研究生: |
游勁秋 Chin-Chiu Yu |
---|---|
論文名稱: |
運用點對點網路傳輸之影像廣播系統實作 Implementation of a IP Video BroadcastingSystem on P2P Network |
指導教授: |
陳建中
Jiann-Jone Chen |
口試委員: |
蘇順豐
Shun-Feng Su 蔡超人 Chau-Ren Tsai 鍾聖倫 Sheng-Luen Chung 張峯誠 none |
學位類別: |
碩士 Master |
系所名稱: |
電資學院 - 電機工程系 Department of Electrical Engineering |
論文出版年: | 2010 |
畢業學年度: | 98 |
語文別: | 中文 |
論文頁數: | 79 |
中文關鍵詞: | P2P 、Streaming 、IPTV 、ALM |
外文關鍵詞: | P2P, Streaming, IPTV, ALM |
相關次數: | 點閱:208 下載:3 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
在傳統主從式(Server/Client)網路架構中,多媒體串流廣播服務所需要的網路頻寬較大,儘管伺服器端網路傳輸頻寬再大,但往往受限於客戶端同時連線的節點數目增加影響,伺服器端網路容易出現壅塞現象,故客戶端無法接收到一定品質的多媒體串流服務。雖然IP-Multicast協定可以降低伺服器端網路頻寬供給的需求,但在現實網路中,為了防止濫用網路服務和惡意網路攻擊,大部分路由器都關閉IP-Multicast協定的支援。而使用應用層群播(Application Layer Multicast, ALM)方式傳輸是解決這問題的另一途徑。本論文主要在利用ALM網路群播方式,設計並實作一點對點網路影像廣播系統名為Peer to Peer Internet Protocol Video Broadcasting System,簡稱IPVB。該系統利用點對點網路技術優點建構一串流群播樹,充份利用客戶端節點的網路資源來分散伺服器因客戶端節點同時連線數目過多時所造成的沉重負荷,使得所有客戶端節點皆可接收一定品質的多媒體串流服務。另外又針對串流廣播的數位內容,設計相關資訊安全保護機制如數位權利管理(Digital Rights Management, DRM)對使用者身份認證管理、通用加擾演算法(Common Scrambling Algorithm, CSA)對串流中的資訊予以加擾保護等。
In traditional Server and Client network architectures, multimedia streaming
service needs a large of network bandwidth for a better quality of service. Despite a large network bandwidth at server side, the effective network bandwidth could be consumed quickly when a large number of client nodes simultaneously connect to the server. So the client nodes are not guaranteed to receive a certain quality of multimedia streaming services. In general, IP-Multicast protocol can alleviate the demands of network bandwidth of server side; however in real networks, in order to prevent abuse of network services and malicious network attacks, most routers are limited to closed IP-Multicast protocol support. An alternative to solve this problem is the way of Application Layer Multicast transmission. Based on the network multicast technology of Application Layer Multicast, this thesis designs and implements of a P2P network video broadcasting system, called IPVB. Utilizing the benefits of P2P networking technology to construct a streaming multicast tree, this system takes full advantage of the network resources of client nodes to spread the heavy load of server when an excessive number of connections from client nodes are occur. As a result, all client nodes could receive certain quality multimedia streaming services. The system has an additional of advantage of security protection mechanisms for streaming digital content such as user authentication and streaming information scrambling protection.
[1] Cachelogic Research, http://www.cachelogic.com/research/slide1.php
[2] T. Wiegand, G. J. Sullivan, G. Bjøntegaard and A. Luthra, Overview of the H.264/AVC video coding standard, IEEE Trans. Circuits Systems Video Technology, vol. 13, no. 7, pp. 560-576, July 2003.
[3] G. J. Sullivan and T. Wiegand,“Video compression-from concepts to the H.264/AVC standard,”Proceedings of the IEEE, vol. 93, no. 1, pp. 18-31, Jan. 2005.
[4] D. Marpe, T. Wiegard, and G. J. Sullivan,“The H.264/MPEG4 advanced video coding standard and its applications,”IEEE Communications Magazine, vol. 44,
no.8, pp. 134-143, Aug. 2006.
[5] T. Wiegard and G. J. Sullivan,“The H.264/AVC video coding standard,”IEEE Signal Processing Magazine, vol. 24, no. 2, pp. 148-153, Mar. 2007.
[6] B. Pourebrahimi, K. Bertels and S. Vassiliadis, “A survey of Peer-to-Peer networks,”the 16th Annual Workshop on Circuits, 2005.
[7] Napster, http://www.napster.com
[8] Gnutella Forums, http://www.gnutellaforums.com/
[9] M. Ripeanu, I. Foster and A. Iamnitchi,“Mapping the gnutella network: properties of large-scale peer-to-peer systems and implications for system design,”IEEE
Internet Computing Journal, 6(1), 2002.
[10] Freenet, http://freenetproject.org/index.html
[11] I. Clarke, O. Sandberg, B. Wiley and T. W. Hong, eenet: a distributed anonymous information storage and retrieval system,”Lecture Notes in Computer
Science, 2009:46+,2001.
[12] Kazaa, http://www.kazaa.com
[13] N. S. Good and A. Krekelberg,“Usability and privacy: a study of kazaa p2p file-sharing,”In CHI ’03: Proceedings of the conference on Human factors in computing systems, pages 137–144, ACM Press, 2003.
[14] Chord, http://pdos.csail.mit.edu/chord/
[15] I. Stoica, R. Morris, D. Karger, F. Kaashoek and H. Balakrishnan,“Chord: a scalable peer-to-peer lookup service for internet applications,”in Proc. ACM
SIGCOMM Conference, pp. 149-160, 2001.
[16] IRIS, http://project-iris.net/
[17] S. Ratnasamy, P. Francis, M. Handley, R. Karp and S. Shenker, "A scalable content addressable network," 2000.
[18] Tapestry project, http://current.cs.ucsb.edu/projects/chimera/
[19] B. Y. Zhao, L. Huang, J. Stribling, S. C. Rhea, A. D. Joseph and J. D. Kubiatowicz,“Tapestry: A Resilient Global-Scale Overlay for Service Deployment,”IEEE journal on selected areas in communications, vol. 22, no 1, JAN. 2004.
[20] Pastry project, http://www.freepastry.org/
[21] A. Rowstron and P. Druschel,“Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems,”Microsoft Research Ltd, St. George
House, 1 Guildhall Street, Cambridge, CB2 3NH, UK.
[22] W. R .Stevens, TCP/IP Illustrated, vol. 1, Addision-Wesley, pp. 169-186, 1994.
[23] B. A. Forouzan,“TCP/IP Protocol Suite,3e,”McGrawHill.
[24] M. Hosseini, D. T. Ahmed, S. Shirmohammadi and N. D. Georganas,“A survey of application-layer multicast protocols,”IEEE Communications Surveys & Tutorials,
vol. 9, Issue 3, pp. 58-74, 2007.
[25] Microsoft, http://www.microsoft.com/
[26] Apple, http:// www.apple.com/
[27] RealNetworks, http://www.realnetworks.com/
[28] A. Agrawal and H. Casanova,“Clustering hosts in p2p and global computing platforms,”in Proc. CCGRID, pp. 367–373, 2003.
[29] L. Ramaswamy, B. Gedik, and L. Liu,“Connectivity based node clustering in decentralized peer-to-peer networks,”in Peer-to-Peer Computing, pp. 66–73, 2003.
[30] X. Jiang, Y. Dong, D. Xu and B. Bhargava,“GUNSTREAM: A P2P MEDIA STREAMING PROTOTYPE,”Department of Computer Sciences, 2003.
[31] S. Banerjee, B. Bhattacharjee and C. Kommareddy, “Scalable application layer multicast,”in Proceedings of the 2002 conference on Applications, technologies,
architectures, and protocols for computer communications, pp. 205-217, 2002.
[32] D. A. Tran, K. A. Hua and T. T. Do,“A peer-to-peer architecture for media streaming,”IEEE J. Sel. Areas Commun., vol. 22, no. 1, pp. 121-133, Jan. 2004.
[33] Peercast, http://www.peercast.org/
[34] Deshpande, Hrishikesh, Bawa, Mayank, G. Molina and Hector,“Streaming Live Media over Peers,”Technical Report, Stanford InfoLab, 2002.
[35] CoopNet, http://research.microsoft.com/en-us/um/people/padmanab/projects/coopnet/
[36] V. N. Padmanabhan, H. J. Wang, P. A. Chou and K. Sripanidkulchai,“Distributing streaming media content using cooperative networking,”in Proc. ACM NOSSDAV, 2002.
[37] SplitStream, https://research.microsoft.com/en-us/um/people/antr/splitstream/
[38] M. Castro, P. Druschel, A. Rowstron, A. M. Kermarrec, A. Singh and A. Nandi,“SplitStream: High-Bandwidth Multicast in Cooperative Environments,”Microsoft Research, 2003.
[39] A. Nicolosi and S. Annapureddy,“P2PCast: A Peer-to-Peer Multicast Scheme for Streaming Data,”IRIS student workshop, MIT, 2003.
[40] Microsoft Research, http://research.microsoft.com/en-us/
[41] A. Rowstron, A. M. Kermarrec, M. Castro and P. Druschel,“SCRIBE: The design of a large-scale event notification infrastructure,”Microsoft Research, 2001.
[42] A. J. Ganesh, A. M. Kemarrec and L. Massoulie,“Peer-to-peer membership management for gossip-based protocols,” IEEE Trans. Comput., vol. 52, no. 2, Feb. 2003.
[43] X. Zhang, J. Liu, B. Li, and T. S. P. Yum.”Coolstreaming/DONet: A data-driven overlay network for live media streaming,”IEEE INFOCOM ’05, 2005.
[44]“Advanced Video Coding for Generic Audiovisual Services”Joint Video Team of ISO/IEC and ITU-T, March 2005.
[45] S. Ueda, Y. Shinzaki, H. Shigeno and K. Okada, “H.264/AVC stream authentication at the network abstraction layer,”IEEE Information Assurance and Security Workshop, pp. 302-308, 2007.
[46] D. T. Nguyen, M. Shaltev and J. Ostermann,“Error concealment in the network abstraction layer for the scalability extension of H.264/AVC,”IEEE Communication and Electronics, pp. 274-278, Oct. 2006.
[47] S. R. Subramanya and B. K. Yi,“Digital Rights Managements,”IEEE Potentials, vol. 25, Issue 2, pp. 31–34, March-April 2006.
[48] B. Pourebrahimi, K. Bertels, and S. Vassiliadis,“A survey of Peer-to-Peer networks,”The 16th Annual Workshop on Circuits, 2005.
[49] Q. Liu, R. S. Naini and N. P. Sheppard,“Digital rights management for content distribution,” in Proc. the Australasian information security workshop conference, vol. 21, pp. 49-58, 2003.
[50] H. Guo,“Digital rights management (DRM) using XrML,”
http://www.tml.hut.fi/Studies/T-110.501/2001/papers/guo.heng.pdf, reference date June 2007.
[51]“DATA ENCRYPTION STANDARD (DES),”U.S. DEPARTMENT OF
COMMERCE/National Institute of Standards and Technology, Oct. 25, 1999
[52]“Digital Signature Standard (DSS), ”Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, June 2009.
[53] WPPN, http://technet.microsoft.com/en-us/network/bb545868.aspx
[54] JXTA, http://jxta.kenai.com/
[55] SUN, http://tw.sun.com/
[56] http://technet.microsoft.com/zh-tw/library/bb457079(en-us).aspx#EEAA
[57] VLC, http://www.videolan.org/vlc/
[58] DirectShow, http://directshownet.sourceforge.net/index.html