Cross-Layer Protocols for Multimedia Communications over Wireless Networks

Author(s):  
Jaydip Sen

In the last few years, the Internet throughput, usage, and reliability have increased almost exponentially. The introduction of broadband wireless mobile ad hoc networks (MANETs) and cellular networks, together with increased computational power, have opened the door for a new breed of applications to be created; namely, real-time multimedia applications. Delivering real-time multimedia traffic over a complex network like the Internet is a particularly challenging task since these applications have strict quality-of-service (QoS) requirements on bandwidth, delay, and delay jitter. Traditional Internet protocol (IP)-based best effort service is not able to meet these stringent requirements. The time-varying nature of wireless channels and resource constrained wireless devices make the problem even more difficult. To improve perceived media quality by end users over wireless Internet, QoS supports can be addressed in different layers, including application layer, transport layer, and link layer. Cross layer design is a well-known approach to achieve this adaptation. In cross-layer design, the challenges from the physical wireless medium and the QoS-demands from the applications are taken into account so that the rate, power, and coding at the physical (PHY) layer can be adapted to meet the requirements of the applications given the current channel and network conditions. A number of propositions for cross-layer designs exist in the literature. In this chapter, an extensive review has been made on these cross-layer architectures that combine the application-layer, transport layer, and the link layer controls. Particularly, issues like channel estimation techniques, adaptive controls at the application and link layers for energy efficiency, priority based scheduling, transmission rate control at the transport layer, and adaptive automatic repeat request (ARQ) are discussed in detail.

2022 ◽  
Vol 355 ◽  
pp. 02040
Author(s):  
Jinxue Cui ◽  
Bin Han

The design and implementation of the MVB conformance test system is of great significance in both professional theory and practical application. Conformance test for MVB, mainly to determine whether the MVB equipment IUT is consistent with the MVB protocol standard requirements in the TCN standard. The conformance test of MVB equipment IUT covers most of the contents of the RTP real-time protocol such as the physical layer, link layer, network layer, transport layer and application layer. This subject will analyse and study the consistency test of the MVB physical layer.


Author(s):  
Lokesh S ◽  
Jayasri B. S

A Cross Layered framework is an important concept in today’s world given the abundant usage of both single-path and multi path wireless network architectures. One of the important design issues in the development of a robust framework such as this is the design of an Optimization Agent or an OA. In recent days of wireless and wired ad-hoc networks, cross-layer design was brought about a few years back to explore attached optimization at different layers. In order to describe solutions in cross-layered design, the Open System Intercommunications model was employed. However, it is clear that no voice and reference mechanism exists to aid optimization, which could effectively halt effective adaptability and deployment of cross-layered solutions. In this study, we suggest some hypotheses regarding how to model and create cross-layer solutions using the OSI layered method. We use the aforementioned method to analyse and simulate a particular type of cross-layered solution, namely energy-aware routing protocols. We use a layered approach to examine two proposals that are accessible in the literature. The applied strategy leads to the creation of an energy- aware, one-of-a-kind solution that outperforms prior versions and provides interesting and clear insights into the function that each layer plays in the overall optimization process. The network throughput, utilization, and reliability have all increased practically rapidly in the last few years. With the emergence of broadband wireless and wired cellular networks, as well as mobile adhoc networks (MANETs) and improved computational capacity, a new generation of apps, especially real-time multimedia applications, has emerged. Delivering real-time multimedia traffic across a sophisticated network like the Internet could be a particularly difficult undertaking, as these applications have stringent bandwidth and other quality-of-service (QoS) requirements.


2005 ◽  
Vol 12 (4) ◽  
pp. 59-65 ◽  
Author(s):  
E. Setton ◽  
Taesang Yoo ◽  
Xiaoqing Zhu ◽  
A. Goldsmith ◽  
B. Girod

2007 ◽  
Vol 3 (3) ◽  
pp. 199 ◽  
Author(s):  
Chin-Tser Huang ◽  
Manton Matthews ◽  
Matthew Ginley ◽  
Xinliang Zheng ◽  
Chuming Chen ◽  
...  

Effectively adding security measures to a multicast service is an intriguing problem, especially when the service isdeployed in a wireless setting. Next generation IEEE 802.16standard WirelessMAN networks are a perfect example of this problem, and the latest draft specification of the standard includes a secure protocol solution called Multicast and Broadcast Rekeying Algorithm (MBRA). In this paper, we expose the security problems of MBRA, including non-scalability and omission of backward and forward secrecy, and propose new approaches, ELAPSE and ELAPSE+, to address these problems. In particular, ELAPSE+ makes use of membership and mobility information gathered in the application layer to augment the adaptive group management in the MAC layer. We analyze the security property of ELAPSE and ELAPSE+, and compare their performances with MBRA by simulating group rekeying scenarios.


Sign in / Sign up

Export Citation Format

Share Document