Scalable proxy caching of video under storage constraints

被引:46
作者
Miao, ZR [1 ]
Ortega, A [1 ]
机构
[1] Univ So Calif, Integrated Media Syst Ctr, Signal & Image Proc Inst, Dept Elect Engn Syst, Los Angeles, CA 90089 USA
基金
美国国家科学基金会;
关键词
best-effort networks; caching; proxy; quality-of-service networks; selective caching; streaming video;
D O I
10.1109/JSAC.2002.802061
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Proxy caching has been used to speed up web browsing and reduce networking costs. In this paper, we study the extension of proxy caching techniques to streaming video applications. A trivial extension consists of storing complete video sequences in the cache. However, this may not be applicable in situations where the video objects are very large and proxy cache space is limited. We will show that the approaches proposed in this paper (referred to as selective caching), where only a few frames are cached, can also contribute to significant improvements in the overall performance. In particular, we will discuss two network environments for streaming video, namely, quality-of-service (QoS) networks and best-effort networks (Internet). For QoS networks,,the video caching goal is to reduce the network bandwidth costs; for best-effort networks, the goal is to increase the robustness of continuous playback against poor network conditions (such as congestion, delay, and loss). Two different selective caching algorithms (SCQ and SCB) are proposed, one for each network scenario, to increase the relevant overall performance metric in each case, while requiring only a fraction of the video stream to be cached. The main contribution of our work is to provide algorithms that are efficient even when the buffer memory available at the client is limited. These algorithms are also scalable so that when changes in the environment occur it is possible, with low complexity, to modify the allocation of cache space to different video sequences.
引用
收藏
页码:1315 / 1327
页数:13
相关论文
共 28 条
[1]  
ABDULLA G, 1996, P ACM SIGCOMM 96 STA
[2]  
Chankhunthod A, 1996, PROCEEDINGS OF THE USENIX 1996 ANNUAL TECHNICAL CONFERENCE, P153
[3]  
Cover T. M., 2005, ELEM INF THEORY, DOI 10.1002/047174882X
[4]  
FENG WC, 1997, ACM SPRINGER VERLAG, V5
[5]  
GARRETT M, 1993, THESIS COLUMBIA U NE
[6]  
*ISO IEC, 1998, JTC1SC29WG11
[7]  
Jia Wang, 1999, Computer Communication Review, V29, P36, DOI 10.1145/505696.505701
[8]  
KANGASHARJU J, 1998, P IEEE SIGN PROC SOC
[9]  
KANGASHARJU J, 2001, P IEEE INF ANCH AK
[10]  
MA W, 2000, P IEEE ICME, V2, P991