Information Technology Reference
In-Depth Information
8.6 Performance Evaluation
In this section, we use a trace-driven simulator written in ns-2 [12] to evaluate the performance
of the presented adaptation algorithm (denoted by AVS) and compare it with the current state-
of-the-art algorithm proposed by Cuetos and Ross [1-2] (denoted by CR).
Figure 8.4 depicts the simulated network topology. We use the common NewReno TCP [13-
14] as the transport protocol to deliver the video data to the client. Cross-traffic is generated
from a packet trace file obtained from Bell Labs [15-16]. 1 The trace file captured 94 hours of
network traffic passing through a firewall. We divide the 94-hour trace file into 94 1-hour trace
files and run a simulation for each 1-hour trace file to evaluate the algorithms' performance
under different cross-traffic scenarios.
Both the streaming traffic and the cross-traffic share a link of R Mbps as shown in Fig-
ure 8.4. For each simulation, we adjust R so that the network has just sufficient bandwidth to
stream the video, i.e., R
c , where c is the average data rate of the cross traffic. We
summarize the system settings in Table 8.1.
We use two performance metrics, namely, rebuffering ratio and average video bit-rate, to
evaluate the algorithms' performance. Rebuffering ratio is defined as the proportion of frames
=
r max +
Streaming Client
Streaming Server
Video Stream
R Mbps, 100ms
Cross -Traffic
Avg_rate = c
Cross-Traffic Generator
Cross-Traffic Receiver
Figure 8.4
Network topology used in simulations
Table 8.1
System parameters used in simulations
Parameters
Value
Prefetch duration
5 seconds
M
1 second
r max
1.1 Mbps
r min
200 kbps
Video Length
3000 seconds
TCP MSS
1500 bytes
Search WWH ::




Custom Search