Dependable peer to peer multi-streaming using DHT-based application level multicast

Wei Cheng He*, Kuo-Chen Wang, Yi Ling Hsieh

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Streaming applications in P2P (peer to peer) networks are getting more and more popular. However, high degree of churning in peer populations due to wireless or mobility is a common problem, and it would result in a low delivery ratio and instable quality of received multimedia. In this paper, we propose a P2P multi-streaming scheme, called ConStream, to resolve this problem. In our scheme, the whole content is composed of multi-stripes, and each of the multi-stripes will be distributed to multiple multicast trees and be forwarded concurrently. In addition, we insert parity packets into streams so that clients can recover lost data. One merit of the proposed approach is that the transmission rate of each stream in our ConStream is only half of that in the traditional single streaming. Simulation results show that the proposed ConStream has a higher delivery ratio than Scribe-PRM and SplitStream under various MTTFs (mean time to failures).

Original languageEnglish
Title of host publicationProceedings of the 9th IASTED International Conference on Wireless and Optical Communications, WOC 2009
Pages1-5
Number of pages5
StatePublished - 1 Dec 2009
Event9th IASTED International Conference on Wireless and Optical Communications, WOC 2009 - Banff, AB, Canada
Duration: 6 Jul 20098 Jul 2009

Publication series

NameProceedings of the 9th IASTED International Conference on Wireless and Optical Communications, WOC 2009

Conference

Conference9th IASTED International Conference on Wireless and Optical Communications, WOC 2009
CountryCanada
CityBanff, AB
Period6/07/098/07/09

Keywords

  • Application level multicast
  • Dependable
  • Multi-streaming
  • Peer to peer

Fingerprint Dive into the research topics of 'Dependable peer to peer multi-streaming using DHT-based application level multicast'. Together they form a unique fingerprint.

Cite this