Achieving Optimal DoS Resistant P2P Topologies for Live Multimedia Streaming using Cost function Algorithm
Journal Title: International Journal of Engineering, Science and Mathematics - Year 2012, Vol 2, Issue 1
Abstract
The peer-to-peer approach for live multimedia streaming applications offers the promise to obtain a highly scalable, decentralized, and robust distribution service. When constructing streaming topologies, however, specific care has to be taken in order to ensure that quality of service requirements in terms of delay, jitter, packet loss, and stability against deliberate denial of service attacks are met. In this paper, we concentrate on the latter requirement of stability against denial-of-service attacks. We present an analytical model to assess the stability of overlay streaming topologies and describe attack strategies. Building on this, we describe topologies, which are optimally stable toward perfect attacks based on global knowledge, and give a mathematical proof of their optimality. The formal construction and analysis of these topologies using global knowledge lead us to strategies for distributed procedures, which are able to construct resilient topologies in scenarios, where global knowledge can not be gathered. Experimental results show that the topologies created in such a real-world scenario are close to optimally stable toward perfect denial of service attacks.
Authors and Affiliations
A. L. Srinivasulu, S. Jaya Bhaskar, Ms. K. Deepthi and Dr. Sudarson Jena
Software Metrics- Usability and evaluation of software Quality
This research explains the results of a conducted study at consultancy of “usability”. This research about usability provides that the performance of the usability activities is very much profitable within a software d...
SAP - A simple way for optimal utilization of resources.
ERP Enterprise Resource Planning, used to plan our resources in order to get good profits with less effort. A sound foundation is necessary to compete and win the global marketplace. The SAP ERP application supports th...
Evaluating the Effectiveness of Educational Institutions Using Frontier Analysis
The higher education system has been experimenting with management approaches to deal with challenges arising from both internal as well as external factors. In this context, it is absolutely essential to assess the qu...
MULTI-TIER MANET’S
While mobile ad-hoc networking (MANET) research has received a considerable attention in recent years, the majority of them have focused on single-tier (e.g., ground) and homogeneous (e.g., same radio for every node) M...
An Integrated Cryptographic Algorithm based on Biometric Features
Biometric cryptography is a technique using biometric features to encrypt the data which can improve the security of the encrypted data and can overcome the shortcomings of the traditional cryptography. Biometric featu...