Beruflich Dokumente
Kultur Dokumente
7 Appl.
For this, we subdivide the higher layers of the Multimedia
Communication System into two subsytems: 6 Present. Appl.
5 Session
Communication Requirements:
– Highspeed networks with high transfer rates
e.g.: FDDI, Switched Ethernet, Fast Ethernet,
Gigabit Ethernet, DQDB, ATM, ... Transport Subsystems
– High performance transport protocols
e.g.: TCP, XTP, ATM transport protocols
9. Multimedia Communication Systems
9.2 Cooperative Computing / Application Subsystem
Cooperation-transparent systems
– Existing application extended for cooperation
(Single user document editors expanded for simultaneous editing of a shared
document among several users, e.g. some text processors)
Cooperation-aware systems
– Dedicated software application for CSCW
(e.g. Lotus Notes, conferencing systems)
9. Multimedia Communication Systems
9.2 Cooperative Computing / Group Communication Architecture
Conferencing Conferencing
Communication Communication
(Transport) Support (Transport) Support
Conferencing
Communication
(Transport) Support
9. Multimedia Communication Systems
9.2 Cooperative Computing / Group Communication Architecture
Group communication:
– synchronous or
– asynchronous communication of multiple users
Support Model:
– With group communication agents (cooperating via a multicast network)
– Group rendevous (organization of meetings and delivering information)
– Shared applications (simultaneous replication and modification of information
to multiple users, e.g. telepointing, joint editing)
– Conferencing
System Model:
– client-server model
Interface Model:
– exchanging information within the support model (object oriented)
9. Multimedia Communication Systems
9.2 Cooperative Computing / Group Communication Architecture
Clients:
– User interfaces supporting interaction between group memebrs and the system
Servers:
– Specialized servers for different tasks of the group communication work, e.g.
· Conference server
Centralized:
é Single copy of the shared application runs at one site
é All input forwarded to the local site
é Output (shared document) distributed to all sites
+ Easy consistency maintenance (only one copy of the application)
− High network traffic (for output distribution)
− Relatively unreliable (if central fails then everything is down)
Replicated:
é Copy of the shared application runs locally at each site
é Input distributed to all sites
+ Low network traffic and response times (only distribution) apart from the
(enormous?) traffic arising from consistency maintenance
− Difficult consistency maintenance
9. Multimedia Communication Systems
9.3 Application Sharing Approach / Architecture
centralized
Floor Holder
output
Shared Window Shared Window
Network
Input Output
replicated
Floor Holder Floor Holder
input
Shared Window Shared Window
Network
Input Output Input Output
Video:
– Conference participants (all, a few, speaker or moderator only)
– Large video walls with multiple high-resolution screens may be used especially for
· Conferences with more than four participants
· Display of view-graphs, images, animations etc.
Requirements:
– High bandwidth (for data-intensive media)
– Low latency (for user interactivity)
– Distributed messaging of data and control information
Conference Control:
– Management of conferences (Establishing, Closing, Adding/removing users)
– Providing information about conferences (Conference name, duration, etc.)
Functions:
– Establishing a conference (users agree upon a common conference state, e.g.
encoding rules, access rights, chairman of the conference)
– Adding new participants and removing participants during a conference
– Closing a conference
9. Multimedia Communication Systems
9.4 Audio/Video Conferencing / Control - Centralized
Central Server:
– Stores the conference state (i.e. conference state is cenrally organized)
– Manages conference control
– Is able to exchange explicity the conference state
Establishment of a Conference with Centralized Control:
1. Initiation (of the chairman) of the conference selects an initial group of participants
2. He inquires addresses of the conference participants from a cenral directory sever.
3. These participants are explicitly invited.
4. Each invited client responds to the invitation
Í initiator is informed who will participate.
5. Negotiation of conference policies and admission of resources are performed.
This shared confernce state is stored on a central server and distributed to all
participants using a reliable messaging service.
9. Multimedia Communication Systems
9.4 Audio/Video Conferencing / Control - Distributed
Distributed Control:
– Manages no global notions of group membership
– Gives no consistency guarantees (same state view by all participants)
– Exchanges periodically the conference status between the participants to
minimize the loose of control by an unreliable messaging service
Session Management:
– Important part of the multimedia architecture
– Separates the control part and the data part from the actual transport
The entity which takes this on is called Session Manager:
– Including local and
– Remote functonalities
Media Agents:
– Are separate from the sesson manager and
– have the Responsibility for decisions specific to each type on media
Shared Workspace Agent:
– Transmits shared objects among the shared applications
9. Multimedia Communication Systems
9.4 Audio/Video Conferencing / Session Management Functionalities
Local functionalities:
closing of a conference)
9. Multimedia Communication Systems
9.4 Audio/Video Conferencing / Session Management Functionalities
Management tasks:
– configuration management
– fault management
– performance management
– accounting management
– security management
Remote functionalities:
– Communication with other session managers
– Exchange of state information which may include floor information,
configuration information, etc.
9. Multimedia Communication Systems
9.4 Audio/Video Conferencing / Media- and Shared Workspace Agent
Media Agents:
– Are separated from the session manager
– Each type of media owns its personal media agent
– Each Media Agent performs its own control mechanism over the particular
medium, such as
· Mute / unmute
· Change video quality
· Start / stop sending
Session Manager
Conference Membership
Control Control
Floor Session Control Protocol
Control
Configuration Media
Control Control
Conference Control:
– For a comparison between centralized and distributed replicated conferencing
control please see further literature.
Media Control:
– Includes mainly a functionally for the synchronization of media streams.
Configuration Control:
– Includes a control of media quality, QoS handling, resource availability and
other systems components to provide a session according to users requirements.
Membership Control:
– Includes services for invitation to and registration into a session as well as
modification of the membershipship during a session.
9. Multimedia Communication Systems
9.5 Transport Subsystems
Most transport protocols are designed for unreliable and “relative slow“
networks.
Modern highspeed networks, such as ATM, need new transport protocols that
consider the properties of this new network technology.
Fiber
wireless
Error rate 10-14
9. Multimedia Communication Systems
9.5 Transport Subsystems
1. Data throughput:
– Audio and video data resemble a stream-like behavior
– Even in compressed mode, they demand high data throughput (16 kbit/s for
compressed Audio, 64 kbit/s for original PCM-audio, 2 Mbit/s for MPEG-coded
video)
– In a workstation or network several of those streams may exist concurrently
– Telephone services or video conferencing demand real-time computing of the
data streams
This requires high performance workstations which are able to compute several
multimedia streams simultaneously and can transmit the packets in appropriate
speed to the network interface.
9. Multimedia Communication Systems
9.5 Transport Subsystems
average rate
sustainable rate
I-frame time
3. Service guarantees:
– Service guarantees are important for the acceptance of distributed multimedia
applications
– Distributed multimedia applications need guarantees, such as
throughput ≥ minvalue, delay ≤ maxvalue and jitter ≤ maxjitter
– To achieve service guarantees, resource management must be used - without
this in end-systems and switches/routers, multimedia systems cannot provide
reliable QoS to their users because transmission over unreserved resources may
lead to dropped or delayed packets
4. Multicasting:
– Multicasting is important for multimedia-distributed appications in terms of
sharing resources like the network bandwidth
– Many multimedia applications, such as video conferencing, have multicasting
characteristics
9. Multimedia Communication Systems
9.5 Transport Subsystems
Multimedia applications generate and consume huge amount of data and lay
high claims to the underlying infrastructure and communication architecture:
– Data should be copied directly from adapter to adapter to reduce copy overhead e.g.:
from the video board to the network interface by using direct memory access (DMA).
With DMA technique, the application itself never really touches the data, it only sets the
correct switches for the data flow by connecting sources to sinks.
– The data movement involved by the layered structure of the protocols form a bottleneck,
hence other mechanisms must be found.
– For error-recovery some protocols use retransmission techniques which impose
requirements on buffer space for queues at the expanse of larger end-to-end delays
– The synchronous behavior of most multimedia traffic streams must be mapped on the
asynchronous transfer mode of the underlying networks
Are the “old“ transport protocols like TCP and UDP suitable for multimedia
transmission and which new protocols do exist?
9. Multimedia Communication Systems
9.6 Quality of Service / Resource Management
Endsystem Endsystem
Switch
Resource Management
Level Level
Resource
Management
Network Network
9. Multimedia Communication Systems
9.6 Quality of Service / Resource Management
Unilateral Negotiaiton:
t4 t1 t2 t3 – Service user or service provider is not allowed
to modify proposed values
Service Provider – take it or leave it
9. Multimedia Communication Systems
9.6 Quality of Service / QoS Negotiations
Admission Control checks resources along the network path for availability
Three reservation models:
– Single Server/Single Receiver (e.g. RCAP)
– Single Server/Multiple Receiver (e.g. ST-II)
– Multiple Server/Multiple Receiver (e.g. RSVP)
Two reservation directions:
– sender-oriented (e.g. ST-II)
– receiver-oriented (e.g. RSVP)
Reservations are made:
– immediate
– in advance
9. Multimedia Communication Systems
9.7 Resource Admission Control / Example: RCAP in Tenet Suite
ADM_ Server
R EQ Tests ...
ADM_ Server
REQ
Tests
ADM_R Destination
EQ Tests
Adjust
Resources DM_ CONF
A
...
Adjust M _ C ONF
AD
Resources
ON F
ADM_C
Data
9. Multimedia Communication Systems
9.7 Resource Admission Control / Example: RCAP in Tenet Suite
Destination Test:
– D-Test: tests if minimal delay is less than maximal specified delay
– W-Computation: computes all local probabilities of packet loss due to buffer
overflow
– Z-Test: computes alllocal probabilities of packet loss due to delay violation
– Delay Computation: computes local node delays
– J-Test: necessary for rate controllled schedulers - computes deadline to
guarantee jitter
Bandwidth tests can be made pessimistic (peak rate allocation) or optimistic
(maximum average allocation)
Several improvements of the Tenet approach exist (including predictive
service)
9. Multimedia Communication Systems
9.7 Resource Admission Control
Network
User 1
User 4
Requirements
(Bandwidth, Delay, ...) Router
Jitter User 3
User 2
Existing scheduling strategies (e.g. FIFO) are not suitable for QoS based scheduling
because strict performance guarantees are not provided
There are different schedulers providing these guarantees:
– Weighted Fair Queueing
– Virtual Clock
Router
– Delay Earliest Due Date (D-EDD) inputs outputs
– Jitter Earliest Due Date (J-EDD) Queues
– Stop-and-Go Buffers
– Rate Controlled Static Priority
how to do a scheduling?
Differences to simple scheduling strategies:
– more complex queueing
– often time-stamped
– more complex computation e.g. of deadlines
– non-workconserving (workconserving = server serves whenever there is something to do)
9. Multimedia Communication Systems
9.8 Resource Management / Traffic Shaping
ρ
Í Leaky Bucket generates a more steady
steady flow stream instead of bursty traffic
Network
9. Multimedia Communication Systems
9.8 Resource Management / Traffic Shaping - Token Bucket
Leaky Bucket
9. Multimedia Communication Systems
9.8 Resource Management / Scheduling inside the Network
How can we guarantee that the system keeps its promises for the connections
even if traffic shaping rules are violated?
First startegy: Nagle´s algorithm
Router in a network keeps a record and queue for every connection and serves
the connections in a packet-wise round-robin startegy
Advantage: Connections which offer too many packets will be “punished“
Disadvantage:
– a very long packet will be “dangerous“ for others
– inconvenient for some traffic patterns (if a packet arrives
just after the server was there then the waiting time could
become substantial)
– costly and difficult to implement connection router connection
1 k
Thus some modifications were proposed
9. Multimedia Communication Systems
9.8 Resource Management / Scheduling inside the Network
connections router
i
Proof of delay bound: β i (hi − 1) ⋅ li h la
Di ≤ + +∑
gi gi m =1 rm
(*) delay if each other router in the network is fully loaded; in this case the
token bucket size βi is served with a rate gi (gi≥ρi). This lasts βi/ρi seconds.
(***) A packet may be delayed (in each hop) by la bit times (la = maximum
packet length). Since hop m serves rate rm this needs la/rm seconds.
9. Multimedia Communication Systems
9.8 Resource Management / Scheduling - Weighted Fair Queueing
Example:
conn. 1 r1 conn. 1 r2 r3
conn. 1
conn. 2 conn. 2
Define:
– the link bandwidth r1 = r2 = r3 = 155 Mbit/s (ATM speed)
– the maximum packet size of each flow and of the network l1 = l2 = la = 424 Bit
(ATM cell)
– the weighted flow rate g1 = ρ1 = 100 Mbit/s and g2 = ρ2 = 50 Mbit/s
– the token bucket size β1 = β2 = 1 Mbit
– flow 1 is transmitted over 3 hops (h1 = 3), flow 2 over 2 hops (h2 = 2)
The delay bounds are
β1 (h1 − 1) ⋅ l1 la β 2 (h2 − 1) ⋅ l2 la
D1 ≤ + + 3 ⋅ = 10,0166 ms D2 ≤ + + 2 ⋅ = 20,01395 ms
g1 g1 r1 g2 g2 r1
dominating term (in this example!)
9. Multimedia Communication Systems
9.8 Resource Management / Scheduling - Weighted Fair Queueing
Implementation Issues:
Queueing:
– Per-Connection-Queueing: needs more complex buffer management
– Granularity of Queueing: depends on network, e.g. cell in ATM, byte in
packetswitched networks, bits in our example
Scheduling:
– Granularity or weights: unit of the weighted flow gi?
Í Depends on granularity of queueing!
– Non-workconserving: needs timer control if the bandwidth is not completely
allocated
Advantage: analytic delay bounds!
Disadvantage: more complex implementation
9. Multimedia Communication Systems
9.8 Resource Management / Scheduling - Delay Earliest Due Date (EDD)
Channel 1
To renew the traffic characteristics in every
node of the network rate controllers are added
Rate Controller may regulate
Channel 2 – delay jitter (variation of delay)
– rate jitter (variation of rate)
Packets are hold by a defined eligibility time
before scheduled by the bounded delay server
Ítimestamp ordering
bounded delay server Íadditional complexity
Ílocal delays can be computed according to
Channel n the traffic characteristics at the entrance of
rate the network
controllers Íbuffer space required is distributed to the
nodes along the network path
9. Multimedia Communication Systems
9.8 Resource Management / Scheduling - Stop and Go
"Container“).
1. A packet of a frame cannot be forwarded until ist entire frame has been
received.
2. “Stop and Go“: The packet will be forwarded in the next output frame which
T
Input frames
Output frames
(min. delay)
maximum delay
If the frame enters the network at the end of a frame but leaves it at the
beginning of a frame
9. Multimedia Communication Systems
9.8 Resource Management / Scheduling - Rate Controlled Static Priority
m rate n FCFS
controllers servers
Channel 1
Each channel has ist own rate controller
delayed packet is inserted in FCFS queues
Channel 2
FCFS queues are served with priorities (non-
preemptive)
. . n delay bounds are supported - computation
. . depends on traffic specification - delay bounds
. . for TENET traffic specification exists (Zhang)
scheduler is non-workconserving first
Channel m
implementation in hardware exists
⋅
⋅
9. Multimedia Communication Systems
9.8 Resource Management / Scheduling - Jitter Earliest Due Date
If the packet is started at time b-τ (i.e. τ seconds early) then in the next hop
τ will be added to the budget of the next hop, i.e. the transmission in the next
hop will be scheduled in the interval
Technical problem:
Problem: isolate the errors, e.g. some wrong color in a frame may not matter
(hardly visible to human user) but wrong frame boundaries cannot be recovered
Example: within an MPEG-2 video it is important not to loose the I-Frames
(contains structural informations), P- and B-Frames losses are tolerated
Í structural information needs to be protected, not always content!
Íexisting error detection mechanisms (checksumming, sequencing) must be
extended
Example: lateness concept. PDUs that arrive too late are useless for the
application (e.g. video frame)
ÍPDUs are periodically time-stamped
Íerror detection can start at the time-stamped PDUs
Írequires synchronized system clock at sender and receiver (e.g. Network Time
Protocol)
9. Multimedia Communication Systems
9.8 Resource Management / End-to-End Error Control - Error Correction
S R S R
1 1
2 2
3 3
4 4
5 Receiver starts the Timer 5
6 6
7 7
8 Timer ends and the receiver 4 After receiving the
4 notice the missing of packet 4 5 packet 5, the receiver
5 6 notice the missing of
6 These packets are lost 7 packet 4.
7 8
8 9
9 All lost packets must 10
be retransmitted
t t
Timer controlled Usage of special
may lead to gap introduction and network properties like
violation of throughput parameters sequence ordering in ATM
9. Multimedia Communication Systems
9.8 Resource Management / End-to-End Error Control - Error Correction
S R S R
1 1
2 2
3 3
4 4
5 Receiver starts the Timer 5
6 6
7 7
8 Timer ends and the receiver
4 After receiving the
9 8 packet 5, the receiver
4 notice the missing of packet 4 9 notice the missing of
10 10 packet 4.
11 The packets are not lost 11
12 12
13 Only the packet 4 has to 13
be retransmit
t t
Timer controlled Usage of special network properties like
sequence ordering in ATM
Cyclic Redundancy Checks (CRC) are used to protect packets against bit errors.
Given m data bits (w1, ..., wm).
m
Define U ( x) = ∑ wi ⋅ x i −1
i =1
x k ⋅U ( x)
( ) → x k
R ( x) = Re m ⋅ U ( x) = P ( x) ⋅ G ( x) + R ( x)
G ( x)
9. Multimedia Communication Systems
9.8 Resource Management / Forward Error Correction - CRC
The rest polynomial R(x) is of degree < k and is appended at the m data bits at
transfer Í xk ⋅ U(x) + R(x) is trasnmitted (xk shifts the data bits to provide bits
for the remainder)
The receiver receives xk ⋅ U(x) + R(x) + e(x) (e(x) is the error polynomial) and
computes
x k ⋅U ( x) − R( x) + e( x) P( x) ⋅ G( x) e( x) e( x)
V ( x) = Re m = Re m + = Re m
G ( x) G ( x) G ( x) G ( x)
If V(x) ≠0 Í 1. ei > 0 in the data part Í serious trasnmission error
2. ei > 0 in the remainder part Í can´t be distinguished from
serious errors
If V(x) = 0 an undetectable error may be occured if e(x)=a(x)G(x) (rather
unlikely event)
9. Multimedia Communication Systems
9.8 Resource Management / Forward Error Correction - CRC
Example:
(w1, ..., w8) = (1, 1, 0, 1, 0, 1, 1, 1) Í U(x) = x7 + x6 + x4 + x2 + x1 + 1
Define G(x) = x5 + x3 + 1
Í R(x) = x4 + x3 + x
Í (11010111 11010) is transmitted
data CRC
Receiver gets (11000111 11010)
Thus e(x) = x9 error!
and et end-points!
Dynamically changing the network capacity of each session needs support of dynamic
change of QoS parameters
Resource adaption requires
– notification and renegotiation of QoS parameters
– adaptive resource schemes
Renegotiation request can come from either
– the user (e.g. change QoS like video rate) who invokes the resource administration
protocol to check the resource if network adaption is required,
– the host system (e.g.due to workstation overload) which invokes e.g. a notification of
QoS degradation to a misbehaved user/application. Network QoS renegotiation may also
be invoked by the resource administration protocol
– the network (due to overload or congestion) which invokes a notification to the host
reporting that the allocation of resources must change
· network can adapt to overload Í network notifies the host because some degradation may
occur during modification of resources Í this may interrupt the media flow Í host must react
· network cannot adapt to overload Í host must adapt to overload
9. Multimedia Communication Systems
9.8 Resource Management / Resource Adaption - Network Adaption
Two directions:
– special-purpose protocols like TCP (reliable data transfer), UDP (unreliable data
transfer), RTP (audio/video transfer) on top of IP (internet paradigm)
– general-purpose protocols like XTP to provide a general set of services
Í application-tailored protocols: customized for specific types of services
(transferring voice, video, text, image)
Í transport subsytems move toward a provision of service classes like
guaranteed services, best effort
Í within these classes, services are customized through QoS specification
Í services are selected and customized toward applications