Topic
Packet loss
About: Packet loss is a research topic. Over the lifetime, 21235 publications have been published within this topic receiving 302453 citations.
Papers published on a yearly basis
Papers
More filters
••
07 Jun 2010TL;DR: A Reduced-reference quality metric for 3D depth map transmission using the extracted edge information is proposed, motivated by the fact that the edges and contours of the depth map can represent different depth levels and hence can be used in quality evaluations.
Abstract: Due to the technological advancement of 3D video technologies and the availability of other supportive services such as high bandwidth communication links, introduction of immersive video services to the mass market is imminent. However, in order to provide better service to demanding customers, the transmission system parameters need to be changed “on the fly”. Measured 3D video quality at the receiver side can be used as feedback information to fine tune the system. However, measuring 3D video quality using Full-reference quality metrics will not be feasible due to the need of original 3D vide sequence at the receiver side. Therefore, this paper proposed a Reduced-reference quality metric for 3D depth map transmission using the extracted edge information. This work is motivated by the fact that the edges and contours of the depth map can represent different depth levels and hence can be used in quality evaluations. Performance of the method is evaluated across a range of Packet Loss Rates (PLRs) and shows acceptable results compared to its counterpart Full-reference quality metric.
72 citations
••
01 Dec 2006TL;DR: This paper presents two time-invariant estimator architectures and, surprisingly, it is shown that stability does not depend on packet delay but only on the packet loss probability.
Abstract: In this paper we study optimal estimation design for sampled linear systems where the sensors measurements are transmitted to the estimator site via a generic digital communication network. Sensor measurements are subject to random delay or might even be completely lost. We present two time-invariant estimator architectures and, surprisingly, we show that stability does not depend on packet delay but only on the packet loss probability. Finally, algorithms to compute critical packet loss probability and estimators performance in terms of their error covariance are given and applied to some numerical examples.
72 citations
••
TL;DR: An energy efficient MAC protocol for WSNs is presented that avoids overhearing and reduces contention and delay by asynchronously scheduling the wakeup time of neighboring nodes and an energy consumption analysis for multi-hop networks is provided.
72 citations
••
TL;DR: A smart gateway-based authentication and authorization method to prevent and protect more sensitive physiological data from an attacker and malicious users is proposed.
Abstract: As health data are very sensitive, there is a need to prevent and control the health data with end-to-end security solutions. In general, a number of authentication and authorization schemes are available to prevent and protect the sensitive data, which are collected with the help of wearable Internet of Things (IoT) devices. The transport layer security (TLS) protocol is designed to transfer the data from source to destination in more reliable manner. This protocol enables a user to overcome the no lost or reordered messages. The more challenge with TLS is to tolerate unreliability. In order to overcome this issue, Datagram transport layer security (DTLS) protocol has been designed and used in low-power wireless constrained networks. The DTLS protocol consists of a base protocol, record layer, handshake protocol, ChangeCipherSpec and alert protocol. The complex issue with the DTLS protocol is the possibility of an attacker could send a number of ClientHello messages to a server. This scenario would cause a denial-of-service (DOS) attack against the server. This DoS attack enables new connection between the attacker and server, increasing attacker bandwidth, and allocation of resources for every ClientHello message. In order to overcome this issue, we have proposed a smart gateway-based authentication and authorization method to prevent and protect more sensitive physiological data from an attacker and malicious users. The enhanced smart gateway-based DTLS is demonstrated with the help of Contiki Network Simulator. The packet loss ratio is calculated for the CoAP, host identity protocol, CoAP-DTLS and CoAP-enhanced DTLS to evaluate the performance of the proposed work. Data transmission and handshake time are also calculated to evaluate the efficiency of the enhanced DTLS.
72 citations
•
26 Sep 2000TL;DR: In this paper, a method is described for measuring the jitter experienced by an application's network traffic based solely on packets sent or received by the application itself, which does not alter the application's packets, in particular, it does not add a timestamp to the packets before they are sent.
Abstract: A method is described for measuring the jitter experienced by an application's network traffic. The measurement is based solely on packets sent or received by the application itself. The method does not alter the application's packets, in particular, it does not add a timestamp to the packets before they are sent. Instead, it creates a table that stores unique identifiers of the application's packets along with the time the packets are sent. On the receiving computer, a similar table is created that stores the unique packet identifiers along with the time the packets are received. Records of sent packets are associated with records of received packets so that the time a packet was sent can be compared to the time the same packet was received. The resulting data are processed to calculate network jitter and packet loss ratios.
72 citations