当前位置:网站首页>[network communication -- webrtc] source code analysis of webrtc -- bandwidth estimation at the receiving end
[network communication -- webrtc] source code analysis of webrtc -- bandwidth estimation at the receiving end
2022-06-23 17:06:00 【Struggle Penguin coppersun】
【 Network communication -- WebRTC】WebRTC Source code analysis -- Receiver bandwidth estimation
【1】OveruseEstimator A brief introduction to the Kalman filter formula in


【2】OveruseDetector Trigger of bandwidth load signal and dynamic adjustment of threshold value
Threshold dynamic adjustment formula


Is the arrival time difference ,
by
Time delay ,
Is the adaptive gain ;
Determination of trigger timing of bandwidth load signal

And the duration is greater than 100ms It is judged as bandwidth overload
It is judged that the bandwidth is excessive
Then it is judged that the bandwidth is normal
【3】AimdRateControl State transition of finite state machine in


among ,
,
,
For the past 500ms Received bit rate in ,
by
The bit rate adjusted when ;
appendix
【A】 Introduction to Kalman filter formula


Reference thanks
This blog is a summary of the blogger's learning and practice , And refer to the blog posts of many bloggers , Thank you , If bloggers have shortcomings , Please criticize and correct me .
Code analysis reference
【1】WebRTC GCC Detailed explanation of congestion control algorithm
【2】Webrtc delay-base-bwe The code analysis (3): OveruseEstimator modular
【3】Webrtc delay-base-bwe The code analysis (4): OveruseDetector modular
【4】Webrtc delay-base-bwe The code analysis (5): AimdRateControl modular
【5】webrtc Video receiver bandwidth prediction ( Two )--- Kalman filtering
Supplementary knowledge point reference
【1】 understand Kalman Use of filtering
【2】 Kalman filtering (Kalman Filter) Principle and formula derivation
【3】 The Kalman filter algorithm is deduced in detail
Standard documents and papers
【1】Analysis and Design of the Google Congestion Control for Web Real-time Communication (WebRTC)
【2】draft-alvestrand-rtcweb-congestion-02
【3】A Google Congestion Control Algorithm for Real-Time Communication
【4】An Introduction to the Kalman Filter
边栏推荐
- 图扑数字孪生 3D 风电场,智慧风电之海上风电
- TensorRT Paser加载onnx 推理使用
- Another breakthrough! Alibaba cloud enters the Gartner cloud AI developer service Challenger quadrant
- stylegan3:alias-free generative adversarial networks
- 供求两端的对接将不再是依靠互联网时代的平台和中心来实现的
- ERP管理系统的重要性
- R language uses colorblinr package to simulate color blind vision, and uses edit to visualize the image of ggplot2_ The colors function is used to edit and convert color blindness into visual results
- 测试的重要性及目的
- leetcode:面試題 08.13. 堆箱子【自頂而下的dfs + memory or 自底而上的排序 + dp】
- 创新技术领航者!华为云GaussDB获颁2022年云原生数据库领域权威奖项
猜你喜欢

科大讯飞神经影像疾病预测方案!

Apache foundation officially announced Apache inlong as a top-level project

Another breakthrough! Alibaba cloud enters the Gartner cloud AI developer service Challenger quadrant
![[go]沙盒环境下调用支付宝扫码支付](/img/d4/c6d72a697bc08f69f11121a15109b3.png)
[go]沙盒环境下调用支付宝扫码支付

Network remote access raspberry pie (VNC viewer)

What can the accelerated implementation of digital economy bring to SMEs?

【网络通信 -- WebRTC】WebRTC 源码分析 -- PacingController 相关知识点补充

Leetcode 450. Delete node in binary search tree

Shushulang passed the listing hearing: the gross profit margin of the tablet business fell, and the profit in 2021 fell by 11% year-on-year

DataNode进入Stale状态问题排查
随机推荐
网络远程访问树莓派(VNC Viewer)
ABP framework - data access infrastructure (Part 2)
Practice sharing of chaos engineering in stability management of cloud native Middleware
C. Add One--Divide by Zero 2021 and Codeforces Round #714 (Div. 2)
bypassuac提权
Right leg drive circuit principle? ECG acquisition is a must, with simulation files!
Comparison of asemi Schottky diode and ultrafast recovery diode in switching power supply
Tupu software builds smart city with lightweight modeling
R language uses timeroc package to calculate the multi time AUC value of survival data in the case of no competition, uses Cox model, adds covariates, and visualizes the multi time ROC curve of surviv
IFLYTEK neuroimaging disease prediction program!
Leetcode 450. Delete node in binary search tree
《MPLS和VP体系结构》
JMeter stress testing tutorial
Safe and comfortable, a new generation of Qijun carefully interprets the love of the old father
Coatnet: marrying revolution and attention for all data sizes
Get first and last days by year
如何选择示波器?这10点一定要考虑!
What are the risks of opening a fund account? Is it safe to open an account
The summary of high concurrency experience under the billion level traffic for many years is written in this book without reservation
ABAP essay - material master data interface enhancement
And the duration is greater than 100ms It is judged as bandwidth overload
It is judged that the bandwidth is excessive
Then it is judged that the bandwidth is normal