Achieving Optimal DoS Resistant P2P Topologies for Live Multimedia Streaming using Cost function Algorithm
Journal Title: International Journal of Engineering, Science and Mathematics - Year 2012, Vol 2, Issue 1
Abstract
The peer-to-peer approach for live multimedia streaming applications offers the promise to obtain a highly scalable, decentralized, and robust distribution service. When constructing streaming topologies, however, specific care has to be taken in order to ensure that quality of service requirements in terms of delay, jitter, packet loss, and stability against deliberate denial of service attacks are met. In this paper, we concentrate on the latter requirement of stability against denial-of-service attacks. We present an analytical model to assess the stability of overlay streaming topologies and describe attack strategies. Building on this, we describe topologies, which are optimally stable toward perfect attacks based on global knowledge, and give a mathematical proof of their optimality. The formal construction and analysis of these topologies using global knowledge lead us to strategies for distributed procedures, which are able to construct resilient topologies in scenarios, where global knowledge can not be gathered. Experimental results show that the topologies created in such a real-world scenario are close to optimally stable toward perfect denial of service attacks.
Authors and Affiliations
A. L. Srinivasulu, S. Jaya Bhaskar, Ms. K. Deepthi and Dr. Sudarson Jena
Power Quality enhancement in MICROGRID (Islanding Mode) by Using ND - MLI DSTATCOM
Microgrids are systems with clusters of micro generators, which are installed for distributed power generation. When interfaced to the utility grid, microgrids are exposed to common utility power-quality disturbances....
A Framework for IC-Technology enabled Supply Chains
In lieu of a profound research interest on the growth pattern of financial commitment and deployment of large scale monetary resources on Information Technology within organisations, Information and Communication Techn...
Analysis, Simulation and Comparison of Different Multiplier Algorithms
High performance systems such as microprocessors, digital signal processors, filters, ALU etc. which is need of hour now days requires a lot of components. One of main component of these high performance systems is mul...
Accurate Face Recognition Using PCA and LDA
Face recognition from images is a sub-area of the general object recognition problem. It is of particular interest in a wide variety of applications. Here, the face recognition is based on the new proposed modified PCA...
A STUDY TOWARDS OVERCOMING EMPLOYEE RESISTANCE TOWARDS TIMESHEET
The monetary value of any project is intrinsically linked to the use of time, and also to the management accounting process. Utilizing the time efficiently equates with producing much surplus and profits as possible. T...