3,332 research outputs found

    P2P IPTV Measurement: A Comparison Study

    Full text link
    With the success of P2P file sharing, new emerging P2P applications arise on the Internet for streaming content like voice (VoIP) or live video (IPTV). Nowadays, there are lots of works measuring P2P file sharing or P2P telephony systems, but there is still no comprehensive study about P2P IPTV, whereas it should be massively used in the future. During the last FIFA world cup, we measured network traffic generated by P2P IPTV applications like PPlive, PPstream, TVants and Sopcast. In this paper we analyze some of our results during the same games for the applications. We focus on traffic statistics and churn of peers within these P2P networks. Our objectives are threefold: we point out the traffic generated to understand the impact they will have on the network, we try to infer the mechanisms of such applications and highlight differences, and we give some insights about the users' behavior.Comment: 10 page

    Multiple-Tree Push-based Overlay Streaming

    Full text link
    Multiple-Tree Overlay Streaming has attracted a great amount of attention from researchers in the past years. Multiple-tree streaming is a promising alternative to single-tree streaming in terms of node dynamics and load balancing, among others, which in turn addresses the perceived video quality by the streaming user on node dynamics or when heterogeneous nodes join the network. This article presents a comprehensive survey of the different aproaches and techniques used in this research area. In this paper we identify node-disjointness as the property most approaches aim to achieve. We also present an alternative technique which does not try to achieve this but does local optimizations aiming global optimizations. Thus, we identify this property as not being absolute necessary for creating robust and heterogeneous multi-tree overlays. We identify two main design goals: robustness and support for heterogeneity, and classify existing approaches into these categories as their main focus

    QoE in Pull Based P2P-TV Systems: Overlay Topology Design Tradeoff

    Get PDF
    Abstract—This paper presents a systematic performance anal-ysis of pull P2P video streaming systems for live applications, providing guidelines for the design of the overlay topology and the chunk scheduling algorithm. The contribution of the paper is threefold: 1) we propose a realistic simulative model of the system that represents the effects of access bandwidth heterogeneity, latencies, peculiar characteristics of the video, while still guaranteeing good scalability properties; 2) we propose a new latency/bandwidth-aware overlay topology design strategy that improves application layer performance while reducing the underlying transport network stress; 3) we investigate the impact of chunk scheduling algorithms that explicitly exploit properties of encoded video. Results show that our proposal jointly improves the actual Quality of Experience of users and reduces the cost the transport network has to support. I

    Three scenarios for TV in 2015

    Get PDF
    By offering three visions of the future of television through 2015, this article aims to highlight some of the socio-economic changes that the television sector may experience in the long term. It highlights the structuring impact that PVR could have on the sector, as well as the upheavals that may arise from a new paradigm of internet TV. It also highlights the options now open to TV channel operators wishing to set up a mobile TV service and the threats facing mobile telecommunications operators in the development of this market as a result.television; forecast; media usages

    A Comprehensive Analysis of Swarming-based Live Streaming to Leverage Client Heterogeneity

    Full text link
    Due to missing IP multicast support on an Internet scale, over-the-top media streams are delivered with the help of overlays as used by content delivery networks and their peer-to-peer (P2P) extensions. In this context, mesh/pull-based swarming plays an important role either as pure streaming approach or in combination with tree/push mechanisms. However, the impact of realistic client populations with heterogeneous resources is not yet fully understood. In this technical report, we contribute to closing this gap by mathematically analysing the most basic scheduling mechanisms latest deadline first (LDF) and earliest deadline first (EDF) in a continuous time Markov chain framework and combining them into a simple, yet powerful, mixed strategy to leverage inherent differences in client resources. The main contributions are twofold: (1) a mathematical framework for swarming on random graphs is proposed with a focus on LDF and EDF strategies in heterogeneous scenarios; (2) a mixed strategy, named SchedMix, is proposed that leverages peer heterogeneity. The proposed strategy, SchedMix is shown to outperform the other two strategies using different abstractions: a mean-field theoretic analysis of buffer probabilities, simulations of a stochastic model on random graphs, and a full-stack implementation of a P2P streaming system.Comment: Technical report and supplementary material to http://ieeexplore.ieee.org/document/7497234

    Detection of encrypted traffic generated by peer-to-peer live streaming applications using deep packet inspection

    Get PDF
    The number of applications using the peer-to-peer (P2P) networking paradigm and their popularity has substantially grown over the last decade. They evolved from the le-sharing applications to media streaming ones. Nowadays these applications commonly encrypt the communication contents or employ protocol obfuscation techniques. In this dissertation, it was conducted an investigation to identify encrypted traf c ows generated by three of the most popular P2P live streaming applications: TVUPlayer, Livestation and GoalBit. For this work, a test-bed that could simulate a near real scenario was created, and traf c was captured from a great variety of applications. The method proposed resort to Deep Packet Inspection (DPI), so we needed to analyse the payload of the packets in order to nd repeated patterns, that later were used to create a set of SNORT rules that can be used to detect key network packets generated by these applications. The method was evaluated experimentally on the test-bed created for that purpose, being shown that its accuracy is of 97% for GoalBit.A popularidade e o nĂșmero de aplicaçÔes que usam o paradigma de redes par-a-par (P2P) tĂȘm crescido substancialmente na Ășltima dĂ©cada. Estas aplicaçÔes deixaram de serem usadas simplesmente para partilha de ficheiros e sĂŁo agora usadas tambĂ©m para distribuir conteĂșdo multimĂ©dia. Hoje em dia, estas aplicaçÔes tĂȘm meios de cifrar o conteĂșdo da comunicação ou empregar tĂ©cnicas de ofuscação directamente no protocolo. Nesta dissertação, foi realizada uma investigação para identificar fluxos de trĂĄfego encriptados, que foram gerados por trĂȘs aplicaçÔes populares de distribuição de conteĂșdo multimĂ©dia em redes P2P: TVUPlayer, Livestation e GoalBit. Para este trabalho, foi criada uma plataforma de testes que pretendia simular um cenĂĄrio quase real, e o trĂĄfego que foi capturado, continha uma grande variedade de aplicaçÔes. O mĂ©todo proposto nesta dissertação recorre Ă  tĂ©cnica de Inspecção Profunda de Pacotes (DPI), e por isso, foi necessĂĄrio 21nalisar o conteĂșdo dos pacotes a fim de encontrar padrĂ”es que se repetissem, e que iriam mais tarde ser usados para criar um conjunto de regras SNORT para detecção de pacotes chave· na rede, gerados por estas aplicaçÔes, afim de se poder correctamente classificar os fluxos de trĂĄfego. ApĂłs descobrir que a aplicação Livestation deixou de funcionar com P2P, apenas as duas regras criadas atĂ© esse momento foram usadas. Quanto Ă  aplicação TVUPlayer, foram criadas vĂĄrias regras a partir do trĂĄfego gerado por ela mesma e que tiveram uma boa taxa de precisĂŁo. VĂĄrias regras foram tambĂ©m criadas para a aplicação GoalBit em que foram usados quatro cenĂĄrios: com e sem encriptação usando a opção de transmissĂŁo tracker, e com e sem encriptação usando a opção de transmissĂŁo sem necessidade de tracker (aqui foi usado o protocolo Kademlia). O mĂ©todo foi avaliado experimentalmente na plataforma de testes criada para o efeito, sendo demonstrado que a precisĂŁo do conjunto de regras para a aplicação GoallBit Ă© de 97%.Fundação para a CiĂȘncia e a Tecnologia (FCT
    • 

    corecore