Peer to Peer Video on Demand Architecture using V-Chaining
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2012, Vol 3, Issue 2
Abstract
In the Internet, video streaming requires greater amount of network bandwidth and other resources as the number of user requests increases. In case of traditional centralized directory server approach all the users requests are directly handled by the centralized server and each user request will send dedicated stream by the server, which requires higher end server, server cost will become more and greater amount of network bandwidth utilized by this server. To solve these problems peer to peer technology as emerged for the distribution of video streams to the larger requests over the network. In P2P VoD architecture adopted both the peer to peer and proxy based architectural design of a VOD system for larger community of users over the network. Hence our proposed Peer to Peer Video on Demand Architecture using V-Chaining improves the overall performance of the system by efficient utilization of uplink bandwidth and smaller amount of buffer space among the peers. In this paper we have introduce architecture for handle the large number of user requests over the communication network and ease of implementation.
Authors and Affiliations
Hareesh K, Manjaiah D. H
Enhancing Cloud Computing Security by Using Pixel Key Pattern
Cloud is a term used as a metaphor for the wide area networks (like internet) or any such large networked environment. It came partly from the cloud-like symbol used to represent the complexities of the networks in the s...
CLOUD COMPUTING
Cloud computing is the delivery of computing as a service rather than a product, whereby shared resources, software, and information are provided to computers and other devices as a utility (like the electricity grid) ov...
A View of Cloud Computing
In this work we strive to frame the full space of cloud-computing security issues, attempting to separate justified concerns from possible over-reactions. We examine contemporary and historical perspectives from industry...
Intergenerational relations: the use of technology as a mediator
The social dynamics of today provide greater proximity between people belonging to different generations, diluting the differences among the large volume of innovations, whether technological or cultural that are produce...
MESSAGE GUIDED RANDOM AUDIO STEGANOGRAPHY USING MODIFIED LSB TECHNIQUE
Steganography is the science of hiding secret data in such a way that its presence can't be noticed. Techniques which hide more secret data in cover files and which doesn't affect transparency of cover signal are better...