SlideShare a Scribd company logo
1 of 45
Download to read offline
Edinburgh, 28th November 2014
R2D2: Network error control for
Rapid and Reliable Data Delivery
Project supported by EPSRC under the
First Grant scheme (EP/L006251/1)
Resource Allocation Schemes
for Layered Video Broadcasting
University of Edinburgh
Andrea Tassi and Ioannis Chatzigeorgiou
{a.tassi, i.chatzigeorgiou}@lancaster.ac.uk
andCommunications
School of Computing
Starting Point and Goals
๏ Delivery of multimedia broadcast/multicast services over 4G
networks is a challenging task. This has propelled research into
delivery schemes.
๏ Multi-rate transmission strategies have been proposed as a
means of delivering layered services to users experiencing
different downlink channel conditions.
๏ Layered service consists of a basic layer and multiple
enhancement layers.
Goals
๏ Error control - Ensure that a predetermined fraction of users
achieves a certain service level with at least a given probability
๏ Resource optimisation - Minimise the total amount of radio
resources needed to deliver a layered service.
2
andCommunications
School of Computing
Index
1. System Parameters and Performance Analysis
2. Multi-Channel Resource Allocation Models
and Heuristic Strategies
3. H.264/SVC Service Delivery over LTE-A
eMBMS Networks
4. Analytical Results
5. Concluding Remarks
3
andCommunications
School of Computing
1. System Parameters and Performance Analysis
andCommunications
School of Computing
System Model
๏ One-hop wireless communication system composed of one
source node and U users
5
UE 1
UE 3
UE 2
UE 4
UE U
Source
Node
ˆB3
ˆB2
ˆB1
subch. 1
subch. 2
subch. 3
๏ Each PtM layered service is delivered through C orthogonal
broadcast erasure subchannels
The$same$MCS
Capacity$of$subch.$3$
(no.$of$packets)
๏ Each subchannel delivers streams of (en)coded packets
(according to the RLNC principle).
andCommunications
School of Computing
6
k1 k2 k3
x1 x2 xK. . .. . .
๏ is a layered source message of K source
packets, classified into L service layers
x = {x1, . . . , xK}
Non-Overlapping Layered RNC
andCommunications
School of Computing
6
๏ Encoding performed over each service layer independently
from the others.
๏ The source node will linearly combine the data packets
composing the l-th layer and will generate a
stream of coded packets , where
k1 k2 k3
x1 x2 xK. . .. . .
๏ is a layered source message of K source
packets, classified into L service layers
x = {x1, . . . , xK}
Non-Overlapping Layered RNC
andCommunications
School of Computing
kl
xl = {xi}kl
i=1
nl kl y = {yj}nl
j=1
yj =
klX
i=1
gj,i xi
Coef:icients$of$the$
linear$combination$
are$selected$over$a$
:inite$:ield$of$size$q
Non-Overlapping Layered RNC
๏ User u recovers layer l if it will collect k_l linearly independent
coded packets. The prob. of this event is
7
kl
Pl(nl,u) =
nl,u
X
r=kl
✓
nl,u
r
◆
pnl,u r
(1 p)r
h(r)
=
nl,u
X
r=kl
✓
nl,u
r
◆
pnl,u r
(1 p)r
kl 1Y
i=0
h
1
1
qr i
i
| {z }
h(r)
Prob.$of$receiving$r$out$of$nl,u$coded$symbols
Prob.$of$decoding$

layer$l
๏ The probability that user u recover the first l service layers is
DNO,l(n1,u, . . . , nL,u) = DNO,l(nu) =
lY
i=1
Pi(ni,u)
PEP
andCommunications
School of Computing
8
๏ The source node (i) linearly combines data packets belonging to
the same window, (ii) repeats this process for all windows, and
(iii) broadcasts each stream of coded packets over one or more
subchannels
Expanding Window Layered RNC
๏ We define the l-th window as the set of source packets
belonging to the first l service layers. Namely, 

where
Xl
Xl ={xj}Kl
j=1
Kl =
Pl
i=1 ki
k1 k2 k3
x1 x2 xK. . .. . .
Exp. Win. 3
Exp. Win. 2
Exp. Win. 1
andCommunications
School of Computing
Expanding Window Layered RNC
๏ Sums allow us to consider all the possible combinations of
received coded packets
9
๏ The probability of user u recovering the first l layers
(namely, the l-th window) can be written as
DEW,l
L,u) =
=DEW,l(Nu)
=
N1,u
X
r1=0
· · ·
Nl 1,u
X
rl 1=0
Nl,u
X
rl=rmin,l
✓
N1,u
r1
◆
· · ·
✓
Nl,u
rl
◆
p
Pl
i=1(Ni,u ri)
(1 p)
Pl
i=1 ri
gl(r)
Prob.$of$receiving $out$
of$ coded$symbols
Prob.$of$decoding$

window$l
DEW,l(Nu)
DEW,l(N1,u, . . . , NL,u) =
=DEW,l(Nu)
=
N1,u
X
r1=0
· · ·
Nl 1,u
X
rl 1=0
Nl,u
X
rl=rmin,l
✓
N1,u
r1
◆
· · ·
✓
Nl,u
rl
◆
p
Pl
i=1(Ni,u ri)
(
r = {r1, . . . , rl}
andCommunications
School of Computing
2. Multi-Channel Resource Allocation Models and
Heuristic Strategies
andCommunications
School of Computing
Allocation Patterns
11
ˆB3
ˆB2
ˆB1
subchannel 1
subchannel 2
subchannel 3
andCommunications
School of Computing
Allocation Patterns
11
ˆB3
ˆB2
ˆB1
subchannel 1
subchannel 2
subchannel 3
coded packets
from x1
coded packets
from x2
coded packets
from x3
ˆB3
ˆB2
ˆB1
subchannel 1
subchannel 2
subchannel 3
Separated$
Allocation$
Pattern
andCommunications
School of Computing
Mixed$
Allocation$
Pattern
ˆB3
ˆB2
ˆB1
coded packets
from x3 or X3
coded packets
from x2 or X2
coded packets
from x1 or X1
subchannel 1
subchannel 2
subchannel 3
Allocation Patterns
11
ˆB3
ˆB2
ˆB1
subchannel 1
subchannel 2
subchannel 3
andCommunications
School of Computing
NO-SA Model
๏ Consider the variable . It is 1, if u
can recover the first l layers with a probability value 

, otherwise it is 0.
12
u,l = I
⇣
DNO,l(nu) ˆD
⌘
ˆD
andCommunications
School of Computing
ˆB3
ˆB2
ˆB1
subch. 1
subch. 2
subch. 3
NO-SA Model
๏ Consider the variable . It is 1, if u
can recover the first l layers with a probability value 

, otherwise it is 0.
๏ The RA problem for the NO-SA case is
12
u,l = I
⇣
DNO,l(nu) ˆD
⌘
ˆD
(NO-SA) min
m1,...,mC
n(1,c),...,n(L,c)
LX
l=1
CX
c=1
n(l,c)
(1)
subject to
UX
u=1
u,l U ˆtl l = 1, . . . , L (2)
mc 1 < mc c = 2, . . . , L (3)
0 
LX
l=1
n(l,c)
 ˆBc c = 1, . . . , C (4)
n(l,c)
= 0 for l 6= c (5)
No.$of$packets$of$layer$l$
delivered$over$c
Minimization$of$
resource$footprint
andCommunications
School of Computing
ˆB3
ˆB2
ˆB1
subch. 1
subch. 2
subch. 3
NO-SA Model
๏ Consider the variable . It is 1, if u
can recover the first l layers with a probability value 

, otherwise it is 0.
๏ The RA problem for the NO-SA case is
12
u,l = I
⇣
DNO,l(nu) ˆD
⌘
ˆD
(NO-SA) min
m1,...,mC
n(1,c),...,n(L,c)
LX
l=1
CX
c=1
n(l,c)
(1)
subject to
UX
u=1
u,l U ˆtl l = 1, . . . , L (2)
mc 1 < mc c = 2, . . . , L (3)
0 
LX
l=1
n(l,c)
 ˆBc c = 1, . . . , C (4)
n(l,c)
= 0 for l 6= c (5)
Each$service$level$shall$be$
achieved$by$a$predetermined$
fraction$of$users
No.$of$users
Target$fraction$of$users
andCommunications
School of Computing
ˆB3
ˆB2
ˆB1
subch. 1
subch. 2
subch. 3
NO-SA Model
๏ Consider the variable . It is 1, if u
can recover the first l layers with a probability value 

, otherwise it is 0.
๏ The RA problem for the NO-SA case is
12
u,l = I
⇣
DNO,l(nu) ˆD
⌘
ˆD
(NO-SA) min
m1,...,mC
n(1,c),...,n(L,c)
LX
l=1
CX
c=1
n(l,c)
(1)
subject to
UX
u=1
u,l U ˆtl l = 1, . . . , L (2)
mc 1 < mc c = 2, . . . , L (3)
0 
LX
l=1
n(l,c)
 ˆBc c = 1, . . . , C (4)
n(l,c)
= 0 for l 6= c (5)
DynamicH$and$
systemHrelated$
constraints
Because$of$the$SA$
pattern
andCommunications
School of Computing
ˆB3
ˆB2
ˆB1
subch. 1
subch. 2
subch. 3
NO-SA Heuristic
๏ The NO-SA is an hard integer optimisation problem because
of the coupling constraints among variables
๏ We propose a two-step heuristic strategy
i. MCSs optimisation ( )
ii. No. of coded packet per-subchannel optimization

( )
13
m1, . . . , mC
n(1,c)
, . . . , n(L,c)
๏ The first step selects the 

value of such that packets
delivered through subch. c are
received (at least with a target
prob.) by users.
mc
|U(mc)
| U · ˆtc
apping Resource Allocation Strategies
system where the source node delivers the
by means of the NO RNC principle. From (??),
indication variable u,l as follows:
u,l = I
⇣
DNO,l(nu) ˆD
⌘
. (13)
s, u,l = 1, if u can recover the first l layers
ity value that is equal to or greater than a target
wise u,l = 0.
e allocation model that we propose for the
Step 1 Subchannel MCSs optimization.
1: c C
2: v mMAX and
3: while c 1 do
4: repeat
5: mc v
6: v v 1
7: until |U(mc)
| U · ˆtc or v < mmin
8: c c 1
9: end while
because of the nature of the considered a
andCommunications
School of Computing
NO-SA Heuristic
๏ The second step aims at optimising and can
be summarised as follows
14
n(1,c)
, . . . , n(L,c) 5
Strategies
node delivers the
principle. From (6),
ollows:
ˆD
⌘
. (13)
er the first l layers
greater than a target
we propose for the
A (NO-SA) can be
l,c)
(14)
Step 1 Subchannel MCSs optimization.
1: c C
2: v mMAX and
3: while c 1 do
4: repeat
5: mc v
6: v v 1
7: until |U(mc)
| U · ˆtc or v < mmin
8: c c 1
9: end while
Step 2 Coded packet allocation for a the NO-SA case.
1: for l 1, . . . , L do
2: n(l,l)
kl
3: while DNO,l(n(1,1)
, . . . , n(l,l)
) < ˆD do
4: n(l,l)
n(l,l)
+ 1
5: end while
6: end for
Requires$a$no.$of$steps


PL
t=1
⇣
ˆBt kt + 1
⌘
ˆB3
ˆB2
ˆB1
subchannel 1
subchannel 2
subchannel 3
DNO,1(n(1,1)
) ˆD
DNO,2(n(1,1)
, n(2,2)
) ˆD
DNO,3(n(1,1)
, n(2,2)
, n(3,3)
) ˆD
5
on Strategies
ce node delivers the
C principle. From (6),
s follows:
ˆD
⌘
. (13)
over the first l layers
or greater than a target
we propose for the
SA (NO-SA) can be
n(l,c)
(14)
l = 1, . . . , L (15)
Procedure 1 Subchannel MCSs optimization.
1: c C
2: v mMAX and
3: while c 1 do
4: repeat
5: mc v
6: v v 1
7: until |U(mc)
| U · ˆtc or v < mmin
8: c c 1
9: end while
Step 2 Coded packet allocation for the NO-SA case.
1: c 1
2: n(l,c)
1 for any l = 1, . . . , L and c = 1, . . . , C
3: n = {n(l)
}L
l=1, where n(l)
1 for any l = 1, . . . , L
4: for l 1, . . . , L do
5: while DNO,l(n) < ˆD and c  C do
6: n(l,c)
n(l,c)
+ 1
7: n(l) PC
t=1 n(l,t)
for any l = 1, . . . , L
8: if
PL
t=1 n(t,c)
= ˆBc then
andCommunications
School of Computing
NO-MA Model
๏ The NO-SA problem can be easily extended to the MA pattern
by removing the last constraint
15
(NO-SA) min
m1,...,mC
n(1,c),...,n(L,c)
LX
l=1
CX
c=1
n(l,c)
(1)
subject to
UX
u=1
u,l U ˆtl l = 1, . . . , L (2)
mc 1 < mc c = 2, . . . , L (3)
0 
LX
l=1
n(l,c)
 ˆBc c = 1, . . . , C (4)
n(l,c)
= 0 for l 6= c (5)
andCommunications
School of Computing
ˆB3
ˆB2
ˆB1
subch. 1
subch. 2
subch. 3
NO-MA Model
๏ The NO-SA problem can be easily extended to the MA pattern
by removing the last constraint
15
(NO-SA) min
m1,...,mC
n(1,c),...,n(L,c)
LX
l=1
CX
c=1
n(l,c)
(1)
subject to
UX
u=1
u,l U ˆtl l = 1, . . . , L (2)
mc 1 < mc c = 2, . . . , L (3)
0 
LX
l=1
n(l,c)
 ˆBc c = 1, . . . , C (4)
n(l,c)
= 0 for l 6= c (5)
(NO-MA)
andCommunications
School of Computing
ˆB3
ˆB2
ˆB1
subch. 1
subch. 2
subch. 3
NO-MA Heuristic
๏ The NO-MA is still an hard integer optimisation problem. We
adopt the same two-step heuristic strategy.
๏ For the first step we resort to the ‘Step 1’ procedure
16
andCommunications
School of Computing
NO-MA Heuristic
๏ The NO-MA is still an hard integer optimisation problem. We
adopt the same two-step heuristic strategy.
๏ For the first step we resort to the ‘Step 1’ procedure
๏ The idea behind the second step can be summarised as follows
16
ˆB3
ˆB2
ˆB1
subchannel 1
subchannel 2
subchannel 3
DNO,1(n(1)
) ˆD
andCommunications
School of Computing
NO-MA Heuristic
๏ The NO-MA is still an hard integer optimisation problem. We
adopt the same two-step heuristic strategy.
๏ For the first step we resort to the ‘Step 1’ procedure
๏ The idea behind the second step can be summarised as follows
16
ˆB3
ˆB2
ˆB1
subchannel 1
subchannel 2
subchannel 3
DNO,1(n(1)
) ˆD DNO,2(n(1)
, n(2)
) ˆD
andCommunications
School of Computing
NO-MA Heuristic
๏ The NO-MA is still an hard integer optimisation problem. We
adopt the same two-step heuristic strategy.
๏ For the first step we resort to the ‘Step 1’ procedure
๏ The idea behind the second step can be summarised as follows
16
ˆB3
ˆB2
ˆB1
subchannel 1
subchannel 2
subchannel 3
DNO,1(n(1)
) ˆD DNO,2(n(1)
, n(2)
) ˆD
DNO,3(n(1)
, n(2)
, n(3)
) ˆD
andCommunications
School of Computing
NO-MA Heuristic
๏ The NO-MA is still an hard integer optimisation problem. We
adopt the same two-step heuristic strategy.
๏ For the first step we resort to the ‘Step 1’ procedure
๏ The idea behind the second step can be summarised as follows
16
n Strategies
e node delivers the
principle. From (6),
follows:
ˆD
⌘
. (13)
ver the first l layers
greater than a target
we propose for the
A (NO-SA) can be
(l,c)
(14)
= 1, . . . , L (15)
= 2, . . . , L (16)
= 1, . . . , C (17)
or l 6= c (18)
Step 1 Subchannel MCSs optimization.
1: c C
2: v mMAX and
3: while c 1 do
4: repeat
5: mc v
6: v v 1
7: until |U(mc)
| U · ˆtc or v < mmin
8: c c 1
9: end while
Step 2 Coded packet allocation for a the NO-MA case.
1: c 1
2: n(l,c)
1 for any l = 1, . . . , L and c = 1, . . . , C
3: n = {n(l)
}L
l=1, where n(l)
1 for any l = 1, . . . , L
4: for l 1, . . . , L do
5: while DNO,l(n) < ˆD and c  C do
6: n(l,c)
n(l,c)
+ 1
7: n(l) PC
t=1 n(l,t)
for any l = 1, . . . , L
8: if
PL
t=1 n(t,c)
= ˆBc then
9: c c + 1
10: end if
11: end while
12: if DNO,l(n) < ˆD and c > C then
13: no solution can be found.
14: end if
15: end for
Requires$a$no.$of$steps


PC
t=1
ˆBt
andCommunications
School of Computing
EW-MA Model
๏ We define the indicator variable







User u will recover the first l service layers (at least) with
probability if any of the windows l, l+1, …, L are recovered
(at least) with probability
17
µu,l = I
L_
t=l
n
DEW,t(Nu) ˆD
o
!
ˆD
ˆD
๏ Consider the EW delivery mode
andCommunications
School of Computing
k1 k2 k3
x1 x2 xK. . .. . .
Exp. Win. 3
Exp. Win. 2
Exp. Win. 1
ˆB3
ˆB2
ˆB1
subch. 1
subch. 2
subch. 3
EW-MA Model
๏ The RA problem for the EW-MA case is
18
(EW-MA) min
m1,...,mC
N(1,c),...,N(L,c)
LX
l=1
CX
c=1
N(l,c)
(1)
subject to
UX
u=1
µu,l U ˆtl l = 1, . . . , L (2)
mc 1 < mc c = 2, . . . , L (3)
0 
LX
l=1
N(l,c)
 ˆBc c = 1, . . . , C (4)
No.$of$packets$of$
window$l$delivered$
over$c
๏ It is still an hard integer optimisation problem but the
previously proposed heuristic strategy can be still applied.
andCommunications
School of Computing
ˆB3
ˆB2
ˆB1
subch. 1
subch. 2
subch. 3
3. H.264/SVC Service Delivery over eMBMS Networks
andCommunications
School of Computing
Layered Video Streams
H.264/SVC video stream formed by multiple video layers:
๏ the base layer - provides basic reconstruction quality
๏ multiple enhancement layers - which gradually improve the
quality of the base layer
20
Considering a H.264/SVC video stream
base
e1
e2
GoP
๏ it is a GoP stream
๏ a GoP has fixed number of
frames
๏ it is characterized by a time
duration (to be watched)
๏ it has a layered nature
andCommunications
School of Computing
H.264/SVC and NC
๏ The decoding process of a H.264/SVC service is performed on a
GoP-basis
21
k1 k2 k3
K3
K2
K1
x1 x2 xK. . .. . .
๏ Hence, the can be defined as
The$basic$layer$
of$a$GoP
1st$enhancement$
layer$of$a$GoP
2nd$enhancement$
layer$of$a$GoP
kl =
⌃Rl dGoP
H
⌥
kl
Time$duration$of$a$
GoP
Bitrate$of$the$video$
layer
andCommunications
School of Computing
Source/Coded$packet$
bit$size
LTE-A System Model
radio frame
time
frequency
TB left for other services
eMBMS-capable subframes
TB of subchannel 1 TB of subchannel 2 TB of subchannel 3
๏ PtM communications managed by the eMBMS framework
๏ We refer to a SC-eMBMS system where a eNB delivers a 

H.264/SVC video service a target MG
๏ The DL phase of LTE-A adopts the OFDMA and has a framed
nature
22
TB$=$Transport$Block
andCommunications
School of Computing
3. Analytical Results
andCommunications
School of Computing
Analytical Results
24
๏ We compared the proposed strategies with a classic Multi-
rate Transmission strategy
๏ System performance was evaluated in terms of
It$is$a$maximization$of$the$
sum$of$the$user$QoS
Resource$footprint
=
8
>>>><
>>>>:
LX
l=1
CX
c=1
n(l,c)
, for NO-RNC
LX
l=1
CX
c=1
N(l,c)
, for EW-RNC.
max
m1,...,mL
UX
u=1
PSNRu
No$error$control$strategies$
are$allowed$(ARQ,$RLNC,$etc.)
andCommunications
School of Computing
Analytical Results
24
๏ We compared the proposed strategies with a classic Multi-
rate Transmission strategy
๏ System performance was evaluated in terms of
It$is$a$maximization$of$the$
sum$of$the$user$QoS
PSNR$after$recovery$of$the$basic$
and$the$:irst$l$enhancement$layers
⇢(u) =
8
><
>:
max
l=1,...,L
n
PSNRl D
(u)
NO,l
o
, for NO-RNC
max
l=1,...,L
n
PSNRl D
(u)
EW,l
o
, for EW-RNC
max
m1,...,mL
UX
u=1
PSNRu
No$error$control$strategies$
are$allowed$(ARQ,$RLNC,$etc.)
andCommunications
School of Computing
Target cellTarget MG
eNB
Scenario$with$a$high$heterogeneity.$80$
UEs$equally$spaced$and$$placed$along$the$
radial$line$representing$the$symmetry$
axis$of$one$sector$of$the$target$cell
Analytical Results
25
We$considered$Stream$A$and$B$
which$have$3$layers,$bitrate$of$
A$is$smaller$than$that$of$B
andCommunications
School of Computing
Distance (m)
MaximumPSNRρ(dB)
90 110 130 150 170 190 210 230 250 270 2900
5
15
25
35
45
55
ˆt1ˆt2ˆt3
MrT
Heu. NO−SA
Heu. NO−MA
Heu. EW−MA
⌧ = 60
⌧ = 60 ⌧ = 43
Analytical Results
26
Stream$A$
q = 2
andCommunications
School of Computing
All$the$proposed$
strategies$meet$
the$coverage$
constraints
NOHSA
EWHMA
NOHMA
MrT
PSNR

layers$1+2+3
PSNR

layers$1+2 PSNR

layers$1
Distance (m)
MaximumPSNRρ(dB)
90 110 130 150 170 190 210 230 250 270 2900
5
15
25
35
45
55
ˆt1ˆt2ˆt3
MrT
Heu. NO−SA
Heu. NO−MA
Heu. EW−MA
⌧ = 73
⌧ = 88
⌧ = 88
Analytical Results
27
Stream$B$
q = 2
andCommunications
School of Computing
All$the$proposed$
strategies$meet$
the$coverage$
constraints
MrT
NOHSA
EWHMA
NOHMA
PSNR

layers$1+2+3
PSNR

layers$1+2 PSNR

layers$1
Distance (m)
MaximumPSNRρ(dB)
90 110 130 150 170 190 210 230 250 270 2900
5
15
25
35
45
55
ˆt1ˆt2ˆt3
MrT
Heu. NO−SA
Heu. NO−MA
Heu. EW−MA
Stream A
Stream B
๏ The NO-MA and EW-MA strategies are equivalent both in
terms of resource footprint and service coverage
๏ The service coverage of NO-SA still diverges from that of
NO-MA and EW-MA.
Streams$A$and$B$
q = 256
Analytical Results
28
MrT
NOHSA
NO/EWHMA
andCommunications
School of Computing
4. Concluding Remarks
andCommunications
School of Computing
Concluding Remarks
30
๏ Definition of a generic system model that can be easily
adapted to practical scenarios
๏ Derivation of the theoretical framework to assess user QoS
๏ Definition of efficient resource allocation frameworks, that
can jointly optimise both system parameters and the error
control strategy in use
๏ Development of efficient heuristic strategies that can derive
good quality solutions in a finite number of steps.
andCommunications
School of Computing
Concluding Remarks
31
andCommunications
School of Computing
For more information

http://arxiv.org/abs/1411.5547
or
http://goo.gl/Z4Y9YF
A. Tassi, I. Chatzigeorgiou, and D. Vukobratović, “Resource Allocation
Frameworks for Network-coded Layered Multimedia Multicast Services”,
IEEE Journal on Selected Areas in Communications, Special Issue on
“Fundamental Approaches to Network Coding in Wireless Communication
Systems”, in press.
Thank you for
your attention
andCommunications
School of Computing
Edinburgh, 28th November 2014
R2D2: Network error control for
Rapid and Reliable Data Delivery
Project supported by EPSRC under the
First Grant scheme (EP/L006251/1)
Resource Allocation Schemes
for Layered Video Broadcasting
University of Edinburgh
Andrea Tassi and Ioannis Chatzigeorgiou
{a.tassi, i.chatzigeorgiou}@lancaster.ac.uk
andCommunications
School of Computing

More Related Content

Viewers also liked

Research techniques
Research techniquesResearch techniques
Research techniquesMia Buckley
 
Real-Coded Extended Compact Genetic Algorithm based on Mixtures of Models
Real-Coded Extended Compact Genetic Algorithm based on Mixtures of ModelsReal-Coded Extended Compact Genetic Algorithm based on Mixtures of Models
Real-Coded Extended Compact Genetic Algorithm based on Mixtures of ModelsPier Luca Lanzi
 
Presentation of 'A Novel Convex Power Adaptation Strategy for Multicast Commu...
Presentation of 'A Novel Convex Power Adaptation Strategy for Multicast Commu...Presentation of 'A Novel Convex Power Adaptation Strategy for Multicast Commu...
Presentation of 'A Novel Convex Power Adaptation Strategy for Multicast Commu...Andrea Tassi
 
Silicon Cluster Optimization Using Extended Compact Genetic Algorithm
Silicon Cluster Optimization Using Extended Compact Genetic AlgorithmSilicon Cluster Optimization Using Extended Compact Genetic Algorithm
Silicon Cluster Optimization Using Extended Compact Genetic Algorithmkknsastry
 
Sparse Random Network Coding for Reliable Multicast Services
Sparse Random Network Coding for Reliable Multicast ServicesSparse Random Network Coding for Reliable Multicast Services
Sparse Random Network Coding for Reliable Multicast ServicesAndrea Tassi
 
Parte 3 - Linux ed i sistemi embedded per le reti (di Riccardo Coppola)
Parte 3 - Linux ed i sistemi embedded per le reti (di Riccardo Coppola)Parte 3 - Linux ed i sistemi embedded per le reti (di Riccardo Coppola)
Parte 3 - Linux ed i sistemi embedded per le reti (di Riccardo Coppola)Andrea Tassi
 
R2D2 Project (EP/L006251/1) - Research Objectives & Outcomes
R2D2 Project (EP/L006251/1) - Research Objectives & OutcomesR2D2 Project (EP/L006251/1) - Research Objectives & Outcomes
R2D2 Project (EP/L006251/1) - Research Objectives & OutcomesAndrea Tassi
 
Talk on Resource Allocation Strategies for Layered Multimedia Multicast Services
Talk on Resource Allocation Strategies for Layered Multimedia Multicast ServicesTalk on Resource Allocation Strategies for Layered Multimedia Multicast Services
Talk on Resource Allocation Strategies for Layered Multimedia Multicast ServicesAndrea Tassi
 
A short introduction to Network coding
A short introduction to Network codingA short introduction to Network coding
A short introduction to Network codingArash Pourdamghani
 
Presentation of 'Reliable Rate-Optimized Video Multicasting Services over LTE...
Presentation of 'Reliable Rate-Optimized Video Multicasting Services over LTE...Presentation of 'Reliable Rate-Optimized Video Multicasting Services over LTE...
Presentation of 'Reliable Rate-Optimized Video Multicasting Services over LTE...Andrea Tassi
 
Simple regenerating codes: Network Coding for Cloud Storage
Simple regenerating codes: Network Coding for Cloud StorageSimple regenerating codes: Network Coding for Cloud Storage
Simple regenerating codes: Network Coding for Cloud StorageKevin Tong
 
Acoustic communication using ofdm
Acoustic communication using ofdmAcoustic communication using ofdm
Acoustic communication using ofdmRAVITEJA828
 

Viewers also liked (14)

Research techniques
Research techniquesResearch techniques
Research techniques
 
Real-Coded Extended Compact Genetic Algorithm based on Mixtures of Models
Real-Coded Extended Compact Genetic Algorithm based on Mixtures of ModelsReal-Coded Extended Compact Genetic Algorithm based on Mixtures of Models
Real-Coded Extended Compact Genetic Algorithm based on Mixtures of Models
 
Presentation of 'A Novel Convex Power Adaptation Strategy for Multicast Commu...
Presentation of 'A Novel Convex Power Adaptation Strategy for Multicast Commu...Presentation of 'A Novel Convex Power Adaptation Strategy for Multicast Commu...
Presentation of 'A Novel Convex Power Adaptation Strategy for Multicast Commu...
 
Silicon Cluster Optimization Using Extended Compact Genetic Algorithm
Silicon Cluster Optimization Using Extended Compact Genetic AlgorithmSilicon Cluster Optimization Using Extended Compact Genetic Algorithm
Silicon Cluster Optimization Using Extended Compact Genetic Algorithm
 
PRINCE2 Practitioner
PRINCE2 PractitionerPRINCE2 Practitioner
PRINCE2 Practitioner
 
Sparse Random Network Coding for Reliable Multicast Services
Sparse Random Network Coding for Reliable Multicast ServicesSparse Random Network Coding for Reliable Multicast Services
Sparse Random Network Coding for Reliable Multicast Services
 
Parte 3 - Linux ed i sistemi embedded per le reti (di Riccardo Coppola)
Parte 3 - Linux ed i sistemi embedded per le reti (di Riccardo Coppola)Parte 3 - Linux ed i sistemi embedded per le reti (di Riccardo Coppola)
Parte 3 - Linux ed i sistemi embedded per le reti (di Riccardo Coppola)
 
R2D2 Project (EP/L006251/1) - Research Objectives & Outcomes
R2D2 Project (EP/L006251/1) - Research Objectives & OutcomesR2D2 Project (EP/L006251/1) - Research Objectives & Outcomes
R2D2 Project (EP/L006251/1) - Research Objectives & Outcomes
 
Talk on Resource Allocation Strategies for Layered Multimedia Multicast Services
Talk on Resource Allocation Strategies for Layered Multimedia Multicast ServicesTalk on Resource Allocation Strategies for Layered Multimedia Multicast Services
Talk on Resource Allocation Strategies for Layered Multimedia Multicast Services
 
A short introduction to Network coding
A short introduction to Network codingA short introduction to Network coding
A short introduction to Network coding
 
Presentation of 'Reliable Rate-Optimized Video Multicasting Services over LTE...
Presentation of 'Reliable Rate-Optimized Video Multicasting Services over LTE...Presentation of 'Reliable Rate-Optimized Video Multicasting Services over LTE...
Presentation of 'Reliable Rate-Optimized Video Multicasting Services over LTE...
 
Introduction to Network Coding
Introduction to Network CodingIntroduction to Network Coding
Introduction to Network Coding
 
Simple regenerating codes: Network Coding for Cloud Storage
Simple regenerating codes: Network Coding for Cloud StorageSimple regenerating codes: Network Coding for Cloud Storage
Simple regenerating codes: Network Coding for Cloud Storage
 
Acoustic communication using ofdm
Acoustic communication using ofdmAcoustic communication using ofdm
Acoustic communication using ofdm
 

Recently uploaded

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 

Recently uploaded (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

Talk on Resource Allocation Schemes for Layered Video Broadcasting

  • 1. Edinburgh, 28th November 2014 R2D2: Network error control for Rapid and Reliable Data Delivery Project supported by EPSRC under the First Grant scheme (EP/L006251/1) Resource Allocation Schemes for Layered Video Broadcasting University of Edinburgh Andrea Tassi and Ioannis Chatzigeorgiou {a.tassi, i.chatzigeorgiou}@lancaster.ac.uk andCommunications School of Computing
  • 2. Starting Point and Goals ๏ Delivery of multimedia broadcast/multicast services over 4G networks is a challenging task. This has propelled research into delivery schemes. ๏ Multi-rate transmission strategies have been proposed as a means of delivering layered services to users experiencing different downlink channel conditions. ๏ Layered service consists of a basic layer and multiple enhancement layers. Goals ๏ Error control - Ensure that a predetermined fraction of users achieves a certain service level with at least a given probability ๏ Resource optimisation - Minimise the total amount of radio resources needed to deliver a layered service. 2 andCommunications School of Computing
  • 3. Index 1. System Parameters and Performance Analysis 2. Multi-Channel Resource Allocation Models and Heuristic Strategies 3. H.264/SVC Service Delivery over LTE-A eMBMS Networks 4. Analytical Results 5. Concluding Remarks 3 andCommunications School of Computing
  • 4. 1. System Parameters and Performance Analysis andCommunications School of Computing
  • 5. System Model ๏ One-hop wireless communication system composed of one source node and U users 5 UE 1 UE 3 UE 2 UE 4 UE U Source Node ˆB3 ˆB2 ˆB1 subch. 1 subch. 2 subch. 3 ๏ Each PtM layered service is delivered through C orthogonal broadcast erasure subchannels The$same$MCS Capacity$of$subch.$3$ (no.$of$packets) ๏ Each subchannel delivers streams of (en)coded packets (according to the RLNC principle). andCommunications School of Computing
  • 6. 6 k1 k2 k3 x1 x2 xK. . .. . . ๏ is a layered source message of K source packets, classified into L service layers x = {x1, . . . , xK} Non-Overlapping Layered RNC andCommunications School of Computing
  • 7. 6 ๏ Encoding performed over each service layer independently from the others. ๏ The source node will linearly combine the data packets composing the l-th layer and will generate a stream of coded packets , where k1 k2 k3 x1 x2 xK. . .. . . ๏ is a layered source message of K source packets, classified into L service layers x = {x1, . . . , xK} Non-Overlapping Layered RNC andCommunications School of Computing kl xl = {xi}kl i=1 nl kl y = {yj}nl j=1 yj = klX i=1 gj,i xi Coef:icients$of$the$ linear$combination$ are$selected$over$a$ :inite$:ield$of$size$q
  • 8. Non-Overlapping Layered RNC ๏ User u recovers layer l if it will collect k_l linearly independent coded packets. The prob. of this event is 7 kl Pl(nl,u) = nl,u X r=kl ✓ nl,u r ◆ pnl,u r (1 p)r h(r) = nl,u X r=kl ✓ nl,u r ◆ pnl,u r (1 p)r kl 1Y i=0 h 1 1 qr i i | {z } h(r) Prob.$of$receiving$r$out$of$nl,u$coded$symbols Prob.$of$decoding$
 layer$l ๏ The probability that user u recover the first l service layers is DNO,l(n1,u, . . . , nL,u) = DNO,l(nu) = lY i=1 Pi(ni,u) PEP andCommunications School of Computing
  • 9. 8 ๏ The source node (i) linearly combines data packets belonging to the same window, (ii) repeats this process for all windows, and (iii) broadcasts each stream of coded packets over one or more subchannels Expanding Window Layered RNC ๏ We define the l-th window as the set of source packets belonging to the first l service layers. Namely, 
 where Xl Xl ={xj}Kl j=1 Kl = Pl i=1 ki k1 k2 k3 x1 x2 xK. . .. . . Exp. Win. 3 Exp. Win. 2 Exp. Win. 1 andCommunications School of Computing
  • 10. Expanding Window Layered RNC ๏ Sums allow us to consider all the possible combinations of received coded packets 9 ๏ The probability of user u recovering the first l layers (namely, the l-th window) can be written as DEW,l L,u) = =DEW,l(Nu) = N1,u X r1=0 · · · Nl 1,u X rl 1=0 Nl,u X rl=rmin,l ✓ N1,u r1 ◆ · · · ✓ Nl,u rl ◆ p Pl i=1(Ni,u ri) (1 p) Pl i=1 ri gl(r) Prob.$of$receiving $out$ of$ coded$symbols Prob.$of$decoding$
 window$l DEW,l(Nu) DEW,l(N1,u, . . . , NL,u) = =DEW,l(Nu) = N1,u X r1=0 · · · Nl 1,u X rl 1=0 Nl,u X rl=rmin,l ✓ N1,u r1 ◆ · · · ✓ Nl,u rl ◆ p Pl i=1(Ni,u ri) ( r = {r1, . . . , rl} andCommunications School of Computing
  • 11. 2. Multi-Channel Resource Allocation Models and Heuristic Strategies andCommunications School of Computing
  • 12. Allocation Patterns 11 ˆB3 ˆB2 ˆB1 subchannel 1 subchannel 2 subchannel 3 andCommunications School of Computing
  • 13. Allocation Patterns 11 ˆB3 ˆB2 ˆB1 subchannel 1 subchannel 2 subchannel 3 coded packets from x1 coded packets from x2 coded packets from x3 ˆB3 ˆB2 ˆB1 subchannel 1 subchannel 2 subchannel 3 Separated$ Allocation$ Pattern andCommunications School of Computing
  • 14. Mixed$ Allocation$ Pattern ˆB3 ˆB2 ˆB1 coded packets from x3 or X3 coded packets from x2 or X2 coded packets from x1 or X1 subchannel 1 subchannel 2 subchannel 3 Allocation Patterns 11 ˆB3 ˆB2 ˆB1 subchannel 1 subchannel 2 subchannel 3 andCommunications School of Computing
  • 15. NO-SA Model ๏ Consider the variable . It is 1, if u can recover the first l layers with a probability value 
 , otherwise it is 0. 12 u,l = I ⇣ DNO,l(nu) ˆD ⌘ ˆD andCommunications School of Computing ˆB3 ˆB2 ˆB1 subch. 1 subch. 2 subch. 3
  • 16. NO-SA Model ๏ Consider the variable . It is 1, if u can recover the first l layers with a probability value 
 , otherwise it is 0. ๏ The RA problem for the NO-SA case is 12 u,l = I ⇣ DNO,l(nu) ˆD ⌘ ˆD (NO-SA) min m1,...,mC n(1,c),...,n(L,c) LX l=1 CX c=1 n(l,c) (1) subject to UX u=1 u,l U ˆtl l = 1, . . . , L (2) mc 1 < mc c = 2, . . . , L (3) 0  LX l=1 n(l,c)  ˆBc c = 1, . . . , C (4) n(l,c) = 0 for l 6= c (5) No.$of$packets$of$layer$l$ delivered$over$c Minimization$of$ resource$footprint andCommunications School of Computing ˆB3 ˆB2 ˆB1 subch. 1 subch. 2 subch. 3
  • 17. NO-SA Model ๏ Consider the variable . It is 1, if u can recover the first l layers with a probability value 
 , otherwise it is 0. ๏ The RA problem for the NO-SA case is 12 u,l = I ⇣ DNO,l(nu) ˆD ⌘ ˆD (NO-SA) min m1,...,mC n(1,c),...,n(L,c) LX l=1 CX c=1 n(l,c) (1) subject to UX u=1 u,l U ˆtl l = 1, . . . , L (2) mc 1 < mc c = 2, . . . , L (3) 0  LX l=1 n(l,c)  ˆBc c = 1, . . . , C (4) n(l,c) = 0 for l 6= c (5) Each$service$level$shall$be$ achieved$by$a$predetermined$ fraction$of$users No.$of$users Target$fraction$of$users andCommunications School of Computing ˆB3 ˆB2 ˆB1 subch. 1 subch. 2 subch. 3
  • 18. NO-SA Model ๏ Consider the variable . It is 1, if u can recover the first l layers with a probability value 
 , otherwise it is 0. ๏ The RA problem for the NO-SA case is 12 u,l = I ⇣ DNO,l(nu) ˆD ⌘ ˆD (NO-SA) min m1,...,mC n(1,c),...,n(L,c) LX l=1 CX c=1 n(l,c) (1) subject to UX u=1 u,l U ˆtl l = 1, . . . , L (2) mc 1 < mc c = 2, . . . , L (3) 0  LX l=1 n(l,c)  ˆBc c = 1, . . . , C (4) n(l,c) = 0 for l 6= c (5) DynamicH$and$ systemHrelated$ constraints Because$of$the$SA$ pattern andCommunications School of Computing ˆB3 ˆB2 ˆB1 subch. 1 subch. 2 subch. 3
  • 19. NO-SA Heuristic ๏ The NO-SA is an hard integer optimisation problem because of the coupling constraints among variables ๏ We propose a two-step heuristic strategy i. MCSs optimisation ( ) ii. No. of coded packet per-subchannel optimization
 ( ) 13 m1, . . . , mC n(1,c) , . . . , n(L,c) ๏ The first step selects the 
 value of such that packets delivered through subch. c are received (at least with a target prob.) by users. mc |U(mc) | U · ˆtc apping Resource Allocation Strategies system where the source node delivers the by means of the NO RNC principle. From (??), indication variable u,l as follows: u,l = I ⇣ DNO,l(nu) ˆD ⌘ . (13) s, u,l = 1, if u can recover the first l layers ity value that is equal to or greater than a target wise u,l = 0. e allocation model that we propose for the Step 1 Subchannel MCSs optimization. 1: c C 2: v mMAX and 3: while c 1 do 4: repeat 5: mc v 6: v v 1 7: until |U(mc) | U · ˆtc or v < mmin 8: c c 1 9: end while because of the nature of the considered a andCommunications School of Computing
  • 20. NO-SA Heuristic ๏ The second step aims at optimising and can be summarised as follows 14 n(1,c) , . . . , n(L,c) 5 Strategies node delivers the principle. From (6), ollows: ˆD ⌘ . (13) er the first l layers greater than a target we propose for the A (NO-SA) can be l,c) (14) Step 1 Subchannel MCSs optimization. 1: c C 2: v mMAX and 3: while c 1 do 4: repeat 5: mc v 6: v v 1 7: until |U(mc) | U · ˆtc or v < mmin 8: c c 1 9: end while Step 2 Coded packet allocation for a the NO-SA case. 1: for l 1, . . . , L do 2: n(l,l) kl 3: while DNO,l(n(1,1) , . . . , n(l,l) ) < ˆD do 4: n(l,l) n(l,l) + 1 5: end while 6: end for Requires$a$no.$of$steps
  PL t=1 ⇣ ˆBt kt + 1 ⌘ ˆB3 ˆB2 ˆB1 subchannel 1 subchannel 2 subchannel 3 DNO,1(n(1,1) ) ˆD DNO,2(n(1,1) , n(2,2) ) ˆD DNO,3(n(1,1) , n(2,2) , n(3,3) ) ˆD 5 on Strategies ce node delivers the C principle. From (6), s follows: ˆD ⌘ . (13) over the first l layers or greater than a target we propose for the SA (NO-SA) can be n(l,c) (14) l = 1, . . . , L (15) Procedure 1 Subchannel MCSs optimization. 1: c C 2: v mMAX and 3: while c 1 do 4: repeat 5: mc v 6: v v 1 7: until |U(mc) | U · ˆtc or v < mmin 8: c c 1 9: end while Step 2 Coded packet allocation for the NO-SA case. 1: c 1 2: n(l,c) 1 for any l = 1, . . . , L and c = 1, . . . , C 3: n = {n(l) }L l=1, where n(l) 1 for any l = 1, . . . , L 4: for l 1, . . . , L do 5: while DNO,l(n) < ˆD and c  C do 6: n(l,c) n(l,c) + 1 7: n(l) PC t=1 n(l,t) for any l = 1, . . . , L 8: if PL t=1 n(t,c) = ˆBc then andCommunications School of Computing
  • 21. NO-MA Model ๏ The NO-SA problem can be easily extended to the MA pattern by removing the last constraint 15 (NO-SA) min m1,...,mC n(1,c),...,n(L,c) LX l=1 CX c=1 n(l,c) (1) subject to UX u=1 u,l U ˆtl l = 1, . . . , L (2) mc 1 < mc c = 2, . . . , L (3) 0  LX l=1 n(l,c)  ˆBc c = 1, . . . , C (4) n(l,c) = 0 for l 6= c (5) andCommunications School of Computing ˆB3 ˆB2 ˆB1 subch. 1 subch. 2 subch. 3
  • 22. NO-MA Model ๏ The NO-SA problem can be easily extended to the MA pattern by removing the last constraint 15 (NO-SA) min m1,...,mC n(1,c),...,n(L,c) LX l=1 CX c=1 n(l,c) (1) subject to UX u=1 u,l U ˆtl l = 1, . . . , L (2) mc 1 < mc c = 2, . . . , L (3) 0  LX l=1 n(l,c)  ˆBc c = 1, . . . , C (4) n(l,c) = 0 for l 6= c (5) (NO-MA) andCommunications School of Computing ˆB3 ˆB2 ˆB1 subch. 1 subch. 2 subch. 3
  • 23. NO-MA Heuristic ๏ The NO-MA is still an hard integer optimisation problem. We adopt the same two-step heuristic strategy. ๏ For the first step we resort to the ‘Step 1’ procedure 16 andCommunications School of Computing
  • 24. NO-MA Heuristic ๏ The NO-MA is still an hard integer optimisation problem. We adopt the same two-step heuristic strategy. ๏ For the first step we resort to the ‘Step 1’ procedure ๏ The idea behind the second step can be summarised as follows 16 ˆB3 ˆB2 ˆB1 subchannel 1 subchannel 2 subchannel 3 DNO,1(n(1) ) ˆD andCommunications School of Computing
  • 25. NO-MA Heuristic ๏ The NO-MA is still an hard integer optimisation problem. We adopt the same two-step heuristic strategy. ๏ For the first step we resort to the ‘Step 1’ procedure ๏ The idea behind the second step can be summarised as follows 16 ˆB3 ˆB2 ˆB1 subchannel 1 subchannel 2 subchannel 3 DNO,1(n(1) ) ˆD DNO,2(n(1) , n(2) ) ˆD andCommunications School of Computing
  • 26. NO-MA Heuristic ๏ The NO-MA is still an hard integer optimisation problem. We adopt the same two-step heuristic strategy. ๏ For the first step we resort to the ‘Step 1’ procedure ๏ The idea behind the second step can be summarised as follows 16 ˆB3 ˆB2 ˆB1 subchannel 1 subchannel 2 subchannel 3 DNO,1(n(1) ) ˆD DNO,2(n(1) , n(2) ) ˆD DNO,3(n(1) , n(2) , n(3) ) ˆD andCommunications School of Computing
  • 27. NO-MA Heuristic ๏ The NO-MA is still an hard integer optimisation problem. We adopt the same two-step heuristic strategy. ๏ For the first step we resort to the ‘Step 1’ procedure ๏ The idea behind the second step can be summarised as follows 16 n Strategies e node delivers the principle. From (6), follows: ˆD ⌘ . (13) ver the first l layers greater than a target we propose for the A (NO-SA) can be (l,c) (14) = 1, . . . , L (15) = 2, . . . , L (16) = 1, . . . , C (17) or l 6= c (18) Step 1 Subchannel MCSs optimization. 1: c C 2: v mMAX and 3: while c 1 do 4: repeat 5: mc v 6: v v 1 7: until |U(mc) | U · ˆtc or v < mmin 8: c c 1 9: end while Step 2 Coded packet allocation for a the NO-MA case. 1: c 1 2: n(l,c) 1 for any l = 1, . . . , L and c = 1, . . . , C 3: n = {n(l) }L l=1, where n(l) 1 for any l = 1, . . . , L 4: for l 1, . . . , L do 5: while DNO,l(n) < ˆD and c  C do 6: n(l,c) n(l,c) + 1 7: n(l) PC t=1 n(l,t) for any l = 1, . . . , L 8: if PL t=1 n(t,c) = ˆBc then 9: c c + 1 10: end if 11: end while 12: if DNO,l(n) < ˆD and c > C then 13: no solution can be found. 14: end if 15: end for Requires$a$no.$of$steps
  PC t=1 ˆBt andCommunications School of Computing
  • 28. EW-MA Model ๏ We define the indicator variable
 
 
 
 User u will recover the first l service layers (at least) with probability if any of the windows l, l+1, …, L are recovered (at least) with probability 17 µu,l = I L_ t=l n DEW,t(Nu) ˆD o ! ˆD ˆD ๏ Consider the EW delivery mode andCommunications School of Computing k1 k2 k3 x1 x2 xK. . .. . . Exp. Win. 3 Exp. Win. 2 Exp. Win. 1 ˆB3 ˆB2 ˆB1 subch. 1 subch. 2 subch. 3
  • 29. EW-MA Model ๏ The RA problem for the EW-MA case is 18 (EW-MA) min m1,...,mC N(1,c),...,N(L,c) LX l=1 CX c=1 N(l,c) (1) subject to UX u=1 µu,l U ˆtl l = 1, . . . , L (2) mc 1 < mc c = 2, . . . , L (3) 0  LX l=1 N(l,c)  ˆBc c = 1, . . . , C (4) No.$of$packets$of$ window$l$delivered$ over$c ๏ It is still an hard integer optimisation problem but the previously proposed heuristic strategy can be still applied. andCommunications School of Computing ˆB3 ˆB2 ˆB1 subch. 1 subch. 2 subch. 3
  • 30. 3. H.264/SVC Service Delivery over eMBMS Networks andCommunications School of Computing
  • 31. Layered Video Streams H.264/SVC video stream formed by multiple video layers: ๏ the base layer - provides basic reconstruction quality ๏ multiple enhancement layers - which gradually improve the quality of the base layer 20 Considering a H.264/SVC video stream base e1 e2 GoP ๏ it is a GoP stream ๏ a GoP has fixed number of frames ๏ it is characterized by a time duration (to be watched) ๏ it has a layered nature andCommunications School of Computing
  • 32. H.264/SVC and NC ๏ The decoding process of a H.264/SVC service is performed on a GoP-basis 21 k1 k2 k3 K3 K2 K1 x1 x2 xK. . .. . . ๏ Hence, the can be defined as The$basic$layer$ of$a$GoP 1st$enhancement$ layer$of$a$GoP 2nd$enhancement$ layer$of$a$GoP kl = ⌃Rl dGoP H ⌥ kl Time$duration$of$a$ GoP Bitrate$of$the$video$ layer andCommunications School of Computing Source/Coded$packet$ bit$size
  • 33. LTE-A System Model radio frame time frequency TB left for other services eMBMS-capable subframes TB of subchannel 1 TB of subchannel 2 TB of subchannel 3 ๏ PtM communications managed by the eMBMS framework ๏ We refer to a SC-eMBMS system where a eNB delivers a 
 H.264/SVC video service a target MG ๏ The DL phase of LTE-A adopts the OFDMA and has a framed nature 22 TB$=$Transport$Block andCommunications School of Computing
  • 35. Analytical Results 24 ๏ We compared the proposed strategies with a classic Multi- rate Transmission strategy ๏ System performance was evaluated in terms of It$is$a$maximization$of$the$ sum$of$the$user$QoS Resource$footprint = 8 >>>>< >>>>: LX l=1 CX c=1 n(l,c) , for NO-RNC LX l=1 CX c=1 N(l,c) , for EW-RNC. max m1,...,mL UX u=1 PSNRu No$error$control$strategies$ are$allowed$(ARQ,$RLNC,$etc.) andCommunications School of Computing
  • 36. Analytical Results 24 ๏ We compared the proposed strategies with a classic Multi- rate Transmission strategy ๏ System performance was evaluated in terms of It$is$a$maximization$of$the$ sum$of$the$user$QoS PSNR$after$recovery$of$the$basic$ and$the$:irst$l$enhancement$layers ⇢(u) = 8 >< >: max l=1,...,L n PSNRl D (u) NO,l o , for NO-RNC max l=1,...,L n PSNRl D (u) EW,l o , for EW-RNC max m1,...,mL UX u=1 PSNRu No$error$control$strategies$ are$allowed$(ARQ,$RLNC,$etc.) andCommunications School of Computing
  • 37. Target cellTarget MG eNB Scenario$with$a$high$heterogeneity.$80$ UEs$equally$spaced$and$$placed$along$the$ radial$line$representing$the$symmetry$ axis$of$one$sector$of$the$target$cell Analytical Results 25 We$considered$Stream$A$and$B$ which$have$3$layers,$bitrate$of$ A$is$smaller$than$that$of$B andCommunications School of Computing
  • 38. Distance (m) MaximumPSNRρ(dB) 90 110 130 150 170 190 210 230 250 270 2900 5 15 25 35 45 55 ˆt1ˆt2ˆt3 MrT Heu. NO−SA Heu. NO−MA Heu. EW−MA ⌧ = 60 ⌧ = 60 ⌧ = 43 Analytical Results 26 Stream$A$ q = 2 andCommunications School of Computing All$the$proposed$ strategies$meet$ the$coverage$ constraints NOHSA EWHMA NOHMA MrT PSNR
 layers$1+2+3 PSNR
 layers$1+2 PSNR
 layers$1
  • 39. Distance (m) MaximumPSNRρ(dB) 90 110 130 150 170 190 210 230 250 270 2900 5 15 25 35 45 55 ˆt1ˆt2ˆt3 MrT Heu. NO−SA Heu. NO−MA Heu. EW−MA ⌧ = 73 ⌧ = 88 ⌧ = 88 Analytical Results 27 Stream$B$ q = 2 andCommunications School of Computing All$the$proposed$ strategies$meet$ the$coverage$ constraints MrT NOHSA EWHMA NOHMA PSNR
 layers$1+2+3 PSNR
 layers$1+2 PSNR
 layers$1
  • 40. Distance (m) MaximumPSNRρ(dB) 90 110 130 150 170 190 210 230 250 270 2900 5 15 25 35 45 55 ˆt1ˆt2ˆt3 MrT Heu. NO−SA Heu. NO−MA Heu. EW−MA Stream A Stream B ๏ The NO-MA and EW-MA strategies are equivalent both in terms of resource footprint and service coverage ๏ The service coverage of NO-SA still diverges from that of NO-MA and EW-MA. Streams$A$and$B$ q = 256 Analytical Results 28 MrT NOHSA NO/EWHMA andCommunications School of Computing
  • 42. Concluding Remarks 30 ๏ Definition of a generic system model that can be easily adapted to practical scenarios ๏ Derivation of the theoretical framework to assess user QoS ๏ Definition of efficient resource allocation frameworks, that can jointly optimise both system parameters and the error control strategy in use ๏ Development of efficient heuristic strategies that can derive good quality solutions in a finite number of steps. andCommunications School of Computing
  • 43. Concluding Remarks 31 andCommunications School of Computing For more information
 http://arxiv.org/abs/1411.5547 or http://goo.gl/Z4Y9YF A. Tassi, I. Chatzigeorgiou, and D. Vukobratović, “Resource Allocation Frameworks for Network-coded Layered Multimedia Multicast Services”, IEEE Journal on Selected Areas in Communications, Special Issue on “Fundamental Approaches to Network Coding in Wireless Communication Systems”, in press.
  • 44. Thank you for your attention andCommunications School of Computing
  • 45. Edinburgh, 28th November 2014 R2D2: Network error control for Rapid and Reliable Data Delivery Project supported by EPSRC under the First Grant scheme (EP/L006251/1) Resource Allocation Schemes for Layered Video Broadcasting University of Edinburgh Andrea Tassi and Ioannis Chatzigeorgiou {a.tassi, i.chatzigeorgiou}@lancaster.ac.uk andCommunications School of Computing