US20080025206A1 - Data packet processing - Google Patents

Data packet processing Download PDF

Info

Publication number
US20080025206A1
US20080025206A1 US11/880,302 US88030207A US2008025206A1 US 20080025206 A1 US20080025206 A1 US 20080025206A1 US 88030207 A US88030207 A US 88030207A US 2008025206 A1 US2008025206 A1 US 2008025206A1
Authority
US
United States
Prior art keywords
data packets
data
packets
candidate
media
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/880,302
Inventor
Ying-Zong Huang
John G. Apostolopoulos
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hewlett Packard Development Co LP
Original Assignee
Hewlett Packard Development Co LP
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hewlett Packard Development Co LP filed Critical Hewlett Packard Development Co LP
Priority to US11/880,302 priority Critical patent/US20080025206A1/en
Assigned to HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P. reassignment HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: HUANG, YING-ZONG, APOSTOLOPOULOS, JOHN G.
Publication of US20080025206A1 publication Critical patent/US20080025206A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/0001Systems modifying transmission characteristics according to link quality, e.g. power backoff
    • H04L1/0009Systems modifying transmission characteristics according to link quality, e.g. power backoff by adapting the channel coding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/004Arrangements for detecting or preventing errors in the information received by using forward error control
    • H04L1/0056Systems characterized by the type of code used
    • H04L1/007Unequal error protection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/0001Systems modifying transmission characteristics according to link quality, e.g. power backoff
    • H04L1/0014Systems modifying transmission characteristics according to link quality, e.g. power backoff by adapting the source coding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/0001Systems modifying transmission characteristics according to link quality, e.g. power backoff
    • H04L1/0015Systems modifying transmission characteristics according to link quality, e.g. power backoff characterised by the adaptation strategy
    • H04L1/0019Systems modifying transmission characteristics according to link quality, e.g. power backoff characterised by the adaptation strategy in which mode-switching is based on a statistical approach

Definitions

  • Embodiments in accordance with the present invention relate to data processing and data delivery.
  • FEC forward error correction
  • FEC-based strategies have been developed to increase the reliability of media delivery.
  • sufficient FEC packets are added to the media stream so that a receiver (or client) can recover all transmitted data (media) packets if any of the media packets are lost in transit, as long as the total number of lost packets is less than a threshold.
  • This approach treats all media packets equally and provides equal error protection across all packets.
  • Such an approach can be referred to as a “protect all” approach to signify that all of the packets are protected.
  • Another FEC-based approach protects the more important data while the less important data is not protected.
  • This approach can be referred to as a “protect subset” approach to signify that only a subset of the packets is protected while the remaining packets are not protected.
  • the “protect subset” approach is used so that the redundancy is allocated to protect the more important data.
  • MPEG Moving Pictures Experts Group
  • media packets carrying data for I-frames are generally considered to be more important than media packets carrying data for P-frames or B-frames.
  • the available redundancy may be allocated to the media packets carrying data for the I-frames.
  • the redundancy may be allocated equally to each of the more important media packets.
  • a variant on that approach is to apply different levels of protection to different subsets of media packets. That is, the available redundancy is not allocated exclusively to the more important media packets, but instead is shared with media packets of lesser importance, with some media packets receiving a higher level of protection and other media packets a lower level of protection.
  • Providing different levels of protection to different data is referred to as unequal error protection (UEP).
  • UEP unequal error protection
  • a greater proportion of the available redundancy can be allocated to protect media packets associated with I-frames and a lesser proportion to protect media packets associated with P-frames, while B-frames may not be protected (no redundancy applied). This approach can be referred to as a “protect different subsets with UEP” approach.
  • FIG. 1 is a block diagram showing elements of a system upon which embodiments of the present invention can be implemented.
  • FIG. 2 is a data flow diagram showing data packets that are processed according to an embodiment of the present invention.
  • FIG. 3 is a block diagram showing a transmitting device in communication with a receiving device according to an embodiment of the present invention.
  • FIG. 4A is a flowchart of a method for processing data packets in accordance with an embodiment of the present invention.
  • FIG. 4B is a flowchart of a method for reducing the number of candidate MPEG data packets in accordance with an embodiment of the present invention.
  • FIG. 4C is a flowchart of a method for reducing the number of candidate scalably coded data packets in accordance with an embodiment of the present invention.
  • FIG. 5 is a block diagram showing elements of a media delivery system according to an embodiment of the present invention.
  • FIG. 6 is a block diagram showing elements of a media delivery system according to another embodiment of the present invention.
  • Various embodiments of the present invention pertain to the processing of data packets.
  • a set of first data packets comprising hierarchically encoded data is accessed.
  • a number of the first data packets are identified as candidate data packets to be potentially transmitted over a network to a receiver based at least in part on the hierarchically encoded data.
  • the number of candidate data packets is then reduced based at least in part on the hierarchically encoded data so that a number of second data packets comprising error correction information for one or more of the first data packets can be increased.
  • media data also referred to herein as multimedia data or media content
  • media data is video data accompanied by audio data; for example, a movie with soundtrack.
  • the video data may be compressed (encoded) using any of a variety of coding standards including, but not limited to, Moving Pictures Experts Group (MPEG) 1/2/4, MPEG-4 Advanced Video Coding (AVC), H.261/2/314, JPEG (Joint Photographic Experts Group), JPEG 2000 including Motion JPEG 2000, and 3-D subband coding.
  • MPEG Moving Pictures Experts Group
  • AVC MPEG-4 Advanced Video Coding
  • H.261/2/314 H.261/2/314
  • JPEG Joint Photographic Experts Group
  • JPEG 2000 Joint Photographic Experts Group
  • 3-D subband coding 3-D subband coding
  • embodiments of the present invention are described with respect to the streaming of video data, it should be understood that embodiments of the present invention are not limited to the streaming of video data. It should be appreciated that embodiments of the present invention also apply to other types of media data, including without limitation: audio-based data, image-based data, graphics data, video-based data, text-based data, web page-based data, and the like.
  • FIG. 1 is a block diagram showing elements of a system upon which embodiments of the present invention can be implemented.
  • the system is implemented as device 100 , which includes a transmitter 11 , a controller 12 (e.g., a processor or microprocessor), and a memory 13 .
  • device 100 also includes a receiver 10 .
  • Receiver 10 and transmitter 11 are capable of either wired or wireless communication.
  • Receiver 10 can be used to receive, for example, information (feedback) that identifies the rate or probability of packet loss over a network, or over some portion of a network, to which device 100 is coupled.
  • Device 100 may process data (e.g., media data) that is or is not packetized. If not packetized, device 100 can packetize the data into data (media) packets. It should be appreciated that device 100 is compatible with existing infrastructures without requiring changes to the existing infrastructures.
  • data e.g., media data
  • device 100 is compatible with existing infrastructures without requiring changes to the existing infrastructures.
  • device 100 is implemented as a content source.
  • device 100 is implemented as a mid-network node, in which case device 100 (receiver 10 ) may receive data or data packets from an upstream node in the network.
  • the mid-network node receives a stream of media packets and associated importances for the media packets.
  • the mid-network node receives a stream of media packets and calculates the associated importances for the media packets.
  • EC is added to at least a portion of the media packets once the importances are known, as described in greater detail below. It should be appreciated that encrypted media data can be processed so long as importance for the data packets can be determined without requiring decryption, e.g., the importance is received with the media packets.
  • Memory 13 can be used to store data and to accumulate data or data packets received by or packetized by device 100 .
  • Data packets that are processed according to an embodiment of the present invention are represented in the data flow diagram of FIG. 2 .
  • an instance of media content 22 is pre-encoded (compressed) and stored in memory 13 .
  • the instance of media content 22 is packetized into M data (media) packets 24 .
  • the instance of media content 22 may include an item such as a movie or a live event that has been captured and recorded, or a live event that is to be distributed in real time.
  • One instance of media content may be differentiated from another. For example, a first instance of media content may have one title and a second instance of media content may have a different title.
  • An instance of media content may be identified as such using the packet identifier code (PID) assigned when the content is encoded—the output of the encoder may be referred to as an elementary stream, and packets in the same elementary stream have the same packet identifier code PID.
  • PID packet identifier code
  • An instance of media content may be identified as such using an object descriptor (OD)—an instance of media content has its own OD identifier. The OD may point to a list of elementary stream descriptors that point to one or more streams with data or side information for the instance of media content.
  • An instance of media content may be identified as such using an intellectual property identification (IPI) descriptor—an instance of media content has its own IPI descriptor.
  • IPI intellectual property identification
  • the IPI descriptor may consist of a pointer to another elementary stream or PID.
  • An instance of media content may be identified by its own Uniform Resource Locator (URL). There may be other ways to distinguish one instance of media content from another.
  • the media packets 24 are independently decodable from one another. Specifically, if a decoder (see FIG. 3 ) receives any single media packet, it can decode that packet to produce a useful signal (without requiring access to any of the other data packets). In some instances, the quality of the decoded signal may be improved as more media packets are accurately received. For example, as long as a decoder receives any one of the media packets 24 , it can decode and reconstruct a useful version of a corresponding portion of the instance of media content 22 . If the decoder receives two media packets, it can decode and reconstruct a relatively improved version of that portion. If all media packets are received, quality is at its highest. In some instances, the data needed to achieve the highest degree of quality can be included in a single media packet. In some instances, a large group of media packets may be required to be received before any decoding can be performed.
  • an error correcting technique is applied to the media packets 24 in order to produce one or more data packets comprising error correction (EC) information.
  • EC error correction
  • FEC forward error correction
  • media packets 24 include data packets that are ultimately discarded, data packets that are ultimately retained but not protected with EC, and data packets that are ultimately retained and protected with EC.
  • data packet may be used herein to refer to either data packets that include data (e.g., media data) or data packets that contain EC information.
  • data packets that include data e.g., media data
  • data packets that contain EC information For simplicity of discussion, to distinguish a data packet containing data (e.g., media data) from one containing EC information, the term “media packet” or “first data packet” may be used to refer to data packets that include media data, and the term “EC packet” or “second data packet” may be used to refer to data packets that include error correction information.
  • the number of media packets and the number of EC packets is iteratively changed to improve and perhaps maximize media quality (or conversely, reduce or perhaps minimize the amount of distortion) at a receiving (client) device.
  • one or more media packets can be purposely and preemptively “discarded” when it is beneficial to do so, so that more EC packets can be transmitted in their stead.
  • one or media data packets may be “discarded” to make room for a like number of additional EC packets.
  • media data packets are described as being “discarded,” they may not be actually discarded in the sense that they may still exist in memory 13 . However, they are discarded in the sense that, although they were identified as candidates that could be sent to the receiving device during a certain period of time, they are discarded (removed) from the output stream and they are not sent to the receiving device, at least not during the scheduled time period.
  • FIG. 3 is a block diagram showing device 100 in wired or wireless communication with a receiving (client) device 300 via a link 32 .
  • the link 32 represents what may be a direct link between the devices 100 and 300 , or what may be an indirect link in which there are one or more other network devices situated on the communication path between devices 100 and 300 .
  • link 32 has a throughput of N packets per unit time, where N may be less than, equal to, or greater than K.
  • the throughput of link 32 may also be referred to herein as its bandwidth or as the governing or limiting data packet transmission rate.
  • the governing data packet transmission rate may be set by any one of the devices or links that constitute link 32 .
  • packets may be lost at the rate of P packets per unit time.
  • the packet loss rate may be a constant value, or it may vary with time.
  • the packet loss rate may be derived in a number of different ways. For example, it can be estimated using historical information or it can be measured in real time.
  • receiving device 300 can provide feedback about the number of data packets it has received, and device 100 can derive a packet loss rate based on that feedback.
  • receiving device 300 decodes one time unit's worth of data packets at a time (e.g., with a bandwidth of N, a block of N data packets are received per unit of time, and N data packets are decoded at a time).
  • receiving device 300 includes an EC decoder 34 followed by a media decoder 36 .
  • the quality of the reconstructed media is determined at least in part by the data packets that are received, EC-decoded and available to the media decoder 36 .
  • the distortion introduced into the reconstructed media by the unavailability of a media packet ‘i’ can be expressed as D(i).
  • N N minus K
  • N ⁇ K N minus K
  • the “protect all” approach described previously herein can be utilized.
  • N ⁇ K is not large enough to provide a desired level of protection, or if K is equal to or greater than N, then embodiments in accordance with the present invention are advantageous relative to conventional approaches.
  • media packets 24 are accessed (read or retrieved) from memory 13 for processing.
  • a set 26 of K media packets are accessed at a time for processing.
  • Device 100 processes one time unit's worth of data packets at a time (e.g., with a coding rate of K, a set of K data packets are processed per unit of time).
  • the set 26 of K media packets can be referred to as candidate media packets that may be transmitted to receiving device 300 .
  • device 100 can determine a number Y of EC packets that provide sufficient protection for the set 26 of candidate media packets. If the number Y of EC packets is less than or equal to N ⁇ K, then the “protect all” approach may be used. If the number Y of EC packets is greater than N ⁇ K, then the number of candidate media packets is reduced to accommodate the number Y of EC packets.
  • the number of candidate media packets can continue to be reduced until, given the packet loss rate P, there is a sufficient number Y of EC packets 28 to protect the remaining number X of candidate media packets 27 , where X plus Y (X+Y) does not exceed the governing packet transmission rate N.
  • the number X of candidate media packets 27 may be referred to herein as the “first number”
  • the number Y of EC packets 28 may be referred to herein as the “second number.”
  • packet loss is a probabilistic event and the number of lost packets may vary significantly from the packet loss rate P.
  • the packet loss rate may average five percent, but at times it may be four percent and at other times six percent, and so it may be useful to include additional EC packets to cover any potential increase over the assumed packet loss rate.
  • embodiments of the present invention are also applicable in the situation where N ⁇ K.
  • there is no room for adding checksums such that EC schemes like “protect all” are not applicable and provide no protection against erasures.
  • “discard and protect” is able to exploit the differing importance of the data packets, and at each packet loss rate discard the appropriate number of the least important packets and replace them with check packets, for an overall gain. Accordingly, discarding packets of lower importance and protecting packets of higher importance using EC improves the packet processing where bandwidth constraints limit the number of data packets available for transmission.
  • the media packets 24 can be ranked according to some measure of relative importance.
  • the ranking can be used to determine which of the candidate media packets should be removed (discarded), in order to reduce them in number and provide additional room for protection packets. If the media packets are ranked, then media packets of lesser importance can be removed before media packets of greater importance.
  • Different criterion can be used to rank the media packets 24 or a subset thereof.
  • media packets carrying data for I-frames are generally considered to be more important than media packets carrying data for P-frames, which in turn are generally considered to be more important than media packets carrying data for B-frames.
  • media packets associated with I-frames can be assigned the highest rank
  • media packets associated with P-frames can be assigned the next highest rank
  • media packets associated with B-frames can be assigned the lowest rank.
  • Similar ranking in terms of importance can be used for various types of scalable coding including scalable image, video, speech, audio, and graphics coding.
  • the scalable coder can use JPEG-2000 for scalable image coding, scalable advanced audio coding (AAC) for audio coding, or adaptive multirate coding (AMR) for speech coding.
  • AAC scalable advanced audio coding
  • AMR adaptive multirate coding
  • These scalable coders typically produce a natural ordering of the coded media data that can be used to rank the media packets 24 or a subset thereof. More complex ranking schemes can be utilized, so that each media packet is assigned a unique place in the ranking.
  • the ranking can be based on other importance information.
  • the importance information includes intra coding information of a packet. For example, given packets A and B corresponding to P frames of MPEG encoded data, if packet A is partially intra coded then packet A might be more important than packet B.
  • the importance information includes distortion information of a packet. For example, if packet A and B have similar distortions, but packet A is partially intra coded and packet B is not intra coded, then packet A may be identified as having higher importance since the intra coding can help reduce or eliminate error propagation from lost packets.
  • the importance information includes an indication that a packet has resynchronization capabilities, wherein such a packet is more importance than a packet that does not have resynchronization capabilities.
  • the importance information might include entropy coding such as Huffman coding or meta coding. In other words, if coding goes across data packets, dropping such a packet would increase the complexity of decoding, so it is more important to not drop these packets.
  • importance information includes context information.
  • the importance information includes a source identification. For example, multiple sources can be evaluated preferentially.
  • the effect associated with not sending a media packet is determined for each of the media packets 24 or subsets thereof.
  • an amount of distortion D(i) that would be introduced into the reconstructed media by the unavailability of a media packet ‘i’ is used to rank the media packets in each set 26 of K media packets.
  • the candidate media packet with the lowest D(i) may be removed from the set 26 in order to make room for an additional EC packet to be added.
  • the candidate media packet with the next lowest D(i) may be removed from the set so that another EC packet can be added, and so on, until there is a sufficient number of EC packets to protect the number of media packets remaining in set 26 .
  • media packets can be removed from set 26 in order of increasing D(i), and a corresponding number of EC packets added, until the expected distortion satisfies a criterion or threshold. For example, this search may be performed in order to minimize the expected distortion at the receiving device 300 based on the D(i)'s associated with the packets in set 26 .
  • K media packets ordered by increasing D(i) there are only K options to examine: namely, remove zero media packets, remove one media packet, remove two media packets, . . . , or remove K ⁇ 1 media packets.
  • different subsets of the media packets may be considered for discarding from the set 26 .
  • the subsets may be pairs of packets or triplets of packets or, more generally, any subset of the packets.
  • the importance of each of these subsets can be quantified by its associated distortion (e.g., the sum of the D(i)'s of the packets in each of the subsets), and then the subsets themselves can be ordered in terms of importance.
  • the importance of a packet or a subset may be either an absolute importance (as measured, for example, by mean-square error distortion or a perceptual distortion) or a relative distortion.
  • the error correction technique being utilized to add redundancy may or may not be applied to all of the remaining candidate media packets, and may or may not be applied equally to all of the remaining candidate data packets. That is, as explained above, there will be X candidate media packets 28 remaining after some of them may have been removed to allow for additional EC packets. In one embodiment, the available redundancy is applied equally to all of the remaining candidate media packets 28 . In another embodiment, a subset of the remaining candidate media packets 28 is identified, and the available redundancy is applied only to the media packets in that subset.
  • different subsets of the remaining media packets 28 are identified, and the available redundancy is applied unequally to the various subsets of media packets—that is, one subset may be allocated more of the available redundancy than another to provide a higher level of protection to one subset than the other.
  • the decision as to which media packets are to be protected, and to what degree, can be based on the relative importance of the media packets, for example.
  • the coding rate K is eight and the available bandwidth N is nine, meaning that there is only room for one EC packet (N-K is one), unless the number of media packets is reduced.
  • N-K is one
  • two of the candidate media packets are removed, such that the remaining number X of candidate media packets is six, and the number Y of EC packets is three.
  • the three EC packets are used to protect all six of the remaining media packets equally.
  • the three EC packets may be used to protect the remaining media packets unequally. For example, only a subset of the six candidate media data packets (e.g., only the most important four of the candidate media packets) may be protected.
  • two of the EC packets may be allocated to a first subset of the most important candidate media packets, while the other EC packet may be allocated to a second subset of the less important candidate media packets (e.g., two EC packets may be allocated to the most important three of the candidate media packets, and one EC packet may be allocated to the other three candidate media packets).
  • FIG. 4A is a flowchart 400 of a method for processing data packets in accordance with an embodiment of the present invention.
  • steps are exemplary. That is, embodiments of the present invention are well-suited to performing various other steps or variations of the steps recited in flowchart 400 .
  • the steps in flowchart 400 may be performed in an order different than presented, and not all of the steps in flowchart 400 may be performed. All of, or a portion of, the methods described by flowchart 400 may be implemented using computer-readable and computer-executable instructions which reside, for example, in computer-usable media of a computer system. In one embodiment, flowchart 400 is performed by device 100 of FIG. 1 .
  • first data packets are accessed in memory.
  • the first data packets include media data.
  • the first data packets include hierarchically encoded data. Examples of hierarchically encoded data include without limitation: MPEG encoding including I-frames, P-frames and B-frames, and scalably coded data including a base layer and at least one enhancement layer.
  • the first data packets include a first subset of data packets including the media data and a second subset of data packets including EC data packets.
  • a first number of the first data packets are identified as candidate data packets to be potentially transmitted to a receiver over a given period of time.
  • the candidate data packets are identified based at least in part on the hierarchically encoded data.
  • the first number of candidate data packets is reduced so that a second number of second data packets can be increased by a corresponding amount. That is, if the first number is reduced by one, the second number is increased by one.
  • the first number plus the second number is not greater than a governing data packet transmission rate.
  • the second data packets are intended as error correction packets that will include error correction information for all or a portion of the candidate data packets.
  • the first number of candidate packets is reduced based at least in part on the hierarchically encoded data.
  • the data includes MPEG encoded data packets.
  • FIG. 4B is a flowchart of a method for reducing the number of candidate MPEG data packets in accordance with an embodiment of the present invention.
  • the B-frame data packets are first evaluated as candidate data packets for reduction. If the evaluation of the B-frame data packets does not reduce the first number sufficiently, as shown at block 412 , the P-frame data packets are then evaluated as candidate data packets for reduction, as shown at block 414 . If the evaluation of the P-frame data packets does not reduce the first number sufficiently, as shown at block 416 , the I-frame data packets are then evaluated as candidate data packets, as shown at block 418 . In this way, data packets of lesser importance are evaluated for reduction from the candidate data packets first, reducing the search space and improving computational efficiency of the process.
  • the data includes scalably coded data.
  • FIG. 4C is a flowchart of a method for reducing the number of candidate scalably coded data packets in accordance with an embodiment of the present invention.
  • the enhancement layer packets are first evaluated as candidate data packets for reduction. It should be appreciated that there can be multiple enhancement layers, and that enhancement layers of lesser importance are evaluated first, e.g., enhancement layer 2 data packets are evaluated before enhancement layer 1 data packets. If the evaluation of the enhancement layer data packets does not reduce the first number sufficiently, as shown at block 422 , the base layer data packets are then evaluated as candidate data packets for reduction, as shown at block 424 .
  • scalably coded data can include scalably coded video data, scalably coded audio data, scalably coded image data, and any other type of scalably coded data.
  • the first data packets are ranked according to a measure of relative importance.
  • the ranking is used to select which candidate data packets to remove in order to reduce the first number.
  • an effect e.g., the amount of distortion
  • the information corresponding to the ranking of each media packet may be contained in the media packet (e.g., in the packet header of each packet), or in a file associated with the media (e.g., in a hint track that provides “hint” information for each packet in the media track), or the information may be computed or estimated from the media packet contents themselves.
  • the information describing the importance of each packet may also be provided by a variety of other means.
  • an effect e.g., the total amount of distortion
  • values for the first and second numbers are selected such that the effect satisfies a threshold. For example, first data packets can be removed one by one, and EC packets added one by one, until the net effect on quality or distortion satisfies a criterion or threshold.
  • block 44 the second subset of EC data packets of the first data packets is selectively reduced so that the number of second data packets comprising error correction information for selected candidate data packets is increased. It should be appreciated that block 44 is only applicable where the first data packets including EC data packets, e.g., where the method of processing data packets is performed by a sender operating as an EC transcoder as shown in FIG. 6 .
  • an error correcting technique is applied to one or more, and up to all, of the first data packets remaining in the set until there are enough of the second data packets to compensate for a data packet loss rate.
  • the error correcting technique is applied to all of the first data packets (candidate data packets) remaining in the set. In another embodiment, a subset of the first (candidate) data packets is selected. The error correcting technique is applied to first data packets included in the subset to generate the second number of second data packets.
  • a first subset and a second subset of the first (candidate) data packets are selected.
  • data packets included in the first subset are not included in the second subset, and vice versa.
  • the error correcting technique is applied to first data packets included in the first subset to generate a first portion of the second number of second data packets, and is also applied to first data packets included in the second subset to generate a second portion of the second number of second data packets.
  • the X media packets to be transmitted may be directly transmitted to the receiver along with Y EC packets. This is sometimes referred to as a systematic error correction code because the original X media packets directly appear in the X+Y transmitted packets.
  • the X media packets may be transformed to produce a total of X+Y packets that are transmitted. In this case, the transmitted packets are a function of the X media packets, but they are not exactly those packets. There are a variety of error correction techniques that take X input packets and produce X+Y packets for transmission to the receiver.
  • Example error correction techniques include, but are not limited to, parity schemes, Hamming coding, BCH (Bose, Ray-Chaudhuri, Hocquenghem) codes, Golay codes, Reed-Solomon codes, convolutional codes, Turbo codes, erasure codes, fountain codes, systematic Reed-Solomon codes, or other systematic codes.
  • systematic codes refers codes where the original data appears in the transmitted output.
  • the output includes the K input packets in additional to EC packets.
  • the data in the output packets includes the data from the K input packets, though perhaps spread out over K or more of the output packets.
  • Systematic codes provide for decoding received packets even where other packets are lost.
  • FIG. 5 is a block diagram showing elements of a media delivery system 500 according to an embodiment of the present invention.
  • an instance of media content 22 is encoded by encoder 51 for a transmission rate of K packets per unit time.
  • the encoded media data is optionally stored in storage 52 for later transmission, which may reside on encoder 51 or on sender 100 , or which may be a separate element.
  • the encoded media data is sent directly to sender 100 for delivery.
  • a set 26 of K media packets (e.g., candidate media packets) are accessed at a time for processing.
  • sender 100 can determine a number Y of EC packets that is sufficient for protecting the set 26 of media packets.
  • N ⁇ K For a transmission rate N, if N ⁇ K is greater than Y, then a “protect all” approach may be used. Otherwise, the number of candidate media packets is reduced to allow more room for EC packets. Note that, even if there is generally sufficient room for the “protect all” approach, it may still be useful to conservatively reduce the number of candidate media packets to allow additional room for EC packets, because packet loss is a probabilistic event and the number of lost packets may vary significantly from the assumed packet loss rate.
  • packet selector 53 selects the subset of candidate media packets to transmit; these are identified as a number X of remaining candidate media packets 27 .
  • Error corrector 54 generates error correction information for the remaining candidate media packets 27 .
  • the error correction information is included in the number Y of EC packets 28 .
  • the output of sender 100 is N packets per unit time, where the N packets include a number X of remaining candidate data packets and a number Y of EC packets 28 .
  • sender 100 is comprised within a mid-network node.
  • instance of media content 22 already includes EC packets when received at encoder 51 .
  • sender 100 is operable to add additional EC packets to media content 22 .
  • instance of media content 22 may have been produced by another device, such as a conventional EC system, e.g., an EC system that does not discard packets, or by another device in accordance with the described embodiment, e.g., a device operable to discard packets and add EC packets.
  • FIG. 6 is a block diagram showing elements of a media delivery system 600 according to an embodiment of the present invention. It should be appreciated that sender 100 , packets selector 53 , error corrector 54 , and receiver 300 operate in a manner similar to that described above in accordance with FIG. 5 .
  • sender 100 of media delivery system 600 operates as an EC transcoder, whereby sender 100 can change to EC at the mid-network node if network transmission conditions change, e.g., conditions at link 32 .
  • Packet selector 53 selects X media packets for transmission, where X is not greater than A.
  • N may be chosen to be greater than, equal to, or less than K.
  • Y may be chosen to be greater than, equal to, or less than B.
  • N is chosen based on the bandwidth of the channel, and X and Y are chosen to maximize the received quality given a channel packet loss rate.
  • sender 100 receives a set of media packets and EC packets and discards some of the media packets to make room for additional EC packets. It should be appreciated that all of the original received EC packets may be replaced by a new set of EC packets.
  • the output N packets of sender 100 is a subset of the received media packets and a completely new set of EC packets, e.g., the received EC packets may be dropped and replaced.
  • sender 100 can change the EC if the packet loss rate was higher then anticipated by the original sender, e.g., the channel is worse then the sender expected.
  • sender 100 can forward all of the received media packets while replacing the received EC packets by a new set of EC packets that is better matched to the channel.
  • sender 100 can reduce the number of media packets and discard the received EC packets, thereby making room for a new set of EC packets which are better matched to the channel.
  • a set of media packets and associated EC packets are received.
  • the associated importance for the set of media packets is also received.
  • a second set of media packets and EC packets is generated. For instance, all of the media packets may be retained and an increased number of EC packets generated, if bandwidth is sufficient. In another example, the number of media packets may be reduced, thereby making additional room used for transmitting additional EC packets.
  • embodiments in accordance with the present invention provide a data protection strategy that can be employed when a “protect all” approach is not a viable alternative.
  • a subset of data e.g., media data
  • the subset of data to send and protect can be selected based on knowledge of the relative importance of the media packets, which in turn may be based on the impact of each media packet on the quality of the delivered media. More specifically, the number of media packets to be transmitted is reduced to make room for additional error correction packets, providing increased protection for the portion of the data that is considered to be more important.
  • Embodiments in accordance with the present invention are useful for data that is pre-encoded and stored (e.g., video on demand), as well as for data that is being encoded in real time. Embodiments in accordance with the present invention are particularly useful when the data is pre-encoded and stored, because in such a situation the data may be encoded for a given packet delivery rate, and it may not be possible for the transmitting device to re-encode the data at a different packet delivery rate in order to satisfy a bandwidth constraint or to provide the necessary room for a sufficient number of error correction packets to be sent.

Abstract

Data packet processing is described. A set of first data packets comprising hierarchically encoded data is accessed. A number of the first data packets are identified as candidate data packets to be potentially transmitted over a network to a receiver based at least in part on the hierarchically encoded data. The number of candidate data packets is then reduced based at least in part on the hierarchically encoded data so that a number of second data packets comprising error correction information for one or more of the first data packets can be increased.

Description

    CROSS REFERENCE TO RELATED APPLICATIONS
  • This application is a Continuation-in-Part of and claims priority to the co-pending patent application, U.S. application Ser. No. 11/494,930, Attorney Docket Number 200601541-1, entitled “Reducing a Number of Data Packets to Increase a Number of Error Correcting Packets,” with filing date Jul. 28, 2006, assigned to the assignee of the present application, and which is hereby incorporated herein by reference.
  • FIELD
  • Embodiments in accordance with the present invention relate to data processing and data delivery.
  • BACKGROUND
  • Media delivery over wired and wireless networks is continuing to grow in importance. A variety of techniques have been developed to increase the reliability of media delivery over a lossy packet network. These techniques include forward error correction (FEC), retransmission, error-resilient coding, and error concealment, as well as various combinations of these approaches.
  • A number of FEC-based strategies have been developed to increase the reliability of media delivery. In perhaps the most popular approach, sufficient FEC packets are added to the media stream so that a receiver (or client) can recover all transmitted data (media) packets if any of the media packets are lost in transit, as long as the total number of lost packets is less than a threshold. This approach treats all media packets equally and provides equal error protection across all packets. Such an approach can be referred to as a “protect all” approach to signify that all of the packets are protected.
  • Another FEC-based approach protects the more important data while the less important data is not protected. This approach can be referred to as a “protect subset” approach to signify that only a subset of the packets is protected while the remaining packets are not protected. For example, when the amount of packet loss is greater than the amount of protection that can be applied using the “protect all” approach, then the “protect subset” approach is used so that the redundancy is allocated to protect the more important data. For example, when media is encoded (compressed) using a Moving Pictures Experts Group (MPEG) compression scheme, media packets carrying data for I-frames are generally considered to be more important than media packets carrying data for P-frames or B-frames. Thus, for example, the available redundancy may be allocated to the media packets carrying data for the I-frames.
  • In the “protect subset” approach, the redundancy may be allocated equally to each of the more important media packets. A variant on that approach is to apply different levels of protection to different subsets of media packets. That is, the available redundancy is not allocated exclusively to the more important media packets, but instead is shared with media packets of lesser importance, with some media packets receiving a higher level of protection and other media packets a lower level of protection. Providing different levels of protection to different data is referred to as unequal error protection (UEP). In the MPEG example above, a greater proportion of the available redundancy can be allocated to protect media packets associated with I-frames and a lesser proportion to protect media packets associated with P-frames, while B-frames may not be protected (no redundancy applied). This approach can be referred to as a “protect different subsets with UEP” approach.
  • If there is sufficient bandwidth to accommodate the number of FEC packets necessary to overcome the expected packet loss, then the “protect all” approach is generally the best strategy to employ. However, in situations where there is not enough bandwidth available for FEC for the “protect all” approach to enable the recovery of all the lost packets, it is unclear which of the remaining strategies should be selected and implemented in order to decrease or even minimize the expected distortion of the reconstructed media at the receiver/client.
  • Accordingly, there is value to a data protection strategy that can be employed when a “protect all” approach is not a viable alternative.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The accompanying drawings, which are incorporated in and form a part of this specification, illustrate embodiments of the invention and, together with the description, serve to explain the principles of the invention:
  • FIG. 1 is a block diagram showing elements of a system upon which embodiments of the present invention can be implemented.
  • FIG. 2 is a data flow diagram showing data packets that are processed according to an embodiment of the present invention.
  • FIG. 3 is a block diagram showing a transmitting device in communication with a receiving device according to an embodiment of the present invention.
  • FIG. 4A is a flowchart of a method for processing data packets in accordance with an embodiment of the present invention.
  • FIG. 4B is a flowchart of a method for reducing the number of candidate MPEG data packets in accordance with an embodiment of the present invention.
  • FIG. 4C is a flowchart of a method for reducing the number of candidate scalably coded data packets in accordance with an embodiment of the present invention.
  • FIG. 5 is a block diagram showing elements of a media delivery system according to an embodiment of the present invention.
  • FIG. 6 is a block diagram showing elements of a media delivery system according to another embodiment of the present invention.
  • The drawings referred to in this description should not be understood as being drawn to scale except if specifically noted.
  • DESCRIPTION OF EMBODIMENTS
  • Reference will now be made in detail to various embodiments of the invention, examples of which are illustrated in the accompanying drawings. While the invention will be described in conjunction with these embodiments, it will be understood that they are not intended to limit the invention to these embodiments. On the contrary, the invention is intended to cover alternatives, modifications and equivalents, which may be included within the spirit and scope of the invention as defined by the appended claims. Furthermore, in the following description of various embodiments, numerous specific details are set forth in order to provide a thorough understanding of embodiments of the present invention. In other instances, well-known methods, procedures, components, and circuits have not been described in detail as not to unnecessarily obscure aspects of the embodiments of the present invention.
  • Various embodiments of the present invention pertain to the processing of data packets. In one embodiment, a set of first data packets comprising hierarchically encoded data is accessed. A number of the first data packets are identified as candidate data packets to be potentially transmitted over a network to a receiver based at least in part on the hierarchically encoded data. The number of candidate data packets is then reduced based at least in part on the hierarchically encoded data so that a number of second data packets comprising error correction information for one or more of the first data packets can be increased.
  • The descriptions and examples provided herein are generally applicable to different types of data. In particular, the descriptions and examples provided herein are applicable to media data (also referred to herein as multimedia data or media content). One example of media data is video data accompanied by audio data; for example, a movie with soundtrack. The video data may be compressed (encoded) using any of a variety of coding standards including, but not limited to, Moving Pictures Experts Group (MPEG) 1/2/4, MPEG-4 Advanced Video Coding (AVC), H.261/2/314, JPEG (Joint Photographic Experts Group), JPEG 2000 including Motion JPEG 2000, and 3-D subband coding.
  • Although the embodiments of the present invention are described with respect to the streaming of video data, it should be understood that embodiments of the present invention are not limited to the streaming of video data. It should be appreciated that embodiments of the present invention also apply to other types of media data, including without limitation: audio-based data, image-based data, graphics data, video-based data, text-based data, web page-based data, and the like.
  • FIG. 1 is a block diagram showing elements of a system upon which embodiments of the present invention can be implemented. In the example of FIG. 1, the system is implemented as device 100, which includes a transmitter 11, a controller 12 (e.g., a processor or microprocessor), and a memory 13. In one embodiment, device 100 also includes a receiver 10. Receiver 10 and transmitter 11 are capable of either wired or wireless communication. Receiver 10 can be used to receive, for example, information (feedback) that identifies the rate or probability of packet loss over a network, or over some portion of a network, to which device 100 is coupled.
  • Device 100 may process data (e.g., media data) that is or is not packetized. If not packetized, device 100 can packetize the data into data (media) packets. It should be appreciated that device 100 is compatible with existing infrastructures without requiring changes to the existing infrastructures.
  • In one embodiment, device 100 is implemented as a content source. In another embodiment, device 100 is implemented as a mid-network node, in which case device 100 (receiver 10) may receive data or data packets from an upstream node in the network. In one embodiment, the mid-network node receives a stream of media packets and associated importances for the media packets. In another embodiment, the mid-network node receives a stream of media packets and calculates the associated importances for the media packets. In one embodiment, EC is added to at least a portion of the media packets once the importances are known, as described in greater detail below. It should be appreciated that encrypted media data can be processed so long as importance for the data packets can be determined without requiring decryption, e.g., the importance is received with the media packets.
  • Memory 13 can be used to store data and to accumulate data or data packets received by or packetized by device 100.
  • Data packets that are processed according to an embodiment of the present invention are represented in the data flow diagram of FIG. 2. In the example of FIG. 2, an instance of media content 22 is pre-encoded (compressed) and stored in memory 13. In one embodiment, the instance of media content 22 is packetized into M data (media) packets 24.
  • The instance of media content 22 may include an item such as a movie or a live event that has been captured and recorded, or a live event that is to be distributed in real time. One instance of media content may be differentiated from another. For example, a first instance of media content may have one title and a second instance of media content may have a different title.
  • There are other ways to differentiate between instances of media content. An instance of media content may be identified as such using the packet identifier code (PID) assigned when the content is encoded—the output of the encoder may be referred to as an elementary stream, and packets in the same elementary stream have the same packet identifier code PID. An instance of media content may be identified as such using an object descriptor (OD)—an instance of media content has its own OD identifier. The OD may point to a list of elementary stream descriptors that point to one or more streams with data or side information for the instance of media content. An instance of media content may be identified as such using an intellectual property identification (IPI) descriptor—an instance of media content has its own IPI descriptor. If multiple instances of media content are identified by the same IPI information, the IPI descriptor may consist of a pointer to another elementary stream or PID. An instance of media content may be identified by its own Uniform Resource Locator (URL). There may be other ways to distinguish one instance of media content from another.
  • In one embodiment, the media packets 24 are independently decodable from one another. Specifically, if a decoder (see FIG. 3) receives any single media packet, it can decode that packet to produce a useful signal (without requiring access to any of the other data packets). In some instances, the quality of the decoded signal may be improved as more media packets are accurately received. For example, as long as a decoder receives any one of the media packets 24, it can decode and reconstruct a useful version of a corresponding portion of the instance of media content 22. If the decoder receives two media packets, it can decode and reconstruct a relatively improved version of that portion. If all media packets are received, quality is at its highest. In some instances, the data needed to achieve the highest degree of quality can be included in a single media packet. In some instances, a large group of media packets may be required to be received before any decoding can be performed.
  • In one embodiment, an error correcting technique is applied to the media packets 24 in order to produce one or more data packets comprising error correction (EC) information. In one embodiment, a forward error correction (FEC) technique is used; such techniques are known in the art. It should be appreciated that media packets 24 include data packets that are ultimately discarded, data packets that are ultimately retained but not protected with EC, and data packets that are ultimately retained and protected with EC.
  • The term “data packet” may be used herein to refer to either data packets that include data (e.g., media data) or data packets that contain EC information. For simplicity of discussion, to distinguish a data packet containing data (e.g., media data) from one containing EC information, the term “media packet” or “first data packet” may be used to refer to data packets that include media data, and the term “EC packet” or “second data packet” may be used to refer to data packets that include error correction information.
  • As will be seen from the discussion below, according to embodiments of the present invention, the number of media packets and the number of EC packets is iteratively changed to improve and perhaps maximize media quality (or conversely, reduce or perhaps minimize the amount of distortion) at a receiving (client) device. More specifically, according to embodiments of the present invention, one or more media packets can be purposely and preemptively “discarded” when it is beneficial to do so, so that more EC packets can be transmitted in their stead. In other words, in instances in which bandwidth constraints or other considerations limit the number of data packets that can be sent per unit of time, one or media data packets may be “discarded” to make room for a like number of additional EC packets.
  • Although media data packets are described as being “discarded,” they may not be actually discarded in the sense that they may still exist in memory 13. However, they are discarded in the sense that, although they were identified as candidates that could be sent to the receiving device during a certain period of time, they are discarded (removed) from the output stream and they are not sent to the receiving device, at least not during the scheduled time period.
  • FIG. 3 is a block diagram showing device 100 in wired or wireless communication with a receiving (client) device 300 via a link 32. The link 32 represents what may be a direct link between the devices 100 and 300, or what may be an indirect link in which there are one or more other network devices situated on the communication path between devices 100 and 300.
  • In the example of FIG. 2, the instance of media content 22 is encoded for a transmission rate of K packets per unit time. In the example of FIG. 3, link 32 has a throughput of N packets per unit time, where N may be less than, equal to, or greater than K. The throughput of link 32 may also be referred to herein as its bandwidth or as the governing or limiting data packet transmission rate. In a case in which link 32 represents an indirect link and thus traverses intervening network devices as well as the links between those intervening devices, the governing data packet transmission rate may be set by any one of the devices or links that constitute link 32.
  • During transmission over link 32, packets may be lost at the rate of P packets per unit time. The packet loss rate may be a constant value, or it may vary with time. The packet loss rate may be derived in a number of different ways. For example, it can be estimated using historical information or it can be measured in real time. Also, receiving device 300 can provide feedback about the number of data packets it has received, and device 100 can derive a packet loss rate based on that feedback.
  • In one embodiment, receiving device 300 decodes one time unit's worth of data packets at a time (e.g., with a bandwidth of N, a block of N data packets are received per unit of time, and N data packets are decoded at a time). In one embodiment, receiving device 300 includes an EC decoder 34 followed by a media decoder 36. Depending on the amount of packet loss and the degree of error protection, some data packets lost during transmission may not be recoverable by the EC decoder 34 and are thus unavailable to the media decoder 36. The quality of the reconstructed media is determined at least in part by the data packets that are received, EC-decoded and available to the media decoder 36. The distortion introduced into the reconstructed media by the unavailability of a media packet ‘i’ can be expressed as D(i).
  • With reference to both FIGS. 2 and 3, if the coding rate K is less than the transmission rate N, then there are N minus K (N−K) data packets that can be used as EC packets. If N−K EC packets provide a sufficient or desired level of redundancy for the K media packets, then the “protect all” approach described previously herein can be utilized. However, if N−K is not large enough to provide a desired level of protection, or if K is equal to or greater than N, then embodiments in accordance with the present invention are advantageous relative to conventional approaches.
  • According to embodiments of the present invention, media packets 24, or a subset of those media packets, are accessed (read or retrieved) from memory 13 for processing. In general, a set 26 of K media packets are accessed at a time for processing. Device 100 processes one time unit's worth of data packets at a time (e.g., with a coding rate of K, a set of K data packets are processed per unit of time).
  • The set 26 of K media packets can be referred to as candidate media packets that may be transmitted to receiving device 300. Using the packet loss rate P as a guide, device 100 can determine a number Y of EC packets that provide sufficient protection for the set 26 of candidate media packets. If the number Y of EC packets is less than or equal to N−K, then the “protect all” approach may be used. If the number Y of EC packets is greater than N−K, then the number of candidate media packets is reduced to accommodate the number Y of EC packets. The number of candidate media packets can continue to be reduced until, given the packet loss rate P, there is a sufficient number Y of EC packets 28 to protect the remaining number X of candidate media packets 27, where X plus Y (X+Y) does not exceed the governing packet transmission rate N. For simplicity of discussion, the number X of candidate media packets 27 may be referred to herein as the “first number,” and the number Y of EC packets 28 may be referred to herein as the “second number.”
  • Note that, even if there is generally sufficient room for the “protect all” approach, it may still be useful to conservatively reduce the number of candidate media packets to allow additional room for EC packets, because packet loss is a probabilistic event and the number of lost packets may vary significantly from the packet loss rate P. For example, the packet loss rate may average five percent, but at times it may be four percent and at other times six percent, and so it may be useful to include additional EC packets to cover any potential increase over the assumed packet loss rate.
  • It should be appreciated that embodiments of the present invention are also applicable in the situation where N≦K. In the present embodiment, there is no room for adding checksums such that EC schemes like “protect all” are not applicable and provide no protection against erasures. However, “discard and protect” is able to exploit the differing importance of the data packets, and at each packet loss rate discard the appropriate number of the least important packets and replace them with check packets, for an overall gain. Accordingly, discarding packets of lower importance and protecting packets of higher importance using EC improves the packet processing where bandwidth constraints limit the number of data packets available for transmission.
  • The media packets 24, or the media packets in each set 26 of K media packets, can be ranked according to some measure of relative importance. The ranking can be used to determine which of the candidate media packets should be removed (discarded), in order to reduce them in number and provide additional room for protection packets. If the media packets are ranked, then media packets of lesser importance can be removed before media packets of greater importance.
  • Different criterion can be used to rank the media packets 24 or a subset thereof. For example, when media is encoded using MPEG, media packets carrying data for I-frames are generally considered to be more important than media packets carrying data for P-frames, which in turn are generally considered to be more important than media packets carrying data for B-frames. Thus, media packets associated with I-frames can be assigned the highest rank, media packets associated with P-frames can be assigned the next highest rank, and media packets associated with B-frames can be assigned the lowest rank. Similar ranking in terms of importance can be used for various types of scalable coding including scalable image, video, speech, audio, and graphics coding. For example, the scalable coder can use JPEG-2000 for scalable image coding, scalable advanced audio coding (AAC) for audio coding, or adaptive multirate coding (AMR) for speech coding. These scalable coders typically produce a natural ordering of the coded media data that can be used to rank the media packets 24 or a subset thereof. More complex ranking schemes can be utilized, so that each media packet is assigned a unique place in the ranking.
  • It should be appreciated that the ranking can be based on other importance information. In one embodiment, the importance information includes intra coding information of a packet. For example, given packets A and B corresponding to P frames of MPEG encoded data, if packet A is partially intra coded then packet A might be more important than packet B. In another embodiment, the importance information includes distortion information of a packet. For example, if packet A and B have similar distortions, but packet A is partially intra coded and packet B is not intra coded, then packet A may be identified as having higher importance since the intra coding can help reduce or eliminate error propagation from lost packets.
  • In one embodiment, the importance information includes an indication that a packet has resynchronization capabilities, wherein such a packet is more importance than a packet that does not have resynchronization capabilities. For example, the importance information might include entropy coding such as Huffman coding or meta coding. In other words, if coding goes across data packets, dropping such a packet would increase the complexity of decoding, so it is more important to not drop these packets. In one embodiment, importance information includes context information. In another embodiment, the importance information includes a source identification. For example, multiple sources can be evaluated preferentially.
  • In one embodiment, the effect associated with not sending a media packet is determined for each of the media packets 24 or subsets thereof. In one such embodiment, an amount of distortion D(i) that would be introduced into the reconstructed media by the unavailability of a media packet ‘i’ is used to rank the media packets in each set 26 of K media packets. In such an embodiment, for example, the candidate media packet with the lowest D(i) may be removed from the set 26 in order to make room for an additional EC packet to be added. If the addition of one EC packet is not sufficient to protect the media packets remaining in the set 26, then the candidate media packet with the next lowest D(i) may be removed from the set so that another EC packet can be added, and so on, until there is a sufficient number of EC packets to protect the number of media packets remaining in set 26.
  • Alternatively, media packets can be removed from set 26 in order of increasing D(i), and a corresponding number of EC packets added, until the expected distortion satisfies a criterion or threshold. For example, this search may be performed in order to minimize the expected distortion at the receiving device 300 based on the D(i)'s associated with the packets in set 26. Note that, with K media packets ordered by increasing D(i), there are only K options to examine: namely, remove zero media packets, remove one media packet, remove two media packets, . . . , or remove K−1 media packets.
  • Alternatively, different subsets of the media packets may be considered for discarding from the set 26. For instance, the subsets may be pairs of packets or triplets of packets or, more generally, any subset of the packets. The importance of each of these subsets can be quantified by its associated distortion (e.g., the sum of the D(i)'s of the packets in each of the subsets), and then the subsets themselves can be ordered in terms of importance.
  • Note that the importance of a packet or a subset may be either an absolute importance (as measured, for example, by mean-square error distortion or a perceptual distortion) or a relative distortion.
  • The error correction technique being utilized to add redundancy may or may not be applied to all of the remaining candidate media packets, and may or may not be applied equally to all of the remaining candidate data packets. That is, as explained above, there will be X candidate media packets 28 remaining after some of them may have been removed to allow for additional EC packets. In one embodiment, the available redundancy is applied equally to all of the remaining candidate media packets 28. In another embodiment, a subset of the remaining candidate media packets 28 is identified, and the available redundancy is applied only to the media packets in that subset. In another embodiment, different subsets of the remaining media packets 28 are identified, and the available redundancy is applied unequally to the various subsets of media packets—that is, one subset may be allocated more of the available redundancy than another to provide a higher level of protection to one subset than the other. The decision as to which media packets are to be protected, and to what degree, can be based on the relative importance of the media packets, for example.
  • Consider an example in which the coding rate K is eight and the available bandwidth N is nine, meaning that there is only room for one EC packet (N-K is one), unless the number of media packets is reduced. In this example, in order to achieve a satisfactory level of redundancy, two of the candidate media packets are removed, such that the remaining number X of candidate media packets is six, and the number Y of EC packets is three. In one embodiment, the three EC packets are used to protect all six of the remaining media packets equally. In another embodiment, the three EC packets may be used to protect the remaining media packets unequally. For example, only a subset of the six candidate media data packets (e.g., only the most important four of the candidate media packets) may be protected. Alternatively, two of the EC packets may be allocated to a first subset of the most important candidate media packets, while the other EC packet may be allocated to a second subset of the less important candidate media packets (e.g., two EC packets may be allocated to the most important three of the candidate media packets, and one EC packet may be allocated to the other three candidate media packets).
  • FIG. 4A is a flowchart 400 of a method for processing data packets in accordance with an embodiment of the present invention. Although specific steps are disclosed in flowchart 400, such steps are exemplary. That is, embodiments of the present invention are well-suited to performing various other steps or variations of the steps recited in flowchart 400. The steps in flowchart 400 may be performed in an order different than presented, and not all of the steps in flowchart 400 may be performed. All of, or a portion of, the methods described by flowchart 400 may be implemented using computer-readable and computer-executable instructions which reside, for example, in computer-usable media of a computer system. In one embodiment, flowchart 400 is performed by device 100 of FIG. 1.
  • In block 41 of FIG. 4A, first data packets are accessed in memory. In one embodiment, the first data packets include media data. In one embodiment, the first data packets include hierarchically encoded data. Examples of hierarchically encoded data include without limitation: MPEG encoding including I-frames, P-frames and B-frames, and scalably coded data including a base layer and at least one enhancement layer. In one embodiment the first data packets include a first subset of data packets including the media data and a second subset of data packets including EC data packets.
  • In block 42, a first number of the first data packets are identified as candidate data packets to be potentially transmitted to a receiver over a given period of time. In one embodiment, the candidate data packets are identified based at least in part on the hierarchically encoded data.
  • In block 43, the first number of candidate data packets is reduced so that a second number of second data packets can be increased by a corresponding amount. That is, if the first number is reduced by one, the second number is increased by one. The first number plus the second number is not greater than a governing data packet transmission rate. The second data packets are intended as error correction packets that will include error correction information for all or a portion of the candidate data packets. In one embodiment, the first number of candidate packets is reduced based at least in part on the hierarchically encoded data.
  • In one embodiment, the data includes MPEG encoded data packets. FIG. 4B is a flowchart of a method for reducing the number of candidate MPEG data packets in accordance with an embodiment of the present invention. At block 410, the B-frame data packets are first evaluated as candidate data packets for reduction. If the evaluation of the B-frame data packets does not reduce the first number sufficiently, as shown at block 412, the P-frame data packets are then evaluated as candidate data packets for reduction, as shown at block 414. If the evaluation of the P-frame data packets does not reduce the first number sufficiently, as shown at block 416, the I-frame data packets are then evaluated as candidate data packets, as shown at block 418. In this way, data packets of lesser importance are evaluated for reduction from the candidate data packets first, reducing the search space and improving computational efficiency of the process.
  • In another embodiment, the data includes scalably coded data. FIG. 4C is a flowchart of a method for reducing the number of candidate scalably coded data packets in accordance with an embodiment of the present invention. At block 420, the enhancement layer packets are first evaluated as candidate data packets for reduction. It should be appreciated that there can be multiple enhancement layers, and that enhancement layers of lesser importance are evaluated first, e.g., enhancement layer 2 data packets are evaluated before enhancement layer 1 data packets. If the evaluation of the enhancement layer data packets does not reduce the first number sufficiently, as shown at block 422, the base layer data packets are then evaluated as candidate data packets for reduction, as shown at block 424. It should be appreciated that scalably coded data can include scalably coded video data, scalably coded audio data, scalably coded image data, and any other type of scalably coded data.
  • In one embodiment, the first data packets are ranked according to a measure of relative importance. In such an embodiment, the ranking is used to select which candidate data packets to remove in order to reduce the first number. In another such embodiment, an effect (e.g., the amount of distortion) associated with not sending a first data packet is quantified, and the quantified effect is used to rank the candidate data packets. The information corresponding to the ranking of each media packet may be contained in the media packet (e.g., in the packet header of each packet), or in a file associated with the media (e.g., in a hint track that provides “hint” information for each packet in the media track), or the information may be computed or estimated from the media packet contents themselves. The information describing the importance of each packet may also be provided by a variety of other means.
  • In yet another embodiment, an effect (e.g., the total amount of distortion) associated with not sending different numbers of the first data packets is quantified. In such an embodiment, values for the first and second numbers are selected such that the effect satisfies a threshold. For example, first data packets can be removed one by one, and EC packets added one by one, until the net effect on quality or distortion satisfies a criterion or threshold.
  • In one embodiment, in block 44, the second subset of EC data packets of the first data packets is selectively reduced so that the number of second data packets comprising error correction information for selected candidate data packets is increased. It should be appreciated that block 44 is only applicable where the first data packets including EC data packets, e.g., where the method of processing data packets is performed by a sender operating as an EC transcoder as shown in FIG. 6.
  • In block 45, as selected first data packets are removed from the set of candidate data packets, an error correcting technique is applied to one or more, and up to all, of the first data packets remaining in the set until there are enough of the second data packets to compensate for a data packet loss rate.
  • In one embodiment, the error correcting technique is applied to all of the first data packets (candidate data packets) remaining in the set. In another embodiment, a subset of the first (candidate) data packets is selected. The error correcting technique is applied to first data packets included in the subset to generate the second number of second data packets.
  • In yet another embodiment, a first subset and a second subset of the first (candidate) data packets are selected. In one such embodiment, data packets included in the first subset are not included in the second subset, and vice versa. The error correcting technique is applied to first data packets included in the first subset to generate a first portion of the second number of second data packets, and is also applied to first data packets included in the second subset to generate a second portion of the second number of second data packets.
  • In one embodiment, the X media packets to be transmitted may be directly transmitted to the receiver along with Y EC packets. This is sometimes referred to as a systematic error correction code because the original X media packets directly appear in the X+Y transmitted packets. In another embodiment, the X media packets may be transformed to produce a total of X+Y packets that are transmitted. In this case, the transmitted packets are a function of the X media packets, but they are not exactly those packets. There are a variety of error correction techniques that take X input packets and produce X+Y packets for transmission to the receiver. Example error correction techniques include, but are not limited to, parity schemes, Hamming coding, BCH (Bose, Ray-Chaudhuri, Hocquenghem) codes, Golay codes, Reed-Solomon codes, convolutional codes, Turbo codes, erasure codes, fountain codes, systematic Reed-Solomon codes, or other systematic codes. It should be appreciated that systematic codes refers codes where the original data appears in the transmitted output. For example, for K input packets, the output includes the K input packets in additional to EC packets. As another example, for K input packets, the data in the output packets includes the data from the K input packets, though perhaps spread out over K or more of the output packets. Systematic codes provide for decoding received packets even where other packets are lost.
  • FIG. 5 is a block diagram showing elements of a media delivery system 500 according to an embodiment of the present invention. In the example of FIG. 5, an instance of media content 22 is encoded by encoder 51 for a transmission rate of K packets per unit time. The encoded media data is optionally stored in storage 52 for later transmission, which may reside on encoder 51 or on sender 100, or which may be a separate element. Alternatively, the encoded media data is sent directly to sender 100 for delivery. A set 26 of K media packets (e.g., candidate media packets) are accessed at a time for processing. Using, for example, a packet loss rate as a guide, sender 100 can determine a number Y of EC packets that is sufficient for protecting the set 26 of media packets. For a transmission rate N, if N−K is greater than Y, then a “protect all” approach may be used. Otherwise, the number of candidate media packets is reduced to allow more room for EC packets. Note that, even if there is generally sufficient room for the “protect all” approach, it may still be useful to conservatively reduce the number of candidate media packets to allow additional room for EC packets, because packet loss is a probabilistic event and the number of lost packets may vary significantly from the assumed packet loss rate.
  • Using information about the relative importance of each media packet, for example, packet selector 53 selects the subset of candidate media packets to transmit; these are identified as a number X of remaining candidate media packets 27. Error corrector 54 generates error correction information for the remaining candidate media packets 27. The error correction information is included in the number Y of EC packets 28. The output of sender 100 is N packets per unit time, where the N packets include a number X of remaining candidate data packets and a number Y of EC packets 28.
  • In one embodiment, sender 100 is comprised within a mid-network node. In one embodiment, instance of media content 22 already includes EC packets when received at encoder 51. In one embodiment, sender 100 is operable to add additional EC packets to media content 22. For example, instance of media content 22 may have been produced by another device, such as a conventional EC system, e.g., an EC system that does not discard packets, or by another device in accordance with the described embodiment, e.g., a device operable to discard packets and add EC packets.
  • FIG. 6 is a block diagram showing elements of a media delivery system 600 according to an embodiment of the present invention. It should be appreciated that sender 100, packets selector 53, error corrector 54, and receiver 300 operate in a manner similar to that described above in accordance with FIG. 5.
  • In one embodiment, sender 100 of media delivery system 600 operates as an EC transcoder, whereby sender 100 can change to EC at the mid-network node if network transmission conditions change, e.g., conditions at link 32.
  • In one embodiment, sender 100 operating as an EC transcoder receives a set of K packets, which includes of A media packets and B EC packets, e.g., K=A+B. Packet selector 53 selects X media packets for transmission, where X is not greater than A. Error corrector 54 adds Y EC packets to produce N packets which are transmitted, which includes X media packets plus Y EC packets, e.g., N=X+Y. It should be appreciated that N may be chosen to be greater than, equal to, or less than K. Similarly, it should be appreciated that Y may be chosen to be greater than, equal to, or less than B. In one embodiment, N is chosen based on the bandwidth of the channel, and X and Y are chosen to maximize the received quality given a channel packet loss rate.
  • In one embodiment, sender 100 receives a set of media packets and EC packets and discards some of the media packets to make room for additional EC packets. It should be appreciated that all of the original received EC packets may be replaced by a new set of EC packets. In one embodiment, the output N packets of sender 100 is a subset of the received media packets and a completely new set of EC packets, e.g., the received EC packets may be dropped and replaced.
  • For example, sender 100 can change the EC if the packet loss rate was higher then anticipated by the original sender, e.g., the channel is worse then the sender expected. As another example, sender 100 can forward all of the received media packets while replacing the received EC packets by a new set of EC packets that is better matched to the channel. As another example, sender 100 can reduce the number of media packets and discard the received EC packets, thereby making room for a new set of EC packets which are better matched to the channel.
  • In one embodiment, where instance of media content 22 was produced by another device in accordance with the described embodiments, e.g. another sender 100, a set of media packets and associated EC packets are received. In one embodiment, the associated importance for the set of media packets is also received. A second set of media packets and EC packets is generated. For instance, all of the media packets may be retained and an increased number of EC packets generated, if bandwidth is sufficient. In another example, the number of media packets may be reduced, thereby making additional room used for transmitting additional EC packets.
  • In summary, embodiments in accordance with the present invention provide a data protection strategy that can be employed when a “protect all” approach is not a viable alternative. According to these embodiments, a subset of data (e.g., media data) is protected by first “discarding” another subset of the data. The subset of data to send and protect can be selected based on knowledge of the relative importance of the media packets, which in turn may be based on the impact of each media packet on the quality of the delivered media. More specifically, the number of media packets to be transmitted is reduced to make room for additional error correction packets, providing increased protection for the portion of the data that is considered to be more important. While it may appear counterintuitive to intentionally introduce data packet losses into media delivery, by appropriately selecting which media packets to remove from the output stream and which media packets to send and protect, the quality of the delivered media can be maintained or increased. In particular, by explicitly removing data from transmission, additional room for error correction is gained, which is then used to provide improved protection for the more important remaining data.
  • Embodiments in accordance with the present invention are useful for data that is pre-encoded and stored (e.g., video on demand), as well as for data that is being encoded in real time. Embodiments in accordance with the present invention are particularly useful when the data is pre-encoded and stored, because in such a situation the data may be encoded for a given packet delivery rate, and it may not be possible for the transmitting device to re-encode the data at a different packet delivery rate in order to satisfy a bandwidth constraint or to provide the necessary room for a sufficient number of error correction packets to be sent.
  • Although the discussion herein used media data as an example, as mentioned above, embodiments in accordance with the present invention are generally applicable to different types of data.
  • Various embodiments of the present invention are thus described. While the present invention has been described in particular embodiments, it should be appreciated that the present invention should not be construed as limited by such embodiments, but rather construed according to the following claims.

Claims (20)

1. A method of processing data packets, said method comprising:
accessing a plurality of first data packets comprising hierarchically encoded data;
identifying a first number of said first data packets as candidate data packets to be potentially transmitted to a receiver over a period of time, wherein said identifying said first number is based at least in part on said hierarchically encoded data of said plurality of first data packets; and
reducing said first number of candidate data packets so that a second number of second data packets comprising error correction information for selected said candidate data packets is increased, wherein candidate data packets removed in order to reduce said first number are not sent to said receiver during said period of time and are removed based at least in part of said hierarchically encoded data of said plurality of first data packets.
2. The method of claim 1 wherein said hierarchically encoded data is encoded using MPEG and comprises I-frame data packets, P-frame data packets and B-frame data packets, said reducing said first number of candidate data packets comprising:
evaluating said B-frame data packets as said candidate data packets;
provided said evaluating said B-frame data packets does not reduce said first number sufficiently, evaluating said P-frame data packets as said candidate data packets; and
provided said evaluating said P-frame data packets does not reduce said first number sufficiently, evaluating said I-frame data packets as said candidate data packets.
3. The method of claim 1 wherein said hierarchically encoded data comprises scalably coded data comprising a base layer data packets and enhancement layer data packets, said reducing said first number of candidate data packets comprising:
evaluating said enhancement layer data packets as said candidate data packets; and
provided said evaluating said enhancement layer data packets does not reduce said first number sufficiently, evaluating said base layer data packets as said candidate data packets.
4. The method of claim 3 wherein said scalably coded data is selected from a list consisting essentially of: scalably coded video data, scalably coded audio data, scalably coded speech data, scalably coded graphics data, and scalably coded image data.
5. The method of claim 1 wherein said reducing said first number of candidate data packets comprises:
reducing said first number of candidate packets based at least in part on evaluating packet importance information for said plurality of first data packets.
6. The method of claim 1 wherein said second data packets comprises error correction information for a portion of said plurality of first data packets sent to said receiver.
7. The method of claim 1 wherein said reducing said first number of candidate data packets comprises:
reducing said first number of candidate data packets such that said first number of candidate data packets and said second number of second data packets satisfy transmission bandwidth constraints.
8. The method of claim 1 further comprising:
discarding candidate data packets in order to reduce said first number; and
increasing said second number by a corresponding amount, wherein said discarding and increasing are performed until there are enough of said second data packets to compensate for a data packet loss rate.
9. The method of claim 1 wherein said plurality of first data packets comprises first subset data packets comprising said hierarchically encoded data and second subset data packets comprising error correction information for said first subset data packets.
10. The method of claim 9 further comprising:
selectively reducing said second subset data packets so that said second number of second data packets comprising error correction information for selected said candidate data packets is increased.
11. A computer-usable medium having computer-readable code stored thereon for causing a device to perform a method of processing data packets, said method comprising:
accessing a set of first data packets comprising data to be potentially included in an output stream, said first data packets comprising importance information;
applying an error correcting technique to one or more first data packets in said set to produce second data packets comprising error correction information; and
iteratively removing selected first data packets from said set based at least in part on said importance information until a number of first data packets in said set and a number of said second data packets is less than or equal to a specified limit, wherein said selected first data packets are not included in said output stream.
12. The computer-usable medium of claim 11 wherein said first data packets are encoded using MPEG and comprises I-frame data packets, P-frame data packets and B-frame data packets, wherein said importance information comprises coding information identifying said I-frame data packets, said P-frame data packets and said B-frame data packets, said iteratively removing selected first data packets comprising:
iteratively removing selected B-frames data packets from said set;
provided said number of first data packets in said set and said number of said second data packets in said set is greater than said specified limit, iteratively removing selected P-frames data packets from said set; and
provided said number of first data packets in said set and said number of said second data packets in said set is greater than said specified limit, iteratively removing selected I-frames data packets from said set.
13. The computer-usable medium of claim 12 wherein said first data packets comprises scalably coded data comprising a base layer data packets and enhancement layer data packets, wherein said importance information comprises coding information identifying said base layer data packets and said enhancement layer data packets, said iteratively removing selected first data packets comprising:
iteratively removing selected enhancement layer data packets from said set; and
provided said number of first data packets in said set and said number of said second data packets in said set is greater than said specified limit, iteratively removing selected base layer data packets from said set.
14. The computer-usable medium of claim 13 wherein said scalably coded data is selected from a list consisting essentially of: scalably coded video data, scalably coded audio data, scalably coded speech data, scalably coded graphics data, and scalably coded image data.
15. The computer-usable medium of claim 11 wherein said method further comprises:
discarding said selected first data packets from said set to reduce said first number by an amount; and
increasing said second number by said amount, wherein said discarding and increasing are performed until there are enough of said second data packets to compensate for a data packet loss rate.
16. A device for processing data packets, said device comprising:
a transmitter operable for transmitting hierarchically encoded data over a link between said device and a receiving device, said link having a bandwidth;
a memory coupled to said transmitter and operable for storing a plurality of first data packets comprising said hierarchically encoded data; and
a processor coupled to said memory and operable for processing said first data packets, said processor for selecting a first number of said first data packets as candidate data packets to be potentially transmitted via said link and then reducing said first number of candidate data packets so that a second number of second data packets comprising error correction information for selected said candidate data packets can be increased, wherein said selecting and reducing are based at least in part on said hierarchically encoded data, wherein said first number plus said second number is constrained by a limit corresponding to said bandwidth;
wherein candidate data packets that are removed by said reducing are not transmitted via said link.
17. The device of claim 16 wherein said hierarchically encoded data is encoded using MPEG and comprises I-frames, P-frames and B-frames, wherein said processor is for reducing said first number of candidate data packets by evaluating said B-frames as said candidate data packets, evaluating said P-frames as said candidate data packets if said evaluating said B-frames does not reduce said first number sufficiently, and evaluating said I-frames as said candidate data packets if said evaluating said P-frames does not reduce said first number sufficiently.
18. The device of claim 16 wherein said hierarchically encoded data comprises scalably coded data comprising a base layer and at least one enhancement layer, wherein said processor is for reducing said first number of candidate data packets by evaluating said enhancement layer as said candidate data packets, and evaluating said base layer as said candidate data packets if said evaluating said enhancement layer does not reduce said first number sufficiently.
19. The device of claim 18 wherein said scalably coded data is selected from a list consisting essentially of: scalably coded video data, scalably coded audio data, scalably coded speech data, scalably coded graphics data, and scalably coded image data.
20. The device of claim 16 wherein said plurality of first data packets comprises first subset data packets comprising said hierarchically encoded data and second subset data packets comprising error correction information for said first subset data packets, and wherein said processor is for selectively reducing said second subset data packets so that said second number of second data packets comprising error correction information for selected said candidate data packets is increased.
US11/880,302 2006-07-28 2007-07-20 Data packet processing Abandoned US20080025206A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US11/880,302 US20080025206A1 (en) 2006-07-28 2007-07-20 Data packet processing

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US11/494,930 US8045467B2 (en) 2006-07-28 2006-07-28 Reducing a number of data packets to increase a number of error correcting packets
US11/880,302 US20080025206A1 (en) 2006-07-28 2007-07-20 Data packet processing

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US11/494,930 Continuation-In-Part US8045467B2 (en) 2006-07-28 2006-07-28 Reducing a number of data packets to increase a number of error correcting packets

Publications (1)

Publication Number Publication Date
US20080025206A1 true US20080025206A1 (en) 2008-01-31

Family

ID=38896798

Family Applications (2)

Application Number Title Priority Date Filing Date
US11/494,930 Expired - Fee Related US8045467B2 (en) 2006-07-28 2006-07-28 Reducing a number of data packets to increase a number of error correcting packets
US11/880,302 Abandoned US20080025206A1 (en) 2006-07-28 2007-07-20 Data packet processing

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US11/494,930 Expired - Fee Related US8045467B2 (en) 2006-07-28 2006-07-28 Reducing a number of data packets to increase a number of error correcting packets

Country Status (6)

Country Link
US (2) US8045467B2 (en)
EP (1) EP2047623A2 (en)
JP (1) JP2009545238A (en)
KR (1) KR101286419B1 (en)
CN (1) CN101517950A (en)
WO (1) WO2008013906A2 (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120121014A1 (en) * 2009-03-04 2012-05-17 Thomas Rusert Processing of Multimedia Data
JP2012169845A (en) * 2011-02-14 2012-09-06 Hitachi Kokusai Electric Inc Wireless device
CN104216341A (en) * 2013-05-31 2014-12-17 中国石油化工股份有限公司 Reservoir production real-time optimization method based on improved random disturbance approximation algorithm
WO2016122745A1 (en) 2015-01-30 2016-08-04 Huawei Technologies Co., Ltd. System and method for real time video communication employing fountain coding
US9451248B2 (en) 2011-09-28 2016-09-20 Panasonic Intellectual Property Management Co., Ltd. Data processing device and data processing method
US20170329207A1 (en) * 2015-01-23 2017-11-16 Hewlett-Packard Development Company, L.P. Tracking a handheld device on surfaces with optical patterns
EP4184829A4 (en) * 2020-07-14 2023-08-02 Huawei Technologies Co., Ltd. Data transmission method, sending device, and receiving device

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102279419B (en) * 2010-06-12 2013-06-26 中国石油化工股份有限公司 Genetic algorithm-based method for improving automatic history matching efficiency for fracture-cave type oil reservoir

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5243428A (en) * 1991-01-29 1993-09-07 North American Philips Corporation Method and apparatus for concealing errors in a digital television
US6412013B1 (en) * 1998-10-23 2002-06-25 Koninklijke Philips Electronics N.V. System for controlling data output to a network
US20050013249A1 (en) * 2003-07-14 2005-01-20 Hao-Song Kong Redundant packets for streaming video protection
US7852853B1 (en) * 2006-02-07 2010-12-14 Nextel Communications Inc. System and method for transmitting video information

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH07327026A (en) * 1994-05-31 1995-12-12 Sony Corp Digital transmission system
JP2000228676A (en) * 1998-11-30 2000-08-15 Matsushita Electric Ind Co Ltd Data transmission method
KR100341823B1 (en) 2000-02-21 2002-06-26 윤덕용 Method for controlling the threshold of the bit error probability of each packet in wired and wireless video communication systems
JP2003152752A (en) 2001-08-29 2003-05-23 Matsushita Electric Ind Co Ltd Data transmission/reception method
WO2006103724A1 (en) * 2005-03-25 2006-10-05 Fujitsu Limited Packet distribution band control method, distribution device, and video distribution system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5243428A (en) * 1991-01-29 1993-09-07 North American Philips Corporation Method and apparatus for concealing errors in a digital television
US6412013B1 (en) * 1998-10-23 2002-06-25 Koninklijke Philips Electronics N.V. System for controlling data output to a network
US20050013249A1 (en) * 2003-07-14 2005-01-20 Hao-Song Kong Redundant packets for streaming video protection
US7852853B1 (en) * 2006-02-07 2010-12-14 Nextel Communications Inc. System and method for transmitting video information

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120121014A1 (en) * 2009-03-04 2012-05-17 Thomas Rusert Processing of Multimedia Data
JP2012169845A (en) * 2011-02-14 2012-09-06 Hitachi Kokusai Electric Inc Wireless device
US9451248B2 (en) 2011-09-28 2016-09-20 Panasonic Intellectual Property Management Co., Ltd. Data processing device and data processing method
CN104216341A (en) * 2013-05-31 2014-12-17 中国石油化工股份有限公司 Reservoir production real-time optimization method based on improved random disturbance approximation algorithm
US20170329207A1 (en) * 2015-01-23 2017-11-16 Hewlett-Packard Development Company, L.P. Tracking a handheld device on surfaces with optical patterns
WO2016122745A1 (en) 2015-01-30 2016-08-04 Huawei Technologies Co., Ltd. System and method for real time video communication employing fountain coding
US9544757B2 (en) 2015-01-30 2017-01-10 Huawei Technologies Co., Ltd. System and method for real time video communication employing fountain coding
CN107210843A (en) * 2015-01-30 2017-09-26 华为技术有限公司 Use the system and method for the live video communication of fountain coding
EP3257177A4 (en) * 2015-01-30 2018-08-01 Huawei Technologies Co., Ltd. System and method for real time video communication employing fountain coding
EP4184829A4 (en) * 2020-07-14 2023-08-02 Huawei Technologies Co., Ltd. Data transmission method, sending device, and receiving device

Also Published As

Publication number Publication date
CN101517950A (en) 2009-08-26
EP2047623A2 (en) 2009-04-15
KR20090035718A (en) 2009-04-10
US20080025220A1 (en) 2008-01-31
JP2009545238A (en) 2009-12-17
US8045467B2 (en) 2011-10-25
WO2008013906A2 (en) 2008-01-31
WO2008013906A3 (en) 2008-03-27
KR101286419B1 (en) 2013-08-23

Similar Documents

Publication Publication Date Title
KR101125846B1 (en) Method for transmitting image frame data based on packet system and apparatus thereof
US20080025206A1 (en) Data packet processing
JP4980567B2 (en) Multimedia server with simple adaptation to dynamic network loss conditions
US20050013249A1 (en) Redundant packets for streaming video protection
US8432963B2 (en) Method for encoding signals, related system and program product
KR20080106357A (en) Method for protecting multimedia data using additional network abstraction layers (nal)
US8484540B2 (en) Data transmitting device, control method therefor, and program
Cote et al. Error resilience coding
Hussain et al. Adaptive video-aware forward error correction code allocation for reliable video transmission
JP2008546338A (en) Video coding
KR101259659B1 (en) A priority-differential non-uniform raptor coding method
Chang et al. Unequal-protected LT code for layered video streaming
Weng et al. Sliding‐window forward error correction using Reed‐Solomon code and unequal error protection for real‐time streaming video
Shih Enhancing packet-level forward error correction for streaming video in wireless networks
Cai et al. Error-resilient unequal protection of fine granularity scalable video bitstreams
Huang et al. A joint packet selection/omission and FEC system for streaming video
KR20080052043A (en) Method and apparatus for streaming av data
JP6415302B2 (en) COMMUNICATION DEVICE, COMMUNICATION METHOD, AND PROGRAM
Nazir et al. Rate adaptive selective segment assignment for reliable wireless video transmission
Lay et al. Unequally protected packet transmission of SPIHT-compressed images
Huang et al. Making packet erasures to improve quality of FEC-protected video
JP6412741B2 (en) COMMUNICATION DEVICE, COMMUNICATION METHOD, AND PROGRAM
Ha et al. Packet-level layer-based interleaving unequal forward error correction (LIU-FEC) for robust wireless scalable video transmission
Nazir et al. Research Article Rate Adaptive Selective Segment Assignment for Reliable Wireless Video Transmission
Siruvuri et al. Adaptive error resilience for video streaming

Legal Events

Date Code Title Description
AS Assignment

Owner name: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P., TEXAS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:HUANG, YING-ZONG;APOSTOLOPOULOS, JOHN G.;REEL/FRAME:019644/0418;SIGNING DATES FROM 20070718 TO 20070719

STCB Information on status: application discontinuation

Free format text: ABANDONED -- AFTER EXAMINER'S ANSWER OR BOARD OF APPEALS DECISION