285 research outputs found

    Performance evaluation of caching techniques for video on demand workload in named data network

    Get PDF
    The rapid growing use of the Internet in the contemporary context is mainly for content distribution. This is derived primarily due to the emergence of Information-Centric Networking (ICN) in the wider domains of academia and industry. Named Data Network (NDN) is one of ICN architectures. In addition, the NDN has been emphasized as the video traffic architecture that ensures smooth communication between the request and receiver of online video. The concise research problem of the current study is the issue of congestion in Video on Demand (VoD) workload caused by frequent storing of signed content object in the local repositories, which leads to buffering problems and data packet loss. The study will assess the NDN cache techniques to select the preferable cache replacement technique suitable for dealing with the congestion issues, and evaluate its performance. To do that, the current study adopts a research process based on the Design Research Methodology (DRM) and VoD approach in order to explain the main activities that produced an increase in the expected findings at the end of the activities or research. Datasets, as well as Internet2 network topology and the statistics of video views were gathered from the PPTV platform. Actually, a total of 221 servers is connected to the network from the same access points as in the real deployment of PPTV. In addition, an NS3 analysis the performance metrics of caching replacement technique (LRU, LFU, and FIFO) for VoD in Named Data Network (NDN) in terms of cache hit ratio, throughput, and server load results in reasonable outcomes that appears to serve as a potential replacement with the current implementation of the Internet2 topology, where nodes are distributed randomly. Based on the results, LFU technique gives the preferable result for congestion from among the presented techniques. Finally, the research finds that the performance metrics of cache hit ratio, throughput, and server load for the LFU that produces the lowest congestion rate which is sufficient. Therefore, the researcher concluded that the efficiency of the different replacement techniques needs to be well investigated in order to provide the insights necessary to implement these techniques in certain context. However, this result enriches the current understanding of replacement techniques in handling different cache sizes. After having addressed the different replacement techniques and examined their performances, the performance characteristics along with their expected performance were also found to stimulate a cache model for providing a relatively fast running time of across a broad range of embedded applications

    Tecnología IPTV para el servicio de Internet inalámbrico proveedor (WISP)

    Get PDF
    This article describes the implementation of the IPTV technology through an open source system for the wireless Internet service provider (WISP) in the Cerecita site, located in the province of Guayas, Ecuador. The feasibility of implementing the IPTV technology is given through the use of the Emby Server application, in addition to the use of an operating system such as CentOS 7, which are open source and have the necessary requirements for the creation of this service. The analysis of data tra c generated on the WISP network, which will establish the advantages and disadvantages generated by the transmission of this technology, created to VOD multimedia content server that allows the video signal to be sent to users Finally, a feasibility study was carried out to analyze the advantages and disadvantages that exist in the implementation of this IPTV technology.Este artículo describe la implementación de la tecnología IPTV a través de un sistema de código abierto para el proveedor de servicios de Internet inalámbrico (WISP) en el sitio Cerecita, ubicado en la provincia de Guayas, Ecuador. La factibilidad de implementar la tecnología IPTV se da mediante el uso de la aplicación Emby Server, además del uso de un sistema operativo como CentOS 7, que son de código abierto y tienen los requisitos necesarios para la creación de este servicio. El análisis del trá co de datos generado en la red WISP, que establecerá las ventajas y desventajas generadas por la transmisión de esta tecnología, creado para el servidor de contenido multimedia VOD que permite enviar la señal de video a los usuarios Finalmente, se llevó a cabo un estudio de factibilidad analizar las ventajas y desventajas que existen en la implementación de esta tecnología IPTV

    IPTV Market Development and Regulatory Aspects

    Get PDF

    Digital content security: video streaming digital rights management system

    Get PDF
    Thesis submitted in partial fulfillment of the requirements for the Degree of Master of Science in Information Systems Security (MSc.ISS) at Strathmore UniversityThe usability and applicability of digital videos, especially through the Internet, offers great opportunities for Kenyan content creators to further their careers as the platform enables them to share ideas which contributes to knowledge in the field which in turn generates wealth in the industry as new and efficient ways of creating the content are discovered making the production and distribution process cost effective. The Internet is however proving to be a double-edged sword as there have been multiple reports and incidences of copyright infringement within the country. This can be largely attributed to the fact that the platforms available to the average user provide a convenient environment for them to make several copies of the protected media file and distribute them as they wish: which facilitates misuse, piracy and plagiarism. The purpose of this project was to mitigate the unlawful replication and dissemination on an enormous scale of digital videos that are owned by practitioners in the education industry and presented to end users over the Internet. This followed a move by the players in the industry to convert their content into a digital format to meet the demand for online classes. Popular avenues that have been used to acquire copies of the digital streams include by use of standalone file grabbing software such as Internet Download Manager or browser plugins such as DownThemAll. These software implementations are extremely simple to use and allow users to create local copies of the streams through a single click of a button. They therefore present a threat to an entire ecosystem as content creators are heavily dependent on revenues generated from their material. This study seeks to develop a solution in the form of a Digital Rights Management (DRM) system that can be used to secure video streams and, in the process, preserve their economic value. A DRM system secures and implements the rights associated with the use of digital content by use of a set of access control technologies, which ensures that the videos are consumed as intended, and no illegal duplicates are created. Rapid Application Software Development Methodology were leveraged to accomplish the objective

    Towards a scalable video interactivity solution over the IMS

    Get PDF
    Includes bibliographical references (leaves 72-76).Rapid increase in bandwidth and the interactive and scalability features of the Internet provide a precedent for a converged platform that will support interactive television. Next Generation Network platforms such as the IP Multimedia Subsystem (IMS) support Quality of Service (QoS), fair charging and possible integration with other services for the deployment of IPTV services. IMS architecture supports the use of the Session Initiation Protocol (SIP) for session control and the Real Time Streaming Protocol (RTSP) for media control. This study aims to investigate video interactivity designs over the Internet using an evaluation framework to examine the performance of both SIP and RTSP protocols over the IMS over different access networks. It proposes a Three Layered Video Interactivity Framework (TLVIF) to reduce the video processing load on a server

    Implications of Implementing HDTV Over Digital Subscriber Line Networks

    Get PDF
    This thesis addresses the different challenges a telecommunications company would face when trying to implement an HDTV video service over a Digital Subscriber Line (DSL) connection. Each challenge is discussed in detail and a technology, protocol, or method is suggested to overcome that particular challenge. One of the biggest challenges is creating a network architecture that can provide enough bandwidth to support video over a network that was originally designed for voice traffic. The majority of the network connections to a customer premises in a telephony network consists of a copper pair. This type of connection is not optimal for high bandwidth services. This limitation can be overcome using Gigabit Ethernet (GE) over fiber in the core part of the network and VDSL2 in the access part of the network. For the purposes of this document, the core portion of the network is considered to be an area equal to several counties or approximately 50 miles in radius. The core network starts at the primary central office (CO) and spreads out to central offices in suburbs and small towns. The primary central office is a central point in the telecom operator\u27s network. Large trunks are propagated from the primary central office to smaller central offices making up the core network. The access portion of the network is considered to be an area within a suburb or small town from the central office to a subscriber\u27s home. Appendix A, located on page 60, contains a network diagram illustrating the scope of each of the different portions of the network. Considerations must also be given for the internal network to the residence such as category 5 (Cat5) cable or higher grade and network equipment that can provide up to 30 Megabits per second (Mbps) connections or throughput. The equipment in the telecommunications network also plays a part in meeting the challenge of 30 Mbps bandwidth. GE switches should be used with single mode fiber optic cable in the core part of the network. Digital Subscriber Line Access Multiplexers (DSLAM) with the capability to filter Internet Group Management Protocol (IGMP) messages should be used in the access part of the network to facilitate bandwidth utilization. Placement of this equipment and how the data is aggregated is another issue to consider when implementing HDTV service. Another major challenge facing the implementation of HDTV over DSL networks is controlling quality of service (QoS) throughout the network. Class of Service (CoS) and Differentiated Services (DiffServ) is a method of QoS that would enable video packets to have a higher priority and less delay than other data packets. The consumer could have data, video, and voice traffic all over the same DSL connection. Data, video and voice packets would need to have a different priority in order to maintain appropriate QoS levels for each service. The use of advanced technology in video encoding will be essential to the success of the video service. MPEG-2, MPEG-4, and Windows Media 9 are just a few of the video encoding technologies that could be used to reduce the necessary bandwidth for HDTV. The advancement of this technology is essential to allow telecommunications providers to offer HDTV. Another challenge for the telecom operator concerns the security of the network and service after implementation. Theft of service will be another area that the telecomm operator will be forced to resolve. The cable operators currently face this issue and lose millions of dollars in revenue. Authentication, IP filtering and MAC address blocking are a few possible solutions to this problem

    Black Hole Attack, in P2P based VoD Service, and its Effects on Swarm Sizes and Seeders

    Get PDF
    From the inception, BitTorrent has been under several types of attacks. Most of these attacks were aimed to deteriorate the performance of BitTorrent network or to collapse it.In this paper we have presented the effect of Black-hole attack especially in the case of BitTorrent based VoD services .we have simulated black-hole attack for BitTorrent based VoD services and studied the effect of number of malicious nodes in peer network of various swarm sizes. The number of attacking nodes taken was 1, 2, and 3 whereas the size of swarms was 10, 20 and 30. Also another important parameter taken into consideration for studying the effect was then total number of seeders. We have taken observation for attack simulations for various scenarios depending upon swarm size, numbers of seeder and number of attack nodes
    • …
    corecore