SlideShare a Scribd company logo
ACEEE International Journal on Signal and Image Processing Vol 1, No. 1, Jan 2010




        Optimal Streaming Protocol for VoD Using
              Clients' Residual Bandwidth
                           R.Ashok Kumar1,           K.Hareesh2,             K.Ganesan3,          D.H Manjaiah4
                       1
                       Research Scholar, School of Computing Sciences, VIT University, Vellore, India.
                  2
                  Assistant Professor, Department of Computer Science & Engg., BMSIT, Bangalore, India.
                      3
                        Senior Professor, School of Computing Sciences, VIT University, Vellore, India.
             4
               Reader & Chairman, Department of Computer Sciences, Mangalore University, Mangalore, India.
            rak_bms@hotmail.com1,mail_hareeshk@yahoo.com2, kganesan@vit.ac.in3,ylm321@yahoo.co.in4

                                                                          • Level I has the main server with an optic fibre channel having
Abstract-A true VoD system has tremendous demand in the                   a bandwidth in the range of 2 Gbps.
market. The existing VoD system does not cater the needs                  • Level II has a cluster of proxy servers that are connected to
and demands of the market. The major problem in the VoD
system is serving of clients with expected QoS is difficult. In           the server at one end and to the clients at the other end. The
this paper, we proposed a protocol and algorithm that                     connection on the server side is an optic fibre channel and that
chains the proxy servers and subscribed clients. Our                      on the client side is a low bandwidth network that provides a
objective is to send one server stream and this stream should             bandwidth of 2 Mbps.
be served to N asynchronous clients. The server bandwidth                 • Level III has the set of clients that are served by the proxy and
is scarcity and on the client uplink bandwidth is                         in turn by the server.
underutilized. In this protocol, we are using client’s residual              When the client requests for a video from the proxy that
bandwidth such that the load on the server bandwidth is                   serves the client. This proxy in turn requests the server for the
reduced. We have proved that optimal utilization of the                   particular video. The server then streams the video to the proxy
buffer and bandwidth for the entire VoD system and also                   and this is further streamed to the client.
less rejection ratio of the clients.
                                                                             Whenever a video that is already being streamed to some
Index Terms- Video-on-Demand (VoD), Quality of Service                    client is requested the server streams it again, thereby streaming
(QoS), Chaining, Segment, Bandwidth                                       the same video to different clients and using twice the
                                                                          bandwidth for the same video file. The server bandwidth is of
                                                                          great importance in the network and the streaming of the same
                      I. INTRODUCTION                                     video twice hinders the optimal utilisation of the server
                                                                          bandwidth. On the other hand the uplink bandwidth on the
    With internet reaching out to a global audience today, people         clients’ side is under-utilised. Providing a protocol for the
are expecting and extracting a lot of new features and facilities         optimal streaming of the videos using the clients’ residual
from it, IPTV being one of them. IPTV provides a lot of                   (uplink) bandwidth and hence reducing the load on the client
features that conventional cable television fails to provide, such        constitutes our objective in this paper.
as high definition video quality and VCR functions like pause,
fast forward, rewind, etc. Another important aspect that makes
IPTV so popular and better than conventional cable television is                        II. REVIEW OF LITERATURE
Video on Demand (VoD). VoD involves, streaming video files
from a remote server to the client systems on an individual                  The VOD streaming has attracted quite a few researchers;
basis. This involves streaming of videos requested by the clients         some of the previous works have been reviewed here. There
specifically to them. This provides a certain kind of customized          have been two kinds of works in this regard. They are:
viewing option that is absent in regular cable TV. The client
requests for a particular video on a VoD server and the request                      Building of Streaming servers
is processed and served by the server.                                               Protocol and architecture related works
                                                                          Since we are proposing a protocol we intend to concentrate
                                                                          more on the Protocol and Architecture related works. There
   Through VoD, the video can be viewed as it is being
                                                                          have been quite a few innovative techniques and protocols
downloaded from the server. Along with this the VCR functions
                                                                          proposed in this field. In prefix caching [2] concentrates more
provide an extra edge over conventional television, letting the
                                                                          on the storage problems related to proxy servers, but in the
user decide when and how to watch the video.
                                                                          current era where memory is cheap and easily available the
                                                                          significance of prefix caching lessens.
   The implementation of VoD requires a high bandwidth
network framework consisting of a server that has sufficient                 In optimized distributed delivery [3] method a single
storage capacity to store video files.                                    multimedia file is split up and sent in parts from different
                                                                          servers. Effectively this is like multiple servers serving multiple
   IPTV generally uses HDTV videos and hence the servers                  clients. The drawback in this system is that it is very expensive
need to have large storage capacities to store the video files.           to maintain multiple servers and the server bandwidth is of great
This constitutes one of the main requirements of a VoD                    value.
network. Using MPEG standards the bandwidth required is
2133 Mbps. Maintaining such a high bandwidth requires a high                 In hybrid model [4] uses multiple clients called peers - lend
bandwidth network. This makes the service expensive and                   or contribute their resources to the network and serve their
impractical to implement from the client's side. To overcome              peers. The model optimally uses all the network resources and
these drawbacks the network is implemented in three levels.               provides very good service but the major drawback is that the
                                                                          model is too complex to implement. The protocol requires the
                                                                     22
© 2010 ACEEE
DOI: 01.ijsip.01.01.05
ACEEE International Journal on Signal and Image Processing Vol 1, No. 1, Jan 2010


service of each and every peer and hence the service becomes                   B. Algorithm
less reliable. The protocol proposed in this paper overcomes all               The algorithms that are required to implement the above
the drawbacks and limitations of the above mentioned                        protocol are as follows:
protocols.                                                                                            CHAINING ALGORITHM
                                                                                                                  Nomenclature: 
              III. SYSTEM ARCHITECTURE                                                        C= {C1, C2, C3, C4…..Cm}, Active clients 
   The structure of the network assumed in our protocol is as                               P= {P1, P2, P3, P4……..Pn}, Active Proxies 
shown in Fig.1.The network architecture consists of a Main                                                    Ci →Client address  
Server at the top of the hierarchy. This is followed by a cluster                                              Pi →Proxy address 
of Proxy servers that act as an interface between the clients and                                  Bi →Buffer size used in client Ci   
the Server. Each Proxy can be thought of as a regional server                  b= {(µ1, θ1), (µ2, θ2)… (µi, θi)}, b is a list containing µi and θi 
that serves a set of clients that belong to a particular region. One                           where µi is MovieId , θi is popularity. 
of the aspects of having proxy servers is that the probability of                          D {i, j} →Distance between Client Ci and Cj 
two clients requesting the same video is more in a given region.                                        µ→ MovieId (Request Id) 
                                                                                                           ηi→ Uplink of client Ci 
                                                                            R = { r1, r2, r3……rk}, A list containing current streaming request. 
                                                                                                 Bi→ Proxy Pi‘s current Bandwidth 
                                                                                       β→Maximum allowable buffer size of proxy P 
                                                                                                         Sr→ Requested segment 
                                                                                                           Si→ Segment number i 
                                                                               Q→A circular queue in client holding received segments 
                                                                                                                              
                                                                                                                          Proxy 
                                                                                              Upon receiving request from client Ci 
                                                                                                                  1 if µ in R then 
                    Fig. 1: Network architecture                                            2 find j such that (cost[i] → D {i, j}/ ηi     
At the same time, the more popular the video, the more the                                                                 D {i, p} / Bi, where rj→µ 
probability of a client requesting the same video. Hence the                                3 if ∃ some j such that Cj є C                           
number of clients requesting for the video will be more. Thus if                                         4        chain client Ci to Cj  
the Server satisfies each and every request for the same video,                                     5        θi →θi+1, where ri→ µ    
the server bandwidth is not optimally utilised. In order to avoid                                                         6 else 
this, these popular videos may be stored in the Proxy buffer and
                                                                                                             7   if µ in b then   
streamed as and when the client requests for it. Since the
                                                                                              8      initiate new stream ri to client Ci, 
popularity is region dependent, each proxy buffer contains the
                                                                                                                          R=R U {ri} 
videos that are popular in a given region and the videos can be
streamed directly.                                                                                  9      θi →θi+1, where ri→ µ    
   The videos are stored dynamically, that is if the popularity of                                                       10 else 
a particular video drops, the video is automatically deleted from                                11    send request rk→ µ to server 
the proxy buffer giving way to some other more popular video.                                   12    receive segments from server 
The popularity is based on the number of hits that occur for a                                                13 if maxsize{b} > β 
particular video. The above mentioned parameters constitute the                               14      replace (µk, θk) in b with (µl, θl)  
essential requirements for the proposed protocol.                                                                    where θk< θj  ∀ j 
   The optimal utilisation of the server bandwidth is                          The above mentioned algorithm is the proxy server
implemented using “Chaining”. When a video is requested by a                algorithm. The Proxy server waits for movie requests from the
client, the request is redirected to another client who already             clients. Whenever a request is received, the proxy checks if the
contains the same video in its buffer, instead of being served by           movie requested is being streamed to any client.
the server or the proxy. This process is called “Chaining”. This
reduces the load on the proxy and, the main server.                             If so the “cost of chaining” is calculated and compared with
                                                                            that of streaming without chaining and the most economical
                     A. Proposed Protocol
                                                                            method is chosen. If Chaining is feasible then the client is
     Fig. 2 shows the protocol followed in this implementation.
                                                                            redirected to the client that has the same video in its buffer. In
When a connection is established between the client and the
                                                                            case chaining is not a feasible option then proxy buffer is
server, the client sends a “HELO” message to the server. When
                                                                            checked for the movie requested. If found the movie is
the server receives this “HELO” message, it requests the client
                                                                            transmitted by allocating a new stream to the client. In case the
for the “MovieID”. In response the client sends the Movie ID to
                                                                            movie is not found in the proxy buffer, the request is redirected
the server. On receiving the Movie ID, the server sends a
                                                                            to the main server.
"REDY" message to the client and waits for client's response.
The client sends an “OK” message to the server indicating that
it is ready to receive the movie. Once the server receives the                 The client requests for a video from the proxy server. If the
"OK" message the server starts streaming the movie, segment                 proxy is ready to stream, the client receives an
by segment. For each segment the client receives, it sends an               acknowledgement “SIG_READY” message. Then the movie is
acknowledgement (“OK” message) to the server. The server                    streamed from the proxy, segment by segment, to the client. In
sends the next segment only after receiving an                              case the movie is being streamed to some other client, the
acknowledgement from the client.                                            address of that client is sent from the proxy in the
                                                                            “SIG_CHAINTO” message, and the stream is transmitted from
   To illustrate, when the proxy-server is streaming a movie to             the peer client. When a client receives a Movie ID and an
Client-i, suppose Client-j requests for the same movie, then the
request of Client-j is forwarded to Client-i. Now the Client-i
uses its up-link bandwidth to stream the same movie to Client-j,
thus taking the load off the server.
                                                                       23
© 2010 ACEEE
DOI: 01.ijsip.01.01.05
ACEEE International Journal on Signal and Image Processing Vol 1, No. 1, Jan 2010




                                                                             Fig. 3: Number of clients and Number of Streams v/s time

                                                                           This is because the proxy or the server serves the clients only
                                                                       till all the popular videos have been cached in at least one place.
                                                                       Later on the videos are chained from these places.

                                                                          The graph in Fig. 4 shows the number of requests /streams
                                                                       with respect to time. In this case the requested video is very
                                                                       popular and hence with time the number of requests for the
                                                                       video is increased. We can observe that as the number of
                                                                       requests increases, the number of active chains also increases.


                         Figure 2: Protocol
   address from the proxy, then the client starts streaming the
movie in its buffer to the address mentioned, thereby
contributing to the chain. If the requested movie is not in the
buffer then the request is simply rejected.
                                   Client 
                     Send a request ri to proxy Pj 
               Upon receiving SIG_READY from Pj 
            1 Receive segment So from Pi,Q= Q U {So} 
                               2 cptr=0,i=0 
                                                                                        Fig. 4: Number of streams VS time
                             3 if Bi < size(Si) 
                            4     Q= Q ‐ {Sin} 
                                                                          Initially the video is present in very few clients, who are
                            5     Q= Q U {Si} 
                                                                       scattered in different locations. Hence the more number of
                           6     cptr →cptr+1 
                                                                       active chains have to be created in order to serve the requests.
                       Upon receiving SIG_CHAINTO                      But as the requests are served, the number of clients that have
                                7 If Sr in Q                           the video will grow. Once more clients possess the video, the
                 8     stream the segments Sr to Sn                    number of active chains gradually decreases. The same is the
                                   9 else                              case with the streams allocated for the video in the server as
                                 10 reject                             shown in the graph. But the number of streams is always less
           IV. SIMULATION AND RESULTS                                  than the number of active chains ( as seen in the graph, the no .
                                                                       of streams is always below the number of active chains )
    The following are the assumptions made in the simulation
                                                                       because of the chaining. The chaining reduces the number of
model: It consists of a single server, 5 proxy servers and 80          streams from the server and hence the server bandwidth is
clients. The server had 20 movies each of size 4.9 MB. The             conserved.
proxy buffer was large enough to hold 50% of the data on the
server .i.e. effectively 10 movies. The server to proxy
bandwidth is 2 Gbps and the proxy to client bandwidth is
2Mbps. The uplink bandwidth of the client is 256kbps.

   The graph shown in Fig. 3 is the combined graph of
“Number of clients’ v/s Time” and the “Number of streams v/s
Time”. We can observe that as time increases the number of
clients increase. But as the number clients increases we can
observe that the number of streams increases initially and then
decreases gradually.
                                                                                           Fig. 5: Rejection ratio with time

                                                                          The graph in Fig.5 shows Rejection Ratio with respect to
                                                                       time. The rejection ratio is defined as the ratio of the number of
                                                                       rejected requests to the number of active chains. It represents
                                                                       the fact that the client requests are rejected even though there is
                                                                       a possibility of chaining. This happens because even though the
                                                                       chaining is possible the cost of chaining exceeds the actual cost
                                                                       of streaming. The ratio is around 0.9 initially since the
                                                                  24
© 2010 ACEEE
DOI: 01.ijsip.01.01.05
ACEEE International Journal on Signal and Image Processing Vol 1, No. 1, Jan 2010


numberof clients possessing the video is small and scattered.              involved in a chain, breaks, our algorithm does not provide a
But as the number of clients that possess the video increase the           mechanism to overcome the drawback.
rejection ratio comes down rapidly as shown in the graph. We
can observe that the bandwidth initially increases with time and                                    REFERENCES
then peaks at a point and then reduces gradually to some                   [1] Te-Chou Su, Shih-Yu Huang, Chen-Lung Chan, and Jia-
constant value.                                                            Shung Wang, Optimal Chaining Scheme for Video-on-Demand
                                                                           Applications on Collaborative       Networks, IEEE Transactions
   Initially the number of requests that arrive have to be served          on Multimedia, Vol. 7, No. 5, October 2005.
by the server itself because the number of clients that possess            [2] Bing Wang, Subhabrata Sen, Micah Adler, and Don
the video is small, as shown in the previous graph of the                  Towsley, Optimal Proxy Cache Allocation for Efficient
rejection ratio.                                                           Streaming Media Distribution, IEEE Transactions on
                                                                           Multimedia, Vol. 6, No. 2, April 2004.
                                                                           [3] Gerassimos Barlas and Bharadwaj Veeravalli, Optimized
                                                                           Distributed Delivery of Continuous-Media Documents over
                                                                           Unreliable Communication Links, IEEE.
                                                                           Transactions on Parallel and Distributed Systems, Vol. 16, No.
                                                                           10, October 2005
                                                                           [4] Mohamed Hafeeda and Bharat Bhargava, A Hybrid
                                                                           Architecture for Cost Effective On-Demand Media Streaming,
                                                                           FTDCS 2003.
                                                                           [5] K. A. Hua, S. Sheu, and J. Z. Wang Earthworm: a network
                                                                           memory management technique for large-scale distributed
                                                                           multimedia applications, in Proc. IEEE Infocom’97, vol.3,
               Fig. 6: Bandwidth utilization with time
                                                                           Kobe, Japan, Apr. 1997.
                                                                           [6] J. K. Chen and J. L. C. Wu, Adaptive chaining scheme for
                                                                           distributed VOD applications, IEEE Trans. Broadcast., vol. 45,
    But once the chaining process is activated the bandwidth
                                                                           no. 2, pp. 215–224, Jun. 1999.
used of the server is reduced and hence the burden on the server
                                                                           [7] Te-Chou Su, Shih-Yu Huang, Chen Lung Chan, and Jia-
is reduced to a great extent.
                                                                           Shung Wang, Optimal Chaining Scheme for Video-on-Demand
                                                                           Applications on Collaborative Networks ,IEEE Trans.
                                                                           multimedia, vol. 7, no. 5, October 2005.
                                                                           [8]Hyunjoo Kim and Heon Y. Yeom, P-chaining: a practical
                                                                           VoD service scheme autonomically handling interactive
                                                                           operations, Multimedia Tools Appl, Springer Science, Business
                                                                           Media, LLC 2007.
                                                                           [9] Frederic Thouin and Mark Coates, McGill University,
                                                                           Video- on- Demand Networks: Design Approaches and Future
                                                                           Challenges, IEEE Network, March/April 2007.
                                                                           [10] Mohamed Hefeeda & Bharat Bhargava, A Hybrid
                       Fig. 7: Buffer utilization                           Architecture for Cost-Effective On-Demand Media Streaming,
                                                                            Purdue University FTDCS 2003.
    The buffer utilization graph shown in Fig. 7 shows the client          [11] Rocha M ,Maia M , Cunha I, Almeida J, Campos S,
buffer utilized. Without chaining we can observe that the buffer           Scalable media streaming to interactive users, Proc. ACM
utilization is erratic and decreases drastically with time. But            Multimedia, pp 966–975, November 2005.
with chaining we can observe that the buffer utilization is                   [12] Schultz JJ, Znati T, An efficient scheme for chaining
initially high and then reaches the peak and then falls down               with client-centric buffer reservation for multi-media streaming,
gradually. The peak represents the peak of the chaining process.           Proc. of the 36th Annual Simulation Symposium (ANSS’03), pp
After the completion of the chaining and the after the video has           31–38,2003
been fully watched by the client the buffer utilization falls; this
is the dip in the graph.


                      V. CONCLUSION

   In this paper we have proposed a protocol for optimal
streaming using the chaining process and clients' residual
bandwidth. Through simulation we have proved the advantages
of using this protocol in the real world environment. The
protocol uses the clients' uplink bandwidth, the server
bandwidth is optimised and also the clients uplink bandwidth
that was previously under used is well utilised.

   We intend to build on the current system and make some
improvements to make the rejection ratio even lesser as future
enhancements. This will include procedures that will consider
the popularity and the cost of streaming, in order to dynamically
maintain the videos in the proxy and the servers. The algorithms
used in this protocol are not equipped to handle fault tolerance.
In case the connection between any two clients, which are

                                                                      25
© 2010 ACEEE
DOI: 01.ijsip.01.01.05

More Related Content

What's hot

Paper id 28201439
Paper id 28201439Paper id 28201439
Paper id 28201439
IJRAT
 
Cg25492495
Cg25492495Cg25492495
Cg25492495
IJERA Editor
 
Video Streaming Compression for Wireless Multimedia Sensor Networks
Video Streaming Compression for Wireless Multimedia Sensor NetworksVideo Streaming Compression for Wireless Multimedia Sensor Networks
Video Streaming Compression for Wireless Multimedia Sensor Networks
IOSR Journals
 
Delay bounds of chunk based peer-to-peer
Delay bounds of chunk based peer-to-peerDelay bounds of chunk based peer-to-peer
Delay bounds of chunk based peer-to-peer
ambitlick
 
B044060814
B044060814B044060814
B044060814
IJERA Editor
 
3 transport.key
3 transport.key3 transport.key
3 transport.key
Olivier Bonaventure
 
4 network.key
4 network.key4 network.key
4 network.key
Olivier Bonaventure
 
MULTIMEDIA COMMUNICATION & NETWORKS
MULTIMEDIA COMMUNICATION & NETWORKSMULTIMEDIA COMMUNICATION & NETWORKS
MULTIMEDIA COMMUNICATION & NETWORKS
Kathirvel Ayyaswamy
 
Multimedia Networking
Multimedia NetworkingMultimedia Networking
Multimedia Networking
Ahmed Gad
 
5 data link-lan.key
5 data link-lan.key5 data link-lan.key
5 data link-lan.key
Olivier Bonaventure
 
1 introduction.key
1 introduction.key1 introduction.key
1 introduction.key
Olivier Bonaventure
 
Quality of Experience and Quality of Service
Quality of Experience and Quality of ServiceQuality of Experience and Quality of Service
Quality of Experience and Quality of Service
Videoguy
 
Building Cloud-ready Video Transcoding System for Content Delivery Networks (...
Building Cloud-ready Video Transcoding System for Content Delivery Networks (...Building Cloud-ready Video Transcoding System for Content Delivery Networks (...
Building Cloud-ready Video Transcoding System for Content Delivery Networks (...
Zhenyun Zhuang
 
Using Bandwidth Aggregation to Improve the Performance of Video Quality- Adap...
Using Bandwidth Aggregation to Improve the Performance of Video Quality- Adap...Using Bandwidth Aggregation to Improve the Performance of Video Quality- Adap...
Using Bandwidth Aggregation to Improve the Performance of Video Quality- Adap...
paperpublications3
 
IP NETWORKS
IP NETWORKSIP NETWORKS
IP NETWORKS
Kathirvel Ayyaswamy
 
Network Configuration Example: Configuring LDP Over RSVP
Network Configuration Example: Configuring LDP Over RSVPNetwork Configuration Example: Configuring LDP Over RSVP
Network Configuration Example: Configuring LDP Over RSVP
Juniper Networks
 
Analysis of Adaptive Streaming for Hybrid CDN/P2P Live Video Systems
Analysis of Adaptive Streaming for Hybrid CDN/P2P Live Video SystemsAnalysis of Adaptive Streaming for Hybrid CDN/P2P Live Video Systems
Analysis of Adaptive Streaming for Hybrid CDN/P2P Live Video Systems
Kevin Tong
 
Survey paper on Virtualized cloud based IPTV System
Survey paper on Virtualized cloud based IPTV SystemSurvey paper on Virtualized cloud based IPTV System
Survey paper on Virtualized cloud based IPTV System
ijceronline
 
Chapter7 multimedia
Chapter7 multimediaChapter7 multimedia
Chapter7 multimedia
Khánh Ghẻ
 
Vansteen communication
Vansteen communicationVansteen communication
Vansteen communication
gidi899
 

What's hot (20)

Paper id 28201439
Paper id 28201439Paper id 28201439
Paper id 28201439
 
Cg25492495
Cg25492495Cg25492495
Cg25492495
 
Video Streaming Compression for Wireless Multimedia Sensor Networks
Video Streaming Compression for Wireless Multimedia Sensor NetworksVideo Streaming Compression for Wireless Multimedia Sensor Networks
Video Streaming Compression for Wireless Multimedia Sensor Networks
 
Delay bounds of chunk based peer-to-peer
Delay bounds of chunk based peer-to-peerDelay bounds of chunk based peer-to-peer
Delay bounds of chunk based peer-to-peer
 
B044060814
B044060814B044060814
B044060814
 
3 transport.key
3 transport.key3 transport.key
3 transport.key
 
4 network.key
4 network.key4 network.key
4 network.key
 
MULTIMEDIA COMMUNICATION & NETWORKS
MULTIMEDIA COMMUNICATION & NETWORKSMULTIMEDIA COMMUNICATION & NETWORKS
MULTIMEDIA COMMUNICATION & NETWORKS
 
Multimedia Networking
Multimedia NetworkingMultimedia Networking
Multimedia Networking
 
5 data link-lan.key
5 data link-lan.key5 data link-lan.key
5 data link-lan.key
 
1 introduction.key
1 introduction.key1 introduction.key
1 introduction.key
 
Quality of Experience and Quality of Service
Quality of Experience and Quality of ServiceQuality of Experience and Quality of Service
Quality of Experience and Quality of Service
 
Building Cloud-ready Video Transcoding System for Content Delivery Networks (...
Building Cloud-ready Video Transcoding System for Content Delivery Networks (...Building Cloud-ready Video Transcoding System for Content Delivery Networks (...
Building Cloud-ready Video Transcoding System for Content Delivery Networks (...
 
Using Bandwidth Aggregation to Improve the Performance of Video Quality- Adap...
Using Bandwidth Aggregation to Improve the Performance of Video Quality- Adap...Using Bandwidth Aggregation to Improve the Performance of Video Quality- Adap...
Using Bandwidth Aggregation to Improve the Performance of Video Quality- Adap...
 
IP NETWORKS
IP NETWORKSIP NETWORKS
IP NETWORKS
 
Network Configuration Example: Configuring LDP Over RSVP
Network Configuration Example: Configuring LDP Over RSVPNetwork Configuration Example: Configuring LDP Over RSVP
Network Configuration Example: Configuring LDP Over RSVP
 
Analysis of Adaptive Streaming for Hybrid CDN/P2P Live Video Systems
Analysis of Adaptive Streaming for Hybrid CDN/P2P Live Video SystemsAnalysis of Adaptive Streaming for Hybrid CDN/P2P Live Video Systems
Analysis of Adaptive Streaming for Hybrid CDN/P2P Live Video Systems
 
Survey paper on Virtualized cloud based IPTV System
Survey paper on Virtualized cloud based IPTV SystemSurvey paper on Virtualized cloud based IPTV System
Survey paper on Virtualized cloud based IPTV System
 
Chapter7 multimedia
Chapter7 multimediaChapter7 multimedia
Chapter7 multimedia
 
Vansteen communication
Vansteen communicationVansteen communication
Vansteen communication
 

Viewers also liked

Colored Image Watermarking Technique Based on HVS using HSV Color Model
Colored Image Watermarking Technique Based on HVS using HSV Color ModelColored Image Watermarking Technique Based on HVS using HSV Color Model
Colored Image Watermarking Technique Based on HVS using HSV Color Model
IDES Editor
 
Intrusion Detection Using Conditional Random Fields
Intrusion Detection Using Conditional Random FieldsIntrusion Detection Using Conditional Random Fields
Intrusion Detection Using Conditional Random Fields
IDES Editor
 
A Runtime Evaluation Methodology and Framework for Autonomic Systems
A Runtime Evaluation Methodology and Framework for Autonomic SystemsA Runtime Evaluation Methodology and Framework for Autonomic Systems
A Runtime Evaluation Methodology and Framework for Autonomic Systems
IDES Editor
 
An improved Spread Spectrum Watermarking technique to withstand Geometric Def...
An improved Spread Spectrum Watermarking technique to withstand Geometric Def...An improved Spread Spectrum Watermarking technique to withstand Geometric Def...
An improved Spread Spectrum Watermarking technique to withstand Geometric Def...
IDES Editor
 
Chaotic Dynamics of a Third Order PLL with Resonant Low Pass Filter in Face o...
Chaotic Dynamics of a Third Order PLL with Resonant Low Pass Filter in Face o...Chaotic Dynamics of a Third Order PLL with Resonant Low Pass Filter in Face o...
Chaotic Dynamics of a Third Order PLL with Resonant Low Pass Filter in Face o...
IDES Editor
 
Coordinated Multi-Agents Based Patient Scheduling Using Genetic Algorithm
Coordinated Multi-Agents Based Patient Scheduling Using Genetic AlgorithmCoordinated Multi-Agents Based Patient Scheduling Using Genetic Algorithm
Coordinated Multi-Agents Based Patient Scheduling Using Genetic Algorithm
IDES Editor
 
Detecting Original Image Using Histogram, DFT and SVM
Detecting Original Image Using Histogram, DFT and SVMDetecting Original Image Using Histogram, DFT and SVM
Detecting Original Image Using Histogram, DFT and SVM
IDES Editor
 
Near-Far Resistance of MC-DS-CDMA Communication Systems
Near-Far Resistance of MC-DS-CDMA Communication SystemsNear-Far Resistance of MC-DS-CDMA Communication Systems
Near-Far Resistance of MC-DS-CDMA Communication Systems
IDES Editor
 
Face Recognition Using Sign Only Correlation
Face Recognition Using Sign Only CorrelationFace Recognition Using Sign Only Correlation
Face Recognition Using Sign Only Correlation
IDES Editor
 
New Signature Derivation using Existing Signatures
New Signature Derivation using Existing SignaturesNew Signature Derivation using Existing Signatures
New Signature Derivation using Existing Signatures
IDES Editor
 

Viewers also liked (10)

Colored Image Watermarking Technique Based on HVS using HSV Color Model
Colored Image Watermarking Technique Based on HVS using HSV Color ModelColored Image Watermarking Technique Based on HVS using HSV Color Model
Colored Image Watermarking Technique Based on HVS using HSV Color Model
 
Intrusion Detection Using Conditional Random Fields
Intrusion Detection Using Conditional Random FieldsIntrusion Detection Using Conditional Random Fields
Intrusion Detection Using Conditional Random Fields
 
A Runtime Evaluation Methodology and Framework for Autonomic Systems
A Runtime Evaluation Methodology and Framework for Autonomic SystemsA Runtime Evaluation Methodology and Framework for Autonomic Systems
A Runtime Evaluation Methodology and Framework for Autonomic Systems
 
An improved Spread Spectrum Watermarking technique to withstand Geometric Def...
An improved Spread Spectrum Watermarking technique to withstand Geometric Def...An improved Spread Spectrum Watermarking technique to withstand Geometric Def...
An improved Spread Spectrum Watermarking technique to withstand Geometric Def...
 
Chaotic Dynamics of a Third Order PLL with Resonant Low Pass Filter in Face o...
Chaotic Dynamics of a Third Order PLL with Resonant Low Pass Filter in Face o...Chaotic Dynamics of a Third Order PLL with Resonant Low Pass Filter in Face o...
Chaotic Dynamics of a Third Order PLL with Resonant Low Pass Filter in Face o...
 
Coordinated Multi-Agents Based Patient Scheduling Using Genetic Algorithm
Coordinated Multi-Agents Based Patient Scheduling Using Genetic AlgorithmCoordinated Multi-Agents Based Patient Scheduling Using Genetic Algorithm
Coordinated Multi-Agents Based Patient Scheduling Using Genetic Algorithm
 
Detecting Original Image Using Histogram, DFT and SVM
Detecting Original Image Using Histogram, DFT and SVMDetecting Original Image Using Histogram, DFT and SVM
Detecting Original Image Using Histogram, DFT and SVM
 
Near-Far Resistance of MC-DS-CDMA Communication Systems
Near-Far Resistance of MC-DS-CDMA Communication SystemsNear-Far Resistance of MC-DS-CDMA Communication Systems
Near-Far Resistance of MC-DS-CDMA Communication Systems
 
Face Recognition Using Sign Only Correlation
Face Recognition Using Sign Only CorrelationFace Recognition Using Sign Only Correlation
Face Recognition Using Sign Only Correlation
 
New Signature Derivation using Existing Signatures
New Signature Derivation using Existing SignaturesNew Signature Derivation using Existing Signatures
New Signature Derivation using Existing Signatures
 

Similar to Optimal Streaming Protocol for VoD Using Clients' Residual Bandwidth

Simulation Study of Video Streaming in Multi-Hop Network
Simulation Study of Video Streaming in Multi-Hop NetworkSimulation Study of Video Streaming in Multi-Hop Network
Simulation Study of Video Streaming in Multi-Hop Network
International Journal of Engineering Inventions www.ijeijournal.com
 
F04024549
F04024549F04024549
Live multimedia streaming and video on demand issues and challenges
Live multimedia streaming and video on demand issues and challengesLive multimedia streaming and video on demand issues and challenges
Live multimedia streaming and video on demand issues and challenges
eSAT Journals
 
An SDN Based Approach To Measuring And Optimizing ABR Video Quality Of Experi...
An SDN Based Approach To Measuring And Optimizing ABR Video Quality Of Experi...An SDN Based Approach To Measuring And Optimizing ABR Video Quality Of Experi...
An SDN Based Approach To Measuring And Optimizing ABR Video Quality Of Experi...
Cisco Service Provider
 
Iaetsd adaptive and well-organized mobile video streaming public
Iaetsd adaptive and well-organized mobile video streaming publicIaetsd adaptive and well-organized mobile video streaming public
Iaetsd adaptive and well-organized mobile video streaming public
Iaetsd Iaetsd
 
A NOVEL ADAPTIVE CACHING MECHANISM FOR VIDEO ON DEMAND SYSTEM OVER WIRELESS M...
A NOVEL ADAPTIVE CACHING MECHANISM FOR VIDEO ON DEMAND SYSTEM OVER WIRELESS M...A NOVEL ADAPTIVE CACHING MECHANISM FOR VIDEO ON DEMAND SYSTEM OVER WIRELESS M...
A NOVEL ADAPTIVE CACHING MECHANISM FOR VIDEO ON DEMAND SYSTEM OVER WIRELESS M...
IJCNCJournal
 
PEER-TO-PEER INTERACTIVE VOD STREAMING USING NCECD
PEER-TO-PEER INTERACTIVE VOD  STREAMING  USING NCECDPEER-TO-PEER INTERACTIVE VOD  STREAMING  USING NCECD
PEER-TO-PEER INTERACTIVE VOD STREAMING USING NCECD
JayanthGubbi
 
A FRAMEWORK FOR MOBILE VIDEO STREAMING AND VIDEO SHARING IN CLOUD
A FRAMEWORK FOR MOBILE VIDEO STREAMING AND VIDEO SHARING IN CLOUDA FRAMEWORK FOR MOBILE VIDEO STREAMING AND VIDEO SHARING IN CLOUD
A FRAMEWORK FOR MOBILE VIDEO STREAMING AND VIDEO SHARING IN CLOUD
Journal For Research
 
Reliable content video streaming services for p2 p networks
Reliable content video streaming services for p2 p networksReliable content video streaming services for p2 p networks
Reliable content video streaming services for p2 p networks
JayanthGubbi
 
An Overview on Multimedia Transcoding Techniques on Streaming Digital Contents
An Overview on Multimedia Transcoding Techniques on Streaming Digital ContentsAn Overview on Multimedia Transcoding Techniques on Streaming Digital Contents
An Overview on Multimedia Transcoding Techniques on Streaming Digital Contents
idescitation
 
P2P Video-On-Demand Systems
P2P Video-On-Demand SystemsP2P Video-On-Demand Systems
P2P Video-On-Demand Systems
Ashwini More
 
The impact of jitter on the HEVC video streaming with Multiple Coding
The impact of jitter on the HEVC video streaming with  Multiple CodingThe impact of jitter on the HEVC video streaming with  Multiple Coding
The impact of jitter on the HEVC video streaming with Multiple Coding
HakimSahour
 
VoD Solutions
VoD SolutionsVoD Solutions
VoD Solutions
Infosys
 
A Benchmark to Evaluate Mobile Video Upload to Cloud Infrastructures
A Benchmark to Evaluate Mobile Video Upload to Cloud InfrastructuresA Benchmark to Evaluate Mobile Video Upload to Cloud Infrastructures
A Benchmark to Evaluate Mobile Video Upload to Cloud Infrastructures
University of Southern California
 
[32]
[32][32]
[32]
Videoguy
 
Analyzing Video Streaming Quality by Using Various Error Correction Methods o...
Analyzing Video Streaming Quality by Using Various Error Correction Methods o...Analyzing Video Streaming Quality by Using Various Error Correction Methods o...
Analyzing Video Streaming Quality by Using Various Error Correction Methods o...
IJERA Editor
 
Delay Efficient Method for Delivering IPTV Services
Delay Efficient Method for Delivering IPTV ServicesDelay Efficient Method for Delivering IPTV Services
Delay Efficient Method for Delivering IPTV Services
IJERA Editor
 
ADVANCES IN CHANNEL-ADAPTIVE VIDEO STREAMING
ADVANCES IN CHANNEL-ADAPTIVE VIDEO STREAMINGADVANCES IN CHANNEL-ADAPTIVE VIDEO STREAMING
ADVANCES IN CHANNEL-ADAPTIVE VIDEO STREAMING
Videoguy
 
Dmms
DmmsDmms
Optimizing cloud resources for delivering iptv services through virtualization
Optimizing cloud resources for delivering iptv services through virtualizationOptimizing cloud resources for delivering iptv services through virtualization
Optimizing cloud resources for delivering iptv services through virtualization
JPINFOTECH JAYAPRAKASH
 

Similar to Optimal Streaming Protocol for VoD Using Clients' Residual Bandwidth (20)

Simulation Study of Video Streaming in Multi-Hop Network
Simulation Study of Video Streaming in Multi-Hop NetworkSimulation Study of Video Streaming in Multi-Hop Network
Simulation Study of Video Streaming in Multi-Hop Network
 
F04024549
F04024549F04024549
F04024549
 
Live multimedia streaming and video on demand issues and challenges
Live multimedia streaming and video on demand issues and challengesLive multimedia streaming and video on demand issues and challenges
Live multimedia streaming and video on demand issues and challenges
 
An SDN Based Approach To Measuring And Optimizing ABR Video Quality Of Experi...
An SDN Based Approach To Measuring And Optimizing ABR Video Quality Of Experi...An SDN Based Approach To Measuring And Optimizing ABR Video Quality Of Experi...
An SDN Based Approach To Measuring And Optimizing ABR Video Quality Of Experi...
 
Iaetsd adaptive and well-organized mobile video streaming public
Iaetsd adaptive and well-organized mobile video streaming publicIaetsd adaptive and well-organized mobile video streaming public
Iaetsd adaptive and well-organized mobile video streaming public
 
A NOVEL ADAPTIVE CACHING MECHANISM FOR VIDEO ON DEMAND SYSTEM OVER WIRELESS M...
A NOVEL ADAPTIVE CACHING MECHANISM FOR VIDEO ON DEMAND SYSTEM OVER WIRELESS M...A NOVEL ADAPTIVE CACHING MECHANISM FOR VIDEO ON DEMAND SYSTEM OVER WIRELESS M...
A NOVEL ADAPTIVE CACHING MECHANISM FOR VIDEO ON DEMAND SYSTEM OVER WIRELESS M...
 
PEER-TO-PEER INTERACTIVE VOD STREAMING USING NCECD
PEER-TO-PEER INTERACTIVE VOD  STREAMING  USING NCECDPEER-TO-PEER INTERACTIVE VOD  STREAMING  USING NCECD
PEER-TO-PEER INTERACTIVE VOD STREAMING USING NCECD
 
A FRAMEWORK FOR MOBILE VIDEO STREAMING AND VIDEO SHARING IN CLOUD
A FRAMEWORK FOR MOBILE VIDEO STREAMING AND VIDEO SHARING IN CLOUDA FRAMEWORK FOR MOBILE VIDEO STREAMING AND VIDEO SHARING IN CLOUD
A FRAMEWORK FOR MOBILE VIDEO STREAMING AND VIDEO SHARING IN CLOUD
 
Reliable content video streaming services for p2 p networks
Reliable content video streaming services for p2 p networksReliable content video streaming services for p2 p networks
Reliable content video streaming services for p2 p networks
 
An Overview on Multimedia Transcoding Techniques on Streaming Digital Contents
An Overview on Multimedia Transcoding Techniques on Streaming Digital ContentsAn Overview on Multimedia Transcoding Techniques on Streaming Digital Contents
An Overview on Multimedia Transcoding Techniques on Streaming Digital Contents
 
P2P Video-On-Demand Systems
P2P Video-On-Demand SystemsP2P Video-On-Demand Systems
P2P Video-On-Demand Systems
 
The impact of jitter on the HEVC video streaming with Multiple Coding
The impact of jitter on the HEVC video streaming with  Multiple CodingThe impact of jitter on the HEVC video streaming with  Multiple Coding
The impact of jitter on the HEVC video streaming with Multiple Coding
 
VoD Solutions
VoD SolutionsVoD Solutions
VoD Solutions
 
A Benchmark to Evaluate Mobile Video Upload to Cloud Infrastructures
A Benchmark to Evaluate Mobile Video Upload to Cloud InfrastructuresA Benchmark to Evaluate Mobile Video Upload to Cloud Infrastructures
A Benchmark to Evaluate Mobile Video Upload to Cloud Infrastructures
 
[32]
[32][32]
[32]
 
Analyzing Video Streaming Quality by Using Various Error Correction Methods o...
Analyzing Video Streaming Quality by Using Various Error Correction Methods o...Analyzing Video Streaming Quality by Using Various Error Correction Methods o...
Analyzing Video Streaming Quality by Using Various Error Correction Methods o...
 
Delay Efficient Method for Delivering IPTV Services
Delay Efficient Method for Delivering IPTV ServicesDelay Efficient Method for Delivering IPTV Services
Delay Efficient Method for Delivering IPTV Services
 
ADVANCES IN CHANNEL-ADAPTIVE VIDEO STREAMING
ADVANCES IN CHANNEL-ADAPTIVE VIDEO STREAMINGADVANCES IN CHANNEL-ADAPTIVE VIDEO STREAMING
ADVANCES IN CHANNEL-ADAPTIVE VIDEO STREAMING
 
Dmms
DmmsDmms
Dmms
 
Optimizing cloud resources for delivering iptv services through virtualization
Optimizing cloud resources for delivering iptv services through virtualizationOptimizing cloud resources for delivering iptv services through virtualization
Optimizing cloud resources for delivering iptv services through virtualization
 

More from IDES Editor

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
IDES Editor
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
IDES Editor
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
IDES Editor
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
IDES Editor
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
IDES Editor
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
IDES Editor
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
IDES Editor
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
IDES Editor
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
IDES Editor
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
IDES Editor
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
IDES Editor
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
IDES Editor
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
IDES Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
IDES Editor
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
IDES Editor
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
IDES Editor
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
IDES Editor
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
IDES Editor
 

More from IDES Editor (20)

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
 

Recently uploaded

9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
saastr
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Precisely
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Pitangent Analytics & Technology Solutions Pvt. Ltd
 

Recently uploaded (20)

9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
 

Optimal Streaming Protocol for VoD Using Clients' Residual Bandwidth

  • 1. ACEEE International Journal on Signal and Image Processing Vol 1, No. 1, Jan 2010 Optimal Streaming Protocol for VoD Using Clients' Residual Bandwidth R.Ashok Kumar1, K.Hareesh2, K.Ganesan3, D.H Manjaiah4 1 Research Scholar, School of Computing Sciences, VIT University, Vellore, India. 2 Assistant Professor, Department of Computer Science & Engg., BMSIT, Bangalore, India. 3 Senior Professor, School of Computing Sciences, VIT University, Vellore, India. 4 Reader & Chairman, Department of Computer Sciences, Mangalore University, Mangalore, India. rak_bms@hotmail.com1,mail_hareeshk@yahoo.com2, kganesan@vit.ac.in3,ylm321@yahoo.co.in4 • Level I has the main server with an optic fibre channel having Abstract-A true VoD system has tremendous demand in the a bandwidth in the range of 2 Gbps. market. The existing VoD system does not cater the needs • Level II has a cluster of proxy servers that are connected to and demands of the market. The major problem in the VoD system is serving of clients with expected QoS is difficult. In the server at one end and to the clients at the other end. The this paper, we proposed a protocol and algorithm that connection on the server side is an optic fibre channel and that chains the proxy servers and subscribed clients. Our on the client side is a low bandwidth network that provides a objective is to send one server stream and this stream should bandwidth of 2 Mbps. be served to N asynchronous clients. The server bandwidth • Level III has the set of clients that are served by the proxy and is scarcity and on the client uplink bandwidth is in turn by the server. underutilized. In this protocol, we are using client’s residual When the client requests for a video from the proxy that bandwidth such that the load on the server bandwidth is serves the client. This proxy in turn requests the server for the reduced. We have proved that optimal utilization of the particular video. The server then streams the video to the proxy buffer and bandwidth for the entire VoD system and also and this is further streamed to the client. less rejection ratio of the clients. Whenever a video that is already being streamed to some Index Terms- Video-on-Demand (VoD), Quality of Service client is requested the server streams it again, thereby streaming (QoS), Chaining, Segment, Bandwidth the same video to different clients and using twice the bandwidth for the same video file. The server bandwidth is of great importance in the network and the streaming of the same I. INTRODUCTION video twice hinders the optimal utilisation of the server bandwidth. On the other hand the uplink bandwidth on the With internet reaching out to a global audience today, people clients’ side is under-utilised. Providing a protocol for the are expecting and extracting a lot of new features and facilities optimal streaming of the videos using the clients’ residual from it, IPTV being one of them. IPTV provides a lot of (uplink) bandwidth and hence reducing the load on the client features that conventional cable television fails to provide, such constitutes our objective in this paper. as high definition video quality and VCR functions like pause, fast forward, rewind, etc. Another important aspect that makes IPTV so popular and better than conventional cable television is II. REVIEW OF LITERATURE Video on Demand (VoD). VoD involves, streaming video files from a remote server to the client systems on an individual The VOD streaming has attracted quite a few researchers; basis. This involves streaming of videos requested by the clients some of the previous works have been reviewed here. There specifically to them. This provides a certain kind of customized have been two kinds of works in this regard. They are: viewing option that is absent in regular cable TV. The client requests for a particular video on a VoD server and the request Building of Streaming servers is processed and served by the server. Protocol and architecture related works Since we are proposing a protocol we intend to concentrate more on the Protocol and Architecture related works. There Through VoD, the video can be viewed as it is being have been quite a few innovative techniques and protocols downloaded from the server. Along with this the VCR functions proposed in this field. In prefix caching [2] concentrates more provide an extra edge over conventional television, letting the on the storage problems related to proxy servers, but in the user decide when and how to watch the video. current era where memory is cheap and easily available the significance of prefix caching lessens. The implementation of VoD requires a high bandwidth network framework consisting of a server that has sufficient In optimized distributed delivery [3] method a single storage capacity to store video files. multimedia file is split up and sent in parts from different servers. Effectively this is like multiple servers serving multiple IPTV generally uses HDTV videos and hence the servers clients. The drawback in this system is that it is very expensive need to have large storage capacities to store the video files. to maintain multiple servers and the server bandwidth is of great This constitutes one of the main requirements of a VoD value. network. Using MPEG standards the bandwidth required is 2133 Mbps. Maintaining such a high bandwidth requires a high In hybrid model [4] uses multiple clients called peers - lend bandwidth network. This makes the service expensive and or contribute their resources to the network and serve their impractical to implement from the client's side. To overcome peers. The model optimally uses all the network resources and these drawbacks the network is implemented in three levels. provides very good service but the major drawback is that the model is too complex to implement. The protocol requires the 22 © 2010 ACEEE DOI: 01.ijsip.01.01.05
  • 2. ACEEE International Journal on Signal and Image Processing Vol 1, No. 1, Jan 2010 service of each and every peer and hence the service becomes B. Algorithm less reliable. The protocol proposed in this paper overcomes all The algorithms that are required to implement the above the drawbacks and limitations of the above mentioned protocol are as follows: protocols. CHAINING ALGORITHM Nomenclature:  III. SYSTEM ARCHITECTURE C= {C1, C2, C3, C4…..Cm}, Active clients  The structure of the network assumed in our protocol is as P= {P1, P2, P3, P4……..Pn}, Active Proxies  shown in Fig.1.The network architecture consists of a Main Ci →Client address   Server at the top of the hierarchy. This is followed by a cluster Pi →Proxy address  of Proxy servers that act as an interface between the clients and Bi →Buffer size used in client Ci    the Server. Each Proxy can be thought of as a regional server b= {(µ1, θ1), (µ2, θ2)… (µi, θi)}, b is a list containing µi and θi  that serves a set of clients that belong to a particular region. One where µi is MovieId , θi is popularity.  of the aspects of having proxy servers is that the probability of D {i, j} →Distance between Client Ci and Cj  two clients requesting the same video is more in a given region. µ→ MovieId (Request Id)  ηi→ Uplink of client Ci  R = { r1, r2, r3……rk}, A list containing current streaming request.  Bi→ Proxy Pi‘s current Bandwidth  β→Maximum allowable buffer size of proxy P  Sr→ Requested segment  Si→ Segment number i  Q→A circular queue in client holding received segments    Proxy  Upon receiving request from client Ci  1 if µ in R then  Fig. 1: Network architecture 2 find j such that (cost[i] → D {i, j}/ ηi      At the same time, the more popular the video, the more the                                 D {i, p} / Bi, where rj→µ  probability of a client requesting the same video. Hence the 3 if ∃ some j such that Cj є C       number of clients requesting for the video will be more. Thus if 4        chain client Ci to Cj   the Server satisfies each and every request for the same video, 5        θi →θi+1, where ri→ µ     the server bandwidth is not optimally utilised. In order to avoid 6 else  this, these popular videos may be stored in the Proxy buffer and 7   if µ in b then    streamed as and when the client requests for it. Since the 8      initiate new stream ri to client Ci,  popularity is region dependent, each proxy buffer contains the         R=R U {ri}  videos that are popular in a given region and the videos can be streamed directly. 9      θi →θi+1, where ri→ µ     The videos are stored dynamically, that is if the popularity of 10 else  a particular video drops, the video is automatically deleted from 11    send request rk→ µ to server  the proxy buffer giving way to some other more popular video. 12    receive segments from server  The popularity is based on the number of hits that occur for a 13 if maxsize{b} > β  particular video. The above mentioned parameters constitute the 14      replace (µk, θk) in b with (µl, θl)   essential requirements for the proposed protocol.           where θk< θj  ∀ j  The optimal utilisation of the server bandwidth is The above mentioned algorithm is the proxy server implemented using “Chaining”. When a video is requested by a algorithm. The Proxy server waits for movie requests from the client, the request is redirected to another client who already clients. Whenever a request is received, the proxy checks if the contains the same video in its buffer, instead of being served by movie requested is being streamed to any client. the server or the proxy. This process is called “Chaining”. This reduces the load on the proxy and, the main server. If so the “cost of chaining” is calculated and compared with that of streaming without chaining and the most economical A. Proposed Protocol method is chosen. If Chaining is feasible then the client is Fig. 2 shows the protocol followed in this implementation. redirected to the client that has the same video in its buffer. In When a connection is established between the client and the case chaining is not a feasible option then proxy buffer is server, the client sends a “HELO” message to the server. When checked for the movie requested. If found the movie is the server receives this “HELO” message, it requests the client transmitted by allocating a new stream to the client. In case the for the “MovieID”. In response the client sends the Movie ID to movie is not found in the proxy buffer, the request is redirected the server. On receiving the Movie ID, the server sends a to the main server. "REDY" message to the client and waits for client's response. The client sends an “OK” message to the server indicating that it is ready to receive the movie. Once the server receives the The client requests for a video from the proxy server. If the "OK" message the server starts streaming the movie, segment proxy is ready to stream, the client receives an by segment. For each segment the client receives, it sends an acknowledgement “SIG_READY” message. Then the movie is acknowledgement (“OK” message) to the server. The server streamed from the proxy, segment by segment, to the client. In sends the next segment only after receiving an case the movie is being streamed to some other client, the acknowledgement from the client. address of that client is sent from the proxy in the “SIG_CHAINTO” message, and the stream is transmitted from To illustrate, when the proxy-server is streaming a movie to the peer client. When a client receives a Movie ID and an Client-i, suppose Client-j requests for the same movie, then the request of Client-j is forwarded to Client-i. Now the Client-i uses its up-link bandwidth to stream the same movie to Client-j, thus taking the load off the server. 23 © 2010 ACEEE DOI: 01.ijsip.01.01.05
  • 3. ACEEE International Journal on Signal and Image Processing Vol 1, No. 1, Jan 2010 Fig. 3: Number of clients and Number of Streams v/s time This is because the proxy or the server serves the clients only till all the popular videos have been cached in at least one place. Later on the videos are chained from these places. The graph in Fig. 4 shows the number of requests /streams with respect to time. In this case the requested video is very popular and hence with time the number of requests for the video is increased. We can observe that as the number of requests increases, the number of active chains also increases. Figure 2: Protocol address from the proxy, then the client starts streaming the movie in its buffer to the address mentioned, thereby contributing to the chain. If the requested movie is not in the buffer then the request is simply rejected. Client  Send a request ri to proxy Pj  Upon receiving SIG_READY from Pj  1 Receive segment So from Pi,Q= Q U {So}  2 cptr=0,i=0  Fig. 4: Number of streams VS time 3 if Bi < size(Si)  4     Q= Q ‐ {Sin}  Initially the video is present in very few clients, who are 5     Q= Q U {Si}  scattered in different locations. Hence the more number of 6     cptr →cptr+1  active chains have to be created in order to serve the requests.        Upon receiving SIG_CHAINTO  But as the requests are served, the number of clients that have 7 If Sr in Q the video will grow. Once more clients possess the video, the 8     stream the segments Sr to Sn  number of active chains gradually decreases. The same is the 9 else  case with the streams allocated for the video in the server as 10 reject  shown in the graph. But the number of streams is always less IV. SIMULATION AND RESULTS than the number of active chains ( as seen in the graph, the no . of streams is always below the number of active chains ) The following are the assumptions made in the simulation because of the chaining. The chaining reduces the number of model: It consists of a single server, 5 proxy servers and 80 streams from the server and hence the server bandwidth is clients. The server had 20 movies each of size 4.9 MB. The conserved. proxy buffer was large enough to hold 50% of the data on the server .i.e. effectively 10 movies. The server to proxy bandwidth is 2 Gbps and the proxy to client bandwidth is 2Mbps. The uplink bandwidth of the client is 256kbps. The graph shown in Fig. 3 is the combined graph of “Number of clients’ v/s Time” and the “Number of streams v/s Time”. We can observe that as time increases the number of clients increase. But as the number clients increases we can observe that the number of streams increases initially and then decreases gradually. Fig. 5: Rejection ratio with time The graph in Fig.5 shows Rejection Ratio with respect to time. The rejection ratio is defined as the ratio of the number of rejected requests to the number of active chains. It represents the fact that the client requests are rejected even though there is a possibility of chaining. This happens because even though the chaining is possible the cost of chaining exceeds the actual cost of streaming. The ratio is around 0.9 initially since the 24 © 2010 ACEEE DOI: 01.ijsip.01.01.05
  • 4. ACEEE International Journal on Signal and Image Processing Vol 1, No. 1, Jan 2010 numberof clients possessing the video is small and scattered. involved in a chain, breaks, our algorithm does not provide a But as the number of clients that possess the video increase the mechanism to overcome the drawback. rejection ratio comes down rapidly as shown in the graph. We can observe that the bandwidth initially increases with time and REFERENCES then peaks at a point and then reduces gradually to some [1] Te-Chou Su, Shih-Yu Huang, Chen-Lung Chan, and Jia- constant value. Shung Wang, Optimal Chaining Scheme for Video-on-Demand Applications on Collaborative Networks, IEEE Transactions Initially the number of requests that arrive have to be served on Multimedia, Vol. 7, No. 5, October 2005. by the server itself because the number of clients that possess [2] Bing Wang, Subhabrata Sen, Micah Adler, and Don the video is small, as shown in the previous graph of the Towsley, Optimal Proxy Cache Allocation for Efficient rejection ratio. Streaming Media Distribution, IEEE Transactions on Multimedia, Vol. 6, No. 2, April 2004. [3] Gerassimos Barlas and Bharadwaj Veeravalli, Optimized Distributed Delivery of Continuous-Media Documents over Unreliable Communication Links, IEEE. Transactions on Parallel and Distributed Systems, Vol. 16, No. 10, October 2005 [4] Mohamed Hafeeda and Bharat Bhargava, A Hybrid Architecture for Cost Effective On-Demand Media Streaming, FTDCS 2003. [5] K. A. Hua, S. Sheu, and J. Z. Wang Earthworm: a network memory management technique for large-scale distributed multimedia applications, in Proc. IEEE Infocom’97, vol.3, Fig. 6: Bandwidth utilization with time Kobe, Japan, Apr. 1997. [6] J. K. Chen and J. L. C. Wu, Adaptive chaining scheme for distributed VOD applications, IEEE Trans. Broadcast., vol. 45, But once the chaining process is activated the bandwidth no. 2, pp. 215–224, Jun. 1999. used of the server is reduced and hence the burden on the server [7] Te-Chou Su, Shih-Yu Huang, Chen Lung Chan, and Jia- is reduced to a great extent. Shung Wang, Optimal Chaining Scheme for Video-on-Demand Applications on Collaborative Networks ,IEEE Trans. multimedia, vol. 7, no. 5, October 2005. [8]Hyunjoo Kim and Heon Y. Yeom, P-chaining: a practical VoD service scheme autonomically handling interactive operations, Multimedia Tools Appl, Springer Science, Business Media, LLC 2007. [9] Frederic Thouin and Mark Coates, McGill University, Video- on- Demand Networks: Design Approaches and Future Challenges, IEEE Network, March/April 2007. [10] Mohamed Hefeeda & Bharat Bhargava, A Hybrid Fig. 7: Buffer utilization Architecture for Cost-Effective On-Demand Media Streaming, Purdue University FTDCS 2003. The buffer utilization graph shown in Fig. 7 shows the client [11] Rocha M ,Maia M , Cunha I, Almeida J, Campos S, buffer utilized. Without chaining we can observe that the buffer Scalable media streaming to interactive users, Proc. ACM utilization is erratic and decreases drastically with time. But Multimedia, pp 966–975, November 2005. with chaining we can observe that the buffer utilization is [12] Schultz JJ, Znati T, An efficient scheme for chaining initially high and then reaches the peak and then falls down with client-centric buffer reservation for multi-media streaming, gradually. The peak represents the peak of the chaining process. Proc. of the 36th Annual Simulation Symposium (ANSS’03), pp After the completion of the chaining and the after the video has 31–38,2003 been fully watched by the client the buffer utilization falls; this is the dip in the graph. V. CONCLUSION In this paper we have proposed a protocol for optimal streaming using the chaining process and clients' residual bandwidth. Through simulation we have proved the advantages of using this protocol in the real world environment. The protocol uses the clients' uplink bandwidth, the server bandwidth is optimised and also the clients uplink bandwidth that was previously under used is well utilised. We intend to build on the current system and make some improvements to make the rejection ratio even lesser as future enhancements. This will include procedures that will consider the popularity and the cost of streaming, in order to dynamically maintain the videos in the proxy and the servers. The algorithms used in this protocol are not equipped to handle fault tolerance. In case the connection between any two clients, which are 25 © 2010 ACEEE DOI: 01.ijsip.01.01.05