algorithm used for estimating the perceptually optimal mouth-to-ear delay (MED) of a Voice-over-IP(VoIP) conversation to a Video Conversation. This is achieved by using the network simulator designed to conduct a series of subjective and objective tests to identify the perceptual optimum MED under specific network and conversational conditions

    Adaptive reservation TDMA protocol for wireless multimedia traffic

    Get PDF
    An Adaptive Reservation Time Division Multiple Access (AR-TDMA) control protocol for Wireless Asynchronous Transfer Mode (WATM) networks is proposed in this paper. AR-TDMA combines the advantages of distributed access and centralised control for transporting Constant Bit Rate (CBR), Variable Bit Rate (VBR) and Available Bit Rate (ABR) traffic efficiently over a wireless channel. The contention slots access for reservation requests is governed by two protocols, the Adaptive Framed Pseudo-Bayesian Aloha with Adaptive Slot Assignment (AFPBAASA) protocol and the Framed Pseudo-Bayesian Aloha with Adaptively Prioritised Controlled Capture (FPBAAPCC) protocol. Both protocols provide different access priorities to the control packets in order to improve the Quality-of-Service (QoS) offered to time sensitive connections. AR-TDMA also features a novel integrated resource allocation algorithm that efficiently schedules terminals’ reserved access to the wireless ATM channel by considering their requested bandwidth and QoS. Integration of CBR, voice, VBR, data and control traffic over the wireless ATM channel using the proposed AR-TDMA protocol is considered in the paper. The performance of the AR-TDMA in conjunction with the AFPBA-ASA protocol and FPBA-APCC protocol has been investigated and the simulation results are presented showing that the protocol satisfies the required QoS of each traffic category while providing a highly efficient utilisation of approximately 96% for the wireless ATM channel
    corecore