Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
PROCESSING OF DATA FILES
Document Type and Number:
WIPO Patent Application WO/2015/107067
Kind Code:
A1
Abstract:
In general, it is proposed to define a new expiry mechanism for a data file being received at the client. In the following it is proposed that the expiry time on the receiver side should be "shortly" after a possible reception of all packets. It is proposed that the receiver should know as precisely as possible that no additional packets for that data file are expected anymore. As soon as the receiver can safely regard the reception of the file, the receiver could either move on to the next segment (delay optimization) or try to make use of the received information.

Inventors:
EL KHAYAT IBTISSAM (BE)
LOHMAR THORSTEN (DE)
Application Number:
PCT/EP2015/050562
Publication Date:
July 23, 2015
Filing Date:
January 14, 2015
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
ERICSSON TELEFON AB L M (SE)
International Classes:
H04L47/32
Foreign References:
US20080285496A12008-11-20
Other References:
"3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Multimedia Broadcast/Multicast Service (MBMS); Protocols and codecs (Release 12)", 16 December 2013 (2013-12-16), XP050766829, Retrieved from the Internet [retrieved on 20131216]
Attorney, Agent or Firm:
VON ZMUDA-TRZEBIATOWSKI, Margarethe et al. (Herzogenrath, DE)
Download PDF:
Claims:
CLAI MS

1 . A method for providing a data file to a client wherein the data file is transmitted from a sender to the client over a communication network, the method comprising the steps of :

- providing the data file comprising data packets and having a data file size (S51 ) ;

- estimating a data file transfer duration being based on a transmission bi- trate towards the client and the data file size (S52) ;

- when sending a data packet towards the client estimating an expiry time of a remaining data file still to be sent wherein the estimation of the expiry time is based on the data file transfer duration and a duration for transmission of already sent data packets so that the expiry time is adapted to inform when the transmission of the data file is completed (S53) ;

- signaling the estimated expiry time to the client (S54) .

2. The method according to claim 1 ,

wherein the step of providing the data file comprises partitioning the data file into data packets.

3. The method according to claim 1 ,

wherein the step of providing the data file comprises estimating a number of the data packets in the data file.

4. The method according to claim 3,

wherein the step of estimating the data file transfer duration comprises considering a FEC overhead.

5. The method according to claim 3 or 4,

wherein the step of estimating the data file transfer duration comprises considering packet overhead.

6. The method according to one of the claims 1 to 5,

wherein the data file transfer duration is updated during transmission of the data packets.

7. The method according to claim 1 ,

wherein the step of estimating the expiry time for the data file comprises using the estimated data file transfer duration and adding a safety margin.

8. The method according to one of the claims 1 to 8 wherein the expiry time is a relative time showing an expected remaining time for transmission of the remaining data packets.

9. The method according to one of the claims 1 to 9,

wherein the step of estimation of the expiry time comprises decrementing the duration for transmission of already sent data packets from the estimated data file transfer duration.

1 0. The method according to one of the claims 1 to 9,

wherein the step of estimation of the expiry time comprises keeping track of a number of the already sent data packets.

1 1 . The method according to one of the claims 1 to 1 0,

wherein the step of estimation of the expiry time comprises a calculation based on the number of already sent data packets and an inter transmit interval being an interval at which a data packet is sent.

1 2. The method according to one of the claims 1 to 1 1 wherein the expiry time is an absolute time at which the transmission of the data packets of the data file is to be completed.

1 3. The method according to claim 1 to 1 2,

wherein the step of estimation of the expiry time is performed for every data packet to be sent.

14. The method according to claim 1 3,

wherein the step of estimation of the expiry time comprises decrementing the expiry time estimated for a previous data packet with the estimated inter transmit interval.

1 5. The method according to claim 1 to 1 2,

wherein the step of estimation of the expiry time is performed for every n data packets to be sent or for random data packets.

1 6. The method according to claim 1 ,

wherein the step of signaling the estimated expiry time comprises including the expiry time into a data packet header of the data packet to be sent.

1 7. The method according to claim 1 ,

wherein the step of signaling the estimated expiry time comprises including the expiry time in a FLUTE packet carrying the expiry time assigned to a File Descriptor entry.

1 8. The method according to claim 1 ,

wherein an identity number for identifying a data file is re-used for identifying another data file when the expiry time expires at the client side.

1 9. A method for providing a data file comprising data packets wherein the data packets are transmitted from a sender to the client over a communication network, the method comprising the steps of :

- receiving a data packet of the data file (S81 ) ; - checking the data packet (S82) for an expiry time for the data file wherein the expiry time is adapted to inform when a transmission of a remaining data file still to be received is completed ;

- storing the data packet (S83) ;

- deciding on construction of the data file (S84) .

20. The method according to claim 1 9,

wherein the checking step comprises reading out the header of the received data packet.

21 . The method according to claim 1 9 or 20,

wherein the checking step comprises reading out a FLUTE packet carrying the expiry time assigned to a file delivery descriptor entry .

22. The method according to claim 1 9,

wherein the expiry time is a relative time describing a remaining time for reception of the remaining data packets.

23. The method according to claim 1 9,

wherein the expiry time is an absolute time and the remaining time for reception of the remaining data packets is a difference between the received expiry time and the current absolute system time.

24. The method according to claim 1 9,

wherein the constructing comprises performing an error concealment procedure.

25. The method according to claim 1 9, wherein the constructing comprises recovering the data file based on the stored data.

26. The method according to claim 25,

wherein the constructing comprises further ignoring subsequent data packets with a same identity number identifying a data file.

27. The method according to claim 26,

wherein the ignoring comprises setting an internal marker indicating that subsequent data packets with the same identity number are to be discarded.

28. The method according to claim 26,

wherein when the expiry time expires the internal marker is cleared for the particular identity number.

29. The method according to claim 1 9,

wherein the constructing comprises performing a file repair procedure and requesting a retransmission of data packets.

30. The method according to one of the claims 1 9 to 29,

wherein the method com prises further cleaning up a memory by removing the stored data packet.

31 . The method according to one of the claims 26 to 2,8

wherein the method com prises further releasing the identity number to be used for another data file again.

32. The method according to one of the claims 26 to 28 and 31 ,

wherein the identity number is a Transport Object I dentifier TOI .

33. A sender device (51 ) adapted to provide a data file to a client wherein the data file is transmitted from the sender device to the client over a communication network, the sender comprising :

- A provision unit adapted to provide the data file comprising data packets and having a data file size (52) ;

- An estimation unit adapted to estimate a data file transfer duration being based on a transmission bitrate towards the client and the data file size (53) ;

- A processor adapted to estimate an expiry time of a remaining data file still to be sent when sending a data packet towards the client wherein the estimation of the expiry time is adapted to inform when the transmission of the data file is completed (54) ;

- A sender unit adapted to signal the estimated expiry time to the client when sending a data packet (55) .

34. A client device (81 ) adapted to provide a data file comprising data packets

wherein the data packets are transmitted from a sender to the client device over a communication network, the client device comprising :

- A receiver adapted to receive a data packet of the data file (82) ;

- A checking unit (83) adapted to check the data packet for an expiry time for the data file wherein the expiry time is adapted to inform when a transmission of a remaining data file still to be received is completed ;

- A storage adapted to store the data packet (84) ;

- A decision unit adapted to decide on construction of the data file (85) .

Description:
Processing of data files

Technical Field

The present disclosure relates to techniques for providing data file to a client.

The present disclosure may be practiced within network solutions using broadcast for transmitting data files. I n particular the embodiments discussed herein may be used in a scenario using MBMS, eMBMS broadcast systems or other systems providing multicast and/or broadcast transmission techniques like I P-Multicast in DSL access system ( I PTV) or DVB-S.

Background

DASH Dynamic adaptive streaming over HTTP is intended to support a media streaming model for delivery of media content. DASH provides streaming technique, which adapts the provision of media stream to the currently available link bitrates as disclosed in " Dynamic adaptive streaming over HTTP ( DASH)— Part 1 : Media presentation description and segment formats" , I SO/ I EC 23009- 1 : 201 2( E) , Version 2.1 c2. DASH is designed as a client controlled adaptive HTTP streaming protocol. That means, that the server describes a set of available media qualities for example as a manifest file being provided to the users and the user selects depending on the available link bitrate a media representation matching the current link bitrate. Apple HTTP Live Streaming ( HLS) is another exam ple of adaptive streaming technique.

Multicast Broadcast Multimedia service MBMS as defined in 3GPP TS 26.246 version 1 2.0.0 " Multimedia Broadcast/ Multicast Service ( MBMS) ; Architecture and functional description" (201 3- 1 2) is a point-to-multipoint service in which data is transmitted from a single source entity to multiple recipients. Transmitting the same data to multiple recipients allows network resources to be shared. MBMS is especially applicable, when many users in a cell or any broadcast area use the same stream quality. For example in urban areas the same service may be simultaneously offered to a number of users with a higher bitrate then in sub-urban areas.

MBMS download delivery method uses FLUTE protocol when delivering DASH-formatted content over MBMS bearers. The FLUTE protocol ( RFC 3926) is used for file delivery over UDP. The FLUTE protocol is selected by MBMS, DVB-H I P Datacast and OMA Mobile Broadcast Services as file delivery protocol. FLUTE in the Broadcast Multicast Server ( BM-SC) cares about partitioning a media file into a sequence of media segments, namely UDP packets. Thus, FLUTE is a protocol, which allows delivery of files, like DASH files over broadcast using UDP as a transport protocol.

FLUTE is built on top of the Asynchronous Layered Coding (ALC) protocol. ALC is intended to transmit one or more transmission objects to multiple receivers. Each object is uniquely identified by a LCT Transport Object I dentifier (TOI ) . ALC is carried using UDP over I P packets. Every I P packet, which is generated by partitioning of a data file carries the TOI value in the packet header.

FLUTE adds the needed mechanism of associating HTTP like metadata such as a Content- Location and Content-Type to an LCT Transmission Object. I n particular, FLUTE defines the so-called File Delivery Table ( FDT) , which is basically a list containing an association of file metadata to the TOI s. The client maintains the FDT and the sender can add entries by using FDT I nstances, which are sent as Transmission Objects. I n particular in FLUTE, the FDT I nstance carries among other parameters a File Delivery Descriptor which contains file properties such as File Name, Content Location and File- Type and also an expiry timestamp or timer or time. Further the FDT table provides an association between the File Delivery Descriptor, the TOI and the expiry time. The expiry value is given as absolute NTP timestamp. Since each FLUTE receiver maintains the FDT, the purpose of sending FDT I nstance is to update or extend the File Delivery Table at the receiver. The FDT I nstance expiry time, "expires" , determines the expiry of the TOI to File Descriptor association or in other words the expiry of the FDT instance. Each FLUTE receiver maintains the File Delivery Table ( FDT) , which is depicted as example in Figure 2. Thus according to Figure 2 an object or in this case a file has an assigned TOI , first column. The second column, called "expires" states when a particular file, for example with the TOI 5 expires, here at time A. The column "Content Location" provides an URL, where the content is located and may be fetched. The Content- MD5 may be used to differentiate different versions of the same file. According to Figure 2, files with TOI 5 and 6 have the same expiry time A and with TOI 9 and 1 0 the same expiry time B. Thus, the sender ( BM-SC) defines the expiry of the TOI to File Delivery Descriptor association with an absolute NTP timestamp with one timestamp for one or more files as depicted in Figure 2.

According to the MBMS Specification TS 26.346 V1 2.0.0 (201 3- 1 2)" Multimedia Broadcast/ Multicast Service ( MBMS) ; Protocols and codecs" , the FDT expiry mechanism is used to indicate the end of transmission time for a certain object or a data file.

The problem with the existing solution is that the provided expiry time does not consider the characteristics of a transmission, like a transmission delay. The transmission delay depends on various network components including radio parameters. For example, the end to end delay between the BM-SC down to the UE depends on how certain parameters have been configured on an eNodeB. I f all eNodeB have good and fast backhaul connection then the transmission delay is expected to be small. The speed of the eNodeB hardware as well as the buffering has also impact on the end-to-end delay. Further also the speed of the BM-SC hardware impacts the end-to-end system . For this reason the end-to-end delay can largely differ between systems and this leads also to varying transmission time of a data file.

Further, any sort of communication is prone to packet losses. The sender cannot influence which packet gets lost. I t might be the first, or a burst at the beginning of a transmission. Consequently data packets carrying the FDT table information (i.e. FDT I nstance objects) may get lost or corrupted. Packets may be sent on purpose out of sequence.

Further, the receiver needs to be precisely time synchronized when getting an absolute expiry time. Today's phones are only loosely synchronized. I f the network supports the Network Time & Zone solution ( NI TZ) , then a timestamp is only provided at phone restart. Consequence is that many phones are several seconds off . NI TZ is not designed to provide sub-second precision.

DASH operates by segmenting continuous media content stream into a sequence of media segments at a server side. Further a media segment, like the DASH media segment is typically subdivided into multiple data packets, UDP data packets, wherein the data packets have a roughly constant duration of time, the so called data packet duration. Each data packet is uniquely marked with a sequence number, so that the client can re-assemble the file. For the MBMS broadcast, a media segment is partitioned into multiple FLUTE/ UDP packets. Optionally, FEC redundancy is calculated and added as overhead (i.e. additional packets containing redundant data) to the transmission of a data file. A data file server, like the BM-SC performs the generation of the UDP data packets by partitioning the media segments and calculating the FEC redundancy. The segmentation is performed by a Live Encoder LE, wherein a LE comprises a Segmenter and may com prise an Encoder. However the data files as generated by the LE have different sizes in the sense that they comprise a different number of data packets, and therefore the data packets have only a roughly constant duration. The LEs are namely vendor specific. Each live encoder vendor has its own algorithms to increase compression efficiency while keeping a certain end-to-end delay. I n case of broadcast the generated media segments are on average l OOkByte size, some are larger, e.g. up to 1 30kByte and some are smaller, e.g. up to 70kByte, then as mentioned when generating media segments, each segment might have a different number of UDP data packets. Thus, the segment sizes are different.

Further for broadcast transmission typically a constant bitrate bearer on a transmission link is provided. For example, MBMS for LTE (eMBMS) offers a Constant Bitrate Broad- cast Bearer Service. The bitrate is defined though the GBR (Guarantees Bitrate) . Thus, in case of broadcast there is a constant bitrate bearer allocated for broadcast transmission. For example the allocated bitrate might be 1 Mbps that means that it takes 0.5 sec for a segment of size 500kb to be transmitted and a segment of size 1 500kb needs 1 ,5 sec. However since the segment sizes may have different sizes, consequently time for transmission over a constant bitrate may differ.

Therefore on one side different data file sizes are generated, so that the transmission of the data files via a network takes respectively different time duration and on the other side due to the varying end-to-end delay in the network, the variation of the transmission of a data file in time is intensified, so that the static set expiry time at the server side may not provide an accurate end of transmission time point.

Furthermore, the existing FLUTE expiry mechanism does not work with a static File Delivery Descriptor tables. The idea of the static file delivery descriptors is to avoid sending the FLUTE FDT I nstances. Thus, the required information are sent at the beginning of a session and no updates are sent afterwards.

The key idea of this static file descriptor tables is, that the filenames of adaptive bitrate streaming segments (like DASH or HLS) contain a running index. This index is typically increased by one. Since the TOI is also a unique index, the idea is to provide all static information of the File Descriptors, in form of a template, so that the client can derive the filename by combining the TOI with a basic filename template.

Figure 3 depicts that principle. On the left side a sequence of I nput files with the URL address and a running index (here from 9 to 1 3) is provided. The filename can be expressed by a template (right side) , where the format tag % d is replaced by the value of the TOI from the transport.

With the template form , the URL is constructed by replacing a certain part of the template by the index TOI . A template form may have the form in C printf format: http://( ...)/seg_% d.3gs where % d is replaced by the value of TOI to result in the URL to be used for requesting the subsequent media segments

The problem with the way of avoiding the FDT I nstance fields and providing the File Descriptors as a static File Delivery Descriptor Table is the missing provision of the expiry time for the TOI association. However, the intention of the expiry mechanism is to allow the re-use of the TOI value for another file transmission.

Moreover, the user needs to have an expiry time as a trigger for an effective managing of its memory. I n particular, from a client memory management perspective, the user should be able to decide when to delete the received data packet of a data file.

Summary

There is a demand for a technique for an efficient provision of data file to a user. I n particular there is a demand to provide a mechanism for an efficient memory management on the user side.

The invention is embodied in independent claims. Advantageous embodiments are described in the dependent claims.

The demand is satisfied with a method for providing a data file to a client wherein the data file is transmitted from a sender to the client over a communication network. I t is proposed to provide a data file comprising data packets wherein the data file has a data file size. I n the next step it is proposed to estimate a data file transfer duration being based on a transmission bitrate towards the client and the data file size. As next an expiry time of a remaining data file still to be sent is estimated when a data packet towards the client is sent. Hereby the estimation of the expiry time is based on the data file transfer duration and a duration for transmission of already sent data packets so that the expiry time is adapted to inform when the transmission of the data file is completed. I n the next step the estimated expiry time is signaled to the client.

Further the demand is satisfied with a method for providing a data file comprising data packets wherein the data packets are transmitted from a sender to the client over a communication network. I n the first step a data packet of the data file is received. As next the data packet for an expiry time for the data file is checked wherein the expiry time is adapted to inform when a transmission of a remaining data file still to be received is completed. Further it is proposed that the data packet is stored and a decision is taken on a construction of the data file.

Further the demand is satisfied with a sender device adapted to provide a data file to a client wherein the data file is transmitted from the sender device to the client over a communication network. The sender comprises a provision unit adapted to provide the data file comprising data packets and having a data file size. Further there is an estimation unit adapted to estimate a data file transfer duration being based on a transmission bitrate towards the client and the data file size. Moreover there is a processor adapted to estimate an expiry time of a remaining data file still to be sent when sending a data packet towards the client wherein the estimation of the expiry time is based on the data file transfer duration and a duration for transmission of already sent data packets so that the expiry time is adapted to inform when the transmission of the data file is completed. Further there is a sender unit adapted to signal the estimated expiry time to the client when sending a data packet.

Further the demand is satisfied with a client device which is configured to provide a data file comprising data packets wherein the data packets are transmitted from a sender to the client device over a communication network. The client device comprises a receiver adapted to receive a data packet of the data file. Further there is a checking unit adapted to check the data packet for an expiry time for the data file wherein the expiry time is adapted to inform when a transmission of a remaining data file still to be received is completed. There is a storage adapted to store the data packet and a decision unit adapted to decide on construction of the data file.

The proposed solutions provide an expiry time which is calculated providing a value matching the end point of a transmission in the best way.

Brief Description of the Drawings

I n the following, the invention will further be described with reference to exemplary embodiments illustrated in the figures, in which :

Fig. 1 shows an embodiment for varying duration of file;

Fig. 2 shows an embodiment of a FDT table;

Fig. 3 shows a generation of a static filename tem plate;

Fig. 4 shows an embodiment for estimation of an expiry time;

Fig. 5 shows a flowchart of a method in a server device according to one embodiment;

Fig. 6 shows an embodiment for initiation an estimation of the expiry time at the sender side;

Fig.7 shows an embodiment for estimation of the expiry time at the sender side;

Fig.8 shows a flowchart of a method on the client side according to one embodiment ;

Fig. 9 shows an embodiment for using the expiry time at the client side;

Fig. 1 0 shows schematically shows a sender device according to one embodiment ;

Fig. 1 1 schematically shows client according to one embodiment ;

Fig. 1 2 shows an embodiment when using a constant pace delivery of data packets; Fig. 1 3 shows an embodiment when applying a generic delivery of data packets.

Detailed Description

I n the following description, for purposes of explanation and not limitation, specific details are set forth, such as particular network environments and communication standards etc. , in order to provide a thorough understanding of the current invention. I t will be apparent to one skilled in the art that the current invention may be practiced in other embodiments that depart from these specific details. For example, the skilled artisan will appreciate that the current invention may be practised with any wireless network like for example UMTS, GSM or LTE networks. As another example, the invention may also be implemented in short-range wireless networks such as WLAN or Bluetooth systems or in wireline networks, for example in any I P-based networks, like I MS network.

The invention may be practiced with broadcast networks, for example TV or with hybrid networks comprising a broadcast network and a mobile network, for example a DVB-H ( Digital Video Broadcast-Handhelds) and a 3GPP mobile network. Basically, the invention may be practiced within any network environment providing file delivery or live video to a user over a telecommunication network.

DASH Dynamic adaptive streaming over HTTP is a protocol used for provision of media content. Said content may be transmitted using FLUTE protocol in case of broadcast transmission. Other adaptive HTTP streaming schemes such as Apple HTTP Live

Streaming ( HLS) may be supported as well.

A player on the user side is adapted to provide the received data to the user. I n one embodiment it is proposed that the streaming player is a DASH player, in particular an MPEG- DASH player. A user or a client might be any receiver device, like an end device or User Equipment ( UE) . I n the following the terms user or client or user equipment UE or receiver are used as synonyms. I f it is not mentioned explicitly the term user or client or UE or receiver is used in the sense of a hardware with a processor and memory performing the embodiments of the invention.

The sender may be any device providing server functionality in the system and being adapted to generate data packets from a data file and calculate the expiry time. I t may be any server device, like a BM-SC server. I f it is not mentioned explicitly the term sender or sender device is used in the sense of a hardware with a processor and memory performing the embodiments of the invention.

A data file may comprise any kind of data like video, audio data, binary data, images, text or any other kind of data. I n the following the term media data, media content, media segment, segment or object are used as examples for a generic term , data file. An object may be a data file when the object has additional file attributes, like a file name. A media segment may be for example a DASH or HLS segment. The step of providing the data file comprises partitioning the data file into data packets when a data file is to be prepared for a transmission. Thus, a data packet is generated form a data file by means of partitioning of said data file into data packets. The step of providing the data file comprises partitioning a data file into data packets with a roughly constant length of payload data. Further the step of providing the data file comprises estimating a number of the data packets in the data file to be sent. I n particular this step may be performed when estimating the data file transfer duration during the transmission of the data file, for example when said duration is to be calculated again.

Data file transfer duration is the time needed for transmission of a data file from a sender to a client. Said duration is based on the size of the data file and a transmission bitrate towards the client. The size may be expressed by a number of data packets building the data file. When estimating the data file transfer duration the Forward Error Correction ( FEC) overhead may be considered. Further the data file transfer duration may be influenced by adding any kind of packet overhead.

I n an embodiment of the invention is proposed to update the data file transfer duration during transmission of the data packets. For example if the sender notices that the transmission will take longer or shorter than originally estimated, a new duration of the data file is to be estimated so that the calculation of the expiry time is based on an updated data file transfer duration. Thus the sender measures or keeps in any preferably way track of the duration of the already sent data packets and calculates the data file transfer duration for the data packets still to be sent. The time duration for the already sent data packets may vary, the variation may be noticed at the sender side due to lower/faster provision of the data packets for sending (for example the emptying of the sender buffer may differ) . Furthermore the sender may be adapted to receive any changes in the transmission bitrate.

I n one embodiment it is proposed to add to the estimated data file transfer duration a safety margin in order to consider some end to end delays variations when estimating the expiry time.

The expiry time is calculated at the sender and provides information when the transmission of the data packets of the data file is completed. When sending a data packet at the sender side the expiry time is estimated. The estimation is based on the data file transfer duration and duration for transmission of the already sent data packets. I n the following the term "timeout information" is used as a synonym for the expiry time.

I n one embodiment it is proposed that the expiry time is a relative time showing an expected remaining time for transmission of the remaining data packets. When sending a data packet at the sender side the expiry time is estimated, in particular the expiry time for the remaining data file which is still to be sent is calculated. I n other words the expiry time informs when the client is supposed to receive the remaining part of the data file. The expiry time is expressed as relative value, from the point of receiving a data packet.

The relative time may be calculated by decrementing the duration for transmission of already sent data packets from the estimated data file transfer duration. Thus, the calculation is based on the estimated data file transfer duration and the time which passed for the already sent data packets.

I n an embodiment it is proposed to update the data file transfer duration. For example if the sender notices that the transmission will take longer or shorter than originally estimated, a new duration of the data file is to be estimated so that the calculation of the expiry time is based on an updated data file transfer duration.

I n one embodiment it is proposed to keep track on a number of the already sent data packets.

I n case data packets are sent with a fixed interval, so called inter transmit interval, the calculation is based on the number of already sent data packets and on the inter transmit interval. Thus the number of already sent data packets with a certain packet size wherein each data packet is sent every inter transmit interval provides the time duration for transmission of the already sent data packets.

I n one embodiment, a constant inter-transmit intervals are considered. However the inter-transmit interval may differ depending on the data packet size.

I n a further embodiment it is proposed to provide the expiry time as an absolute time showing the time at which the transmission of the data packets of the data file is completed, wherein the absolute time is estimated by compensating some end to end delays. The absolute expiry time is calculated by adding to the starting absolute system time the estimated data file transfer duration for the transmission of the data file.

I n one embodiment it is proposed to perform the estimation of the expiry time for every data packet to be sent. This ensures that the client receives adequate information when the transmission of the data file is completed. I n this case it is proposed to estimate the expiry time by decrementing the expiry time estimated for a previous data packet with the estimated inter transmit interval.

I n order to save transmission resources it is proposed to perform the estimation of the expiry time for every n data packet to be sent or for random data packets.

I t is proposed that the estimated expiry time is to be signaled to the user. The signaling step may be realized in any preferably way. For example the expiry time may be included into a data packet header of the data packet to be sent. I n one embodiment it is proposed to include the expiry time in a FLUTE packet carrying the expiry time assigned to a File Descriptor entry.

Further it is proposed to re-use an identity number for identifying another data file when the expiry time expires at the client side. Thus the sender may use the identity number for another data file again. I n the embodiment, in which the data file is identified by a Transport Object I dentifier TOI , when the expiry time occurs, the TOI may be re-used for another data file. The sender maintains a TOI database as already mentioned and allocates the TOI value to the data file until expiry time. Thus after the expiry of the expiry time sender can re-use the TOI value for other data file.

On the client side it is proposed to check the received data packets for the expiry time for the data file. I f the expiry time is signaled in a data packet header, then it is proposed to read out the header of the received data packet. I f the expiry time is signaled in a FLUTE packet, then it is proposed to read out said FLUTE packet carrying the expiry time assigned to a file delivery descriptor entry .

I n one embodiment it is proposed that the expiry time is a relative time, in this case the received time is used at the client as a remaining time for reception of the remaining data packets. I n case the expiry time is an absolute time then the remaining time for reception of the remaining data packets is calculated at the client as a difference between the received expiry time and the current absolute system time.

When receiving a data packet the client takes a decision based on the stored data packets whether to construct the data packet or to discard the stored data packets. The decision may be performed when the expiry time elapses or during the reception of the data packets.

The client may further decide by the constructing to perform an error concealment procedure being a technique in which an error in received data is replaced by content, often interpolated from other parts of the received data in order to conceal the presence of the error in the original content. Further it may perform a recovering of the data file based on the stored data or request a retransmission of some data packets. When a data file is recovered it is proposed to ignore all subsequently received data packets with a same identity number until expiry time. Thus, it is proposed that data packets received after recovery and belonging to the same media object are ignored until the expiry time. I n one embodiment it is proposed to set an internal marker indicating that subsequent data packets belonging to the same object, thus carrying the same identity number are to be discarded. Further it is proposed that when the expiry time expires the internal marker is cleared for the particular identity number.

The client may also decide to discard the stored data packets, when the expiry time expires.

Further it is proposed to clean up a memory by removing the stored data packet

Furthermore it is proposed to release the identity number when the expiry time expires. This step allows that the identity number is used for another data file again. I n one embodiment the function of the identity number is performed by the Transport Object I dentifier TOI . I n general, it is proposed to define a new expiry mechanism for a data file being received at the client. I t is proposed that the receiver should know as precisely as possible that no additional packets for certain data file are to be expected. As soon as the receiver can safely regard the reception of the file as completed, the receiver could either move on to the next segment (delay optimization) or try to make use of the received information and construct the data file. Further the receiver may start preparing for the next data file by cleaning up the memory. The meaning of the expiry time is that the user discards data packets coming beyond the expiry time and starts to make the received file available to higher protocol layers. When the timer expires, either the receiver is able to provide the data file to the player because sufficient data packets has been received or all data is to be discarded because the reconstruction of the data file is not possible. According to the embodiments of the invention, the estimation of the expiry time ensures that the time point is as accurate as possible so that no unnecessary discarding of the data packets takes place.

The sender or service device knows the file size of the transmission object and also the transmission bitrate for the object or any data file. The transmission bitrate may be the same for each data file in the sequence. However, the transmission bitrate may also change from data file to data file or more generally from object to object. Or even it may change during the transmission of the data file. Accordingly the sender can estimate the duration of the data packets still to be sent or in general the data file transfer duration, since this is the duration of the file still to be sent.

The BM-SC is a broadcast server being an embodiment of the server device. Data files like the DASH segments are typically larger than a single I P packet. I n case of broadcast, a segment is partitioned into multiple FLUTE/ UDP packets.

Optionally, as already mentioned FEC redundancy is calculated and added as overhead to the transmission of a data file. The data files may be generated by the Live Encoder LE causing different sizes in the sense that the data files comprise a different number of data packets, like UDP data packets. Each live encoder vendor may have its own algorithms to increase compression efficiency while keeping a low end-to-end delay.

Figure 1 depicts, a resulting data file over broadcast, when a Live Encoder LE is configured with a certain target bitrate. By determining the client buffer fill state, the LE has a certain flexibility to vary the encoding bitrate within a short time window. I n the example according to Figure 1 , the transmission duration of a first media file ( File # N) is set to 1 6sec, while the next segment ( File N+ 1 ) takes 1 8sec. The LE is configured to produces a stream of an average target duration of 1 7sec ((TargetEncoderBitrate * Seg- mentDuration) /Tx bitrate) , which is defined as Target Encoder Bitrate. I f FEC redundancy is added, then the transmission duration increases proportionally with the FEC overhead.

Figure 4 depicts an embodiment of the present invention. After performing the partitioning for the data file at the sender side, said sender determines the number of data packet needed to carry the file (not shown) . According to Figure 4, the data file (which may be a DASH segment) plus the FEC overhead is partitioned into 400 I P packets. Due to the target bitrate, one packet needs to be sent every 40ms. Then at least 40 ms takes a transmission of one data packet with the given target bitrate. The interval at which a data packet is to be sent, here the 40ms, is called inter-transmit interval. The inter transmit interval corresponds at least to a duration for a transmission of one data packet when sending with a constant bitrate, called data packet duration.

I n this embodiment the sender needs 1 6sec to transmit the 400 packets with the 40ms interval. Thus, the sender determines the expiry of the data file as 1 6sec plus a safety margin of X sec. The sender uses here a safety margin of X= 1 sec so, the expiry time for the whole data file is set to 1 7sec after the reception of the first data packet. Since the first data packet might get lost, it is proposed that also the subsequent packets should carry timeout information. I n this respect it is proposed that the expiry time, when sending a data packet is estimated. Thus, at the sender side when sending a data packet the expiry time for the remaining media file is estimated. The estimation of the expiry time is based on the data file transfer duration and duration for transmission of the already sent data packets so that the expiry time is adapted to inform when the transmission of the data packets of the media file is to be completed.

According to Figure 4 the estimated expiry time is included into the header of the generated data packets. The expiry value of the first packet is 1 7000ms, the expiry of the second packet is 1 6960ms (thus, 1 7000ms minus 40ms) and the packet with the number 50 has the expiry time 1 5040ms, as depicted under the shown data packets. Then according to one embodiment the duration for the data file is 1 7sec, the duration for the data packet already sent is 49 * 40sec, thus 1 960ms, so 1 7000- 1 960 results in 1 5040. I n this embodiment, the expiry time point is expressed as a relative duration time for receiving the remaining data file from point of reception of the data packet carrying the estimated expiry time. The expiry time is decremented with each packet. I n this example the estimation is based on the information that a data packet is sent at least every inter transmit interval, namely 40 ms.

According to Fig.1 2 an embodiment is presented when a data packet is sent with a constant inter transmit interval. At first an object like a data file is partitioned into data packets. For the first data packet the duration for the remaining data packet is estimated at the sender side, namely 7 sec. The data packets are sent with constant inter transmit interval of every 1 sec. At the client side the packets are received and each data packet carries the information when the transmission of the data file is to be completed.

I n a further more general embodiment, the sender may estimate the time for the transmission of the remaining data file by taking the actual transmission duration for the data packet already sent. Thus instead of working with the estimated inter transmit interval, like in the example above 1 s, the sender calculates the actual duration of the transmission of the data packets already sent. I t may be that some data packets are sent at the same time and after some inter transmit interval another burst of data packet is sent. Thus, the sender has the information about the duration of the transmission of the sent data packets which is then used for the estimation of the time duration for transmission of the remaining data file.

This embodiment is present in Figure 1 3 showing data packets of the object A being sent as a burst, a few data packets at the same time, for example 3 data packets at time point 7s, 4s and 2 data packets at time point 1 s. The estimated expiry time is consequently the same in the parallel sent data packets. When sending for example data packet with the expiry value 4s, the sender estimates the expiry time as the expected time which is the estimated data file transfer duration minus the elapsed time which is the time lapsed after sending the first data packets or in other words the elapsed time is the duration for transmission of already sent data packets. The receiver when receiving data bursts receives also information of the expected end, then the data packets of a data burst carry the expiry time, according to Figure 1 3, 3 data packets carry expiry time 7s, the next 3 data packets of a burst carry 4s and the last 2 data packets of a next burst 1 s.

I n one embodiment it is proposed that each data packet, like for example each FLUTE packet carries the expiry information, thus the expiry of the TOI to File Descriptor entry.

I n one embodiment it is proposed to send the expiry time with a fixed frequency, e.g. every 1 0 th packet to reduce the overhead. Such a solution is for example benef icial, when a number of data packets is sent.

To simplify the sender operations, the expiry time may be set more coarse-grained, by defining a range. For instance, a sequence of packets may carry the same expiry time. For instance, the expiry field may only be increased in steps of 200ms, while the packet transmission interval remains still 40ms. Thus, five packets may carry the same expiry time. I n the previous embodiments the time unit milliseconds has been used. However this should be seen as an example. Other time units may be also used. I n one embodiment it is proposed to have a "timescale" field in the packet header or the in the static file delivery descriptor table, which may define the used time unit. The timescale field provides the timescale in "ticks per seconds" . The expiry time in the packet headers are expressed in units of "ticks" .

I n the following an embodiment of the present disclosure is presented in respect to Fig. 5 showing a flow chart with steps according to an embodiment to be performed on the sender side.

I n step S51 a data file comprising data packets is provided. The file has a data file size (S51 ) . I n the next step S52, a data file transfer duration is estimated, which is time needed for transmission of the data file still to be sent. The data file transfer duration is based on a transmission bitrate towards the client and the data file size. When sending a data packet towards the client an expiry time of a remaining data file still to be sent is estimated. The estimation of the expiry time is based on the data file transfer duration and the duration for transmission of already sent data packets S53. I n step S54 the estimated expiry time is signaled to the client.

I n the following embodiment according to Figure 6 is presented showing the behavior on the sender side.

For the proposed solution, the FLUTE sender, which may be the BM-SC calculates an expiry time. According to Figure 6, N is the file number. For the sake of completeness it is to be mentioned that the file metadata such as filename, Ml ME type, etc may be derived from a file delivery descriptor for example in combination with packet header information. The file delivery descriptor is valid for a sequence of files like a sequence of DASH segments. I n the following embodiment it is assumed that all data files are sent with the same constant bitrate. The consequence of sending files with different sizes all at the same constant bitrate is that the transmission duration, thus the expiry time, may be different for each file.

Based on Figure 6 left size

1 . The BM-SC receives the file or at least the file size of the file # N, step 601

2. The BM-SC partitions the file into I P packet payloads. An I P packet may carry one or more encoding symbol of size T or in other words packet pay- loads. Herein the term symbol is used in the meaning of payload. FEC scheme requires that all encoding symbols (except the last) of a source blocks are of equal size, here T, step 602

3. The BM-SC considers the FEC overhead, since this influences the transmission duration, step 603

4. The BM-SC considers the packet overhead like for example a headers, since this influences also the transmission duration, step 604

5. When a constant bitrate is considered, step 605, the BM-SC calculates the inter packet transmission interval also called inter transmit interval Tx by calculating the transmission duration of the entire file (incl. FEC and header overhead) and dividing it by the number of the data packets. Additionally, the BM-SC estimates a safty margin (X) being a constant value compensating some transmission delay, step 606.

On the right side of Figure 6 an example for calculation and estimation of the data packets, their duration and the data file transfer duration is presented.

Assuming that the data file has a length of 375kbyte (fs) , step 607 and the payload size of an I P data packet T is 1 200 byte, then the number of data packets K is 320, step 608. I n case the FEC overhead is added, then the FEC is to be considered by the calculation. I n this example it is assumed that FEC overhead, fec_oh, is 0.25 of the data packet size for each I P packet. Thus the number of data packet with FEC overhead, L, is 400, step 609. I n this embodiment also an additional packet overhead Hdr is considered, which is here 44 byte for each data packet. Correspondingly, the data file size, ts, is 497600 byte, step 61 0

I f an I P packet carries more than one symbol as it is foreseen in some FEC schemes like Raptor FEC, the overhead per symbol is reduced and the formula requires slight adj ustments to ts = L * (T + Hdr / G) , wherein L is the number of data packets generated from a data file by considering the overhead, T the encoding symbol size and G the number of symbols per packet. Hdr is the amount of overhead bytes for each I P packet, containing G encoding symbols of each size T.

Assuming that the bitrate for transmission, btr, is 248.8 kbps, the duration for the data file is calculated as 1 6 sec, step 61 1 . When dividing the data file transfer duration, ts/btr via the number of data packets, L, 400, then the outcome is 40ms, which is the time at which each data packet is sent and expected at the client side, in Figure 6 depicted as inter_pkt_interval, 61 2.

I n the following an embodiment of the present disclosure is presented in respect to Fig. 7 showing a flow chart with steps according to an embodiment to be performed on the sender side, in particular when sending a data packet and when estimating the expiry time.

I n this embodiment the calculation of the duration of transmission of already sent data packets is based on a constant bitrate and a constant inter transmit interval. Thus, once the BM-SC has calculated the packet transmission interval also called inter transmit interval and the transmission duration of the data file, the BM-SC can start the transmission process. According to Fig. 7 the following steps are performed :

1 . The BM-SC sets a packet counter / to zero, step 701 Optionally, the BM-SC calculates the expiry time by adding the transmission duration (ts/btr) plus the safety margin (X) to the current time now, step 702

I f there are no data packets to be sent in the particular file, the bM-SC starts with a new file, step 703. Otherwise, if there are still data packets to be transmitted for a file (/ < L) , then the BM-SC calculates a new relative expiry time for that packet, step 704 a. Alt A: BM-SC uses the expected remaining time to transmit all remaining data packets, plus the safety. When the inter transmit interval is constant, then the estimation is : ts/btr + X - (i * interval) , with i being the packet number, starting from zero b. Alt B: Alternatively, the BM-SC may use the difference between Expabs and now . This embodiment may be applied when BM-SC handles multiple sessions or when the BM-SC sends data packets in burst. So, the sum of the transmission intervals might not be accurate enough so that additionally or alternatively the sender estimates the absolute expiry time Expabs which is calculated by adding to the starting absolute system time the estimated duration for the transmission of the data file. When sending a data packet the current system time now \s read out and considered by estimating the difference between Exp a bs and now. Thus, the difference provides the actual time for sending the remaining part of the data file.

The BM-SC inserts the expiry time into the according packet header, the expiry time may be added into every packet, or every n-th e.g. every 5 th data packet, step 705

The BM-SC sends the data packet with the number / step 706 The BM-SC increments the packet counter, step 707 7. The BM-SC waits for the next packet transmission event, step 708.

I n the following an embodiment of the present disclosure is presented in respect to Fig.

8 showing a flow chart with steps according to an embodiment to be performed on the client side.

I n step S81 a data packet of the data file is received at the client side. I n step S82 the data packet is checked for an expiry time. The expiry time is adapted to inform when a transmission of a remaining data file still to be received is completed. As next S83 the data packet is stored and a decision procedure is performed S84. The decision procedure is based on the stored data packets and a decision is taken either to reconstruct the data file if enough symbols are present or to discard the stored data packets.

I n the following an embodiment of the present disclosure is presented in respect to Fig.

9 showing a flow chart with steps according to an embodiment to be performed on the client side, in particular the usage of the received expiry time at the client side is described.

I n a first step, 901 the receiver receives a first packet of a new file (identified by a new TOI , which is not present in the clients TOI database, aka File Delivery Table) . As next, the receiver checks, whether the expiry time Exp is present, 902. I f the expiry time is present, then the receiver parses the information from the header, 903. The receiver uses the new expiry time, Exp a b S or Exp re i as timeout value for the current file. At expiry time the receiver removes the TOI value from the TOI database (aka File Delivery Table) . Any subsequently received data packet with that TOI is then regarded as a new data file. I n the following two alternatives for using the expiry time are described which depend on the realization of the expiry time, step 904. a. I f the expiry time is realized using a timer as a value showing when the end of transmission will occur, then receiver may use the new relative expiry time directly to check whether it has already expired (e.g. 0s) b. I f the expiry timer is realized through a comparison against the system time, then the receiver calculates an absolute expiration time using the time of packet reception (i.e. now) as reference. So if the absolute time is provided then the client compares it with the system time at the client side to decide whether the time for reception of the remaining data file has expired.

I n the next step, 905, the receiver stores the received packet payload e.g. in memory. As next, 906, the receiver checks, whether it has received sufficient data to recover the file. I f the client has sufficient data, then it recovers the file and makes the file available to the player, 907, 908. I n one embodiment it is proposed, that the receiver sets an internal marker to ignore all subsequent packets with the same TOI , until the expiry time has expired (909) . When the expiry time expires the internal marker is cleared for the particular TOI . I n a further embodiment, it is proposed to re-segment the data file and provides it to the player when sufficient data is available independent whether the expiry time expires, 91 0. I f the expiry time has not expired 91 0, then the receiver waits for the next packet (Goto step 1 ) . I f the expiry time is due (e.g. the expiry timer has expired) , 91 0, then the receiver performs a decision procedure by deciding based on the stored data packets either to construct the media file or to discard the stored data packets. The decision may be : a. The receiver may try to use the received parts, 91 1 b. The client may notify the video player that a segment is missing, 91 2

As next, 91 3, the receiver cleans up the memory, releases the TOI association (i.e. removes the TOI value from its TOI database aka File Delivery Table) and clears the ignore packet marker (909) for that TOI . The system is now ready to use the TOI value as new value for another file again, 91 4.

Fig. 1 0 schematically illustrates exemplary structures for implementing the above- described concepts in a server device 51 . The server device comprises a provision unit 52 adapted to provide the data file comprising data packets and having a data file size. Further there is an estimation unit 53 adapted to estimate a data file transfer duration being based on a transmission bitrate towards the client and the data file size. A processor 54 is adapted to estimate an expiry time of a remaining data file still to be sent when sending a data packet towards the client. The estimation of the expiry time is based on the data file transfer duration and a duration for transmission of already sent data packets so that the expiry time is adapted to inform when the transmission of the data file is completed. Moreover there is a sender 55 unit adapted to signal the estimated expiry time to the client when sending a data packet.

I t should be noted that Fig. 1 0 illustrates various functional units in a server device 51 and the skilled person is able to implement these functional units in practice using suitable software and hardware. Thus, the solution is generally not limited to the shown the functional units 52-55 may be configured to operate according to any of the features described in this disclosure, where appropriate. The server is further adapted to perform the embodiments as described in connection with the functional embodiments.

Fig. 1 1 schematically illustrates exemplary structures for implementing the above- described concepts on a client device 81 .

The client device 81 comprises a receiver adapted 82 to receive a data packet of the data file. Further there is a checking unit 83 adapted to check the data packet for an expiry time for the data file wherein the expiry time is adapted to inform when a transmission of a remaining data file still to be received is completed. Moreover there is a storage 84 adapted to store the data packet and a decision unit 85 adapted to decide on construction of the data file.

I t should be noted that Fig. 1 1 illustrates various functional units in the client device 81 and the skilled person is able to implement these functional units in practice using suitable software and hardware. Thus, the solution is generally not limited to the shown structures of the user equipment and the functional units 82-85 may be configured to operate according to any of the features described in this disclosure, where appropriate.

The functional units 52-55 and 82-85 described above may be implemented in the corresponding device 51 or 81 by means of program modules of a respective computer program comprising code means which, when run by a processor causes the corresponding device 51 or 81 to perform the above-described actions and procedures. The processor may comprise a single Central Processing Unit (CPU) , or could comprise two or more processing units. For example, the processor may include a general purpose microprocessor, an instruction set processor and/or related chips sets and/or a special purpose microprocessor such as an Application Specific I ntegrated Circuit (ASI C) .

A computer program may be carried by a computer program product in the corresponding device 51 or 81 in the form of a memory having a computer readable medium and being connected to the processor. The computer program product or memory thus comprises a computer readable medium on which the com puter program is stored e.g. in the form of computer program modules . For example, the memory may be a flash memory, a Random-Access Memory ( FiAM) , a Read-Only Memory ( ROM) or an Electrically Erasable Programmable ROM ( EEPROM) , and the program modules could in alternative embodiments be distributed on different computer program products in the form of memories within the corresponding device 51 or 81 .

I t is to be understood that the examples and embodiments as explained above are merely illustrative and susceptible to various modifications. For example, the concepts could be used in other types of mobile communication networks, not explicitly mentioned so far. Further, it is to be understood that the above concepts may be im plemented by using correspondingly designed software in existing nodes, or by using dedicated hardware in the respective nodes.