Reliable Buffer less Video Streaming
Journal Title: International Journal of Electronics Communication and Computer Technology - Year 2012, Vol 2, Issue 5
Abstract
Peer-to-Peer (P2P) overlays offer a promising approach to stream live video from a single source to a large number of receivers (or peers) over the Internet without any special support from the network. This approach is often called P2P streaming. We have been witnessing the emergence of a new class of popular P2P applications, namely, large scale P2P video streaming. The live P2P-TV system is expected to provide the video stream to users with (roughly) the same delay. Accessing more data is difficult in the existing system. Therefore the number of bit rate is very slow than proposed system. We develop simple yet accurate fluid models that capture the dominant dynamics of the chunk distribution process over several families of random graph. The average chunk distribution delay eliminated using the fluid models adding the terms are describing the peer departure and arrival flows. The peer departure and arrival flows used to note unavailable to distribute the chunk. This can be easily reflected in the fluid model.
Authors and Affiliations
V. Sharmila Packiavathy| Computer Sceince and Engineering, Jayaraj Annapackiam CSI College of Engineering, Nazareth, Tamil Nadu, India, Y. P. Paulin Sangeetha| Computer Sceince and Engineering, Jayaraj Annapackiam CSI College of Engineering, Nazareth, Tamil Nadu
Implementation of Genetic Algorithm with Ranking Select Mechanism for Fractal Image Compression
The immense use of the images in the field of communication and animation drives the attention towards an important concept i.e. compression, because of compactness and restricted size for the data storage. From last...
A Global Nearest-Neighbour Depth Learning Based Automatic 2D to 3D image and Video Conversion
Despite a significant growth in the last few years, the availability of 3D content is still dwarfed by that of its 2D counterpart. In order to close this gap, many 2D-to-3D image and video conversion methods have been...
A Framework for Reconfiguration of Network in case of Link Failure using Compromised Secure Path Algorithm
In wireless networks balancing the use of power and maintaining the reliable communication is a really very challenging job. Today’s sensor networks make use of radio data links for communication. Energy consumed by the...
Reversible Multiplier with Peres Gate and Full Adder
Low Power dissipation and smaller area are one of the important factors while designing multipliers for digital circuits. As multipliers used in digital circuits dissipate large amount of heat whenever there is a tran...
Seamless Mobility in Heterogeneous Mobile Networks
The objective of this paper is to introduce a vertical handover (VHO) algorithm between wireless LANs (WLANs) and LTE mobile networks. The proposed algorithm is based on the fuzzy control theory and takes into conside...