2014
DOI: 10.14569/ijacsa.2014.050322
|View full text |Cite
|
Sign up to set email alerts
|

Survey of Error Correction Mechanisms for Video Streaming over the Internet

Abstract: Abstract-This overview is targeted at determining stateof-the-art on Error control mechanisms for video streaming over the Internet. The aims of error control mechanisms are to provide and protect the data from errors caused by packet loss due to congestion and link failure. The error control classified into two categories: Error correction coding and Error detection coding. Error control mechanisms for video applications can be classified into four types: forward error correction (FEC), retransmission, error … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 31 publications
0
5
0
Order By: Relevance
“…In communication theory, majorly, two methods exist to deal with frame losses: Automatic Repeat reQuest (ARQ) and Forward Error Correction (FEC) [18]. The former employs error detection schemes in communication but relies on frame retransmission to correct errors, which is inefficient because of data overhead and more collisions.…”
Section: Erasure Codingmentioning
confidence: 99%
“…In communication theory, majorly, two methods exist to deal with frame losses: Automatic Repeat reQuest (ARQ) and Forward Error Correction (FEC) [18]. The former employs error detection schemes in communication but relies on frame retransmission to correct errors, which is inefficient because of data overhead and more collisions.…”
Section: Erasure Codingmentioning
confidence: 99%
“…STARTGAS: represents the max number of computational steps allowed for the transaction to execute. The data field is the key field that the contracts use to read whenever a smart contract is addressed [ 42 , 43 , 44 , 45 , 46 ]. IIoT Security Threats IIoT solutions consist of industrial systems that connect to cloud for data collection and analysis purposes.…”
Section: Background and Related Studiesmentioning
confidence: 99%
“…The second level of FN’s latency is reduced because of IoMT device communication. As a result, users’ requirements are encountered in the proposed fog computing (FC) model [ 43 , 44 , 45 , 46 , 47 , 48 , 49 , 50 ].…”
Section: Proposed Frameworkmentioning
confidence: 99%
“…(iii) Extensive experiments with hundreds of receivers: Our experiments demonstrate that MuDRA swiftly converges to the target-rate, while meeting the Service Level Agreement (SLA) requirements (e.g., ensuring PDR above 85% to at least 95% of the nodes). Losses can be recovered by using appropriate application-level FEC methods [39], [41], [52], [55], [56].…”
Section: B Our Contributionsmentioning
confidence: 99%