Proceedings Eight International Conference on Computer Communications and Networks (Cat. No.99EX370)
DOI: 10.1109/icccn.1999.805567
|View full text |Cite
|
Sign up to set email alerts
|

Effects of source traffic shaping on MPEG video transmission over next generation IP networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
4
0

Publication Types

Select...
3
2

Relationship

2
3

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 20 publications
0
4
0
Order By: Relevance
“…TB mechanism has been employed to characterize the traffic generated by MPEG video in [4,6,8]. In [4], Alam et al study the effects of a traffic shaper at the video source on the transmission characteristics of MPEG video streams while providing delay and bandwidth guarantees. In [6], Lombaedo et al have applied the TB model to evaluate the probability of marking nonconforming data packets for the transmission of MPEG video on the Internet.…”
Section: Introductionmentioning
confidence: 99%
“…TB mechanism has been employed to characterize the traffic generated by MPEG video in [4,6,8]. In [4], Alam et al study the effects of a traffic shaper at the video source on the transmission characteristics of MPEG video streams while providing delay and bandwidth guarantees. In [6], Lombaedo et al have applied the TB model to evaluate the probability of marking nonconforming data packets for the transmission of MPEG video on the Internet.…”
Section: Introductionmentioning
confidence: 99%
“…However, recent efforts, such as Integrated and Differentiated Service at the IETF, are underway to incorporate service guarantees in TCP/IP based networks. As a result, there has been some preliminary work on transporting video over the Integrated Service [1,2]. In contrast to legacy data networks, the Asynchronous Transfer Mode (ATM) network has been designed to support both real and non-real time applications making it very suitable for transporting multimedia.…”
Section: Introductionmentioning
confidence: 99%
“…Since the token bucket algorithm (with peak rate control) has been specified as the traffic policing mechanism in the GS [1], a token bucket (followed by a leaky bucket for peak rate control) can be used also at the source to shape the traffic [18] so that the traffic profile is conformant to the negotiated traffic specification. Although it is possible to adopt a traffic shaping algorithm [19] which ensures that the transmitted traffic is conformant to a token bucket traffic policing element in the network, the token bucket itself can also be used at the source to shape MPEG video traffic.…”
Section: Introductionmentioning
confidence: 99%