Generalized sequence-based and reverse sequence-based models for broadcasting hot videos
IEEE Transactions on Multimedia
SARNOFF'09 Proceedings of the 32nd international conference on Sarnoff symposium
Reliable application layer multicast over combined wired and wireless networks
IEEE Transactions on Multimedia
Designing a collector overlay architecture for fault diagnosis in video networks
Computer Communications
SLDRT: A measurement technique for available bandwidth on multi-hop path with bursty cross traffic
Computer Networks: The International Journal of Computer and Telecommunications Networking
Available bandwidth estimation for the network paths with multiple tight links and bursty traffic
Journal of Network and Computer Applications
Hi-index | 0.00 |
Measurement of end-to-end available bandwidth has received considerable attention due to its potential use in improving QoS. Available bandwidth enables the sending rate to adapt to network conditions, so that packet loss, caused by congestion, can be significantly reduced before error control mechanisms are finally employed. To this end, we propose a probing noise resilient available bandwidth estimation scheme, called JitterPath, which is adaptive to both the fluid and bursty traffic models. Two key factors, one-way delay jitter and accumulated queuing delay, are both exploited to predict the type of queuing region for each packet pair. Then, the bottleneck utilization information included in the joint queuing regions is estimated and used to quantify the captured traffic ratio, which indicates the relationship between the probing rate and available bandwidth. The contributions of our method are as follows: 1) JitterPath can work without being restricted to fluid traffic models; 2) since JitterPath does not directly use the bottleneck link capacity to calculate the available bandwidth, it is feasible for use in a multihop environment with a single bottleneck; and 3) JitterPath inherently reduces the impact of probing noises under the bursty cross traffic model. Extensive simulations, Internet experiments, and comparisons with other methods were conducted to verify the effectiveness of our method under both single-hop and multihop environments