Robust Data Compression of Network Packets
نویسندگان
چکیده
This paper describes an approach for compressing data packets that enables inter-packet compression without the drawback of multiplying the effect of packet loss. By adding an acknowledgment scheme, the sender can limit the history state used by the compression algorithm to those packets that have been correctly received. A vector identifying the packets used as history is included in the compressed packet, enabling the receiver to reconstruct the history state required to decompress the packet. This approach improves the compression achieved compared to stateless schemes, while retaining robustness in the face of packet loss or reordering. The paper reports several simulation experiments using our approach. We first describe an implementation based on the publicly available zlib implementation of the popular deflate compression format. We then describe the implementation of a Lempel-Ziv ’77 variant called thwack that is more efficient at handling the unpredictable history state used to compress and decompress packets. Introduction We are interested in improving the performance of packet networks. When available computational resources are large compared to the network bandwidth, it can be beneficial to compress data packets before transmitting them. We must consider both the speed of a compression algorithm and its ability to compress. Too slow an algorithm may reduce performance, while insufficient compression limits any potential gain. As an additional complication, many networks are unreliable -they drop or reorder packets. The Internet is an example of such a network. If compression introduces dependencies between packets, it may be impossible for the receiver to decompress a packet when a previous packet is lost. Existing solutions to this problem include: 1) Make the network reliable. Even unreliable networks typically provide a reliable endto-end transport service; on the Internet TCP is such a service. Compressing packets at the transport level is feasible, but must be applied end-to-end, and often requires cooperation by the application. Also, this approach is not appropriate for transparent compression over a link in the middle of the network, a case in which we are interested. 2) Stateless compression: Compress each packet independently. Since each packet is independent, it can be always be decompressed by the receiver. Unfortunately this independence fundamentally interferes with the effectiveness of compression. Compression is achieved by finding the commonality of between various parts of the data and exploiting this commonality to send less information. Stateless compression only examines the data in a single packet, which reduces the compression ratio. In particular,
منابع مشابه
Optimization of Energy Consumption in Image Transmission in Wireless Sensor Networks (WSNs) using a Hybrid Method
In wireless sensor networks (WSNs), sensor nodes have limited resources with regard to computation, storage, communication bandwidth, and the most important of all, energy supply. In addition, in many applications of sensor networks, we need to send images to a sink node. Therefore, we have to use methods for sending images in which the number and volume of packets are optim...
متن کاملA Suitable Coding Scheme for Broadband Power-line Communication
This paper introduces three coding strategies for using the Luby Transform (LT) code in a relay aided power-line communication scheme. In the first method, the relay decodes the received packets and re-encodes them for transmission towards the destination. In the second method, the relay only forwardes a random linear combination of its received packets towards the destination, while in the thi...
متن کاملFeature Extraction to Identify Network Traffic with Considering Packet Loss Effects
There are huge petitions of network traffic coming from various applications on Internet. In dealing with this volume of network traffic, network management plays a crucial rule. Traffic classification is a basic technique which is used by Internet service providers (ISP) to manage network resources and to guarantee Internet security. In addition, growing bandwidth usage, at one hand, and limit...
متن کاملOptimal Coding Subgraph Selection under Survivability Constraint
Nowadays communication networks have become an essential and inevitable part of human life. Hence, there is an ever-increasing need for expanding bandwidth, decreasing delay and data transfer costs. These needs necessitate the efficient use of network facilities. Network coding is a new paradigm that allows the intermediate nodes in a network to create new packets by combining the packets recei...
متن کاملOptimal Erasure Protection Assignment for Scalable Compressed Data with Small Channel Packets and Short Channel Codewords
This paper is concerned with the efficient transmission of scalable compressed data over lossy communication channels. Recent works have proposed several strategies for assigning optimal code redundancies to elements in a scalable data stream, under the assumption that all elements are encoded onto a common group of network packets. When the size of the data to be encoded becomes large in compa...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2000