Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Next revision
Previous revision
en:projects:details:gio02 [2011/10/06 11:54]
cangiani created
en:projects:details:gio02 [2012/02/02 10:51]
cangiani
Line 17: Line 17:
 contactroom:​ BC149 contactroom:​ BC149
 type : master semester type : master semester
-status : taken+status : completed
 created_dt : 2011-09-20 created_dt : 2011-09-20
 taken_dt : 2011-10-01 taken_dt : 2011-10-01
-completed_dt : YYYY-MM-DD+completed_dt : 2012-01-16
 by : Laurent Fasnacht by : Laurent Fasnacht
-output_media :+output_media : :​en:​projects:​master_semester:​report_fasnacht_bwopt.pdf|report
 table : projects table : projects
 ====== ======
Line 28: Line 28:
 ---- ----
  
-Reliable data distribution over the internet is mostly based on TCP (transmission control protocol). With TCP, the rate of data transmission between two nodes decreases as the distance between the two nodes increases. In a globalized internet, it becomes more and more difficult to make optimal use of the broad bandwidth now commonly available in private households. In the case of one-to-many data distribution,​ large content providers do fix the problem by deploying expensive content delivery networks.+Reliable data distribution over the internet is mostly based on TCP (transmission control protocol). With TCP, the rate of data transmission between two 
 +nodes decreases as the distance between the two nodes increases. In a globalized internet, it becomes more and more difficult to make optimal use of the 
 +broad bandwidth now commonly available in private households. In the case of one-to-many data distribution,​ large content providers do fix the problem by 
 +deploying expensive content delivery networks.
  
-The success of novel bandwidth-demanding peer-to-peer applications such as tele-presence and high definition video-conference will have to rely on transmission protocols that make more effective use of the available bandwidth. Forward error correcting codes (FEC) on top of standard UDP protocol have proven to provide reliable and efficient data transmission over long distance and/or lossy networks. In particular, using fountain codes it is possible to saturate any available bandwidth by flooding the connection with an arbitrary number of repair packets. Although optimal for the two peers, this method is not very fair to the rest of internet ​users and will end up wasting resources. In fact, the sender transmission rate should ​be kept below or around ​the effective bandwidth linking the two peers.+The success of novel bandwidth-demanding peer-to-peer applications such as tele-presence and high definition video-conference will have to rely on 
 +transmission protocols that make more effective use of the available bandwidth. Forward error correcting codes (FEC) on top of standard UDP protocol have 
 +proven to provide reliable and efficient data transmission over long distance and/or lossy networks. In particular, using fountain codes it is possible to 
 +saturate any available bandwidth by flooding the connection with an arbitrary number of repair packets. Although optimal for the two peers, this method is 
 +not very fair to the users sharing the same link and will end up wasting resources. In fact, the sender transmission rate should ​not exceed ​the 
 +effective bandwidth linking the two peers.
  
-The goal of this project is to develop an efficient method to quickly determine and monitor the actual bandwidth available between two peers in order to make optimal and fair use of it. Measurements will have to be fitted with theoretical models in order to determine the more realistic description of the communication channel at any moment in time during transmission.  +The goal of this project is to develop an efficient method to quickly determine and monitor the actual bandwidth available between two peers in order to 
- +make optimal and fair use of it. Measurements will have to be fitted with theoretical models in order to determine the more realistic description of the 
-The computer programs developed for this project will be included in a generic library that is being developed in our laboratory for tunneling network traffic over a transmission channel made reliable and efficient using FEC. The library also provides an easy to use application programming interface (API) that hides to the user all the technicalities including the difficulty of establishing a one-to-one communication channel between nodes that are behind firewalls and NAT routers.+communication channel at any moment in time during transmission.
  
 +The computer programs developed for this project will be included in a generic library that is being developed in our laboratory for tunneling network
 +traffic over a transmission channel made reliable and efficient using FEC. The library also provides an easy to use application programming interface
 +(API) that hides to the user all the technicalities including the difficulty of establishing a one-to-one communication channel between nodes that are
 +behind firewalls and NAT routers.