SlideShare a Scribd company logo
1 of 15
Analysis Video Streaming on Multiple Devices Wirelessly 1
ANALYSIS VIDEO STREAMING ON MULTIPLE DEVICES WIRELESSLY
by [Name]
Course
Professor’s Name
Institution
Location of Institution
Date
Analysis Video Streaming on Multiple Devices Wirelessly 2
1.
Acronyms List
IEEE - Institute of Electrical and Electronics Engineers
URL - Uniform Resource Locator
Analysis Video Streaming on Multiple Devices Wirelessly 3
3.0 Research Methodology
3.1 General Introduction
The initial motivation of this thesis is to analyse video streaming and mention the
techniques that will improve video streaming on multiple devices wirelessly. Applying of some
of the techniques that are required in the experiment are rate selection and play-out buffer
optimization.
The method used to collect information can significantly affect the degree of efficiency,
which in turn influences the validity and reliability of the research. Therefore, it is necessary to
consider accurately the techniques that can be used to provide both relevant and suitable
information. Utilizing the current research of the qualitative and quantitative research methods,
and collection of data from streaming test.
3.2 Aspects
3.2.1 Research Strategy
The research for the dissertation will proceed by literature review and video streaming
over wireless networks.
3.2.2 Research Approach
Since the study is qualitative in nature, it follows an inductive approach. Accordingly, the
research will begin with accurate observations that will be used to produce generalized theories
and conclusions. Another reason for using the inductive method is because it acknowledges the
context where research effort is active. However, the method provides generalized theories based
on limited information and, thus, the compromising of the reliability of the results.
Analysis Video Streaming on Multiple Devices Wirelessly 4
3.2.3 Resources
The study will require five computers with wireless network adapter cards and running
Windows operating system, wireless transmitter, IEEE 802.11b with wireless Ethernet
connection, and surveillance equipment like a smartphone. IEEE 802. Thus, has become a
learning with great opportunity both indoors and classroom learning. According to
standardization with regular updates by the Institute of Electrical and Electronics
Engineers ( IEEE) LAN/MAN Standards Committee (IEEE 802), the recent amendments to the
wireless network transmission products are designed to support a use of the Wi-Fi brand
(Institute of Electrical and Electronics Engineers, 2017). However, useful customization and
standardization of technical information is the primary requirement to ensure efficient data
maintenance. File format generated by LaTeX is *.tex; it is readable and editable in any text
editor, as it contains plain text without any hidden complicated format codes or great binary
instructions. For this project, the mark- up tagging conventions of LaTeX2e will be in use as the
current software version, as the powerful and highly customizable typesetting software called
which can separate the content and the design. Additionally, LaTex is used for typesetting
professional research papers.
3.2.4 Sampling
The sampling frame will include scholarly articles, websites, and books. The sampling
will take the judgmental approach where the most productive samples to address the research by
choosing questions. Most studies, including the study by Catalan-Cid et al. (2010), used a similar
technique. On the other hand like that by Zhu and Girod (2007) used theoretical sampling,
particularly homogeneous sampling to reduce vulnerability to bias and errorby. Nguyen, et al.
(2011) proofing on using routing metric was that accounts for the link quality. For this project,
Analysis Video Streaming on Multiple Devices Wirelessly 5
homogeneous sampling techniques were used as cost and time-effective based on considerations
of data validity and reliability (Acharya et al. 2013).
3.3 Experiment Information (Primary Research)
The multitask channel is unique per the experiment. Therefore, the ORBIT test -bed has an
indoor radio grid emulator.
3.4 Qualitative/Quantitative Research
Interviews are the primary source the qualitative research. Therefore we can see the whole
process of online observation and various technologies. Thus learning on using systematic methods to
validate and triangulate observations.
3.4.1 Data requirements: validity and reliability
Analyzing data from different perspectives is useful in evaluating the consistency of
information. In this light, document analysis will be used in conjunction with triangulation to
ensure the validity. Rothbauer (2008) suggested that triangulation is one of the best methods to
tackle the issue of data validity. Also, weaknesses rather than a use of single-theory, single-
method, or single-observation study: Thereby, determine the trustworthiness of electronic
databases be determined by paying particular attention to the domain extension; for example,
extensions like .edu, .org and .gov will indicate that the sponsoring organization for the website
is an accredited university, reputable non-profit organization, and government institution
respectively (Cse.wustl.edu 2017). Sun, Vetro, and Xin (2007) ensured the reliability by
restricting the search to educational institutional websites. On the contrary, the research by Ni
(2016) disregarded this consideration by quoting unreliable sources like Wikipedia.
Analysis Video Streaming on Multiple Devices Wirelessly 6
3.5 Requirements of Data: Comparison of BROS Algorithm to Improve Streaming
Performance
This experiment is on basis of analysis of video streaming on multiple devices.
Therefore, the method with the assistive use of laptop, tablet and smartphone devices that can
Analysis Video Streaming on Multiple Devices Wirelessly 7
support wireless connection standards. Priory, comparatively to the present data measurement
choice, the similar experiment was provided by Mingzheli and Kinicki (2009) to test conditions
of poor quality video streaming in data transmission over long distance. The choice of
"streaming rate selection and buffer optimization algorithms" presented in the article is in favor
for the "Buffer and Rate Optimization for Streaming (BROS) algorithm to improve streaming
performance" (p. 26).
The overall effectiveness of the BROS uses bandwidth estimation tool specifically for
wireless networks and the model. Based on its ability to model "the relationship between buffer
size, streaming data rate, and available bandwidth distribution" and optimize "the streaming data
rate and initial buffer size, resulting in a high data rate but with few frame losses and buffer
underflow events, while still keeping a small initial buffer delay." (p.26). Furthermore, BROS is
set to follow IEEE 802.11 standards to be an essential element of the Emulated Streaming
(EmuS) client-server system to be used on various wireless conditions. This algorithm is proved
to be useful for different network bandwidth conditions to "reduce degradations in performance
caused by changes in the available bandwidth along the path of the streaming flow" (p.26).
BROS helps to slow down the media play-out rate "at the client to reduce the consumption rate
and aid prevent buffer underflow" to facilitate data transmission throughout long distances so
that user applications may decode data under the condition of less traffic consumption rate. The
smoothness of inter arrival time variance is the critical factor in available bandwidth that helps to
manage streaming packets. In this relation, Mingzheli and Kinicki (2009) experimentally proved
that "if the available bandwidth is less than the streaming rate, the expected arrival rate at the
play-out buffer will also be less than the streaming rate."(p. 30).
Analysis Video Streaming on Multiple Devices Wirelessly 8
Where, R is –gm ,
Av is -out
Figure2. Streaming rate and available bandwidth
The traditional technique of bandwidth estimation is on basis by use of the application
measurements to justify the rate selection. The play-out buffer model in testing use is shown on
Figure3. Play-out buffer model 29
Analysis Video Streaming on Multiple Devices Wirelessly 9
Practically, to provide the adequate estimation of bandwidth, novel transport protocols for
streaming media should be considered, including a TCP-friendly "trial-and-error" scaling, used
for sizing play-out buffers. The control on the selection of the streaming rate is on base by cross-
layer approach (Mingzheli and Kinicki, 2009, p.28).the examples of these are the data transfer,
router failure management, router change management and congestion control mechanism.
Next, a simple streaming test will be conducted to acquire greater realism and reduce the
extent to which facts can criticize as contrived. Video streaming tests will be carried out on
multiple devices to investigate the performance of wireless networks. The streaming application
from streamtest.net will be used to measure the quality of streaming experience for users
(Kazemi,et al., 2013). The stream test diagnostic tool will be useful since it reports the most
common problems in a transparent manner. In the current study, it will be used to simulate and
assess the streaming experience of multiple users over wireless networks. The test will apply the
star topology since it is the standard topology for 802.11- based products.
The streamtest.net diagnostic utility will be used to examine the effect of realistic
viewing to the performance. The test will involve analyzing and sampling the relevant test
parameters and data points that constitute the individual end-user streaming experience while
streaming. The streaming URL will be validated by copying the link to the platform and pressing
the "Start Test" button. Once the completion of the minute-long test, all the data gathered will be
calculated and provided in an organized manner for different stakeholders within the streaming
video ecosystem. The rendering results will be in two pages, namely basic and advanced as
shown in Fig. 3. In this case, the results will be viewed from the high-level panel since it
provides useful information for technically inclined users.
Analysis Video Streaming on Multiple Devices Wirelessly 10
3.5.1 Bandwidth limitations
The effectiveness of distribution the speed of traffic accessible to upload or download,
Internet service providers should apply limitations on bandwidth to ensure the stability of data
processing among all users, based on the principle of equality (Gumenyuk, et al., 2014).This
policy works very well, when users get "throttle" limits or "capping" to restrict their video
streaming potential, for the sake of stability of network work, in the interests of other users. In
fact, the popularity of video streaming channels (e.g. Netflix) encouraged many users to cancel
cable TV subscriptions to watch movies and other videos online. However, "capping" applied by
providers restricts their opportunity to ensure stable video streaming channels for steady work
since they pass over the limit of traffic. However, it is possible to "uncap" the channel, and this
may lead to problems with provider services since having been caught for violation of the policy
of services use. Regularly, bandwidth limitation applied per user is that h/she cannot download
more than 1Mb of data per second.
Analysis Video Streaming on Multiple Devices Wirelessly 11
Figure 3. Test scenario
3.5.2 Data analysis
The study will involve skimming, reading, interpretation of materials, and thematic
analysis. Classification on the central theme of the research will be by the solid understanding of
the transmission issues in video streaming, supported by evidence.
3.5.3. Merits
Clearly, the collection of most data will be from articles. This method allows access to
information that would otherwise be difficult (Centers for Disease Control and Prevention 2009).
Analysis Video Streaming on Multiple Devices Wirelessly 12
The research by Li, Claypool, and Kinicki (2009) showed that using scholarly articles eliminates
the influence that people may have in the process.
3.5.4 Constraints
The information given by different authors may be incomplete or idiosyncratic. In fact,
Ahmed (2010) warned that the research is only a step in the analysis of streaming and thus it
leaves many areas for future studies. Golwelkar and Woods (2007) and Bowen (2009) pointed
out that the publishing usability and quality of sources depend on the domain.
3.5.5 Problems encountered
Throughout experimental testing, the following problems concerning the wireless
network, have been encountered:
3.5.5.1 Inability of a wireless client to connect to the network
The problem is that some users may detect a wireless connection point but do not have an
ability to connect to it with their devices. The inability to connect to the wireless point may be
caused by “noises” from other devices (microwaves, cordless phones) that are barriers to
establish a connection. The effective resolution to the problem is to provide monitoring of the
network with software tools and conduct the site survey to reveal problems at the user side.
3.5.5.2 Slow application performance
The symptoms of the problem are sluggish data processing, freezing of an image on an
individual screen point. The problem may be encountered, because of a server or network failure
to process requests. The effective resolution will be to double check Ethernet-based errors (e.g.
Collisions, FCS Errors, Alignment Errors, etc.) to prevent packet loss.
Analysis Video Streaming on Multiple Devices Wirelessly 13
References
Acharya, AS, Prakash, A, Saxena, P & Nigam, 2013, Sampling: Why and how of it. Indian
Journal of Medical Specialties, 4(2), 330-333.
Ahmed, JU 2010, Documentary research method: New dimensions.
Al-Busaidi, ZQ 2008, Qualitative research and its uses in health care. Sultan Qaboos University
Medical Journal, 8(1), pp.11-s19.
Bowen, G 2009. Document analysis as a qualitative research method. Qualitative Research
Journal, 9(2), pp.27-40.
Catalan-Cid, M, Ferrer, J, Gomez, C, & Parallels, J 2010, Contention- and interference-aware
flow-based routing in wireless mesh networks: design and evaluation of a novel routing
metric. EURASIP Journal on Wireless Communications and Networking, 2010(1), 313-
768.
Centers for Disease Control and Prevention (CDC) 2009. Data collection methods for
evaluation: Document review (No. 18). Viewed 11 March, 2017,
http://www.cdc.gov/healthyyouth/evaluation/pdf/brief18.pdf
Cse.wustl.edu. (2017). QoS in wireless data networks. [online]. Cse.wustl.edu. Available at:
http://www.cse.wustl.edu/~jain/cse574-06/ftp/wireless_qos/index.html [Accessed 7 Jan.
2017].
Driscoll, DL 2011, Introduction to primary research: Observations, surveys, and
interviews.Writing Spaces: Readings on Writing, 2, pp.153-174.
Fernandes, R 2010, Video error concealment: a brief presentation. Instituto Politecnico de
Braganca.
Analysis Video Streaming on Multiple Devices Wirelessly 14
Golwelkar, A & Woods, J 2007, Motion-compensated temporal filtering and motion vector
coding using biorthogonal filters. IEEE Transactions on Circuits and Systems for Video
Technology, 17(4), 417-428.
Gumenyuk, B, Vaskiv, G & Yanukovych, V 2014, Estimation of transmission rate dependence in
Wi-Fi network from information character. International Journal of Computing, 7(1), 23-
26.
Hussein, 2015, The use of triangulation in social sciences research: Can provide qualitative and
quantitative methods be combined?. Journal of Comparative Social Work, 4(1).
Kazemi, M, Shirmohammadi, S & Sadeghi, K 2013, A review of multiple description coding
techniques for error-resilient video delivery. Multimedia Systems, 20(3), pp.283-309.
Krishna, H, Bathemma, B & Rao, S 2012, The wireless networks of 802.11 and Buffer Sizing.
IJCST, 3(1), 871-874.
LaTeX Project, 2017, viewed 11 March 2017, https://www.latex-project.org/get/
Li, M, Claypool, M & Kinicki, R 2009, Playout buffer and rate optimization for streaming over
IEEE 802.11 wireless networks. ACM Transactions on Multimedia Computing,
Communications, and Applications, 5(3), 1-25.
Li, T, Leith, D & Malone, D 2011, Buffer sizing for 802.11-Based Networks. IEEE/ACM
Transactions on Networking, 19(1), 156-169.
Lowe, C & Zemliansky, P 2013. Writing Spaces: Readings on Writings, Vol. 2 (Vol. 2). The
Saylor Foundation.
Lingzhi, MC & Kinicki, R 2009, Playout Buffer and Rate Optimization for Streaming over IEEE
802.11 Wireless Networks. ACM Transactions on Multimedia Computing,
Analysis Video Streaming on Multiple Devices Wirelessly 15
Communications, and Applications, 5 (3), 26, August 2009, viewed 11 March 2017,
http://web.cs.wpi.edu/~rek/Research/Papers/TOMCCAP09.pdf
Nguyen, L, Beuran, R & Shinoda, Y 2011, An interference and load-aware routing metric for
Wireless Mesh Networks. International Journal of Ad Hoc and Ubiquitous Computing,
7(1), p.25.
Ni, P 2016, the Visual perception of scalable video streaming: applied to mobile scenarios. ACM
SIG Multimedia Records, 8(2), pp.17-18.
Rothbauer, P 2008, Triangulation. In Given, Lisa (Ed.), “The SAGE Encyclopedia of Qualitative
Research Methods.” Sage Publications. pp. 892-894.
Sun, H, Vetro, A & Xin, J 2007, An overview of scalable video streaming. Wireless
Communications and Mobile Computing, 7(2), pp.159-172.
Working Group for WLAN Standards, 2017, IEEE 802.11 Wireless local area networks, viewed
11 March 2017, http://www.ieee802.org/11/
Zhu, X & Girod, B 2007, Video streaming over wireless networks. Signal Processing
Conference, 2007 15th European, pp.1462-1466.

More Related Content

What's hot

A Network and Position Proposal Scheme using a Link-16 based C3I System
A Network and Position Proposal Scheme using a Link-16 based C3I SystemA Network and Position Proposal Scheme using a Link-16 based C3I System
A Network and Position Proposal Scheme using a Link-16 based C3I SystemUniversity of Piraeus
 
Minkowski Distance based Feature Selection Algorithm for Effective Intrusion ...
Minkowski Distance based Feature Selection Algorithm for Effective Intrusion ...Minkowski Distance based Feature Selection Algorithm for Effective Intrusion ...
Minkowski Distance based Feature Selection Algorithm for Effective Intrusion ...IJMER
 
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYUSE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYIJMIT JOURNAL
 
Novel framework of retaining maximum data quality and energy efficiency in re...
Novel framework of retaining maximum data quality and energy efficiency in re...Novel framework of retaining maximum data quality and energy efficiency in re...
Novel framework of retaining maximum data quality and energy efficiency in re...IJECEIAES
 
Impact of Packet Inter-arrival Time Features for Online Peer-to-Peer (P2P) Cl...
Impact of Packet Inter-arrival Time Features for Online Peer-to-Peer (P2P) Cl...Impact of Packet Inter-arrival Time Features for Online Peer-to-Peer (P2P) Cl...
Impact of Packet Inter-arrival Time Features for Online Peer-to-Peer (P2P) Cl...IJECEIAES
 
Performance analysis of ml and mmse decoding using
Performance analysis of ml and mmse decoding usingPerformance analysis of ml and mmse decoding using
Performance analysis of ml and mmse decoding usingeSAT Publishing House
 
DYNAMIC NETWORK ANOMALY INTRUSION DETECTION USING MODIFIED SOM
DYNAMIC NETWORK ANOMALY INTRUSION DETECTION USING MODIFIED SOMDYNAMIC NETWORK ANOMALY INTRUSION DETECTION USING MODIFIED SOM
DYNAMIC NETWORK ANOMALY INTRUSION DETECTION USING MODIFIED SOMcscpconf
 
Probability Density Functions of the Packet Length for Computer Networks With...
Probability Density Functions of the Packet Length for Computer Networks With...Probability Density Functions of the Packet Length for Computer Networks With...
Probability Density Functions of the Packet Length for Computer Networks With...IJCNCJournal
 
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...IJCNCJournal
 
A novel predictive model for capturing threats for facilitating effective soc...
A novel predictive model for capturing threats for facilitating effective soc...A novel predictive model for capturing threats for facilitating effective soc...
A novel predictive model for capturing threats for facilitating effective soc...IJECEIAES
 
ISSUES RELATED TO SAMPLING TECHNIQUES FOR NETWORK TRAFFIC DATASET
ISSUES RELATED TO SAMPLING TECHNIQUES FOR NETWORK TRAFFIC DATASETISSUES RELATED TO SAMPLING TECHNIQUES FOR NETWORK TRAFFIC DATASET
ISSUES RELATED TO SAMPLING TECHNIQUES FOR NETWORK TRAFFIC DATASETijmnct
 
Efficiency of LSB steganography on medical information
Efficiency of LSB steganography on medical information Efficiency of LSB steganography on medical information
Efficiency of LSB steganography on medical information IJECEIAES
 
IDS IN TELECOMMUNICATION NETWORK USING PCA
IDS IN TELECOMMUNICATION NETWORK USING PCAIDS IN TELECOMMUNICATION NETWORK USING PCA
IDS IN TELECOMMUNICATION NETWORK USING PCAIJCNCJournal
 
A Multipath Connection Model for Traffic Matrices
A Multipath Connection Model for Traffic MatricesA Multipath Connection Model for Traffic Matrices
A Multipath Connection Model for Traffic MatricesIJERA Editor
 
Qos evaluation of heterogeneous
Qos evaluation of heterogeneousQos evaluation of heterogeneous
Qos evaluation of heterogeneousIJCNCJournal
 
Statistical dissemination control in large machine to-machine communication n...
Statistical dissemination control in large machine to-machine communication n...Statistical dissemination control in large machine to-machine communication n...
Statistical dissemination control in large machine to-machine communication n...Pvrtechnologies Nellore
 
A Robust Speaker Identification System
A Robust Speaker Identification SystemA Robust Speaker Identification System
A Robust Speaker Identification Systemijtsrd
 

What's hot (19)

Hf3612861290
Hf3612861290Hf3612861290
Hf3612861290
 
A Network and Position Proposal Scheme using a Link-16 based C3I System
A Network and Position Proposal Scheme using a Link-16 based C3I SystemA Network and Position Proposal Scheme using a Link-16 based C3I System
A Network and Position Proposal Scheme using a Link-16 based C3I System
 
Minkowski Distance based Feature Selection Algorithm for Effective Intrusion ...
Minkowski Distance based Feature Selection Algorithm for Effective Intrusion ...Minkowski Distance based Feature Selection Algorithm for Effective Intrusion ...
Minkowski Distance based Feature Selection Algorithm for Effective Intrusion ...
 
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYUSE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
 
Novel framework of retaining maximum data quality and energy efficiency in re...
Novel framework of retaining maximum data quality and energy efficiency in re...Novel framework of retaining maximum data quality and energy efficiency in re...
Novel framework of retaining maximum data quality and energy efficiency in re...
 
Impact of Packet Inter-arrival Time Features for Online Peer-to-Peer (P2P) Cl...
Impact of Packet Inter-arrival Time Features for Online Peer-to-Peer (P2P) Cl...Impact of Packet Inter-arrival Time Features for Online Peer-to-Peer (P2P) Cl...
Impact of Packet Inter-arrival Time Features for Online Peer-to-Peer (P2P) Cl...
 
Performance analysis of ml and mmse decoding using
Performance analysis of ml and mmse decoding usingPerformance analysis of ml and mmse decoding using
Performance analysis of ml and mmse decoding using
 
DYNAMIC NETWORK ANOMALY INTRUSION DETECTION USING MODIFIED SOM
DYNAMIC NETWORK ANOMALY INTRUSION DETECTION USING MODIFIED SOMDYNAMIC NETWORK ANOMALY INTRUSION DETECTION USING MODIFIED SOM
DYNAMIC NETWORK ANOMALY INTRUSION DETECTION USING MODIFIED SOM
 
Probability Density Functions of the Packet Length for Computer Networks With...
Probability Density Functions of the Packet Length for Computer Networks With...Probability Density Functions of the Packet Length for Computer Networks With...
Probability Density Functions of the Packet Length for Computer Networks With...
 
Ad04507176183
Ad04507176183Ad04507176183
Ad04507176183
 
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
 
A novel predictive model for capturing threats for facilitating effective soc...
A novel predictive model for capturing threats for facilitating effective soc...A novel predictive model for capturing threats for facilitating effective soc...
A novel predictive model for capturing threats for facilitating effective soc...
 
ISSUES RELATED TO SAMPLING TECHNIQUES FOR NETWORK TRAFFIC DATASET
ISSUES RELATED TO SAMPLING TECHNIQUES FOR NETWORK TRAFFIC DATASETISSUES RELATED TO SAMPLING TECHNIQUES FOR NETWORK TRAFFIC DATASET
ISSUES RELATED TO SAMPLING TECHNIQUES FOR NETWORK TRAFFIC DATASET
 
Efficiency of LSB steganography on medical information
Efficiency of LSB steganography on medical information Efficiency of LSB steganography on medical information
Efficiency of LSB steganography on medical information
 
IDS IN TELECOMMUNICATION NETWORK USING PCA
IDS IN TELECOMMUNICATION NETWORK USING PCAIDS IN TELECOMMUNICATION NETWORK USING PCA
IDS IN TELECOMMUNICATION NETWORK USING PCA
 
A Multipath Connection Model for Traffic Matrices
A Multipath Connection Model for Traffic MatricesA Multipath Connection Model for Traffic Matrices
A Multipath Connection Model for Traffic Matrices
 
Qos evaluation of heterogeneous
Qos evaluation of heterogeneousQos evaluation of heterogeneous
Qos evaluation of heterogeneous
 
Statistical dissemination control in large machine to-machine communication n...
Statistical dissemination control in large machine to-machine communication n...Statistical dissemination control in large machine to-machine communication n...
Statistical dissemination control in large machine to-machine communication n...
 
A Robust Speaker Identification System
A Robust Speaker Identification SystemA Robust Speaker Identification System
A Robust Speaker Identification System
 

Similar to Video

International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
IRJET- Internet Video Streaming Service for Social Network
IRJET- Internet Video Streaming Service for Social NetworkIRJET- Internet Video Streaming Service for Social Network
IRJET- Internet Video Streaming Service for Social NetworkIRJET Journal
 
IRJET- Internet Video Streaming Service for Social Network
IRJET-  	  Internet Video Streaming Service for Social NetworkIRJET-  	  Internet Video Streaming Service for Social Network
IRJET- Internet Video Streaming Service for Social NetworkIRJET Journal
 
Measurement of end to end delays in ad hoc 802
Measurement of end to end delays in ad hoc 802Measurement of end to end delays in ad hoc 802
Measurement of end to end delays in ad hoc 802IAEME Publication
 
A hybrid push pull overlay network for
A hybrid push pull overlay network forA hybrid push pull overlay network for
A hybrid push pull overlay network forijp2p
 
3 S W 2009 I E E E Abstracts Java, N C C T Chennai
3    S W   2009  I E E E  Abstracts    Java,  N C C T  Chennai3    S W   2009  I E E E  Abstracts    Java,  N C C T  Chennai
3 S W 2009 I E E E Abstracts Java, N C C T Chennaincct
 
B E M E Projects M C A Projects B
B E  M E  Projects  M C A  Projects  BB E  M E  Projects  M C A  Projects  B
B E M E Projects M C A Projects Bncct
 
Ncct 2009 Ieee Java Projects
Ncct 2009 Ieee Java ProjectsNcct 2009 Ieee Java Projects
Ncct 2009 Ieee Java Projectsncct
 
J2 E E Projects, I E E E Projects 2009
J2 E E  Projects,  I E E E  Projects 2009J2 E E  Projects,  I E E E  Projects 2009
J2 E E Projects, I E E E Projects 2009ncct
 
Ieee Projects Asp.Net Projects Ieee 2009
Ieee Projects Asp.Net Projects Ieee 2009Ieee Projects Asp.Net Projects Ieee 2009
Ieee Projects Asp.Net Projects Ieee 2009ncct
 
Be Projects
Be ProjectsBe Projects
Be Projectsncct
 
Software Projects Asp.Net Java 2009 Ieee
Software Projects Asp.Net Java 2009 IeeeSoftware Projects Asp.Net Java 2009 Ieee
Software Projects Asp.Net Java 2009 Ieeencct
 
Final Year Projects Ncct Chennai
Final Year Projects Ncct ChennaiFinal Year Projects Ncct Chennai
Final Year Projects Ncct Chennaincct
 
Asp.Net Ieee Java Ieee Ncct 2009
Asp.Net Ieee Java Ieee Ncct 2009Asp.Net Ieee Java Ieee Ncct 2009
Asp.Net Ieee Java Ieee Ncct 2009ncct
 
A S P
A S PA S P
A S Pncct
 
Be Projects M.E Projects M.Tech Projects Mca Projects B.Tech Projects Polytec...
Be Projects M.E Projects M.Tech Projects Mca Projects B.Tech Projects Polytec...Be Projects M.E Projects M.Tech Projects Mca Projects B.Tech Projects Polytec...
Be Projects M.E Projects M.Tech Projects Mca Projects B.Tech Projects Polytec...ncct
 
Real Time Projects, Live Projects, Student Projects, Engineering Projects
Real Time Projects, Live Projects, Student Projects, Engineering ProjectsReal Time Projects, Live Projects, Student Projects, Engineering Projects
Real Time Projects, Live Projects, Student Projects, Engineering Projectsncct
 
Me Projects, M Tech Projects
Me Projects, M Tech ProjectsMe Projects, M Tech Projects
Me Projects, M Tech Projectsncct
 
I E E E 2009 A S P
I E E E 2009  A S PI E E E 2009  A S P
I E E E 2009 A S Pncct
 
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMING
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMINGA HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMING
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMINGijp2p
 

Similar to Video (20)

International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
IRJET- Internet Video Streaming Service for Social Network
IRJET- Internet Video Streaming Service for Social NetworkIRJET- Internet Video Streaming Service for Social Network
IRJET- Internet Video Streaming Service for Social Network
 
IRJET- Internet Video Streaming Service for Social Network
IRJET-  	  Internet Video Streaming Service for Social NetworkIRJET-  	  Internet Video Streaming Service for Social Network
IRJET- Internet Video Streaming Service for Social Network
 
Measurement of end to end delays in ad hoc 802
Measurement of end to end delays in ad hoc 802Measurement of end to end delays in ad hoc 802
Measurement of end to end delays in ad hoc 802
 
A hybrid push pull overlay network for
A hybrid push pull overlay network forA hybrid push pull overlay network for
A hybrid push pull overlay network for
 
3 S W 2009 I E E E Abstracts Java, N C C T Chennai
3    S W   2009  I E E E  Abstracts    Java,  N C C T  Chennai3    S W   2009  I E E E  Abstracts    Java,  N C C T  Chennai
3 S W 2009 I E E E Abstracts Java, N C C T Chennai
 
B E M E Projects M C A Projects B
B E  M E  Projects  M C A  Projects  BB E  M E  Projects  M C A  Projects  B
B E M E Projects M C A Projects B
 
Ncct 2009 Ieee Java Projects
Ncct 2009 Ieee Java ProjectsNcct 2009 Ieee Java Projects
Ncct 2009 Ieee Java Projects
 
J2 E E Projects, I E E E Projects 2009
J2 E E  Projects,  I E E E  Projects 2009J2 E E  Projects,  I E E E  Projects 2009
J2 E E Projects, I E E E Projects 2009
 
Ieee Projects Asp.Net Projects Ieee 2009
Ieee Projects Asp.Net Projects Ieee 2009Ieee Projects Asp.Net Projects Ieee 2009
Ieee Projects Asp.Net Projects Ieee 2009
 
Be Projects
Be ProjectsBe Projects
Be Projects
 
Software Projects Asp.Net Java 2009 Ieee
Software Projects Asp.Net Java 2009 IeeeSoftware Projects Asp.Net Java 2009 Ieee
Software Projects Asp.Net Java 2009 Ieee
 
Final Year Projects Ncct Chennai
Final Year Projects Ncct ChennaiFinal Year Projects Ncct Chennai
Final Year Projects Ncct Chennai
 
Asp.Net Ieee Java Ieee Ncct 2009
Asp.Net Ieee Java Ieee Ncct 2009Asp.Net Ieee Java Ieee Ncct 2009
Asp.Net Ieee Java Ieee Ncct 2009
 
A S P
A S PA S P
A S P
 
Be Projects M.E Projects M.Tech Projects Mca Projects B.Tech Projects Polytec...
Be Projects M.E Projects M.Tech Projects Mca Projects B.Tech Projects Polytec...Be Projects M.E Projects M.Tech Projects Mca Projects B.Tech Projects Polytec...
Be Projects M.E Projects M.Tech Projects Mca Projects B.Tech Projects Polytec...
 
Real Time Projects, Live Projects, Student Projects, Engineering Projects
Real Time Projects, Live Projects, Student Projects, Engineering ProjectsReal Time Projects, Live Projects, Student Projects, Engineering Projects
Real Time Projects, Live Projects, Student Projects, Engineering Projects
 
Me Projects, M Tech Projects
Me Projects, M Tech ProjectsMe Projects, M Tech Projects
Me Projects, M Tech Projects
 
I E E E 2009 A S P
I E E E 2009  A S PI E E E 2009  A S P
I E E E 2009 A S P
 
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMING
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMINGA HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMING
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMING
 

More from William Aruga

169228 169228 executive-summary-1-
169228 169228 executive-summary-1-169228 169228 executive-summary-1-
169228 169228 executive-summary-1-William Aruga
 
Health and safety at work
Health and safety at workHealth and safety at work
Health and safety at workWilliam Aruga
 
Heuristic based query optimisation for rsp(rdf stream processing) engines
Heuristic based query optimisation for rsp(rdf stream processing) enginesHeuristic based query optimisation for rsp(rdf stream processing) engines
Heuristic based query optimisation for rsp(rdf stream processing) enginesWilliam Aruga
 
136477 136477-circular-club
136477 136477-circular-club136477 136477-circular-club
136477 136477-circular-clubWilliam Aruga
 
Understanding marketing-events
Understanding marketing-eventsUnderstanding marketing-events
Understanding marketing-eventsWilliam Aruga
 
92068 92068-92068-92068-92068-3-revi-fm-mike
92068 92068-92068-92068-92068-3-revi-fm-mike92068 92068-92068-92068-92068-3-revi-fm-mike
92068 92068-92068-92068-92068-3-revi-fm-mikeWilliam Aruga
 
Topic: Gay in Afganistan ayayalalrt;jbgvc knwzcx ,nkncbwcajks,cnbm,
 Topic: Gay in Afganistan ayayalalrt;jbgvc knwzcx ,nkncbwcajks,cnbm, Topic: Gay in Afganistan ayayalalrt;jbgvc knwzcx ,nkncbwcajks,cnbm,
Topic: Gay in Afganistan ayayalalrt;jbgvc knwzcx ,nkncbwcajks,cnbm,William Aruga
 
Heuristic based query optimisation for rsp(rdf stream processing) engines
Heuristic based query optimisation for rsp(rdf stream processing) enginesHeuristic based query optimisation for rsp(rdf stream processing) engines
Heuristic based query optimisation for rsp(rdf stream processing) enginesWilliam Aruga
 
Fraud examination bre x minerals case study
Fraud examination  bre x minerals case studyFraud examination  bre x minerals case study
Fraud examination bre x minerals case studyWilliam Aruga
 
The impact of digital platform on the sharing economy
The impact of digital platform on the sharing economyThe impact of digital platform on the sharing economy
The impact of digital platform on the sharing economyWilliam Aruga
 
Takotsubo cardiomyopathy potential differential diagnosis in acute coronary s...
Takotsubo cardiomyopathy potential differential diagnosis in acute coronary s...Takotsubo cardiomyopathy potential differential diagnosis in acute coronary s...
Takotsubo cardiomyopathy potential differential diagnosis in acute coronary s...William Aruga
 
Evaluation of doctoral study foundation of study
Evaluation of doctoral study foundation of studyEvaluation of doctoral study foundation of study
Evaluation of doctoral study foundation of studyWilliam Aruga
 

More from William Aruga (20)

169228 169228 executive-summary-1-
169228 169228 executive-summary-1-169228 169228 executive-summary-1-
169228 169228 executive-summary-1-
 
Nursing interview
Nursing interviewNursing interview
Nursing interview
 
Health and safety at work
Health and safety at workHealth and safety at work
Health and safety at work
 
Heuristic based query optimisation for rsp(rdf stream processing) engines
Heuristic based query optimisation for rsp(rdf stream processing) enginesHeuristic based query optimisation for rsp(rdf stream processing) engines
Heuristic based query optimisation for rsp(rdf stream processing) engines
 
136477 136477-circular-club
136477 136477-circular-club136477 136477-circular-club
136477 136477-circular-club
 
Understanding marketing-events
Understanding marketing-eventsUnderstanding marketing-events
Understanding marketing-events
 
92068 92068-92068-92068-92068-3-revi-fm-mike
92068 92068-92068-92068-92068-3-revi-fm-mike92068 92068-92068-92068-92068-3-revi-fm-mike
92068 92068-92068-92068-92068-3-revi-fm-mike
 
120968
120968120968
120968
 
Topic: Gay in Afganistan ayayalalrt;jbgvc knwzcx ,nkncbwcajks,cnbm,
 Topic: Gay in Afganistan ayayalalrt;jbgvc knwzcx ,nkncbwcajks,cnbm, Topic: Gay in Afganistan ayayalalrt;jbgvc knwzcx ,nkncbwcajks,cnbm,
Topic: Gay in Afganistan ayayalalrt;jbgvc knwzcx ,nkncbwcajks,cnbm,
 
My thesis
My thesisMy thesis
My thesis
 
Heuristic based query optimisation for rsp(rdf stream processing) engines
Heuristic based query optimisation for rsp(rdf stream processing) enginesHeuristic based query optimisation for rsp(rdf stream processing) engines
Heuristic based query optimisation for rsp(rdf stream processing) engines
 
Fraud examination bre x minerals case study
Fraud examination  bre x minerals case studyFraud examination  bre x minerals case study
Fraud examination bre x minerals case study
 
The impact of digital platform on the sharing economy
The impact of digital platform on the sharing economyThe impact of digital platform on the sharing economy
The impact of digital platform on the sharing economy
 
Takotsubo cardiomyopathy potential differential diagnosis in acute coronary s...
Takotsubo cardiomyopathy potential differential diagnosis in acute coronary s...Takotsubo cardiomyopathy potential differential diagnosis in acute coronary s...
Takotsubo cardiomyopathy potential differential diagnosis in acute coronary s...
 
Evaluation of doctoral study foundation of study
Evaluation of doctoral study foundation of studyEvaluation of doctoral study foundation of study
Evaluation of doctoral study foundation of study
 
Glaases lamination
Glaases laminationGlaases lamination
Glaases lamination
 
Bnb
BnbBnb
Bnb
 
Originality report
Originality reportOriginality report
Originality report
 
Mark spenser
Mark spenserMark spenser
Mark spenser
 
Museum project
Museum projectMuseum project
Museum project
 

Recently uploaded

Amil Baba In Pakistan amil baba in Lahore amil baba in Islamabad amil baba in...
Amil Baba In Pakistan amil baba in Lahore amil baba in Islamabad amil baba in...Amil Baba In Pakistan amil baba in Lahore amil baba in Islamabad amil baba in...
Amil Baba In Pakistan amil baba in Lahore amil baba in Islamabad amil baba in...amilabibi1
 
GOODSANDSERVICETAX IN INDIAN ECONOMY IMPACT
GOODSANDSERVICETAX IN INDIAN ECONOMY IMPACTGOODSANDSERVICETAX IN INDIAN ECONOMY IMPACT
GOODSANDSERVICETAX IN INDIAN ECONOMY IMPACTharshitverma1762
 
SBP-Market-Operations and market managment
SBP-Market-Operations and market managmentSBP-Market-Operations and market managment
SBP-Market-Operations and market managmentfactical
 
212MTAMount Durham University Bachelor's Diploma in Technology
212MTAMount Durham University Bachelor's Diploma in Technology212MTAMount Durham University Bachelor's Diploma in Technology
212MTAMount Durham University Bachelor's Diploma in Technologyz xss
 
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdfBPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdfHenry Tapper
 
Stock Market Brief Deck FOR 4/17 video.pdf
Stock Market Brief Deck FOR 4/17 video.pdfStock Market Brief Deck FOR 4/17 video.pdf
Stock Market Brief Deck FOR 4/17 video.pdfMichael Silva
 
2024 Q1 Crypto Industry Report | CoinGecko
2024 Q1 Crypto Industry Report | CoinGecko2024 Q1 Crypto Industry Report | CoinGecko
2024 Q1 Crypto Industry Report | CoinGeckoCoinGecko
 
House of Commons ; CDC schemes overview document
House of Commons ; CDC schemes overview documentHouse of Commons ; CDC schemes overview document
House of Commons ; CDC schemes overview documentHenry Tapper
 
fca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdffca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdfHenry Tapper
 
Economic Risk Factor Update: April 2024 [SlideShare]
Economic Risk Factor Update: April 2024 [SlideShare]Economic Risk Factor Update: April 2024 [SlideShare]
Economic Risk Factor Update: April 2024 [SlideShare]Commonwealth
 
Tenets of Physiocracy History of Economic
Tenets of Physiocracy History of EconomicTenets of Physiocracy History of Economic
Tenets of Physiocracy History of Economiccinemoviesu
 
The Core Functions of the Bangko Sentral ng Pilipinas
The Core Functions of the Bangko Sentral ng PilipinasThe Core Functions of the Bangko Sentral ng Pilipinas
The Core Functions of the Bangko Sentral ng PilipinasCherylouCamus
 
government_intervention_in_business_ownership[1].pdf
government_intervention_in_business_ownership[1].pdfgovernment_intervention_in_business_ownership[1].pdf
government_intervention_in_business_ownership[1].pdfshaunmashale756
 
Bladex 1Q24 Earning Results Presentation
Bladex 1Q24 Earning Results PresentationBladex 1Q24 Earning Results Presentation
Bladex 1Q24 Earning Results PresentationBladex
 
Vp Girls near me Delhi Call Now or WhatsApp
Vp Girls near me Delhi Call Now or WhatsAppVp Girls near me Delhi Call Now or WhatsApp
Vp Girls near me Delhi Call Now or WhatsAppmiss dipika
 
(办理学位证)加拿大萨省大学毕业证成绩单原版一比一
(办理学位证)加拿大萨省大学毕业证成绩单原版一比一(办理学位证)加拿大萨省大学毕业证成绩单原版一比一
(办理学位证)加拿大萨省大学毕业证成绩单原版一比一S SDS
 
PMFBY , Pradhan Mantri Fasal bima yojna
PMFBY , Pradhan Mantri  Fasal bima yojnaPMFBY , Pradhan Mantri  Fasal bima yojna
PMFBY , Pradhan Mantri Fasal bima yojnaDharmendra Kumar
 
Call Girls Near Me WhatsApp:+91-9833363713
Call Girls Near Me WhatsApp:+91-9833363713Call Girls Near Me WhatsApp:+91-9833363713
Call Girls Near Me WhatsApp:+91-9833363713Sonam Pathan
 

Recently uploaded (20)

Amil Baba In Pakistan amil baba in Lahore amil baba in Islamabad amil baba in...
Amil Baba In Pakistan amil baba in Lahore amil baba in Islamabad amil baba in...Amil Baba In Pakistan amil baba in Lahore amil baba in Islamabad amil baba in...
Amil Baba In Pakistan amil baba in Lahore amil baba in Islamabad amil baba in...
 
GOODSANDSERVICETAX IN INDIAN ECONOMY IMPACT
GOODSANDSERVICETAX IN INDIAN ECONOMY IMPACTGOODSANDSERVICETAX IN INDIAN ECONOMY IMPACT
GOODSANDSERVICETAX IN INDIAN ECONOMY IMPACT
 
SBP-Market-Operations and market managment
SBP-Market-Operations and market managmentSBP-Market-Operations and market managment
SBP-Market-Operations and market managment
 
212MTAMount Durham University Bachelor's Diploma in Technology
212MTAMount Durham University Bachelor's Diploma in Technology212MTAMount Durham University Bachelor's Diploma in Technology
212MTAMount Durham University Bachelor's Diploma in Technology
 
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdfBPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
 
Stock Market Brief Deck FOR 4/17 video.pdf
Stock Market Brief Deck FOR 4/17 video.pdfStock Market Brief Deck FOR 4/17 video.pdf
Stock Market Brief Deck FOR 4/17 video.pdf
 
🔝+919953056974 🔝young Delhi Escort service Pusa Road
🔝+919953056974 🔝young Delhi Escort service Pusa Road🔝+919953056974 🔝young Delhi Escort service Pusa Road
🔝+919953056974 🔝young Delhi Escort service Pusa Road
 
2024 Q1 Crypto Industry Report | CoinGecko
2024 Q1 Crypto Industry Report | CoinGecko2024 Q1 Crypto Industry Report | CoinGecko
2024 Q1 Crypto Industry Report | CoinGecko
 
House of Commons ; CDC schemes overview document
House of Commons ; CDC schemes overview documentHouse of Commons ; CDC schemes overview document
House of Commons ; CDC schemes overview document
 
fca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdffca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdf
 
Economic Risk Factor Update: April 2024 [SlideShare]
Economic Risk Factor Update: April 2024 [SlideShare]Economic Risk Factor Update: April 2024 [SlideShare]
Economic Risk Factor Update: April 2024 [SlideShare]
 
Tenets of Physiocracy History of Economic
Tenets of Physiocracy History of EconomicTenets of Physiocracy History of Economic
Tenets of Physiocracy History of Economic
 
Q1 2024 Newsletter | Financial Synergies Wealth Advisors
Q1 2024 Newsletter | Financial Synergies Wealth AdvisorsQ1 2024 Newsletter | Financial Synergies Wealth Advisors
Q1 2024 Newsletter | Financial Synergies Wealth Advisors
 
The Core Functions of the Bangko Sentral ng Pilipinas
The Core Functions of the Bangko Sentral ng PilipinasThe Core Functions of the Bangko Sentral ng Pilipinas
The Core Functions of the Bangko Sentral ng Pilipinas
 
government_intervention_in_business_ownership[1].pdf
government_intervention_in_business_ownership[1].pdfgovernment_intervention_in_business_ownership[1].pdf
government_intervention_in_business_ownership[1].pdf
 
Bladex 1Q24 Earning Results Presentation
Bladex 1Q24 Earning Results PresentationBladex 1Q24 Earning Results Presentation
Bladex 1Q24 Earning Results Presentation
 
Vp Girls near me Delhi Call Now or WhatsApp
Vp Girls near me Delhi Call Now or WhatsAppVp Girls near me Delhi Call Now or WhatsApp
Vp Girls near me Delhi Call Now or WhatsApp
 
(办理学位证)加拿大萨省大学毕业证成绩单原版一比一
(办理学位证)加拿大萨省大学毕业证成绩单原版一比一(办理学位证)加拿大萨省大学毕业证成绩单原版一比一
(办理学位证)加拿大萨省大学毕业证成绩单原版一比一
 
PMFBY , Pradhan Mantri Fasal bima yojna
PMFBY , Pradhan Mantri  Fasal bima yojnaPMFBY , Pradhan Mantri  Fasal bima yojna
PMFBY , Pradhan Mantri Fasal bima yojna
 
Call Girls Near Me WhatsApp:+91-9833363713
Call Girls Near Me WhatsApp:+91-9833363713Call Girls Near Me WhatsApp:+91-9833363713
Call Girls Near Me WhatsApp:+91-9833363713
 

Video

  • 1. Analysis Video Streaming on Multiple Devices Wirelessly 1 ANALYSIS VIDEO STREAMING ON MULTIPLE DEVICES WIRELESSLY by [Name] Course Professor’s Name Institution Location of Institution Date
  • 2. Analysis Video Streaming on Multiple Devices Wirelessly 2 1. Acronyms List IEEE - Institute of Electrical and Electronics Engineers URL - Uniform Resource Locator
  • 3. Analysis Video Streaming on Multiple Devices Wirelessly 3 3.0 Research Methodology 3.1 General Introduction The initial motivation of this thesis is to analyse video streaming and mention the techniques that will improve video streaming on multiple devices wirelessly. Applying of some of the techniques that are required in the experiment are rate selection and play-out buffer optimization. The method used to collect information can significantly affect the degree of efficiency, which in turn influences the validity and reliability of the research. Therefore, it is necessary to consider accurately the techniques that can be used to provide both relevant and suitable information. Utilizing the current research of the qualitative and quantitative research methods, and collection of data from streaming test. 3.2 Aspects 3.2.1 Research Strategy The research for the dissertation will proceed by literature review and video streaming over wireless networks. 3.2.2 Research Approach Since the study is qualitative in nature, it follows an inductive approach. Accordingly, the research will begin with accurate observations that will be used to produce generalized theories and conclusions. Another reason for using the inductive method is because it acknowledges the context where research effort is active. However, the method provides generalized theories based on limited information and, thus, the compromising of the reliability of the results.
  • 4. Analysis Video Streaming on Multiple Devices Wirelessly 4 3.2.3 Resources The study will require five computers with wireless network adapter cards and running Windows operating system, wireless transmitter, IEEE 802.11b with wireless Ethernet connection, and surveillance equipment like a smartphone. IEEE 802. Thus, has become a learning with great opportunity both indoors and classroom learning. According to standardization with regular updates by the Institute of Electrical and Electronics Engineers ( IEEE) LAN/MAN Standards Committee (IEEE 802), the recent amendments to the wireless network transmission products are designed to support a use of the Wi-Fi brand (Institute of Electrical and Electronics Engineers, 2017). However, useful customization and standardization of technical information is the primary requirement to ensure efficient data maintenance. File format generated by LaTeX is *.tex; it is readable and editable in any text editor, as it contains plain text without any hidden complicated format codes or great binary instructions. For this project, the mark- up tagging conventions of LaTeX2e will be in use as the current software version, as the powerful and highly customizable typesetting software called which can separate the content and the design. Additionally, LaTex is used for typesetting professional research papers. 3.2.4 Sampling The sampling frame will include scholarly articles, websites, and books. The sampling will take the judgmental approach where the most productive samples to address the research by choosing questions. Most studies, including the study by Catalan-Cid et al. (2010), used a similar technique. On the other hand like that by Zhu and Girod (2007) used theoretical sampling, particularly homogeneous sampling to reduce vulnerability to bias and errorby. Nguyen, et al. (2011) proofing on using routing metric was that accounts for the link quality. For this project,
  • 5. Analysis Video Streaming on Multiple Devices Wirelessly 5 homogeneous sampling techniques were used as cost and time-effective based on considerations of data validity and reliability (Acharya et al. 2013). 3.3 Experiment Information (Primary Research) The multitask channel is unique per the experiment. Therefore, the ORBIT test -bed has an indoor radio grid emulator. 3.4 Qualitative/Quantitative Research Interviews are the primary source the qualitative research. Therefore we can see the whole process of online observation and various technologies. Thus learning on using systematic methods to validate and triangulate observations. 3.4.1 Data requirements: validity and reliability Analyzing data from different perspectives is useful in evaluating the consistency of information. In this light, document analysis will be used in conjunction with triangulation to ensure the validity. Rothbauer (2008) suggested that triangulation is one of the best methods to tackle the issue of data validity. Also, weaknesses rather than a use of single-theory, single- method, or single-observation study: Thereby, determine the trustworthiness of electronic databases be determined by paying particular attention to the domain extension; for example, extensions like .edu, .org and .gov will indicate that the sponsoring organization for the website is an accredited university, reputable non-profit organization, and government institution respectively (Cse.wustl.edu 2017). Sun, Vetro, and Xin (2007) ensured the reliability by restricting the search to educational institutional websites. On the contrary, the research by Ni (2016) disregarded this consideration by quoting unreliable sources like Wikipedia.
  • 6. Analysis Video Streaming on Multiple Devices Wirelessly 6 3.5 Requirements of Data: Comparison of BROS Algorithm to Improve Streaming Performance This experiment is on basis of analysis of video streaming on multiple devices. Therefore, the method with the assistive use of laptop, tablet and smartphone devices that can
  • 7. Analysis Video Streaming on Multiple Devices Wirelessly 7 support wireless connection standards. Priory, comparatively to the present data measurement choice, the similar experiment was provided by Mingzheli and Kinicki (2009) to test conditions of poor quality video streaming in data transmission over long distance. The choice of "streaming rate selection and buffer optimization algorithms" presented in the article is in favor for the "Buffer and Rate Optimization for Streaming (BROS) algorithm to improve streaming performance" (p. 26). The overall effectiveness of the BROS uses bandwidth estimation tool specifically for wireless networks and the model. Based on its ability to model "the relationship between buffer size, streaming data rate, and available bandwidth distribution" and optimize "the streaming data rate and initial buffer size, resulting in a high data rate but with few frame losses and buffer underflow events, while still keeping a small initial buffer delay." (p.26). Furthermore, BROS is set to follow IEEE 802.11 standards to be an essential element of the Emulated Streaming (EmuS) client-server system to be used on various wireless conditions. This algorithm is proved to be useful for different network bandwidth conditions to "reduce degradations in performance caused by changes in the available bandwidth along the path of the streaming flow" (p.26). BROS helps to slow down the media play-out rate "at the client to reduce the consumption rate and aid prevent buffer underflow" to facilitate data transmission throughout long distances so that user applications may decode data under the condition of less traffic consumption rate. The smoothness of inter arrival time variance is the critical factor in available bandwidth that helps to manage streaming packets. In this relation, Mingzheli and Kinicki (2009) experimentally proved that "if the available bandwidth is less than the streaming rate, the expected arrival rate at the play-out buffer will also be less than the streaming rate."(p. 30).
  • 8. Analysis Video Streaming on Multiple Devices Wirelessly 8 Where, R is –gm , Av is -out Figure2. Streaming rate and available bandwidth The traditional technique of bandwidth estimation is on basis by use of the application measurements to justify the rate selection. The play-out buffer model in testing use is shown on Figure3. Play-out buffer model 29
  • 9. Analysis Video Streaming on Multiple Devices Wirelessly 9 Practically, to provide the adequate estimation of bandwidth, novel transport protocols for streaming media should be considered, including a TCP-friendly "trial-and-error" scaling, used for sizing play-out buffers. The control on the selection of the streaming rate is on base by cross- layer approach (Mingzheli and Kinicki, 2009, p.28).the examples of these are the data transfer, router failure management, router change management and congestion control mechanism. Next, a simple streaming test will be conducted to acquire greater realism and reduce the extent to which facts can criticize as contrived. Video streaming tests will be carried out on multiple devices to investigate the performance of wireless networks. The streaming application from streamtest.net will be used to measure the quality of streaming experience for users (Kazemi,et al., 2013). The stream test diagnostic tool will be useful since it reports the most common problems in a transparent manner. In the current study, it will be used to simulate and assess the streaming experience of multiple users over wireless networks. The test will apply the star topology since it is the standard topology for 802.11- based products. The streamtest.net diagnostic utility will be used to examine the effect of realistic viewing to the performance. The test will involve analyzing and sampling the relevant test parameters and data points that constitute the individual end-user streaming experience while streaming. The streaming URL will be validated by copying the link to the platform and pressing the "Start Test" button. Once the completion of the minute-long test, all the data gathered will be calculated and provided in an organized manner for different stakeholders within the streaming video ecosystem. The rendering results will be in two pages, namely basic and advanced as shown in Fig. 3. In this case, the results will be viewed from the high-level panel since it provides useful information for technically inclined users.
  • 10. Analysis Video Streaming on Multiple Devices Wirelessly 10 3.5.1 Bandwidth limitations The effectiveness of distribution the speed of traffic accessible to upload or download, Internet service providers should apply limitations on bandwidth to ensure the stability of data processing among all users, based on the principle of equality (Gumenyuk, et al., 2014).This policy works very well, when users get "throttle" limits or "capping" to restrict their video streaming potential, for the sake of stability of network work, in the interests of other users. In fact, the popularity of video streaming channels (e.g. Netflix) encouraged many users to cancel cable TV subscriptions to watch movies and other videos online. However, "capping" applied by providers restricts their opportunity to ensure stable video streaming channels for steady work since they pass over the limit of traffic. However, it is possible to "uncap" the channel, and this may lead to problems with provider services since having been caught for violation of the policy of services use. Regularly, bandwidth limitation applied per user is that h/she cannot download more than 1Mb of data per second.
  • 11. Analysis Video Streaming on Multiple Devices Wirelessly 11 Figure 3. Test scenario 3.5.2 Data analysis The study will involve skimming, reading, interpretation of materials, and thematic analysis. Classification on the central theme of the research will be by the solid understanding of the transmission issues in video streaming, supported by evidence. 3.5.3. Merits Clearly, the collection of most data will be from articles. This method allows access to information that would otherwise be difficult (Centers for Disease Control and Prevention 2009).
  • 12. Analysis Video Streaming on Multiple Devices Wirelessly 12 The research by Li, Claypool, and Kinicki (2009) showed that using scholarly articles eliminates the influence that people may have in the process. 3.5.4 Constraints The information given by different authors may be incomplete or idiosyncratic. In fact, Ahmed (2010) warned that the research is only a step in the analysis of streaming and thus it leaves many areas for future studies. Golwelkar and Woods (2007) and Bowen (2009) pointed out that the publishing usability and quality of sources depend on the domain. 3.5.5 Problems encountered Throughout experimental testing, the following problems concerning the wireless network, have been encountered: 3.5.5.1 Inability of a wireless client to connect to the network The problem is that some users may detect a wireless connection point but do not have an ability to connect to it with their devices. The inability to connect to the wireless point may be caused by “noises” from other devices (microwaves, cordless phones) that are barriers to establish a connection. The effective resolution to the problem is to provide monitoring of the network with software tools and conduct the site survey to reveal problems at the user side. 3.5.5.2 Slow application performance The symptoms of the problem are sluggish data processing, freezing of an image on an individual screen point. The problem may be encountered, because of a server or network failure to process requests. The effective resolution will be to double check Ethernet-based errors (e.g. Collisions, FCS Errors, Alignment Errors, etc.) to prevent packet loss.
  • 13. Analysis Video Streaming on Multiple Devices Wirelessly 13 References Acharya, AS, Prakash, A, Saxena, P & Nigam, 2013, Sampling: Why and how of it. Indian Journal of Medical Specialties, 4(2), 330-333. Ahmed, JU 2010, Documentary research method: New dimensions. Al-Busaidi, ZQ 2008, Qualitative research and its uses in health care. Sultan Qaboos University Medical Journal, 8(1), pp.11-s19. Bowen, G 2009. Document analysis as a qualitative research method. Qualitative Research Journal, 9(2), pp.27-40. Catalan-Cid, M, Ferrer, J, Gomez, C, & Parallels, J 2010, Contention- and interference-aware flow-based routing in wireless mesh networks: design and evaluation of a novel routing metric. EURASIP Journal on Wireless Communications and Networking, 2010(1), 313- 768. Centers for Disease Control and Prevention (CDC) 2009. Data collection methods for evaluation: Document review (No. 18). Viewed 11 March, 2017, http://www.cdc.gov/healthyyouth/evaluation/pdf/brief18.pdf Cse.wustl.edu. (2017). QoS in wireless data networks. [online]. Cse.wustl.edu. Available at: http://www.cse.wustl.edu/~jain/cse574-06/ftp/wireless_qos/index.html [Accessed 7 Jan. 2017]. Driscoll, DL 2011, Introduction to primary research: Observations, surveys, and interviews.Writing Spaces: Readings on Writing, 2, pp.153-174. Fernandes, R 2010, Video error concealment: a brief presentation. Instituto Politecnico de Braganca.
  • 14. Analysis Video Streaming on Multiple Devices Wirelessly 14 Golwelkar, A & Woods, J 2007, Motion-compensated temporal filtering and motion vector coding using biorthogonal filters. IEEE Transactions on Circuits and Systems for Video Technology, 17(4), 417-428. Gumenyuk, B, Vaskiv, G & Yanukovych, V 2014, Estimation of transmission rate dependence in Wi-Fi network from information character. International Journal of Computing, 7(1), 23- 26. Hussein, 2015, The use of triangulation in social sciences research: Can provide qualitative and quantitative methods be combined?. Journal of Comparative Social Work, 4(1). Kazemi, M, Shirmohammadi, S & Sadeghi, K 2013, A review of multiple description coding techniques for error-resilient video delivery. Multimedia Systems, 20(3), pp.283-309. Krishna, H, Bathemma, B & Rao, S 2012, The wireless networks of 802.11 and Buffer Sizing. IJCST, 3(1), 871-874. LaTeX Project, 2017, viewed 11 March 2017, https://www.latex-project.org/get/ Li, M, Claypool, M & Kinicki, R 2009, Playout buffer and rate optimization for streaming over IEEE 802.11 wireless networks. ACM Transactions on Multimedia Computing, Communications, and Applications, 5(3), 1-25. Li, T, Leith, D & Malone, D 2011, Buffer sizing for 802.11-Based Networks. IEEE/ACM Transactions on Networking, 19(1), 156-169. Lowe, C & Zemliansky, P 2013. Writing Spaces: Readings on Writings, Vol. 2 (Vol. 2). The Saylor Foundation. Lingzhi, MC & Kinicki, R 2009, Playout Buffer and Rate Optimization for Streaming over IEEE 802.11 Wireless Networks. ACM Transactions on Multimedia Computing,
  • 15. Analysis Video Streaming on Multiple Devices Wirelessly 15 Communications, and Applications, 5 (3), 26, August 2009, viewed 11 March 2017, http://web.cs.wpi.edu/~rek/Research/Papers/TOMCCAP09.pdf Nguyen, L, Beuran, R & Shinoda, Y 2011, An interference and load-aware routing metric for Wireless Mesh Networks. International Journal of Ad Hoc and Ubiquitous Computing, 7(1), p.25. Ni, P 2016, the Visual perception of scalable video streaming: applied to mobile scenarios. ACM SIG Multimedia Records, 8(2), pp.17-18. Rothbauer, P 2008, Triangulation. In Given, Lisa (Ed.), “The SAGE Encyclopedia of Qualitative Research Methods.” Sage Publications. pp. 892-894. Sun, H, Vetro, A & Xin, J 2007, An overview of scalable video streaming. Wireless Communications and Mobile Computing, 7(2), pp.159-172. Working Group for WLAN Standards, 2017, IEEE 802.11 Wireless local area networks, viewed 11 March 2017, http://www.ieee802.org/11/ Zhu, X & Girod, B 2007, Video streaming over wireless networks. Signal Processing Conference, 2007 15th European, pp.1462-1466.