An application level video gateway
Proceedings of the third ACM international conference on Multimedia
An architecture for active networking
HPN '97 Proceedings of the IFIP TC6 seventh international conference on High performance netwoking VII
A survey of programmable networks
ACM SIGCOMM Computer Communication Review
Active Concealment for Internet Speech Transmission
IWAN '00 Proceedings of the Second International Working Conference on Active Networks
A Flexible IP Active Networks Architecture
IWAN '00 Proceedings of the Second International Working Conference on Active Networks
Multicasting Multimedia Streams with Active Networks
LCN '98 Proceedings of the 23rd Annual IEEE Conference on Local Computer Networks
ICASSP '99 Proceedings of the Acoustics, Speech, and Signal Processing, 1999. on 1999 IEEE International Conference - Volume 02
A survey of active network research
IEEE Communications Magazine
Protocol boosters: applying programmability to network infrastructures
IEEE Communications Magazine
Hi-index | 0.00 |
Active networks have been recently highlighted as a key enabling technology to obtain immense flexibility in terms of network deployment, configurability, and customized packet processing. However, this flexibility is often achieved at the cost of router performance. In this paper, we present a three-level node architecture that combines flexibility and high performance of network nodes. We design and implement an active network application for real-time speech transmissions on top of this three-level platform. In our application, plug-in modules are downloaded onto certain network nodes to monitor packet loss rate of voice streams and to perform application-specific packet processing when necessary. In particular, we propose to perform loss concealment algorithms for voice data streams at active network nodes to regenerate lost packets. The regenerated speech data streams are robust enough to tolerate further packet losses along the data path so that the concealment algorithms at another downstream node or at the receiver can still take effect. We call our approach reactive concealment for speech transmission to distinguish it from concealment performed at the receiver and also proactive schemes like Forward Error Correction. Our approach is bandwidth-efficient and retains the applications' end-to-end semantics.