You are on page 1of 9

KOLEJ POLY-TECH MARA

KAMPUS CAWANGAN IPOH

ASSIGNMENT : 2 – Topic 3 and 4

NAME : 1.NIK AHMAD FAIQ BIN NIK MAHMOOD FARID


2.MUHAMMAD NUR HAKIMI BIN MOHAMMAD TAHIR
CLASS : DIM0306

SUBJECT CODE : TNW 2143

SUBJECT NAME : MULTIMEDIA NETWORKING

This is a group of 2 assignment. Read carefully the case study below.

In this assignment student need to identify and elaborate methodology of network


technologies and multimedia features and performances. The critical issues of network
such as Performance which can be measured in many ways, including transit time and
response time.Reliability is measured frequency of failure, the time it takes a link to recover
from a failure, and the network’s robustness in a catastrophe and Security include to protect
from unauthorized user and viruses.

1) You need to identify how to control packet loss by using :

- FEC : Forward Error Correction


- CDN : Content Distribution Network
- Interleaving

Explain how its works including the diagram.

2) Identify the function of ping. Please attach the picture that you have ping any url or ip
address in command prompt. Explain the information/statistics network performance
will appear in screen of cmd.

3) There is TWO types of error rates which is Single Bit error and Burst Error. Explain
each of it. Find the pictures or any sources that support you explanation.

4) Differentiate Lossy and Losses(including the pictures and you need to explain it)

Important :Formatting (12pt ,Arial, Justify)

Format to attach the references:

Ku, G. (2008). Learning to de-escalate: The effects of regret in


escalation of commitment. Organizational Behavior and Human Decision
Processes, 105(2), 221-232. doi:10.1016/j.obhdp.2007.08.002

1) You need to identify how to control packet loss by using :


- FEC : Forward Error Correction
- CDN : Content Distribution Network
- Interleaving
Explain how its works including the diagram.

According to https://www.electronicdesign.com/communications/use-forward-
error-correction-improve-data-communications

FEC : Forward Error Correction

The FEC (Forward Error Correction) is one of the error recovery technique
that can reduce the effect of packet loss with the low latency.FEC technique
adds some redundancy that increases bandwidth usage. The FEC based
algorithm can change the quantity of audio redundancy based on the number
of packet lost. The performance of the media specific FEC based algorithm
can be improved by increasing the number of combination. FEC is a
technique that is well known for its ability to correct bit errors rate at physical-
layer. FEC has been more commonly suggested for real time application. In
addition to these, this technology can also be adapted to operate on packets
at the network layer to improve application performance across network.

Packet loss occurs when one or more packets traveling across a network fail
to reach their destination. Packet loss can be caused by a number of factors
that inevitably result in highly noticeable performance issues, particularly with
realtime protocols, streaming technologies, voice-over-IP, online gaming, and
video conferencing. Some network transport protocols, such as TCP, provide
for reliable delivery of packets. In the event of packet loss, the receiver might
ask for retransmission, or the sender automatically resends any segments
that have not been acknowledged. Although TCP can recover from packet
loss, retransmitting missing packets causes the overall throughput of the
connection to decrease. Error correction occurs without the need for a reverse
channel to request retransmission of data, but at the cost of a fixed, higher
forward channel bandwidth. Therefore, FEC is most useful in situations where
retransmissions are costly or impossible.
According to https://www.keycdn.com/support/7-reasons-you-should-use-a-
content-distribution-network

CDN : Content Distribution Network

A CDN (Content Distribution Network) also known as a content delivery


network.It is a large, geographically distributed network of specialized servers
that accelerate the delivery of web content and rich media to internet-
connected devices. The world's largest content distribution network, spans
more than 216,000 servers in over 120 countries and within more than 1,500
networks around the world.

Solution: replicate content at hundreds of servers throughout internet:-


 Content downloaded to CDN servers ahead of time
 Placing content “close” to user avoids impairments (loss, delay) of sending
content over long paths
 CDN server typically in edge/access network

Content Replication:-
 CDN example Akamai customer is the content provider CNN
 CDN replicates customers’ content in CDN servers. When provider updates
content, CDN updates servers
According to https://www.techopedia.com/definition/5683/interleaving

Interleaving

Interleaving divides memory into small chunks. It is used as a high-level


technique to solve memory issues for motherboards and chips. By increasing
bandwidth so data can access chunks of memory, the overall performance of
the processor and system increases. This is because the processor can fetch
and send more data to and from memory in the same amount of time.

Chunks are broken up into smaller units. For example, 4 or 5 millisecond units
per chunk. Packet contains small units from different chunks. If packet is lost,
still have most of every chunk. It has no redundancy overhead but adds to
playout delay.
2)Identify the function of ping. Please attach the picture that you have ping any url or
ip address in command prompt. Explain the information/statistics network
performance will appear in screen of cmd.

Function Of Ping
Ping is a basic Internet program that allows a user to verify that a particular IP
address exists and can accept requests. Ping is used diagnostically to ensure
that a host computer the user is trying to reach is actually operating. Ping
works by sending an Internet Control Message Protocol (ICMP) Echo Request
to a specified interface on the network and waiting for a reply. Ping can be
used for troubleshooting to test connectivity and determine response time.

(taken from https://searchnetworking.techtarget.com/definition/ping)


Ping URL or IP Address in Command Prompt

URL
 “Pinging e16356.I.akamaiedge.net [23.199.155.110]” Ping only knows how to
communicate with IP addresses, so the first thing it did when we asked it to ping
“e16356.I.akamaiedge.net” was to look up the corresponding IP address. This is
one of the quickest ways we know to determine the IP address associated with a
domain. Also, if this look-up fails, you’ll know there’s a typo in the domain name,
or the domain name look-up (DNS) is failing for some reason.
 “Reply from 23.199.155.110” This tells us that the remote server at that IP
address replied. What that means, though, is that the entire route across the
internet, from your machine through routers and switches and networking
equipment and whatever else, worked, as did the return path carrying the
server’s reply. If this fails, (“timed out”) then something along the connection
between you and the server might be broken, the server might be offline, or the
server might not even exist. It’s also possible the server is explicitly configured
not to respond to ping requests.
 “time=88ms” This is the round trip time: the time between sending “Are you
there?” and receiving “Yes I am!”. In this case, it took 88 milliseconds. Since the
ping is repeated several times, you can see that this time is not consistent, which
is not good. The time varies depending on many factors, including how close you
are to the remote server, how many routers and other networking equipment are
between you and that server, and more.
 “Sent = 4, Received = 3, Lost = 1” One of the things TCP/IP is designed to
deal with is packet loss. Ideally, every packet you send should get to where it’s
going, but for various reasons, that doesn’t always happen. As long as the
packets can get there after a retry or two, in normal usage you’d never notice.
Ping sends multiple packets and reports specifically on the success rate, so you
can see if a particular connection is prone to packet loss.From the ping there is 1
lost packet data.
 “Approximate round trip times” While on average the same kind of packet
sent to the same destination should take roughly the same amount of time, that’s
also not always the case. Some packets take longer than others, for reasons as
diverse as the equipment involved and paths followed. Ping reports these
statistics so you can see if a particular connection is prone to this type of
problem.
3)There is TWO types of error rates which is Single Bit error and Burst Error. Explain
each of it. Find the pictures or any sources that support you explanation.

Single Bit Error

As name suggest single-bit errors occur when a single bit gets changed
during transmission of data due to interference in network communication.The
term single bit error means that only one bit of a given data
unit (such as byte character/data unit or packet) is changed from 1 to 0 or
from 0 to 1.

Burst Error

When more than a single bit of data unit gets corrupted it is known as Burst
error.In comparison of single-bit errors, burst errors are more likely to occur.
Because as we know that the duration of noise is generally longer than the
duration of transferring 1bit, that means with longer duration noise can corrupt
more than 1 bit easily. Number of bit affected depends on the data rate and
duration of noise.Means that 2 or more bits in the data unit have changed
from 1 to 0 or from 0 to 1.

(taken from https://thetechnokrat.wordpress.com/2013/12/08/single-bit-error-


and-burst-error/)
4)Differentiate Lossy and Losses(including the pictures and you need to explain it)

According to http://www.ques10.com/p/4755/difference-between-lossless-
compression-and-loss-1/

LOSSY LOSSES

The technique involves some Involves no loss of information.


loss of information.
Data that has been (lossy) If data has been (lossless)
compressed using this compressed, the original data
technique can’t be recovered can be recovered from the
and reconstructed exactly. compressed data.
Used for application that can Used for application that can’t
tolerate difference between the tolerate any difference
original and reconstructed between original and
data. reconstructed data.
In return for accepting this No loss in information so
distortion in reconstructed data compression rate is small.
we obtain high compression
rate
Distortion Distortion less
REFERENCE:-

 https://www.callstats.io/blog/2016/11/09/how-to-recover-lost-media-
packets-in-webrtc-with-fec
 https://searchnetworking.techtarget.com/tutorial/What-is-CDN-technology-
and-who-are-the-current-CDN-providers
 http://www.rroij.com/open-access/using-interleaving-techniques-with-
fecmechanisms-to-deal-with-burst-errors.php?aid=48662
 https://www.computerhope.com/jargon/p/ping.htm
 https://blog.online-convert.com/the-differences-between-lossless-and-
lossy-compression/

You might also like