scholarly journals BemTV: Hybrid CDN/Peer-to-Peer Architecture for Live Video Distribution over the Internet

2020 ◽  
Vol 2020 (6) ◽  
pp. 67-74
Author(s):  
Flávio Barbosa ◽  
Guido de Souza Filho

Assuming that video streaming is now responsible for the absolute majority of the Internet traffic and considering that the audience uses WebRTC-enabled web browsers and mobile devices to access and retrieve content, this work proposes the development of a peer-to-peer overlay network to assist the delivery of video streaming events that use HTTP-based protocols without the need to install additional software. Using the peer-to-peer network, the client/server model becomes hybrid, where network nodes that are watching the same event can retrieve portions of the video content directly from the server or neighboring nodes. This approach has two main objectives; decrease the client/server traffic and consequently the economic cost of delivery while improving the quality of the users' experience, given that communication between neighboring nodes can support the flow of better quality videos between the points

2014 ◽  
pp. 169-228
Author(s):  
Jânio M. Monteiro ◽  
Rui S. Cruz ◽  
Charalampos Z. Patrikakis ◽  
Nikolaos C. Papaoulakis ◽  
Carlos T. Calafate ◽  
...  

The Internet as a video distribution medium has seen a tremendous growth in recent years. Currently, the transmission of major live events and TV channels over the Internet can easily reach hundreds or millions of users trying to receive the same content using very distinct receiver terminals, placing both scalability and heterogeneity challenges to content and network providers. In private and well-managed Internet Protocol (IP) networks these types of distributions are supported by specially designed architectures, complemented with IP Multicast protocols and Quality of Service (QoS) solutions. However, the Best-Effort and Unicast nature of the Internet requires the introduction of a new set of protocols and related architectures to support the distribution of these contents. In the field of file and non-real time content distributions this has led to the creation and development of several Peer-to-Peer protocols that have experienced great success in recent years. This chapter presents the current research and developments in Peer-to-Peer video streaming over the Internet. A special focus is made on peer protocols, associated architectures and video coding techniques. The authors also review and describe current Peer-to-Peer streaming solutions.


Author(s):  
Jânio M. Monteiro ◽  
Rui S. Cruz ◽  
Charalampos Z. Patrikakis ◽  
Nikolaos C. Papaoulakis ◽  
Carlos Tavares Calafate ◽  
...  

The Internet as a video distribution medium has seen a tremendous growth in recent years. Currently, the transmission of major live events and TV channels over the Internet can easily reach hundreds or millions of users trying to receive the same content using very distinct receiver terminals, placing both scalability and heterogeneity challenges to content and network providers. In private and well-managed Internet Protocol (IP) networks these types of distributions are supported by specially designed architectures, complemented with IP Multicast protocols and Quality of Service (QoS) solutions. However, the Best-Effort and Unicast nature of the Internet requires the introduction of a new set of protocols and related architectures to support the distribution of these contents. In the field of file and non-real time content distributions this has led to the creation and development of several Peer-to-Peer protocols that have experienced great success in recent years. This chapter presents the current research and developments in Peer-to-Peer video streaming over the Internet. A special focus is made on peer protocols, associated architectures and video coding techniques. The authors also review and describe current Peer-to-Peer streaming solutions.


Author(s):  
Rajendra G. Singh ◽  
Margaret A. Bernard

In this research, improving on the quality of Reusable Learning Objects (RLOs) on a Peer-To-Peer (P2P) network is considered. The RLO was first redesigned to have a fundamentally inherent pedagogical structure, which gave it an immediate foundational level of quality in terms of opportunities related to reusability. Applying the Learning Object Review Instrument 1.5 (LORI 1.5) demonstrated that some of the elements are inherent in this new RLO design, so there was no need to constantly have such features evaluated with LORI. A modified LORI was therefore developed in order to evaluate the remaining features of the RLO. The research identified these remaining elements to produce a Review Rubric for scoring the RLO’s quality. In addition, an algorithm is given which considers one or more subject-matter experts as part of a review process. Utilizing the subject-matter experts in a P2P network involved the creation of special nodes to ensure data integrity and post-availability of the review scores for RLOs. The research concludes that the redesigned RLOs along with the corresponding Review Rubric and scoring algorithm produces a system suitable for a P2P network, where for the first time, RLOs can be shared of assured quality to promote eLearning within P2P networks.


Author(s):  
Zoltán Czirkos ◽  
Gábor Hosszú

The importance of the network security problems come into prominence by the growth of the Internet. The article presents a new kind of software, which uses just the network, to protect the hosts and increase their security. The hosts running this software create an Application Level Network (ALN) over the Internet. Nodes connected to this ALN check their operating systems’ log files to detect intrusion attempts. Information collected is then shared over the ALN to increase the security of all peers, which can then make the necessary protection steps by oneself. The developed software is named Komondor (Czirkos, 2006), which is a famous Hungarian guard dog. The novelty of the system Komondor is that Komondor nodes of each host create a Peer-To-Peer (P2P) overlay network. Organization is automatic; it requires no user interaction. This network model ensures stability, which is important for quick and reliable communication between nodes. By this build-up, the system remains useful over the unstable network. The use of the peer-to-peer network model for this purpose is new in principle. Test results proved its usefulness. With its aid, real intrusion attempts were blocked. This software is intended to mask the security holes of services provided by the host, not to repair them. For this it does not need to know about the security hole in detail. It can provide some protection in advance, but only if somewhere on the network an intrusion was already detected. It does not fix the security hole, but keeps the particular attacker from further activity.


2019 ◽  
Vol 8 (3) ◽  
pp. 3764-3770

In the modernized world like digital world, traditional way of payments through banks and other third parties are out of sphere. To meet the digital competency digital token like bitcoin based crypto currency payment is required. Lots of business persons are moving towards the digital way of secure payment. Intruders like hackers hamper the digital token and make immortality in the transaction which in turn create the double spend. Double spend is a serious threat in the Bitcoin network. Our research work focuses on double spend detection of transaction before it gets confirmed and added to the block by the miners. The proposed new architecture for detecting double spend using Dual Payout based on Lost Agreement Amount (DPL2A) will identify one of the ways that double spend attack occur before it is added to the blockchain. This architecture gives the clear identification of double spend attack and their full details of transaction occurrence so that when it is broadcasted into the peer-to-peer network, the network nodes will use this architecture to detect double spend, its occurrence is fully prevented and only the genuine transaction will be added to the blockchain.


Sign in / Sign up

Export Citation Format

Share Document