Download - Sowjanya
![Page 1: Sowjanya](https://reader034.vdocuments.us/reader034/viewer/2022052523/555b88fad8b42acd238b4a8b/html5/thumbnails/1.jpg)
Video over Wireless
Sowjanya
Talasila
![Page 2: Sowjanya](https://reader034.vdocuments.us/reader034/viewer/2022052523/555b88fad8b42acd238b4a8b/html5/thumbnails/2.jpg)
Topics for discussion
Introduction Issues and solution Challenges Future work Conclusion References
![Page 3: Sowjanya](https://reader034.vdocuments.us/reader034/viewer/2022052523/555b88fad8b42acd238b4a8b/html5/thumbnails/3.jpg)
Video
Video – the technology of capturing, recording, processing, transmitting and reconstructing the moving pictures using celluloid film, electronic signals or digital media
Quality of the video depends on the method used for capturing and storing
![Page 4: Sowjanya](https://reader034.vdocuments.us/reader034/viewer/2022052523/555b88fad8b42acd238b4a8b/html5/thumbnails/4.jpg)
Characteristics of video stream
Frame rate – number of still pictures per unit time of video
Video resolution – size of video image
Aspect ratio – dimensions of video screen and video picture elements
Bits per pixel – determines the number of distinct colors
![Page 5: Sowjanya](https://reader034.vdocuments.us/reader034/viewer/2022052523/555b88fad8b42acd238b4a8b/html5/thumbnails/5.jpg)
Contd..
Video quality – in terms of PSNR (ratio of max power of the video signal to the power of the corrupting noise)
Bit rate (digital only) – rate of information content in a video stream
Higher the bit rate, better the video quality
![Page 6: Sowjanya](https://reader034.vdocuments.us/reader034/viewer/2022052523/555b88fad8b42acd238b4a8b/html5/thumbnails/6.jpg)
Introduction
With the development of broadband wireless networks, attention is given to the delivery of video over wireless networks
![Page 7: Sowjanya](https://reader034.vdocuments.us/reader034/viewer/2022052523/555b88fad8b42acd238b4a8b/html5/thumbnails/7.jpg)
Issues
Rate control
Handover
Security
![Page 8: Sowjanya](https://reader034.vdocuments.us/reader034/viewer/2022052523/555b88fad8b42acd238b4a8b/html5/thumbnails/8.jpg)
Issue 1 : Rate control
Importance of rate control: Results in full utilization of the link
by ensuring that sending rates are not too slow
Prevents congestion collapse by ensuring that sending rates are not too aggressive
![Page 9: Sowjanya](https://reader034.vdocuments.us/reader034/viewer/2022052523/555b88fad8b42acd238b4a8b/html5/thumbnails/9.jpg)
Contd..
Ensures fairness among the users sharing the common link in a given network
![Page 10: Sowjanya](https://reader034.vdocuments.us/reader034/viewer/2022052523/555b88fad8b42acd238b4a8b/html5/thumbnails/10.jpg)
TCP – Friendly Rate Control (TFRC)
This solution is proposed so that the performance of TCP doesn’t deteriorate when both TCP and UDP sessions co-exist in the internet
TFRC – a non TCP connection should receive the same amount of bandwidth as a TCP connection if they traverse on the same path
![Page 11: Sowjanya](https://reader034.vdocuments.us/reader034/viewer/2022052523/555b88fad8b42acd238b4a8b/html5/thumbnails/11.jpg)
TFRC contd..
TFRC regulates the data sending rate according to the network condition, expressed in terms of RTT and packet loss probability, to achieve same throughput that a TCP connection would acquire on the same path.
![Page 12: Sowjanya](https://reader034.vdocuments.us/reader034/viewer/2022052523/555b88fad8b42acd238b4a8b/html5/thumbnails/12.jpg)
TFRC Contd..
The TFRC sender changes the sending rate at least once a RTT
This affects the video quality
![Page 13: Sowjanya](https://reader034.vdocuments.us/reader034/viewer/2022052523/555b88fad8b42acd238b4a8b/html5/thumbnails/13.jpg)
Experimental setup
![Page 14: Sowjanya](https://reader034.vdocuments.us/reader034/viewer/2022052523/555b88fad8b42acd238b4a8b/html5/thumbnails/14.jpg)
Contd..
Assumptions: No cross traffic at node1 and
node2 No congestion at node1 No congestion and queuing delay
at node2 if and only if wireless bandwidth is underutilized
![Page 15: Sowjanya](https://reader034.vdocuments.us/reader034/viewer/2022052523/555b88fad8b42acd238b4a8b/html5/thumbnails/15.jpg)
Contd..
The available wireless link bandwidth Bw and packet loss rate (caused by wireless channel error) Pw is a constant
Backward path is error free and congestion free
![Page 16: Sowjanya](https://reader034.vdocuments.us/reader034/viewer/2022052523/555b88fad8b42acd238b4a8b/html5/thumbnails/16.jpg)
Contd..
Based on the above mentioned scenario and the assumptions, it is proved that, one TFRC connection underutilizes the wireless link as the available bandwidth is larger than the highest sending rate
![Page 17: Sowjanya](https://reader034.vdocuments.us/reader034/viewer/2022052523/555b88fad8b42acd238b4a8b/html5/thumbnails/17.jpg)
Contd..
The total throughput of the application will increase with the number of TFRC connections until it reaches the hard limit of Bw(1-Pw)
For a particular packet size, the maximum number of TFRC connections to achieve proper utilization of the link is derived
![Page 18: Sowjanya](https://reader034.vdocuments.us/reader034/viewer/2022052523/555b88fad8b42acd238b4a8b/html5/thumbnails/18.jpg)
Contd..
Any connection beyond this number will result in increase in RTT or packet loss rate and hence the sending rate of each connection has to be decreased
![Page 19: Sowjanya](https://reader034.vdocuments.us/reader034/viewer/2022052523/555b88fad8b42acd238b4a8b/html5/thumbnails/19.jpg)
Multiple TFRC (MULTFRC)
A practical scheme called MULTFRC is developed to determine the optimal number of connections
Measures RTT and adjusts the number of connections accordingly to utilize the wireless bandwidth efficiently and ensure fairness between the applications
![Page 20: Sowjanya](https://reader034.vdocuments.us/reader034/viewer/2022052523/555b88fad8b42acd238b4a8b/html5/thumbnails/20.jpg)
Contd..
The proposed system consists of two subsystems : RTT Measurement Subsystem (RMS) and Connections Controller Subsystem (CCS)
Based on the RMS, CCS responds
![Page 21: Sowjanya](https://reader034.vdocuments.us/reader034/viewer/2022052523/555b88fad8b42acd238b4a8b/html5/thumbnails/21.jpg)
Comparision (One TFRC Vs MULTFRC)
![Page 22: Sowjanya](https://reader034.vdocuments.us/reader034/viewer/2022052523/555b88fad8b42acd238b4a8b/html5/thumbnails/22.jpg)
Contd..
When there is a change in the route, say change in the wireless base station, the RTT changes and the performance of MULTFRC is affected
Employing route change detection tools such as Traceroute, helps in resetting the RTT value
![Page 23: Sowjanya](https://reader034.vdocuments.us/reader034/viewer/2022052523/555b88fad8b42acd238b4a8b/html5/thumbnails/23.jpg)
Analysis of MULTFRC
![Page 24: Sowjanya](https://reader034.vdocuments.us/reader034/viewer/2022052523/555b88fad8b42acd238b4a8b/html5/thumbnails/24.jpg)
Issue 2 : Handover Video applications are delay
sensitive. Certain delay in handing over the mobile device to another access point leads to loss in data.
In video streaming packet loss should be as minimum as possible
Low latency and low packet loss are the critical design issues
![Page 25: Sowjanya](https://reader034.vdocuments.us/reader034/viewer/2022052523/555b88fad8b42acd238b4a8b/html5/thumbnails/25.jpg)
Handover decision based on packet delay
Delay is used as an indicator of when loss is likely to occur
UDP is used in the transport layer Hard handoff not preferred as
there could be a possibility for data loss by the time the mobile device is handed over to the next suitable access point
![Page 26: Sowjanya](https://reader034.vdocuments.us/reader034/viewer/2022052523/555b88fad8b42acd238b4a8b/html5/thumbnails/26.jpg)
Experimental setup
![Page 27: Sowjanya](https://reader034.vdocuments.us/reader034/viewer/2022052523/555b88fad8b42acd238b4a8b/html5/thumbnails/27.jpg)
Experiment results
![Page 28: Sowjanya](https://reader034.vdocuments.us/reader034/viewer/2022052523/555b88fad8b42acd238b4a8b/html5/thumbnails/28.jpg)
Contd..
The MN has two WLAN interfaces, so that it can handoff from one WLAN to another
The MN uses soft handoff in the application layer, enabling the video decoder in the MN to present an uninterrupted video stream to the user
![Page 29: Sowjanya](https://reader034.vdocuments.us/reader034/viewer/2022052523/555b88fad8b42acd238b4a8b/html5/thumbnails/29.jpg)
Contd..
![Page 30: Sowjanya](https://reader034.vdocuments.us/reader034/viewer/2022052523/555b88fad8b42acd238b4a8b/html5/thumbnails/30.jpg)
Experimental setup
![Page 31: Sowjanya](https://reader034.vdocuments.us/reader034/viewer/2022052523/555b88fad8b42acd238b4a8b/html5/thumbnails/31.jpg)
Experimental results
![Page 32: Sowjanya](https://reader034.vdocuments.us/reader034/viewer/2022052523/555b88fad8b42acd238b4a8b/html5/thumbnails/32.jpg)
USHA and VTP
Cost effective Handoff solution with minimal
changes in the current internet infrastructure
Adapts to the user mobility faster while maintaining better connectivity for established network sessions
![Page 33: Sowjanya](https://reader034.vdocuments.us/reader034/viewer/2022052523/555b88fad8b42acd238b4a8b/html5/thumbnails/33.jpg)
Contd..
![Page 34: Sowjanya](https://reader034.vdocuments.us/reader034/viewer/2022052523/555b88fad8b42acd238b4a8b/html5/thumbnails/34.jpg)
Contd..
Handoff network configured using IP tunneling methods
Handoff server (HS) as one end of the IP tunnel and Mobile Host (MH) as other end of the IP tunnel
IP tunnel uses two virtual IP addresses and two fixed IP addresses
![Page 35: Sowjanya](https://reader034.vdocuments.us/reader034/viewer/2022052523/555b88fad8b42acd238b4a8b/html5/thumbnails/35.jpg)
Contd..
Physical connection between HS and MH made using fixed IP addresses
The handoff client is responsible for automatically switching the underlying physical connection of the virtual tunnel to new interface
![Page 36: Sowjanya](https://reader034.vdocuments.us/reader034/viewer/2022052523/555b88fad8b42acd238b4a8b/html5/thumbnails/36.jpg)
Contd..
USHA provides seamless handoff environment
Video Transfer Protocol (VTP) is used to adapt video streaming rates according to eligible rate estimates
![Page 37: Sowjanya](https://reader034.vdocuments.us/reader034/viewer/2022052523/555b88fad8b42acd238b4a8b/html5/thumbnails/37.jpg)
Contd..
VTP provides substantial improvements to streaming performance in terms of perceived video quality and robustness against sudden changes in link capacities
![Page 38: Sowjanya](https://reader034.vdocuments.us/reader034/viewer/2022052523/555b88fad8b42acd238b4a8b/html5/thumbnails/38.jpg)
Issue 3 : Security
Transmission over wireless can be intercepted by any suitable device within the transmission radius
If a network intruder is able to attach to unsecured AP, he can get access to the
wireless network and internet connection
![Page 39: Sowjanya](https://reader034.vdocuments.us/reader034/viewer/2022052523/555b88fad8b42acd238b4a8b/html5/thumbnails/39.jpg)
MAC address filtering
Limit the access to only identifiable network cards with approved MAC addresses
Not a good solution as MAC addresses are broadcasted, any intruder can figure it out
![Page 40: Sowjanya](https://reader034.vdocuments.us/reader034/viewer/2022052523/555b88fad8b42acd238b4a8b/html5/thumbnails/40.jpg)
Encryption
Only authorized receivers can understand the transmitted data
WPA – encryption security standard for wireless networks
![Page 41: Sowjanya](https://reader034.vdocuments.us/reader034/viewer/2022052523/555b88fad8b42acd238b4a8b/html5/thumbnails/41.jpg)
Novel secure wireless video surveillance system
Video encryption is very important in WLAN environment since everyone can receive the video content and inject faked video packets
![Page 42: Sowjanya](https://reader034.vdocuments.us/reader034/viewer/2022052523/555b88fad8b42acd238b4a8b/html5/thumbnails/42.jpg)
Architecture of secure video wireless system
![Page 43: Sowjanya](https://reader034.vdocuments.us/reader034/viewer/2022052523/555b88fad8b42acd238b4a8b/html5/thumbnails/43.jpg)
Contd.. The video source is capture by the
camera nodes and is compressed and stored in the processor
Authentication information and encryption key is embedded to this
Camera nodes also act as routers and route the encrypted frames to the monitoring center
![Page 44: Sowjanya](https://reader034.vdocuments.us/reader034/viewer/2022052523/555b88fad8b42acd238b4a8b/html5/thumbnails/44.jpg)
Real-time key embedding and key detecting process
![Page 45: Sowjanya](https://reader034.vdocuments.us/reader034/viewer/2022052523/555b88fad8b42acd238b4a8b/html5/thumbnails/45.jpg)
Contd..
New keys are embedded in I-frame (intra frame) of group of pictures (GOP) and directly modulated into the direct current component of discrete cosine transform (DST) coefficients of luminance blocks
All GOPs will be encrypted by a selective encryption algorithms
![Page 46: Sowjanya](https://reader034.vdocuments.us/reader034/viewer/2022052523/555b88fad8b42acd238b4a8b/html5/thumbnails/46.jpg)
Challenges
To improve QoS (video quality, packet loss, delay etc)
High variability of network throughput
Cost
![Page 47: Sowjanya](https://reader034.vdocuments.us/reader034/viewer/2022052523/555b88fad8b42acd238b4a8b/html5/thumbnails/47.jpg)
Future work Rate and quality control
mechanism under lossy conditions Single physical WLAN interface to
access multiple networks simultaneously
In novel secure system, the misbehavior detection capability is limited by the computational power of
![Page 48: Sowjanya](https://reader034.vdocuments.us/reader034/viewer/2022052523/555b88fad8b42acd238b4a8b/html5/thumbnails/48.jpg)
Contd..
the camera nodes. An adaptive mechanism has to be figured out to suit the application
Monitoring center is the only non-distributed component. Some solutions must be found to scale the network size
![Page 49: Sowjanya](https://reader034.vdocuments.us/reader034/viewer/2022052523/555b88fad8b42acd238b4a8b/html5/thumbnails/49.jpg)
Conclusion
Video streaming in wireless networks is one of the upcoming multimedia applications which is still in it’s developing stages.
There are many areas of research to improve it’s performance over wireless networks.
![Page 50: Sowjanya](https://reader034.vdocuments.us/reader034/viewer/2022052523/555b88fad8b42acd238b4a8b/html5/thumbnails/50.jpg)
References Rate control for streaming video over wireless
by Minghua Chen, Avideh Zakhor, August 2005, IEEE http://ieeexplore.ieee.org/iel5/7742/32173/01497856.pdf?tp=&arnumber=1497856&isnumber=32173
Seamless handover of streamed video over UDP in wireless LANs by Ger Cunningham, Philip Perry, Sean Murphy, Liam Murphy http://www.eeng.dcu.ie/~perryp/pub/cunningham4.pdf
![Page 51: Sowjanya](https://reader034.vdocuments.us/reader034/viewer/2022052523/555b88fad8b42acd238b4a8b/html5/thumbnails/51.jpg)
Contd.. Adaptive video streaming in vertical handoff
by Chen L-J, Guang Yang, Gerla M etc, August 2004, IEEE http://ieeexplore.ieee.org/iel5/9259/29413/01331716.pdf?tp=&arnumber=1331716&isnumber=29413
A novel secure wireless video surveillance system based on Intel IXP425 network processor by Hao Yien, Xiaowen Chu, Oxtober 2005, ACM http://delivery.acm.org/10.1145/1090000/1089748/p62-hao.pdf?key1=1089748&key2=6505163411&coll=GUIDE&dl=GUIDE&CFID=72460738&CFTOKEN=4574127