3.1. MSVPC Network Design
The set of nodes as N devices and S sensors formed in a network and the channels that connect those nodes wirelessly have been represented as
. Moreover, 5G mobile communication is created by establishing the hierarchical cellular connection among the cellular devices, access point
, internet gateway
, and internet server
are shown in
Figure 1. At the beginning of the network
broadcasts its presence at regular intervals as
. Also, the set of video data packets are accessed by the nodes known as
.
The aggregator node
will continue to announce its presence on the network through its broadcast message. The network includes user devices and sensors. The sensors in the network sense the quality of the network and provide information about it. It realizes and shares information about the number of videos traveling on the network, bandwidth usage, transfer rate, information about the network port on which it travels and metadata about the video. If the sensor receives the
message, it will update the aggregator ID immediately if the message has not been received before, or if it is already connected to an
, it will estimate the distance
between the new
and the previous
and upgrade the shortest-distance aggregator so as to communicate. The sensor then sends the link message to the
, which receives the message and stores the information of the sensors that sent reply message through the link. The
is calculated according to the Pythagorean theorem, where, the location of the sensor and user is termed as (
,
), and aggregator location is (
X2,
) and then, distance
between these two products are computed as per the following equation.
The network is interconnected with a data-based network architecture, which we use to set names for source-to-destination navigation and to determine the name by individual group to respond to device packets. After creating the names, the data-based network configuration will publish it, and then, the connected devices will have to subscribe to it, thus assigning an address to each device as . This address is known as the domain name of the network and the connection ID. It is used to decide which node the data should be transmitted to during the process of providing a IP address to each node. As a result, each device and sensor on the network is assigned an IP address, which is then utilized to detect device connections inside the network.
The actuators will continue to broadcast their presence at regular intervals with the (,) location. Packets can quickly reach the destination by setting the status of the packets that arrive on the network so that the path can finalize according to the status. If the message is received by an or user, they will update the actuator’s information along with actuator and location points If the user device is connected to the actuator, the actuator will generate an ID for the user and notify the device, and update it to the actuator’s user list. Thus, when the actuator generates an ID for the device, it checks if it already has a address, and then generates the ID using a random number between (0–1). Once the device receives and updates the ID, it creates a secure connection with the actuator, thereby establishing security within the network.
To create such a secure connection, the device will change its password
and its ID using
mode, it then shares the security provisioning information with the actuator during the time of communication so that the actuator will retrieve the original password
and ID attached to it then authorize the transaction if it is valid, besides it enables the final authorization to add the user to the network’s link list as per the equation below.
When requesting a video description along with its location (,) by a node, the details of the node ID, its authorized , its subscription information, and the location of the node are all attached for identification. When this information is verified, the device is checked for access control according to the and its valid subscription particulars, and the virtual infrastructure system is activated. This virtual infrastructure system manages the different situations in the network and manages its processing and storage properly. Access control for each node is attached to the virtual infrastructure activated after validating several steps, such as the following monitoring steps: the first step is whether it is properly connected to the network or not, and the second step is whether it has received a connection ID, and is the a suitable for it, all of these need to be verified.
If the receives the virtual infrastructure activation information, it will update the sensor counts and calculate their distance It then sends information about short-range sensors request to storage . The intermediator will select and send the appropriate video traffic ID upon receipt of that information, and updates the information about those sensors.
If the video is not available, then the actuator requests the internet server for the video and sends it to the user. Similarly, the internet server also sends the information about the sensor to the user. According to the report of the sensor, the user device starts streaming the video or stopping the video. The 5G network enables a nested data group system between the movable nodes; it forces to manage those types of groups properly.
Sometimes the network has to handle large amounts of data. The load balancer running on the network balances the data and converts it to the virtual network. There, the videos will be distributed to individual users or individual groups for a limited time. Thus, the distributed videos are arranged in a separate layer with a scalable code number. In the first layer, data can be sent individually based on network status and streamed with smaller data bits. In the top layer, high-quality videos are streamlined and integrated. All of these methods work according to the function of the network.
Once these videos reach the video optimizer, it will update the nodes in the cache about the sent node information so that it can know the demands on the network along with the specific file ID
If the destination node ID is not connected, the information will be sent to resource allocator
to obtain the destination ID, otherwise it will be sent to the monitor node to obtain the current status of the network. Later, it will transferred to the storage, and the total packet bytes count of the video will be attached as shown in
Figure 2. The monitoring node stores the sensor’s information and uses it to regulate the channels through which data packets travel, thus storing more data on the storage device
. The cached
video size
which is less than the storage capacity and the streaming duration noted as
, have been used to compute the cached video. Also, we can compute the total server storage size as
.
Part of the information is stored on the local network, and some high-quality videos are stored on the main server. It depends on the needs and functionality of the network. Similarly, the data layer in the network must be integrated with all parents. The cache information of the node is transferred to the virtual network optimizer. If it does not contain MPEG information it will be saved anew. If it is not already listed in the received data, it will be stored in the optimization layer as shown in
Figure 3.
The encryption process is activated after the frame ID and MEPEG data are added to the optimizer stack, which then sends it to the identification code. Furthermore, the load balancer is activated and the information is processed in a properly balanced manner, which ensures that there is no reflection of the data and it is integrated in the correct layer as shown in
Figure 4. Otherwise, the optimizer will remove the content from the layer.
Scanner nodes, which are registered on the network, store the data that the sensors record when their sensors change location. The cache node stores the information in the scanner node and the source registry. When data are collected from multiple locations at different levels, the data stored at the scanner terminal are used to detect connections between data using certain rules. This type of data verification allows you to immediately notify the network of changes in the network’s infrastructure. It runs from the beginning of the network, which is powered by resource register software running on the network. It monitors the performance of the hardware on the network and the services running on it. It monitors whether the data transfer is active or the connected storage is running.
3.2. Adaptive Video Streaming
Each particle
will bring some possible solutions with current and previous experiences. A network has a limited number of particle swarms
within its boundaries. Its moving speed
at a time
and its ideal resting location
are calculated as per the below mentioned Equation (5)
Here,
and
have explained the continuous transmission speed variations and nodes moving variations inside the network,
is the tuning parameter of the speed,
is the last resting location during the mobility and
is the local best resting location among the set of selected locations with coverage area
. At this point, the
is computed as per Equation (6), later updates the current
as the last
and updates new one to obtain the movement points and also the movement speed
at the time obtained from the maximum and minimum speeds of the particle.
Here
is the lowest boundary of the resting location. The travelling delay
has been computed from the summation of packet buffering delay
and transmission channel propagation delay
, and due to the transmission and because of the wireless nature, the packet transmission error
can occur, the error difference
is also calculated. The last transmission packet is
and the current transmission packets is
respectively.
should be minimum level than the error difference threshold of
,
All these computations should be done before the packet expiry time along with the network state. These metrics provide the best quality of service in the network. Multiple benchmark decisions have been considered during the video transmission period to handle the storage and user query as shown in
Figure 4.
Design considerations:
- ▪
Analyse packet expiry computations before and after;
- ▪
Reduce the data packets loss;
- ▪
To reduce the error rate of the transmission computed;
- ▪
Links are congested, causing packet buffer overflow at the networking device;
- ▪
Network reachability status changes causing certain packets to become destination unreachable and be dropped. The variations of the packet drop are shown in
Table 1.
The above
Table 2 shows the quality of the transmission according to the packet loss percentage. Occasionally there will be several changes in the aims mentioned above. It can be calculated as follows. It is necessary to find the optimal position.
When a lot of metrics of this type are available, they are all stored in a matrix format in which the optimal solution is calculated. When different videos are transferred, many limitations occur. Similarly, many different functions
occur during transmission, so it is important to find transmissions with minimal variations. This will help us to find the optimal transmissions. Thus, we calculate the transmission rate of optimal video streaming.
When videos are transmitted through different channels
, it is calculated as follows. Here
is the video travelling speed and
is the maximum video error rate.
The delay for all channels and the error rate of the arrival packets
are calculated as below. The delay variations and its performance given in
Table 3 and
Table 4.
Table 3 and
Table 4 shows the delay performance according to the protocol based on speed variations. Thus, we can detect the video that is being streamed
in a very short time.
According to this, we can find the perfect video streaming frequency
is as below:
By achieving minimum packet transmission delay and reduced packet error difference the video transmission gains higher video streaming frequency (Algorithm 1). Then, we form the global fitness
path to transfer the video packets.
Algorithm 1 Optimal Video Streaming Steps |
Created 5G Multicast routing network Deploy SDN enabled devices Compute the Storage device size and cached Video size =
Initiate particle swarm with nodes Update swarm random locations , Speed of particles, at time Compute resting location of swarm Repeat the process till end of the communication Update variations of Compute data transmission error and traveling delay Combination of delay and arrival packet error difference computed using T∑ Computed perfect video streaming in network by Find local PSO best forwarder for multicast routing within coverage range Construct final global fitness path for transmission
|
During transmission the network initiates the group formation on the primary server. If the internet server cannot be accessed directly, users will join the multicast group; information about the group ID will be given to all users in the group; later, according to the calculation, the node acts as a head in that local group, and is extended up to the destination by selecting the global best nodes throughout the path. The network paves its continuity path, and all users joining the group will be added to the multicast member list. This allows short interparticle distance nodes to act as forwarders and stream video as shown in
Figure 5.
The physical 5G communication is configured in the physical medium using the 256 QAM Modulation and Beamforming. The software-defined network SDN is used to virtualize the network function by utilizing the virtual network. Multicast communication between the users and the server is generated by forming the multicast tree in the network layer as IP multicast, as shown in
Figure 6. The multicast users can join and leave in the multicast group and the corresponding tree is updated dynamically. Once the IP multicast is created, the data center is used to encode the video to be streamed to all multicast users as in
Figure 6.
Descriptions are distributed across the multicast tree, during the video transmission. IP multicast minimizes the unnecessary transmission of replicated packets in the network. Data centre-based video multicast servers are represented as description providers which exhibit the packet in multicast IP containing information about its description which is forwarded to the controller. The transmission is completed using the SDN which also monitors and optimizes the video transmission. The video optimizer service is deployed on the edge of the 5G network with video traffic filtering. The video traffic is forwarded from a load balancer to the optimizer virtual network which handles the management plane as an efficient assignment of IP addresses to active users of the infrastructure. Also, the cognitive framework continuously quantifies the congestion degree of the network at a fine-grain level using the congestion index. When the congestion index surpasses the threshold, then it is processed by the cognitive layer leading to the application of the filtering rule in the associated virtual network.