研究生: |
吳家彥 Chia-Yen Wu |
---|---|
論文名稱: |
媒體中心之IPTV實作 An IPTV Implementation of a Campus Media Center |
指導教授: |
陳建中
Jiann-Jone Chen |
口試委員: |
陳金蓮
Jean-Lien Chen 陳宏銘 Homer H. Chen 杭學鳴 Hsueh-Ming Hang 楊士萱 Shih-Hsuan Yang |
學位類別: |
碩士 Master |
系所名稱: |
電資學院 - 電機工程系 Department of Electrical Engineering |
論文出版年: | 2008 |
畢業學年度: | 96 |
語文別: | 中文 |
論文頁數: | 74 |
中文關鍵詞: | 點對點 、網路電視 、媒體中心 、媒體串流 、數位權利管理 |
外文關鍵詞: | Peer to peer, IPTV, media center, media streaming, digital rights management |
相關次數: | 點閱:215 下載:1 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
本論文研究以點對點網路(P2P)架構傳輸即時影像碼流之方法IPTV。整個系統之建置涵蓋一個採用數位權利伺服器(DRM server)、一至數個媒體串流伺服器(media streaming server)以及多個交互傳輸碼流的IPMP終端機(peers)。為了提升整體IPTV的服務效能:當新的節點加入IPTV群播對數位媒體發出存取要求時,數位權利伺服器確認使用者身份後,經由安全通道將對應之金鑰、解碼工具與憑證,傳送至使用者端。系統會選擇傳輸能力略高於新節點、傳輸延遲低的父節點,並嚴格限制只有認證核可的用戶可以互相進行連線,以維持整體IPTV的穩定傳輸骨幹;當線上節點要離線時,則先為其所有子節點依照新節點加入的方法找尋最佳接入點,然後再更新其父節點的傳輸參數。另外,媒體伺服器可依據現有網路狀況調整參數,改變壓縮品質,產生不同大小串流並進行加密。當加密影像傳送至一個播放節點,會同時和其它節點交換(提供或索取)數據,如此得以有效的分散整體系統的傳輸負載。在使用者與伺服器資料交握階段中,使用者登入的資訊、憑證與即時串流的金鑰,皆會以AES來加密。即時串流使用之DES金鑰會不斷更換,以保障即時串流安全性。實驗結果顯示本論文有效結合P2P串流網路與數位管理,並在大多數節點效能不佳時,仍能保持P2P串流網路的一定效能。
A real-time P2P-IPTV system has been developed in this thesis. The system comprises: one digital right management server (DRM server), one media streaming server and many IPMP terminal peers. When one new peer requests the media server to join the IPTV system, the DRM server afer recognizing its ID, transmit by secured data a key to unlock the input stream and the certification for displaying the file according to granted right. To improve the IPTV service efficiency, the system would select a parent peer with low-delay and uplink capability better than the incoming peer. It would maintain the basic stable transmission framework. When one peer would leave, it has to find for each children peer a new parent peer according to above rules before updating the parent peer parameter of current one. In addition, the system can adjust the streaming size of media server in accordance with current network condition. When one peer import the streaming, it would also outport the streaming to other online peers, which would help to distribute the transmission loading for the whole IPTV system. The key of user profile is encrypted with AES. The certificate is encrypted with regularly updated DES keys to prevent hacker attack. Experiments show that the average frame rate and the transmission delay are maintained in good performances even when most peers are with low uplink capability.
[1] D. A. Tran, K. A. Hua, and T. Do, “ZIGZAG: An efficient Peer-to-Peer scheme for media streaming,” IEEE INFOCOM, 2003.
[2] X. Tan, S. Datta, “Building multicast trees for multimedia streaming in heterogeneous P2P networks,” Systems Communications, 2005.
[3] The MPEG-21 Rights Expression Language - A White Paper. http://www.xrml.org/reference/MPEG21_REL_whitepaper_Rightscom.pdf, reference date, June 2007.
[4] S. R Subramanya, and B. K. Yi, “Digital Rights Managements,” IEEE Potentials, vol. 25, Issue 2, pp. 31–34, March-April 2006.
[5] B. Pourebrahimi, K. Bertels, and S. Vassiliadis, “A survey of Peer-to-Peer networks,” The 16th Annual Workshop on Circuits, 2005.
[6] V. N. Padmanabhan, H. J. Wang, P. A. Chou, and K. Sripanidkulchai. “Distributing streaming media content using cooperative networking,” in Proc. ACM NOSSDAV, 2002.
[7] S. Banerjee, B. Bhattacharjee, and C. Kommareddy. “Scalable application layer multicast,” In SIGCOMM ’02: Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications, pp. 205–217, 2002.
[8] Y. H. Chu, S. G. Rao, and H. Zhang. “case for end system multicast,” in Proc. ACM SIGMETRICS international conference on Measurement and modeling of computer systems, pp. 1–12, 2000.
[9] A. J. Ganesh, A. M. Kemarrec, and L. Massoulie, “Peer-to-peer membership management for gossip-based protocols,” IEEE Trans. Comput. vol.52, no.2, Feb. 2003.
[10] X. Zhang, J. Liu, B. Li, and T. S. P. Yum. “Coolstreaming/DONet: A data-driven overlay network for live media streaming,” IEEE INFOCOM ’05, 2005.
[11] M. T. Lu, J. C. Wu, K. J. Peng, P. Huang, J. J. Yao, H. H. Chen, “Design and evaluation of a P2P IPTV system for heterogeneous networks,” IEEE Transactions on Multimedia, vol. 9, no. 8, pp. 1568-1579, Dec. 2007.
[12] A. Skodras, C. Christopoulos, and T. Ebrahimi, “The JPEG 2000 still image compression standard,” IEEE Signal Processing Mag., vol. 18, pp. 36-58, Sept. 2001.
[13] Q. Liu, R. S. Naini and N. P. Sheppard, “Digital rights management for content distribution,” in Proc. the Australasian information security workshop conference, vol. 21, pp. 49-58, 2003.
[14] H. Guo, “Digital rights management (DRM) using XrML,” http://www.tml.hut.fi/Studies/T-110.501/2001/papers/guo.heng.pdf, reference date June 2007.
[15] Information Technology—Coding of Audio-Visual Material—Part 13: Intellectual Property Management and Protection Extensions, ISO/IEC 14496-13, 2004.
[16] J. Bormans, J. Gelissen, and A. Perkis, “MPEG-21: The 21st century multimedia framework,” IEEE Signal Processing Mag., vol. 20, pp. 53-62, March 2003.
[17] T. Jamil, “The Rijndael algorithm,” IEEE Potentials, vol. 23, Issue 2, pp. 36–38, Apr-May 2004.
[18] FIPS PUB 197: the official AES standard
[19] http://directshownet.sourceforge.net/
[20] http://msdn.microsoft.com/en-us/vs2005/default.aspx
[21] http://www.kakadusoftware.com/
[22] William Stallings, Cryptography and Network Security, Principles and Practices, Fourth Edition, Pearson.