Heterogeneous Buffer Size Impact on UDP Performance for Real-Time Video Streaming Application
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 6
Abstract
Communication specifically in real-time (RTC) is a terminology which insinuates any live media transmission that occurs inside time limits. In this paper, heterogeneous buffer sizes in random are utilized on different routers and for different ranges to examine their effect on the performance of network for user datagram protocol’s (UDP) video streaming application. It appeared through numerical results that packet switches heterogeneous buffer sizes as a rule influence the general performance of the network. By thinking about bigger range of buffer sizes, throughput improves but End-to-End delay also increases which is customarily not commendable for RTC applications. On the contrary, throughput decreases on account of considering low range of buffer sizes; however, End-to-End delay additionally diminishes. In this manner, the middle of the road scope of buffer sizes range from 30 to 20, recommended for ideal throughput and an adequate lower End-to-End delay.
Authors and Affiliations
Sarfraz Ahmed Soomro, M. Mujtaba Shaikh, Nasreen Nizamani, Ehsan Ali Buriro, Khalil M. Zuhaib
Simulating Cooperative Systems Applications: a New Complete Architecture
For a decade, embedded driving assistance systems were mainly dedicated to the management of short time events (lane departure, collision avoidance, collision mitigation). Recently a great number of projects have been fo...
A Survey of Unstructured Text Summarization Techniques
Due to the explosive amounts of text data being created and organizations increased desire to leverage their data corpora, especially with the availability of Big Data platforms, there is not usually enough time to read...
An Efficient Scheme for Real-time Information Storage and Retrieval Systems: A Hybrid Approach
Information storage and retrieval is the fundamental requirement for many real-time applications. These systems demand that data should be sorted all the time, real-time insertion, deletion and searching should be suppor...
Web Anomaly Misuse Intrusion Detection Framework for SQL Injection Detection
Databases at the background of e-commerce applications are vulnerable to SQL injection attack which is considered as one of the most dangerous web attacks. In this paper we propose a framework based on misuse and a...
Graph-based Semi-Supervised Regression and Its Extensions
In this paper we present a graph-based semi-supervised method for solving regression problem. In our method, we first build an adjacent graph on all labeled and unlabeled data, and then incorporate the graph prior with t...