A method to evaluate quality of real time video streaming in radio access network

Liang Chen, Xiaolin Deng, Yongmei Qi, Salah Addin Mohammed, Zesong Fei, Jianyin Zhang

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Citations (Scopus)

Abstract

Video streaming is one of the most popular applications in today's networks, ranging from communications to entertainment, it penetrates into every aspect of our lives. Service providers concern more and more about Quality of Experience perceived by end user. This paper proposes a new model to evaluate the end-to-end video quality in LTE networks. Specially, we focus on real time streaming video service that based on Real Time Streaming Protocol. This paper investigate the impact of RAN parameters, namely, SINR and the number of users, on the user's QoE. According to simulation results, a mapping model between these arguments and the video quality is given eventually. This assessment method will help mobile network operators to optimize RAN performance to satisfy users' video quality expectations.

Original languageEnglish
Title of host publicationProceedings - 2014 IEEE International Conference on Computer and Information Technology, CIT 2014
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages340-344
Number of pages5
ISBN (Electronic)9781479962389
DOIs
Publication statusPublished - 12 Dec 2014
Event14th IEEE International Conference on Computer and Information Technology, CIT 2014 - Xi'an, Shaanxi, China
Duration: 11 Sept 201413 Sept 2014

Publication series

NameProceedings - 2014 IEEE International Conference on Computer and Information Technology, CIT 2014

Conference

Conference14th IEEE International Conference on Computer and Information Technology, CIT 2014
Country/TerritoryChina
CityXi'an, Shaanxi
Period11/09/1413/09/14

Keywords

  • LTE
  • QoE
  • RAN
  • RTSP
  • Video Quality

Fingerprint

Dive into the research topics of 'A method to evaluate quality of real time video streaming in radio access network'. Together they form a unique fingerprint.

Cite this