Internet and Multimedia Communications

Author(s):  
Dimitris Kanellopoulos ◽  
Sotiris Kotsiantis ◽  
Panayotis Pintelas

Multimedia communications involve digital audio and video and impose new quality of service (QoS) requirements on the Internet (Lu, 2000). Different multimedia applications have different QoS requirements. For example, continuous media types such as audio and video require hard or soft bounds on the end-to-end delay, while discrete media such as text and images do not have any strict delay constrains. In addition, video applications require more bandwidth than audio applications. QoS requirements are specified by the following four closely related parameters: (1) bandwidth on demand; (2) low end-to-end delay; (3) low delay variation (or delay jitter); and (4) acceptable error or loss rate without retransmission, as the delay would be intolerable with retransmission. Multimedia applications are classified into the following three categories: • Two-way conversational applications, which are characterized by their stringent requirement on endto- end delay that includes total time taken to capture, digitize, encode/compress audio/video data, transport them from the source to the destination, and decode and display them to the user. • Broadcasting services where the source is live. The main dissimilarity from the conversational applications is that it is one-way communication and it can stand more delay. • On-demand applications (e.g., video on demand) where the user requests some stored items and the server delivers them to the user. In designing and implementing multimedia applications, the characteristics of these application types should be used to provide required QoS, but using network and system resources efficiently. Even though we say that QoS should be guaranteed, the user states the degree of guarantees. Usually, there are three levels of guarantees: • Hard guarantee, where user-specified QoS should be met absolutely. Reserving network and system resources based on the peak-bit rate of a stream achieves hard guarantees. • Soft guarantee, where user-specified QoS is supposed to be met to a certain precise percentage. This is suitable for continuous media, as they usually do not need 100% accuracy in playback. This type of guarantee uses system resources more efficiently. • Best effort, where no guarantee is given and the multimedia application is executed with whatever resources are available. More networks function in this mode. These different types of guarantees may all be needed in a multimedia session established using proper association control protocols such as C_MACSE (Kanellopoulos & Kotsiantis, 2006). Different levels of guarantee are used for different types of traffic and the user determines which type of guarantee to use. Besides, the charging policy is related to the level of guarantee and the most expensive is the hard guarantee, while the best effort is the cheapest. At the source, multimedia data are either captured live or retrieved from storage devices. The transport module accepts these data, packetizes and passed them on to the Internet. At the destination (sink), multimedia data are reassembled and passed to the application for playback of audio/video. Packet processing time differences, network access time differences, and queuing delay difference can cause delay jitter, which has to be removed at the destination before data being played out.

Author(s):  
Mohammed A. Moharrum ◽  
Stephan Olariu ◽  
Hussein Abdel-Wahab

The objective of this chapter is to introduce the reader to a general architectural framework for a broad array of retrievals of multimedia data required by various applications. This framework contains more than the traditional client/server architecture and even more than the existing three-tier architectures. This chapter introduces the reader to many critical issues involved in multimedia retrieval over the Internet. A new architectural framework is proposed to cover a variety of multimedia applications over the Internet and the World Wide Web. This framework has the three main objectives of (1) proposing a layered architecture to facilitated design and separate different issues, (2) covering a large number of multimedia applications, and finally, (3) making use of existing and well-established technology, such as Mobile Agents, SQL databases, and cache managements schemes. The proposed architectural framework separates issues involved in multimedia retrieval into five layers, namely: keyword searching and data servers, proxy servers, domain and department archives, mobile user agents, and the users. Through these five layers, various customized solutions to a large array of problems will be proposed and applied. The chapter offers, but is not limited to, solutions for different problems that arise in retrieval of multimedia data. A list of important open problems is identified at the end of the chapter.


Author(s):  
Marco Roccetti ◽  
Stefano Ferretti

The transmission of speech over the Internet is often dismissed as an impractical application because of the poor quality experienced by many users of Internet audio tools. In fact, while Internet audio services are required to operate in a bandwidth-, delay-, and packet loss-constrained environment, the actual best-effort service offered by the Internet architecture does not provide any guarantee on the delivery of data packets. Thus, it often occurs that very high packet delay, delay jitter and packet loss are experienced over many congested Internet links.


2018 ◽  
Vol 2018 ◽  
pp. 1-25 ◽  
Author(s):  
Debajyoti Pal ◽  
Tuul Triyason

Over the past few years there has been an exponential increase in the amount of multimedia data being streamed over the Internet. At the same time, we are also witnessing a change in the way quality of any particular service is interpreted, with more emphasis being given to the end-users. Thus, silently there has been a paradigm shift from the traditional Quality of Service approach (QoS) towards a Quality of Experience (QoE) model while evaluating the service quality. A lot of work that tries to evaluate the quality of audio, video, and multimedia services over the Internet has been done. At the same time, research is also going on trying to map the two different domains of quality metrics, i.e., the QoS and QoE domain. Apart from the work done by individual researchers, the International Telecommunications Union (ITU) has been quite active in this area of quality assessment. This is obvious from the large number of ITU standards that are available for different application types. The sheer variety of techniques being employed by ITU as well as other researchers sometimes tends to be too complex and diversified. Although there are survey papers that try to present the current state of the art methodologies for video quality evaluation, none has focused on the ITU perspective. In this work, we try to fill up this void by presenting up-to-date information on the different measurement methods that are currently being employed by ITU for a video streaming scenario. We highlight the outline of each method with sufficient detail and try to analyze the challenges being faced along with the direction of future research.


2017 ◽  
Vol 1 (1) ◽  
Author(s):  
Sherly Gina Supratman

AbstrakJaringan Komunikasi seperti Internet� merupakan jaringan yang tidak aman untuk mentransmisi data, seperti teks, audio,video dan citra digital. Salah satu cara untuk pengamanan data dapat dilakukan dengan menggunakan proses kriptografi dan �steganografi. Penggunaan ini dengan tujuan untuk merahasiakan pesan yang dikirim dan sekaligus menghindarkan pesan tersebut dari kecurigaan pihak lain yang tidak berkepentingan.Pesan yang digunakan dalam makalah ini adalah berupa text dengan menyisipkannya pada gambar. Pada proses kriptografi, pesan yang berupa text akan dienkrip dengan algoritma Hill Chiper, dan kemudian pesan yang telah dienkrip akan dilakukan proses steganografi pada citra digital� 8 bit dengan skala 0 � 255, dengan metode Least Significant Bit ( LSB ).�Kata kunci: Kriptografi, Hill Chiper, Steganografi, Least Significant Bit�AbstractCommunication Networks such as the Internet are unsafe networks for transmitting data, such as text, audio, video and digital imagery. One way to secure data can be done by using cryptography and steganography process. This use is for the purpose of concealing messages being transmitted and avoiding such messages from the suspicion by others who are not interested.The message used in this paper is text by inserting it in the image. In the cryptographic process, text messages will be encrypted with the Hill Chiper algorithm, and then the encrypted message will be steganographed on 8-bit digital images on a scale of 0-255, using the Least Significant Bit (LSB) method.�Keywords: Cryptography, Hill Chiper, Steganography, Least Significant Bit


Author(s):  
Rajesh Kumar Verma ◽  
Chhabi Rani Panigrahi ◽  
Bibudhendu Pati ◽  
Joy Lal Sarkar

Background & Objective: Multimedia aggregates various types of media such as audio, video, images, animations, etc., to form a rich media content which produces an everlasting effect in the minds of the people. Methods: In order to process multimedia applications using mobile devices, we encounter a big challenge as these devices have limited resources and power. To address these limitations, in this work, we have proposed an efficient approach named as mMedia, wherein multimedia applications will utilize the multi cloud environment using Mobile Cloud Computing (MCC), for faster processing. The proposed approach selects the best available network. The authors have also considered using the Lyapunov optimization technique for efficient transmission between the mobile device and the cloud. Results: The simulation results indicate that mMedia can be useful for various multimedia applications by considering the energy delay tradeoff decision. Conclusion: The results have been compared alongside the base algorithm SALSA on the basis of different parameters like time average queue backlog, delay and time average utility and indicate that the mMedia outperforms in all the aspects.


2019 ◽  
Vol 37 (5) ◽  
pp. 890-894 ◽  
Author(s):  
Garrison Nord ◽  
Kristin L. Rising ◽  
Roger A. Band ◽  
Brendan G. Carr ◽  
Judd E. Hollander
Keyword(s):  

Author(s):  
I Made Suartana ◽  
Henni Endah Wahanani ◽  
Aditia Mieka Darminta

Layanan multimedia melalui jaringan internet seperti, teknologi Voice over IP (VoIP), video on-demand (VoD), IP television (IPTV), konferensi video beresolusi tinggi dan beberapa aplikasi real time, akhir-akhir ini trafiknya terus meningkat. Layanan multimedia memiliki persyaratan QoS yang tinggi terhadap loss, delay, jitter, dll. Ada banyak faktor yang menyebabkan penurunan kualitas layanan multimedia pada jaringan seperti penggunaan protokol routing dan termasuk juga mekanisme keamanan yang digunakan pada jaringan. Memiliki sistem komunikasi yang aman itu penting, baik untuk urusan bisnis atau pribadi, tetapi penting juga untuk menjaga kinerja dari layanan karena mekanisme keamanan memiliki efek menurunkan kualitas layanan multimedia. Penelitian ini ini membahas pengukuran dan analisa pengaruh routing protokol dan mekanisme keamanan pada kualitas layanan multimedia dengan menggunakan simulai aplikasi atau layanan VoIP sebagai ujicoba. Berdasarkan hasil simulasi didapatkan hasil pengaruh dari penerapan mekanisme keamanan pada layanan VoIP delay untuk komunikasi VoIP dengan media transmisi yang secure dan delay pada proses pensinyalan meningkat 4,22%.


2021 ◽  
Vol 10 (1) ◽  
pp. 493-500
Author(s):  
Roshidi Din ◽  
Reema Ahmed Thabit ◽  
Nur Izura Udzir ◽  
Sunariya Utama

The enormous development in the utilization of the Internet has driven by a continuous improvement in the region of security. The enhancement of the security embedded techniques is applied to save the intellectual property. There are numerous types of security mechanisms. Steganography is the art and science of concealing secret information inside a cover media such as image, audio, video and text, without drawing any suspicion to the eavesdropper. The text is ideal for steganography due to its ubiquity. There are many steganography embedded techniques used Arabic language to embed the hidden message in the cover text. Kashida, Shifting Point and Sharp-edges are the three Arabic steganography embedded techniques with high capacity. However, these three techniques have lack of performance to embed the hidden message into the cover text. This paper present about traid-bit method by integrating these three Arabic text steganography embedded techniques. It is an effective way to evaluate many embedded techniques at the same time, and introduced one solution for various cases.


Sign in / Sign up

Export Citation Format

Share Document