78,188 research outputs found

    Smart PIN: utility-based replication and delivery of multimedia content to mobile users in wireless networks

    Get PDF
    Next generation wireless networks rely on heterogeneous connectivity technologies to support various rich media services such as personal information storage, file sharing and multimedia streaming. Due to users’ mobility and dynamic characteristics of wireless networks, data availability in collaborating devices is a critical issue. In this context Smart PIN was proposed as a personal information network which focuses on performance of delivery and cost efficiency. Smart PIN uses a novel data replication scheme based on individual and overall system utility to best balance the requirements for static data and multimedia content delivery with variable device availability due to user mobility. Simulations show improved results in comparison with other general purpose data replication schemes in terms of data availability

    PERFORMANCE STUDY OF AD HOC WIRELESS LAN FOR MULTIMEDIA STREAMING APPLICATIONS

    Get PDF
    Wireless Local Area Network (WLAN) provides high-speed and cable-free access for computer-to-computer information transfer within the coverage range. The optional feature of WLAN is ad hoc, which allows the network to be formed and deformed without the need of system administration or access point. Multimedia streaming through WLAN allows users to download and play a small chunk of the multimedia file simultaneously. An ad hoc base wireless network is used in this project rather than infrastructure base due to the simpler architecture, cheaper set up cost of ad hoc network and no system administrator required. Unlike file sharing, streaming will not download the whole file. Streaming can be used for multimedia distribution without users having the illegal copies of the file. In this project, a multimedia file is to be streamed, but not downloaded, through the WLAN without passing through any access point. The host computer broadcast the multimedia file using "media server configurator" while the client computer streamed from the host computer using "streaming media player". Multihop streaming allows a node that is totally out of the coverage range to stream from the host computer, using the bridge as a passage. The streaming of the multimedia file is seamless and smooth within the ad hoc network. A node that is out of the coverage range can stream from the host computer by using the multi-hop concept although the distance between the host and the client does affect the performance. In multi-hop wireless network, the streaming process is at its best when the bridge is about 3 meters away from the receiving node

    Security Analysis of Multimedia Data Encryption Technique Using Piecewise Linear Chaotic Maps

    Get PDF
    In the current age of globalization file sharing has become an important part of every business process. Also in recent years, transfer of image or multimedia content across the world has become increasingly popular. To prov ide security, to large amount of multimedia content, a strong cryptographic technique is required, which can secure the multimedia content at desired transmission rate. Unfortunately, none of the traditional cryptographic algorithms provide enough security at required transmission rate. But chaos based cryptographic algorithms have suggested some new and efficient ways to develop secure multimedia or image encryption techniques. T his paper aims to analyze the security of "Multimedia Data Encryption Algorithm", on different kind of multimedia images and further to propose a new encryption technique for multimedia data

    Evaluation of clustering techniques for efficient searching in JXTA-based P2P systems

    Get PDF
    The efficient file searching is an essential feature in P2P systems. While many current approaches use brute force techniques to search files by meta information (file names, extensions or user-provided tags), the interest is in implementing techniques that allow content-based search in P2P systems. Recently, clustering techniques have been used for searching text documents to increase the efficiency of document discovery and retrieval. Integrating such techniques into P2P systems is important toenhance searching in P2P file sharing systems. While some effort has been done for content-based searching for text documents in P2P systems, there has been few research work for applying these techniques for multimedia content in P2P systems. In this paper we introduce two P2P content-based clustering techniques for multimedia documents. These techniques are an adaptation of the existing Class-based Semantic Search (CSS) algorithm for text documents. The proposed algorithms have been integrated into a JXTA-based Overlay P2P platform, and some initial evaluation results are provided. The JXTA-Overlay together with the considered clustering techniques is thus very useful for developing P2P multimedia applications requiring efficient searching of multimedia contents in peer nodesPeer ReviewedPostprint (published version

    IMPLEMENTASI PROTOKOL TURN (TRAVERSAL USING RELAY NAT) PADA JARINGAN YANG MENGGUNAKAN NAT

    Get PDF
    ABSTRAKSI: Perkembangan teknologi saat ini semakin pesat, sebagai contoh teknologi file sharing dan aplikasi multimedia seperti Voice over IP. Teknologi file sharing dan voice over IP sedang banyak diminati oleh banyak orang terutama para pengguna suatu jaringan seperti LAN (Local Area Network).Dalam suatu jaringan yang berada di bawah atau di belakang NAT (Network Address Translator), seorang user tidak dapat melakukan kegiatan file sharing atau melakukan voice over IP dari user lain melalui sambungan TCP atau UDP.Untuk dapat melakukan koneksi antar user atau klien (single peer) yang berada di belakang NAT, maka dibutuhkan suatu protokol yang dapat “menembus” NAT tersebut. Sehingga user dapat melakukan aktivitas koneksinya tanpa adanya hambatan.Pada proyek akhir ini, dilaksanakan suatu perancangan sebuah aplikasi multimedia dan file sharing dengan user yang berada di belakang NAT atau firewall dengan menggunakan protokol yang dapat “menembus” NAT yaitu TURN (Traversal Using Relay NAT). Dalam implementasi aplikasinya, menggunakan TURNserver.Tujuan dari Proyek Akhir yang dilakukan adalah pengujian sistem pada jaringan yang menggunakan NAT untuk dapat melakukan suatu aplikasi yaitu VoIP dan file sharing pada jaringan, tanpa mengurangi sisi keamanan pada jaringan tersebut. Dalam realisasinya digunakan suatu server yang disebut dengan TURNserver.Kata Kunci : File Sharing, VoIP, NAT, TURN (Traversal Using Relay NAT), dan TURNserver.ABSTRACT: Current technological developments more rapidly, for example file sharing technology and multimedia applications such as Voice over IP. Technology file sharing and voice over IP is great demand by many people, especially the users of a network such as LAN (Local Area Network). In a network that is under or behind the NAT (Network Address Translator), a user can not perform activities files sharing or do voice over IP from other users via TCP or UDP connection.To be able to make connections between users or clients (single peer), which is behind NAT, it needs a protocol that can "penetrate" the NAT. So that the user can perform activities without restriction connections.In this final project, carried out the design of a multimedia application and file sharing with users who are behind NAT or firewall by using the protocol that can "penetrate" the NAT that is TURN (Traversal Using Relay NAT). In the implementation of the applications, using TURNserver.The end goal of the project is testing conducted on systems that use NAT networking in order to make an application that is VoIP and file sharing on the network, without reducing the security on the network. In reality there is a server called TURNserver.Keyword: File Sharing, VoIP, NAT, TURN (Traversal Using Relay NAT), and TURNserver

    Penerapan Multimedia Audio Galery Ilearning Community and Services (Magics) Sebagai Media Penyimpanan Dokumentasi Pada Perguruan Tinggi Raharja

    Full text link
    Technology information had a critical role in human life, no exception in education. One of the products technology that is occupied in education is multimedia. Perguruan Tinggi Raharja which applies the methods of iLearning need multimedia in realizing concept 4B. The application of multimedia was meant to make efficiency and effectiveness in the procurement information in form of documentation such as image, audio, and video. However Green Documentation as a file storage in Perguruan Tinggi Raharja is still less than optimal, so the documentation is spread across multiple storage online media. This is because either Green Documentation and media online were available haven't been enough to be storage requirements which covers images, audio, and video in one integrated place that you can share. As a result, students having trouble finding documentation of activities held by the campus. MAGICS is an online media which allows all documentation can be arranged neatly to facilitate searches. This paper tries to describe the problems and solving in an information systems, especially in terms of documentation. Implementation of MAGICS can be used as a solution for providing file storage and file sharing in the application of learning method (iLearning)

    Web 2.0 under the light of free software

    Get PDF
    The development of Web 2.0 has favoured a closer relation between Internet users and the different web applications that facilitate creating, sharing and structuring digital information in a horizontal and collaborative way through so-called social software. Social software includes tools that are familiar to us all, such as chats, forums, blogs, wikis, syndication standards (RSS type), social tagging, multimedia file sharing, social networking, etc. They are tools oriented to give the user a greater capacity of interaction, and a stronger control over the content and the format in which they can be presented

    Web 2.0 under the Light of Free Software

    Get PDF
    The development of Web 2.0 has favoured a closer relation between Internet users and the different web applications that facilitate creating, sharing and structuring digital information in a horizontal and collaborative way through so-called social software. Social software includes tools that are familiar to us all, such as chats, forums, blogs, wikis, syndication standards (RSS type), social tagging, multimedia file sharing, social networking, etc. They are tools oriented to give the user a greater capacity of interaction, and a stronger control over the content and the format in which they can be presented

    Web 2.0 under the light of free software

    Get PDF
    The development of Web 2.0 has favoured a closer relation between Internet users and the different web applications that facilitate creating, sharing and structuring digital information in a horizontal and collaborative way through so-called social software. Social software includes tools that are familiar to us all, such as chats, forums, blogs, wikis, syndication standards (RSS type), social tagging, multimedia file sharing, social networking, etc. They are tools oriented to give the user a greater capacity of interaction, and a stronger control over the content and the format in which they can be presented
    • …
    corecore