Live streaming and video on demand face challenges in providing quality service over the internet. The key issues are quality of service due to network instability and degraded performance when serving large numbers of users. While peer-to-peer architectures can help solve issues of limited server resources, they introduce challenges such as ensuring sufficient upload bandwidth from peers and maintaining stable connectivity. Additional issues include firewalls and internet service provider throttling impacting streaming quality, and challenges in peer discovery and storage overhead in peer-to-peer video on demand systems. Addressing these architectural and performance issues is important for providing the best experience of streaming and video on demand services.
Chaining Algorithm and Protocol for Peer-to-Peer Streaming Video on Demand Sy...ijwmn
As the various architectures and protocol have been implemented a true VoD system has great demand in the global users. The traditional VoD system does not provide the needs and demands of the global users. The major problem in the traditional VoD system is serving of video stream among clients is duplicated and streamed to the different clients, which consumes more server bandwidth and the client uplink bandwidth is not utilized and the performance of the system degrades. Our objective in this paper is to send one server stream sufficient to serve the many clients without duplicating the server stream. Hence we have proposed a protocol and algorithm that chains the proxy servers and subscribed clients utilize client’s uplink bandwidth such that the load on the server is reduced. We have also proved that less rejection ratio of the clients and better utilization of the buffer and bandwidth for the entire VoD system.
The main problem is to avoid the complexity of retrieving the video content without streaming problem in multi network clients. The proposed work is to improve Collaboration among streaming contents on server resources in order to improve the network performance. Implementing network collaboration on a content delivery scenario, with a strong reduction of data transferred via servers. Audio and video files are transmitted in blocks to clients through the peer using the Network Coding Equivalent Content Distribution scheme. The objective of the system is to tolerate out-of-order arrival of blocks in the stream and is resilient to transmission losses of an arbitrary number of intermediate blocks, without affecting the verifiability of remaining blocks in the stream. To formulate the joint rate control and packet scheduling problem as an integer program where the objective is to minimize a cost function of the expected video distortion. Suggestions of cost functions are proposed in order to provide service differentiation and address fairness among users.
Using Bandwidth Aggregation to Improve the Performance of Video Quality- Adap...paperpublications3
1. The document discusses using bandwidth aggregation to improve video streaming quality over multiple wireless access networks. It formulates the multi-link video streaming process as a reinforcement learning task using a Markov Decision Process to determine optimal actions.
2. It proposes a quality-adaptive streaming approach that uses an adaptive search algorithm to obtain sub-optimal solutions in real time. The approach aims to achieve smooth, high quality video streaming while avoiding interruptions.
3. The approach considers metrics like startup latency, playback fluency, average playback quality, playback smoothness, and wireless service cost in its reward function to balance video quality of service with cost. It was evaluated using a realistic testbed with an Android phone.
PEER-TO-PEER LIVE STREAMING AND VIDEO ON DEMAND DESIGN ISSUES AND ITS CHALLEN...ijp2p
This document discusses the design issues and challenges of peer-to-peer live streaming and video on demand systems. It describes tree-based and mesh-based approaches for live streaming and how they have been adapted for video on demand. Key challenges discussed include maintaining streaming topology as peers join and leave, supporting asynchronous playback, and ensuring sequential block delivery for continuous playback.
This paper proposes a new Hybrid Adaptive Mobile Streaming (HAMS) method for efficient video streaming on mobile devices using cloud services. HAMS uses Scalable Video Coding (SVC) to encode video files into base and enhancement layers. It first progressively downloads base layers, then adaptively streams enhancement layers to avoid video freezing while providing high video quality. An experiment compares HAMS to existing methods and finds HAMS achieves zero video freezes for up to three users, shorter freeze times, and better average video quality. The paper concludes HAMS is an effective method for mobile video streaming without freezing issues or reduced quality.
Ames cloud a framework of adaptive mobile video streaming and efficient socia...Nagendra Nayak Bharothu
This document proposes a framework called AMES-Cloud for adaptive mobile video streaming and efficient social video sharing in cloud computing environments. The framework has two main parts: (1) AMoV provides adaptive mobile video streaming by adjusting the video bitrate based on fluctuating wireless link quality using scalable video coding, with each user assigned a private agent in the cloud to track feedback; (2) ESoV enables efficient social video sharing by analyzing social network activities to prefetch videos for users based on social links and activity history, reducing buffering times. The framework constructs private agents in clouds to offer scalable resources and processing for adaptive streaming and social video prefetching.
This document discusses a PhD thesis on economic mobile network management. It focuses on quality of service (QoS), quality of experience (QoE), and mean opinion score (MOS) in the context of mobile video streaming, particularly YouTube traffic. The thesis will examine how mobile carriers can improve QoS and QoE for subscribers through network improvements, caching proxy servers, and managing data limits. Measuring user satisfaction with YouTube streaming will provide insight into effective network management strategies.
Chaining Algorithm and Protocol for Peer-to-Peer Streaming Video on Demand Sy...ijwmn
As the various architectures and protocol have been implemented a true VoD system has great demand in the global users. The traditional VoD system does not provide the needs and demands of the global users. The major problem in the traditional VoD system is serving of video stream among clients is duplicated and streamed to the different clients, which consumes more server bandwidth and the client uplink bandwidth is not utilized and the performance of the system degrades. Our objective in this paper is to send one server stream sufficient to serve the many clients without duplicating the server stream. Hence we have proposed a protocol and algorithm that chains the proxy servers and subscribed clients utilize client’s uplink bandwidth such that the load on the server is reduced. We have also proved that less rejection ratio of the clients and better utilization of the buffer and bandwidth for the entire VoD system.
The main problem is to avoid the complexity of retrieving the video content without streaming problem in multi network clients. The proposed work is to improve Collaboration among streaming contents on server resources in order to improve the network performance. Implementing network collaboration on a content delivery scenario, with a strong reduction of data transferred via servers. Audio and video files are transmitted in blocks to clients through the peer using the Network Coding Equivalent Content Distribution scheme. The objective of the system is to tolerate out-of-order arrival of blocks in the stream and is resilient to transmission losses of an arbitrary number of intermediate blocks, without affecting the verifiability of remaining blocks in the stream. To formulate the joint rate control and packet scheduling problem as an integer program where the objective is to minimize a cost function of the expected video distortion. Suggestions of cost functions are proposed in order to provide service differentiation and address fairness among users.
Using Bandwidth Aggregation to Improve the Performance of Video Quality- Adap...paperpublications3
1. The document discusses using bandwidth aggregation to improve video streaming quality over multiple wireless access networks. It formulates the multi-link video streaming process as a reinforcement learning task using a Markov Decision Process to determine optimal actions.
2. It proposes a quality-adaptive streaming approach that uses an adaptive search algorithm to obtain sub-optimal solutions in real time. The approach aims to achieve smooth, high quality video streaming while avoiding interruptions.
3. The approach considers metrics like startup latency, playback fluency, average playback quality, playback smoothness, and wireless service cost in its reward function to balance video quality of service with cost. It was evaluated using a realistic testbed with an Android phone.
PEER-TO-PEER LIVE STREAMING AND VIDEO ON DEMAND DESIGN ISSUES AND ITS CHALLEN...ijp2p
This document discusses the design issues and challenges of peer-to-peer live streaming and video on demand systems. It describes tree-based and mesh-based approaches for live streaming and how they have been adapted for video on demand. Key challenges discussed include maintaining streaming topology as peers join and leave, supporting asynchronous playback, and ensuring sequential block delivery for continuous playback.
This paper proposes a new Hybrid Adaptive Mobile Streaming (HAMS) method for efficient video streaming on mobile devices using cloud services. HAMS uses Scalable Video Coding (SVC) to encode video files into base and enhancement layers. It first progressively downloads base layers, then adaptively streams enhancement layers to avoid video freezing while providing high video quality. An experiment compares HAMS to existing methods and finds HAMS achieves zero video freezes for up to three users, shorter freeze times, and better average video quality. The paper concludes HAMS is an effective method for mobile video streaming without freezing issues or reduced quality.
Ames cloud a framework of adaptive mobile video streaming and efficient socia...Nagendra Nayak Bharothu
This document proposes a framework called AMES-Cloud for adaptive mobile video streaming and efficient social video sharing in cloud computing environments. The framework has two main parts: (1) AMoV provides adaptive mobile video streaming by adjusting the video bitrate based on fluctuating wireless link quality using scalable video coding, with each user assigned a private agent in the cloud to track feedback; (2) ESoV enables efficient social video sharing by analyzing social network activities to prefetch videos for users based on social links and activity history, reducing buffering times. The framework constructs private agents in clouds to offer scalable resources and processing for adaptive streaming and social video prefetching.
This document discusses a PhD thesis on economic mobile network management. It focuses on quality of service (QoS), quality of experience (QoE), and mean opinion score (MOS) in the context of mobile video streaming, particularly YouTube traffic. The thesis will examine how mobile carriers can improve QoS and QoE for subscribers through network improvements, caching proxy servers, and managing data limits. Measuring user satisfaction with YouTube streaming will provide insight into effective network management strategies.
Iaetsd adaptive and well-organized mobile video streaming publicIaetsd Iaetsd
The document proposes a new mobile video streaming framework called AMES-Cloud that leverages cloud computing. It has two parts: Adaptive Mobile Video Streaming (AMoV) and Efficient Communal Video Sharing (ESoV). AMoV allows each user's private agent to adaptively adjust their streaming flow based on link quality feedback. ESoV monitors social networks between users, and their agents prefetch video content. The framework aims to provide high quality mobile video streaming services by adapting to varying network conditions and enabling social video sharing through cloud resources.
The document discusses distributed multimedia systems (DMMS). It defines DMMS as consisting of multimedia databases, proxy servers, information servers, and clients intended for distributing multimedia content over networks. Key requirements for DMMS include supporting continuous media like audio and video through continuous data transfers with high bandwidth, as well as sophisticated quality of service management to ensure service requests are met. The basic architecture of DMMS includes databases, proxy/information servers, clients, and wired or wireless networks to deliver multimedia streams while meeting timing requirements like quality of service.
Over recent years there has been a considerable shift, from quality of service (QoS) to quality of experience (QoE), when evaluating video delivery across networks. Hence, we first explore the need for this shift towards user-QoE in the video delivery ecosystem. Further, we investigate major QoE metrics researchers use in the evaluation of DASH users. We point out a huge problem with DASH beginning with its transport layer protocol. DASH utilizes Transmission control protocol (TCP) as the transport layer protocol. Thus, we give an overview of the mechanism of Transmission Control Protocol (TCP) and two mechanisms greatly impacting the streaming process: (1) TCP
congestion mechanism and (2) TCP Fast Start. This leads us to investigate the impact of these TCP mechanisms on DASH players and consequently user-QoE.
The document proposes a system to improve security for virtual and cloud computing environments using single sign-on with multi-factor authentication. It involves setting up a virtual networking environment using VMware, enabling LDAP user profiles and permissions, and configuring a Kerberos server for multifactor authentication and single sign-on. The system aims to provide a secure ubiquitous framework for desktop virtualization while maintaining simplicity.
This document summarizes distributed computing environment (DCE). DCE provides a vendor-independent platform for building distributed applications. It uses remote procedure calls (RPC) to allow systems to access remote procedures simply by calling them. DCE provides security services like authentication, authorization, and encryption. Its components include a thread package, RPC facility, time service, name service, and file and security services. DCE has applications in security, the world wide web, and distributed objects.
Live migration using checkpoint and restore in userspace (CRIU): Usage analys...journalBEEI
The document discusses live migration of Docker containers using checkpoint and restore in userspace (CRIU). It analyzes the usage of network, memory, and CPU during live migration in different scenarios. Four scenarios are simulated: 1) one-way migration from platform 1 to 2, 2) one-way migration from platform 2 to 1, 3) two-way migration with one container, 4) two-way migration with three containers. The results show the time taken for checkpoint and restore in each platform and scenario. Memory and CPU usage are also analyzed before and after checkpoint and restore. Live migration using CRIU is found to effectively migrate containers while minimizing downtime, with performance depending on factors like the number of memory pages changed
Project report on mesh hybrid topology network visionJignesh Ameta
This document provides a summary of mesh/hybrid network topologies. It discusses the key characteristics of mesh topologies, including that nodes are connected to multiple other nodes on the network. This creates redundant pathways between nodes and allows the network to dynamically route around failures. The document also notes that hybrid topologies combine elements of mesh and other topologies like bus or star, providing some of the redundancy of mesh with lower infrastructure costs. In summary, the document outlines mesh and hybrid network topologies and their advantages in providing multiple connections and redundancy between nodes.
1. The Transport layer controls reliability and flow control for data transfer between networked devices.
2. It provides different classes of connection-oriented and connectionless transport protocols like TCP and UDP.
3. TCP ensures reliable, ordered delivery of data packets while UDP provides best-effort delivery without verification.
The document provides an introduction to the Distributed Computing Environment (DCE). It discusses the goals of DCE, which include allowing applications to run on different operating systems and networks, providing a platform for distributed applications, and tools for authentication and access protection. It describes the core DCE services, which include distributed file service, thread service, RPC, time service, directory service, and security service. It also explains how to write a DCE client and server, bind them, and perform an RPC.
Distributed dynamic frequency allocation in wireless cellular networks using ...eSAT Journals
Abstract
Frequency Allocation Problem in wireless cellular networks is a major area of research in telecommunication industries. Since users of mobile phones are increasing exponentially, the existing limited frequency spectrum is unable to provide services efficiently. To enhance the performance of the networks, some measures must be taken to reduce drop call probabilities due to non availability of free frequency. The existing frequency allocation scheme call “hybrid with borrow” drops the calls regularly if frequencies are not free in a given cell. In this paper, we have developed a new scheme called “HYBORROW”, which elegantly increases the utilization of new drop call probability by 20% over an existing scheme by borrowing the frequencies from neighbor cells.
Keywords: Drop call, Hybrid, borrow, multicoloring, cellular Network.
Real time implemantion of stc and ftc radar system based on fpgaeSAT Journals
This document summarizes the implementation of a real-time radar signal processing system using FPGA that incorporates sensitivity time control (STC) and fast time constant (FTC) modules. The STC and FTC help filter radar echo signals to reduce effects of sea clutter and rain clutter, respectively. The architecture processes data in parallel on a sample-by-sample basis using dedicated hardware. Simulation and testing using MATLAB and on a Xilinx FPGA validated the design could process up to 100 million samples per second, meeting the requirements of commercial radar systems. The programmable FPGA platform allows flexible implementation of the real-time radar signal processing system.
Counter based design of dpll for wireless communicationeSAT Journals
Abstract For proper reception of the transmitted data, the design of effective demodulation schemes plays a very crucial role. In the earlier times, some of the traditional techniques like envelope detection etc were utilized for demodulation purposes. However, these techniques, although could be implemented without much difficulty, but at times, when the extent of interference due to the surroundings, system noise and other degrading parameters were very significant, these traditional techniques were found to be non-sensitive to these large-scale effects. To overcome these shortcomings, over the years, the device called phase locked loop has gained much popularity. This device, having the capacity to recover the phase of the transmitted pulse, is capable of yielding very accurate approximations of the transmitted pulses and thus accounts for very low values of bit error rates. Considering the utility of the device, in the recent times, it has been attempted to provide a sound digital design for the device so that the design complexity of the device could be overcome by replacing its integral parts with simplified digital circuits and also would improve the noise performance of the device. With this view in mind, in this piece, we put forward a design of the Digital Phase Locked Loop (DPLL) using a counter based logic. Here, the essential components of the DPLL have been implemented using logic circuits and counters and further, while doing so, the requirement of the components of a traditional PLL has also been minimized.
Corrosion characteristics of al 0.91 mg-0.55si-1.12fe-0.39ca al-alloy aged at...eSAT Journals
Abstract The study of degradation of Al-0.91Mg-0.55Si-1.12Fe-0.39Ca aluminum-alloy is carried out under different state of microstructure. The reason for this work is to decide the impact of heat treatment on the microstructure and the corrosive consumption of Al-alloy in acid utilizing weight reduction system. Specimens were solution treated at 545 oC and artificially aged at 185 oC. The maximum hardness is found after aging for 12 hrs. They were immersed in 0.8 molar solution of sulfuric acid for 0.58 hrs, 1.08 hrs, 1.58, 2.08 hrs and 2.58 hrs. The corrosion rates were calculated for various immersion periods. The test work has uncovered that time and temperature assumes an imperative part in the precipitation transformation procedure of the Al-ally. The hardness increases due to formation of second phase particles of Mg2Si. In over-aging of the alloy, the growth of the precipitate particle takes place at the expense of smaller precipitate particles. The rate of corrosion is found lower in the artificially aged specimen. The corrosion rates are found stabilized after 2.08 hrs of immersion in H2SO4. The X-Ray Diffraction patterns are also analyzed in the range of 10-80⁰ which are showing peaks of aluminum solid solution and Mg2Si in the different patterns. Key Words: Corrosion rate, Aluminum alloys, aging of alloy, solutionizing, acid, weight reduction.
An intrusion detection model based on fuzzy membership function using gnpeSAT Journals
Abstract As the Internet facilities increasing over the world, threats, attacks or intrusions over the Internet are also increasing. Therefore, an intrusion detection model is required to detect intrusion that going to threaten CIA of internet resources. A GNP based fuzzy membership function is much more suitable for identifying such kind of intrusions. A GNP which is a combination of GA and GP applied to extract association rules. A combined GNP-fuzzy membership method would help us to extract important association rules from DARPA 98/99 dataset rather than all rules from DARPA 98/99 dataset. Then the extracted association rules would be updated using genetic operations and also stored into rule pool. In classification, association rules will be classified as normal or intrusion based on calculated match degree. The classified association rules will be stored separately in two different rule pools. Normal rules in normal rule pool and intrusion rules in intrusion rule pool. For the new data match degree will be calculated based on available normal rules and intrusion rules. Then this calculated match degree will help us to identify whether the new data normal or intrusion. Keywords: Fuzzy membership function, Genetic network programming, Genetic algorithm, DARPA 98/99 dataset and Intrusion detection.
Behaviour of bituminous concrete modified with polyethylene glycol for blade ...eSAT Journals
This document summarizes a study on the behavior of bituminous concrete modified with polyethylene glycol (PEG) for two different aggregate shapes - blade and disk. Tests were conducted on the aggregates to determine properties. Bitumen was modified with 0-2.5% PEG and tested. Marshall stability tests showed that modified mixtures had higher stability, flow, and optimum binder content compared to unmodified mixtures. Blade aggregates performed better in elongation and flakiness tests while disk aggregates had lower abrasion and impact values. With increasing PEG, ductility and softening point of bitumen increased while penetration decreased as expected.
Experimental study on corrosion prevention with rebars along with fibre in r ...eSAT Journals
Abstract All materials or products, plants, constructions and building made of structural elements are subjected to physical wear during
use. Corrosion is a multi- billion dollar problem. Corrosion causes deterioration of material and leads to destruction of
structures ultimately affects the environment. Corrosion is a chemical or electrochemical phenomenon which can attack any metal
or substances through reaction by the surrounding environment. The second is conservation, applied primarily to metal
resources, the world’s supply of which is limited. The project is aimed at preventing corrosion that is minimising the rate of
corrosion using polypropylene fibre and epoxy coating. In this work an attempt is planned to study the effects of fibres in concrete
and to study the coating provided to the reinforcement. To accelerate the corrosion for a short term process of impressed current
is induced. In this project it is aimed to study the effect of coating given to the reinforcement and effect of adding fibre in the
concrete.
Keywords: Fibre, Compressive Strength, Flexural Strength.
Cross cloud single sign on (sso) using tokenseSAT Journals
Abstract
The cloud computing service provider ensures the security of their services by username/password schemes. Such type of scheme may be suitable for small personalized services but not for the large scale organizations where employees may require to login for more than one application related to various clouds. This paper identifies the issues of multiple logins and presents how multiple applications of various clouds are accessed by single login process securely. Single Sign-On is the mechanism where a user only need to authenticate him/her self once, then has the ability to access other protected resources without having to re-authenticate. Our objective is to design the single sign on architecture for more than one cloud’s applications. Due to that client log in only one time at time and automatically user login in remaining cloud applications and assess successful same process is for log out only user logout once then user logout properly from the all of the cloud applications. The login audits are done for the security purpose and its controlling by admin panel. Cloud service providers also neither need to support redundant registration process for new accounts of applications nor dealing with enormous databases for same user of multiple applications and managing multiple authentication credentials is annoying for users and as well as for authentication system. In other words, Single sign-on (SSO) is the mechanism whereby a single action of user authentication and authorization can permit a user to access all computers and systems where that user has access permission, without the need to enter multiple passwords.
Virtual’s culture based information technologyeSAT Journals
Abstract A diversity cultural of a nation is the art heritage of ancestral culture of a nation that needs to protected and preserved the existence. Therefore need a method that can be used to preserve the culture. With virtual method based Information and Communication technologies that can support the preservation and inventory of the cultural wealth of a nation. This virtual method is not limited by space and time, this method can be used to introduce the younger generation about their culture of nation. Virtual culture system can be used for: Inventory and publication of digital art and culture of art, generation Facilitate easy even public are able to learn or access the culture even can witness the culture through a virtual system, promoting the widespread culture without being limited by space and time. In this research did by taking a case study of Toraja culture, stages of research as follows:
1. Determine System Requirements: resource inventory of various cultural heritage and natural history of Toraja.
2. System Requirements Analysis: from the identification of user needs and then determined the functions or activities in the system.
3. Creating a model system: access and interaction model on the system.
4. Design of the system architecture and infrastructure of virtual culture: the draft content and access mechanisms of interaction between users.
Key Word: virtual, culture, toraja, preservation, promotion
Comparative studies on heat transfer and fluid flow in cored brick and pebble...eSAT Journals
Abstract
The article reports on comparison of transient heat transfer and fluid flow in two different sensible heat storage devices using Computational Fluid Dynamics. The candidate heat storage devices considered were cored brick and pebble bed and air was taken to be the working fluid. Same geometrical, material, porosity and boundary conditions, have been used for both the cored brick and pebble bed heaters, to compare the axial temperature history and pressure drop. The heat storage system comprises alumina, either in form of pebbles of diameter 6.5 mm, packed to a length of 0.455m in a 43mm diameter pipe, or cored brick of 43mm diameter and same length with through holes to have the same porosity (0.48) as that of the former. The conditions at inlet, outlet and lateral surface too have been taken to be same for both the systems. The fluid flow was considered to be incompressible with k-epsilon model to predict turbulence, and the thermo-physical properties of fluid and solid were assumed to remain constant. Simulations carried out for an inlet temperature of 465 K for velocities ranging from 2m/s to 5 m/s revealed that pressure drop in pebble bed to be considerably higher than those in cored brick, while the temperature history exhibited mixed trends.
Keywords: Cored Brick, Pebble Bed and Porosity
Performance analysis of voip over wired and wireless networks network impleme...eSAT Journals
Abstract In this Paper, the objective of simulation models is presented to investigate the performance of VoIP codecs over WiMAX and
FDDI networks that specially design for Aden University. To assure if the University IP network is prepared and adequate for this
new type of traffic before adding any new components, Aden University IP network will be simulated by using OPNET simulation
software then the new VoIP service will be added to the University networks. Different parameters that represent the QoS like end
to end delay, jitter, traffic sends and traffic received, MOS are calculated and analyzed in both network scenarios.
Keywords: VoIP, Codecs, QoS, WiMAX, FDDI
Zigbee based differential pilot protection of transmission lineeSAT Journals
Abstract
This paper describes the limitations of the existing relays in the detection of fault. It also describes the benefits of using the differential pilot protection of the transmission line. Among other advantages one of its main advantages is its speed, which is required in a.c. systems to remain in synchronism (as angle δ is to be kept small). In the end of this paper a model has been created in the laboratory by using two incandescent bulbs in parallel to create the difference in the two parts of the model, this difference is detected and appropriate action is finally taken to trip the circuit.
Keywords: Zig-bee, pilot protection, differential protection, transmission line, Hall Effect sensors.
Gravitational search algorithm with chaotic map (gsa cm) for solving optimiza...eSAT Journals
Abstract
Gravitational Search Algorithm (GSA) is a newly heuristic algorithm inspired by nature which utilizes Newtonian gravity law and
mass interactions. It has captured much attention since it has provided higher performance in solving various optimization
problems. This study hybridizes the GSA and chaotic equations. Ten chaotic-based GSA (GSA-CM) methods, which define the
random selections by different chaotic maps, have been developed. The proposed methods have been applied to the minimization
of benchmark problems and the results have been compared. The obtained numeric results show that most of the proposed
algorithms have increased the performance of GSA and have developed its quality of solution.
Keywords: Computational Intelligence, Evolutionary Computation, Heuristic Algorithms, Chaotic Maps, Optimization
Methods.
Iaetsd adaptive and well-organized mobile video streaming publicIaetsd Iaetsd
The document proposes a new mobile video streaming framework called AMES-Cloud that leverages cloud computing. It has two parts: Adaptive Mobile Video Streaming (AMoV) and Efficient Communal Video Sharing (ESoV). AMoV allows each user's private agent to adaptively adjust their streaming flow based on link quality feedback. ESoV monitors social networks between users, and their agents prefetch video content. The framework aims to provide high quality mobile video streaming services by adapting to varying network conditions and enabling social video sharing through cloud resources.
The document discusses distributed multimedia systems (DMMS). It defines DMMS as consisting of multimedia databases, proxy servers, information servers, and clients intended for distributing multimedia content over networks. Key requirements for DMMS include supporting continuous media like audio and video through continuous data transfers with high bandwidth, as well as sophisticated quality of service management to ensure service requests are met. The basic architecture of DMMS includes databases, proxy/information servers, clients, and wired or wireless networks to deliver multimedia streams while meeting timing requirements like quality of service.
Over recent years there has been a considerable shift, from quality of service (QoS) to quality of experience (QoE), when evaluating video delivery across networks. Hence, we first explore the need for this shift towards user-QoE in the video delivery ecosystem. Further, we investigate major QoE metrics researchers use in the evaluation of DASH users. We point out a huge problem with DASH beginning with its transport layer protocol. DASH utilizes Transmission control protocol (TCP) as the transport layer protocol. Thus, we give an overview of the mechanism of Transmission Control Protocol (TCP) and two mechanisms greatly impacting the streaming process: (1) TCP
congestion mechanism and (2) TCP Fast Start. This leads us to investigate the impact of these TCP mechanisms on DASH players and consequently user-QoE.
The document proposes a system to improve security for virtual and cloud computing environments using single sign-on with multi-factor authentication. It involves setting up a virtual networking environment using VMware, enabling LDAP user profiles and permissions, and configuring a Kerberos server for multifactor authentication and single sign-on. The system aims to provide a secure ubiquitous framework for desktop virtualization while maintaining simplicity.
This document summarizes distributed computing environment (DCE). DCE provides a vendor-independent platform for building distributed applications. It uses remote procedure calls (RPC) to allow systems to access remote procedures simply by calling them. DCE provides security services like authentication, authorization, and encryption. Its components include a thread package, RPC facility, time service, name service, and file and security services. DCE has applications in security, the world wide web, and distributed objects.
Live migration using checkpoint and restore in userspace (CRIU): Usage analys...journalBEEI
The document discusses live migration of Docker containers using checkpoint and restore in userspace (CRIU). It analyzes the usage of network, memory, and CPU during live migration in different scenarios. Four scenarios are simulated: 1) one-way migration from platform 1 to 2, 2) one-way migration from platform 2 to 1, 3) two-way migration with one container, 4) two-way migration with three containers. The results show the time taken for checkpoint and restore in each platform and scenario. Memory and CPU usage are also analyzed before and after checkpoint and restore. Live migration using CRIU is found to effectively migrate containers while minimizing downtime, with performance depending on factors like the number of memory pages changed
Project report on mesh hybrid topology network visionJignesh Ameta
This document provides a summary of mesh/hybrid network topologies. It discusses the key characteristics of mesh topologies, including that nodes are connected to multiple other nodes on the network. This creates redundant pathways between nodes and allows the network to dynamically route around failures. The document also notes that hybrid topologies combine elements of mesh and other topologies like bus or star, providing some of the redundancy of mesh with lower infrastructure costs. In summary, the document outlines mesh and hybrid network topologies and their advantages in providing multiple connections and redundancy between nodes.
1. The Transport layer controls reliability and flow control for data transfer between networked devices.
2. It provides different classes of connection-oriented and connectionless transport protocols like TCP and UDP.
3. TCP ensures reliable, ordered delivery of data packets while UDP provides best-effort delivery without verification.
The document provides an introduction to the Distributed Computing Environment (DCE). It discusses the goals of DCE, which include allowing applications to run on different operating systems and networks, providing a platform for distributed applications, and tools for authentication and access protection. It describes the core DCE services, which include distributed file service, thread service, RPC, time service, directory service, and security service. It also explains how to write a DCE client and server, bind them, and perform an RPC.
Distributed dynamic frequency allocation in wireless cellular networks using ...eSAT Journals
Abstract
Frequency Allocation Problem in wireless cellular networks is a major area of research in telecommunication industries. Since users of mobile phones are increasing exponentially, the existing limited frequency spectrum is unable to provide services efficiently. To enhance the performance of the networks, some measures must be taken to reduce drop call probabilities due to non availability of free frequency. The existing frequency allocation scheme call “hybrid with borrow” drops the calls regularly if frequencies are not free in a given cell. In this paper, we have developed a new scheme called “HYBORROW”, which elegantly increases the utilization of new drop call probability by 20% over an existing scheme by borrowing the frequencies from neighbor cells.
Keywords: Drop call, Hybrid, borrow, multicoloring, cellular Network.
Real time implemantion of stc and ftc radar system based on fpgaeSAT Journals
This document summarizes the implementation of a real-time radar signal processing system using FPGA that incorporates sensitivity time control (STC) and fast time constant (FTC) modules. The STC and FTC help filter radar echo signals to reduce effects of sea clutter and rain clutter, respectively. The architecture processes data in parallel on a sample-by-sample basis using dedicated hardware. Simulation and testing using MATLAB and on a Xilinx FPGA validated the design could process up to 100 million samples per second, meeting the requirements of commercial radar systems. The programmable FPGA platform allows flexible implementation of the real-time radar signal processing system.
Counter based design of dpll for wireless communicationeSAT Journals
Abstract For proper reception of the transmitted data, the design of effective demodulation schemes plays a very crucial role. In the earlier times, some of the traditional techniques like envelope detection etc were utilized for demodulation purposes. However, these techniques, although could be implemented without much difficulty, but at times, when the extent of interference due to the surroundings, system noise and other degrading parameters were very significant, these traditional techniques were found to be non-sensitive to these large-scale effects. To overcome these shortcomings, over the years, the device called phase locked loop has gained much popularity. This device, having the capacity to recover the phase of the transmitted pulse, is capable of yielding very accurate approximations of the transmitted pulses and thus accounts for very low values of bit error rates. Considering the utility of the device, in the recent times, it has been attempted to provide a sound digital design for the device so that the design complexity of the device could be overcome by replacing its integral parts with simplified digital circuits and also would improve the noise performance of the device. With this view in mind, in this piece, we put forward a design of the Digital Phase Locked Loop (DPLL) using a counter based logic. Here, the essential components of the DPLL have been implemented using logic circuits and counters and further, while doing so, the requirement of the components of a traditional PLL has also been minimized.
Corrosion characteristics of al 0.91 mg-0.55si-1.12fe-0.39ca al-alloy aged at...eSAT Journals
Abstract The study of degradation of Al-0.91Mg-0.55Si-1.12Fe-0.39Ca aluminum-alloy is carried out under different state of microstructure. The reason for this work is to decide the impact of heat treatment on the microstructure and the corrosive consumption of Al-alloy in acid utilizing weight reduction system. Specimens were solution treated at 545 oC and artificially aged at 185 oC. The maximum hardness is found after aging for 12 hrs. They were immersed in 0.8 molar solution of sulfuric acid for 0.58 hrs, 1.08 hrs, 1.58, 2.08 hrs and 2.58 hrs. The corrosion rates were calculated for various immersion periods. The test work has uncovered that time and temperature assumes an imperative part in the precipitation transformation procedure of the Al-ally. The hardness increases due to formation of second phase particles of Mg2Si. In over-aging of the alloy, the growth of the precipitate particle takes place at the expense of smaller precipitate particles. The rate of corrosion is found lower in the artificially aged specimen. The corrosion rates are found stabilized after 2.08 hrs of immersion in H2SO4. The X-Ray Diffraction patterns are also analyzed in the range of 10-80⁰ which are showing peaks of aluminum solid solution and Mg2Si in the different patterns. Key Words: Corrosion rate, Aluminum alloys, aging of alloy, solutionizing, acid, weight reduction.
An intrusion detection model based on fuzzy membership function using gnpeSAT Journals
Abstract As the Internet facilities increasing over the world, threats, attacks or intrusions over the Internet are also increasing. Therefore, an intrusion detection model is required to detect intrusion that going to threaten CIA of internet resources. A GNP based fuzzy membership function is much more suitable for identifying such kind of intrusions. A GNP which is a combination of GA and GP applied to extract association rules. A combined GNP-fuzzy membership method would help us to extract important association rules from DARPA 98/99 dataset rather than all rules from DARPA 98/99 dataset. Then the extracted association rules would be updated using genetic operations and also stored into rule pool. In classification, association rules will be classified as normal or intrusion based on calculated match degree. The classified association rules will be stored separately in two different rule pools. Normal rules in normal rule pool and intrusion rules in intrusion rule pool. For the new data match degree will be calculated based on available normal rules and intrusion rules. Then this calculated match degree will help us to identify whether the new data normal or intrusion. Keywords: Fuzzy membership function, Genetic network programming, Genetic algorithm, DARPA 98/99 dataset and Intrusion detection.
Behaviour of bituminous concrete modified with polyethylene glycol for blade ...eSAT Journals
This document summarizes a study on the behavior of bituminous concrete modified with polyethylene glycol (PEG) for two different aggregate shapes - blade and disk. Tests were conducted on the aggregates to determine properties. Bitumen was modified with 0-2.5% PEG and tested. Marshall stability tests showed that modified mixtures had higher stability, flow, and optimum binder content compared to unmodified mixtures. Blade aggregates performed better in elongation and flakiness tests while disk aggregates had lower abrasion and impact values. With increasing PEG, ductility and softening point of bitumen increased while penetration decreased as expected.
Experimental study on corrosion prevention with rebars along with fibre in r ...eSAT Journals
Abstract All materials or products, plants, constructions and building made of structural elements are subjected to physical wear during
use. Corrosion is a multi- billion dollar problem. Corrosion causes deterioration of material and leads to destruction of
structures ultimately affects the environment. Corrosion is a chemical or electrochemical phenomenon which can attack any metal
or substances through reaction by the surrounding environment. The second is conservation, applied primarily to metal
resources, the world’s supply of which is limited. The project is aimed at preventing corrosion that is minimising the rate of
corrosion using polypropylene fibre and epoxy coating. In this work an attempt is planned to study the effects of fibres in concrete
and to study the coating provided to the reinforcement. To accelerate the corrosion for a short term process of impressed current
is induced. In this project it is aimed to study the effect of coating given to the reinforcement and effect of adding fibre in the
concrete.
Keywords: Fibre, Compressive Strength, Flexural Strength.
Cross cloud single sign on (sso) using tokenseSAT Journals
Abstract
The cloud computing service provider ensures the security of their services by username/password schemes. Such type of scheme may be suitable for small personalized services but not for the large scale organizations where employees may require to login for more than one application related to various clouds. This paper identifies the issues of multiple logins and presents how multiple applications of various clouds are accessed by single login process securely. Single Sign-On is the mechanism where a user only need to authenticate him/her self once, then has the ability to access other protected resources without having to re-authenticate. Our objective is to design the single sign on architecture for more than one cloud’s applications. Due to that client log in only one time at time and automatically user login in remaining cloud applications and assess successful same process is for log out only user logout once then user logout properly from the all of the cloud applications. The login audits are done for the security purpose and its controlling by admin panel. Cloud service providers also neither need to support redundant registration process for new accounts of applications nor dealing with enormous databases for same user of multiple applications and managing multiple authentication credentials is annoying for users and as well as for authentication system. In other words, Single sign-on (SSO) is the mechanism whereby a single action of user authentication and authorization can permit a user to access all computers and systems where that user has access permission, without the need to enter multiple passwords.
Virtual’s culture based information technologyeSAT Journals
Abstract A diversity cultural of a nation is the art heritage of ancestral culture of a nation that needs to protected and preserved the existence. Therefore need a method that can be used to preserve the culture. With virtual method based Information and Communication technologies that can support the preservation and inventory of the cultural wealth of a nation. This virtual method is not limited by space and time, this method can be used to introduce the younger generation about their culture of nation. Virtual culture system can be used for: Inventory and publication of digital art and culture of art, generation Facilitate easy even public are able to learn or access the culture even can witness the culture through a virtual system, promoting the widespread culture without being limited by space and time. In this research did by taking a case study of Toraja culture, stages of research as follows:
1. Determine System Requirements: resource inventory of various cultural heritage and natural history of Toraja.
2. System Requirements Analysis: from the identification of user needs and then determined the functions or activities in the system.
3. Creating a model system: access and interaction model on the system.
4. Design of the system architecture and infrastructure of virtual culture: the draft content and access mechanisms of interaction between users.
Key Word: virtual, culture, toraja, preservation, promotion
Comparative studies on heat transfer and fluid flow in cored brick and pebble...eSAT Journals
Abstract
The article reports on comparison of transient heat transfer and fluid flow in two different sensible heat storage devices using Computational Fluid Dynamics. The candidate heat storage devices considered were cored brick and pebble bed and air was taken to be the working fluid. Same geometrical, material, porosity and boundary conditions, have been used for both the cored brick and pebble bed heaters, to compare the axial temperature history and pressure drop. The heat storage system comprises alumina, either in form of pebbles of diameter 6.5 mm, packed to a length of 0.455m in a 43mm diameter pipe, or cored brick of 43mm diameter and same length with through holes to have the same porosity (0.48) as that of the former. The conditions at inlet, outlet and lateral surface too have been taken to be same for both the systems. The fluid flow was considered to be incompressible with k-epsilon model to predict turbulence, and the thermo-physical properties of fluid and solid were assumed to remain constant. Simulations carried out for an inlet temperature of 465 K for velocities ranging from 2m/s to 5 m/s revealed that pressure drop in pebble bed to be considerably higher than those in cored brick, while the temperature history exhibited mixed trends.
Keywords: Cored Brick, Pebble Bed and Porosity
Performance analysis of voip over wired and wireless networks network impleme...eSAT Journals
Abstract In this Paper, the objective of simulation models is presented to investigate the performance of VoIP codecs over WiMAX and
FDDI networks that specially design for Aden University. To assure if the University IP network is prepared and adequate for this
new type of traffic before adding any new components, Aden University IP network will be simulated by using OPNET simulation
software then the new VoIP service will be added to the University networks. Different parameters that represent the QoS like end
to end delay, jitter, traffic sends and traffic received, MOS are calculated and analyzed in both network scenarios.
Keywords: VoIP, Codecs, QoS, WiMAX, FDDI
Zigbee based differential pilot protection of transmission lineeSAT Journals
Abstract
This paper describes the limitations of the existing relays in the detection of fault. It also describes the benefits of using the differential pilot protection of the transmission line. Among other advantages one of its main advantages is its speed, which is required in a.c. systems to remain in synchronism (as angle δ is to be kept small). In the end of this paper a model has been created in the laboratory by using two incandescent bulbs in parallel to create the difference in the two parts of the model, this difference is detected and appropriate action is finally taken to trip the circuit.
Keywords: Zig-bee, pilot protection, differential protection, transmission line, Hall Effect sensors.
Gravitational search algorithm with chaotic map (gsa cm) for solving optimiza...eSAT Journals
Abstract
Gravitational Search Algorithm (GSA) is a newly heuristic algorithm inspired by nature which utilizes Newtonian gravity law and
mass interactions. It has captured much attention since it has provided higher performance in solving various optimization
problems. This study hybridizes the GSA and chaotic equations. Ten chaotic-based GSA (GSA-CM) methods, which define the
random selections by different chaotic maps, have been developed. The proposed methods have been applied to the minimization
of benchmark problems and the results have been compared. The obtained numeric results show that most of the proposed
algorithms have increased the performance of GSA and have developed its quality of solution.
Keywords: Computational Intelligence, Evolutionary Computation, Heuristic Algorithms, Chaotic Maps, Optimization
Methods.
Abstract The goal of the project is to create a system which will broadcast an audio signal over Wi-Fi from computer to set of speakers. This will allow the user to play the audio files from his computer to speakers present in the range of wireless network. The project combines the use of embedded hardware, low level software programming, and the IEEE 802.11 standard protocol for wireless communication (Wi-Fi). Keywords- Arduino, Cygwin, Microcontroller, Wi-Fi
Measurement systems analysis and a study of anova methodeSAT Journals
Abstract
Instruments and measurement systems form the base of any process improvement strategies. The much widely used QC tools like
SPC depends on sample data taken from processes to track process variation which in turn depends on measuring system itself.
The purpose of Measurement System Analysis is to qualify a measurement system for use by quantifying its accuracy, precision,
and stability and to minimize their contribution in process variation through inherent tools such as ANOVA. The purpose of this
paper is to outline MSA and study ANOVA method through a real-time shop floor experiment.
Keywords: SPC, Accuracy, Precision, Stability, QC, ANOVA
Automatic vision based inspection of railway trackeSAT Journals
Abstract Currently, most of railway track inspections are manually conducted by railroad track inspectors. Practically, it is not possible to inspect the thousand of miles of railway track by trained human inspector. This inspection takes too much time to inspect the defected railway track and then inform to the railway authority people. In this way it may lead to disaster. Hence to avoid delay and improve the accuracy, our propose system will automatically inspect the railway track by using vision based method and vibration based method. This method proposes continuous monitoring and assessment of the condition of the rail tracks which prevent major disasters. Our proposed system will inspect the rail track component such as missing bolts, tie plates, anchors etc by using vision based method and simultaneously do the calibration of railway track by using vibration based method. The system provides real-time monitoring and structural condition for railway track using vision based method and calibration to search the fault location on the track. Inspections include detecting defects on tracks, missing bolts, anchor, tie plate and clips etc. In vision based method camera we will use to capture the images or videos. In vibration based method some sensors we will use to detect the vibrations on the railway track. We will extract the signal from 2-D. Keywords: Railway track inspection, Vision based and vibration based method, Image processing, Data acquisition.
Occupational health and safety (ohs) management vis à-vis different phases of...eSAT Journals
Abstract
Accidents at construction sites are identified as a major problem throughout the world. Apart from the accidents at construction
sites, people working in the construction industry suffer from several occupational health disorders. In this backdrop,
implementation of an effective occupational health and safety measures are gaining importance these days across the world. In
line with this discussion, the present paper aims at assessment of occupational health and safety management w.r.t. different
phases of construction activates i.e. pre-construction, construction and post-construction phases. It is observed that, the concept
of occupational health and safety is not only applicable construction phase but also equally applicable to both pre-construction
and post-construction.
Key Words: Occupational health, safety, accidents, construction phase, pre-construction phase, post- construction
phase, safety culture, safety assessment
A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...eSAT Journals
Abstract
In the field of consumer electronics the high speed communication technology applications based on hardware and software control are playing a vital role in establishing the benchmarks for catering the operational requirements of the electronic hardware to fulfil the consumer requirements in wired and wireless communication. In the modern era of communication electronics decoding and encoding of any data(s) using high speed and low power features of FPGA devices [1] based on VLSI technology offers less area, hardware portability, data security, high speed network connectivity [2], data error removal capability, complex algorithm realization, etc. Viterbi decoder is a high rate decoder that is very commonly and effectively used method in modern communication hardware. It involves Trellis coded modulation (TCM) scheme for decoding the data. The viterbi decoder is an attempt to reduce the power, speed [1], and cost as compared to normal decoders for wired and wireless communication. The work in this paper proposes a improved data error identification probability design of Viterbi decoders for communication systems with a low power operational performance. The proposed design combines the error identification capability of the viterbi decoder with parity decoder to improve the probability of the overall system in identifying the error during the communication process. Among various functional blocks in the Viterbi decoder, both hardware complexity and decoding speed highly depends on the architecture of the Decoder. The operational blocks of viterbi decoder are combined with parity testing block to identify the error in the viterbi decoded data using parity bit. The present design proposes a multi-stage pipelined architecture of decoder. The former stage is the viterbi decoding stage and the later stage is the parity decoding stage for the identification of error in the communicated data. Any Odd number of errors occuring in the recovered data from the former decoding stage can be identified using the later decoding stage. A general solution to derive the communication using conventional viterbi decoder is also given in this paper. Implementation result of proposed design for a rate 1/3 convolutional code is compared with the conventional design. The design of proposed algorithm is simulated and synthesized successfully Xilinx ISE Tool [3] on Xilinx Spartan 3E FPGA.
Keywords: ACS (Add-Compare-Select), Convolutional Code Rate, Error probability, FPGA, Low Power, Parity Encoder, Pipelining, Trace Back, Viterbi Decoder, Xilinx ISE.
A NOVEL ADAPTIVE CACHING MECHANISM FOR VIDEO ON DEMAND SYSTEM OVER WIRELESS M...IJCNCJournal
Video on Demand (VOD) system over the wireless mobile network is a system that provides video services to mobile clients. The main problem with these systems is the high service delay where the mobile clients have to wait to view their favorite movie. The importance of this paper is based on finding a solution on how to reduce the delay time in the VOD system. This paper introduces a novel caching mechanism named
Proxy Server Cache mechanism to tackle the issue of service delay. This delay happens when the broadcasting phase that is related to the first segment is missed by a client from the current broadcasting channels. In this mechanism, the video’s first segment is stored on a server of a stationary proxy type. The
delayed clients will directly acquire the first segment from the proxy server instead of waiting for the following broadcasting channel pertaining to the first segment. The proposed scheme ensuresobtaining the first segment from mobile clients when they arrive. Additionally, the performance of the proposed scheme is validated by applying the VOD system, which can involve the balancing mechanism to retain particular requests through to the local proxy server to provide a fair dissemination for these requests. The obtained result confirms that the proposed scheme reduces the time delay of the system in comparison with the best existing schemes. The results of the average time delay in the Proxy-Cache scheme is 179.2505
milliseconds when 10 clients arrive each minute (Client/minute), the average time delay is 140 milliseconds when the video lengths are 30, 60 and 90. Meanwhile, the failure probability for obtaining the first segment of the video remains zero when the number of arrived requests is set to2, 4, 6, 8 and 10.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
This document proposes a new retrieval strategy called CoRe for peer-to-peer video-on-demand systems. CoRe aims to minimize response time and maximize throughput. It does this by selecting multiple serving peers to collaboratively service each request based on factors like distance and available resources. The document outlines limitations of existing strategies, describes the CoRe algorithm in detail, and presents experimental results showing CoRe performs better than the Least Load First algorithm, especially under heavy workloads.
This document summarizes a study on simulating video streaming in multi-hop networks. It discusses using multiple access networks to stream video from a server to clients to aggregate bandwidth. The study formulates the problem of optimizing video streaming over internet packet traces as an integer program to minimize distortion. It proposes authenticating initial video streams using signatures and fragmenting/encoding content into blocks stored across peers to improve security and efficiency of content distribution in the presence of packet loss. Simulation results show this approach can reduce downloading time and avoid data loss during multi-hop video streaming.
This document proposes a distributed video-on-demand (DVoD) system using a grid-based architecture. The key components are a media splitter, scheduler, and streaming servers distributed across grid nodes. The media is split into parts and distributed to nodes for storage. When a client requests a video, the scheduler coordinates streaming the split parts from multiple nodes to the client. This distributed approach aims to address issues like load balancing, scalability, and fault tolerance in a cost-effective manner compared to centralized systems. Related work on distributed streaming, peer-to-peer architectures, and adaptive encoding is also discussed.
Optimal Streaming Protocol for VoD Using Clients' Residual BandwidthIDES Editor
A true VoD system has tremendous demand in the
market. The existing VoD system does not cater the needs
and demands of the market. The major problem in the VoD
system is serving of clients with expected QoS is difficult. In
this paper, we proposed a protocol and algorithm that
chains the proxy servers and subscribed clients. Our
objective is to send one server stream and this stream should
be served to N asynchronous clients. The server bandwidth
is scarcity and on the client uplink bandwidth is
underutilized. In this protocol, we are using client’s residual
bandwidth such that the load on the server bandwidth is
reduced. We have proved that optimal utilization of the
buffer and bandwidth for the entire VoD system and also
less rejection ratio of the clients.
Dynamic Chunks Distribution Scheme for Multiservice Load Balancing Using Fibo...Editor IJCATR
This document describes a proposed dynamic chunks distribution scheme for multiservice load balancing in cloud computing using a Fibonacci bases approach. Videos are split into chunks that are distributed across hosts for storage. The chunk sizes increase to reduce delay and improve performance. A Fibonacci-based splitting strategy is used to divide video files into chunks to reduce provisioning delay for users and optimize resource utilization. The scheme allows users to view entire videos without delays by gathering chunks from different servers in parallel.
This white paper introduces a new peer-assisted approach to video streaming designed to overcome limitations of content delivery networks (CDNs). It explains how peer-to-peer streaming can represent a key advantage for broadcasters by enabling them to scale up, improve quality, and handle traffic peaks while reducing costs and network burden. A case study showed the solution achieved up to 58% peer streaming and ensured continued streaming for 50% of users during a server outage. Peer-assisted streaming optimizes video delivery as demand increases by leveraging growing numbers of viewers to share content.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A content delivery network or content distribution network (CDN) is a large distributed system of servers deployed in multiple data centers across the Internet. The goal of a CDN is to serve content to end-users with high availability and high performance. CDNs serve a large fraction of the Internet content today, including web objects (text, graphics and scripts), downloadable objects (media files, software, documents), applications (e-commerce, portals), live streaming media, on-demand streaming media, and social networks.
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMINGijp2p
In this paper, we have proposed a hybrid push-pull protocol for peer-to-peer live video streaming. The
main goal of this research is to minimize the network end-to-end delay in comparison to pure mesh
networks. Hybrid protocols, in most cases, suffer from complex construction and maintenance. Therefore,
our proposed protocol uses a pure mesh topology and a single layer video coding. In summary, our pushpull protocol has two parts. The pull-based part which is done on the mesh network, and the push-based
part which consists of two phases: parent selection and tree construction. When a push procedure appears,
it is very important to prevent data redundancy. To satisfy this condition, we have introduced a parent
selection method. In this method, by parent selection based on the minimum arrival time, the most stable
node will be selected. This node has the advantage of maximizing the expected service time of the tree.
Using this method, there is no need for maintaining any extra information and topology control data.
Finally, we do performance evaluation using OMNeT++ simulator. The simulation results show that the
proposed architecture has better performance in start-up delay, end-to-end delay, and distortion than pure
mesh-based network.
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMINGijp2p
In this paper, we have proposed a hybrid push-pull protocol for peer-to-peer live video streaming. The
main goal of this research is to minimize the network end-to-end delay in comparison to pure mesh
networks. Hybrid protocols, in most cases, suffer from complex construction and maintenance. Therefore,
our proposed protocol uses a pure mesh topology and a single layer video coding. In summary, our pushpull protocol has two parts. The pull-based part which is done on the mesh network, and the push-based
part which consists of two phases: parent selection and tree construction. When a push procedure appears,
it is very important to prevent data redundancy. To satisfy this condition, we have introduced a parent
selection method. In this method, by parent selection based on the minimum arrival time, the most stable
node will be selected. This node has the advantage of maximizing the expected service time of the tree.
Using this method, there is no need for maintaining any extra information and topology control data.
Finally, we do performance evaluation using OMNeT++ simulator. The simulation results show that the
proposed architecture has better performance in start-up delay, end-to-end delay, and distortion than pure
mesh-based network.
SECURITY IMPLEMENTATION IN MEDIA STREAMING APPLICATIONS USING OPEN NETWORK AD...Journal For Research
Media has been a very important medium for entertainment and communications and the captured media was transmitted in analog form. Media providers do not want their end users to store and duplicate the streamed media because the end user can freely distribute the streamed media without any control from the source. Hence while dealing with media streaming, replay protection and integrity protection are the most important factors. The main aim of this paper is to implement the concept of WebRTC to stream the media between the participating end points which is a powerful tool used to incorporate RTC capabilities into browsers and mobile applications. The aim is to develop a secure media stream from an end point that flows through the Open Network Adapter to the Avaya Media Server (AMS) and is hosted by an application on the Engagement Development Platform. The Open Network Adapter with Avaya Fabric Attach is capable of securing the required flow.
Video transmission over wireless networks is considered the most interesting application in our daily life nowadays. As
mobile data rates continue to increase and more people rely on wireless transmission, the amount of video transmitted over at least one
wireless hop will likely continue to increase. This kind of application needs large bandwidth, efficient routing protocols, and content
delivery methods to provide smooth video playback to the receivers. Current generation wireless networks are likely to operate on
internet technology combined with various access technologies. Achieving effective bandwidth aggregation in wireless environments
raises several challenges related to deployment, link heterogeneity, Network congestion, network fluctuation, and energy consumption.
In this work, an overview of technical challenges of over wireless networks is presented. A survey of wireless networks in recent video
transmission schemes is introduced. Demonstration results of few scenarios are showed.
This document presents a proposed peer-assisted video sharing system for online social networks. It begins with an introduction to increased popularity of video sharing and existing peer-assisted video on demand techniques. It then describes limitations of current client-server architectures, including high bandwidth costs. The proposed system aims to improve performance by exploring social relationships and interest similarities between peers. It uses four algorithms to construct peer overlays, prefetch chunks, deliver chunks and scheduling. The implementation aims to reduce data storage and bandwidth requirements while providing scalability. Simulation results show improved startup delays and reduced server traffic compared to existing systems.
An Admission Control Algorithm For Providing Quality-Of-Service Guarantee For...Jennifer Daniel
This document summarizes an admission control algorithm for providing quality-of-service guarantees in a video-on-demand system. The algorithm can guarantee quality-of-service requirements for individual connections, considering both the storage sub-system and network sub-system. It is a two-step admission control algorithm that statistically guarantees bandwidth requirements and derives an admissible region for packet dropping rates using strong conservation laws. Experiments show the algorithm achieves high bandwidth utilization while satisfying quality-of-service demands.
This document describes a proposed peer-to-peer file transfer application. It discusses how a P2P network allows files to be shared directly between users without a centralized server. The proposed app aims to create an easy-to-use interface for users to view, download, and share files over a P2P network. It outlines the architecture, including peer and connection modules, and proposes features like monitoring shared files and personalized recommendations. The conclusion states that P2P file sharing provides privacy compared to other methods by transferring files directly between users without involving third parties.
This document discusses using network coding to improve live video streaming over peer-to-peer mesh networks. It begins by introducing live video streaming and its challenges. It then discusses peer-to-peer and wireless mesh networks as infrastructures for video distribution. Network coding is presented as a technique to increase bandwidth utilization, robustness, and video quality by allowing intermediate nodes to combine packets before forwarding. The results showed that network coding can reduce delay and jitter, increase data localization, and improve bandwidth utilization and network scalability.
A FRAMEWORK FOR MOBILE VIDEO STREAMING AND VIDEO SHARING IN CLOUDJournal For Research
The transmission of data has grown over years in all the streams of technology. Video and image data plays a very important position in communication around the globe. The usage of Medias over mobile devices had exploded years ago in technology. However, the usage of traditional network connecting protocols and the service providers are providing lack of quality in services. As the number of users who uses mobile phones is increasing day by day the video traffic over network is also increasing thereby causes disruption in the service which is caused by low bandwidth. Due to this disruption the wireless cannot able to satisfy the users demand for video streaming which eventually causes long buffering time. Influencing cloud computing knowledge to gain advantage over this issue we suggest two solutions. i) Mobile Video Streaming (MoV) and Social Video Sharing (SoV). MoV will create a private cloud for each mobile user which adjusts the bit rate based on return value using scalable video coding technique to improve the scalability and efficient utilization of bandwidth. SoV uses the agent to pre fetch the video data for effective sharing and to reduce the buffering time.
Similar to Live multimedia streaming and video on demand issues and challenges (20)
Mechanical properties of hybrid fiber reinforced concrete for pavementseSAT Journals
Abstract
The effect of addition of mono fibers and hybrid fibers on the mechanical properties of concrete mixture is studied in the present
investigation. Steel fibers of 1% and polypropylene fibers 0.036% were added individually to the concrete mixture as mono fibers and
then they were added together to form a hybrid fiber reinforced concrete. Mechanical properties such as compressive, split tensile and
flexural strength were determined. The results show that hybrid fibers improve the compressive strength marginally as compared to
mono fibers. Whereas, hybridization improves split tensile strength and flexural strength noticeably.
Keywords:-Hybridization, mono fibers, steel fiber, polypropylene fiber, Improvement in mechanical properties.
Material management in construction – a case studyeSAT Journals
Abstract
The objective of the present study is to understand about all the problems occurring in the company because of improper application
of material management. In construction project operation, often there is a project cost variance in terms of the material, equipments,
manpower, subcontractor, overhead cost, and general condition. Material is the main component in construction projects. Therefore,
if the material management is not properly managed it will create a project cost variance. Project cost can be controlled by taking
corrective actions towards the cost variance. Therefore a methodology is used to diagnose and evaluate the procurement process
involved in material management and launch a continuous improvement was developed and applied. A thorough study was carried
out along with study of cases, surveys and interviews to professionals involved in this area. As a result, a methodology for diagnosis
and improvement was proposed and tested in selected projects. The results obtained show that the main problem of procurement is
related to schedule delays and lack of specified quality for the project. To prevent this situation it is often necessary to dedicate
important resources like money, personnel, time, etc. To monitor and control the process. A great potential for improvement was
detected if state of the art technologies such as, electronic mail, electronic data interchange (EDI), and analysis were applied to the
procurement process. These helped to eliminate the root causes for many types of problems that were detected.
Managing drought short term strategies in semi arid regions a case studyeSAT Journals
Abstract
Drought management needs multidisciplinary action. Interdisciplinary efforts among the experts in various fields of the droughts
prone areas are helpful to achieve tangible and permanent solution for this recurring problem. The Gulbarga district having the total
area around 16, 240 sq.km, and accounts 8.45 per cent of the Karnataka state area. The district has been situated with latitude 17º 19'
60" North and longitude of 76 º 49' 60" east. The district is situated entirely on the Deccan plateau positioned at a height of 300 to
750 m above MSL. Sub-tropical, semi-arid type is one among the drought prone districts of Karnataka State. The drought
management is very important for a district like Gulbarga. In this paper various short term strategies are discussed to mitigate the
drought condition in the district.
Keywords: Drought, South-West monsoon, Semi-Arid, Rainfall, Strategies etc.
Life cycle cost analysis of overlay for an urban road in bangaloreeSAT Journals
Abstract
Pavements are subjected to severe condition of stresses and weathering effects from the day they are constructed and opened to traffic
mainly due to its fatigue behavior and environmental effects. Therefore, pavement rehabilitation is one of the most important
components of entire road systems. This paper highlights the design of concrete pavement with added mono fibers like polypropylene,
steel and hybrid fibres for a widened portion of existing concrete pavement and various overlay alternatives for an existing
bituminous pavement in an urban road in Bangalore. Along with this, Life cycle cost analyses at these sections are done by Net
Present Value (NPV) method to identify the most feasible option. The results show that though the initial cost of construction of
concrete overlay is high, over a period of time it prove to be better than the bituminous overlay considering the whole life cycle cost.
The economic analysis also indicates that, out of the three fibre options, hybrid reinforced concrete would be economical without
compromising the performance of the pavement.
Keywords: - Fatigue, Life cycle cost analysis, Net Present Value method, Overlay, Rehabilitation
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialseSAT Journals
Abstract
The issue of growing demand on our nation’s roadways over that past couple of decades, decreasing budgetary funds, and the need to
provide a safe, efficient, and cost effective roadway system has led to a dramatic increase in the need to rehabilitate our existing
pavements and the issue of building sustainable road infrastructure in India. With these emergency of the mentioned needs and this
are today’s burning issue and has become the purpose of the study.
In the present study, the samples of existing bituminous layer materials were collected from NH-48(Devahalli to Hassan) site.The
mixtures were designed by Marshall Method as per Asphalt institute (MS-II) at 20% and 30% Reclaimed Asphalt Pavement (RAP).
RAP material was blended with virgin aggregate such that all specimens tested for the, Dense Bituminous Macadam-II (DBM-II)
gradation as per Ministry of Roads, Transport, and Highways (MoRT&H) and cost analysis were carried out to know the economics.
Laboratory results and analysis showed the use of recycled materials showed significant variability in Marshall Stability, and the
variability increased with the increase in RAP content. The saving can be realized from utilization of recycled materials as per the
methodology, the reduction in the total cost is 19%, 30%, comparing with the virgin mixes.
Keywords: Reclaimed Asphalt Pavement, Marshall Stability, MS-II, Dense Bituminous Macadam-II
Laboratory investigation of expansive soil stabilized with natural inorganic ...eSAT Journals
This document summarizes a study on stabilizing expansive black cotton soil with the natural inorganic stabilizer RBI-81. Laboratory tests were conducted to evaluate the effect of RBI-81 on the soil's engineering properties. The tests showed that with 2% RBI-81 and 28 days of curing, the unconfined compressive strength increased by around 250% and the CBR value improved by approximately 400% compared to the untreated soil. Overall, the study found that RBI-81 effectively improved the strength properties of the black cotton soil and its suitability as a soil stabilizer was supported.
Influence of reinforcement on the behavior of hollow concrete block masonry p...eSAT Journals
Abstract
Reinforced masonry was developed to exploit the strength potential of masonry and to solve its lack of tensile strength. Experimental
and analytical studies have been carried out to investigate the effect of reinforcement on the behavior of hollow concrete block
masonry prisms under compression and to predict ultimate failure compressive strength. In the numerical program, three dimensional
non-linear finite elements (FE) model based on the micro-modeling approach is developed for both unreinforced and reinforced
masonry prisms using ANSYS (14.5). The proposed FE model uses multi-linear stress-strain relationships to model the non-linear
behavior of hollow concrete block, mortar, and grout. Willam-Warnke’s five parameter failure theory has been adopted to model the
failure of masonry materials. The comparison of the numerical and experimental results indicates that the FE models can successfully
capture the highly nonlinear behavior of the physical specimens and accurately predict their strength and failure mechanisms.
Keywords: Structural masonry, Hollow concrete block prism, grout, Compression failure, Finite element method,
Numerical modeling.
Influence of compaction energy on soil stabilized with chemical stabilizereSAT Journals
This document summarizes a study on the influence of compaction energy on soil stabilized with a chemical stabilizer. Laboratory tests were conducted on locally available loamy soil treated with a patented polymer liquid stabilizer and compacted at four different energy levels. The study found that increasing the compaction effort increased the density of both untreated and treated soil, but the rate of increase was lower for stabilized soil. Treating the soil with the stabilizer improved its unconfined compressive strength and resilient modulus, and reduced accumulated plastic strain, with these properties further improved by higher compaction efforts. The stabilized soil exhibited strength and performance benefits compared to the untreated soil.
Geographical information system (gis) for water resources managementeSAT Journals
This document describes a hydrological framework developed in the form of a Hydrologic Information System (HIS) to meet the information needs of various government departments related to water management in a state. The HIS consists of a hydrological database coupled with tools for collecting and analyzing spatial and non-spatial water resources data. It also incorporates a hydrological model to indirectly assess water balance components over space and time. A web-based GIS portal was created to allow users to access and visualize the hydrological data, as well as outputs from the SWAT hydrological model. The framework is intended to facilitate integrated water resources planning and management across different administrative levels.
Forest type mapping of bidar forest division, karnataka using geoinformatics ...eSAT Journals
Abstract
The study demonstrate the potentiality of satellite remote sensing technique for the generation of baseline information on forest types
including tree plantation details in Bidar forest division, Karnataka covering an area of 5814.60Sq.Kms. The Total Area of Bidar
forest division is 5814Sq.Kms analysis of the satellite data in the study area reveals that about 84% of the total area is Covered by
crop land, 1.778% of the area is covered by dry deciduous forest, 1.38 % of mixed plantation, which is very threatening to the
environmental stability of the forest, future plantation site has been mapped. With the use of latest Geo-informatics technology proper
and exact condition of the trees can be observed and necessary precautions can be taken for future plantation works in an appropriate
manner
Keywords:-RS, GIS, GPS, Forest Type, Tree Plantation
Factors influencing compressive strength of geopolymer concreteeSAT Journals
Abstract
To study effects of several factors on the properties of fly ash based geopolymer concrete on the compressive strength and also the
cost comparison with the normal concrete. The test variables were molarities of sodium hydroxide(NaOH) 8M,14M and 16M, ratio of
NaOH to sodium silicate (Na2SiO3) 1, 1.5, 2 and 2.5, alkaline liquid to fly ash ratio 0.35 and 0.40 and replacement of water in
Na2SiO3 solution by 10%, 20% and 30% were used in the present study. The test results indicated that the highest compressive
strength 54 MPa was observed for 16M of NaOH, ratio of NaOH to Na2SiO3 2.5 and alkaline liquid to fly ash ratio of 0.35. Lowest
compressive strength of 27 MPa was observed for 8M of NaOH, ratio of NaOH to Na2SiO3 is 1 and alkaline liquid to fly ash ratio of
0.40. Alkaline liquid to fly ash ratio of 0.35, water replacement of 10% and 30% for 8 and 16 molarity of NaOH and has resulted in
compressive strength of 36 MPa and 20 MPa respectively. Superplasticiser dosage of 2 % by weight of fly ash has given higher
strength in all cases.
Keywords: compressive strength, alkaline liquid, fly ash
Experimental investigation on circular hollow steel columns in filled with li...eSAT Journals
Abstract
Composite Circular hollow Steel tubes with and without GFRP infill for three different grades of Light weight concrete are tested for
ultimate load capacity and axial shortening , under Cyclic loading. Steel tubes are compared for different lengths, cross sections and
thickness. Specimens were tested separately after adopting Taguchi’s L9 (Latin Squares) Orthogonal array in order to save the initial
experimental cost on number of specimens and experimental duration. Analysis was carried out using ANN (Artificial Neural
Network) technique with the assistance of Mini Tab- a statistical soft tool. Comparison for predicted, experimental & ANN output is
obtained from linear regression plots. From this research study, it can be concluded that *Cross sectional area of steel tube has most
significant effect on ultimate load carrying capacity, *as length of steel tube increased- load carrying capacity decreased & *ANN
modeling predicted acceptable results. Thus ANN tool can be utilized for predicting ultimate load carrying capacity for composite
columns.
Keywords: Light weight concrete, GFRP, Artificial Neural Network, Linear Regression, Back propagation, orthogonal
Array, Latin Squares
Experimental behavior of circular hsscfrc filled steel tubular columns under ...eSAT Journals
This document summarizes an experimental study that tested circular concrete-filled steel tube columns with varying parameters. 45 specimens were tested with different fiber percentages (0-2%), tube diameter-to-wall-thickness ratios (D/t from 15-25), and length-to-diameter (L/d) ratios (from 2.97-7.04). The results found that columns filled with fiber-reinforced concrete exhibited higher stiffness, equal ductility, and enhanced energy absorption compared to those filled with plain concrete. The load carrying capacity increased with fiber content up to 1.5% but not at 2.0%. The analytical predictions of failure load closely matched the experimental values.
Evaluation of punching shear in flat slabseSAT Journals
Abstract
Flat-slab construction has been widely used in construction today because of many advantages that it offers. The basic philosophy in
the design of flat slab is to consider only gravity forces; this method ignores the effect of punching shear due to unbalanced moments
at the slab column junction which is critical. An attempt has been made to generate generalized design sheets which accounts both
punching shear due to gravity loads and unbalanced moments for cases (a) interior column; (b) edge column (bending perpendicular
to shorter edge); (c) edge column (bending parallel to shorter edge); (d) corner column. These design sheets are prepared as per
codal provisions of IS 456-2000. These design sheets will be helpful in calculating the shear reinforcement to be provided at the
critical section which is ignored in many design offices. Apart from its usefulness in evaluating punching shear and the necessary
shear reinforcement, the design sheets developed will enable the designer to fix the depth of flat slab during the initial phase of the
design.
Keywords: Flat slabs, punching shear, unbalanced moment.
Evaluation of performance of intake tower dam for recent earthquake in indiaeSAT Journals
Abstract
Intake towers are typically tall, hollow, reinforced concrete structures and form entrance to reservoir outlet works. A parametric
study on dynamic behavior of circular cylindrical towers can be carried out to study the effect of depth of submergence, wall thickness
and slenderness ratio, and also effect on tower considering dynamic analysis for time history function of different soil condition and
by Goyal and Chopra accounting interaction effects of added hydrodynamic mass of surrounding and inside water in intake tower of
dam
Key words: Hydrodynamic mass, Depth of submergence, Reservoir, Time history analysis,
Evaluation of operational efficiency of urban road network using travel time ...eSAT Journals
This document evaluates the operational efficiency of an urban road network in Tiruchirappalli, India using travel time reliability measures. Traffic volume and travel times were collected using video data from 8-10 AM on various roads. Average travel times, 95th percentile travel times, and buffer time indexes were calculated to assess reliability. Non-motorized vehicles were found to most impact reliability on one road. A relationship between buffer time index and traffic volume was developed. Finally, a travel time model was created and validated based on length, speed, and volume.
Estimation of surface runoff in nallur amanikere watershed using scs cn methodeSAT Journals
Abstract
The development of watershed aims at productive utilization of all the available natural resources in the entire area extending from
ridge line to stream outlet. The per capita availability of land for cultivation has been decreasing over the years. Therefore, water and
the related land resources must be developed, utilized and managed in an integrated and comprehensive manner. Remote sensing and
GIS techniques are being increasingly used for planning, management and development of natural resources. The study area, Nallur
Amanikere watershed geographically lies between 110 38’ and 110 52’ N latitude and 760 30’ and 760 50’ E longitude with an area of
415.68 Sq. km. The thematic layers such as land use/land cover and soil maps were derived from remotely sensed data and overlayed
through ArcGIS software to assign the curve number on polygon wise. The daily rainfall data of six rain gauge stations in and around
the watershed (2001-2011) was used to estimate the daily runoff from the watershed using Soil Conservation Service - Curve Number
(SCS-CN) method. The runoff estimated from the SCS-CN model was then used to know the variation of runoff potential with different
land use/land cover and with different soil conditions.
Keywords: Watershed, Nallur watershed, Surface runoff, Rainfall-Runoff, SCS-CN, Remote Sensing, GIS.
Estimation of morphometric parameters and runoff using rs & gis techniqueseSAT Journals
This document summarizes a study that used remote sensing and GIS techniques to estimate morphometric parameters and runoff for the Yagachi catchment area in India over a 10-year period. Morphometric analysis was conducted to understand the hydrological response at the micro-watershed level. Daily runoff was estimated using the SCS curve number model. The results showed a positive correlation between rainfall and runoff. Land use/land cover changes between 2001-2010 were found to impact estimated runoff amounts. Remote sensing approaches provided an effective means to model runoff for this large, ungauged area.
Effect of variation of plastic hinge length on the results of non linear anal...eSAT Journals
Abstract The nonlinear Static procedure also well known as pushover analysis is method where in monotonically increasing loads are applied to the structure till the structure is unable to resist any further load. It is a popular tool for seismic performance evaluation of existing and new structures. In literature lot of research has been carried out on conventional pushover analysis and after knowing deficiency efforts have been made to improve it. But actual test results to verify the analytically obtained pushover results are rarely available. It has been found that some amount of variation is always expected to exist in seismic demand prediction of pushover analysis. Initial study is carried out by considering user defined hinge properties and default hinge length. Attempt is being made to assess the variation of pushover analysis results by considering user defined hinge properties and various hinge length formulations available in literature and results compared with experimentally obtained results based on test carried out on a G+2 storied RCC framed structure. For the present study two geometric models viz bare frame and rigid frame model is considered and it is found that the results of pushover analysis are very sensitive to geometric model and hinge length adopted. Keywords: Pushover analysis, Base shear, Displacement, hinge length, moment curvature analysis
Effect of use of recycled materials on indirect tensile strength of asphalt c...eSAT Journals
Abstract
Depletion of natural resources and aggregate quarries for the road construction is a serious problem to procure materials. Hence
recycling or reuse of material is beneficial. On emphasizing development in sustainable construction in the present era, recycling of
asphalt pavements is one of the effective and proven rehabilitation processes. For the laboratory investigations reclaimed asphalt
pavement (RAP) from NH-4 and crumb rubber modified binder (CRMB-55) was used. Foundry waste was used as a replacement to
conventional filler. Laboratory tests were conducted on asphalt concrete mixes with 30, 40, 50, and 60 percent replacement with RAP.
These test results were compared with conventional mixes and asphalt concrete mixes with complete binder extracted RAP
aggregates. Mix design was carried out by Marshall Method. The Marshall Tests indicated highest stability values for asphalt
concrete (AC) mixes with 60% RAP. The optimum binder content (OBC) decreased with increased in RAP in AC mixes. The Indirect
Tensile Strength (ITS) for AC mixes with RAP also was found to be higher when compared to conventional AC mixes at 300C.
Keywords: Reclaimed asphalt pavement, Foundry waste, Recycling, Marshall Stability, Indirect tensile strength.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELgerogepatton
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
UNLOCKING HEALTHCARE 4.0: NAVIGATING CRITICAL SUCCESS FACTORS FOR EFFECTIVE I...amsjournal
The Fourth Industrial Revolution is transforming industries, including healthcare, by integrating digital,
physical, and biological technologies. This study examines the integration of 4.0 technologies into
healthcare, identifying success factors and challenges through interviews with 70 stakeholders from 33
countries. Healthcare is evolving significantly, with varied objectives across nations aiming to improve
population health. The study explores stakeholders' perceptions on critical success factors, identifying
challenges such as insufficiently trained personnel, organizational silos, and structural barriers to data
exchange. Facilitators for integration include cost reduction initiatives and interoperability policies.
Technologies like IoT, Big Data, AI, Machine Learning, and robotics enhance diagnostics, treatment
precision, and real-time monitoring, reducing errors and optimizing resource utilization. Automation
improves employee satisfaction and patient care, while Blockchain and telemedicine drive cost reductions.
Successful integration requires skilled professionals and supportive policies, promising efficient resource
use, lower error rates, and accelerated processes, leading to optimized global healthcare outcomes.
The CBC machine is a common diagnostic tool used by doctors to measure a patient's red blood cell count, white blood cell count and platelet count. The machine uses a small sample of the patient's blood, which is then placed into special tubes and analyzed. The results of the analysis are then displayed on a screen for the doctor to review. The CBC machine is an important tool for diagnosing various conditions, such as anemia, infection and leukemia. It can also help to monitor a patient's response to treatment.
Batteries -Introduction – Types of Batteries – discharging and charging of battery - characteristics of battery –battery rating- various tests on battery- – Primary battery: silver button cell- Secondary battery :Ni-Cd battery-modern battery: lithium ion battery-maintenance of batteries-choices of batteries for electric vehicle applications.
Fuel Cells: Introduction- importance and classification of fuel cells - description, principle, components, applications of fuel cells: H2-O2 fuel cell, alkaline fuel cell, molten carbonate fuel cell and direct methanol fuel cells.
Live multimedia streaming and video on demand issues and challenges
1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 05 Issue: 02 | Feb-2016, Available @ http://www.ijret.org 91
LIVE MULTIMEDIA STREAMING AND VIDEO ON DEMAND ISSUES
AND CHALLENGES
Amandeep Singh Walia
Student, Department of Computer Science, Rayat Educational & Research Trust, Punjab, India
Abstract
Live Streaming and Video on Demand are the trending technologies nowadays over the internet. It provides the mechanism to
deliver multimedia content such as audio or video to the large number of audience. However internet based services face the
problem of QOS (Quality of Service) due to the instability faced in networks. Performance gets degraded when serving content to
large number of consumers. Despite following the modern architectural design, precise estimate of resources such as bandwidth
and server load is a challenging task.. In this paper we delve into the architectural and performance issues of running these kinds
of services. Our study demonstrates that the streaming architecture and Security issues are the challenges faced by these
technologies. Moreover resources such as bandwidth and design of networks degrade the quality of multimedia data delivered to
users. Thus in order to have best experience of streaming and Video on demand services, these issues must be addressed.
Keywords— Live Streaming, VOD (Video On Demand), P2P Streaming, Client-Server Model.
-----------------------------------------------------------------------***-------------------------------------------------------------------
1. INTRODUCTION
With the advancement in technology and global connectivity
throughout the world, it had made possible to deliver live
content to the large number of end users and provide them
the capability to play, seek forward and reverse the media
provided by VOD. Users don’t have to wait for the entire
content to be downloaded; they can play as it is coming
from the provider. One of the traditional approaches used to
deliver the content is Client-Server model. In this model,
client makes the request to the video server, server then
process the request and if that content is available on the
server, stream is provided to the client. CDN (Content
Delivery Network) is another method used which is based
on the Client-Server Model. In this model, rather than single
video server, multiple servers are deployed, users than
makes the request from the nearest server available. It
reduces the time used to start the video and traffic on the
network but major problem faced by this model is scalability.
Quality of the stream is the utmost feature required by the
end users. Major challenge faced by the CDN is, as the user
base grows, bandwidth of the network also surges. Load
balancing and replication of data helps in providing the
reliable services but at the cost of increased expenditure.
Another model which can overcome these obstacles is P2P
(Peer to Peer) Live Streaming model. In P2P model client
can act both as server or client and fulfil the request of other
clients also called as peers. Users can also share the data i.e.
upload the stream slices which they have downloaded from
main servers or other peers. This enables the communication
between the different peers with the help of p2p network. It
reduces the bandwidth load on main servers as resources of
peers i.e. uploading bandwidth is used to fulfil the request of
the users.
P2P technology is quite famous in file sharing applications
such as Bittorent [1] and Vuze [2]. In these services user has
to wait until the video download is complete then only user
can view the video, but in the case of live streaming user
need to receive the video in particular order in real time.
Some services like Peercast [3] have made it success to
deliver media by this model to large users. As a result of
these P2P VOD technology also emerged and it was tough
challenge to design and deploy this service due to the
random requests made by users and provide functioning like
backward, forward and pause as in the case of CD player
These types of system are very complex to design and
operate but if designed logically these can solve the issues
of server load and bandwidth shortage.
The rest of the paper is organized as the following: Section
II describes the traditional and most used Client-Server
model of both streaming and VOD. Section III describes the
existing P2P model of both technologies. Section IV &
Section V describes issues in both P2P and VOD systems.
Section VI focuses on other issues faced by these systems.
Finally, paper is concluded in Section VII with summary of
our work.
2. CLIENT SERVER MODEL
Video Streaming services are based on the two categories:
Live Streaming and VOD (Video on Demand). Live
streaming provides the capability to provide the real time
viewing of the multimedia content. User is synchronized
with the server and live stream is provided to the user. In the
case of Video on Demand user can view video anytime
regardless of timing. Users have the capability to seek
forward, reverse and pause the video as in the case of the
CD player. The following sections describe the different
architectures used to construct these services.
2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 05 Issue: 02 | Feb-2016, Available @ http://www.ijret.org 92
2.1 CLIENT SERVER ARCHITECTURE
These types of network architecture consist of powerful
computers known as servers. These special purpose
computers are equipped with dedicated networks, storage
devices and other resources. Client send request to the video
server, it than fulfil the request of the client by providing
them with the stream or video requested. Video Servers
main goal is to record, capture, and store and provide the
playing capability. It also performs additional tasks such as
encoding the video which is input the server, then later on
decoding it on the users end. Compression techniques are
also used to decrease the size of the video or the streams.
Fig. 1 Client-Server Architecture & different typed of
clients attached.
Video Servers play vital role in providing streaming as well
as VOD services. They handle streaming data in real time
and then process the data. They make use of various
protocols in Live Streaming such as RTMP (Real Time
Messaging Protocol), HLS (HTTP Live Streaming) and
many others [4]. They also provide synchronization with the
clients and QOS (Quality of Service) mechanism so that
content is delivered properly to the user. In case of VOD,
when the user request the desired multimedia fileserver then
looks for the presence of the data available on its storage. If
file is found then stream is generated for the video file else
error is generated. These Video Servers make the smart use
of cache. Whenever there is huge demand of the similar file.
Sever than stores that file in the cache and provide that file
from cache to the users. It saves the processing time of the
servers and help in saving precious resources. These types
of model generally suffer from server load problems, when
there are large numbers of users requesting the stream or
video files, it creates huge load on server side and leads to
the bottleneck condition. This problem is generally handled
by creating multiple servers.
2.2 CDN (CONTENT DELIVERY NETWORK)
As the number of users grows there is the need to increase
the capacity on server side in order to provide the better
services. This approach is used to manage the server load
efficiently. Content Caching and Replication are the
methods to efficiently handle the load on the server.[5] Web
caching is used to decrease the latency and access time,
similar requests. Replication technique creates multiple
copies of the data on the different servers. Thus Load
Balancing can be achieved and load can be distributed
among different servers thus preventing the bottleneck
condition and overloading of servers.
Fig. 2 Content Delivery Network (CDN).
Fault tolerance can be achieved by the replication strategy.
In case one server fails, all requests can be diverted to other
servers and high up time is guaranteed, moreover latency
and bandwidth can be managed in order to provide the
quality service.
3. P2P ARCHITECTURE
Distributed networks are mostly used in the Internet. There
are number of clients which make requests to the servers.
Server capacity become inadequate as content is to be
served 24x7 and QOS is to be provided equally all the time.
Despite having specially designed architecture of the Server,
resources are still not enough to provide continuous access
as they are spread in limited circle. P2P (Peer to Peer)
architecture got quite famous due to its capability of solving
the problem of limited resources and providing the
continuous access to the data. P2P technology makes the
efficient use of resources available such as networks, storage
and computing power. P2P enables the use of distributed
approach and avoid the centralized approach. P2P networks
consist of peers (nodes), these nodes communicate with
other nodes and exchange data among themselves thus
reducing the role of the central server. Nodes can
themselves become server or client and serve content to
other peer or receive from them at the same time. Peers can
connect and leave freely and all this is handles by P2P
approach automatically, without creating much impact on
neighbouring peers. This architecture provides the relief to
the server and bandwidth of the networks is utilised to its
full extent. Peers can interactively exchange data between
other peers and as the number of peers grows, data
availability also increases and more number of requests can
be easily fulfilled. It is opposite to the central architecture,
in which the performance degrades as the number of users
grows. Another feature provided by P2P technology is fault
tolerance, as data is present on multiple nodes and even if
the one node fails to provide data, other nodes are present to
share the data. Problem of latency can also be solved as
3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 05 Issue: 02 | Feb-2016, Available @ http://www.ijret.org 93
peers can connect to their nearby location peers and content
can be exchanged without any excessive delay. This leads to
the better use of the bandwidth and network at the peer’s
side. Following diagram represents the basic design of the
P2P (Peer to Peer Network and shows the communication
between the different peers.
Fig. 2 Basic design of P2P Network.
The following section describes the structure of the P2P
Networks and the categories into which it is divided:
3.1 TREE BASED STRUCTURE
The Tree based structure is derived from IP MULTICAST
[6] .Tree like structure is formed in which there is root
which is the real source and data is received by the nodes
from their parent nodes. Flow of the data is generally from
parent to the child node. Root node contains all the
information about the source data and how it is to be
delivered and shared among other nodes. Application layer
is used in this structure so as to proper delivery of stream or
VOD services
1) Single-Tree Structure: In this structure, content is served
by the root node and it is delivered to the peer nodes.
Hierarchy of the peers is made and they are organized in a
well-defined .Root node is generally the source node and all
content is first served by this root node. Flow of the stream
and the multimedia file is from top to bottom i.e. Root to the
Peers down in the tree. Root helps in managing the structure
of the tree, when the peer join or exits the network, position
of the peer and its related information is processed by the
root node.
Fig. 2 Single-Tree Structure (Application Layer Multicast)
These types of trees are very difficult to manage, as peers
are very dynamic in nature. They continuously enter or
leave. Since data is flowing from top to down and for leaf
nodes there is single flow of data, when the peer leaves, it
leads to disruptions in delivery of data. So to make the
recovery of the structure, Zigzag algorithm has also been
developed. Despite following various measures, time taken
to recover is a major concern
3.2 MULTI-TREE STRUCTURE
This structure leads to the distribution of the streams among
various sub streams. Stream is provided to each of the trees
coming in this structure. This helps in solving the problem
of the child nodes, as now there are multiple streams of data
generated from source, it prevent the structure from crashing
due to the non-availability of data when the peer exits.
Fig. 3 Multi-Tree Structure in P2P.
4. ISSUES IN P2P LIVE STREAMING
Despite using various algorithms, there are some limitations
which occur in these types of systems: These issues are as
follows:
1) UPLOAD BANDWIDTH OF PEER: P2P models generally
helps in saving the resources and provide sharing on large
scale, but the whole communication depends upon the
upload bandwidth available for the stream.Inorder to
achieve the best experience of the live stream, upload speed
should be greater than the rate of the stream. For achieving
better upload bandwidth we need high speed connections
4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 05 Issue: 02 | Feb-2016, Available @ http://www.ijret.org 94
such as DSL or VDSL, which may lead to extra cost. If the
peer is using mobile data or low speed connection, quality of
the stream may be dramatically reduced.
2) END TO END CONNECTIVITY: Content Delivery
Networks are quite famous for providing the stable and
reliable stream connection from server to the client, but at
the cost of the increased investment, which is quite tough for
the new players.P2P tree structures provides the great
flexibility to deploy the system, but as the peers are dynamic
and with the varying network connectivity, smoothness of
stream is difficult to obtain, thus stream timeout may occur
and quality is compromised.
4) FIREWALL OR ISP THROTTLING: P2P is the major
source of the traffic over the internet. As shown in the figure
below, P2P plays major role for utilization of bandwidth. As
very heavy files are shared by these P2P software, ISP try to
limit the traffic from them by using speed throttling which
has very negative impact on the Live Stream and also the
VOD suffers slow video download rate [7]. Moreover while
we are in LAN, Network administrators block these services
so that bandwidth abuse should be prevented, which result
in poor quality of stream and video services.
Fig. 4 Chart depicting daily upstream bandwidth usage by
various services.
5. ISSUES IN P2P VOD (VIDEO ON DEMAND)
P2P VOD is quite similar to the Live Streaming because it
also streams the content, but it provides the extra features by
enabling the end user to seek forward reverse or pause the
stream. Users may also enjoy the video of their choice.
Peers share the data with their neighbouring peers. P2P also
suffer from various challenges which are discussed as
follow:
1) UTMOST REQUIREMENTS: To detect the best connection
such as according to the lowest latency special components
and features may be needed such as trackers and log of peers,
their location and speed information. Transit servers are
needed for the discovery of the peers on the network behind
several networks. Special program or application, which
may be provided by the VOD service provider in order to
view Videos. Moreover running these services in the
browsers is a tough task due to the limited functionality,
varying protocol and restriction’s imposed by web browsers.
2) SIZE OF THE SLICE: Instead of streaming full video file,
P2P VOD works by dividing the large files into small
chunks which may also be referred as segments. These
segments are divided in very small sizes so that transmitting
and scheduling of the slices should easily take place [8].
Large slices are usually better as they provide smooth
playback and less overload on peers, but these may also lead
to timeout errors as large slices take more time to transmit
and player may be waiting for the data and result into the
error loading the stream.
3) STORAGE PROBLEMS: In order to serve VOD streams to
the peers. Peers must have the videos or stream buffer stored
on their machine memory. As the selection the video is
entirely based on the user’s choice. So it leads to the
wastage of the memory of the peers. While Replication of
the chunk some problems may occur while fulfilling the
users demand as multiple movie streams may be cached by
system when there is more space and different movies get
upload from the peers side. It is quite challenging to
handling replication task. It leads to the bandwidth wastage
of the peers. In the case of Client-Server all data is stored on
the server’s storage devices, thus there is less overhead on
user’s storage devices and network.
4) DISCOVERY OF REQUIRED DATA: Discovery of the
required content is very challenging task in the case of P2P
VOD systems. As we don’t know where the required
content is located in the Peer Network and which peer has
that content which is required by the requesting peer. Same
is in the case of file sharing P2P systems. It requires the
following data in order to fetch the content which is required
by the requesting peer without creating much overhead:
Trackers: They are used to maintain the list of peers and
chunks which they are holding.
DHT (Distributed Hash table): DHT provides the look
up service and helps in reducing load as it describes what
segments are to be provided to the trackers.
Seed Servers: Seed servers usually hold all the data,
which is provided to the peers. Even if the no peer is
holding any data. Seed servers may fulfil the request.
Seeding is must necessary in P2P VOD which may lead
to the upload bandwidth wastage on certain seeding
peers.
5) PIECE SELECTION PRIORITY: In multimedia data such
as Videos and audios timely delivery of the segments is very
critical, failed to do so will result in useless content. So
selection of the piece i.e. Segment is very necessary and it is
achieved by the taking care of the various steps such as in
proper sequence which is nearest from the peer [9].
Selecting the rarest piece first and selecting the fixed points.
There are various algorithms available. Despite following
algorithms. Piece may skip due to low availability, which
can result in slightly degraded performance.
5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 05 Issue: 02 | Feb-2016, Available @ http://www.ijret.org 95
6. OTHER ISSUES IN LIVE STREAMING
P2P systems are capable of handling large traffic and
moreover they can be deployed on very large scale. Peers
participate in this network and thus help to reduce the need
of resources on the server side and moreover as the peer or
viewers grow, availability and scalability of P2P streaming
network also grows. But somehow dynamic nature of the
P2P streaming network leads to the continuous maintenance
of the system and removing any stability occurring in the
network, which may lead to the increase overhead. Due to
its distributed design, handling the whole network and
maintaining it is a really challenging task. There are certain
more problems which are discussed as follows:
1) QOS (QUALITY OF SERVICE): Quality of service is the
parameter which defines the quality of the network. It helps
to obtain the better performance of the stream, by taking
care of the following things:
Reduced throughput: Due to the dynamic nature of the
peer’s going and exiting the system and when the
network is shared among various users, bitrate may get
so much reduced that it is unable to stream the live
content.
Missed packets: When there is error in the packet header,
packet may get dropped which require the retransmit of
that packet, which may lead to the delay in the stream.
Errors: Noise and fluctuation may cause the error in the
packets which may lead to the missing frames in the
videos or skipping audio.
Latency: Distance from the source leads to the delay in
packet arrivals and long waiting lists may increase the
waiting time that leads to the reduced quality of the
stream
Jitter: Some packets may reach the users with great
delays and not in proper sequence, this sequence may not
be known property thus creates variation in the stream
thus may adversely impact the quality of the stream.
2) SECURITY: Security is tough task to implement in the
Live Streaming environment and P2P networks. Due to the
open nature of the P2P networks, it is easy target for the
attackers to attack network and inject malicious content.
P2P networks are fully depended on the participating peers,
using the bandwidth. If certain content demand is made
from very high speed network, thus utilizing all the
bandwidth, then it can result to Denial of Service. Malicious
scripts may result in generating artificial queries which may
result in bandwidth shortage on peer sides, if not configured
properly and huge amount of traffic peak can be generated
which result in leeching of the source data.
QOS is very critical in Live streaming environment. And
failed to provide it so will degrade the performance and
fluctuations in network traffic made by the malicious piece
of code will result in the dissatisfaction of the users due to
the poor quality of stream received.
Other types of attacks may include:
Free Riders: These are those who only request the data
required and do not participate in sharing them or
providing them to other [10][11]. It leads to the
reduced network performance in P2P networks. These
are difficult to detect in the network.
Fake Packets: In this attacker may send messages to
other peers that it has all the chunks available and at
great bandwidth. Neighbouring peers may try to obtain
data from this peer, attacker then send the bogus data in
the P2P network, thus creating the pollution and
scrambling the stream quality.P2P is improving in
detecting the attacks by calculating checksum of
decoded blocks and comparing the blocks with other
majority of peers, and if corrupted block is detected, it is
rejected and origin of the corrupted block is known. It
makes a proper system to gather the list of peers who
spread the defective and polluted blocks and they are
blocked to share multimedia data in future to reduce the
problem. This has proven to be effective in handling the
pollution but leads to the huge overhead.
CONCLUSION
Live Streaming VOIP and Video On Demand (VOD) are the
trending applications these days over the internet. User base
of this application is increasing very rapidly and bandwidth
consumption is also increasing with the use of these services.
Despite the high usage of bandwidth as more number of
users are joining these application day by day, Live
streaming provides the method to view the video or audio in
such a way that, user don’t have to download the full video
in order to view it instead it can be streamed to the user by
encoding the videos in different qualities so as to match the
requirement of the users and provide them with the great
video quality. There are various architectures used to deliver
this service. Client-Server architecture is one of these
approaches in which there is centralized architecture. There
is one source i.e. Server, whole data is stored in server and
clients make the request to the server. Server fulfils the
request by providing them with required stream, but it
creates bottleneck at the server side, as there is huge
utilization of bandwidth and resource of servers, thus
leading to degradation of resources. Even the CDN has
certain deployment limits as it increases the cost.
So to overcome these problems, P2P services has proven to
be the great alternative, as it require less resources and there
is the participation of the peer or nodes, which have
sufficient resources in order to extend the network, P2P
makes better use of resources of Peers and networks, thus
avoiding the bottleneck problems on server side, as stream is
shared among various peers. Peers can communicate and
share data with other peers thus reducing the need of central
server. As the peers in networks grow, it leads to high
availability of the stream and better quality. Despite
providing various features it still lacks in some areas, such
as security which is very tough challenge to handle. Due to
its open nature it is more vulnerable to attacks. And
somehow due to varying network, quality of stream may not
be up to mark. In this paper we have addresses various
architectural and security issues and the necessary measures
which can be followed to solve the problems. P2P live
6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 05 Issue: 02 | Feb-2016, Available @ http://www.ijret.org 96
streaming is still the cheapest way to share stream or files
among large number of audiences.
REFERENCES
[1]. Bittorent, Bittorent Homepage,http://bittorent.com
[2]. Vuze, Vuze Homepage,http://vuze.com
[3]. Peercast,Peercast.Homepage,http://peercast.sourceforg
e.net
[4]. Video Streaming Protocols, Cohu HD,
http://www.cohuhd.com/Files/white_papers/CohuHDV
ideoStreamingProtocolsWhitePaper.pdf
[5]. Internet Protocol Multicast, Ip Multicast White Papers,
http://www.cisco.com/c/en/us/td/docs/ios/solutions_do
cs/ip_multicast/White_papers/mcst_ovr.pdf.
[6]. The CDN, [Papers]. Available:
http://www.us.ntt.net/downloads/papers/The_Value_of
_a_CDN_2010.pdf
[7]. ISP THROTTLING,
http://www.infoworld.com/article/2940538/internet/isp
s-do-throttle-traffic-and-the-fcc-cant-stop-it.html
[8]. Segmenation playback, Chia-Cheng Hu , Naval
Academy,
Kaohsiung,https://www.computer.org/csdl/trans/td/pre
print/06573953.pdf
[9]. Piece Selection in Bittorent,David
Erman,Karel,Adrian,http://www.diva-
portal.org/smash/get/diva2:835742/FULLTEXT01.pdf
[10]. Free Riders in
P2P,www.sciencedirect.com/science/article/pii/S13891
28611003367A
[11]. E. Adar and B.A. Huberman, “Free Riding on
Gnutella,” 2000, www.firstmonday.dk/ issues/issue5
10/adar.pdf