SlideShare a Scribd company logo
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.2, March 2014
DOI : 10.5121/ijcnc.2014.6203 27
MESH-PULL BACKUP PARENT POOLS
FOR VIDEO-ON-DEMAND MULTICAST TREES
Müge Sayıt1
and E. Turhan Tunalı2
1
International Computer Institute, Ege University, Izmir, Turkey
2
Department of Computer Engineering, Izmir University of Economics, Izmir, Turkey
ABSTRACT
Resilient multicast is a challenging issue for overlay trees particularly because of high churn. In this work,
we propose a mechanism that allows scalable video multicast. While the regular operation involves tree-
push of the video, any node that looses its parent on the tree solicits video from a predetermined backup set
of nodes in a mesh-pull fashion. The main idea is to allocate less bandwidth for backup to improve
bandwidth utilization while maintaining the best possible video quality. The choice of essential design
parameters are studied together with seamlessness of the streaming under variety of fault scenarios.
Simulation results indicate the optimality of the proposed approach as far as resiliency, bandwidth
utilization, delay and video quality are concerned.
KEYWORDS
multicast trees, resiliency technique, mesh-pull backup, scalable codec
1. INTRODUCTION
In peer to peer (P2P) communications, it is well known that tree-push type of approaches provide
smaller overhead in utilization of network resources when there is no failure, but fail to provide
resilience unless a considerable bandwidth is reserved idle for back-up [1]. Mesh-pull type of
approaches [2], [3], [4], [5], [6], [7], [8], [9] introduced efficient solutions for resilience while
introducing overhead network traffic due to excessive control messaging and/or redundant data
packets. Since churn is high, node failure rate is considerably high in peer to peer networks.
Hence tree based approach needs to consider this fact.
To provide a solution to the problem, backup parent concept was proposed together with degree
constrained optimal tree [10], [11]. In case of parent failure, a tree node connects to a pre-
determined backup parent that has adequate idle bandwidth. By this way, the tree is repaired and
multicast can resume. Nomination of backup parent in advance prevents waste of time for backup
search. This is classified as a “proactive strategy” in the literature [10], [11]. The problem with
this approach is that the nodes should reserve idle bandwidth that can stream video with a
predetermined rate. This, in turn, reduces bandwidth utilization. In order to increase bandwidth
utilization, backup slots are reserved in accordance with video layers where scalable video is
streamed in [12].
On the other hand, although mesh based systems are resilient to peer churn but they suffer
playback lag among peers. The nodes having large playback lag with other nodes in the system
may not use their upload bandwidth [13] and this reduces bandwidth utilization of the system.
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.2, March 2014
28
In this paper, we propose a new hybrid strategy in which regular streaming involves multicast
through the nodes of a pre-constructed tree whereas streaming from backup involves a mesh-pull
type of mechanism that does not require reservation of hefty idle bandwidth for each connection.
Best effort is spent to provide high quality video when failure occurs.
The contributions of our work are as follows: First, we present a novel backup strategy that
involves a hybrid mechanism suitable for scalable video. Second, we propose a new adaptive
hybrid push-pull P2P video-on-demand streaming system. After multicast tree is constructed, this
system having the tree push based structure is converted into the mesh based structure if node
failure rate increases. By this adaptive approach, we may keep advantages of both tree push and
mesh pull systems. Our proposed system is resilient to peer churn while the playback lag between
peers is small. We present a simulation-based comparative evaluation against tree-push only
strategy in which full bandwidth channel reservation is made for possible disconnected nodes.
The rest of the paper is organized as follows. In section two, related work on multicast trees
together with error resilience problem is addressed. In section three, the proposed hybrid method
for resilience together with its algorithms is given. In section four, simulation results that compare
the proposed method with non-hybrid case are given. Finally, in section five, concluding remarks
are made.
2. RELATED WORK
The error resilience problem in multicast trees has been addressed in many of the studies
including [5], [12], [14], [15], [16]. [12] addresses the real-time issues in resilience, [14] and [15]
discuss the optimal tree formation problem, [5], [16] discuss scalability and bandwidth utilization
issues associated to resilience. [17] addresses recovery time and associated buffer requirement
problem.
Resilience technique on multicast tree concentrates on repairing the tree in case failure happens.
In [5] and [18], nodes are clustered according to the delay values between the nodes and cluster
leaders selected from each cluster are responsible to convey video data to their clusters. If these
relay nodes leave the system, a new cluster leader is selected and hence tree is repaired. Since
selecting a new cluster leader after the failure of the cluster leader may cause interrupt of display,
selecting backup nodes before failure is proposed in the literature. For this purpose, some
backup mechanism is utilized by considering the capacity of each node. In [10], [19] and [20],
each node reserves a number of backup slots, each slot being able to stream baseline video and
nodes in the tree select their backup parents according to available backup capacity and RTT
value between candidate backup parent and themselves. Unfortunately, a portion of the backup
capacity reserved stays idle and bandwidth utilization reduces in the overall scheme. In simulation
studies, it has been observed that half of the available bandwidth should be reserved for backup to
provide acceptable resilience [21].
In order to make use of advantages of both tree based and mesh based systems, many hybrid
based systems are proposed in the literature [22], [23], [24]. Most hybrid systems construct more
than one multicast tree [22] and send different parts of the video data over those trees [25]. In
figure 1, an example overlay architecture used in such systems is illustrated. In the figure, source
node splits the video up to two streams called stream 1 and stream 2. The packets belonging to
different streams follow different paths on the tree. A node can be an interior node in one tree and
can be a leaf node in another tree as it can be seen from the figure. This structure provides
robustness since the nodes still receive the video packets from another tree after experiencing
parent failure in one tree.
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.2, March 2014
29
Figure 1. An example of a multitree based hybrid overlay network.
These video partitions can be obtained by using Multiple Description Codec (MDC) [26] and
each received description increases the received video quality [27], [28], [29], [30]. However
such systems have longer playback delay when compared to tree based systems. In [23], stable
nodes construct a tree backbone and unstable nodes connect to the system in a mesh structure.
Some hybrid systems utilize cloud or Content Distribution Network (CDN) servers [31], [32],
[33], [34]. The main purpose of implementing a cloud based or CDN based service is to recover
lost packets by retransmission so that higher QoE is obtained. In this work, we propose a hybrid
system that drastically differs from the existing work. The novelty of our system is in its adaptive
communication model implemented. Under normal operation, the system operates under tree-
push model. As the node failure rate goes up, the tree structure adapts into a mesh based system.
The proposed model utilizes the advantages of both tree based and mesh based systems thereby
providing low playback delay and robustness.
Our work here targets a new strategy in which less bandwidth is kept idle while maintaining the
same resilience level. We introduce new heuristics to modify backup parent pool approach
introduced in [12] to maximize resilience of the method of [21]. While [12] repairs the tree with
full capacity channel, the proposed approach of this work constructs a mesh of nodes that is
formed from members of designated backup parent pool of a particular layer of the tree plus the
disconnected node. Therefore, for those sub-trees in which churn has not occurred, the overlay
preserves its tree structure with root being the original source whereas roots of disconnected sub-
trees pull video from respective mesh and those sub-trees are effectively disconnected from the
root. This strategy allows reservation of smaller ratio of bandwidth as backup yet providing
higher resilience.
3. TREE-PUSH BROADCAST WITH MESH-PULL BACKUP
A variation of algorithm of [12] is used to construct the multicast tree. The algorithm considers
variety of factors in attempting to optimize performance. We briefly summarize properties of the
algorithm details of which are beyond the scope of this work. The heuristics of the algorithm of
[12] spend best effort to
i. Maximize average bandwidth from root to individual nodes
ii. Minimize average delay from root to individual nodes
iii. Maximize bandwidth utilization
iv. Maximize resilience
v. Minimize average node depth
The algorithm of [12] constructs backup pools at each layer of the tree in which one or more
nodes are expected reserve some pre-determined portion of its total upload bandwidth for backup.
The packet of stream 1
Dissemination direction of
stream 1 packets
The packet of stream 2
Dissemination direction of
stream 2 packets
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.2, March 2014
30
It has been discussed that the higher (lower) the portion of the bandwidth reserved for backup, the
higher the resilience (the higher the bandwidth utilization).
In this work, we aimed at reducing overhead of this reserving backup approach while maintaining
a comparable resilience. For this purpose, rather than allocating a complete video bandwidth to a
disconnected node, we propose to construct a mesh-pull that is formed from the disconnected
node and the backup set of a particular tree layer. By this way, for a particular node, we avoid
allocating an integral amount of video bandwidth for backup. As a tradeoff the streaming quality
to the disconnected sub-tree may decrease due to delays caused by the mesh-pull.
We will assume that we stream scalable video that consists of a base and an enhancement layer
that are going to be indicated by b and e respectively. Each tree layer will be indicated by l with
l=0 being the layer of the root. All nodes of each tree layer l will reserve some portion of their
total upload bandwidth less than b for backup and they all will take part in backup mesh of tree
layer l. When a node is disconnected from its parent, the algorithm of figure 2 is run in all nodes
to request backup from respective tree layers.
given l, the layer of the node on the broadcast tree
if (reply for request backup from layer l-1)
then join the designated backup mesh;
else if (reply for request backup from layer l-2)
then join the designated backup mesh;
else if (reply for request backup from layer l)
then join the designated backup mesh;
else abort streaming application;
Figure 2. Backup request heuristics
We note that the backup request heuristics solicits backup from backup meshes of three layers in
the vicinity of the disconnected node. The following algorithm runs in backup mesh leaders of all
of the tree layers when a backup request message is received.
if (current backup capacity > b + e )
then grant b+e to the requesting node;
else if (current backup capacity > b )
then grant b to the requesting node;
else if (e being served to any node)
then run “victim selection for e” and grant b
to requesting node;
else run “victim selection for b”
if victim selected
then grant b to requesting node;
else reject request;
Figure 3. Backup allocation heuristics
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.2, March 2014
31
We observe that when there is sufficient bandwidth, the backup allocation algorithm of a
particular tree layer attempts to allocate best video quality. As bandwidth shrinks, the allocation
algorithm attempts to allocate a base video quality with best effort. The following two algorithms
called “victim selection for e” and “victim selection for b” are given in figure 4 and figure 5
respectively. The algorithms determine the criteria on dropping sending enhancement and base
quality videos respectively.
given l, the layer of mesh on the broadcast tree
if (e being served to any orphan at l-2)
then choose an orphan as victim from layer l-2;
else if (e being served to any orphan at l-1)
then choose an orphan as victim from layer l-1;
else if (e being served to any orphan at l)
then choose an orphan as victim from layer l;
else choose the lowest bandwidth-highest delay child as
a victim from layer l-1;
Figure 4. Enhancement victim selection (victim selection for e) algorithm
We note that enhancement victim selection algorithm attempts to drop enhancement from the
lowest layer first. The layers are then scanned to find an enhancement being served. Since the
algorithm is called when e is being served to some node, there will always be a victim selected.
Victim selection for b algorithm also scans the layers starting from the lowest layer served. If the
request node is in a higher layer of tree as compared to a node being served, then request node is
given higher priority. Ultimately, the request node will always find a backup from its own layer
due to its priority.
given l=the layer of mesh on the broadcast tree,
rl=layer of the requesting node
if (rl=l+2)
then reject request;
else if (rl = l+1)
then
if (there exists an orphan in l+2 with b served)
then select orphan as victim;
else reject request;
else if (there exists an orphan in l+2 with b served)
then select orphan as victim;
else if (there exists an orphan in l+1 with b served)
then select orphan as victim;
else if (there exists a child in l+1 with b served)
then choose the lowest bandwidth-highest delay child as
a victim;
else reject request;
Figure 5. Base victim selection (victim selection for b) algorithm
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.2, March 2014
32
(a) Original multicast tree
(b) One of the tree layer 2 nodes fail and its children join the upper layer backup mesh
Figure 6. Outlook of overlay topology
When capacity is allocated in order to supply backup to the requesting node, the node sends the
buffer maps to the set of selected backup parents. Since selected backup parents are always at the
same tree layer according to given heuristics, the playback lag between them is expected to be
small. Thus, for backup requesting node, it is not difficult to schedule chunk requests. Figure 6
demonstrates the outlook of the overlay topology. In figure 6.a, original multicast tree is given
when no failure has occurred yet. We note that every non-leaf node in a particular tree layer acts
as the root of a subtree in regular broadcast operation and acts as a member of the respective
backup mesh simultaneously. Figure 6.b demonstrates the situation when a layer 2 node fails and
two of its children take part in the upper layer mesh and receive packets in a mesh-pull fashion.
4. SIMULATION RESULTS
4.1. Simulation Testbed
In order to measure performance of the proposed algorithm, a network of 500 nodes is
constructed by using GT-ITM module [35]. After creating the network topology, distances, i.e.
round trip time values between nodes are calculated in NS2 environment [36] by using the
shortest physical path between nodes. The tree construction algorithm is then implemented by
considering two different strategies: In the first strategy, tree-push mechanism that involves
repairing tree by re-allocating a full bandwidth channel to each disconnected node is utilized. In
the second strategy, the hybrid backup policy of the proposed method is considered. Both of the
strategies are tested in local simulator which enables running simulations with large amount of
nodes. Comparisons are carried out by examining received bit-rate, network utilization and total
delay from source to destination.
Layer 4
Layer 3
Layer 2
Layer 1
Layer 0
Layer 4
Layer 3
Layer 2
Layer 1
Layer 0
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.2, March 2014
33
0.00
0.20
0.40
0.60
0.80
1.00
1.20
CDF(x<X)
x: Time (in sec)
CDF Graph of Total Delay
Tree with Backup Reservation Hybrid Mesh Tree
Video file used in the experiments are encoded using layered codec and has base layer with 500
Kbps and base plus enhancement layer with 1000 Kbps. The range of the upload bandwidth of the
nodes is between 0 and 2200 Kbps with average being 1200 kbps. The single source node that is
in the root of the tree is assumed to be in the system throughout the streaming period. In tree-push
strategy, each node having surplus upload bandwidth reserves backup capacity that is adequate
for at least on child.
4.2. Comparisons
Figure 7 examines the distribution of total delay from the source to individual nodes. We observe
that delay has considerably reduced in the proposed method due to fact that tree-push reserves a
hefty backup capacity that reduces the number of children connected to a high upload bandwidth
node thereby increasing the average depth of the nodes. The delay from source to destination in
the hybrid system is limited to 3 seconds while this value reaches up to 30 seconds in the tree-
push system.
Figure 7. CDF Graph of Total Delay: From Source to Destination
Table 1. Comparative hop count values.
In Table 1, average and maximum hop count values measured in both systems are given. Hop
count of a node equals to number of nodes on the path between the source and that node. For the
same number of nodes and same distribution of upload capacities of the nodes, tree based system
suffers from the reservation slots and maximum hop count value reaches to 249 while that value
equals to 8 for hybrid mesh tree based system. Hop count values directly affect the delay values
from source to destination. These values clarify the reason of obtained delay values given in
figure 7.
Tree with Backup
Reservation Hybrid Mesh Tree
Average number of
hop counts
124.75 6.99
Maximum hop count 249 8
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.2, March 2014
34
0
0.1
0.2
0.3
0.4
0.5
0.6
0 1 2
Ratioofnodes
The number of children
Tree with Backup
Reservation
Hybrid Mesh Tree
Figure 8. Classification of the nodes according to the number of children.
We also classify the nodes in the system according to their number of children. The ratio of the
number of nodes having no child, one child and two children to the total number of nodes in the
system is given in figure 8. Nearly half of the nodes have one child in tree based system while
less than 5% of the nodes have one child in hybrid mesh tree based system. The main reason is
that the nodes reserve only small part of their upload capacity in hybrid tree based system; hence
most of the nodes have two children if upload capacity is enough to send video at the highest
bitrate. The graph also shows that ratio of the nodes having no child is 30 % in tree based and 50
% in hybrid mesh based systems. Note that considerable number of nodes having no child is free-
riders, i.e. having zero upload capacity for both systems.
To evaluate the performance of the system under different node failure (churn) scenarios, the
nodes are forced to fail with a probability, f, that ranges between 0.1 and 0.6. The failure rates are
classified as low, medium and high according to respective slots of failure probabilities. Figure 9
examines bandwidth utilization at low failure rate. We observe that the proposed method yields
utilization above 70% while tree-push utilization is below 50%.
0
0,1
0,2
0,3
0,4
0,5
0,6
0,7
0,8
1 6 11 16 21 26 31 36 41 46 51 56
Utilization
Time (in minute)
UtilizationatLow FailureRate
Tree with Backup Reservation, f=0.1 HybridMesh Tree, f=0.1
Tree with Backup Reservation, f=0.2 HybridMesh Tree, f=0.2
Figure 9. CDF Graph of bandwidth utilization for low failure
Utilization at medium and high failure rates are given in figure 10 and figure 11, respectively. We
observe that the proposed method is still superior to tree-push strategy. Utilization decreases
while failure rate increases since the number of nodes having no child also increases. In Table 2,
the received bit-rate for nodes in the proposed system is given according to node failure rate.
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.2, March 2014
35
There is no disconnected node even if the node failure rate is high. The received bit-rate for tree-
push system is 1000 Kbps for almost all nodes since nodes experiencing parent failure can receive
video at the highest bit-rate when it is connected to a backup parent.
0
0,1
0,2
0,3
0,4
0,5
0,6
1 6 11 16 21 26 31 36 41 46 51 56
Utilization
Time (in minute)
UtilizationatMediumFailure Rate
Tree with Backup Reservation, f=0.3 Hybrid Mesh Tree, f=0.3
Tree with Backup Reservation, f=0.4 Hybrid Mesh Tree, f=0.4
Figure 10. CDF Graph of bandwidth utilization for medium failure
0
0,1
0,2
0,3
0,4
0,5
0,6
1 6 11 16 21 26 31 36 41 46 51 56
Utilization
Time (in minute)
UtilizationatHighFailure Rate
Tree with Backup Reservation, f=0.5 Hybrid Mesh Tree, f=0.5
Tree with Backup Reservation, f=0.6 Hybrid Mesh Tree, f=0.6
Figure 11. CDF Graph of bandwidth utilization for high failure
Table 2. Percentage of nodes according to the received bitrate.
Failure
Probability
Received Bitrate
<500 Kbps 500 Kbps 1000 Kbps
f=0.1 - 28% 72%
f=0.2 - 30% 70%
f=0.3 - 68% 32%
f=0.4 - 57% 43%
f=0.5 - 39% 61%
f=0.6 - 25% 75%
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.2, March 2014
36
4. CONCLUSIONS
In this work, we proposed a hybrid mechanism to exploit the efficiency of both tree-push and
mesh-pull methods. If churn is low, then tree-push dominates the multicast and obtains high
utilization of bandwidth due to a fraction of a channel bandwidth allocated for backup. If churn is
high, then mesh-pull dominates the overall mechanism. Simulations are carried out to compare
bandwidth utilization in tree-push only and proposed hybrid method and it has been observed that
the proposed method yields much better utilization of bandwidth.
This system can be improved and re-designed in order to stream MDC or Multiview coded video.
In the future, we plan to stream Multiview coded video over our hybrid network. Multiview
coded video may also have scalable layers; hence by implementing similar backup pool strategy,
this system can be used to stream 3D data.
REFERENCES
[1] Birrer, S. & Bustamante, F.E., (2007) “A Comparison of Resilient Overlay Multicast
Approaches”, IEEE J. on Sel. Areas in Communications, Vol. 25, pp1695-1705.
[2] Zhang, X., Liu, J., Li, B. and Yum, Y., (2005) “CoolStreaming/DONet: A Data-driven Overlay
Network for Peer-to-peer Live Media Streaming, IEEE INFOCOM.
[3] PPLive. http://www.pplive.com
[4] PPstream http://www.pps.tv/en/
[5] Banerjee, S., Bhattacharjee B. and Kommareddy, C., (2002) “Scalable Application Layer
Multicast”, ACM SIGCOMM, USA.[6] Liao, X., Jin, H., Liu, Y., Ni, L.M. and Deng, D.,
(2006) “AnySee: Peer-to- Peer Live Streaming”, IEEE INFOCOM.
[7] Magharei N. & Rejaie, R. (2007) “PRIME: Peer-to-Peer Receiver-Driven Mesh-Based
Streaming,” IEEE INFOCOM.
[8] Kumar, R., Liu, Y. and Ross, K., (2007) “Stochastic Fluid Theory for P2P Streaming Systems,”
IEEE INFOCOM.
[9] Sianati, A., Abbaspour, M. and Norouzi, M. (2011) “Head-tail Video Streaming Over Peer to Peer
Systems”, International Journal of Computer Networks & Communications (IJCNC), Vol. 3, No.
2, pp.68-81.
[10] Jeon, H., Son, S.C. and Nam, J.S., (2008) “Overlay Multicast Tree Recovery Scheme Using a
Proactive Approach”, Elsevier Computer Commun., Vol. 31, pp3163-3168.
[11] Fei, Z. & Yang, M., (2007) “A Proactive Tree Recovery Mechanism for Resilient Overlay
Multicast”, IEEE/ACM Trans Networking, Vol. 15, 2007.
[12] Sayıt, M.F., Tunalı, E.T. and Tekalp, A.M., (2012) “Resilient Peer-to-peer Streaming of Scalable
Video Over Hierarchical Multicast Trees with Backup Parent Pools”, Elsevier Signal Processing:
Image Communication, Vol. 27, pp113-125.
[13] Hei, X. Liang, J. Liang, J. Liu, Y., Ross, K.W. (2007) “A Measurement Study of a Large-Scale
P2P IPTV System”, IEEE Trans. On Multimedia, Vol. 9, No. 8, pp1672-1687.
[14] Jin, X., Yiu, W.P.K., Chan, S.H.G. and Wang, Y., (2007) “On Maximizing Tree Bandwidth For
Topology-Aware Peer-To-Peer Streaming”, IEEE Trans. on Multimedia, Vol. 9, pp1580-1592.
[15] Kim, E., Jang, J., Park, S., Sussman, A. and Yoo, J.S., (2006) “Improving Resiliency Using
Capacity-Aware Multicast Tree In P2P Streaming Environments”, High Perf. Computing and
Communications, pp. 925-934.
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.2, March 2014
37
[16] Birrer S. & Bustamante, F.E., (2005) “Resilient Peer-To-Peer Multicast Without The Cost”,
Multimeda Computing and Netw. Conference.
[17] Kusumoto, T., Kunichika, Y., Katto, J. and Okubo, S., (2005) “Tree-based Application Layer
Multicast Using Proactive Route Maintenance And Its Implementation”, ACM workshop on Adv
in Peer-To-Peer Multimed Str., pp49-58.
[18] Tran, D.A., Hua, K.A., and Do, T.T., (2004) “A Peer-to-Peer Architecture for Media Streaming”,
IEEE Journal on Selected Areas in Communications, Vol. 22, No. 1, pp121-133.
[19] Banerjee, S., Lee, S., Bhattacharjee, B. and Srinivasan, A., (2006) “Resilient Multicast Using
Overlay”, IEEE/ACM Trans. Networking, Vol. 14, pp237-248.
[20] Okada, Y., Oguro, M., Katto, J. and Okubo, S., (2005) “A New Approach For The Construction
Of ALM Trees Using Layered Video Coding”, ACM workshop on Adv. in Peer-To-Peer
Multimed Str., pp59 - 68.
[21] Sayit, M. F.. Tunali, E. T and Tekalp, A. M. (2009) “Bandwidth-aware Multiple Multicast Tree
Formation for P2P Scalable Video Streaming Using Hierarchical Clusters”, Proc. of IEEE ICIP,
Egypt, pp945-948
[22] Li, B., Xie, S., Qu, Y., Keung, G.Y., Lin, C., Liu, J., Zhang, X., (2008) “Inside the New
Coolstreaming: principles, measurements and performance ımplications”, Proceedings of 27th
IEEE Conference on Computer Communications, pp1031 - 1039.
[23] Wang, F., Xiong, Y. and Liu, J., (2010) “mTreebone: A Collaborative Tree-Mesh Overlay
Network for Multicast Video Streaming,” IEEE Trans. Parallel and Distributed Systems, Vol. 21,
No. 3, pp379-392.
[24] Castro, M., Druschel, P., Kermarrec, A., Nandi, A., Rowstron, A. and Singh, A., (2003)
“SplitStream: High-Bandwidth Multicast in Cooperative Environments,” Proc. 19th ACM Symp.
Operating Systems Principles (SOSP), pp298-313.
[25] Noh J. & Girod, B., (2012) “Time-Shifted Streaming in a Tree-Based Peer-to-Peer System,”
Journal of Communications, Vol. 7, No. 3, pp202-212.
[26] Goyal, V.K., (2001) “Multiple Description Coding: Compression Meets the Network”, IEEE
Signal Processing Magazine, Vol. 18, No. 5, pp74-94.
[27] Liu, Z. Shen, Y. Ross, K., Panwar, S., Wang, Y., (2007) “P2P Video Live Streaming with MDC:
Providing Incentives for Redistribution”, IEEE ICME.
[28] Magharei, N. & Rejaie, R., (2006) “Understanding Mesh-Based Peer-to-Peer Streaming”,
International Workshop on Network and Operating System Support for Digital Audio and Video.
[29] Padmanabhan, V.N., Wang, H.J. and Chou, P.A., (2003) “Resilient Peer to Peer Streaming”, Proc.
IEEE International Conference on Network Protocols, pp16-27.
[30] Favalli, L., Folli, M., Lombardo, A., Reforgiato, D., Schembra, G., (2011) “A P2P Platform for
Real-Time Multicast Video Streaming Leveraging on Scalable Multiple Descriptions to Cope with
Bandwidth Fluctuations”, International Journal of Computer Networks & Communications
(IJCNC) Vol.3, No.6, pp71-94.
[31] Yin, H., Liu, X., Zhan, T., Sekar, V., Qiu, F., Lin, C., Zhang, H., Li, B., (2010) “LiveSky:
Enhancing CDN with P2P”, ACM Transactions on Multimedia Computing, Communications, and
Applications (TOMCCAP), Vol. 6, No. 3.
[32] Payberah, A. H., Kavalionak, H., Kumaresan, V., Montresor, A., Haridi, S., (2012) “CLive: cloud-
assisted P2P live streaming”, Proceedings of IEEE 12th International Conference Peer-to-Peer
Computing (P2P), pp79 – 90.
[33] Lu, Z., Wang, Y. and Yang, Y.R., (2012) “An Analysis and Comparison of CDN-P2P hybrid
Content Delivery System and Model, Journal Of Communications, Vol. 7, No. 3.
[34] Rocha, M.V.M. & Rodrigueson, C.K.S., (2013) “Client’s Interactive Behaviour to Design Peer
Selection Policies for Bittorrent-Like Protocols”, International Journal of Computer Networks &
Communications Vol.5, No.5, pp141-159.
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.2, March 2014
38
[35] “GT-ITM”, http://www.cc.gatech.edu/projects/gtitm/
[36] “Network Simulator (NS2)”, http://www.isi.edu/nsnam/ns/
Authors
Muge Sayit
Muge Sayit is an Assistant Professor at International Computer Institute in Ege University
in Turkey. She received a Master of Science degree in 2005 and PhD degree in 2011 in
Information Technologies from the same institute and a degree in Mathematics from Ege
University in 1999. Her research interests include P2P networks, live streaming, video-
on-demand and distributed systems.
Turhan Tunalı
Turhan Tunalı earned a BSc degree in Electrical Engineering from Middle East Technical
University and MSc Degree in Applied Statistics from Ege University, both in Turkey. He
then earned a DSc Degree in Systems Science and Mathematics from Washington
University in St. Louis, USA in 1985. After his doctorate study, he joined Computer
Engineering Department of Ege University as an assistant professor where he became an
associate professor in 1988. During the period of 1992–1994, he worked in Department of
Computer Technology of Nanyang Technological University of Singapore as a Visiting Senior Fellow.
He then joined International Computer Institute of Ege University as a Professor where he was the
director. In the period of 2000–2001 he worked in Department of Computer Science of Loyola University
of Chicago as a Visiting Professor.He is currently working as a Professor at Department of Computer
Engineering of Izmir University of Economics. His current research interests include adaptive video
streaming and Internet performance measurements. Dr. Tunali is a member of the IEEE.

More Related Content

What's hot

F0963440
F0963440F0963440
F0963440
IOSR Journals
 
Real Power Loss Reduction in Distribution Systems Using Ant Colony Optimizati...
Real Power Loss Reduction in Distribution Systems Using Ant Colony Optimizati...Real Power Loss Reduction in Distribution Systems Using Ant Colony Optimizati...
Real Power Loss Reduction in Distribution Systems Using Ant Colony Optimizati...
IJMER
 
(Paper) P2P VIDEO BROADCAST BASED ON PER-PEER TRANSCODING AND ITS EVALUATION ...
(Paper) P2P VIDEO BROADCAST BASED ON PER-PEER TRANSCODING AND ITS EVALUATION ...(Paper) P2P VIDEO BROADCAST BASED ON PER-PEER TRANSCODING AND ITS EVALUATION ...
(Paper) P2P VIDEO BROADCAST BASED ON PER-PEER TRANSCODING AND ITS EVALUATION ...
Naoki Shibata
 
An efficient tree based self-organizing protocol for internet of things
An efficient tree based self-organizing protocol for internet of thingsAn efficient tree based self-organizing protocol for internet of things
An efficient tree based self-organizing protocol for internet of things
redpel dot com
 
WEIGHTED DYNAMIC DISTRIBUTED CLUSTERING PROTOCOL FOR HETEROGENEOUS WIRELESS S...
WEIGHTED DYNAMIC DISTRIBUTED CLUSTERING PROTOCOL FOR HETEROGENEOUS WIRELESS S...WEIGHTED DYNAMIC DISTRIBUTED CLUSTERING PROTOCOL FOR HETEROGENEOUS WIRELESS S...
WEIGHTED DYNAMIC DISTRIBUTED CLUSTERING PROTOCOL FOR HETEROGENEOUS WIRELESS S...
ijwmn
 
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET Journal
 
Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for He...
Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for He...Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for He...
Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for He...
chokrio
 
Routing management for mobile ad hoc networks
Routing management for mobile ad hoc networksRouting management for mobile ad hoc networks
Routing management for mobile ad hoc networksIAEME Publication
 
An Improved Deterministic Energy Efficient Clustering Protocol for Wireless S...
An Improved Deterministic Energy Efficient Clustering Protocol for Wireless S...An Improved Deterministic Energy Efficient Clustering Protocol for Wireless S...
An Improved Deterministic Energy Efficient Clustering Protocol for Wireless S...
IJERA Editor
 
Storage Over SONET
Storage Over SONETStorage Over SONET
Storage Over SONET
alexmlopez
 
tankala srinivas, palasa
tankala srinivas, palasatankala srinivas, palasa
tankala srinivas, palasa
shiva782
 
Hybrid Approach for Robust Digital Video Watermarking
Hybrid Approach for Robust Digital Video WatermarkingHybrid Approach for Robust Digital Video Watermarking
Hybrid Approach for Robust Digital Video Watermarking
IJSRD
 
Chapter 5
Chapter 5Chapter 5
Chapter 5asguna
 
Efficient multicast delivery for data redundancy minimization
Efficient multicast delivery for data redundancy minimizationEfficient multicast delivery for data redundancy minimization
Efficient multicast delivery for data redundancy minimization
Jayakrishnan U
 
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
cscpconf
 
Optimal Transmit Power and Packet Size in Wireless Sensor Networks in Shadowe...
Optimal Transmit Power and Packet Size in Wireless Sensor Networks in Shadowe...Optimal Transmit Power and Packet Size in Wireless Sensor Networks in Shadowe...
Optimal Transmit Power and Packet Size in Wireless Sensor Networks in Shadowe...
IDES Editor
 
C vple xfamily_faqs-d
C vple xfamily_faqs-dC vple xfamily_faqs-d
C vple xfamily_faqs-d
Walsingham1568
 

What's hot (20)

F0963440
F0963440F0963440
F0963440
 
Real Power Loss Reduction in Distribution Systems Using Ant Colony Optimizati...
Real Power Loss Reduction in Distribution Systems Using Ant Colony Optimizati...Real Power Loss Reduction in Distribution Systems Using Ant Colony Optimizati...
Real Power Loss Reduction in Distribution Systems Using Ant Colony Optimizati...
 
(Paper) P2P VIDEO BROADCAST BASED ON PER-PEER TRANSCODING AND ITS EVALUATION ...
(Paper) P2P VIDEO BROADCAST BASED ON PER-PEER TRANSCODING AND ITS EVALUATION ...(Paper) P2P VIDEO BROADCAST BASED ON PER-PEER TRANSCODING AND ITS EVALUATION ...
(Paper) P2P VIDEO BROADCAST BASED ON PER-PEER TRANSCODING AND ITS EVALUATION ...
 
An efficient tree based self-organizing protocol for internet of things
An efficient tree based self-organizing protocol for internet of thingsAn efficient tree based self-organizing protocol for internet of things
An efficient tree based self-organizing protocol for internet of things
 
WEIGHTED DYNAMIC DISTRIBUTED CLUSTERING PROTOCOL FOR HETEROGENEOUS WIRELESS S...
WEIGHTED DYNAMIC DISTRIBUTED CLUSTERING PROTOCOL FOR HETEROGENEOUS WIRELESS S...WEIGHTED DYNAMIC DISTRIBUTED CLUSTERING PROTOCOL FOR HETEROGENEOUS WIRELESS S...
WEIGHTED DYNAMIC DISTRIBUTED CLUSTERING PROTOCOL FOR HETEROGENEOUS WIRELESS S...
 
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...
 
Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for He...
Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for He...Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for He...
Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for He...
 
Swiss National Supercomputing Center
Swiss National Supercomputing CenterSwiss National Supercomputing Center
Swiss National Supercomputing Center
 
46 138-1-pb
46 138-1-pb46 138-1-pb
46 138-1-pb
 
Routing management for mobile ad hoc networks
Routing management for mobile ad hoc networksRouting management for mobile ad hoc networks
Routing management for mobile ad hoc networks
 
An Improved Deterministic Energy Efficient Clustering Protocol for Wireless S...
An Improved Deterministic Energy Efficient Clustering Protocol for Wireless S...An Improved Deterministic Energy Efficient Clustering Protocol for Wireless S...
An Improved Deterministic Energy Efficient Clustering Protocol for Wireless S...
 
92 97
92 9792 97
92 97
 
Storage Over SONET
Storage Over SONETStorage Over SONET
Storage Over SONET
 
tankala srinivas, palasa
tankala srinivas, palasatankala srinivas, palasa
tankala srinivas, palasa
 
Hybrid Approach for Robust Digital Video Watermarking
Hybrid Approach for Robust Digital Video WatermarkingHybrid Approach for Robust Digital Video Watermarking
Hybrid Approach for Robust Digital Video Watermarking
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Efficient multicast delivery for data redundancy minimization
Efficient multicast delivery for data redundancy minimizationEfficient multicast delivery for data redundancy minimization
Efficient multicast delivery for data redundancy minimization
 
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
 
Optimal Transmit Power and Packet Size in Wireless Sensor Networks in Shadowe...
Optimal Transmit Power and Packet Size in Wireless Sensor Networks in Shadowe...Optimal Transmit Power and Packet Size in Wireless Sensor Networks in Shadowe...
Optimal Transmit Power and Packet Size in Wireless Sensor Networks in Shadowe...
 
C vple xfamily_faqs-d
C vple xfamily_faqs-dC vple xfamily_faqs-d
C vple xfamily_faqs-d
 

Viewers also liked

Centrality-Based Network Coder Placement For Peer-To-Peer Content Distribution
Centrality-Based Network Coder Placement For Peer-To-Peer Content DistributionCentrality-Based Network Coder Placement For Peer-To-Peer Content Distribution
Centrality-Based Network Coder Placement For Peer-To-Peer Content Distribution
IJCNCJournal
 
STUDY THE EFFECT OF PARAMETERS TO LOAD BALANCING IN CLOUD COMPUTING
STUDY THE EFFECT OF PARAMETERS TO LOAD BALANCING IN CLOUD COMPUTINGSTUDY THE EFFECT OF PARAMETERS TO LOAD BALANCING IN CLOUD COMPUTING
STUDY THE EFFECT OF PARAMETERS TO LOAD BALANCING IN CLOUD COMPUTING
IJCNCJournal
 
Probability Density Functions of the Packet Length for Computer Networks With...
Probability Density Functions of the Packet Length for Computer Networks With...Probability Density Functions of the Packet Length for Computer Networks With...
Probability Density Functions of the Packet Length for Computer Networks With...
IJCNCJournal
 
Analytical Modelling of Localized P2P Streaming Systems under NAT Consideration
Analytical Modelling of Localized P2P Streaming Systems under NAT ConsiderationAnalytical Modelling of Localized P2P Streaming Systems under NAT Consideration
Analytical Modelling of Localized P2P Streaming Systems under NAT Consideration
IJCNCJournal
 
Ijcnc050207
Ijcnc050207Ijcnc050207
Ijcnc050207
IJCNCJournal
 
Ijcnc050205
Ijcnc050205Ijcnc050205
Ijcnc050205
IJCNCJournal
 
Ijcnc050203
Ijcnc050203Ijcnc050203
Ijcnc050203
IJCNCJournal
 
A FRAMEWORK FOR SOFTWARE-AS-A-SERVICE SELECTION AND PROVISIONING
A FRAMEWORK FOR SOFTWARE-AS-A-SERVICE SELECTION AND PROVISIONINGA FRAMEWORK FOR SOFTWARE-AS-A-SERVICE SELECTION AND PROVISIONING
A FRAMEWORK FOR SOFTWARE-AS-A-SERVICE SELECTION AND PROVISIONING
IJCNCJournal
 
Ijcnc050213
Ijcnc050213Ijcnc050213
Ijcnc050213
IJCNCJournal
 
Performance comparison of aodv and olsr using 802.11 a and dsrc (802.11p) pro...
Performance comparison of aodv and olsr using 802.11 a and dsrc (802.11p) pro...Performance comparison of aodv and olsr using 802.11 a and dsrc (802.11p) pro...
Performance comparison of aodv and olsr using 802.11 a and dsrc (802.11p) pro...
IJCNCJournal
 
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)The Extended Clustering Ad Hoc Routing Protocol (Ecrp)
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)
IJCNCJournal
 
Ijcnc050204
Ijcnc050204Ijcnc050204
Ijcnc050204
IJCNCJournal
 
Qos group based optimal retransmission medium access protocol for wireless se...
Qos group based optimal retransmission medium access protocol for wireless se...Qos group based optimal retransmission medium access protocol for wireless se...
Qos group based optimal retransmission medium access protocol for wireless se...
IJCNCJournal
 
Analysis of Hierarchical Scheduling for Heterogeneous Traffic over Network
Analysis  of  Hierarchical  Scheduling for Heterogeneous Traffic over NetworkAnalysis  of  Hierarchical  Scheduling for Heterogeneous Traffic over Network
Analysis of Hierarchical Scheduling for Heterogeneous Traffic over Network
IJCNCJournal
 
A Compact Dual Band Dielectric Resonator Antenna For Wireless Applications
A Compact Dual Band Dielectric Resonator Antenna For Wireless ApplicationsA Compact Dual Band Dielectric Resonator Antenna For Wireless Applications
A Compact Dual Band Dielectric Resonator Antenna For Wireless Applications
IJCNCJournal
 
Reducing the Peak to Average Power Ratio of Mimo-Ofdm Systems
Reducing the Peak to Average Power Ratio of Mimo-Ofdm SystemsReducing the Peak to Average Power Ratio of Mimo-Ofdm Systems
Reducing the Peak to Average Power Ratio of Mimo-Ofdm Systems
IJCNCJournal
 
A multi tenant platform for sms integrated services
A multi tenant platform for sms integrated servicesA multi tenant platform for sms integrated services
A multi tenant platform for sms integrated services
IJCNCJournal
 
Enhanced aodv route discovery and route establishment for qos provision for r...
Enhanced aodv route discovery and route establishment for qos provision for r...Enhanced aodv route discovery and route establishment for qos provision for r...
Enhanced aodv route discovery and route establishment for qos provision for r...
IJCNCJournal
 
A Wavelength and Converter Assignment Scheme Using Converter Usage History in...
A Wavelength and Converter Assignment Scheme Using Converter Usage History in...A Wavelength and Converter Assignment Scheme Using Converter Usage History in...
A Wavelength and Converter Assignment Scheme Using Converter Usage History in...
IJCNCJournal
 

Viewers also liked (19)

Centrality-Based Network Coder Placement For Peer-To-Peer Content Distribution
Centrality-Based Network Coder Placement For Peer-To-Peer Content DistributionCentrality-Based Network Coder Placement For Peer-To-Peer Content Distribution
Centrality-Based Network Coder Placement For Peer-To-Peer Content Distribution
 
STUDY THE EFFECT OF PARAMETERS TO LOAD BALANCING IN CLOUD COMPUTING
STUDY THE EFFECT OF PARAMETERS TO LOAD BALANCING IN CLOUD COMPUTINGSTUDY THE EFFECT OF PARAMETERS TO LOAD BALANCING IN CLOUD COMPUTING
STUDY THE EFFECT OF PARAMETERS TO LOAD BALANCING IN CLOUD COMPUTING
 
Probability Density Functions of the Packet Length for Computer Networks With...
Probability Density Functions of the Packet Length for Computer Networks With...Probability Density Functions of the Packet Length for Computer Networks With...
Probability Density Functions of the Packet Length for Computer Networks With...
 
Analytical Modelling of Localized P2P Streaming Systems under NAT Consideration
Analytical Modelling of Localized P2P Streaming Systems under NAT ConsiderationAnalytical Modelling of Localized P2P Streaming Systems under NAT Consideration
Analytical Modelling of Localized P2P Streaming Systems under NAT Consideration
 
Ijcnc050207
Ijcnc050207Ijcnc050207
Ijcnc050207
 
Ijcnc050205
Ijcnc050205Ijcnc050205
Ijcnc050205
 
Ijcnc050203
Ijcnc050203Ijcnc050203
Ijcnc050203
 
A FRAMEWORK FOR SOFTWARE-AS-A-SERVICE SELECTION AND PROVISIONING
A FRAMEWORK FOR SOFTWARE-AS-A-SERVICE SELECTION AND PROVISIONINGA FRAMEWORK FOR SOFTWARE-AS-A-SERVICE SELECTION AND PROVISIONING
A FRAMEWORK FOR SOFTWARE-AS-A-SERVICE SELECTION AND PROVISIONING
 
Ijcnc050213
Ijcnc050213Ijcnc050213
Ijcnc050213
 
Performance comparison of aodv and olsr using 802.11 a and dsrc (802.11p) pro...
Performance comparison of aodv and olsr using 802.11 a and dsrc (802.11p) pro...Performance comparison of aodv and olsr using 802.11 a and dsrc (802.11p) pro...
Performance comparison of aodv and olsr using 802.11 a and dsrc (802.11p) pro...
 
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)The Extended Clustering Ad Hoc Routing Protocol (Ecrp)
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)
 
Ijcnc050204
Ijcnc050204Ijcnc050204
Ijcnc050204
 
Qos group based optimal retransmission medium access protocol for wireless se...
Qos group based optimal retransmission medium access protocol for wireless se...Qos group based optimal retransmission medium access protocol for wireless se...
Qos group based optimal retransmission medium access protocol for wireless se...
 
Analysis of Hierarchical Scheduling for Heterogeneous Traffic over Network
Analysis  of  Hierarchical  Scheduling for Heterogeneous Traffic over NetworkAnalysis  of  Hierarchical  Scheduling for Heterogeneous Traffic over Network
Analysis of Hierarchical Scheduling for Heterogeneous Traffic over Network
 
A Compact Dual Band Dielectric Resonator Antenna For Wireless Applications
A Compact Dual Band Dielectric Resonator Antenna For Wireless ApplicationsA Compact Dual Band Dielectric Resonator Antenna For Wireless Applications
A Compact Dual Band Dielectric Resonator Antenna For Wireless Applications
 
Reducing the Peak to Average Power Ratio of Mimo-Ofdm Systems
Reducing the Peak to Average Power Ratio of Mimo-Ofdm SystemsReducing the Peak to Average Power Ratio of Mimo-Ofdm Systems
Reducing the Peak to Average Power Ratio of Mimo-Ofdm Systems
 
A multi tenant platform for sms integrated services
A multi tenant platform for sms integrated servicesA multi tenant platform for sms integrated services
A multi tenant platform for sms integrated services
 
Enhanced aodv route discovery and route establishment for qos provision for r...
Enhanced aodv route discovery and route establishment for qos provision for r...Enhanced aodv route discovery and route establishment for qos provision for r...
Enhanced aodv route discovery and route establishment for qos provision for r...
 
A Wavelength and Converter Assignment Scheme Using Converter Usage History in...
A Wavelength and Converter Assignment Scheme Using Converter Usage History in...A Wavelength and Converter Assignment Scheme Using Converter Usage History in...
A Wavelength and Converter Assignment Scheme Using Converter Usage History in...
 

Similar to Mesh pull backup parent pools for video-on-demand multicast trees

ICICCE0298
ICICCE0298ICICCE0298
ICICCE0298
IJTET Journal
 
A hybrid push pull overlay network for
A hybrid push pull overlay network forA hybrid push pull overlay network for
A hybrid push pull overlay network for
ijp2p
 
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMING
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMINGA HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMING
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMING
ijp2p
 
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMING
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMINGA HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMING
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMING
ijp2p
 
Designing a Fault-Tolerant Channel Extension Network for Internal Recovery
Designing a Fault-Tolerant Channel Extension Network for Internal RecoveryDesigning a Fault-Tolerant Channel Extension Network for Internal Recovery
Designing a Fault-Tolerant Channel Extension Network for Internal Recovery
icu812
 
QoS Framework for a Multi-stack based Heterogeneous Wireless Sensor Network
QoS Framework for a Multi-stack based Heterogeneous Wireless Sensor Network QoS Framework for a Multi-stack based Heterogeneous Wireless Sensor Network
QoS Framework for a Multi-stack based Heterogeneous Wireless Sensor Network
IJECEIAES
 
Benefit based data caching in ad hoc networks (synopsis)
Benefit based data caching in ad hoc networks (synopsis)Benefit based data caching in ad hoc networks (synopsis)
Benefit based data caching in ad hoc networks (synopsis)Mumbai Academisc
 
Survey on caching and replication algorithm for content distribution in peer ...
Survey on caching and replication algorithm for content distribution in peer ...Survey on caching and replication algorithm for content distribution in peer ...
Survey on caching and replication algorithm for content distribution in peer ...
ijcseit
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...
ijcseit
 
Content aware p2 p video streaming with lowlatency
Content aware p2 p video streaming with lowlatencyContent aware p2 p video streaming with lowlatency
Content aware p2 p video streaming with lowlatency
xiaoran815
 
IRJET- Improving Data Availability by using VPC Strategy in Cloud Environ...
IRJET-  	  Improving Data Availability by using VPC Strategy in Cloud Environ...IRJET-  	  Improving Data Availability by using VPC Strategy in Cloud Environ...
IRJET- Improving Data Availability by using VPC Strategy in Cloud Environ...
IRJET Journal
 
An Efficient Resource Utilization Scheme for Video Transmission over Wireless...
An Efficient Resource Utilization Scheme for Video Transmission over Wireless...An Efficient Resource Utilization Scheme for Video Transmission over Wireless...
An Efficient Resource Utilization Scheme for Video Transmission over Wireless...
ijsrd.com
 
A scheme for maximal resource
A scheme for maximal resourceA scheme for maximal resource
A scheme for maximal resource
IJCNCJournal
 
QOS - LIQUIDSTREAM: SCALABLE MONITORING AND BANDWIDTH CONTROL IN PEER TO PEER...
QOS - LIQUIDSTREAM: SCALABLE MONITORING AND BANDWIDTH CONTROL IN PEER TO PEER...QOS - LIQUIDSTREAM: SCALABLE MONITORING AND BANDWIDTH CONTROL IN PEER TO PEER...
QOS - LIQUIDSTREAM: SCALABLE MONITORING AND BANDWIDTH CONTROL IN PEER TO PEER...
ijp2p
 
QOS - LIQUIDSTREAM: SCALABLE MONITORING AND BANDWIDTH CONTROL IN PEER TO PEER...
QOS - LIQUIDSTREAM: SCALABLE MONITORING AND BANDWIDTH CONTROL IN PEER TO PEER...QOS - LIQUIDSTREAM: SCALABLE MONITORING AND BANDWIDTH CONTROL IN PEER TO PEER...
QOS - LIQUIDSTREAM: SCALABLE MONITORING AND BANDWIDTH CONTROL IN PEER TO PEER...
ijp2p
 
CONTENT BASED VIDEO CATEGORIZATION USING RELATIONAL CLUSTERING WITH LOCAL SCA...
CONTENT BASED VIDEO CATEGORIZATION USING RELATIONAL CLUSTERING WITH LOCAL SCA...CONTENT BASED VIDEO CATEGORIZATION USING RELATIONAL CLUSTERING WITH LOCAL SCA...
CONTENT BASED VIDEO CATEGORIZATION USING RELATIONAL CLUSTERING WITH LOCAL SCA...
ijcsit
 
MULTIPATH BROADCAST AND GOSSIP BASED APPROACH FOR VIDEO CIRCULATION
MULTIPATH BROADCAST AND GOSSIP BASED APPROACH FOR VIDEO CIRCULATIONMULTIPATH BROADCAST AND GOSSIP BASED APPROACH FOR VIDEO CIRCULATION
MULTIPATH BROADCAST AND GOSSIP BASED APPROACH FOR VIDEO CIRCULATION
Association of Scientists, Developers and Faculties
 

Similar to Mesh pull backup parent pools for video-on-demand multicast trees (20)

ICICCE0298
ICICCE0298ICICCE0298
ICICCE0298
 
A hybrid push pull overlay network for
A hybrid push pull overlay network forA hybrid push pull overlay network for
A hybrid push pull overlay network for
 
sac10serviso
sac10servisosac10serviso
sac10serviso
 
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMING
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMINGA HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMING
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMING
 
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMING
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMINGA HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMING
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMING
 
Designing a Fault-Tolerant Channel Extension Network for Internal Recovery
Designing a Fault-Tolerant Channel Extension Network for Internal RecoveryDesigning a Fault-Tolerant Channel Extension Network for Internal Recovery
Designing a Fault-Tolerant Channel Extension Network for Internal Recovery
 
QoS Framework for a Multi-stack based Heterogeneous Wireless Sensor Network
QoS Framework for a Multi-stack based Heterogeneous Wireless Sensor Network QoS Framework for a Multi-stack based Heterogeneous Wireless Sensor Network
QoS Framework for a Multi-stack based Heterogeneous Wireless Sensor Network
 
Benefit based data caching in ad hoc networks (synopsis)
Benefit based data caching in ad hoc networks (synopsis)Benefit based data caching in ad hoc networks (synopsis)
Benefit based data caching in ad hoc networks (synopsis)
 
Survey on caching and replication algorithm for content distribution in peer ...
Survey on caching and replication algorithm for content distribution in peer ...Survey on caching and replication algorithm for content distribution in peer ...
Survey on caching and replication algorithm for content distribution in peer ...
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...
 
Content aware p2 p video streaming with lowlatency
Content aware p2 p video streaming with lowlatencyContent aware p2 p video streaming with lowlatency
Content aware p2 p video streaming with lowlatency
 
shashank_spdp1993_00395543
shashank_spdp1993_00395543shashank_spdp1993_00395543
shashank_spdp1993_00395543
 
IRJET- Improving Data Availability by using VPC Strategy in Cloud Environ...
IRJET-  	  Improving Data Availability by using VPC Strategy in Cloud Environ...IRJET-  	  Improving Data Availability by using VPC Strategy in Cloud Environ...
IRJET- Improving Data Availability by using VPC Strategy in Cloud Environ...
 
An Efficient Resource Utilization Scheme for Video Transmission over Wireless...
An Efficient Resource Utilization Scheme for Video Transmission over Wireless...An Efficient Resource Utilization Scheme for Video Transmission over Wireless...
An Efficient Resource Utilization Scheme for Video Transmission over Wireless...
 
A scheme for maximal resource
A scheme for maximal resourceA scheme for maximal resource
A scheme for maximal resource
 
QOS - LIQUIDSTREAM: SCALABLE MONITORING AND BANDWIDTH CONTROL IN PEER TO PEER...
QOS - LIQUIDSTREAM: SCALABLE MONITORING AND BANDWIDTH CONTROL IN PEER TO PEER...QOS - LIQUIDSTREAM: SCALABLE MONITORING AND BANDWIDTH CONTROL IN PEER TO PEER...
QOS - LIQUIDSTREAM: SCALABLE MONITORING AND BANDWIDTH CONTROL IN PEER TO PEER...
 
QOS - LIQUIDSTREAM: SCALABLE MONITORING AND BANDWIDTH CONTROL IN PEER TO PEER...
QOS - LIQUIDSTREAM: SCALABLE MONITORING AND BANDWIDTH CONTROL IN PEER TO PEER...QOS - LIQUIDSTREAM: SCALABLE MONITORING AND BANDWIDTH CONTROL IN PEER TO PEER...
QOS - LIQUIDSTREAM: SCALABLE MONITORING AND BANDWIDTH CONTROL IN PEER TO PEER...
 
CONTENT BASED VIDEO CATEGORIZATION USING RELATIONAL CLUSTERING WITH LOCAL SCA...
CONTENT BASED VIDEO CATEGORIZATION USING RELATIONAL CLUSTERING WITH LOCAL SCA...CONTENT BASED VIDEO CATEGORIZATION USING RELATIONAL CLUSTERING WITH LOCAL SCA...
CONTENT BASED VIDEO CATEGORIZATION USING RELATIONAL CLUSTERING WITH LOCAL SCA...
 
MULTIPATH BROADCAST AND GOSSIP BASED APPROACH FOR VIDEO CIRCULATION
MULTIPATH BROADCAST AND GOSSIP BASED APPROACH FOR VIDEO CIRCULATIONMULTIPATH BROADCAST AND GOSSIP BASED APPROACH FOR VIDEO CIRCULATION
MULTIPATH BROADCAST AND GOSSIP BASED APPROACH FOR VIDEO CIRCULATION
 
50120140505008
5012014050500850120140505008
50120140505008
 

More from IJCNCJournal

Improved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
Improved MPR Selection Algorithm-Based WS-OLSR Routing ProtocolImproved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
Improved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
IJCNCJournal
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
IJCNCJournal
 
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdfMay_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
IJCNCJournal
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
IJCNCJournal
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
IJCNCJournal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
IJCNCJournal
 
April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & Communications
IJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
IJCNCJournal
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
IJCNCJournal
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
IJCNCJournal
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
IJCNCJournal
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
IJCNCJournal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
IJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
IJCNCJournal
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
IJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
IJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IJCNCJournal
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
IJCNCJournal
 

More from IJCNCJournal (20)

Improved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
Improved MPR Selection Algorithm-Based WS-OLSR Routing ProtocolImproved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
Improved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
 
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdfMay_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & Communications
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 

Recently uploaded

Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 

Recently uploaded (20)

Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 

Mesh pull backup parent pools for video-on-demand multicast trees

  • 1. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.2, March 2014 DOI : 10.5121/ijcnc.2014.6203 27 MESH-PULL BACKUP PARENT POOLS FOR VIDEO-ON-DEMAND MULTICAST TREES Müge Sayıt1 and E. Turhan Tunalı2 1 International Computer Institute, Ege University, Izmir, Turkey 2 Department of Computer Engineering, Izmir University of Economics, Izmir, Turkey ABSTRACT Resilient multicast is a challenging issue for overlay trees particularly because of high churn. In this work, we propose a mechanism that allows scalable video multicast. While the regular operation involves tree- push of the video, any node that looses its parent on the tree solicits video from a predetermined backup set of nodes in a mesh-pull fashion. The main idea is to allocate less bandwidth for backup to improve bandwidth utilization while maintaining the best possible video quality. The choice of essential design parameters are studied together with seamlessness of the streaming under variety of fault scenarios. Simulation results indicate the optimality of the proposed approach as far as resiliency, bandwidth utilization, delay and video quality are concerned. KEYWORDS multicast trees, resiliency technique, mesh-pull backup, scalable codec 1. INTRODUCTION In peer to peer (P2P) communications, it is well known that tree-push type of approaches provide smaller overhead in utilization of network resources when there is no failure, but fail to provide resilience unless a considerable bandwidth is reserved idle for back-up [1]. Mesh-pull type of approaches [2], [3], [4], [5], [6], [7], [8], [9] introduced efficient solutions for resilience while introducing overhead network traffic due to excessive control messaging and/or redundant data packets. Since churn is high, node failure rate is considerably high in peer to peer networks. Hence tree based approach needs to consider this fact. To provide a solution to the problem, backup parent concept was proposed together with degree constrained optimal tree [10], [11]. In case of parent failure, a tree node connects to a pre- determined backup parent that has adequate idle bandwidth. By this way, the tree is repaired and multicast can resume. Nomination of backup parent in advance prevents waste of time for backup search. This is classified as a “proactive strategy” in the literature [10], [11]. The problem with this approach is that the nodes should reserve idle bandwidth that can stream video with a predetermined rate. This, in turn, reduces bandwidth utilization. In order to increase bandwidth utilization, backup slots are reserved in accordance with video layers where scalable video is streamed in [12]. On the other hand, although mesh based systems are resilient to peer churn but they suffer playback lag among peers. The nodes having large playback lag with other nodes in the system may not use their upload bandwidth [13] and this reduces bandwidth utilization of the system.
  • 2. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.2, March 2014 28 In this paper, we propose a new hybrid strategy in which regular streaming involves multicast through the nodes of a pre-constructed tree whereas streaming from backup involves a mesh-pull type of mechanism that does not require reservation of hefty idle bandwidth for each connection. Best effort is spent to provide high quality video when failure occurs. The contributions of our work are as follows: First, we present a novel backup strategy that involves a hybrid mechanism suitable for scalable video. Second, we propose a new adaptive hybrid push-pull P2P video-on-demand streaming system. After multicast tree is constructed, this system having the tree push based structure is converted into the mesh based structure if node failure rate increases. By this adaptive approach, we may keep advantages of both tree push and mesh pull systems. Our proposed system is resilient to peer churn while the playback lag between peers is small. We present a simulation-based comparative evaluation against tree-push only strategy in which full bandwidth channel reservation is made for possible disconnected nodes. The rest of the paper is organized as follows. In section two, related work on multicast trees together with error resilience problem is addressed. In section three, the proposed hybrid method for resilience together with its algorithms is given. In section four, simulation results that compare the proposed method with non-hybrid case are given. Finally, in section five, concluding remarks are made. 2. RELATED WORK The error resilience problem in multicast trees has been addressed in many of the studies including [5], [12], [14], [15], [16]. [12] addresses the real-time issues in resilience, [14] and [15] discuss the optimal tree formation problem, [5], [16] discuss scalability and bandwidth utilization issues associated to resilience. [17] addresses recovery time and associated buffer requirement problem. Resilience technique on multicast tree concentrates on repairing the tree in case failure happens. In [5] and [18], nodes are clustered according to the delay values between the nodes and cluster leaders selected from each cluster are responsible to convey video data to their clusters. If these relay nodes leave the system, a new cluster leader is selected and hence tree is repaired. Since selecting a new cluster leader after the failure of the cluster leader may cause interrupt of display, selecting backup nodes before failure is proposed in the literature. For this purpose, some backup mechanism is utilized by considering the capacity of each node. In [10], [19] and [20], each node reserves a number of backup slots, each slot being able to stream baseline video and nodes in the tree select their backup parents according to available backup capacity and RTT value between candidate backup parent and themselves. Unfortunately, a portion of the backup capacity reserved stays idle and bandwidth utilization reduces in the overall scheme. In simulation studies, it has been observed that half of the available bandwidth should be reserved for backup to provide acceptable resilience [21]. In order to make use of advantages of both tree based and mesh based systems, many hybrid based systems are proposed in the literature [22], [23], [24]. Most hybrid systems construct more than one multicast tree [22] and send different parts of the video data over those trees [25]. In figure 1, an example overlay architecture used in such systems is illustrated. In the figure, source node splits the video up to two streams called stream 1 and stream 2. The packets belonging to different streams follow different paths on the tree. A node can be an interior node in one tree and can be a leaf node in another tree as it can be seen from the figure. This structure provides robustness since the nodes still receive the video packets from another tree after experiencing parent failure in one tree.
  • 3. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.2, March 2014 29 Figure 1. An example of a multitree based hybrid overlay network. These video partitions can be obtained by using Multiple Description Codec (MDC) [26] and each received description increases the received video quality [27], [28], [29], [30]. However such systems have longer playback delay when compared to tree based systems. In [23], stable nodes construct a tree backbone and unstable nodes connect to the system in a mesh structure. Some hybrid systems utilize cloud or Content Distribution Network (CDN) servers [31], [32], [33], [34]. The main purpose of implementing a cloud based or CDN based service is to recover lost packets by retransmission so that higher QoE is obtained. In this work, we propose a hybrid system that drastically differs from the existing work. The novelty of our system is in its adaptive communication model implemented. Under normal operation, the system operates under tree- push model. As the node failure rate goes up, the tree structure adapts into a mesh based system. The proposed model utilizes the advantages of both tree based and mesh based systems thereby providing low playback delay and robustness. Our work here targets a new strategy in which less bandwidth is kept idle while maintaining the same resilience level. We introduce new heuristics to modify backup parent pool approach introduced in [12] to maximize resilience of the method of [21]. While [12] repairs the tree with full capacity channel, the proposed approach of this work constructs a mesh of nodes that is formed from members of designated backup parent pool of a particular layer of the tree plus the disconnected node. Therefore, for those sub-trees in which churn has not occurred, the overlay preserves its tree structure with root being the original source whereas roots of disconnected sub- trees pull video from respective mesh and those sub-trees are effectively disconnected from the root. This strategy allows reservation of smaller ratio of bandwidth as backup yet providing higher resilience. 3. TREE-PUSH BROADCAST WITH MESH-PULL BACKUP A variation of algorithm of [12] is used to construct the multicast tree. The algorithm considers variety of factors in attempting to optimize performance. We briefly summarize properties of the algorithm details of which are beyond the scope of this work. The heuristics of the algorithm of [12] spend best effort to i. Maximize average bandwidth from root to individual nodes ii. Minimize average delay from root to individual nodes iii. Maximize bandwidth utilization iv. Maximize resilience v. Minimize average node depth The algorithm of [12] constructs backup pools at each layer of the tree in which one or more nodes are expected reserve some pre-determined portion of its total upload bandwidth for backup. The packet of stream 1 Dissemination direction of stream 1 packets The packet of stream 2 Dissemination direction of stream 2 packets
  • 4. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.2, March 2014 30 It has been discussed that the higher (lower) the portion of the bandwidth reserved for backup, the higher the resilience (the higher the bandwidth utilization). In this work, we aimed at reducing overhead of this reserving backup approach while maintaining a comparable resilience. For this purpose, rather than allocating a complete video bandwidth to a disconnected node, we propose to construct a mesh-pull that is formed from the disconnected node and the backup set of a particular tree layer. By this way, for a particular node, we avoid allocating an integral amount of video bandwidth for backup. As a tradeoff the streaming quality to the disconnected sub-tree may decrease due to delays caused by the mesh-pull. We will assume that we stream scalable video that consists of a base and an enhancement layer that are going to be indicated by b and e respectively. Each tree layer will be indicated by l with l=0 being the layer of the root. All nodes of each tree layer l will reserve some portion of their total upload bandwidth less than b for backup and they all will take part in backup mesh of tree layer l. When a node is disconnected from its parent, the algorithm of figure 2 is run in all nodes to request backup from respective tree layers. given l, the layer of the node on the broadcast tree if (reply for request backup from layer l-1) then join the designated backup mesh; else if (reply for request backup from layer l-2) then join the designated backup mesh; else if (reply for request backup from layer l) then join the designated backup mesh; else abort streaming application; Figure 2. Backup request heuristics We note that the backup request heuristics solicits backup from backup meshes of three layers in the vicinity of the disconnected node. The following algorithm runs in backup mesh leaders of all of the tree layers when a backup request message is received. if (current backup capacity > b + e ) then grant b+e to the requesting node; else if (current backup capacity > b ) then grant b to the requesting node; else if (e being served to any node) then run “victim selection for e” and grant b to requesting node; else run “victim selection for b” if victim selected then grant b to requesting node; else reject request; Figure 3. Backup allocation heuristics
  • 5. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.2, March 2014 31 We observe that when there is sufficient bandwidth, the backup allocation algorithm of a particular tree layer attempts to allocate best video quality. As bandwidth shrinks, the allocation algorithm attempts to allocate a base video quality with best effort. The following two algorithms called “victim selection for e” and “victim selection for b” are given in figure 4 and figure 5 respectively. The algorithms determine the criteria on dropping sending enhancement and base quality videos respectively. given l, the layer of mesh on the broadcast tree if (e being served to any orphan at l-2) then choose an orphan as victim from layer l-2; else if (e being served to any orphan at l-1) then choose an orphan as victim from layer l-1; else if (e being served to any orphan at l) then choose an orphan as victim from layer l; else choose the lowest bandwidth-highest delay child as a victim from layer l-1; Figure 4. Enhancement victim selection (victim selection for e) algorithm We note that enhancement victim selection algorithm attempts to drop enhancement from the lowest layer first. The layers are then scanned to find an enhancement being served. Since the algorithm is called when e is being served to some node, there will always be a victim selected. Victim selection for b algorithm also scans the layers starting from the lowest layer served. If the request node is in a higher layer of tree as compared to a node being served, then request node is given higher priority. Ultimately, the request node will always find a backup from its own layer due to its priority. given l=the layer of mesh on the broadcast tree, rl=layer of the requesting node if (rl=l+2) then reject request; else if (rl = l+1) then if (there exists an orphan in l+2 with b served) then select orphan as victim; else reject request; else if (there exists an orphan in l+2 with b served) then select orphan as victim; else if (there exists an orphan in l+1 with b served) then select orphan as victim; else if (there exists a child in l+1 with b served) then choose the lowest bandwidth-highest delay child as a victim; else reject request; Figure 5. Base victim selection (victim selection for b) algorithm
  • 6. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.2, March 2014 32 (a) Original multicast tree (b) One of the tree layer 2 nodes fail and its children join the upper layer backup mesh Figure 6. Outlook of overlay topology When capacity is allocated in order to supply backup to the requesting node, the node sends the buffer maps to the set of selected backup parents. Since selected backup parents are always at the same tree layer according to given heuristics, the playback lag between them is expected to be small. Thus, for backup requesting node, it is not difficult to schedule chunk requests. Figure 6 demonstrates the outlook of the overlay topology. In figure 6.a, original multicast tree is given when no failure has occurred yet. We note that every non-leaf node in a particular tree layer acts as the root of a subtree in regular broadcast operation and acts as a member of the respective backup mesh simultaneously. Figure 6.b demonstrates the situation when a layer 2 node fails and two of its children take part in the upper layer mesh and receive packets in a mesh-pull fashion. 4. SIMULATION RESULTS 4.1. Simulation Testbed In order to measure performance of the proposed algorithm, a network of 500 nodes is constructed by using GT-ITM module [35]. After creating the network topology, distances, i.e. round trip time values between nodes are calculated in NS2 environment [36] by using the shortest physical path between nodes. The tree construction algorithm is then implemented by considering two different strategies: In the first strategy, tree-push mechanism that involves repairing tree by re-allocating a full bandwidth channel to each disconnected node is utilized. In the second strategy, the hybrid backup policy of the proposed method is considered. Both of the strategies are tested in local simulator which enables running simulations with large amount of nodes. Comparisons are carried out by examining received bit-rate, network utilization and total delay from source to destination. Layer 4 Layer 3 Layer 2 Layer 1 Layer 0 Layer 4 Layer 3 Layer 2 Layer 1 Layer 0
  • 7. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.2, March 2014 33 0.00 0.20 0.40 0.60 0.80 1.00 1.20 CDF(x<X) x: Time (in sec) CDF Graph of Total Delay Tree with Backup Reservation Hybrid Mesh Tree Video file used in the experiments are encoded using layered codec and has base layer with 500 Kbps and base plus enhancement layer with 1000 Kbps. The range of the upload bandwidth of the nodes is between 0 and 2200 Kbps with average being 1200 kbps. The single source node that is in the root of the tree is assumed to be in the system throughout the streaming period. In tree-push strategy, each node having surplus upload bandwidth reserves backup capacity that is adequate for at least on child. 4.2. Comparisons Figure 7 examines the distribution of total delay from the source to individual nodes. We observe that delay has considerably reduced in the proposed method due to fact that tree-push reserves a hefty backup capacity that reduces the number of children connected to a high upload bandwidth node thereby increasing the average depth of the nodes. The delay from source to destination in the hybrid system is limited to 3 seconds while this value reaches up to 30 seconds in the tree- push system. Figure 7. CDF Graph of Total Delay: From Source to Destination Table 1. Comparative hop count values. In Table 1, average and maximum hop count values measured in both systems are given. Hop count of a node equals to number of nodes on the path between the source and that node. For the same number of nodes and same distribution of upload capacities of the nodes, tree based system suffers from the reservation slots and maximum hop count value reaches to 249 while that value equals to 8 for hybrid mesh tree based system. Hop count values directly affect the delay values from source to destination. These values clarify the reason of obtained delay values given in figure 7. Tree with Backup Reservation Hybrid Mesh Tree Average number of hop counts 124.75 6.99 Maximum hop count 249 8
  • 8. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.2, March 2014 34 0 0.1 0.2 0.3 0.4 0.5 0.6 0 1 2 Ratioofnodes The number of children Tree with Backup Reservation Hybrid Mesh Tree Figure 8. Classification of the nodes according to the number of children. We also classify the nodes in the system according to their number of children. The ratio of the number of nodes having no child, one child and two children to the total number of nodes in the system is given in figure 8. Nearly half of the nodes have one child in tree based system while less than 5% of the nodes have one child in hybrid mesh tree based system. The main reason is that the nodes reserve only small part of their upload capacity in hybrid tree based system; hence most of the nodes have two children if upload capacity is enough to send video at the highest bitrate. The graph also shows that ratio of the nodes having no child is 30 % in tree based and 50 % in hybrid mesh based systems. Note that considerable number of nodes having no child is free- riders, i.e. having zero upload capacity for both systems. To evaluate the performance of the system under different node failure (churn) scenarios, the nodes are forced to fail with a probability, f, that ranges between 0.1 and 0.6. The failure rates are classified as low, medium and high according to respective slots of failure probabilities. Figure 9 examines bandwidth utilization at low failure rate. We observe that the proposed method yields utilization above 70% while tree-push utilization is below 50%. 0 0,1 0,2 0,3 0,4 0,5 0,6 0,7 0,8 1 6 11 16 21 26 31 36 41 46 51 56 Utilization Time (in minute) UtilizationatLow FailureRate Tree with Backup Reservation, f=0.1 HybridMesh Tree, f=0.1 Tree with Backup Reservation, f=0.2 HybridMesh Tree, f=0.2 Figure 9. CDF Graph of bandwidth utilization for low failure Utilization at medium and high failure rates are given in figure 10 and figure 11, respectively. We observe that the proposed method is still superior to tree-push strategy. Utilization decreases while failure rate increases since the number of nodes having no child also increases. In Table 2, the received bit-rate for nodes in the proposed system is given according to node failure rate.
  • 9. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.2, March 2014 35 There is no disconnected node even if the node failure rate is high. The received bit-rate for tree- push system is 1000 Kbps for almost all nodes since nodes experiencing parent failure can receive video at the highest bit-rate when it is connected to a backup parent. 0 0,1 0,2 0,3 0,4 0,5 0,6 1 6 11 16 21 26 31 36 41 46 51 56 Utilization Time (in minute) UtilizationatMediumFailure Rate Tree with Backup Reservation, f=0.3 Hybrid Mesh Tree, f=0.3 Tree with Backup Reservation, f=0.4 Hybrid Mesh Tree, f=0.4 Figure 10. CDF Graph of bandwidth utilization for medium failure 0 0,1 0,2 0,3 0,4 0,5 0,6 1 6 11 16 21 26 31 36 41 46 51 56 Utilization Time (in minute) UtilizationatHighFailure Rate Tree with Backup Reservation, f=0.5 Hybrid Mesh Tree, f=0.5 Tree with Backup Reservation, f=0.6 Hybrid Mesh Tree, f=0.6 Figure 11. CDF Graph of bandwidth utilization for high failure Table 2. Percentage of nodes according to the received bitrate. Failure Probability Received Bitrate <500 Kbps 500 Kbps 1000 Kbps f=0.1 - 28% 72% f=0.2 - 30% 70% f=0.3 - 68% 32% f=0.4 - 57% 43% f=0.5 - 39% 61% f=0.6 - 25% 75%
  • 10. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.2, March 2014 36 4. CONCLUSIONS In this work, we proposed a hybrid mechanism to exploit the efficiency of both tree-push and mesh-pull methods. If churn is low, then tree-push dominates the multicast and obtains high utilization of bandwidth due to a fraction of a channel bandwidth allocated for backup. If churn is high, then mesh-pull dominates the overall mechanism. Simulations are carried out to compare bandwidth utilization in tree-push only and proposed hybrid method and it has been observed that the proposed method yields much better utilization of bandwidth. This system can be improved and re-designed in order to stream MDC or Multiview coded video. In the future, we plan to stream Multiview coded video over our hybrid network. Multiview coded video may also have scalable layers; hence by implementing similar backup pool strategy, this system can be used to stream 3D data. REFERENCES [1] Birrer, S. & Bustamante, F.E., (2007) “A Comparison of Resilient Overlay Multicast Approaches”, IEEE J. on Sel. Areas in Communications, Vol. 25, pp1695-1705. [2] Zhang, X., Liu, J., Li, B. and Yum, Y., (2005) “CoolStreaming/DONet: A Data-driven Overlay Network for Peer-to-peer Live Media Streaming, IEEE INFOCOM. [3] PPLive. http://www.pplive.com [4] PPstream http://www.pps.tv/en/ [5] Banerjee, S., Bhattacharjee B. and Kommareddy, C., (2002) “Scalable Application Layer Multicast”, ACM SIGCOMM, USA.[6] Liao, X., Jin, H., Liu, Y., Ni, L.M. and Deng, D., (2006) “AnySee: Peer-to- Peer Live Streaming”, IEEE INFOCOM. [7] Magharei N. & Rejaie, R. (2007) “PRIME: Peer-to-Peer Receiver-Driven Mesh-Based Streaming,” IEEE INFOCOM. [8] Kumar, R., Liu, Y. and Ross, K., (2007) “Stochastic Fluid Theory for P2P Streaming Systems,” IEEE INFOCOM. [9] Sianati, A., Abbaspour, M. and Norouzi, M. (2011) “Head-tail Video Streaming Over Peer to Peer Systems”, International Journal of Computer Networks & Communications (IJCNC), Vol. 3, No. 2, pp.68-81. [10] Jeon, H., Son, S.C. and Nam, J.S., (2008) “Overlay Multicast Tree Recovery Scheme Using a Proactive Approach”, Elsevier Computer Commun., Vol. 31, pp3163-3168. [11] Fei, Z. & Yang, M., (2007) “A Proactive Tree Recovery Mechanism for Resilient Overlay Multicast”, IEEE/ACM Trans Networking, Vol. 15, 2007. [12] Sayıt, M.F., Tunalı, E.T. and Tekalp, A.M., (2012) “Resilient Peer-to-peer Streaming of Scalable Video Over Hierarchical Multicast Trees with Backup Parent Pools”, Elsevier Signal Processing: Image Communication, Vol. 27, pp113-125. [13] Hei, X. Liang, J. Liang, J. Liu, Y., Ross, K.W. (2007) “A Measurement Study of a Large-Scale P2P IPTV System”, IEEE Trans. On Multimedia, Vol. 9, No. 8, pp1672-1687. [14] Jin, X., Yiu, W.P.K., Chan, S.H.G. and Wang, Y., (2007) “On Maximizing Tree Bandwidth For Topology-Aware Peer-To-Peer Streaming”, IEEE Trans. on Multimedia, Vol. 9, pp1580-1592. [15] Kim, E., Jang, J., Park, S., Sussman, A. and Yoo, J.S., (2006) “Improving Resiliency Using Capacity-Aware Multicast Tree In P2P Streaming Environments”, High Perf. Computing and Communications, pp. 925-934.
  • 11. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.2, March 2014 37 [16] Birrer S. & Bustamante, F.E., (2005) “Resilient Peer-To-Peer Multicast Without The Cost”, Multimeda Computing and Netw. Conference. [17] Kusumoto, T., Kunichika, Y., Katto, J. and Okubo, S., (2005) “Tree-based Application Layer Multicast Using Proactive Route Maintenance And Its Implementation”, ACM workshop on Adv in Peer-To-Peer Multimed Str., pp49-58. [18] Tran, D.A., Hua, K.A., and Do, T.T., (2004) “A Peer-to-Peer Architecture for Media Streaming”, IEEE Journal on Selected Areas in Communications, Vol. 22, No. 1, pp121-133. [19] Banerjee, S., Lee, S., Bhattacharjee, B. and Srinivasan, A., (2006) “Resilient Multicast Using Overlay”, IEEE/ACM Trans. Networking, Vol. 14, pp237-248. [20] Okada, Y., Oguro, M., Katto, J. and Okubo, S., (2005) “A New Approach For The Construction Of ALM Trees Using Layered Video Coding”, ACM workshop on Adv. in Peer-To-Peer Multimed Str., pp59 - 68. [21] Sayit, M. F.. Tunali, E. T and Tekalp, A. M. (2009) “Bandwidth-aware Multiple Multicast Tree Formation for P2P Scalable Video Streaming Using Hierarchical Clusters”, Proc. of IEEE ICIP, Egypt, pp945-948 [22] Li, B., Xie, S., Qu, Y., Keung, G.Y., Lin, C., Liu, J., Zhang, X., (2008) “Inside the New Coolstreaming: principles, measurements and performance ımplications”, Proceedings of 27th IEEE Conference on Computer Communications, pp1031 - 1039. [23] Wang, F., Xiong, Y. and Liu, J., (2010) “mTreebone: A Collaborative Tree-Mesh Overlay Network for Multicast Video Streaming,” IEEE Trans. Parallel and Distributed Systems, Vol. 21, No. 3, pp379-392. [24] Castro, M., Druschel, P., Kermarrec, A., Nandi, A., Rowstron, A. and Singh, A., (2003) “SplitStream: High-Bandwidth Multicast in Cooperative Environments,” Proc. 19th ACM Symp. Operating Systems Principles (SOSP), pp298-313. [25] Noh J. & Girod, B., (2012) “Time-Shifted Streaming in a Tree-Based Peer-to-Peer System,” Journal of Communications, Vol. 7, No. 3, pp202-212. [26] Goyal, V.K., (2001) “Multiple Description Coding: Compression Meets the Network”, IEEE Signal Processing Magazine, Vol. 18, No. 5, pp74-94. [27] Liu, Z. Shen, Y. Ross, K., Panwar, S., Wang, Y., (2007) “P2P Video Live Streaming with MDC: Providing Incentives for Redistribution”, IEEE ICME. [28] Magharei, N. & Rejaie, R., (2006) “Understanding Mesh-Based Peer-to-Peer Streaming”, International Workshop on Network and Operating System Support for Digital Audio and Video. [29] Padmanabhan, V.N., Wang, H.J. and Chou, P.A., (2003) “Resilient Peer to Peer Streaming”, Proc. IEEE International Conference on Network Protocols, pp16-27. [30] Favalli, L., Folli, M., Lombardo, A., Reforgiato, D., Schembra, G., (2011) “A P2P Platform for Real-Time Multicast Video Streaming Leveraging on Scalable Multiple Descriptions to Cope with Bandwidth Fluctuations”, International Journal of Computer Networks & Communications (IJCNC) Vol.3, No.6, pp71-94. [31] Yin, H., Liu, X., Zhan, T., Sekar, V., Qiu, F., Lin, C., Zhang, H., Li, B., (2010) “LiveSky: Enhancing CDN with P2P”, ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP), Vol. 6, No. 3. [32] Payberah, A. H., Kavalionak, H., Kumaresan, V., Montresor, A., Haridi, S., (2012) “CLive: cloud- assisted P2P live streaming”, Proceedings of IEEE 12th International Conference Peer-to-Peer Computing (P2P), pp79 – 90. [33] Lu, Z., Wang, Y. and Yang, Y.R., (2012) “An Analysis and Comparison of CDN-P2P hybrid Content Delivery System and Model, Journal Of Communications, Vol. 7, No. 3. [34] Rocha, M.V.M. & Rodrigueson, C.K.S., (2013) “Client’s Interactive Behaviour to Design Peer Selection Policies for Bittorrent-Like Protocols”, International Journal of Computer Networks & Communications Vol.5, No.5, pp141-159.
  • 12. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.2, March 2014 38 [35] “GT-ITM”, http://www.cc.gatech.edu/projects/gtitm/ [36] “Network Simulator (NS2)”, http://www.isi.edu/nsnam/ns/ Authors Muge Sayit Muge Sayit is an Assistant Professor at International Computer Institute in Ege University in Turkey. She received a Master of Science degree in 2005 and PhD degree in 2011 in Information Technologies from the same institute and a degree in Mathematics from Ege University in 1999. Her research interests include P2P networks, live streaming, video- on-demand and distributed systems. Turhan Tunalı Turhan Tunalı earned a BSc degree in Electrical Engineering from Middle East Technical University and MSc Degree in Applied Statistics from Ege University, both in Turkey. He then earned a DSc Degree in Systems Science and Mathematics from Washington University in St. Louis, USA in 1985. After his doctorate study, he joined Computer Engineering Department of Ege University as an assistant professor where he became an associate professor in 1988. During the period of 1992–1994, he worked in Department of Computer Technology of Nanyang Technological University of Singapore as a Visiting Senior Fellow. He then joined International Computer Institute of Ege University as a Professor where he was the director. In the period of 2000–2001 he worked in Department of Computer Science of Loyola University of Chicago as a Visiting Professor.He is currently working as a Professor at Department of Computer Engineering of Izmir University of Economics. His current research interests include adaptive video streaming and Internet performance measurements. Dr. Tunali is a member of the IEEE.