Advertisement

An Efficient Scheme for Video Delivery in Wireless Networks

  • Abdulaziz Shehab
  • Mohamed Elhoseny
  • Aboul Ella Hassanien
Chapter
Part of the Studies in Big Data book series (SBD, volume 33)

Abstract

This chapter presents a theoretical background for the history of wireless networks. It gives a comprehensive overview and performance evaluation for IEEE 802.11, 802.15 and 802.16 standards focusing on different standards and coverage area. Then, this chapter proposes an efficient scheme for P2P VoD system based on a smart recommender taking into account the analysis of the user’s behavior. The chapter describes the proposed mobility scheme that describes network entry process and channel scanning process. The proposed models are examined using different video resolutions (low and high). Then, a mobility model is presented to study the influence of different scanning schemes (light and dense) on some performance metrics like throughput, data dropped, and particularly handover latency. Finally, simulation results are documented and analyzed. The simulation results show that the proposed scheme can efficiently improve both server’s load and the initial playout latency.

References

  1. 1.
    Walke, B., Mangold, S., Berlemann, L.: IEEE 802 Wireless Systems: Protocols, Multi-Hop Mesh/Relaying, Performance and Spectrum Coexistence, Wiley, Nov 2006Google Scholar
  2. 2.
    Niyato, D., Hossain, E.: Wireless broadband access: wimax and beyond—integration of wimax and wifi: optimal pricing for bandwidth sharing. IEEE Commun. Mag. 45, 140–146 (2007)CrossRefGoogle Scholar
  3. 3.
    Elhoseny, M., Yuan, X., ElMinir, H., Riad, A.: Extending self-organizing network availability using genetic algorithm. In: International Conference on Computing Communication and Networking Technologies (ICCCNT), IEEE, July 2014Google Scholar
  4. 4.
    Elhoseny, M., Elleithy, K., Elminir, H., Yuan, X., Riad, A.: Dynamic clustering of heterogeneous wireless sensor networks using a genetic algorithm, towards balancing energy exhaustion. Int. J. Sci. Eng. Res. 6(8) (2015)Google Scholar
  5. 5.
    Gracias, M., Knezevic, V., Esmailpour, A.: Interoperability between wimax and wifi in a testbed environment. In: 2011 24th Canadian Conference on Electrical and Computer Engineering (CCECE), pp. 001144–001148, May 2011Google Scholar
  6. 6.
    Hrudey, W., Trajkovi, L.: Streaming video content over IEEE 802.16/wimax broadband accessGoogle Scholar
  7. 7.
    Elhoseny, M., Yuan, X., El-Minir, H.K., Riad, A.M.: An energy efficient encryption method for secure dynamic WSN. Secur. Commun. Netw. 9, 2024–2031 (2016)Google Scholar
  8. 8.
    Peh, E., Seah, W.-G., Chew, Y., Ge, Y.: Experimental study of voice over ip services over broadband wireless networks. In: 22nd International Conference on Advanced Information Networking and Applications, 2008. AINA 2008, pp. 834–839, Mar 2008Google Scholar
  9. 9.
    Kuran, M.S., Tugcu, T.: A survey on emerging broadband wireless access technologies. Comput. Netw. 51, 3013–3046 (2007)CrossRefGoogle Scholar
  10. 10.
    Pareit, D., Lannoo, B., Moerman, I., Demeester, P.: The history of wimax: a complete survey of the evolution in certification and standardization for ieee 802.16 and wimax. IEEE Commun. Surv. Tutor. 14, 1183–1211 (Fourth 2012)Google Scholar
  11. 11.
    Andrews, N., Kondareddy, Y., Agrawal, P.: Prioritized resource sharing in wimax and wifi integrated networks. In: 2010 IEEE Wireless Communications and Networking Conference (WCNC), pp. 1–6, Apr 2010Google Scholar
  12. 12.
    Geier, J.: Designing and Deploying 802.11N Wireless Networks. 1st edn. (2010)Google Scholar
  13. 13.
    Yuan, X., Elhoseny, M., ElMinir, H., Riad, A.: A genetic algorithm-based, dynamic clustering method towards improved wsn longevity. J. Netw. Syst. Manag. 1–26, 2016 (2016)Google Scholar
  14. 14.
    Retnasothie, F., Ozdemir, M., Yucek, T., Celebi, H., Zhang, J., Muththaiah, R.: Wireless IPTV over WiMAX: challenges and applications. In: Wireless and Microwave Technology Conference, 2006. WAMICON ’06. IEEE Annual, pp. 1–5, Dec 2006Google Scholar
  15. 15.
    Elhoseny, M., Elminir, H., Riad, A., Yuan, X.: Recent advances of secure clustering protocols in wireless sensor networks. Int. J. Comput. Netw. Commun. Secur. 2(11), 400–413 (2014)Google Scholar
  16. 16.
    Chatterjee, M., Sengupta, S., Ganguly, S.: Feedback-based real-time streaming over wimax. IEEE Wirel. Commun. 14, 64–71 (2007)CrossRefGoogle Scholar
  17. 17.
    Elayoubi, S.-E., Fourestie, B.: Performance evaluation of admission control and adaptive modulation in ofdma wimax systems. IEEE/ACM Trans. Netw. 16, 1200–1211 (2008)CrossRefGoogle Scholar
  18. 18.
    Heegard, C., Coffey, J., Gummadi, S., Murphy, P., Provencio, R., Rossin, E., Schrum, S., Shoemake, M.: High performance wireless ethernet. IEEE Commun. Mag. 39, 64–73 (2001)CrossRefGoogle Scholar
  19. 19.
    Etemad, K.: Overview of mobile wimax technology and evolution. IEEE Commun. Mag. 46, 31–40 (2008)CrossRefGoogle Scholar
  20. 20.
    Ieee draft amendment standard for local and metropolitan area networks—part 16: air interface for fixed and mobile broadband wireless access systems—advanced air interface. IEEE P802.16m/D6, pp. 1–932 May, July 2010Google Scholar
  21. 21.
    Zreikat, A.I.: A new wimax/wi-fi interoperability model and its performance evaluation. Wirel. Pers. Commun. 72, 1229–1257 (2013)CrossRefGoogle Scholar
  22. 22.
    Zekri, M., Jouaber, B., Zeghlache, D.: Review: a review on mobility management and vertical handover solutions over heterogeneous wireless networks. Comput. Commun. 35, 2055–2068 (2012)CrossRefGoogle Scholar
  23. 23.
    HAO, C.: A velocity-adaptive handover scheme for mobile wimax. http://www.SciRP.org/journal/ijcns/ (2014)
  24. 24.
    Durantini, A., Petracca, M.: Test of 2.5 GHZ WiMAX performances for business and soho in a multi-service environment. In: IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications, 2008. PIMRC 2008, pp. 1–5, Sept 2008Google Scholar
  25. 25.
    De Bruyne, J., Joseph, W., Verloock, L., Martens, L.: Measurements and evaluation of the network performance of a fixed wimax system in a suburban environment. In: IEEE International Symposium on Wireless Communication Systems. 2008. ISWCS ’08, pp. 98–102, Oct 2008Google Scholar
  26. 26.
    Kim, D., Cai, H., Na, M., Choi, S.: Performance measurement over mobile WiMAX/IEEE 802.16e network. In: 2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks, 2008. WoWMoM 2008, pp. 1–8, June 2008Google Scholar
  27. 27.
    Ouni, A., Rivano, H., Valois, F.: Wireless mesh networks: energy—capacity tradeoff and physical layer parameters. In: 2011 IEEE 22nd International Symposium on Personal Indoor and Mobile Radio Communications (PIMRC), pp. 1845–1849, Sept 2011Google Scholar
  28. 28.
    Ray, S., Sirisena, H., Deka, D.: Fast and reliable target base station selection scheme for mobile WiMAX handover. In: Telecommunication Networks and Applications Conference (ATNAC), 2012 Australasian, pp. 1–6, Nov 2012Google Scholar
  29. 29.
    Yoo, S.-J., Golmie, N.: Policy-based scanning with qos support for seamless handovers in wireless networks. Wirel. Commun. Mob. Comput. 10, 405–425 (2010)Google Scholar
  30. 30.
    Elhoseny, M., Yuan, X., Yu, Z., Mao, C., El-Minir, H.K., Riad, A.M.: Balancing energy consumption in heterogeneous wireless sensor networks using genetic algorithm. IEEE Commun. Lett. 19(12), 2194–2197 (2015)Google Scholar
  31. 31.
    Metawa, N., Elhoseny, M., Kabir Hassan, M., Hassanien, A.: Loan portfolio optimization using genetic algorithm: a case of credit constraints. In: 12th International Computer Engineering Conference (ICENCO), IEEE, pp. 59–64. doi: 10.1109/ICENCO.2016.7856446
  32. 32.
    Metawa, N., Hassan, M.K., Elhoseny, M.: Genetic algorithm based model for optimizing bank lending decisions. Expert Syst. Appl. 80, 75–82 (2017). ISSN 0957-4174. doi: 10.1016/j.eswa.2017.03.021
  33. 33.
    Elhoseny, M., Farouk, A., Zhou, N., Wang, M.M., Abdalla, S., Batle, J.: Dynamic multi hop clustering in a wireless sensor network: performance improvement. Wirel. Pers. Commun., 1–21 (2017)Google Scholar
  34. 34.
    Elhoseny, M., Elminir, H., Riad, A., Yuan, X.: A secure data routing schema for WSN using elliptic curve cryptography and homomorphic encryption. J. King Saud Univ.—Comput. Inf. Sci. (2015)Google Scholar
  35. 35.
    Riad, A.M., El-minir, H.K., Elhoseny, M.: Secure routing in wireless sensor network: a state of the art. Int. J. Comput. Appl. 67(7) (2013)Google Scholar

Copyright information

© Springer International Publishing AG 2018

Authors and Affiliations

  • Abdulaziz Shehab
    • 1
  • Mohamed Elhoseny
    • 1
    • 3
  • Aboul Ella Hassanien
    • 2
    • 3
  1. 1.Faculty of Computers and InformationMansoura UniversityMansouraEgypt
  2. 2.Faculty of Computers and InformationCairo UniversityCairoEgypt
  3. 3.Scientific Research Group in Egypt (SRGE)CairoEgypt

Personalised recommendations