• Title/Summary/Keyword: Peer-to-peer Network

Search Result 423, Processing Time 0.025 seconds

A transport-history-based peer selection algorithm for P2P-assisted DASH systems based on WebRTC (WebRTC 기반 P2P 통신 병용 DASH 시스템을 위한 전달 이력 기반 피어 선택 알고리듬)

  • Seo, Ju Ho;Choi, Seong Hyun;Kim, Sang Jin;Jeon, Jae Young;Kim, Yong Han
    • Journal of Broadcast Engineering
    • /
    • v.24 no.2
    • /
    • pp.251-263
    • /
    • 2019
  • Recently the huge demand for Internet media streaming has dramatically increased the cost of the CDN (Content Delivery Network) and the need for a means to reduce it is increasing day by day. In this situation, a P2P-assisted DASH technology has recently emerged, which uses P2P (Peer-to-Peer) communications based on WebRTC (Web Real-Time Communication) standards to reduce the CDN cost. This paper proposes an algorithm that can significantly improve CDN cost savings in this technology by selecting peers based on the transport history. Also we implemented this algorithm in an experimental system and, after setting experimental conditions that emulate the actual mobile network environment, we measured the performance of the experimental system. As a result, we demonstrated that the proposed algorithm can achieve higher CDN cost savings compared to the conventional algorithm where peers are selected at random.

A P2P Media Streaming by SDS : Sequential Download System (SDS : Sequential Download System을 이용한 P2P 미디어 스트리밍)

  • Park, Byung-Chul;Roh, Sun-Sik;Lee, Dong-Eun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.11
    • /
    • pp.2166-2171
    • /
    • 2007
  • In this paper, we proposed a Sequential Download System(SDS) to provide high steaming QoS in p2p network. SDS is able to receive a media file simultaneously from multiple source peer by download manager and deal with unexpected leave of source peer. Also It can provide stable streaming services with minimum buffering delay and manage request of other peer by memory map in process of downloading.

Multimedia Contents Streaming Service using the Section Information Retrieval on P2P Network (구간정보를 이용한 P2P 상에서 멀티미디어 스트리밍)

  • Lee, Ji-Hyun;Han, Kwang-Rok
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.10
    • /
    • pp.1328-1337
    • /
    • 2007
  • We describe a method for streaming specific section using the section information among peers on P2P network. As peers tend to extract only the part of contents in which they are interested, an indexed file is created based on the section information of multimedia contents and registered in the search server. If a peer requests the streaming of specific parts of the contents to other corresponding peer using the section information that the server returns, the peer streams only separated section of the multimedia contents according to the information. For this process, we implement a function that a peer's PC can play a role as a server, and the peer streams the separated content based on the section information that the server supplies.

  • PDF

JXTA based P2P communication in MANET Networks (MANET 네트워크에서의 JXTA 기반의 P2P 통신)

  • Jeong Wang-Boo;Suh Hyun-Gon;Kim Ki-Hyung;Sohn Young-Ho
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2005.05a
    • /
    • pp.139-143
    • /
    • 2005
  • The P2P is a network environment supporting data exchange which is directly connected peers without limit of existing server-client and intervening central server for resource or offered service with each peer. JXTA is a representative of P2P system. JXTA is a typical distributed computing model that proposed by Sun Microsystems. JXTA that doesn't require centralized services or resources is adaptable in extreme changes of network organization. MANET(Mobile Ad Hoc Network) is a representative wireless network that is composed of mobile nodes without infrastructure. So MANET establishes the path for the communication of each peers and maintains the newest routing information by exchanging routing information. In this paper, we propose a technique of JXTAMAUET which implements JXTA which is the P2P network system from the wireless network which is becoming the foundation of ubiquitous computing. For the performance evaluation of the JXTAMANET, we use simulation.

  • PDF

A Study of Security Issues of Cognitive Radio Network (인지 무선통신 네트워크의 보안 문제 연구)

  • Moon, Sangook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.662-665
    • /
    • 2011
  • The cognitive radio (CR) network has been studied in the form of open source by vast number of communities, and the potential expectation is very high since the CR is based on reprogrammable platform. However, this characteristics of open-source software take high risk as well. As the peer-to-peer software has been abused, so high is the chance that the CR network can be abused public wide. Consequently, the benefit from the study of next-generation wireless network can be at risk because of the negative impact of violation of communication law or abusing the CR. In this contribution, we analyze the issues and the problems of the CR and discuss an efficient measure against security attacks.

  • PDF

The Design of Proxy Peer Algorithm based on DHT for Effective Resource Searching on JXTA Network Environments (JXTA 네트워크 환경에서 효율적인 자원 검색을 위한 DHT 기반프락시 피어 알고리즘 설계)

  • Lee, Gwang;Lee, Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.8
    • /
    • pp.1486-1492
    • /
    • 2007
  • Searching distributed resources efficiently is very important in distributed computing environments like P2P. But distributed resource searching may have system overheads and take a lot of time in proportion to the searching number, because distributed resource searching has to circuit many peers for searching information. In this paper, we design a proxy peer algorithm based on DHT(Distributed Hash Table) for efficient distributed resource searching in JXTA network environments. By containing the rendezvous information in proxy peer and searching a rendezvous peer firstly which has higher hit ratio, we can reduce the searching number and minimize system overheads.

Design and implementation of the MAC protocol for underwater vehicle network (수중 이동체 통신망을 위한 접속제어 프로토콜의 설계 및 구현)

  • 신동우;임용곤;김영길
    • Journal of Ocean Engineering and Technology
    • /
    • v.11 no.4
    • /
    • pp.180-188
    • /
    • 1997
  • This paper proposes a new efficient MAC(Media Access Control) protocol to establish the ultrasonic communication network for underwater vehicles, which ensures a certain level of maximum throughput regardless of the propagation delay of ultrasonic and allows fast data transmission through the multiple ultrasonic communication channel. A MAC protocol for underwater communication network that allows 'peer-to-peer' communication between a surface ship and multiple underwater systems is designed, and the proposed control protocol is implemented for its verification.

  • PDF

Content Distribution Mechanism in an All-Sender-All-Receiver Ad Hoc Network (모든 Peer가 송수신자인 Ad Hoc 네트워크에서의 자료 분배 방법에 대한 고찰)

  • Kang Seung-Seok
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2005.11a
    • /
    • pp.161-164
    • /
    • 2005
  • Mobile device users are sensitive to pay telecommunication charge for downloading Internet data, because the cost is proportional to the amount of data received. If there are device users who want to download the same content, they may cooperate each other to form an ad hoc network and share the partially downloaded content in order to reduce the amount of data downloaded. Each mobile device, called a peer, downloads a specific portion of the whole content using fee-based telecommunication channel, and exchanges the portion with other peers with free ad hoc channel in order that all participating peers are able to reconstruct the whole content in this situation, al1 participating peers become senders and receivers at the same time. In order to distribute the partial content to other peers, the ad hoc network requires a control led distribution mechanism. This paper introduces the per-peer-based distribution method in which one designated peer can transmit partial data to its neighbors at a time. Simulation results show that 90$\%$ of the telecommunication cost is saved with as few as 10 peers .

  • PDF

Implementation of the Alert System for Safety of Workers (근로자의 안전을 위한 경보시스템 구현)

  • Kim, In-Min;Ko, Bong-Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.6
    • /
    • pp.1138-1142
    • /
    • 2011
  • This paper proposes the Alert System, the purpose of which is to detect an accident and to take care of it quickly in a working place. In the previous studies, a wireless network system was suggested using 'Star Topology'. However, this study constructs the wireless network system of Peer-to-Peer Topology, which allows to build more efficient network for communication. Also, with this system it is possible to check other the worker's situation through double sensing with Temperature/Gas sensor and Inclination sensor. In order to take action quickly, the Alert System is using a monitoring program which visualizes a worker's situation and the area where an accident occurs.

The Dilemma of Parameterizing Propagation Time in Blockchain P2P Network

  • Rahmadika, Sandi;Noh, Siwan;Lee, Kyeongmo;Kweka, Bruno Joachim;Rhee, Kyung-Hyune
    • Journal of Information Processing Systems
    • /
    • v.16 no.3
    • /
    • pp.699-717
    • /
    • 2020
  • Propagation time on permissionless blockchain plays a significant role in terms of stability and performance in the decentralized systems. A large number of activities are disseminated to the whole nodes in the decentralized peer-to-peer network, thus causing propagation delay. The stability of the system is our concern in the first place. The propagation delay opens up opportunities for attackers to apply their protocol. Either by accelerating or decelerating the propagation time directly without proper calculation, it brings numerous negative impacts to the entire blockchain system. In this paper, we thoroughly review and elaborate on several parameters related to the propagation time in such a system. We describe our findings in terms of data communication, transaction propagation, and the possibility of an interference attack that caused an extra propagation time. Furthermore, we present the influence of block size, consensus, and blockchain scalability, including the relation of parameters. In the last session, we remark several points associated with the propagation time and use cases to avoid dilemmas in the light of the experiments and literary works.