Multimedia transmission in a managed P2P network: making sense?

Size: px
Start display at page:

Download "Multimedia transmission in a managed P2P network: making sense?"

Transcription

1 Multimedia transmission in a managed P2P network: making sense? L. Xu 1, A. Ksentini 2, K. Singh 1, G. Rubino 1, G. Straub 3, Y. L Azou 4 1 INRIA Rennes - Bretagne Atlantique, Rennes, France; 2 IRISA-University of Rennes 1, Rennes, France; 3 Thomson, Rennes, France, 4 France Telecom, Lannion, France Letian.Xu@irisa.fr; adlen.ksentini@irisa.fr, kamal.singh@irisa.fr, rubino@irisa.fr, gilles.straub@thomson.net, yves.lazou@orange-ftgroup.com Abstract: The peer-to-peer (P2P) paradigm has recently gained tremendous attraction and is widely used for content distribution and file sharing. In this context, digital media companies have recently started embracing peer-assisted distribution networks as an alternative to traditional Client/Server architectures. P2P systems can ensure a fast and scalable delivery of media content. However they suffer from the total absence of control on content distribution as they are running on PCs and are managed by users themselves. Users PCs are unsecure, unmonitored, and almost impossible to control by a service or network provider. One solution to this problem is to use Managed P2P networks, where devices included in the P2P networks are controlled by the provider. In this paper, we illustrate the benefit from using such a Managed P2P system in the context of VoD distribution within an IPTV network. For this purpose, we compare the performance of VoD service based on the classical Client/Server model and a Managed P2P solution. The results obtained can be considered as a first insight on the interest of deploying P2P architectures inside managed networks. Keywords: P2P, Managed Networks, VoD, Multimedia,CDN 1 INTRODUCTION Multimedia services are expected to be a significant source of revenue for service providers as their demand is rapidly increasing with the explosive growth of Internet. Video on Demand (VoD) services are among the most popular multimedia applications. They allow users to watch any movie (in some data base) at any given time. Observe that a high bandwidth is required to watch a good quality movie. When the total number of clients increases, the total number of required VoD servers, that are costly devices, also increases. This makes classical Client/Server solutions cost-ineffective. As the demand grows, more servers must be added to the system, which means more cost, changes, bring also more costs on maintenance, etc. Peer-to-peer (P2P) systems can be a solution to the above problem because they inherently have the property of scalability. In a P2P network, each client acts as a server and other clients can download data from him. This means that when the number of clients increases, then the number of available servers, that are actually also clients acting as servers, also increases, without necessarily changing the number of actual VoD servers. Moreover, clients (called also peers in this context), can also utilize the unused upload bandwidth of other clients acting as servers. This decreases the load on the VoD servers and thus, theoretically at least, with P2P systems the requirements in terms of VoD servers and bandwidth capacity of service providers are reduced. This can significantly diminish the deployment cost of these VoD services, which in turn mean low costs for end users and possibly an increase of their overall popularity. Nevertheless, the efficient design of a P2P system for VoD is not a trivial task, given the constraints to satisfy in order to operate with efficiency enough and to achieve those theoretical gains. At present, video services are distributed either over public networks or over private networks that we call here managed networks. In the latter, unlike public network that offers only Best-Effort service, the service provider can control the system in many ways. Furthermore, multicast routing is often enabled on private networks for live TV transmission. For instance, when telecom operators provide triple play services, they deliver video services over private managed networks using multicast IP. If the interest for P2P on public networks is obvious for live TV transmission (due to the absence of multicast routing on the public network), it may be less evident in the case of a managed network. Therefore the interest of P2P for managed networks can only reside in unicast services such as in VoD, by decreasing the deployment cost. Observe that we are addressing here only the basic service, movies distribution; for more intelligent services (e.g., time shifting) other factors may make P2P systems very attractive. In this paper we discuss about basic benefits from using P2P ideas over Managed networks in the context of VoD distribution. We compare the performance of a VoD service when using the classical Client/Service and a Managed P2P version. This paper is organized as follows. Section 2 gives some background on P2P architectures as well as a brief description on their use for multimedia applications. Section 3 introduces the concept of managed P2P networks. Section 4 compares the performances of VoD distribution when using Managed P2P systems and Client/Server architectures. We conclude the paper in Section 5. 2 MULTIMEDIA SERVICES OVER P2P Multimedia services using the P2P paradigm are gaining popularity over the Internet. Not only VoD, but live streaming Corresponding author: Ksentini, IRISA-University of Rennes 1, Campus Universitaire de Beaulieu, Rennes (France), , adlen.ksentini@irisa.fr

2 services like IPTV are using P2P today. We describe some of these applications in this section. Figure 1. Single-Source P2P streaming model For providing multimedia content, two types of network architectures are usually possible. A single source architecture (see Figure 1) means that each peer downloads the multimedia content from only one source. Of course these downloading peers can also act as sources for other peers, but no more than one source will be proving content to a given client. A single source architecture was initially proposed by Peercast [1]. Peercast was created in 2002 and is the first application to allow users to broadcast their own content using P2P. PeerTV [2], created in 2006, also uses a single-source architecture and relies on the Peercast protocol. Figure 2. Multiple-Source P2P streaming model Multiple sources architectures (see Figure 2) are used when several source peers offer the content to one peer. In this case, the content is divided into several pieces and these pieces are forwarded in the network. In other words, a peer gets the multimedia content from different peers and sends itin turn to one or many client peers. This kind of architecture is used for instance by PPLive [3] and other applications described below. PPLive is a proprietary application already deployed at a large scale, and is today the most popular live TV system over the Internet. Some information about the way it works has been obtained through measurements and by looking at the PPLive messages. It encodes the videos and divides it into chunks. The peers upload and download different chunks from other peers. In order to ensure a smooth play out of the video, PPLive uses a combination of two buffers that store the incoming data in order to handle bandwidth variations in the Internet. In spite of this, play-out interruptions can not always avoided because of those frequent changes in the available bandwidth Scribe and SplitStream are both application-layer group communication systems developed by Microsoft Research. SplitStream, as indicated in its name, splits a multicast video stream into many stripes, and transmits them in a forest like multicast path. Joost [4] is the new P2P application by the creators of Kazaa and Skype, formerly known as the Venice project. It is a P2P video streaming application allowing accessing to TV channels for free, even if up to now, the number of channels is limited and the broadcasted content is not live. But this may change because Joost is signing agreements with major broadcasting companies. Joost is a streaming application only. Users can not download or store content on their hard-disk and is a P2P application because clients can get data from other peers. However, some fixed nodes are also present in the network architecture. Joost works then like a CDN (Content Distribution Networks) network augmented with P2P facilities when the content is popular and well distributed. PULSE is a peer-to-peer live streaming system designed to operate in scenarios where the nodes bandwidth resources can be highly heterogeneous and variable over time, such as today s Internet. To support such real-life network conditions, one has to carefully think over the quality vs. timeliness tradeoff. In the past, the system designer s attention has been primarily focused on timeliness. Striving to obtain the lowest possible latencies often resulted in simple structured system designs, where tree-based overlays were built following some optimizing criteria: since trees scale well with respect to maximum path lengths and node placements, they can be optimized with respect to bandwidth or latency. Media quality, however, suffers when node instability is present, as it happens when there are rapid variations in the population due to node arrivals or departures. 3 FROM UNMANAGED P2P TO MANAGED P2P One problem with the P2P model is the total absence of control on content distribution as it is managed by users themselves. Users devices are unsecure, unmonitored, and almost impossible to control by a service or network provider. With P2P, traditional telecom operators see their role relegated to Internet connectivity providers and are left out of the loop of content distribution business. On the other hand, content owners (such as TV broadcasters, Movie studios, game designers) see in P2P a content distribution solution tinted with a piracy history, and not able to ensure the service level guarantees they demand. In general P2P applications suffer from a number of problems: - Very inefficient use of network resources (the overlay built by the peers is not optimized taking into account the underlay, i.e. the actual network), and consequently very poor performance. The uplink access bandwidth dramatically impacts uploading performance because of the P2P incentive model to share content.

3 - Lack of service guarantees due to uncontrolled interference between the different applications, which often results in poor quality for P2P-based applications such as live video streaming or even telephony. - Absence of security and control that makes it impossible to guarantee the integrity and security of the content, which limits the quality and the diversity of available content. With respect to Content Distribution, P2P has probably been mostly successful so far in terms of data volume distributed. This lies in the fact that the content distribution efforts are shared across all computers at the edge of the network, and that it does not require the deployment of expensive and complex servers. However, the success of P2P has also been the cause of most of its difficulties. Current P2P systems operate over non-managed, non-trusted end-user PCs, which have produced a myriad of security, piracy, privacy, and poor end-user experience problems. In particular: (i) P2P performance is unpredictable. Content is not easily available where it is mostly needed, no SLAs can be provided to content providers, user links are congested as P2P downloaders are encouraged to serve many people to get access to more content, etc; (ii) P2P systems became popular carrying illegal content. As a consequence, most people associate with peerto-peer traffic the idea of illegal traffic. This language abuse makes ISPs and content providers reluctant to adopt this content distribution technology; (iii) It is happening in a noncohesive and non-standardised way; (iv) ISPs do not participate in the P2P cycle and cannot monetize the usage of P2P services. P2P networks are not optimised to be ISP friendly. All this can change if industry decides to build on P2P technology and to use it as a new content distribution paradigm. Defining a managed P2P system by implementing a fully distributed solution on devices controlled by a telecom operator will bring the following advantages: - Core technology runs on managed devices now controlled by a carrier or a virtual ISP. - Always On devices and stable topologies can be thus available. - Resources can be allocated in a distributed manner without worrying about preventing free-riders, etc. - A controlled platform reduces piracy risks. - A controlled infrastructure leads to lower costs and increased network robustness. - ISPs can be allowed to enter the content distribution loop, offering better QoS, billing, managed services, etc. - Better understanding and exploitation of user preferences: such information is used to better position content (including publicity). - Allows ISPs to do troubleshooting. The Internet Gateway is the best place to host a peer to peer client, because it is always on and under the control of the operator. It is not an open platform (as the PC is), therefore reducing piracy risks is feasible. In the sequel, we show that using P2P networks for other situations than distributing illegal content is possible. Rather than being only Internet connectivity provider, network provider can thus participate to content distribution business by proposing Multimedia services over Managed P2P. For instance, P2P can be used in managed networks (also called IPTV networks) to distribute unicast IPTV services such as VoD, or catch-up TV in a secure manner, with low cost and high performances. Catch-up TV consists in making available in a VoD server some TV programs that have been already broadcasted. When a user missed a dedicated show because he was not at home, he can get it later on using this catch-up TV service. Catch-up TV is also a unicast service that if often made available both on Open Internet and on managed networks. In the rest of the document we restrict ourselves to the VoD application even if this is applicable to other unicast IPTV services. 4 VOD DISTRIBUTION: MANAGED P2P VERSUS CLIENT/SERVER In this section, we compare the performance of VOD services when using Managed P2P and Unicast transmission. By Unicast transmission, we mean a classical Client/Server architecture. To capture the performances of VOD service when using Unicast we draw very simple mathematical models. For the Managed P2P however, we use simulation results by means of ns2 (Network Simulator 2) tool [5]. 4.1 VOD distribution with unicast transmission To draw the performance of the Unicast model we use the following notation and simplifying assumptions: - N is the number of clients, - B is the bandwidth of the source, in Mbps, - D is the download bandwidth of the customers, in Mbps, assumed to be the same for all clients. Using UDP transmission, the number of clients served by one VOD server is simply: where Int(x) denotes the integer part of x. Here, we consider only server s network capacity; no attention will be given to the computational capacity of the VOD server. The time T spent by a VOD user to download the whole file to all the clients (simultaneously) is Based on (1) and (2) we draw the performance of VOD when using the classical Client/Server architecture (see below). (1) (2)

4 4.2 VOD distribution with Managed P2P Concerning the performance of a VoD service in Managed P2P, we used the BitTorrent protocol. This protocol [6] is proposed with the objective to disseminate one large file (or a composition of large files) to a large number of users in an efficient way. Therefore, for each file an overlay network is created. The file sharing is based on the swarming principle, which is also denoted as multi-source download. The file of interest is fragmented into chunks. When a peer completes the download of a single chunk, it offers it to other peers which so far have not downloaded it. Thus, peers exchange chunks with each other although they did not finish downloading the complete file. Therefore, the resources in the P2P network are used more efficiently and the network also scales for large peer populations with respect to download time. According to the original BitTorrent specification, each overlay network consists of two different kinds of peers, the seeds and the leechers, and a so-called tracker. A seed holds the complete file and uploads it to others altruistically, whereas a leecher is still downloading the file. The tracker is a centralized component which stores information about all peers. A new peer, which enters the network, asks the tracker for a list of active peers in the overlay. The tracker returns a random subset to the requesting peers. Furthermore, an active peer contacts the tracker from time to time to obtain information about new peers in the network. An extension of the protocol also incorporates the exchange of information about other peers in the network between connected peers. This is often stated as trackerless BitTorrent. In the BitTorent model, we assume that a VoD server is represented by one seeder, and the managed clients is represented by leechers. Since we are in a Managed P2P network, the clients can be forced to stay in the overlay network for serving other peers despite the fact that they finished downloading the required file. For our simulation, we used the ns2 BitTorrent model available in [7]. 4.3 Network model and parameters The network model and parameters were provided by France Telecom * using some available data. Generaly speaking, internet access network is divided in several parts, see [8]: Customer Premises Network, Access & Aggregation Network, and Regional Broadband Network. Over this topology, PPP protocol is widely used as a way to access internet: this protocol conveys client's packets towards a termination point in a BRAS (Broadband Remote Access Server). BRAS equipment is often located with VoD servers in a place called PoP (Point Of Presence), at the edge of Access & Aggregation and Regional networks. Several PoPs are cleverly spread in the network. Based on the assumption that the bottleneck of the network is at the access links of the users (typically ADSL loop line) and not at the routers in the rest of the network, we simplify the topology as a star model shown in Figure 3. The central Router stands for the BRAS and the PoP location. * French Service/Network Provider The bandwidth B of the source is B = 100 Mbps. The clients are connected to a router through an asymmetric link, where the download bandwidth D is equal to 2 Mbps, which is used by a wide range of ADSL clients. The size of the file is equal to 100 Mb. For exploring the P2P network s behaviour, we developed three simulation models. In the first model, the P2P architecture operates at the TCP-level; the TCP behaviour is thus taken into account in the simulations. The uploading bandwidth of each peer application, including the seeds, is uniformly distributed on a range going from 64 kbps to 1024 kbps. These values are based on BitTorrent software, where users can limit it upload capacity. The second model for the simulations neglects the TCP behaviours and considers only the application-layer (peer layer). It also fixes the uploading capacity of each peer, which is much closer to the situation that can be encountered in a managed network. While in the TCP-level simulations, all the messages are handled by the TCP agents, in the simulations of this second model, the control messages are delivered directly to the receiver whereas the PIECE messages are queued in an upload queue. These PIECE messages are specific to the BitTorrent protocol, and they are used to inform the other peers that a piece of file is proposed to download. So, in this model, all the peers use the managed uploading capacity of 0.5 Mbps, and the seeds use the managed uploading capacity of 100 Mbps, for example, which makes the downloading time less than that of TCP-level simulations. Figure 3. Network Model The third model simulates the leaving and joining behaviours of the peers in a P2P network. In previous simulations, all the peers were fixed and not allowed to leave until the last one finished its downloading. In this third case we added a module to the simulator, in order to control the peers activities. Through this controller, we were able to control the percentage of the peers who leave and rejoin the P2P overlay, and the active mean time (AMT) and inactive mean time (IMT). The active mean time is the mean duration of time interval during which a peer stays connected. The inactive

5 mean time is the corresponding average duration of the disconnection periods. For the Unicast model we used equations (1) and (2). 4.4 Results Our target was to measure the global downloading time T in which all the peers finish downloading. This is a good metric for evaluating the scalability of both architectures (Managed P2P and Unicast). performance doesn t deteriorate when the number of peers increase, which shows the good scalability of the P2P networks. Note the presence of a crossing point between the Client/Server version and the P2P one, showing that Unicast performs better for low values of N. We argue this behaviour by the fact that: (i) Unicast-based model uses UDP, which represents its best-case situation; (ii) TCP dynamics decreases the performance of P2P as compared with UDP used by Unicast Unicast with UDP (theoretical) 100 Peers 200 Peers 300 Peers Download Time (s) with randomness model Number of Peers Figure 4. Download Time (T) of P2P compared to Unicast (Client/Server) Figure 4 presents the download time of the first simulated P2P model compared with that obtained with Unicast. Figure 5. Download Time (T) of application-level compared with that of Unicast In this P2P simulation model, peers never leave the managed network. Different simulations were done. For each run we increased the number of peers (clients) N, while using the same file size (100 MB). For a point m in the x-axis, the corresponding point T(m) in the y-axis is the download time of the m th client to get the file. It is clearly seen that P2P Figure 6. Download Time (T) of application-level P2P compared to that of the Unicast (Client/Server) version In the second model, we assumed that the routing is done at the application level, and that the normal peers uploading capacity is fixed at 0.5 Mbps, while the seeds uploading capacity is fixed at 100 Mbps. The obtained results are shown in Figure 5. Compared to the first model, we can observe that when the number of peers is less than 150, the peers have almost the same downloading time as with Unicast; for larger populations, the P2P version achieves much better scalability, illustrating again how P2P-based VoD transmission achieves better results than an Unicast-based solution. The third model s aim is to study P2P s dynamics, especially with respect to leaving and joining behaviour. As an input, we have 1500 seconds of active mean time, 50 seconds of inactive mean time and 10% of the peers having this behaviour. This dynamics is studied using the TCP-level simulations that have uniform distribution for uploading bandwidths. The results are shown in Figure 6. The peak in the curves corresponds to the downloading time of those clients who left before finishing and then came back. Most of clients have a downloading time with low variability with values similar to the previous ones. This model of simulation corresponds to a non-managed P2P network, where the clients are not controlled. Thus, compared to Figure 4 which shows a completely Managed P2P, we notice that besides ensuring a Of course, this is just an illustration

6 secure P2P system, managed P2P networks can achieve better results than non-managed P2P and Unicast ones. 5 CONCLUSION In this paper, we investigated the performance of transmitting multimedia Unicast services, particularly VoD (or catch-up TV), over managed P2P networks. By Managed P2P, we meant P2P network where devices (peers) are under Service Provider control. The BitTorrent protocol was used to implement the managed P2P architecture in the simulations, and this protocol was compared to Client/server architecture for distributing VoD services. The obtained results clearly show the gain achieved when using managed P2P over Unicast transmission in terms of download time and system scalability, where managed P2P performance remains independent from the amount of concurrent demand even for huge number. Thus, a natural response to the question P2P in a managed network: making sense? is yes, but only when there are many clients in the system. Acknowledgement This Work has been done within the P2Pim@ges project, funded by the DGE and the Pôle de compétivité Images et Réseaux working in the French Brittany area. References [1] Peercast, http// [2] PeerLive, [3] PPLive, http// [4] Joost, [5] Network Simulator 2, [6] Bittorrent Protocol Specification v [7] Bitorent module for ns2, [8] DSL Forum TR-101 "Migration to Ethernet-Based DSL Aggregation", April 2006

Experiment of network services invocation in the Orange testbed The CINA interface

Experiment of network services invocation in the Orange testbed The CINA interface Experiment of network services invocation in the Orange testbed The CINA interface Bertrand Mathieu, Irène Grosclaude, Pierre Paris Orange Labs bertrand2.mathieu@orange.com Workshop «Optimisation of Network

More information

Peer-to-Peer Networks. Chapter 6: P2P Content Distribution

Peer-to-Peer Networks. Chapter 6: P2P Content Distribution Peer-to-Peer Networks Chapter 6: P2P Content Distribution Chapter Outline Content distribution overview Why P2P content distribution? Network coding Peer-to-peer multicast Kangasharju: Peer-to-Peer Networks

More information

LIVE VIDEO STREAMING USING ANDROID

LIVE VIDEO STREAMING USING ANDROID LIVE VIDEO STREAMING USING ANDROID Dharini Chhajed 1, Shivani Rajput 2 and Sneha Kumari 3 1,2,3 Department of Electronics Engineering, Padmashree Dr. D. Y. Patil Institute of Engineering and Technology,

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

1Multimedia Networking and Communication: Principles and Challenges

1Multimedia Networking and Communication: Principles and Challenges 1Multimedia Networking and Communication: Principles and Challenges Mihaela van der Schaar and Philip A. Chou In case you haven t noticed, multimedia communication over IP and wireless networks is exploding.

More information

Giving life to today s media distribution services

Giving life to today s media distribution services Giving life to today s media distribution services FIA - Future Internet Assembly Athens, 17 March 2014 Presenter: Nikolaos Efthymiopoulos Network architecture & Management Group Copyright University of

More information

University of Würzburg, Institute of Computer Science, Research Report Series

University of Würzburg, Institute of Computer Science, Research Report Series University of Würzburg Institute of Computer Science Research Report Series Investigation of chunk selection strategies in peer-assisted video-on-demand systems Tobias Hoßfeld, Simon Oechsner, Frank Lehrieder,

More information

Region 10 Videoconference Network (R10VN)

Region 10 Videoconference Network (R10VN) Region 10 Videoconference Network (R10VN) Network Considerations & Guidelines 1 What Causes A Poor Video Call? There are several factors that can affect a videoconference call. The two biggest culprits

More information

IPTV and Internet Television

IPTV and Internet Television IPTV and Internet Television [Salke Hartung] Institute for Computer Science University of Göttingen, Göttingen, Germany Email: [salke.hartung@gmail.com] September 29, 2008 Abstract Since it has been invented

More information

From IPTV to mobiletv and OTTV *TV. From IPTV to mobile TV and over-the-top TV. Alessandro Bogliolo

From IPTV to mobiletv and OTTV *TV. From IPTV to mobile TV and over-the-top TV. Alessandro Bogliolo *TV From IPTV to mobile TV and over-the-top TV Alessandro Bogliolo Foreword Internet video traffic (not including P2P): in 2010 reached 40% of cons. traffic (more than P2P) in 2012 it will reach 50% In

More information

The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390

The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390 The Role and uses of Peer-to-Peer in file-sharing Computer Communication & Distributed Systems EDA 390 Jenny Bengtsson Prarthanaa Khokar jenben@dtek.chalmers.se prarthan@dtek.chalmers.se Gothenburg, May

More information

Per-Flow Queuing Allot's Approach to Bandwidth Management

Per-Flow Queuing Allot's Approach to Bandwidth Management White Paper Per-Flow Queuing Allot's Approach to Bandwidth Management Allot Communications, July 2006. All Rights Reserved. Table of Contents Executive Overview... 3 Understanding TCP/IP... 4 What is Bandwidth

More information

AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK

AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Abstract AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Mrs. Amandeep Kaur, Assistant Professor, Department of Computer Application, Apeejay Institute of Management, Ramamandi, Jalandhar-144001, Punjab,

More information

Secured Voice over VPN Tunnel and QoS. Feature Paper

Secured Voice over VPN Tunnel and QoS. Feature Paper Secured Voice over VPN Tunnel and QoS Feature Paper Table of Contents Introduction...3 Preface...3 Chapter 1: The Introduction of Virtual Private Network (VPN) 3 1.1 The Functions and Types of VPN...3

More information

Content Distribution over IP: Developments and Challenges

Content Distribution over IP: Developments and Challenges Content Distribution over IP: Developments and Challenges Adrian Popescu, Blekinge Inst of Technology, Sweden Markus Fiedler, Blekinge Inst of Technology, Sweden Demetres D. Kouvatsos, University of Bradford,

More information

Octoshape. Introducing. a new technology for large-scale streaming over the Internet. Scale and cost problems are the spoilers

Octoshape. Introducing. a new technology for large-scale streaming over the Internet. Scale and cost problems are the spoilers Octoshape Introducing a new technology for large-scale streaming over the Internet Stephen Alstrup and Theis Rauhe Octoshape The popularity of live streaming over the Internet is growing. The number of

More information

Three Key Design Considerations of IP Video Surveillance Systems

Three Key Design Considerations of IP Video Surveillance Systems Three Key Design Considerations of IP Video Surveillance Systems 2012 Moxa Inc. All rights reserved. Three Key Design Considerations of IP Video Surveillance Systems Copyright Notice 2012 Moxa Inc. All

More information

P2P: centralized directory (Napster s Approach)

P2P: centralized directory (Napster s Approach) P2P File Sharing P2P file sharing Example Alice runs P2P client application on her notebook computer Intermittently connects to Internet; gets new IP address for each connection Asks for Hey Jude Application

More information

Traffic load and cost analysis for different IPTV architectures

Traffic load and cost analysis for different IPTV architectures Traffic load and cost analysis for different IPTV architectures SKENDER RUGOVA, ARIANIT MARAJ Post and Telecommunication of Kosova-PTK Dardania, p.nr., Prishtina, Republic of Kosova Skender.rugova@ptkonline.com,

More information

Multicast vs. P2P for content distribution

Multicast vs. P2P for content distribution Multicast vs. P2P for content distribution Abstract Many different service architectures, ranging from centralized client-server to fully distributed are available in today s world for Content Distribution

More information

References and Requirements for CPE Architectures for Data Access

References and Requirements for CPE Architectures for Data Access Technical Report TR-018 References and Requirements for CPE Architectures for Data Access March 1999 '1999 Asymmetric Digital Subscriber Line Forum. All Rights Reserved. ADSL Forum technical reports may

More information

The Feasibility of Supporting Large-Scale Live Streaming Applications with Dynamic Application End-Points

The Feasibility of Supporting Large-Scale Live Streaming Applications with Dynamic Application End-Points The Feasibility of Supporting Large-Scale Live Streaming Applications with Dynamic Application End-Points Kay Sripanidkulchai, Aditya Ganjam, Bruce Maggs, and Hui Zhang Instructor: Fabian Bustamante Presented

More information

Evaluating the Effectiveness of a BitTorrent-driven DDoS Attack

Evaluating the Effectiveness of a BitTorrent-driven DDoS Attack Evaluating the Effectiveness of a BitTorrent-driven DDoS Attack Jurand Nogiec University of Illinois Fausto Paredes University of Illinois Joana Trindade University of Illinois 1. Introduction BitTorrent

More information

Protocols. Packets. What's in an IP packet

Protocols. Packets. What's in an IP packet Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets

More information

Intelligent Content Delivery Network (CDN) The New Generation of High-Quality Network

Intelligent Content Delivery Network (CDN) The New Generation of High-Quality Network White paper Intelligent Content Delivery Network (CDN) The New Generation of High-Quality Network July 2001 Executive Summary Rich media content like audio and video streaming over the Internet is becoming

More information

From Centralization to Distribution: A Comparison of File Sharing Protocols

From Centralization to Distribution: A Comparison of File Sharing Protocols From Centralization to Distribution: A Comparison of File Sharing Protocols Xu Wang, Teng Long and Alan Sussman Department of Computer Science, University of Maryland, College Park, MD, 20742 August, 2015

More information

Improving Deployability of Peer-assisted CDN Platform with Incentive

Improving Deployability of Peer-assisted CDN Platform with Incentive Improving Deployability of Peer-assisted CDN Platform with Incentive GLOBECOM 2009 Dec 2, 2009 Tatsuya Mori, Noriaki Kamiyama, Shigeaki Harada, Haruhisa Hasegawa, and Ryoichi Kawahara NTT Service Integration

More information

NETWORK ISSUES: COSTS & OPTIONS

NETWORK ISSUES: COSTS & OPTIONS VIDEO CONFERENCING NETWORK ISSUES: COSTS & OPTIONS Prepared By: S. Ann Earon, Ph.D., President Telemanagement Resources International Inc. Sponsored by Vidyo By:S.AnnEaron,Ph.D. Introduction Successful

More information

Implementation of a Video On-Demand System For Cable Television

Implementation of a Video On-Demand System For Cable Television Implementation of a Video On-Demand System For Cable Television Specific VOD Implementation for one way networks This white paper is co-authored by: Teleste Oyj Edgeware AB 1(18) TABLE OF CONTENTS Confidentiality

More information

Should Internet Service Providers Fear Peer-Assisted Content Distribution?

Should Internet Service Providers Fear Peer-Assisted Content Distribution? Should Internet Service Providers Fear Peer-Assisted Content Distribution? Thomas Karagiannis, UC Riverside Pablo Rodriguez, Microsoft Research Cambridge Konstantina Papagiannaki, Intel Research Cambridge

More information

TRUFFLE Broadband Bonding Network Appliance BBNA6401. A Frequently Asked Question on. Link Bonding vs. Load Balancing

TRUFFLE Broadband Bonding Network Appliance BBNA6401. A Frequently Asked Question on. Link Bonding vs. Load Balancing TRUFFLE Broadband Bonding Network Appliance BBNA6401 A Frequently Asked Question on Link Bonding vs. Load Balancing LBRvsBBNAFeb15_08b 1 Question: What's the difference between a Truffle Broadband Bonding

More information

CStream: Neighborhood Bandwidth Aggregation For Better Video Streaming

CStream: Neighborhood Bandwidth Aggregation For Better Video Streaming CStream: Neighborhood Bandwidth Aggregation For Better Video Streaming by Thangam Vedagiri Seenivasan A Thesis Submitted to the Faculty of the WORCESTER POLYTECHNIC INSTITUTE In partial fulfillment of

More information

Requirements of Voice in an IP Internetwork

Requirements of Voice in an IP Internetwork Requirements of Voice in an IP Internetwork Real-Time Voice in a Best-Effort IP Internetwork This topic lists problems associated with implementation of real-time voice traffic in a best-effort IP internetwork.

More information

TRUFFLE Broadband Bonding Network Appliance. A Frequently Asked Question on. Link Bonding vs. Load Balancing

TRUFFLE Broadband Bonding Network Appliance. A Frequently Asked Question on. Link Bonding vs. Load Balancing TRUFFLE Broadband Bonding Network Appliance A Frequently Asked Question on Link Bonding vs. Load Balancing 5703 Oberlin Dr Suite 208 San Diego, CA 92121 P:888.842.1231 F: 858.452.1035 info@mushroomnetworks.com

More information

Optimizing Congestion in Peer-to-Peer File Sharing Based on Network Coding

Optimizing Congestion in Peer-to-Peer File Sharing Based on Network Coding International Journal of Emerging Trends in Engineering Research (IJETER), Vol. 3 No.6, Pages : 151-156 (2015) ABSTRACT Optimizing Congestion in Peer-to-Peer File Sharing Based on Network Coding E.ShyamSundhar

More information

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).

More information

How To Provide Qos Based Routing In The Internet

How To Provide Qos Based Routing In The Internet CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this

More information

LTE BACKHAUL REQUIREMENTS: A REALITY CHECK

LTE BACKHAUL REQUIREMENTS: A REALITY CHECK By: Peter Croy, Sr. Network Architect, Aviat Networks INTRODUCTION LTE mobile broadband technology is now being launched across the world with more than 140 service providers committed to implement it

More information

Leveraging the Clouds for improving P2P Content Distribution Networks Performance

Leveraging the Clouds for improving P2P Content Distribution Networks Performance Leveraging the Clouds for improving P2P Content Distribution Networks Performance amir@sics.se 1 Big Picture 2 Big Picture Client Server Peer to Peer Server Farm 3 Big Picture How to leverage the cloud

More information

Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking

Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental

More information

Providing Video-on-Demand using Peer-to-Peer Networks

Providing Video-on-Demand using Peer-to-Peer Networks Providing Video-on-Demand using Peer-to-Peer Networks S. Annapureddy New York University C. Gkantsidis, P. Rodriguez, and L. Massoulie Microsoft Research, Cambridge Abstract Digital media companies have

More information

VoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications

VoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications VoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications Veselin Rakocevic School of Engineering and Mathematical Sciences City University, London, UK V.Rakocevic@city.ac.uk

More information

Bandwidth Aggregation, Teaming and Bonding

Bandwidth Aggregation, Teaming and Bonding Bandwidth Aggregation, Teaming and Bonding The increased use of Internet sharing combined with graphically rich web sites and multimedia applications have created a virtually insatiable demand for Internet

More information

REAL TIME VISIBILITY OF IPTV SUBSCRIBER EXPERIENCE AND VIEWING ACTIVITY. Alan Clark CEO, Telchemy Incorporated

REAL TIME VISIBILITY OF IPTV SUBSCRIBER EXPERIENCE AND VIEWING ACTIVITY. Alan Clark CEO, Telchemy Incorporated REAL TIME VISIBILITY OF IPTV SUBSCRIBER EXPERIENCE AND VIEWING ACTIVITY Alan Clark CEO, Telchemy Incorporated Outline STB centric performance management? Measuring IPTV subscriber experience how and why?

More information

Corporate Network Services of Tomorrow Business-Aware VPNs

Corporate Network Services of Tomorrow Business-Aware VPNs Corporate Network Services of Tomorrow Business-Aware VPNs Authors: Daniel Kofman, CTO and Yuri Gittik, CSO Content Content...1 Introduction...2 Serving Business Customers: New VPN Requirements... 2 Evolution

More information

Towards Cloud Streaming: architecture, mechanism and deployments

Towards Cloud Streaming: architecture, mechanism and deployments outline Towards Cloud Streaming: architecture, mechanism and deployments IETF-78, Clouds bar BoF, July 2010 Xiaogang Wei (arojoy@forcetech.net) Lisa Dewar (lisamariedewar@googlemail.com) About ForceTech

More information

The old Internet. Software in the Network: Outline. Traditional Design. 1) Basic Caching. The Arrival of Software (in the network)

The old Internet. Software in the Network: Outline. Traditional Design. 1) Basic Caching. The Arrival of Software (in the network) The old Software in the Network: What Happened and Where to Go Prof. Eric A. Brewer UC Berkeley Inktomi Corporation Local networks with local names and switches IP creates global namespace and links the

More information

Strategies. Addressing and Routing

Strategies. Addressing and Routing Strategies Circuit switching: carry bit streams original telephone network Packet switching: store-and-forward messages Internet Spring 2007 CSE 30264 14 Addressing and Routing Address: byte-string that

More information

Two Dimensional Array Based Overlay Network for Balancing Load of Peer-to-Peer Live Video Streaming

Two Dimensional Array Based Overlay Network for Balancing Load of Peer-to-Peer Live Video Streaming Two Dimensional Array Based Overlay Network for Balancing Load of Peer-to-Peer Live Video Streaming Abdullah Faruq Ibn Ibrahimy, Islam Md. Rafiqul, Farhat Anwar and Muhammad Ibn Ibrahimy Department of

More information

Analysis of Effect of Handoff on Audio Streaming in VOIP Networks

Analysis of Effect of Handoff on Audio Streaming in VOIP Networks Beyond Limits... Volume: 2 Issue: 1 International Journal Of Advance Innovations, Thoughts & Ideas Analysis of Effect of Handoff on Audio Streaming in VOIP Networks Shivani Koul* shivanikoul2@gmail.com

More information

diversifeye Application Note

diversifeye Application Note diversifeye Application Note Test Performance of IGMP based Multicast Services with emulated IPTV STBs Shenick Network Systems Test Performance of IGMP based Multicast Services with emulated IPTV STBs

More information

Improving Quality of Service

Improving Quality of Service Improving Quality of Service Using Dell PowerConnect 6024/6024F Switches Quality of service (QoS) mechanisms classify and prioritize network traffic to improve throughput. This article explains the basic

More information

The changing face of global data network traffic

The changing face of global data network traffic The changing face of global data network traffic Around the turn of the 21st century, MPLS very rapidly became the networking protocol of choice for large national and international institutions. This

More information

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

More information

ICTTEN4215A Install and configure internet protocol TV in a service provider network

ICTTEN4215A Install and configure internet protocol TV in a service provider network ICTTEN4215A Install and configure internet protocol TV in a service provider network Release: 1 ICTTEN4215A Install and configure internet protocol TV in a service provider network Modification History

More information

Stability of QOS. Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu

Stability of QOS. Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu Stability of QOS Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu Abstract Given a choice between two services, rest of the things being equal, it is natural to prefer the one with more

More information

Measuring Broadband America

Measuring Broadband America A Report on Consumer Wireline Broadband Performance in the U.S. FCC s Office of Engineering and Technology and Consumer and Governmental Affairs Bureau Table of Contents Executive Summary Methodology Figure

More information

%WILEY TELEVISION, MOBILE AND CONVERGED NETWORKS DIGITAL VIDEO DISTRIBUTION IN BROADBAND, TRENDS, CHALLENGES AND SOLUTIONS. Sanjoy Paul, Ph.

%WILEY TELEVISION, MOBILE AND CONVERGED NETWORKS DIGITAL VIDEO DISTRIBUTION IN BROADBAND, TRENDS, CHALLENGES AND SOLUTIONS. Sanjoy Paul, Ph. DIGITAL VIDEO DISTRIBUTION IN BROADBAND, TELEVISION, MOBILE AND CONVERGED NETWORKS TRENDS, CHALLENGES AND SOLUTIONS Sanjoy Paul, Ph.D Formerly of Bell Labs and WINLAB, Rutgers University, USA, Limited,

More information

Bandwidth Control in Multiple Video Windows Conferencing System Lee Hooi Sien, Dr.Sureswaran

Bandwidth Control in Multiple Video Windows Conferencing System Lee Hooi Sien, Dr.Sureswaran Bandwidth Control in Multiple Video Windows Conferencing System Lee Hooi Sien, Dr.Sureswaran Network Research Group, School of Computer Sciences Universiti Sains Malaysia11800 Penang, Malaysia Abstract

More information

Common issues of hosted VOIP service (and how to avoid them!)

Common issues of hosted VOIP service (and how to avoid them!) Common issues of hosted VOIP service (and how to avoid them!) CONTENTS Contents Is your business ready for hosted VOIP?.... 3 The Potential Issues.... 4 Poor call quality concerns....4 Incomplete inbound

More information

Octoshape s Multicast Technology Suite:

Octoshape s Multicast Technology Suite: : The Next-Gen CDN Alternative for Large-Scale, Cost-Optimized, Global HD Streaming HQ: +45 8833 4680 USA: +1 770 578 1686 Asia: +65 81125330 www.octoshape.com Table of Contents Core Transport...4 Making

More information

Bandwidth Measurement in xdsl Networks

Bandwidth Measurement in xdsl Networks Bandwidth Measurement in xdsl Networks Liang Cheng and Ivan Marsic Center for Advanced Information Processing (CAIP) Rutgers The State University of New Jersey Piscataway, NJ 08854-8088, USA {chengl,marsic}@caip.rutgers.edu

More information

Smart Queue Scheduling for QoS Spring 2001 Final Report

Smart Queue Scheduling for QoS Spring 2001 Final Report ENSC 833-3: NETWORK PROTOCOLS AND PERFORMANCE CMPT 885-3: SPECIAL TOPICS: HIGH-PERFORMANCE NETWORKS Smart Queue Scheduling for QoS Spring 2001 Final Report By Haijing Fang(hfanga@sfu.ca) & Liu Tang(llt@sfu.ca)

More information

Wholesale IP Bitstream on a Cable HFC infrastructure

Wholesale IP Bitstream on a Cable HFC infrastructure Wholesale IP Bitstream on a Cable HFC infrastructure In order to understand the issues related to an ISP reselling Cable Based Internet access it is necessary to look at similarities and dissimilarities

More information

A Measurement of NAT & Firewall Characteristics in Peer to Peer Systems

A Measurement of NAT & Firewall Characteristics in Peer to Peer Systems A Measurement of NAT & Firewall Characteristics in Peer to Peer Systems L. D Acunto, J.A. Pouwelse, and H.J. Sips Department of Computer Science Delft University of Technology, The Netherlands l.dacunto@tudelft.nl

More information

Real-time apps and Quality of Service

Real-time apps and Quality of Service Real-time apps and Quality of Service Focus What transports do applications need? What network mechanisms provide which kinds of quality assurances? Topics Real-time versus Elastic applications Adapting

More information

Adaptive Bitrate Multicast: Enabling the Delivery of Live Video Streams Via Satellite. We Deliver the Future of Television

Adaptive Bitrate Multicast: Enabling the Delivery of Live Video Streams Via Satellite. We Deliver the Future of Television Adaptive Bitrate Multicast: Enabling the Delivery of Live Video Streams Via Satellite We Deliver the Future of Television Satellites provide a great infrastructure for broadcasting live content to large

More information

WhitePaper: XipLink Real-Time Optimizations

WhitePaper: XipLink Real-Time Optimizations WhitePaper: XipLink Real-Time Optimizations XipLink Real Time Optimizations Header Compression, Packet Coalescing and Packet Prioritization Overview XipLink Real Time ( XRT ) is a new optimization capability

More information

Optimizing Enterprise Network Bandwidth For Security Applications. Improving Performance Using Antaira s Management Features

Optimizing Enterprise Network Bandwidth For Security Applications. Improving Performance Using Antaira s Management Features Optimizing Enterprise Network Bandwidth For Security Applications Improving Performance Using Antaira s Management Features By: Brian Roth, Product Marketing Engineer April 1, 2014 April 2014 Optimizing

More information

Capacity Planning for Broadband in Public Libraries: Issues and Strategies

Capacity Planning for Broadband in Public Libraries: Issues and Strategies Chapter X8 Capacity Planning for Broadband in Public Libraries: Issues and Strategies by John Carlo Bertot Introduction The current context of public library public access technology provision is paradoxical.

More information

Delft University of Technology Parallel and Distributed Systems Report Series. The Peer-to-Peer Trace Archive: Design and Comparative Trace Analysis

Delft University of Technology Parallel and Distributed Systems Report Series. The Peer-to-Peer Trace Archive: Design and Comparative Trace Analysis Delft University of Technology Parallel and Distributed Systems Report Series The Peer-to-Peer Trace Archive: Design and Comparative Trace Analysis Boxun Zhang, Alexandru Iosup, and Dick Epema {B.Zhang,A.Iosup,D.H.J.Epema}@tudelft.nl

More information

Virtual Leased Line (VLL) for Enterprise to Branch Office Communications

Virtual Leased Line (VLL) for Enterprise to Branch Office Communications Virtual Leased Line (VLL) for Enterprise to Branch Office Communications Reliable high throughput data connections with low-cost & diverse transport technologies Executive Summary: The Truffle Broadband

More information

Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks

Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks Ayman Wazwaz, Computer Engineering Department, Palestine Polytechnic University, Hebron, Palestine, aymanw@ppu.edu Duaa sweity

More information

We Deliver the Future of Television The benefits of off-the-shelf hardware and virtualization for OTT video delivery

We Deliver the Future of Television The benefits of off-the-shelf hardware and virtualization for OTT video delivery We Deliver the Future of Television The benefits of off-the-shelf hardware and virtualization for OTT video delivery istockphoto.com Introduction Over the last few years, the television world has gone

More information

Internet Video Streaming and Cloud-based Multimedia Applications. Outline

Internet Video Streaming and Cloud-based Multimedia Applications. Outline Internet Video Streaming and Cloud-based Multimedia Applications Yifeng He, yhe@ee.ryerson.ca Ling Guan, lguan@ee.ryerson.ca 1 Outline Internet video streaming Overview Video coding Approaches for video

More information

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

Chapter 9A. Network Definition. The Uses of a Network. Network Basics Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data

More information

Business Case for the Brocade Carrier Ethernet IP Solution in a Metro Network

Business Case for the Brocade Carrier Ethernet IP Solution in a Metro Network Business Case for the Brocade Carrier Ethernet IP Solution in a Metro Network Executive Summary The dramatic rise of multimedia applications in residential, mobile, and business networks is continuing

More information

Integrate VoIP with your existing network

Integrate VoIP with your existing network Integrate VoIP with your existing network As organisations increasingly recognise and require the benefits voice over Internet Protocol (VoIP) offers, they stop asking "Why?" and start asking "How?". A

More information

Introduction to computer networks and Cloud Computing

Introduction to computer networks and Cloud Computing Introduction to computer networks and Cloud Computing Aniel Nieves-González Fall 2015 Computer Netwoks A computer network is a set of independent computer systems that are connected by a communication

More information

The BitTorrent Protocol

The BitTorrent Protocol The BitTorrent Protocol Taken from http://www.cs.uiowa.edu/~ghosh/bittorrent.ppt What is BitTorrent? Efficient content distribution system using file swarming. Usually does not perform all the functions

More information

QoS Issues for Multiplayer Gaming

QoS Issues for Multiplayer Gaming QoS Issues for Multiplayer Gaming By Alex Spurling 7/12/04 Introduction Multiplayer games are becoming large part of today s digital entertainment. As more game players gain access to high-speed internet

More information

Managed Online Services: Responding to Emerging Content and Apps By Andrew McDonald and Jim Guillet

Managed Online Services: Responding to Emerging Content and Apps By Andrew McDonald and Jim Guillet www.pipelinepub.com Volume 5, Issue 3 Managed Online Services: Responding to Emerging Content and Apps By Andrew McDonald and Jim Guillet The allure of new revenues from a managed digital television service

More information

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol? Chapter 1 Review Questions R1. What is the difference between a host and an end system? List several different types of end systems. Is a Web server an end system? 1. There is no difference. Throughout

More information

Why ISPs need SDN: SDN-based Network Service Chaining and Software-defined Multicast

Why ISPs need SDN: SDN-based Network Service Chaining and Software-defined Multicast Why ISPs need SDN: SDN-based Network Chaining and Software-defined Multicast ZKI Herbsttagung, Kaiserslautern, Germany, 24. Sept. 2014 Jeremias Blendin, Julius Rückert, David Hausheer Department of Electrical

More information

A Comparative Study of Tree-based and Mesh-based Overlay P2P Media Streaming

A Comparative Study of Tree-based and Mesh-based Overlay P2P Media Streaming A Comparative Study of Tree-based and Mesh-based Overlay P2P Media Streaming Chin Yong Goh 1,Hui Shyong Yeo 1, Hyotaek Lim 1 1 Dongseo University Busan, 617-716, South Korea cgnicky@gmail.com, hui_shyong@hotmail.com,

More information

Applications that Benefit from IPv6

Applications that Benefit from IPv6 Applications that Benefit from IPv6 Lawrence E. Hughes Chairman and CTO InfoWeapons, Inc. Relevant Characteristics of IPv6 Larger address space, flat address space restored Integrated support for Multicast,

More information

Local-Area Network -LAN

Local-Area Network -LAN Computer Networks A group of two or more computer systems linked together. There are many [types] of computer networks: Peer To Peer (workgroups) The computers are connected by a network, however, there

More information

CSCI 491-01 Topics: Internet Programming Fall 2008

CSCI 491-01 Topics: Internet Programming Fall 2008 CSCI 491-01 Topics: Internet Programming Fall 2008 Introduction Derek Leonard Hendrix College September 3, 2008 Original slides copyright 1996-2007 J.F Kurose and K.W. Ross 1 Chapter 1: Introduction Our

More information

HPAM: Hybrid Protocol for Application Level Multicast. Yeo Chai Kiat

HPAM: Hybrid Protocol for Application Level Multicast. Yeo Chai Kiat HPAM: Hybrid Protocol for Application Level Multicast Yeo Chai Kiat Scope 1. Introduction 2. Hybrid Protocol for Application Level Multicast (HPAM) 3. Features of HPAM 4. Conclusion 1. Introduction Video

More information

Analysis of IP Network for different Quality of Service

Analysis of IP Network for different Quality of Service 2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Analysis of IP Network for different Quality of Service Ajith

More information

2014 Measuring Broadband America Fixed Broadband Report

2014 Measuring Broadband America Fixed Broadband Report 2014 Measuring Broadband America Fixed Broadband Report A Report on Consumer Fixed Broadband Performance in the U.S. FCC s Office of Engineering and Technology and Consumer and Governmental Affairs Bureau

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

MC-FTP (Multicast File Transfer Protocol): Implementation and Comparison with

MC-FTP (Multicast File Transfer Protocol): Implementation and Comparison with MC-FTP (Multicast File Transfer Protocol): Implementation and Comparison with BitTorrent RVS Seminar HS 2007 MC-FTP (Multicast File Transfer Protocol): Implementation and Comparison with BitTorrent Alican

More information

L-Series LAN Provisioning Best Practices for Local Area Network Deployment. Introduction. L-Series Network Provisioning

L-Series LAN Provisioning Best Practices for Local Area Network Deployment. Introduction. L-Series Network Provisioning L-Series LAN Provisioning Best Practices for Local Area Network Deployment Introduction Scope NComputing s L-series access devices connect to a host computer through an Ethernet interface and IP protocol.

More information

3. Some of the technical measures presently under consideration are methods of traffic shaping, namely bandwidth capping and bandwidth shaping 2.

3. Some of the technical measures presently under consideration are methods of traffic shaping, namely bandwidth capping and bandwidth shaping 2. THE IDENTIFIED EMERGING POLICY RESPONSES 1. INSERT Traffic shaping 2. The UK Parliament is presently considering introducing technical measures to tackle the problem of unlawful peer-to-peer (P2P) file-sharing.

More information

How To Monitor Performance On Eve

How To Monitor Performance On Eve Performance Monitoring on Networked Virtual Environments C. Bouras 1, 2, E. Giannaka 1, 2 Abstract As networked virtual environments gain increasing interest and acceptance in the field of Internet applications,

More information

Differentiated Chunk Scheduling for P2P Video-on- Demand System

Differentiated Chunk Scheduling for P2P Video-on- Demand System The 8th Annual IEEE Consumer Communications and Networking Conference - Special Session IPTV and Multimedia CDN Differentiated Chunk Scheduling for P2P Video-on- Demand System Ubaid Abbasi 1, Gaétan Simo

More information

Broadband Networks. Prof. Dr. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Bombay. Lecture - 29.

Broadband Networks. Prof. Dr. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Bombay. Lecture - 29. Broadband Networks Prof. Dr. Abhay Karandikar Electrical Engineering Department Indian Institute of Technology, Bombay Lecture - 29 Voice over IP So, today we will discuss about voice over IP and internet

More information

Network support for tele-education

Network support for tele-education Network support for tele-education Aiko Pras Centre for Telematics and Information Technology University of Twente (UT) http://wwwtios.cs.utwente.nl/~pras This paper discusses the state of the art in networking,

More information