Combined use of congestion control and frame discarding for Internet video streaming
Please cite this item using this persistent URLhttp://hdl.handle.net/11693/29259
Increasing demand for video applications over the Internet and the inherent uncooperative behavior of the User Datagram Protocol (UDP) used currently as the transport protocol of choice for video networking applications, is known to be leading to congestion collapse of the Internet. The congestion collapse can be prevented by using mechanisms in networks that penalize uncooperative flows like UDP or employing end-to-end congestion control. Since today’s vision for the Internet architecture is based on moving the complexity towards the edges of the networks, employing end-to-end congestion control for video applications has recently been a hot area of research. One alternative is to use a Transmission Control Protocol (TCP)-friendly end-to-end congestion control scheme. Such schemes, similar to TCP, probe the network for estimating the bandwidth available to the session they belong to. The average bandwidth available to a session using a TCP-friendly congestion control scheme has to be the same as that of a session using TCP. Some TCP-friendly congestion control schemes are highly responsive as TCP itself leading to undesired oscillations in the estimated bandwidth and thus fluctuating quality. Slowly responsive TCP-friendly congestion control schemes to prevent this type of behavior have recently been proposed in the literature. The main goal of this thesis is to develop an architecture for video streaming in IP networks using slowly responding TCP-friendly end-to-end congestion control. In particular, we use Binomial Congestion Control (BCC). In this architecture, the video streaming device intelligently discards some of the video packets of lesser priority before injecting them in the network in order to match the incoming video rate to the estimated bandwidth using BCC and to ensure a high throughput for those video packets with higher priority. We iiidemonstrate the efficacy of this architecture using simulations in a variety of scenarios.