• Title/Summary/Keyword: Segment Scheduling

Search Result 17, Processing Time 0.046 seconds

Segment Scheduling Scheme to Support Seamless DASH-based Live Streaming Service (끊김 없는 DASH 기반 라이브 스트리밍 서비스를 제공하기 위한 세그먼트 스케줄링 기법)

  • Yun, Dooyeol;Chung, Kwangsue
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.7
    • /
    • pp.310-314
    • /
    • 2016
  • Currently, several research studies are looking to improve the quality of DASH (Dynamic Adaptive Streaming over HTTP) based live streaming services. However, conventional DASH based streaming schemes cannot provide seamless playback while maintaining the low buffering and it adversely affects the QoE (Quality of Experience). To address this problem, we propose the QoE driven segment scheduling scheme. The proposed scheme adaptively schedules the segment request message according to the time and variation of segment fetching. Simulation results indicate that the proposed scheme improves the QoE of live streaming service by maintaining the low buffering delay and reducing the buffer underflow events.

TCP-aware Segment Scheduling Method for HTTP Adaptive Streaming (HTTP 적응적 스트리밍을 위한 TCP 인지형 세그먼트 스케줄링 기법)

  • Park, Jiwoo;Chung, Kwangsue
    • Journal of KIISE
    • /
    • v.43 no.7
    • /
    • pp.827-833
    • /
    • 2016
  • HTTP Adaptive Streaming (HAS) is a technique that adapts its video quality to network conditions for providing Quality of Experience. In the HAS approach, a video content is encoded at multiple bitrates and the encoded video content is divided into several video segments. A HAS player estimates the network bandwidth and adjusts the video bitrate based on estimated bandwidth. However, the segment scheduler in the conventional HAS player requests video segments periodically without considering TCP. If the waiting duration for the next segment request is quite long, the TCP connection can be initialized and it restarts slow-start. Slow-start causes the reduction in TCP throughput and consequentially leads to low-quality video streaming. In this study, we propose a TCP-aware segment scheduling scheme to improve performance of HAS service. The proposed scheme adjusts request time for the next video request to prevent initialization of TCP connection and also considers the point of scheduling time. The simulation proves that our scheme improves the Quality of Service of the HAS service without buffer underflow issue.

Segment Scheduling Scheme for Efficient Bandwidth Utilization of UHD Contents Streaming in Wireless Environment (무선 환경에서 UHD 콘텐츠의 효율적인 대역폭 활용을 위한 세그먼트 스케줄링 기법)

  • Kim, Heekwang;Chung, Kwangsue
    • Journal of Broadcast Engineering
    • /
    • v.23 no.6
    • /
    • pp.813-823
    • /
    • 2018
  • UHD content is characterized by higher bandwidth requirements to provide seamless playback. The existing HTTP adaptive streaming scheme periodically requests video segment of lower quality than the available bandwidth in the steady state. In the steady state, the On-Off pattern is repeated due to the difference of the available bandwidth and the encoding rate of the content. And the repeated Off interval is causing the problem that can not efficiently use the available bandwidth. In the wireless environment where the delay and loss rate are higher with large bandwidth fluctuations, this problem is exacerbated because the available bandwidth is estimated inaccurately. Therefore, in this paper, we propose a segment scheduling scheme for efficient bandwidth utilization of UHD contents streaming in wireless environment. Proposed scheme is a group segment that simultaneously reqeusts multiple segments in one request message in order to reduce frequency of OFF interval. Through simulation, Our scheme improves bandwidth utilization.

A Modular Decomposition Model for Software Project Scheduling

  • Kim, Kiseog;Nag, Barin N.
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.18 no.3
    • /
    • pp.129-149
    • /
    • 1993
  • The high level of activity in the development and maintenance of computer software makes the scheduling of software projects an importnat factor in reducing operating costs and increasing competitiveness. Software activity is labor intensive. Scheduling management of hours of software work is complicated by ther interdependencies between the segments of work, and the uncertainties of the work itself. This paper discusses issues of scheduling in software engineering management, and presents a modular decomposition model for software project scheduling, taking advantage of the facility for decomposition of a software project into relatively independent work segment modules. Modular decomposition makes it possible to treat scheduling as clustering and sequencing in the context of integer programming. A heuristic algorithm for the model is presented with some computational experiments.

  • PDF

A Scheduling Algorithm of AP for Alleviating Unfairness Property of Upstream-Downstream TCP Flows in Wireless LAN (무선 랜에서의 상.하향 TCP 플로우 공평성 제고를 위한 AP의 스케쥴링 알고리즘 연구)

  • Lim, Do-Hyun;Seok, Seung-Joon
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.11
    • /
    • pp.1521-1529
    • /
    • 2009
  • There is a serious unfairness problem between upstream and downstream flows of AP in IEEE 802.11 Wireless LAN. This problem is because Wireless LAN's DCF MAC protocol provides AP with equal channel access priority to mobile noded. Also, it makes this problem worse that the TCP's Data segment loss is more effective on throughput than the TCP's ACK segment. In this paper, we first make several simulations to analysis the unfairness in the various point of view and to find reasons of the unfairness. Also, this paper presents AP's scheduling scheme to alleviate the unfairness problem and evaluate the scheme through ns2 simulator.

  • PDF

Novel Bandwidth Scheduling Algorithm for DOCSIS 3.0 Based Multiple Upstream Channels (DOCSIS 3.0 기반의 다중 상향 채널 환경에서 새로운 대역 스케줄링 알고리즘 제안)

  • Jung, Joon-Young;Ahn, Jae-Min
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.11B
    • /
    • pp.1142-1150
    • /
    • 2009
  • In this paper, we propose an novel bandwidth scheduling algorithm for the MAC protocol employed by the Data Over Cable Service Interface Specifications (DOCSIS) 3.0 compliant cable networks. The proposed algorithm statistically improves the chances of request piggybacking to minimize the access delay. It utilizes the piggyback request feature of the segment packets that has been newly specified in DCOSIS 3.0. In DOCSIS 3.0, a bandwidth request can be granted to several upstream channels within an upstream bonding group. The grant on each individual channel is treated as a segment packet. We find the optimal segment placement to minimize the access delay in the proposed algorithm. We also use a self-similar traffic model for simulation and analysis to evaluate the performance of the proposed algorithm.

Implementation of FlexRay Network System using Node-based Scheduling Method (노드 기반 스케줄링 방법을 이용한 FlexRay 네트워크 시스템의 구현)

  • Kim, Man-Ho;Ha, Kyoung-Nam;Lee, Suk;Lee, Kyung-Chang
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.18 no.2
    • /
    • pp.39-47
    • /
    • 2010
  • As vehicles become intelligent for convenience and safety of drivers, in-vehicle networking (IVN) systems are essential components of intelligent vehicles. Recently, the chassis networking system which require increased network capacity and real-time capability is being developed to expand the application area of IVN systems. Also, FlexRay has been developed for the chassis networking system. However, FlexRay needs a complex scheduling method of static segment, which is a barrier for implementing the chassis networking system. Especially, if we want to migrate from CAN network to FlexRay network using CAN message database that was well constructed for the chassis networking system by automotive vendors, a novel scheduling method is necessary to be able to reduce design complexity. This paper presents a node-based scheduling method for FlexRay network system. And, in order to demonstrate the method's feasibility, its performance is evaluated through an experimental testbed.

Improving Network Utilization in FlexRay Using Reallocation of Static Message (정적 메시지 재할당을 이용한 FlexRay 네트워크 사용효율 개선 기법)

  • Seo, Byungseok;Jin, Sungho;Lee, Dongik
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.21 no.5
    • /
    • pp.113-120
    • /
    • 2013
  • This paper presents a mathematical model to determine the optimal length of static messages that can achieve more efficient use of a FlexRay network. In order to determine the optimal length of static message, the proposed model evaluates the given set of messages with respect to a network utilization index, which is defined in this work. The efficient use of a FlexRay network is achieved by reallocating any static message whose length is equal or greater than the resulting value to the dynamic segment. The effectiveness of the proposed method is investigated by applying to the SAE benchmark data.

Sequential Pattern Mining for Customer Retention in Insurance Industry (보험 고객의 유지를 위한 순차 패턴 마이닝)

  • Lee, Jae-Sik;Jo, Yu-Jeong
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2005.05a
    • /
    • pp.274-282
    • /
    • 2005
  • Customer retention is one of the major issued in life insurance industry, in which competition is increasingly fierce. There are many things to do to retain customers. One of those things is to be continuously in touch with all customers. The objective of this study is to design the contact scheduling system(CSS) to support the planers who must touch the customers without having subjective information. Support-planers suffer from lack of information which can be used to intimately touch. CSS that is developed in this study generates contact schedule to touch customers by taking into account existing contact history. CSS has a two stage process. In the first stage, it segments customers according to his or her demographics and contract status data. Then it finds typical pattern and pattern is combined to business rules for each segment. We expert that CSS would support support-planers to make uncontacted customers' experience positive.

  • PDF

Polymorphic Path Transferring for Secure Flow Delivery

  • Zhang, Rongbo;Li, Xin;Zhan, Yan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.8
    • /
    • pp.2805-2826
    • /
    • 2021
  • In most cases, the routing policy of networks shows a preference for a static one-to-one mapping of communication pairs to routing paths, which offers adversaries a great advantage to conduct thorough reconnaissance and organize an effective attack in a stress-free manner. With the evolution of network intelligence, some flexible and adaptive routing policies have already proposed to intensify the network defender to turn the situation. Routing mutation is an effective strategy that can invalidate the unvarying nature of routing information that attackers have collected from exploiting the static configuration of the network. However, three constraints execute press on routing mutation deployment in practical: insufficient route mutation space, expensive control costs, and incompatibility. To enhance the availability of route mutation, we propose an OpenFlow-based route mutation technique called Polymorphic Path Transferring (PPT), which adopts a physical and virtual path segment mixed construction technique to enlarge the routing path space for elevating the security of communication. Based on the Markov Decision Process, with considering flows distribution in the network, the PPT adopts an evolution routing path scheduling algorithm with a segment path update strategy, which relieves the press on the overhead of control and incompatibility. Our analysis demonstrates that PPT can secure data delivery in the worst network environment while countering sophisticated attacks in an evasion-free manner (e.g., advanced persistent threat). Case study and experiment results show its effectiveness in proactively defending against targeted attacks and its advantage compared with previous route mutation methods.