Chunk Scheduling Strategies In Peer to Peer System-A Review
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 3
Abstract
Peer-to-peer (P2P) streaming systems have become popular in recent years. Several peer- to-peer systems for streaming have been deployed recently. The challenges for P2P streaming have been on its scalability and video viewing quality. Peer to peer (P2P) streaming tries to achieve scalability and at the same time meet real-time playback requirements. Both require efficient utilization of resources in P2P networks. The most important issue in designing a P2P streaming system is chunk scheduling which should be able to provide high-quality service while maintain a high utilization of system resources. There are different chunk scheduling strategies: Rarest First and Greedy. The former is a well-known strategy for P2P file sharing that gives good scalability, whereas the latter an intuitively reasonable strategy to optimize continuity and startup latency from a single peer’s viewpoint. Greedy, while achieving low startup latency, fares poorly in continuity by failing to maximize P2P sharing; whereas Rarest First is the opposite. This highlights the trade-off between startup latency and continuity, and how system scalability improves continuity. Based on this insight, a mixed strategy is proposed that can be used to achieve the best of both worlds. Furthermore, the mixed strategy comes with an adaptive algorithm that can adapt its buffer setting to dynamic peer population. This report presents a most up-to-date survey of modeling work in the area of P2P streaming and chunks scheduling strategies in P2P streaming system.
Authors and Affiliations
Sanu C , Deepa S S.
ROBUST AND FLEXIBLE IP ADDRESSING FOR MOBILE AD-HOC NETWORK
Mobile Ad hoc Networks (MANETs) are expected to become more and more important in the upcoming years. In order to enable the establishment of IP services in MANets, IP address auto configuration mechanisms are re...
Fault Tolerant Environment in web crawler Using Hardware Failure Detection
Fault Tolerant Environment is a complete programming environment for the reliable execution of distributed application programs. Fault Tolerant Distributed Environment encompasses all aspects of modern fault-tolerant dis...
Performance Comparison of alCNRZ and nCRZ Modulation Format for WDM/DWDM System
Advance Modulation formats like alternate chirped non-return-to-zero (alCNRZ) and novel chirped return-to-zero (nCRZ) are playing a significant role in transmission of an optical signal accurately at its destination....
AN EFFECTIVE METHODOLOGY FOR MINUTIAE BASED FINGERPRINT MATCHING USING SINGULARITIES INDEXING
Fingerprint is one of the most significant and traditional biometric trait and its uniqueness are exclusively determined by the local ridge characteristics and their relationships. However, in existing system,...
Small Signal Stability Investigation of SMIB System Using Variable Structure Control
This paper aims at investigation of small signal stability for a synchronous machine connected to the infinite bus system by variable structure control. Power systems inherently being non linear, so first the linea...