• Title/Summary/Keyword: Internet video transmission

Search Result 201, Processing Time 0.021 seconds

Convergence of Broadcasting and Communication in Home Network using E-PON based Home Gateway (EPON 기반 홈게이트웨이를 이용한 댁내 망에서의 방송통신 융합 서비스)

  • Park Wanki;Kim Daeyoung
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.42 no.6 s.336
    • /
    • pp.9-16
    • /
    • 2005
  • In this paper, we focus on supporting the convergence of broadcasting and communication in home network systems with E-PON based home gateway. We propose a new architecture to provide broadcasting and data services in integrated home network using overlay transport mechanism in access network and If multicast techniques of IGMP and IGMP snooping in home network. We also detail a set of mechanisms and procedures for home broadcasting service through the home gateway system. Our new scheme is composed of three parts: a) an overlay transmission model of video broadcasting signals (satellite and/or cable TV) and Internet data, b) to select a specific video broadcasting channel and to make of the selected video broadcasting stream into IP multicast packets in tuner/conversion module using multiple tuner system and c) to transfer the converted If multicast packets to L2 switch of home gateway's core module and to send them out to target port(s) by L2 multicast using IGMP snooping.

Efficient Video Streaming Based on the TCP-Friendly Rate Control Scheme (TCP 친화적인 전송률 제어기법 기반의 효율적인 비디오 스트리밍)

  • Lee, Jungmin;Lee, Sunhun;Chung, Kwangsue
    • Journal of Broadcast Engineering
    • /
    • v.10 no.3
    • /
    • pp.297-312
    • /
    • 2005
  • The multimedia traffic of continuous video and audio data via streaming service accounts for a significant and expanding portion of the Internet traffic. This streaming data delivery is mostly based on RTP with UDP. However, UDP does not support congestion control. For this reason, UDP causes the starvation of congestion controlled TCP traffic which reduces its bandwidth share during overload situation. In this paper, we propose a new TCP-friendly rate control scheme called 'TF-RTP(TCP-Friendly RTP)'. In the congested network state, the TF-RTP exactly estimates the competing TCP's throughput by using the modified parameters. Then, it controls the sending rate of the video streams. Therefore, the TF-RTP adjusts its sending rate to TCP-friendly and fair share with competing TCP traffics. Through the simulation, we prove that the TF-RTP correctly estimates the TCP's throughput and improves the TCP-friendliness and fairness.

Measures to improve mobile communication propagation environment by linking small cells in a small closed environment (소규모 폐쇄 환경에서 스몰 셀을 연계한 이동통신 전파환경 개선방안)

  • YounGjin kim;Beomseok Chae;HyungJin kim
    • Smart Media Journal
    • /
    • v.13 no.1
    • /
    • pp.52-59
    • /
    • 2024
  • This paper proposes a plan to improve the reception radio environment of the mobile terminal and maintain a constant reception electric field by using small cells in a small closed environment. In order to configure an efficient communication infrastructure for small cells, both ends of wireless transmission and reception of an Ethernet-based wireless video recording system are connected using an L2 switch. The small cell connected to the receiving side L2 switch shares the wireless network section of the wireless video recording system and connects to the transmitting side L2 switch. After that, when it is normally linked to FMS, a management system for small cells, through the Internet network, the output of small cells is checked. In order to verify the results, a proposed network is formed on the elevator inside the building with a poor radio wave environment, and the radio wave environment is measured before and after the small cell application in the section where the elevator operates. As a result, the main parameters of the radio wave environment in all sections of the elevator are improved, as well as a constant receiving electric field strength within the moving elevator.

High Quality Video Streaming System in Ultra-Low Latency over 5G-MEC (5G-MEC 기반 초저지연 고화질 영상 전송 시스템)

  • Kim, Jeongseok;Lee, Jaeho
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.2
    • /
    • pp.29-38
    • /
    • 2021
  • The Internet including mobile networks is developing to overcoming the limitation of physical distance and providing or acquiring information from remote locations. However, the systems that use video as primary information require higher bandwidth for recognizing the situation in remote places more accurately through high-quality video as well as lower latency for faster interaction between devices and users. The emergence of the 5th generation mobile network provides features such as high bandwidth and precise location recognition that were not experienced in previous-generation technologies. In addition, the Mobile Edge Computing that minimizes network latency in the mobile network requires a change in the traditional system architecture that was composed of the existing smart device and high availability server system. However, even with 5G and MEC, since there is a limit to overcome the mobile network state fluctuations only by enhancing the network infrastructure, this study proposes a high-definition video streaming system in ultra-low latency based on the SRT protocol that provides Forward Error Correction and Fast Retransmission. The proposed system shows how to deploy software components that are developed in consideration of the nature of 5G and MEC to achieve sub-1 second latency for 4K real-time video streaming. In the last of this paper, we analyze the most significant factor in the entire video transmission process to achieve the lowest possible latency.

A Fast Error Concealment Using a Data Hiding Technique and a Robust Error Resilience for Video (데이터 숨김과 오류 내성 기법을 이용한 빠른 비디오 오류 은닉)

  • Kim, Jin-Ok
    • The KIPS Transactions:PartB
    • /
    • v.10B no.2
    • /
    • pp.143-150
    • /
    • 2003
  • Error concealment plays an important role in combating transmission errors. Methods of error concealment which produce better quality are generally of higher complexity, thus making some of the more sophisticated algorithms is not suitable for real-time applications. In this paper, we develop temporal and spatial error resilient video encoding and data hiding approach to facilitate the error concealment at the decoder. Block interleaving scheme is introduced to isolate erroneous blocks caused by packet losses for spatial area of error resilience. For temporal area of error resilience, data hiding is applied to the transmission of parity bits to protect motion vectors. To do error concealment quickly, a set of edge features extracted from a block is embedded imperceptibly using data hiding into the host media and transmitted to decoder. If some part of the media data is damaged during transmission, the embedded features are used for concealment of lost data at decoder. This method decreases a complexity of error concealment by reducing the estimation process of lost data from neighbor blocks. The proposed data hiding method of parity bits and block features is not influence much to the complexity of standard encoder. Experimental results show that proposed method conceals properly and effectively burst errors occurred on transmission channel like Internet.

Development of a Scalable Clustering A/V Server for the Internet Personal-Live Broadcasting (인터넷 개인 생방송을 위한 Scalable Clustering A/V Server 개발)

  • Lee, Sang-Moon;Kang, Sin-Jun;Min, Byung-Seok;Kim, Hag-Bae;Park, Jin-Bae
    • The KIPS Transactions:PartC
    • /
    • v.9C no.1
    • /
    • pp.107-114
    • /
    • 2002
  • In these days, rapid advances of the computer system and the high speed network have made the multimedia services popularized among various applications and services in the internet. Internet live broadcasting, a part of multimedia services, makes it possible to provide not only existing broadcasting services including audio and video but also interactive communications which also expand application scopes by freeing from both temporal and spatial limitation. In the Paper, an interned Personal-live broadcasting server system is developed by allowing individual users to actively create or join live-broadcasting services with such basic multimedia devices as a PC camera and a sound card. As the number of broadcasters and participants increases, concurrent multiple channels are established and groups are to be expanded. The system should also guarantee High Availability (HA) for continuous services even in the presence of partial failure of the cluster. Furthermore, a transmission mode switching is supported to consider network environments in the user system.

The Sequential Effects of WebCam Wireless Moritoring Service on Customer Loyalty (웹캠 무선원격 모니터링 서비스가 고객충성도에 미치는 영향에 관한 연구)

  • Ryu, In-Soo;Chae, Myung-Sin
    • Journal of Internet Computing and Services
    • /
    • v.10 no.6
    • /
    • pp.51-79
    • /
    • 2009
  • Today the service industry is growing, and differentiated services for marketing and service quality is emerging as a serious problem. Until now, the WebCam is used for observation, and the negative aspects, such as from a human rights issue has become. Discipline and Punish is not to use a webcam to customer satisfaction research is needed. Therefore, wireless monitoring in WebCam service quality of the service reconfiguration and service quality factors for the configuration of the customer's preference regarding how research was recognized. Configuration of the service quality factors WebCam service customer satisfaction and customer loyalty was to identify factors that affect. These services to study the correlation between the quality variables WebCam provides wireless monitoring services for the preschool and children, a survey of the house. Configuring a wireless monitoring service quality in order to research the factors WebCam video quality and transmission speed, mobility and portability, convenience, visibility, reliability, and the interaction of the castle set. Severely and video quality and transmission speed, visibility, reliability, customer satisfaction, the interaction factors are said. Inclination to participate in social issues, innovation, digital devices that use a skilled, depending on the difference in the service quality has been confirmed. However, the age and quality of service awareness and job types showed a low correlation, and the marketing of these results will be discussed and how that can be used.

  • PDF

Multi-View Video System using Single Encoder and Decoder (단일 엔코더 및 디코더를 이용하는 다시점 비디오 시스템)

  • Kim Hak-Soo;Kim Yoon;Kim Man-Bae
    • Journal of Broadcast Engineering
    • /
    • v.11 no.1 s.30
    • /
    • pp.116-129
    • /
    • 2006
  • The progress of data transmission technology through the Internet has spread a variety of realistic contents. One of such contents is multi-view video that is acquired from multiple camera sensors. In general, the multi-view video processing requires encoders and decoders as many as the number of cameras, and thus the processing complexity results in difficulties of practical implementation. To solve for this problem, this paper considers a simple multi-view system utilizing a single encoder and a single decoder. In the encoder side, input multi-view YUV sequences are combined on GOP units by a video mixer. Then, the mixed sequence is compressed by a single H.264/AVC encoder. The decoding is composed of a single decoder and a scheduler controling the decoding process. The goal of the scheduler is to assign approximately identical number of decoded frames to each view sequence by estimating the decoder utilization of a Gap and subsequently applying frame skip algorithms. Furthermore, in the frame skip, efficient frame selection algorithms are studied for H.264/AVC baseline and main profiles based upon a cost function that is related to perceived video quality. Our proposed method has been performed on various multi-view test sequences adopted by MPEG 3DAV. Experimental results show that approximately identical decoder utilization is achieved for each view sequence so that each view sequence is fairly displayed. As well, the performance of the proposed method is examined in terms of bit-rate and PSNR using a rate-distortion curve.

A Restricted retransimission Mechanism for Error Recovery in a Multicast Group (멀티캐스트 그룹에서의 오류 회복을 위한 재전송 제한 기법)

  • Kim, Eun-Suk;Choe, Jong-Won
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.8
    • /
    • pp.957-965
    • /
    • 1999
  • 그룹간 공동 작업이나 화상 회의와 같은 그룹 통신의 수요가 늘어나면서 멀티캐스팅을 이용한 효율적인 데이타 전송에 대한 요구가 증가하고 있다. 특히 오디오나 비디오 데이타와는 달리 공동 문서 작업이나 그룹간 문서 전송을 위한 데이타 처리를 위해서는 어느 정도의 시간 손실이 있더라도 신뢰성을 보장할 수 있는 멀티캐스트 프로토콜이 요구된다. 그러나 멀티캐스트 전송에서의 신뢰성을 보장하기 위하여 손실 패킷에 대한 재전송 패킷이 전체 그룹으로 멀티캐스트 되는 것은 네트워크 상에 트래픽을 폭증시키는 요인이 된다. 이에 본 논문에서는 지역 그룹에서의 오류 회복을 위한 재전송 제한 기법을 제안하여 손실 패킷의 재전송 과정에서 발생하는 트래픽의 폭주를 제어하고자 한다. 이것은 재전송 패킷이 중복없이 다중 수신자에게 전송될 수 있도록 하여 그룹 내의 재전송 패킷의 양을 줄이고 필요없는 중복 패킷이 네트워크의 효율을 저하시키는 것을 방지하고자 하는 데 그 목적이 있다. Abstract As the size and the geographic span of communication groups increases, efficient data transmission schemes using Multicast service become more and more essential. Especially, unlike audio and video applications, for some collaborative applications and other data delivery components which require ordered and lossless delivery of data, Reliable Multicast Service is needed to ensure consistent presentation across multiple views. Thus error recovery by retransmission of loss data is provided in order to guarantee the reliability of multicast transmission protocol. However, redundant retransmission packets by multicast may cause traffic implosion on the Internet and it can be aggravated with continuous retransmission.This paper describes a Restricted Retransmission Mechanism as an error recovery method of multicast service in a local group, which can handle traffic implosion in retransmission process. It reduces redundant retransmission packets flowing into a local group and supports reliable multicast transmission. The goal of this mechanism is to reduce retransmission packets and decrease the load for group members and networks.

High-Capacity Robust Image Steganography via Adversarial Network

  • Chen, Beijing;Wang, Jiaxin;Chen, Yingyue;Jin, Zilong;Shim, Hiuk Jae;Shi, Yun-Qing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.366-381
    • /
    • 2020
  • Steganography has been successfully employed in various applications, e.g., copyright control of materials, smart identity cards, video error correction during transmission, etc. Deep learning-based steganography models can hide information adaptively through network learning, and they draw much more attention. However, the capacity, security, and robustness of the existing deep learning-based steganography models are still not fully satisfactory. In this paper, three models for different cases, i.e., a basic model, a secure model, a secure and robust model, have been proposed for different cases. In the basic model, the functions of high-capacity secret information hiding and extraction have been realized through an encoding network and a decoding network respectively. The high-capacity steganography is implemented by hiding a secret image into a carrier image having the same resolution with the help of concat operations, InceptionBlock and convolutional layers. Moreover, the secret image is hidden into the channel B of carrier image only to resolve the problem of color distortion. In the secure model, to enhance the security of the basic model, a steganalysis network has been added into the basic model to form an adversarial network. In the secure and robust model, an attack network has been inserted into the secure model to improve its robustness further. The experimental results have demonstrated that the proposed secure model and the secure and robust model have an overall better performance than some existing high-capacity deep learning-based steganography models. The secure model performs best in invisibility and security. The secure and robust model is the most robust against some attacks.