Survey and Problem Statement of P2P Streaming
|
|
|
- Deirdre Patrick
- 9 years ago
- Views:
Transcription
1 Survey and Problem Statement of P2P Streaming Ning Zong Huawei Technologies 1 Survey of Some Popular P2P Streaming Systems 1.1 PPLive System Architecture and Working Flows of PPLive The PPLive software, running in user computers (peers), has two major communication protocols: (i) a registration and peer discovery protocol; and (ii) a P2P chunk distribution protocol. Figure 1 depicts an overview of the registration and peer discovery protocol [5]. When an end-user starts the PPLive software, it joins the PPLive network and becomes a PPLive peer node. The first action (step 1) is an exchange with the PPLiveWeb site to retrieve a list of channels distributed by PPLive. Once the user selects a channel, the peer node registers with the bootstrap root servers (trackers) and requests a list of peers that are currently watching the channel (step 2). The peer node then communicates with the peers in the list to obtain additional lists (step 3), which it aggregates with its existing list. In this manner, each peer maintains a list of other peers watching the channel. Figure 1, Registration and Discovery of PPLive At the video-on-demand (VoD) instant, because different peers watch different parts of the channel, a peer buffers up to a few minutes worth of chunks within a sliding window to share with each other. Some of these chunks may be chunks that have been recently played; the remaining chunks are chunks scheduled to be played in the next few minutes. s upload chunks to each other. To this end, peers send to each other buffer map messages; a buffer map message indicates which chunks a peer currently has buffered and can share. The buffer map message includes the offset (the ID of the first chunk), the length of the buffer map, and a string of zeroes and ones indicating which chunks are available (starting with the chunk designated by the offset).
2 Figure 2 illustrates a buffer map [5]. A peer can request, over a TCP connection, a buffer map from any peer in its current list of peers. After a peer A receives a buffer map from peer B, peer A can request one or more chunks that peer B has advertised in the buffer map. A peer may download chunks from tens of other peers simultaneously. PPLive continually searches for new partners from which it can download chunks. Figure 2, s Buffer Map of PPLive PPLive works in conjunction with a media player (either Windows Media Player or RealPlayer). Figure 3 illustrates the interaction between the PPLive peer software and the media player [5]. The PPLive engine, once having buffered a certain amount of contiguous chunks, launches the media player. The media player then makes a request to the PPLive engine, and the PPLive engine responds by sending video to the media player. The media player buffers the received video; when it has buffered a sufficient amount of video content, it begins to render the video. Figure 3, PPLive Engine and Media Player Traffic Pattern of PPLive (1) PPLive transfer data mainly using UDP, a few TCP; Video Download Policy of PPLive (2) Top ten peers contribute to a major part of the download traffic. The top peer session is quite short comparing to the trace duration. This would suggest that PPLive gets the video from only a few peers at the same time and switches periodically from one peer to another; (3) PPLive can send multiple chunk requests for different chunks to one peer at one time; List Maintenance of PPLive (4) PPLive maintains a constant peer list with relatively small number of peers. [7] 1.2 PPStream System Architecture and Working Flows of PPStream The system architecture and working flows of PPStream is similar to PPLive. Traffic Pattern of PPStream (1) PPStream transfer data mainly using TCP, a few UDP;
3 Video Download Policy of PPStream (2) Top ten peers do not contribute to a large part of the download traffic. This would suggest that PPStream gets the video from many peers at the same time and its peers have long session duration; (3) PPStream does not send multiple chunk requests for different chunks to one peer at one time; List Maintenance of PPStream (4) PPStream maintains a constant peer list with relatively large number of peers. [7] 1.3 SOPCast Traffic Pattern of SOPCast (1) SOPCast transfer data mainly using UDP, a few TCP; Video Download Policy of SOPCast (2) Top ten peers contribute to about half the total download traffic. SOPCast download policy looks like PPLive policy in that it switches periodically from provider peer. However, SOPCast seems to always need more than a peer to get the video compare to PPLive where a single peer could be the only video provider; List Maintenance of SOPCast (3) SOPCast s peer list can be as large as PPStream s one but fluctuates. [7] 1.4 TVAnts Traffic Pattern of TVAnts (1) TVAnts is more balanced between TCP and UDP in data transmission; Video Download Policy of TVAnts (2) Top ten peers contribute to about half the total download traffic (like SOPCast), but top peer does not contribute to a large amount of the total traffic (like PPStream). TVAnts top peer does not contribute as few as PPStream s one but does not stay as long as PPStream top peer; List Maintenance of TVAnts (3) TVAnts peer list is also large and fluctuates. [7] 2 Common Features of P2P Streaming Systems
4 Tracker / DHT (1) (2) (3) (4) (6) (5) New (4) (6) (4) (6) (3) (4) (6) Figure 4, Main Components and Steps of P2P Streaming System The main components of P2P streaming system consist of tracker and peers. The main steps of P2P streaming system are: (1) A new peer registers with tracker / dynamic hash table (DHT) to join the peer group which shares a same channel / media content; (2) Tracker / DHT returns an initial peer list to the new peer; (3) The new peer harvest peer list by gossiping (i.e. exchange peer list) with the peers in the initial peer list to aggregate more peers sharing the channel / media content; (4) The new peer randomly (or with some guide) selects some peers from its peer list to connect and exchange peer information (e.g. buffer map, peer status, etc) with connected peers to know where to get which data; (5) The new peer decides which data should be requested in which order / priority using scheduling algorithm and the peer information obtained in Step (4); (6) The new peer requests the data from some connected peers. 3 Problem Statement of P2P Streaming Protocol 3.1 Need for P2P Streaming Protocol P2P streaming applications attract more and more users to consume video content online [1][2][3][4]. At the instant of VoD, different users watch different parts of the video content so
5 that a peer normally maintains a buffer to share video content with other peers, as introduced in Section 1. At the instant of live content, because all peers are only interested in what is actually happens now, one possible role of a peer is to request video content from live source and then forward the content to more peers, hence reduce the work load of the live source [10]. P2P streaming applications adopt decentralized streaming architecture where the media content is shared among peers who not only download but also upload media content to each other. The advantages of this decentralized streaming architecture include less workload (hence reduced cost) on streaming servers, and better streaming scalability on large number of users. However, most current P2P streaming applications make use of proprietary protocols, which is impossible for various applications (e.g. web services, IPTV, content distribution, etc) to reuse all or part of their components to implement decentralized streaming. Therefore, an open and standard protocol for P2P streaming () defined in IETF would greatly benefit more and more applications through decentralized streaming architecture which enables reduced cost on infrastructure (e.g. media servers) and better scalability on increased number of users. A possible scenario is that in content distribution network (CDN) deployed by content providers, can be used to reduce the streaming load of edge servers and improve the streaming scalability by sharing the media among the users (i.e. peers) as well as the edge servers. CDN Edge Server Figure 5, Scenario Hybrid CDN and P2P Streaming Why not P2PSIP? P2PSIP is IETF WG focusing on the protocols for distributed resource location [12]. However, in P2P streaming, the content information of each peer (e.g. buffer map) is highly
6 dynamic and real-time, which means that simply maintaining these highly dynamic information in the P2PSIP network may cause overload of the latter. Therefore, in P2P streaming, it is better to keep the content information locally in distributed peers and use to discover which peer has which content. Nevertheless, P2PSIP network can be reused to replace the tracker to implement distributed peer registration. 3.2 Scope of P2P Streaming Protocol The basic role of is to discover distributed real-time content in peer-to-peer streaming scenario, i.e. the key of is to find which peer has which content. Based on the survey of P2P streaming systems, the core part of can be a set of signaling protocol to implement the negotiation between peers about: (1) the content information of each peer (e.g. buffer map); (2) any other peer information related to service provisioning. The core part of corresponds to Step (3) and (4) in Section 2 and Step (3) of harvesting peer list could be optional operation. Local Streaming App (MediaID, Start/End Time, etc) Tracker/DHT (s) E.g. HTTP Get Initial List Core Harvest List by Gossip (Optional) Req Content Info (e.g. Buffer Map) Req Any Other Information Data Scheduling Data Transfer Figure 6, Core
7 4, References [1] [2] [3] [4] [5] A Measurement Study of a Large-Scale P2P IPTV System. Xiaojun Hei, Chao Liang, Jian Liang, Yong Liu, Keith Ross. Polytechnic University, NY, USA. [6] A Survey on -to- Video Streaming Systems. Yong Liu, Yang Guo, Chao Liang. Polytechnic University, NY, USA. [7] Measuring P2P IPTV Systems. Thomas Silverston, Olivier Fourmaux. Universit e Pierre et Marie Curie, Paris, France. [8] Challenges, Design and Analysis of a Large-Scale P2P-VoD System. Yan Huang, Tom Z. J. Fu, Dah-Ming Chiu, John C. S. Lui, Cheng Huang. Shanghai Synacast Media Tech., The Chinese University of HongKong, China. [9] Understanding User Behavior in Large-Scale Video-on-Demand Systems. Hongliang Yu, Dongdong Zheng, Ben Y. Zhao, Weimin Zheng. Tsinghua University, China, U.C. Santa Barbara, USA. [10] Adaptive Queue-based Chunk Scheduling for P2P Live Streaming. Yang Guo, Chao Liang, Yong Liu. Thomson Lab, NJ, USA, Polytechnic University, NY, USA. [11] Real Time Streaming Protocol 2.0 (RTSP). Draft-ietf-mmusic-rfc2326bis-18.txt. [12] Resource Location and Discovery (RELOAD). Draft-ietf-p2psip-reload-00.txt.
A Measurement of NAT & Firewall Characteristics in Peer to Peer Systems
A Measurement of NAT & Firewall Characteristics in Peer to Peer Systems L. D Acunto, J.A. Pouwelse, and H.J. Sips Department of Computer Science Delft University of Technology, The Netherlands [email protected]
File. Sharing. File. sharing
ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: P2P Video Delivery with SURFNET For Fast Search Prof. Anuja Zade
Tracker vs. DHT Performance Comparison for P2P Streaming
Tracker vs. DHT Performance Comparison for P2P Streaming draft-hu-ppsp-tracker-dht-performance-comparison Yan Hu, NEC Labs China Yong Xia, NEC Labs China Jan Seedorf, NEC Labs Europe Outline Introduction
Bit Chat: A Peer-to-Peer Instant Messenger
Bit Chat: A Peer-to-Peer Instant Messenger Shreyas Zare [email protected] https://technitium.com December 20, 2015 Abstract. Bit Chat is a peer-to-peer instant messaging concept, allowing one-to-one
Experiment of network services invocation in the Orange testbed The CINA interface
Experiment of network services invocation in the Orange testbed The CINA interface Bertrand Mathieu, Irène Grosclaude, Pierre Paris Orange Labs [email protected] Workshop «Optimisation of Network
DDoS Vulnerability Analysis of Bittorrent Protocol
DDoS Vulnerability Analysis of Bittorrent Protocol Ka Cheung Sia [email protected] Abstract Bittorrent (BT) traffic had been reported to contribute to 3% of the Internet traffic nowadays and the number
The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390
The Role and uses of Peer-to-Peer in file-sharing Computer Communication & Distributed Systems EDA 390 Jenny Bengtsson Prarthanaa Khokar [email protected] [email protected] Gothenburg, May
Giving life to today s media distribution services
Giving life to today s media distribution services FIA - Future Internet Assembly Athens, 17 March 2014 Presenter: Nikolaos Efthymiopoulos Network architecture & Management Group Copyright University of
P2P VoIP for Today s Premium Voice Service 1
1 P2P VoIP for Today s Premium Voice Service 1 Ayaskant Rath, Stevan Leiden, Yong Liu, Shivendra S. Panwar, Keith W. Ross [email protected], {YongLiu, Panwar, Ross}@poly.edu, [email protected]
Optimizing Congestion in Peer-to-Peer File Sharing Based on Network Coding
International Journal of Emerging Trends in Engineering Research (IJETER), Vol. 3 No.6, Pages : 151-156 (2015) ABSTRACT Optimizing Congestion in Peer-to-Peer File Sharing Based on Network Coding E.ShyamSundhar
Final for ECE374 05/06/13 Solution!!
1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -
Hybrid Overlay Multicast Framework draft-irtf-sam-hybrid-overlay-framework-01.txt. John Buford, Avaya Labs Research
Hybrid Overlay Multicast Framework draft-irtf-sam-hybrid-overlay-framework-01.txt John Buford, Avaya Labs Research Topics SAM Charter Recap and Problem Statement AMT(Automatic Multicast Tunneling) Overview
P2P File Sharing: BitTorrent in Detail
ELT-53206 Peer-to-Peer Networks P2P File Sharing: BitTorrent in Detail Mathieu Devos Tampere University of Technology Department of Electronics & Communications Engineering [email protected] TG406 2
HIVE STREAMING. Mikael Högqvist Senior Research Engineer 07/05/14 1
HIVE STREAMING Mikael Högqvist Senior Research Engineer 07/05/14 1 ABOUT PEERIALISM! Founded in 2007 by entrepreneurs and researchers from KTH/SICS! Mix of business people, developers and researchers!
RELOAD Usages for P2P Data Storage and Discovery
RELOAD Usages for P2P Data Storage and Discovery AW2-presentation from Alexander Knauf [email protected] Review Infrastructure Independent Conferencing: Decentralized fashion Multiple conference
Multicast vs. P2P for content distribution
Multicast vs. P2P for content distribution Abstract Many different service architectures, ranging from centralized client-server to fully distributed are available in today s world for Content Distribution
PEER TO PEER FILE SHARING USING NETWORK CODING
PEER TO PEER FILE SHARING USING NETWORK CODING Ajay Choudhary 1, Nilesh Akhade 2, Aditya Narke 3, Ajit Deshmane 4 Department of Computer Engineering, University of Pune Imperial College of Engineering
Product Specification For <Speedlink from Watchy> Version: <2.0> Date: <06/04/15>
Product Specification For Version: Date: Example: Table of Contents 1 Introduction 1.1 Purpose 1.2 Scope 1.3 Overview 1.3.1.1 The technical feature set of Speedlink
AUTOMATED AND ADAPTIVE DOWNLOAD SERVICE USING P2P APPROACH IN CLOUD
IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 2, Issue 4, Apr 2014, 63-68 Impact Journals AUTOMATED AND ADAPTIVE DOWNLOAD
Online Storage and Content Distribution System at a Large-scale: Peer-assistance and Beyond
Online Storage and Content Distribution System at a Large-scale: Peer-assistance and Beyond Bo Li Email: [email protected] Department of Computer Science and Engineering Hong Kong University of Science &
An Introduction to Peer-to-Peer Networks
An Introduction to Peer-to-Peer Networks Presentation for MIE456 - Information Systems Infrastructure II Vinod Muthusamy October 30, 2003 Agenda Overview of P2P Characteristics Benefits Unstructured P2P
1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP.
Chapter 2 Review Questions 1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP. 2. Network architecture refers to the organization of the communication process
Skype characteristics
Advanced Networking Skype Renato Lo Cigno Credits for part of the original material to Saverio Niccolini NEC Heidelberg Skype characteristics Skype is a well known P2P program for real time communications
Peer-to-Peer (P2P) applications, including both P2P streaming and P2P
Description of Working Group Peer-to-Peer (P2P) applications, including both P2P streaming and P2P file-sharing applications, make up a large fraction of traffic in the Internet today. One way to reduce
Reciprocity with Virtual Nodes: Supporting Mobile Nodes in Peer-to- Peer Content Distribution
Reciprocity with Virtual Nodes: Supporting Mobile Nodes in Peer-to- Peer Content Distribution CNSM/SETM Workshop 18.10.2013, Zürich, Switzerland Dipl.-Wirtsch.-Inform. Matthias Wichtlhuber [email protected]
Mobile P2PSIP. Peer-to-Peer SIP Communication in Mobile Communities
Mobile P2PSIP -to- SIP Communication in Mobile Communities Marcin Matuszewski, Esko Kokkonen Nokia Research Center Helsinki, Finland [email protected], [email protected] Abstract This
A Comparative Study of Tree-based and Mesh-based Overlay P2P Media Streaming
A Comparative Study of Tree-based and Mesh-based Overlay P2P Media Streaming Chin Yong Goh 1,Hui Shyong Yeo 1, Hyotaek Lim 1 1 Dongseo University Busan, 617-716, South Korea [email protected], [email protected],
Peer-to-peer data storage software Specification and source code
GLORIA is funded by the European Union 7th Framework Programme (FP7/2007-2013) under grant agreement n 283783 Specification and source code CODE: DEL-050 VERSION: 01 DATE: November 28 th, 2012 Authors:
Measurement Study of Wuala, a Distributed Social Storage Service
Measurement Study of Wuala, a Distributed Social Storage Service Thomas Mager - Master Thesis Advisors: Prof. Ernst Biersack Prof. Thorsten Strufe Prof. Pietro Michiardi Illustration: Maxim Malevich 15.12.2010
Evaluating the Effectiveness of a BitTorrent-driven DDoS Attack
Evaluating the Effectiveness of a BitTorrent-driven DDoS Attack Jurand Nogiec University of Illinois Fausto Paredes University of Illinois Joana Trindade University of Illinois 1. Introduction BitTorrent
An Efficient Server Load Balancing using Session Management
An Efficient Server Load Balancing using Session Management S.Tharani 1, Balika.J.Chelliah 2, Dr.J.Jagadeesan 3 1 M.Tech.Computer Science and Engg, Ramapuram campus, 2 Asst.prof, Ramapuram campus, 3 Prof,
Content Protection in Silverlight. Microsoft Corporation
Content Protection in Silverlight Microsoft Corporation April 2010 Contents Contents...2 Introduction...3 What is Content Protection?... 3 Why Should You Protect Online Content?... 3 Techniques for Protecting
TSIN02 - Internetworking
TSIN02 - Internetworking Lecture 9: SIP and H323 Literature: Understand the basics of SIP and it's architecture Understand H.323 and how it compares to SIP Understand MGCP (MEGACO/H.248) SIP: Protocol
Testing & Assuring Mobile End User Experience Before Production. Neotys
Testing & Assuring Mobile End User Experience Before Production Neotys Agenda Introduction The challenges Best practices NeoLoad mobile capabilities Mobile devices are used more and more At Home In 2014,
Enhancements to Collaborative Media Streaming with IETF Protocols
Enhancements to Collaborative Media Streaming with IETF Protocols Institute of Operating Systems and Computer Networks Technical University of Braunschweig Dagstuhl Seminar - Content Distribution Infrastructures,
Classifying P2P Activity in Netflow Records: A Case Study on BitTorrent
IEEE ICC 2013 - Communication Software and Services Symposium 1 Classifying P2P Activity in Netflow Records: A Case Study on BitTorrent Ahmed Bashir 1, Changcheng Huang 1, Biswajit Nandy 2, Nabil Seddigh
Best Practices for Controlling Skype within the Enterprise > White Paper
> White Paper Introduction Skype is continuing to gain ground in enterprises as users deploy it on their PCs with or without management approval. As it comes to your organization, should you embrace it
Lecture 6 Content Distribution and BitTorrent
ID2210 - Distributed Computing, Peer-to-Peer and GRIDS Lecture 6 Content Distribution and BitTorrent [Based on slides by Cosmin Arad] Today The problem of content distribution A popular solution: BitTorrent
MODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENT
MODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENT Soumya V L 1 and Anirban Basu 2 1 Dept of CSE, East Point College of Engineering & Technology, Bangalore, Karnataka, India
MPLS VPN in Cellular Mobile IPv6 Architectures(04##017)
MPLS VPN in Cellular Mobile IPv6 Architectures(04##017) Yao-Chung Chang, Han-Chieh Chao, K.M. Liu and T. G. Tsuei* Department of Electrical Engineering, National Dong Hwa University Hualien, Taiwan, Republic
Introduction: Why do we need computer networks?
Introduction: Why do we need computer networks? Karin A. Hummel - Adapted slides of Prof. B. Plattner, [email protected] - Add-on material included of Peterson, Davie: Computer Networks February
Using UDP Packets to Detect P2P File Sharing
188 IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.8, August 27 Using UDP Packets to Detect P2P File Sharing Tsang-Long Pao and Jian-Bo Chen Tatung University, Taipei,
Managing Virtual Servers
CHAPTER 4 Content Switching Module Device Manager (CVDM-CSM) displays details of existing virtual servers and enables users to perform detailed tasks that include creating or deleting virtual servers,
VIDEOCONFERENCING. Video class
VIDEOCONFERENCING Video class Introduction What is videoconferencing? Real time voice and video communications among multiple participants The past Channelized, Expensive H.320 suite and earlier schemes
Computer Networks. Examples of network applica3ons. Applica3on Layer
Computer Networks Applica3on Layer 1 Examples of network applica3ons e- mail web instant messaging remote login P2P file sharing mul3- user network games streaming stored video clips social networks voice
Krunal Patel Department of Information Technology A.D.I.T. Engineering College (G.T.U.) India. Fig. 1 P2P Network
Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure Peer-to-Peer
Research on P2P-SIP based VoIP system enhanced by UPnP technology
December 2010, 17(Suppl. 2): 36 40 www.sciencedirect.com/science/journal/10058885 The Journal of China Universities of Posts and Telecommunications http://www.jcupt.com Research on P2P-SIP based VoIP system
LIVE VIDEO STREAMING USING ANDROID
LIVE VIDEO STREAMING USING ANDROID Dharini Chhajed 1, Shivani Rajput 2 and Sneha Kumari 3 1,2,3 Department of Electronics Engineering, Padmashree Dr. D. Y. Patil Institute of Engineering and Technology,
IPTV and Internet Television
IPTV and Internet Television [Salke Hartung] Institute for Computer Science University of Göttingen, Göttingen, Germany Email: [[email protected]] September 29, 2008 Abstract Since it has been invented
An Optimization Model of Load Balancing in P2P SIP Architecture
An Optimization Model of Load Balancing in P2P SIP Architecture 1 Kai Shuang, 2 Liying Chen *1, First Author, Corresponding Author Beijing University of Posts and Telecommunications, [email protected]
Highly Available Mobile Services Infrastructure Using Oracle Berkeley DB
Highly Available Mobile Services Infrastructure Using Oracle Berkeley DB Executive Summary Oracle Berkeley DB is used in a wide variety of carrier-grade mobile infrastructure systems. Berkeley DB provides
Alcatel-Lucent Targeted and Interactive IPTV Advertising Solution
Alcatel-Lucent Targeted and Interactive IPTV Advertising Solution Leverage IP networks to revolutionize the TV ad model and enhance the viewing experience As advertisers turn toward new digital media to
RWC4YD3S723QRVHHHIZWJXPTQMO6GKEQR
Try it now: We have setup a Sync folder in the BitTorrent office that contains 1.1GB of BitTorrent Featured Content. You are welcome to sync with it by using the following secret key: RWC4YD3S723QRVHHHIZWJXPTQMO6GKEQR
SHORT DESCRIPTION OF THE PROJECT...3 INTRODUCTION...4 MOTIVATION...4 Session Initiation Protocol (SIP)...5 Java Media Framework (JMF)...
VoIP Conference Server Evgeny Erlihman [email protected] Roman Nassimov [email protected] Supervisor Edward Bortnikov [email protected] Software Systems Lab Department of Electrical
SERIES H: AUDIOVISUAL AND MULTIMEDIA SYSTEMS Infrastructure of audiovisual services Communication procedures
I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU Technical Paper (11 July 2014) SERIES H: AUDIOVISUAL AND MULTIMEDIA SYSTEMS Infrastructure
User Guide FOR TOSHIBA STORAGE PLACE
User Guide FOR TOSHIBA STORAGE PLACE (This page left blank for 2-sided "book" printing.) Table of Contents Overview... 5 System Requirements... 5 Storage Place Interfaces... 5 Getting Started... 6 Using
P2P: centralized directory (Napster s Approach)
P2P File Sharing P2P file sharing Example Alice runs P2P client application on her notebook computer Intermittently connects to Internet; gets new IP address for each connection Asks for Hey Jude Application
IPTV and IMS in Next-generation Networks
S T R A T E G I C W H I T E P A P E R IPTV and IMS in Next-generation Networks Choosing the right approach for IPTV integration IPTV is the next frontier for multimedia information and entertainment over
Advanced Internetworking
Advanced Internetworking Lab 5 - Multimedia networking rev 1.0 Markus Hidell Voravit Tanyingyong Royal Institute of Technology (KTH) Telecommunication Systems Lab (TSlab)
Peer to Peer Proxy based IPTV Services
Peer to Peer Proxy based IPTV Services Shiddhartha Raj Bhandari, Gyu Myoung Lee, and Noel Crespi Department of Wireless Networks and Multimedia Services Institute TELECOM, TELECOM SudParis 9 rue Charles
Interoperability of Peer-To-Peer File Sharing Protocols
Interoperability of -To- File Sharing Protocols Siu Man Lui and Sai Ho Kwok -to- (P2P) file sharing software has brought a hot discussion on P2P file sharing among all businesses. Freenet, Gnutella, and
PEER-TO-PEER LIVE STREAMING AND VIDEO ON DEMAND DESIGN ISSUES AND ITS CHALLENGES
PEER-TO-PEER LIVE STREAMING AND VIDEO ON DEMAND DESIGN ISSUES AND ITS CHALLENGES Hareesh.K 1 and Manjaiah D.H 2 1 Research Scholar, Jawaharlal Nehru Technological University, Anantapur, A.P, India [email protected]
How To Understand The Power Of A Content Delivery Network (Cdn)
Overview 5-44 5-44 Computer Networking 5-64 Lecture 8: Delivering Content Content Delivery Networks Peter Steenkiste Fall 04 www.cs.cmu.edu/~prs/5-44-f4 Web Consistent hashing Peer-to-peer CDN Motivation
An apparatus for P2P classification in Netflow traces
An apparatus for P2P classification in Netflow traces Andrew M Gossett, Ioannis Papapanagiotou and Michael Devetsikiotis Electrical and Computer Engineering, North Carolina State University, Raleigh, USA
File sharing using IP-Multicast
File sharing using IP-Multicast Kai Trojahner, Peter Sobe University of Luebeck, Germany Institute of Computer Engineering email: [email protected] Abstract: File sharing systems cause a huge portion
Network setup and troubleshooting
ACTi Knowledge Base Category: Troubleshooting Note Sub-category: Network Model: All Firmware: All Software: NVR Author: Jane.Chen Published: 2009/12/21 Reviewed: 2010/10/11 Network setup and troubleshooting
P2P@Clouds Converging P2P with clouds towards advanced real time media distribution architectures.
Building service testbeds on FIRE P2P@Clouds Converging P2P with clouds towards advanced real time media distribution architectures. Nikolaos Efthymiopoulos, Athanasios Christakidis, Loris Corazza, Spyros
Peer-to-peer filetransfer protocols and IPv6. János Mohácsi NIIF/HUNGARNET TF-NGN meeting, 1/Oct/2004
-to-peer filetransfer protocols and IPv6 János Mohácsi NIIF/HUNGARNET TF-NGN meeting, 1/Oct/2004 Motivation IPv6 traffic is
Evolution of Peer-to-Peer Systems
EE 657 Lecture 9 on Sept. 28, 2007 Evolution of Peer-to-Peer Systems Peer-To-Peer Computing: Part 1 : P2P Platforms, Overlay Networks, and Gnutella Prof. kai Hwang University of Southern California Taylor
VoIP QoS. Version 1.0. September 4, 2006. AdvancedVoIP.com. [email protected] [email protected]. Phone: +1 213 341 1431
VoIP QoS Version 1.0 September 4, 2006 AdvancedVoIP.com [email protected] [email protected] Phone: +1 213 341 1431 Copyright AdvancedVoIP.com, 1999-2006. All Rights Reserved. No part of this
Session Initiation Protocol (SIP) The Emerging System in IP Telephony
Session Initiation Protocol (SIP) The Emerging System in IP Telephony Introduction Session Initiation Protocol (SIP) is an application layer control protocol that can establish, modify and terminate multimedia
