Beruflich Dokumente
Kultur Dokumente
there is more information collected from below so that better pUDP = 1 − (1− p R ) M1
decisions can be made. For the video transmission over and efficiency is
wireless network, the final decision is made by the highest (M 2 + H 2 )
layer: the human being who watches the video. The lower γ UDP =
M2 + H2 − M1 1
layers just try to collect as much as information as possible ( M1 + H 1 ) +
M1 1 − pUDP
instead of discarding it.
n −1
where Pn = pUDP (1 − pUDP ) . For simplicity, we assume that
C. General algorithm
only one radio unit in a UDP packet is retransmitted.
We are trying to make the proposed algorithm general. For
For UDP Lite, only considering UDP header, error
instance, instead of thinking of one particular wireless network,
probability is
we only take a common characteristic of all wireless networks: H2
unreliability. We take the wireless link as just an error pUDPLite = 1 − (1 − p R ) M1
generator which may generate different kinds of errors, such as
The efficiency of UDP Lite is of the same form as UDP,
constant rate error, variable rate error, burst error, etc. We do
with pUDP replaced by pUDPLite . The pUDPLite is much smaller
not specify a particular video source coding algorithm. But we
prefer standardized codec schemes which have been tested than pUDP , so the efficiency of UDP Lite is actually higher
over time. than that of UDP.
C. Application layer analysis
IV. PERFORMANCE A NALYSIS
If there is no error control layer above the UDP layer, all
In order to analyze the above algorithm, we first specify the error data is forwarded to the application layer, where the
error model for wireless link. There is no agreeable standard packet error rate is
model for the underlying wireless link, mainly due to the highly M 2 +H 2 M 2 −1
M2 M
∑
( M 1+ H 1)
2 −n
time-varying and non-stationary nature of wireless networks. It p APP1 = 1 − (1 − pb ) M1 ≈ pb (1 − pb ) n
involves fast channel fading and slow channel fading, as well n=1 n
as the mobility pattern, the location of the mobile node, and so When error control is added, it can recover R bytes of error
on. But in all cases, the wireless link can just be modeled as an out of a packet of M 2 bytes. In this case, the error probability is
error generator. For the sake of convenience, we assume that represented as
M 2 − R −1
the bit error probability is given by p b. We then give theoretical M 2 M −n
expressions for the error probability and efficiency at RLP, p APP 2 = ∑
n =1 n
pb (1 − pb ) n
2