SlideShare a Scribd company logo
1 of 4
Download to read offline
K L Sudheera .I et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.968-971

RESEARCH ARTICLE

www.ijera.com

OPEN ACCESS

Dynamic P2P Streaming Using Delaunay Edges
Kavya Lakshmi Sudheera .I1, Dr A Jayalakshmi2
1
2

student, D V R & Dr H S Mic College Of Technology, Kanchikacherla, Krishna (Dt).
professor, D V R & Dr H S Mic College Of Technology, Kanchikacherla, Krishna (Dt).

Abstract
Commercial P2P streaming servers like Zattoo, Joost are some Content Delivery Networks (CDN) based on P2P
network architecture that acts viable alternatives to client-server(broadcast systems) architectures such as
YouTube. Visual and audio feeds via cable, satellite systems are evolving to IPTV and P2PTV based systems.
Data delivery is better in broadcast based systems when content is a static feed. But as the user volume for
dynamic content increases, internet scale search and data delivery using p2p systems beats any broadcast based
systems. This is essentially the driving force behind P2P Streaming Services. P2P streaming systems are usually
classified as either tree-oriented push or mesh-oriented swarming and Zatto happens to be a hybrid
implementation. Previously, for performance improvement Zattoo implemented a receiver-based peer-division
multiplexing engine involving repeater nodes to deliver live streaming content on a p2p network was developed.
This hybrid approach causes resource drain with performance and scalability issues. Such an implementation
can be handled by commercial systems like Zattoo but considering medium, small scale streaming systems we
propose to use P2PStreaming services governed by Delauny Triangulation protocol. The paper presents an
algorithm to build each peer with Delaunay links incrementally based on random peer information returned from
P2P network querying or accessing the same content signifying a live feed. This algorithm is then optimized by
considering the Euclidean distance between peers to speed up the overlay convergence thus improving content
loading delays at same time supporting many other peers. A practical implementation of the proposed system
validates our claim.
Index Terms: Delaunay triangulation, Cool Streaming, multicasting, random peers, P2P network querying,
peer-to-peer technology.
I.
INTRODUCTION
Due to lack of video streaming in earlier
technologies we introduce the IPTV Network for
sending information to more no. of clients using single
server file sharing. IPTV is a system through which
television services are delivered using Internet
Protocol suite packet switched network such as
Internet, but this is a centralized system for file
sharing. Due to this issue we introduce the P2P
Network for file sharing
P2P Network has the following properties:
ļ‚· The end-to-end delay between the source and
receiver to be excessive because they have number
of intermediate receivers for file sharing.
ļ‚· Efficient use of network resources but resource is
small due to size limitation of the resource, it is
very important to increase the scalability of the
system with large system process.
It is a type of decentralized and distributed
network architecture in which every node act as a both
supplier and consumer for file sharing. In Peer to Peer
network tasks are shared among
multiple
interconnected peers which may take a position of their
resources directly available to the other network Peer
to Peer network can be implemented on some of the
overlay networks on the top of the physical network
topology where nodes are overlay from the subnet of
www.ijera.com

the nodes in the physical network. Overlays are used
for indexing and peer discovery and make the P2P
system independent from the physical network
topology.

Figure 1: Overlay Peer to Peer Network.
We are sending information from server
resources to various clients using peer to peer overlay
network. Preceding this information we will send the
relevant file sharing using same resources. For that
purpose we are using P2P TV, it will be used for only
conventional networks, i.e it is only supported for
traditional approach in P2P TV networks. It will not be
supported by commercial file sharing in P2P networks.
968 | P a g e
K L Sudheera .I et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.968-971
In this region we are introducing Zattoo P2P network.
Zattoo P2P sharing is the main solution for
Commercial network file sharing as compared to
conventional network. In this paper we will introduce
Delaunay Triangulation Protocol governed by the P2P
networks. We are arranging all the peers with
equivalent file sharing with same time. By using our
proposed work we will increase the performance of the
file sharing system in between the peers.

II.

RELATED WORK

The general, approach for self organized
applications into logical overlay network and transfer
data along with the edges of overlay network is based
on unicast services. In peer to peer networks we are
providing three types of distributed services, they are
tree based push schemas, mesh based push schemas
and distributed based file sharing schemas. In general
we are using Zattoo like systems like PPLive,
PPStream, Sop Cast, TV Ants, and UUSee from China,
and Joost, Livestation, Octoshape, and RawFlow
another networks are present in the sequence of file
sharing process.

Figure 2: Zattoo Network architecture in live
streaming.
Zattoo has increased the streaming quality of
its android app recently and can now provide much
better and stable streams including HD quality for our
Android users. Our proposed technique is unique that
are able to collect network core data from a large
production system with registered users knowledge.
We are increasing the performance of the streaming
with single resource in server. For this purpose we are
introducing Delaunay triangulation protocol version
for equal sharing in peer to peer network. A Delaunay
triangulation, for a set of points in plane can be
arranged in the triangulation DT(p).It will maximize
the minimum angles of all the angles of triangle.

III.

EXISTING SYSTEM

P2PTV based live streaming services offered
by Commercial peer-to-peer systems like Zattoo act as
alternatives to conventional viewing On 5 August
2008, Zattoo asked its Spanish users for a ā‚¬2.40 charge
by SMS in order to continue with the service during
August and September. In March 2009, Zattoo
www.ijera.com

www.ijera.com

removed its services from Belgium in an attempt to
keep its costs down. Offers decent Performance at
higher costs. For performance improvement in systems
like
Zattoo
a
receiver-based,
peer-division
multiplexing engine involving repeater nodes to
deliver live streaming content on a p2p network was
developed. But repeater nodes implementation is a
huge drain on financial resources and can only be
handled by commercial systems like Zattoo. P2P
systems are usually classified as either tree-based push
or mesh-based swarming. In tree-based push schemes,
peers organize themselves into multiple distribution
trees. In mesh-based swarming, peers form a randomly
connected mesh, and content is swarmed via
dynamically constructed directed acyclic paths. Zattoo
is an hybrid implementation of the above to systems.
Such an implementation can only be handled by
commercial systems like Zattoo but this approach
happens to be a resource drain especially considering
small and medium scale systems.

IV.

PROPSED SYSTEM

Earlier technologies are not sufficient for free
live P2P streaming because those technologies are not
cost effective. Extending this approach to live free P2P
Streaming systems at reduced costs and achieving
optimal performance is required. So we propose an
algorithm to build each peer with Delaunay links then
they send same information to our networks. Our
proposed algorithm is optimized by using the
Euclidean distance between peers to speed up the
overlay virtual streaming. This approach reduces
content loading delays supporting other peers present
in the network using Delaunay Triangulation,
assurance sending information at the same time.
Delaunay triangulation is most attractive for
triangulation due to its special feature that
circumscribed circle of triangle must not contain other
points than the points of the original triangle.

Figure 3: Delaunay Triangulation Overlay Network
Architecture.
As shown in fig 3 we will describe the
following things.
1. Same equivalent time sharing presented in the
connection between each peers.
2. Increase the performance of the overlay
network in P2P streaming.
By using polygons in Delaunay triangulation,
it gives a nice set of triangles to the other objects and

969 | P a g e
K L Sudheera .I et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.968-971
also helps us to find out the Euclidance distance
between each node present in the network.

V.

DELAUNAY TRIANGULATION
PROTOCOL

Delaunay triangulations have been exploited
recently to implementing systems provided efficient
routing and broadcasting. In this paper we propose to
extend Delaunay with distributed algorithm for
incremental construction of P2P networks. Distributed
algorithm follows Edge Flipping procedure with
distribution of peers. Our solution is based on the
definition of a distributed version of the classic Edge
Flipping incremental algorithm whose original version
is exploited by centralized algorithms to build
Delaunay overlays. The centralized Edge Flipping
algorithm assumes total knowledge regarding the
nodes in the network. Our proposed Delaunay
triangulation protocol is able to compute Delaunay
neighborhood for each node. Edge Flipping is a
centralized algorithm for the construction of a
Delaunay triangulation based on the idea of inserting
sites, randomly one at a time, and updating the
triangulation with each new addition.
INPUT: n be the edge corresponding to the
edge to be inserted
if (n==NeighborTest(n))
{
then
ADD n to the Local View
p = lat(n)
s = lan(n)
LocalEdgeFlipping(ap,n)
LocalEdgeFlipping(as,n)
}
Algorithm 1: Insertion of New Node Procedure.
Above algorithm shows the insertion of new
node in to P2P networks. This insertion can be done
based on their longitude and latitude values present in
the network according to the services provided by the
network. This insertion checks Local edge connection
present in the network using the following process.
Input: nm, the edge to be checked n the new edge
created
if (NeighborTest (nm) != Neighbor)
{
then
DELETE w from the Local View
Let nwx be the triangle adjacent to nwnnew
LocalEdgeFlipping(nm,n)
}
Algorithm 2: Local edge Flipping process in the
P2P networks.
In this process we are calculating neighbor
test for new connection to network for accessing
services.

www.ijera.com

www.ijera.com

Input: nm the edge to be checked Let x and y be the
other vertices of the triangles sharing nm
if (InCircle(a,b,x,y) <= 0 or InCircle(a,b,x,y) <=0)
{
then
return false
else
return true
}
Algorithm 3: Neighbor Test Generation in P2P
network.
Every entering node is verified for
establishing connection with other nodes or server
present in the network. If one neighbor was found in
the circle presented in the network then new node can
be added to the network according their longitude and
latitude values. The above three algorithms can be
followed in an iterative process for each node to add
into the network.

VI.

EXPERIMENTAL RESULTS

In computational geometry well known topics
conclude with set of points presented in the finite
elements for modeling shape representation terrain
modeling volume rendering and computer vision.
Increasing the research in Delaunay triangulation, time
Complexity is the main aspect present in file sharing.
Uniform distribution takes more time for other
networks present in the P2P networks. As mentioned in
the above theory we consider each node longitude and
latitude values according to the network. After entering
into network then we will find out the Euclidian
distance between nodes present in the network as
follows:

Figure 4: Embedding nodes in network with
Euclidian space between nodes.
The basic idea is to ask each node to maintain
z co-ordinate characterizing their locations in network
so that distance between two nodes can be predicted by
evaluating a distance function nodes co-ordinate
(Longitude and latitude) values. Euclidian distance dp
with each element present in the internet coordinate
system.
Then Euclidian distance is calculated as
follows:

970 | P a g e
K L Sudheera .I et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.968-971
Where dNi and dNj are the distance vector that every
element it is the distance from i to each node present in
the network. We define that Euclidean distance
between dp is the network distance measured by the ith
node to jth node.

[3]

[4]

[5]

[6]

Figure 5: Comparison results of live streaming with
multi fluxing and Delaunay Triangulation Protocol
with Euclidean distance calculation.
Comparison results between our existing
multiplex live streaming process and our proposed
work delaunay triangulation with Euclidean distance
between each node present in the peer to peer to
network. Those results are calculated by the above
mentioned equation for Euclidean space between every
node present in the network.

VII.

[7]

www.ijera.com

K. Shami et al., ā€œImprove the P2P Network
Scalability Due to impact of the Peer
Characters,ā€ in Proc. IEEE INFOCOM Mini
Conference, April 2009.
J. Liang and K. Nahrstedt, ā€œImprovement of
the Locality of peer to peer streaming using
Dagstream,ā€ in Proc. SPIE Multimedia
Computing and Networking, January 2006.
R. Rejaie and S. Stafford, ā€œPeer to Peer
Receiver overlay networks using architecture
Framework,ā€ in Proc. ACM NOSSDAV,
2004.
ā€œDistributed Delaunay Triangulation based on
efficient and accurate protocols,ā€ The Univ.
of Texas at Austin, Dept. of Computer
Sciences, Tech. Rep. TR-07-59, November
2007, revised September 2008.
Xiaotian Shen,ā€ A Survey Of Distance
Estimation For P2P Networkā€, Supervisor:
Professor dr. ir. Piet Van Mieghem Mentor:
Ir. Xiaoming Zhou, Ir. Siyu Tang, and Ir. Yue
Lu June 25, 2007 M.Sc. Thesis PVM 2007042.

CONCLUSION

P2P systems are usually classified as either
tree-based push or mesh-based swarming. In tree-based
push schemes, peers organize themselves into multiple
distribution trees. In mesh-based swarming, peers form
a randomly connected mesh, and content is swarmed
via dynamically constructed directed acyclic paths.
Zattoo is an hybrid implementation of the above to
systems. Such an implementation can only be handled
by commercial systems like Zattoo but this approach
happens to be a resource drain especially considering
small and medium scale systems. In this paper we
propose an algorithm to build each peer with Delaunay
links incrementally by including random peers
returned from P2P network querying or accessing the
same content. The algorithm is then optimized by
considering the Euclidean distance between peers to
speed up the overlay convergence. This approach
reduces content loading delays significantly at the
same time supporting many other peers thus attaining
performance and scalability parameters.

REFERENCES
[1]

[2]

J. C. Cavendish, Planar Domains for finite
element
method
using
Automatic
Triangulation, Int. J. for Numerical Methods
in Engineering 8 (1974) 679{696.
H. J. Choi, ā€œAn optimization algorithm for
implementation of a flight path system in
triangulation
networkā€,
MS.
Thesis,
POSTECH, 1996.

www.ijera.com

971 | P a g e

More Related Content

What's hot

COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTS
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA  AND CHORD DHTS COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA  AND CHORD DHTS
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTS
ijp2p
Ā 
Iaetsd an enhancement for content sharing over
Iaetsd an enhancement for content sharing overIaetsd an enhancement for content sharing over
Iaetsd an enhancement for content sharing over
Iaetsd Iaetsd
Ā 
Da3210751081
Da3210751081Da3210751081
Da3210751081
IJMER
Ā 
Fundamentals of internet_measurement_a_tutorial
Fundamentals of internet_measurement_a_tutorialFundamentals of internet_measurement_a_tutorial
Fundamentals of internet_measurement_a_tutorial
Turisticae
Ā 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
IOSR Journals
Ā 

What's hot (18)

Study guide1(1)
Study guide1(1)Study guide1(1)
Study guide1(1)
Ā 
Centrality-Based Network Coder Placement For Peer-To-Peer Content Distribution
Centrality-Based Network Coder Placement For Peer-To-Peer Content DistributionCentrality-Based Network Coder Placement For Peer-To-Peer Content Distribution
Centrality-Based Network Coder Placement For Peer-To-Peer Content Distribution
Ā 
CONCEPTUAL FRAMEWORK OF REDUNDANT LINK AGGREGATION
CONCEPTUAL FRAMEWORK OF REDUNDANT LINK AGGREGATIONCONCEPTUAL FRAMEWORK OF REDUNDANT LINK AGGREGATION
CONCEPTUAL FRAMEWORK OF REDUNDANT LINK AGGREGATION
Ā 
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTS
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA  AND CHORD DHTS COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA  AND CHORD DHTS
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTS
Ā 
Recital Study of Various Congestion Control Protocols in wireless network
Recital Study of Various Congestion Control Protocols in wireless networkRecital Study of Various Congestion Control Protocols in wireless network
Recital Study of Various Congestion Control Protocols in wireless network
Ā 
A XMLRPC Approach to the Management of Cloud Infrastructure
A XMLRPC Approach to the Management of Cloud InfrastructureA XMLRPC Approach to the Management of Cloud Infrastructure
A XMLRPC Approach to the Management of Cloud Infrastructure
Ā 
Enhancing Cloud Computing Security for Data Sharing Within Group Members
Enhancing Cloud Computing Security for Data Sharing Within Group MembersEnhancing Cloud Computing Security for Data Sharing Within Group Members
Enhancing Cloud Computing Security for Data Sharing Within Group Members
Ā 
1.a distributed three hop routing protocol to increase the
1.a distributed three hop routing protocol to increase the1.a distributed three hop routing protocol to increase the
1.a distributed three hop routing protocol to increase the
Ā 
Virtual Backbone Based Content Routing in Wireless Ad-Hoc Network
Virtual Backbone Based Content Routing in Wireless Ad-Hoc NetworkVirtual Backbone Based Content Routing in Wireless Ad-Hoc Network
Virtual Backbone Based Content Routing in Wireless Ad-Hoc Network
Ā 
F233842
F233842F233842
F233842
Ā 
Iaetsd an enhancement for content sharing over
Iaetsd an enhancement for content sharing overIaetsd an enhancement for content sharing over
Iaetsd an enhancement for content sharing over
Ā 
Da3210751081
Da3210751081Da3210751081
Da3210751081
Ā 
Fundamentals of internet_measurement_a_tutorial
Fundamentals of internet_measurement_a_tutorialFundamentals of internet_measurement_a_tutorial
Fundamentals of internet_measurement_a_tutorial
Ā 
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Ā 
Multipath TCP-Goals and Issues
Multipath TCP-Goals and IssuesMultipath TCP-Goals and Issues
Multipath TCP-Goals and Issues
Ā 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
Ā 
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...
Ā 
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
Ā 

Viewers also liked

Question three
Question threeQuestion three
Question three
hayleywells
Ā 
Assistant photographer performance appraisal
Assistant photographer performance appraisalAssistant photographer performance appraisal
Assistant photographer performance appraisal
lindameygi
Ā 
P pt ti
P pt tiP pt ti
P pt ti
SiHa NZ
Ā 
ImmoStepLogo ok
ImmoStepLogo okImmoStepLogo ok
ImmoStepLogo ok
Dora Massaert
Ā 
University Talks #1 | Š’ŠøŠŗтŠ¾Ń€ Š’Š°ŃŠøŠ»ŃŒŠµŠ² - ŠšŠ°Šŗ стŠ°Ń‚ŃŒ счŠ°ŃŃ‚Š»ŠøŠ²Ń‹Š¼, сŠ¾Ń…Ń€Š°Š½Šøть счŠ°ŃŃ‚...
University Talks #1 | Š’ŠøŠŗтŠ¾Ń€ Š’Š°ŃŠøŠ»ŃŒŠµŠ² - ŠšŠ°Šŗ стŠ°Ń‚ŃŒ счŠ°ŃŃ‚Š»ŠøŠ²Ń‹Š¼, сŠ¾Ń…Ń€Š°Š½Šøть счŠ°ŃŃ‚...University Talks #1 | Š’ŠøŠŗтŠ¾Ń€ Š’Š°ŃŠøŠ»ŃŒŠµŠ² - ŠšŠ°Šŗ стŠ°Ń‚ŃŒ счŠ°ŃŃ‚Š»ŠøŠ²Ń‹Š¼, сŠ¾Ń…Ń€Š°Š½Šøть счŠ°ŃŃ‚...
University Talks #1 | Š’ŠøŠŗтŠ¾Ń€ Š’Š°ŃŠøŠ»ŃŒŠµŠ² - ŠšŠ°Šŗ стŠ°Ń‚ŃŒ счŠ°ŃŃ‚Š»ŠøŠ²Ń‹Š¼, сŠ¾Ń…Ń€Š°Š½Šøть счŠ°ŃŃ‚...
Amir Abdullaev
Ā 
IND-2012-136 SBS Jijjeani
IND-2012-136 SBS Jijjeani IND-2012-136 SBS Jijjeani
IND-2012-136 SBS Jijjeani
designforchange2012
Ā 
Airplane pilot performance appraisal
Airplane pilot performance appraisalAirplane pilot performance appraisal
Airplane pilot performance appraisal
lindameygi
Ā 

Viewers also liked (20)

Ez36937941
Ez36937941Ez36937941
Ez36937941
Ā 
Fd36957962
Fd36957962Fd36957962
Fd36957962
Ā 
Fe36963967
Fe36963967Fe36963967
Fe36963967
Ā 
Question three
Question threeQuestion three
Question three
Ā 
Assistant photographer performance appraisal
Assistant photographer performance appraisalAssistant photographer performance appraisal
Assistant photographer performance appraisal
Ā 
LEƇON 358 ā€“ Nul appel Ć  Dieu ne peut ĆŖtre inentendu ni laissĆ© sans rĆ©ponse.
LEƇON 358 ā€“ Nul appel Ć  Dieu ne peut ĆŖtre inentendu ni laissĆ© sans rĆ©ponse.LEƇON 358 ā€“ Nul appel Ć  Dieu ne peut ĆŖtre inentendu ni laissĆ© sans rĆ©ponse.
LEƇON 358 ā€“ Nul appel Ć  Dieu ne peut ĆŖtre inentendu ni laissĆ© sans rĆ©ponse.
Ā 
P pt ti
P pt tiP pt ti
P pt ti
Ā 
Ithaca prelaunch
Ithaca prelaunchIthaca prelaunch
Ithaca prelaunch
Ā 
Handout 1 Brand Valuation workshop
Handout 1 Brand Valuation workshopHandout 1 Brand Valuation workshop
Handout 1 Brand Valuation workshop
Ā 
Climate Adaptation: A brief Australian perspective on new technologies for mi...
Climate Adaptation: A brief Australian perspective on new technologies for mi...Climate Adaptation: A brief Australian perspective on new technologies for mi...
Climate Adaptation: A brief Australian perspective on new technologies for mi...
Ā 
ImmoStepLogo ok
ImmoStepLogo okImmoStepLogo ok
ImmoStepLogo ok
Ā 
Amaze 2012
Amaze 2012Amaze 2012
Amaze 2012
Ā 
Documento cristobal saunero
Documento cristobal sauneroDocumento cristobal saunero
Documento cristobal saunero
Ā 
InformaciĆ³n acerca de Slideshare y Flickr
InformaciĆ³n acerca de Slideshare y FlickrInformaciĆ³n acerca de Slideshare y Flickr
InformaciĆ³n acerca de Slideshare y Flickr
Ā 
University Talks #1 | Š’ŠøŠŗтŠ¾Ń€ Š’Š°ŃŠøŠ»ŃŒŠµŠ² - ŠšŠ°Šŗ стŠ°Ń‚ŃŒ счŠ°ŃŃ‚Š»ŠøŠ²Ń‹Š¼, сŠ¾Ń…Ń€Š°Š½Šøть счŠ°ŃŃ‚...
University Talks #1 | Š’ŠøŠŗтŠ¾Ń€ Š’Š°ŃŠøŠ»ŃŒŠµŠ² - ŠšŠ°Šŗ стŠ°Ń‚ŃŒ счŠ°ŃŃ‚Š»ŠøŠ²Ń‹Š¼, сŠ¾Ń…Ń€Š°Š½Šøть счŠ°ŃŃ‚...University Talks #1 | Š’ŠøŠŗтŠ¾Ń€ Š’Š°ŃŠøŠ»ŃŒŠµŠ² - ŠšŠ°Šŗ стŠ°Ń‚ŃŒ счŠ°ŃŃ‚Š»ŠøŠ²Ń‹Š¼, сŠ¾Ń…Ń€Š°Š½Šøть счŠ°ŃŃ‚...
University Talks #1 | Š’ŠøŠŗтŠ¾Ń€ Š’Š°ŃŠøŠ»ŃŒŠµŠ² - ŠšŠ°Šŗ стŠ°Ń‚ŃŒ счŠ°ŃŃ‚Š»ŠøŠ²Ń‹Š¼, сŠ¾Ń…Ń€Š°Š½Šøть счŠ°ŃŃ‚...
Ā 
Reflexiones en torno al impacto de las tic
Reflexiones en torno al impacto de las ticReflexiones en torno al impacto de las tic
Reflexiones en torno al impacto de las tic
Ā 
The Lift ABS Storyboard
The Lift ABS StoryboardThe Lift ABS Storyboard
The Lift ABS Storyboard
Ā 
IND-2012-136 SBS Jijjeani
IND-2012-136 SBS Jijjeani IND-2012-136 SBS Jijjeani
IND-2012-136 SBS Jijjeani
Ā 
Subregional caribe kentish
Subregional caribe kentishSubregional caribe kentish
Subregional caribe kentish
Ā 
Airplane pilot performance appraisal
Airplane pilot performance appraisalAirplane pilot performance appraisal
Airplane pilot performance appraisal
Ā 

Similar to Ff36968971

International Journal of Peer to Peer Networks (IJP2P) Vol.6, No.2, August 20...
International Journal of Peer to Peer Networks (IJP2P) Vol.6, No.2, August 20...International Journal of Peer to Peer Networks (IJP2P) Vol.6, No.2, August 20...
International Journal of Peer to Peer Networks (IJP2P) Vol.6, No.2, August 20...
ijp2p
Ā 
Congestion control for_p2_p_live_streaming
Congestion control for_p2_p_live_streamingCongestion control for_p2_p_live_streaming
Congestion control for_p2_p_live_streaming
ijp2p
Ā 
CONGESTION CONTROL FOR P2P LIVE STREAMING
CONGESTION CONTROL FOR P2P LIVE STREAMINGCONGESTION CONTROL FOR P2P LIVE STREAMING
CONGESTION CONTROL FOR P2P LIVE STREAMING
ijp2p
Ā 
Peer-to-Peer Architecture Case Study Gnutella NetworkMate.docx
Peer-to-Peer Architecture Case Study Gnutella NetworkMate.docxPeer-to-Peer Architecture Case Study Gnutella NetworkMate.docx
Peer-to-Peer Architecture Case Study Gnutella NetworkMate.docx
herbertwilson5999
Ā 
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
Brenda Thomas
Ā 
Peer peer messaging system (synopsis)
Peer peer messaging system (synopsis)Peer peer messaging system (synopsis)
Peer peer messaging system (synopsis)
Mumbai Academisc
Ā 
Give to-get algorithm-for_p2_p_video_on_demand
Give to-get algorithm-for_p2_p_video_on_demandGive to-get algorithm-for_p2_p_video_on_demand
Give to-get algorithm-for_p2_p_video_on_demand
jayanthi_2009
Ā 
MULTIPATH BROADCAST AND GOSSIP BASED APPROACH FOR VIDEO CIRCULATION
MULTIPATH BROADCAST AND GOSSIP BASED APPROACH FOR VIDEO CIRCULATIONMULTIPATH BROADCAST AND GOSSIP BASED APPROACH FOR VIDEO CIRCULATION
MULTIPATH BROADCAST AND GOSSIP BASED APPROACH FOR VIDEO CIRCULATION
Association of Scientists, Developers and Faculties
Ā 
Standard Protocols for Heterogeneous P2P Vehicular Networks
Standard Protocols for Heterogeneous P2P Vehicular NetworksStandard Protocols for Heterogeneous P2P Vehicular Networks
Standard Protocols for Heterogeneous P2P Vehicular Networks
ijtsrd
Ā 

Similar to Ff36968971 (20)

International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
Ā 
A NEW ALGORITHM FOR CONSTRUCTION OF A P2P MULTICAST HYBRID OVERLAY TREE BASED...
A NEW ALGORITHM FOR CONSTRUCTION OF A P2P MULTICAST HYBRID OVERLAY TREE BASED...A NEW ALGORITHM FOR CONSTRUCTION OF A P2P MULTICAST HYBRID OVERLAY TREE BASED...
A NEW ALGORITHM FOR CONSTRUCTION OF A P2P MULTICAST HYBRID OVERLAY TREE BASED...
Ā 
A NEW ALGORITHM FOR CONSTRUCTION OF A P2P MULTICAST HYBRID OVERLAY TREE BASED...
A NEW ALGORITHM FOR CONSTRUCTION OF A P2P MULTICAST HYBRID OVERLAY TREE BASED...A NEW ALGORITHM FOR CONSTRUCTION OF A P2P MULTICAST HYBRID OVERLAY TREE BASED...
A NEW ALGORITHM FOR CONSTRUCTION OF A P2P MULTICAST HYBRID OVERLAY TREE BASED...
Ā 
International Journal of Peer to Peer Networks (IJP2P) Vol.6, No.2, August 20...
International Journal of Peer to Peer Networks (IJP2P) Vol.6, No.2, August 20...International Journal of Peer to Peer Networks (IJP2P) Vol.6, No.2, August 20...
International Journal of Peer to Peer Networks (IJP2P) Vol.6, No.2, August 20...
Ā 
Congestion control for_p2_p_live_streaming
Congestion control for_p2_p_live_streamingCongestion control for_p2_p_live_streaming
Congestion control for_p2_p_live_streaming
Ā 
CONGESTION CONTROL FOR P2P LIVE STREAMING
CONGESTION CONTROL FOR P2P LIVE STREAMINGCONGESTION CONTROL FOR P2P LIVE STREAMING
CONGESTION CONTROL FOR P2P LIVE STREAMING
Ā 
Ijp2 p
Ijp2 pIjp2 p
Ijp2 p
Ā 
Live Streaming With Receiver-Based P2P Multiplexing for Future IPTV Network
Live Streaming With Receiver-Based P2P Multiplexing for Future IPTV NetworkLive Streaming With Receiver-Based P2P Multiplexing for Future IPTV Network
Live Streaming With Receiver-Based P2P Multiplexing for Future IPTV Network
Ā 
Peer-to-Peer Architecture Case Study Gnutella NetworkMate.docx
Peer-to-Peer Architecture Case Study Gnutella NetworkMate.docxPeer-to-Peer Architecture Case Study Gnutella NetworkMate.docx
Peer-to-Peer Architecture Case Study Gnutella NetworkMate.docx
Ā 
AN INITIAL PEER CONFIGURATION ALGORITHM FOR MULTI-STREAMING PEER-TO-PEER NETW...
AN INITIAL PEER CONFIGURATION ALGORITHM FOR MULTI-STREAMING PEER-TO-PEER NETW...AN INITIAL PEER CONFIGURATION ALGORITHM FOR MULTI-STREAMING PEER-TO-PEER NETW...
AN INITIAL PEER CONFIGURATION ALGORITHM FOR MULTI-STREAMING PEER-TO-PEER NETW...
Ā 
AN INITIAL PEER CONFIGURATION ALGORITHM FOR MULTI-STREAMING PEER-TO-PEER NETW...
AN INITIAL PEER CONFIGURATION ALGORITHM FOR MULTI-STREAMING PEER-TO-PEER NETW...AN INITIAL PEER CONFIGURATION ALGORITHM FOR MULTI-STREAMING PEER-TO-PEER NETW...
AN INITIAL PEER CONFIGURATION ALGORITHM FOR MULTI-STREAMING PEER-TO-PEER NETW...
Ā 
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
Ā 
Peer peer messaging system (synopsis)
Peer peer messaging system (synopsis)Peer peer messaging system (synopsis)
Peer peer messaging system (synopsis)
Ā 
A hybrid push pull overlay network for
A hybrid push pull overlay network forA hybrid push pull overlay network for
A hybrid push pull overlay network for
Ā 
A scheme for maximal resource
A scheme for maximal resourceA scheme for maximal resource
A scheme for maximal resource
Ā 
Edge device multi-unicasting for video streaming
Edge device multi-unicasting for video streamingEdge device multi-unicasting for video streaming
Edge device multi-unicasting for video streaming
Ā 
Give to-get algorithm-for_p2_p_video_on_demand
Give to-get algorithm-for_p2_p_video_on_demandGive to-get algorithm-for_p2_p_video_on_demand
Give to-get algorithm-for_p2_p_video_on_demand
Ā 
MULTIPATH BROADCAST AND GOSSIP BASED APPROACH FOR VIDEO CIRCULATION
MULTIPATH BROADCAST AND GOSSIP BASED APPROACH FOR VIDEO CIRCULATIONMULTIPATH BROADCAST AND GOSSIP BASED APPROACH FOR VIDEO CIRCULATION
MULTIPATH BROADCAST AND GOSSIP BASED APPROACH FOR VIDEO CIRCULATION
Ā 
Standard Protocols for Heterogeneous P2P Vehicular Networks
Standard Protocols for Heterogeneous P2P Vehicular NetworksStandard Protocols for Heterogeneous P2P Vehicular Networks
Standard Protocols for Heterogeneous P2P Vehicular Networks
Ā 
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMING
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMINGA HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMING
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMING
Ā 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
Ā 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(ā˜Žļø+971_581248768%)**%*]'#abortion pills for sale in dubai@
Ā 

Recently uploaded (20)

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Ā 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
Ā 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Ā 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
Ā 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Ā 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Ā 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
Ā 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Ā 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
Ā 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Ā 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
Ā 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
Ā 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Ā 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
Ā 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Ā 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Ā 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Ā 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
Ā 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
Ā 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
Ā 

Ff36968971

  • 1. K L Sudheera .I et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.968-971 RESEARCH ARTICLE www.ijera.com OPEN ACCESS Dynamic P2P Streaming Using Delaunay Edges Kavya Lakshmi Sudheera .I1, Dr A Jayalakshmi2 1 2 student, D V R & Dr H S Mic College Of Technology, Kanchikacherla, Krishna (Dt). professor, D V R & Dr H S Mic College Of Technology, Kanchikacherla, Krishna (Dt). Abstract Commercial P2P streaming servers like Zattoo, Joost are some Content Delivery Networks (CDN) based on P2P network architecture that acts viable alternatives to client-server(broadcast systems) architectures such as YouTube. Visual and audio feeds via cable, satellite systems are evolving to IPTV and P2PTV based systems. Data delivery is better in broadcast based systems when content is a static feed. But as the user volume for dynamic content increases, internet scale search and data delivery using p2p systems beats any broadcast based systems. This is essentially the driving force behind P2P Streaming Services. P2P streaming systems are usually classified as either tree-oriented push or mesh-oriented swarming and Zatto happens to be a hybrid implementation. Previously, for performance improvement Zattoo implemented a receiver-based peer-division multiplexing engine involving repeater nodes to deliver live streaming content on a p2p network was developed. This hybrid approach causes resource drain with performance and scalability issues. Such an implementation can be handled by commercial systems like Zattoo but considering medium, small scale streaming systems we propose to use P2PStreaming services governed by Delauny Triangulation protocol. The paper presents an algorithm to build each peer with Delaunay links incrementally based on random peer information returned from P2P network querying or accessing the same content signifying a live feed. This algorithm is then optimized by considering the Euclidean distance between peers to speed up the overlay convergence thus improving content loading delays at same time supporting many other peers. A practical implementation of the proposed system validates our claim. Index Terms: Delaunay triangulation, Cool Streaming, multicasting, random peers, P2P network querying, peer-to-peer technology. I. INTRODUCTION Due to lack of video streaming in earlier technologies we introduce the IPTV Network for sending information to more no. of clients using single server file sharing. IPTV is a system through which television services are delivered using Internet Protocol suite packet switched network such as Internet, but this is a centralized system for file sharing. Due to this issue we introduce the P2P Network for file sharing P2P Network has the following properties: ļ‚· The end-to-end delay between the source and receiver to be excessive because they have number of intermediate receivers for file sharing. ļ‚· Efficient use of network resources but resource is small due to size limitation of the resource, it is very important to increase the scalability of the system with large system process. It is a type of decentralized and distributed network architecture in which every node act as a both supplier and consumer for file sharing. In Peer to Peer network tasks are shared among multiple interconnected peers which may take a position of their resources directly available to the other network Peer to Peer network can be implemented on some of the overlay networks on the top of the physical network topology where nodes are overlay from the subnet of www.ijera.com the nodes in the physical network. Overlays are used for indexing and peer discovery and make the P2P system independent from the physical network topology. Figure 1: Overlay Peer to Peer Network. We are sending information from server resources to various clients using peer to peer overlay network. Preceding this information we will send the relevant file sharing using same resources. For that purpose we are using P2P TV, it will be used for only conventional networks, i.e it is only supported for traditional approach in P2P TV networks. It will not be supported by commercial file sharing in P2P networks. 968 | P a g e
  • 2. K L Sudheera .I et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.968-971 In this region we are introducing Zattoo P2P network. Zattoo P2P sharing is the main solution for Commercial network file sharing as compared to conventional network. In this paper we will introduce Delaunay Triangulation Protocol governed by the P2P networks. We are arranging all the peers with equivalent file sharing with same time. By using our proposed work we will increase the performance of the file sharing system in between the peers. II. RELATED WORK The general, approach for self organized applications into logical overlay network and transfer data along with the edges of overlay network is based on unicast services. In peer to peer networks we are providing three types of distributed services, they are tree based push schemas, mesh based push schemas and distributed based file sharing schemas. In general we are using Zattoo like systems like PPLive, PPStream, Sop Cast, TV Ants, and UUSee from China, and Joost, Livestation, Octoshape, and RawFlow another networks are present in the sequence of file sharing process. Figure 2: Zattoo Network architecture in live streaming. Zattoo has increased the streaming quality of its android app recently and can now provide much better and stable streams including HD quality for our Android users. Our proposed technique is unique that are able to collect network core data from a large production system with registered users knowledge. We are increasing the performance of the streaming with single resource in server. For this purpose we are introducing Delaunay triangulation protocol version for equal sharing in peer to peer network. A Delaunay triangulation, for a set of points in plane can be arranged in the triangulation DT(p).It will maximize the minimum angles of all the angles of triangle. III. EXISTING SYSTEM P2PTV based live streaming services offered by Commercial peer-to-peer systems like Zattoo act as alternatives to conventional viewing On 5 August 2008, Zattoo asked its Spanish users for a ā‚¬2.40 charge by SMS in order to continue with the service during August and September. In March 2009, Zattoo www.ijera.com www.ijera.com removed its services from Belgium in an attempt to keep its costs down. Offers decent Performance at higher costs. For performance improvement in systems like Zattoo a receiver-based, peer-division multiplexing engine involving repeater nodes to deliver live streaming content on a p2p network was developed. But repeater nodes implementation is a huge drain on financial resources and can only be handled by commercial systems like Zattoo. P2P systems are usually classified as either tree-based push or mesh-based swarming. In tree-based push schemes, peers organize themselves into multiple distribution trees. In mesh-based swarming, peers form a randomly connected mesh, and content is swarmed via dynamically constructed directed acyclic paths. Zattoo is an hybrid implementation of the above to systems. Such an implementation can only be handled by commercial systems like Zattoo but this approach happens to be a resource drain especially considering small and medium scale systems. IV. PROPSED SYSTEM Earlier technologies are not sufficient for free live P2P streaming because those technologies are not cost effective. Extending this approach to live free P2P Streaming systems at reduced costs and achieving optimal performance is required. So we propose an algorithm to build each peer with Delaunay links then they send same information to our networks. Our proposed algorithm is optimized by using the Euclidean distance between peers to speed up the overlay virtual streaming. This approach reduces content loading delays supporting other peers present in the network using Delaunay Triangulation, assurance sending information at the same time. Delaunay triangulation is most attractive for triangulation due to its special feature that circumscribed circle of triangle must not contain other points than the points of the original triangle. Figure 3: Delaunay Triangulation Overlay Network Architecture. As shown in fig 3 we will describe the following things. 1. Same equivalent time sharing presented in the connection between each peers. 2. Increase the performance of the overlay network in P2P streaming. By using polygons in Delaunay triangulation, it gives a nice set of triangles to the other objects and 969 | P a g e
  • 3. K L Sudheera .I et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.968-971 also helps us to find out the Euclidance distance between each node present in the network. V. DELAUNAY TRIANGULATION PROTOCOL Delaunay triangulations have been exploited recently to implementing systems provided efficient routing and broadcasting. In this paper we propose to extend Delaunay with distributed algorithm for incremental construction of P2P networks. Distributed algorithm follows Edge Flipping procedure with distribution of peers. Our solution is based on the definition of a distributed version of the classic Edge Flipping incremental algorithm whose original version is exploited by centralized algorithms to build Delaunay overlays. The centralized Edge Flipping algorithm assumes total knowledge regarding the nodes in the network. Our proposed Delaunay triangulation protocol is able to compute Delaunay neighborhood for each node. Edge Flipping is a centralized algorithm for the construction of a Delaunay triangulation based on the idea of inserting sites, randomly one at a time, and updating the triangulation with each new addition. INPUT: n be the edge corresponding to the edge to be inserted if (n==NeighborTest(n)) { then ADD n to the Local View p = lat(n) s = lan(n) LocalEdgeFlipping(ap,n) LocalEdgeFlipping(as,n) } Algorithm 1: Insertion of New Node Procedure. Above algorithm shows the insertion of new node in to P2P networks. This insertion can be done based on their longitude and latitude values present in the network according to the services provided by the network. This insertion checks Local edge connection present in the network using the following process. Input: nm, the edge to be checked n the new edge created if (NeighborTest (nm) != Neighbor) { then DELETE w from the Local View Let nwx be the triangle adjacent to nwnnew LocalEdgeFlipping(nm,n) } Algorithm 2: Local edge Flipping process in the P2P networks. In this process we are calculating neighbor test for new connection to network for accessing services. www.ijera.com www.ijera.com Input: nm the edge to be checked Let x and y be the other vertices of the triangles sharing nm if (InCircle(a,b,x,y) <= 0 or InCircle(a,b,x,y) <=0) { then return false else return true } Algorithm 3: Neighbor Test Generation in P2P network. Every entering node is verified for establishing connection with other nodes or server present in the network. If one neighbor was found in the circle presented in the network then new node can be added to the network according their longitude and latitude values. The above three algorithms can be followed in an iterative process for each node to add into the network. VI. EXPERIMENTAL RESULTS In computational geometry well known topics conclude with set of points presented in the finite elements for modeling shape representation terrain modeling volume rendering and computer vision. Increasing the research in Delaunay triangulation, time Complexity is the main aspect present in file sharing. Uniform distribution takes more time for other networks present in the P2P networks. As mentioned in the above theory we consider each node longitude and latitude values according to the network. After entering into network then we will find out the Euclidian distance between nodes present in the network as follows: Figure 4: Embedding nodes in network with Euclidian space between nodes. The basic idea is to ask each node to maintain z co-ordinate characterizing their locations in network so that distance between two nodes can be predicted by evaluating a distance function nodes co-ordinate (Longitude and latitude) values. Euclidian distance dp with each element present in the internet coordinate system. Then Euclidian distance is calculated as follows: 970 | P a g e
  • 4. K L Sudheera .I et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.968-971 Where dNi and dNj are the distance vector that every element it is the distance from i to each node present in the network. We define that Euclidean distance between dp is the network distance measured by the ith node to jth node. [3] [4] [5] [6] Figure 5: Comparison results of live streaming with multi fluxing and Delaunay Triangulation Protocol with Euclidean distance calculation. Comparison results between our existing multiplex live streaming process and our proposed work delaunay triangulation with Euclidean distance between each node present in the peer to peer to network. Those results are calculated by the above mentioned equation for Euclidean space between every node present in the network. VII. [7] www.ijera.com K. Shami et al., ā€œImprove the P2P Network Scalability Due to impact of the Peer Characters,ā€ in Proc. IEEE INFOCOM Mini Conference, April 2009. J. Liang and K. Nahrstedt, ā€œImprovement of the Locality of peer to peer streaming using Dagstream,ā€ in Proc. SPIE Multimedia Computing and Networking, January 2006. R. Rejaie and S. Stafford, ā€œPeer to Peer Receiver overlay networks using architecture Framework,ā€ in Proc. ACM NOSSDAV, 2004. ā€œDistributed Delaunay Triangulation based on efficient and accurate protocols,ā€ The Univ. of Texas at Austin, Dept. of Computer Sciences, Tech. Rep. TR-07-59, November 2007, revised September 2008. Xiaotian Shen,ā€ A Survey Of Distance Estimation For P2P Networkā€, Supervisor: Professor dr. ir. Piet Van Mieghem Mentor: Ir. Xiaoming Zhou, Ir. Siyu Tang, and Ir. Yue Lu June 25, 2007 M.Sc. Thesis PVM 2007042. CONCLUSION P2P systems are usually classified as either tree-based push or mesh-based swarming. In tree-based push schemes, peers organize themselves into multiple distribution trees. In mesh-based swarming, peers form a randomly connected mesh, and content is swarmed via dynamically constructed directed acyclic paths. Zattoo is an hybrid implementation of the above to systems. Such an implementation can only be handled by commercial systems like Zattoo but this approach happens to be a resource drain especially considering small and medium scale systems. In this paper we propose an algorithm to build each peer with Delaunay links incrementally by including random peers returned from P2P network querying or accessing the same content. The algorithm is then optimized by considering the Euclidean distance between peers to speed up the overlay convergence. This approach reduces content loading delays significantly at the same time supporting many other peers thus attaining performance and scalability parameters. REFERENCES [1] [2] J. C. Cavendish, Planar Domains for finite element method using Automatic Triangulation, Int. J. for Numerical Methods in Engineering 8 (1974) 679{696. H. J. Choi, ā€œAn optimization algorithm for implementation of a flight path system in triangulation networkā€, MS. Thesis, POSTECH, 1996. www.ijera.com 971 | P a g e