285 research outputs found
Performance evaluation of caching techniques for video on demand workload in named data network
The rapid growing use of the Internet in the contemporary context is mainly for content
distribution. This is derived primarily due to the emergence of Information-Centric Networking (ICN) in the wider domains of academia and industry. Named Data Network (NDN) is one of ICN architectures. In addition, the NDN has been emphasized as the video traffic architecture that ensures smooth communication between the request and receiver of online video. The concise research problem of the current study is the issue of congestion in Video on Demand (VoD) workload caused by frequent storing of signed content object in the local repositories, which leads to buffering problems and data packet loss. The study will assess the NDN cache techniques to select the preferable cache replacement technique suitable for dealing with the congestion issues, and evaluate its performance. To do that, the current study adopts a research process based on the Design Research Methodology (DRM) and VoD approach in order to explain the main activities that produced an increase in the expected findings at the end of the activities or research. Datasets, as well as Internet2 network topology and the statistics of video views were gathered from the PPTV platform. Actually, a total of 221 servers is connected to the network from the same access points as in the real deployment
of PPTV. In addition, an NS3 analysis the performance metrics of caching replacement
technique (LRU, LFU, and FIFO) for VoD in Named Data Network (NDN) in terms of cache hit ratio, throughput, and server load results in reasonable outcomes that appears to serve as a potential replacement with the current implementation of the Internet2 topology, where nodes are distributed randomly. Based on the results, LFU technique gives the preferable result for congestion from among the presented
techniques. Finally, the research finds that the performance metrics of cache hit ratio,
throughput, and server load for the LFU that produces the lowest congestion rate which
is sufficient. Therefore, the researcher concluded that the efficiency of the different replacement techniques needs to be well investigated in order to provide the insights
necessary to implement these techniques in certain context. However, this result enriches
the current understanding of replacement techniques in handling different cache sizes. After having addressed the different replacement techniques and examined their
performances, the performance characteristics along with their expected performance were also found to stimulate a cache model for providing a relatively fast running time of across a broad range of embedded applications
TecnologĂa IPTV para el servicio de Internet inalámbrico proveedor (WISP)
This article describes the implementation of the IPTV technology through an open source system for the wireless Internet service provider (WISP) in the Cerecita site, located in the province of Guayas, Ecuador. The feasibility of implementing the IPTV technology is given through the use of the Emby Server application, in addition to the use of an operating system such as CentOS 7, which are open source and have the necessary requirements for the creation of this service. The analysis of data tra c generated on the WISP network, which will establish the advantages and disadvantages generated by the transmission of this technology, created to VOD multimedia content server that allows the video signal to be sent to users Finally, a feasibility study was carried out to analyze the advantages and disadvantages that exist in the implementation of this IPTV technology.Este artĂculo describe la implementaciĂłn de la tecnologĂa IPTV a travĂ©s de un sistema de cĂłdigo abierto para el proveedor de servicios de Internet inalámbrico (WISP) en el sitio Cerecita, ubicado en la provincia de Guayas, Ecuador. La factibilidad de implementar la tecnologĂa IPTV se da mediante el uso de la aplicaciĂłn Emby Server, además del uso de un sistema operativo como CentOS 7, que son de cĂłdigo abierto y tienen los requisitos necesarios para la creaciĂłn de este servicio. El análisis del trá co de datos generado en la red WISP, que establecerá las ventajas y desventajas generadas por la transmisiĂłn de esta tecnologĂa, creado para el servidor de contenido multimedia VOD que permite enviar la señal de video a los usuarios Finalmente, se llevĂł a cabo un estudio de factibilidad analizar las ventajas y desventajas que existen en la implementaciĂłn de esta tecnologĂa IPTV
Recommended from our members
Multimedia delivery in the future internet
The term “Networked Media” implies that all kinds of media including text, image, 3D graphics, audio
and video are produced, distributed, shared, managed and consumed on-line through various networks,
like the Internet, Fiber, WiFi, WiMAX, GPRS, 3G and so on, in a convergent manner [1]. This white
paper is the contribution of the Media Delivery Platform (MDP) cluster and aims to cover the Networked
challenges of the Networked Media in the transition to the Future of the Internet.
Internet has evolved and changed the way we work and live. End users of the Internet have been confronted
with a bewildering range of media, services and applications and of technological innovations concerning
media formats, wireless networks, terminal types and capabilities. And there is little evidence that the pace
of this innovation is slowing. Today, over one billion of users access the Internet on regular basis, more
than 100 million users have downloaded at least one (multi)media file and over 47 millions of them do so
regularly, searching in more than 160 Exabytes1 of content. In the near future these numbers are expected
to exponentially rise. It is expected that the Internet content will be increased by at least a factor of 6, rising
to more than 990 Exabytes before 2012, fuelled mainly by the users themselves. Moreover, it is envisaged
that in a near- to mid-term future, the Internet will provide the means to share and distribute (new)
multimedia content and services with superior quality and striking flexibility, in a trusted and personalized
way, improving citizens’ quality of life, working conditions, edutainment and safety.
In this evolving environment, new transport protocols, new multimedia encoding schemes, cross-layer inthe
network adaptation, machine-to-machine communication (including RFIDs), rich 3D content as well as
community networks and the use of peer-to-peer (P2P) overlays are expected to generate new models of
interaction and cooperation, and be able to support enhanced perceived quality-of-experience (PQoE) and
innovative applications “on the move”, like virtual collaboration environments, personalised services/
media, virtual sport groups, on-line gaming, edutainment. In this context, the interaction with content
combined with interactive/multimedia search capabilities across distributed repositories, opportunistic P2P
networks and the dynamic adaptation to the characteristics of diverse mobile terminals are expected to
contribute towards such a vision.
Based on work that has taken place in a number of EC co-funded projects, in Framework Program 6 (FP6)
and Framework Program 7 (FP7), a group of experts and technology visionaries have voluntarily
contributed in this white paper aiming to describe the status, the state-of-the art, the challenges and the way
ahead in the area of Content Aware media delivery platforms
Digital content security: video streaming digital rights management system
Thesis submitted in partial fulfillment of the requirements for the Degree of Master of Science in Information Systems Security (MSc.ISS) at Strathmore UniversityThe usability and applicability of digital videos, especially through the Internet, offers great opportunities for Kenyan content creators to further their careers as the platform enables them to share ideas which contributes to knowledge in the field which in turn generates wealth in the industry as new and efficient ways of creating the content are discovered making the production and distribution process cost effective. The Internet is however proving to be a double-edged sword as there have been multiple reports and incidences of copyright infringement within the country. This can be largely attributed to the fact that the platforms available to the average user provide a convenient environment for them to make several copies of the protected media file and distribute them as they wish: which facilitates misuse, piracy and plagiarism.
The purpose of this project was to mitigate the unlawful replication and dissemination on an enormous scale of digital videos that are owned by practitioners in the education industry and presented to end users over the Internet. This followed a move by the players in the industry to convert their content into a digital format to meet the demand for online classes.
Popular avenues that have been used to acquire copies of the digital streams include by use of standalone file grabbing software such as Internet Download Manager or browser plugins such as DownThemAll. These software implementations are extremely simple to use and allow users to create local copies of the streams through a single click of a button. They therefore present a threat to an entire ecosystem as content creators are heavily dependent on revenues generated from their material.
This study seeks to develop a solution in the form of a Digital Rights Management (DRM) system that can be used to secure video streams and, in the process, preserve their economic value. A DRM system secures and implements the rights associated with the use of digital content by use of a set of access control technologies, which ensures that the videos are consumed as intended, and no illegal duplicates are created. Rapid Application Software Development Methodology were leveraged to accomplish the objective
Towards a scalable video interactivity solution over the IMS
Includes bibliographical references (leaves 72-76).Rapid increase in bandwidth and the interactive and scalability features of the Internet provide a precedent for a converged platform that will support interactive television. Next Generation Network platforms such as the IP Multimedia Subsystem (IMS) support Quality of Service (QoS), fair charging and possible integration with other services for the deployment of IPTV services. IMS architecture supports the use of the Session Initiation Protocol (SIP) for session control and the Real Time Streaming Protocol (RTSP) for media control. This study aims to investigate video interactivity designs over the Internet using an evaluation framework to examine the performance of both SIP and RTSP protocols over the IMS over different access networks. It proposes a Three Layered Video Interactivity Framework (TLVIF) to reduce the video processing load on a server
Implications of Implementing HDTV Over Digital Subscriber Line Networks
This thesis addresses the different challenges a telecommunications company would face when trying to implement an HDTV video service over a Digital Subscriber Line (DSL) connection. Each challenge is discussed in detail and a technology, protocol, or method is suggested to overcome that particular challenge.
One of the biggest challenges is creating a network architecture that can provide enough bandwidth to support video over a network that was originally designed for voice traffic. The majority of the network connections to a customer premises in a telephony network consists of a copper pair. This type of connection is not optimal for high bandwidth services. This limitation can be overcome using Gigabit Ethernet (GE) over fiber in the core part of the network and VDSL2 in the access part of the network. For the purposes of this document, the core portion of the network is considered to be an area equal to several counties or approximately 50 miles in radius. The core network starts at the primary central office (CO) and spreads out to central offices in suburbs and small towns. The primary central office is a central point in the telecom operator\u27s network. Large trunks are propagated from the primary central office to smaller central offices making up the core network. The access portion of the network is considered to be an area within a suburb or small town from the central office to a subscriber\u27s home. Appendix A, located on page 60, contains a network diagram illustrating the scope of each of the different portions of the network. Considerations must also be given for the internal network to the residence such as category 5 (Cat5) cable or higher grade and network equipment that can provide up to 30 Megabits per second (Mbps) connections or throughput.
The equipment in the telecommunications network also plays a part in meeting the challenge of 30 Mbps bandwidth. GE switches should be used with single mode fiber optic cable in the core part of the network. Digital Subscriber Line Access Multiplexers (DSLAM) with the capability to filter Internet Group Management Protocol (IGMP) messages should be used in the access part of the network to facilitate bandwidth utilization. Placement of this equipment and how the data is aggregated is another issue to consider when implementing HDTV service.
Another major challenge facing the implementation of HDTV over DSL networks is controlling quality of service (QoS) throughout the network. Class of Service (CoS) and Differentiated Services (DiffServ) is a method of QoS that would enable video packets to have a higher priority and less delay than other data packets. The consumer could have data, video, and voice traffic all over the same DSL connection. Data, video and voice packets would need to have a different priority in order to maintain appropriate QoS levels for each service.
The use of advanced technology in video encoding will be essential to the success of the video service. MPEG-2, MPEG-4, and Windows Media 9 are just a few of the video encoding technologies that could be used to reduce the necessary bandwidth for HDTV. The advancement of this technology is essential to allow telecommunications providers to offer HDTV. Another challenge for the telecom operator concerns the security of the network and service after implementation. Theft of service will be another area that the telecomm operator will be forced to resolve. The cable operators currently face this issue and lose millions of dollars in revenue. Authentication, IP filtering and MAC address blocking are a few possible solutions to this problem
Black Hole Attack, in P2P based VoD Service, and its Effects on Swarm Sizes and Seeders
From the inception, BitTorrent has been under several types of attacks. Most of these attacks were aimed to deteriorate the performance of BitTorrent network or to collapse it.In this paper we have presented the effect of Black-hole attack especially in the case of BitTorrent based VoD services .we have simulated black-hole attack for BitTorrent based VoD services and studied the effect of number of malicious nodes in peer network of various swarm sizes. The number of attacking nodes taken was 1, 2, and 3 whereas the size of swarms was 10, 20 and 30. Also another important parameter taken into consideration for studying the effect was then total number of seeders. We have taken observation for attack simulations for various scenarios depending upon swarm size, numbers of seeder and number of attack nodes
- …