PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Agent based infrastructure for real-time applications

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
In this paper we propose a new infrastructure for real-time applications. As a preliminary, we describe basic characteristics of the most popular real-time services like VoIP, videoconferencing, live media streaming, and network multiplayer games. We focus on the end-to-end latency, bandwidth and efficient transmission methods. Next, we present our project concepts, infrastructure model, details of implementation and our testing environment which was designed for testing many aspects of real-time services. The system combines mechanisms for ensuring best possible connection quality (QoS), load balance of servers in infrastructure and gives control over the packet routing decisions. Additionally, provided security mechanisms make it a good choice even in the environment where a high security level is required. The system is based on the Peer-to-Peer (P2P) model and data between users is routed over an overlay network, consisting of all participating peers as network nodes. This overlay can by used for application level multicast or live media stream. In the logging process each user is assigned to a specific node (based on his geographic location and nodes load). Because nodes are participating in data transmission, we have control over the data flow route. It is possible to specify the desired route, so, regardless of the external routing protocol, we can avoid paths that are susceptible to eavesdropping. Another feature of the presented system is usage of agents. Each agent acts within the single node. Its main task is to constantly control the quality of transmission. It analyzes such parameters like link bandwidth use, number of lost packets, time interval between each packet etc. The information collected by the agents from all nodes allows to build a dynamic routing table. Every node uses the Dijkstra's algorithm to find the best at the moment route to all other nodes. The routes are constantly modified as a consequence of changes found by agents or updates sent by other nodes. In VoD services agents also analyze popularity of streamed media, which helps build intelligent video cache. To ensure greater security and high reliability of the system, we have provided a reputation mechanism. It is used during bringing up to date the information about possible routes and their quality, given by other nodes. Owing to this solution nodes and routes which are more reliable get higher priority.
Rocznik
Strony
33--47
Opis fizyczny
Bibliogr. 23 poz., rys.
Twórcy
autor
  • Jagellonian University, Department of Physics, Astronomy and Applied Computer Science, Cracow, Poland
autor
  • Institute of Telecommunications, Warsaw University of Technology, Warsaw, Poland
  • Institute of Fundamental Technological Research of the Polish Academy of Sciences, Warsaw, Poland
Bibliografia
  • [1] Cohen D., A protocol for packet-switching voice communication, Computer Networks 2(4-5) (1976).
  • [2] Perey C., Feldman M., Videoconferencing over IP Networks, in Broadband Networking, J.Trulove, ed., CRC Press (2000): 193.
  • [3] Tsui K. M., Desai M., Yanco H. A., Uhlik C., Exploring Use Cases for Telepresence Robots, in Proceedings of the 6th ACM/IEEE.
  • [4] Rosenberg J. et al., SIP: Session Initiation Protocol, RFC 3261, IETF (2002).
  • [5] H.323, Packet-based multimedia communication systems, ITU-T (2003).
  • [6] Wooldridge M., Jennings N. R., Intelligent agents: theory and practice, The Knowledge Engineering Review (1995).
  • [7] G.114, One way transmission time, ITU-T (2003).
  • [8] Gross J.H., Etter D.M., Comparison of echo cancellation algorithms for the adaptive delay filter, 42nd IEEE VTC (1992).
  • [9] Henderson T., Katz R., Transport protocols for Internet-compatible satellite networks, IEEE JSAC 17(2) (1999): 345.
  • [10] Quinn B., Almeroth K., IP Multicast Applications: Challenges and Solutions, RFC 3170 (2001).
  • [11] Picconi F., Massoulié L., Is There a Future for Mesh-Based live Video Streaming?, p2p (2008): 289.
  • [12] Xiaojun H., Yong L., Ross K.W., IPTV over P2P streaming networks: the mesh-pull approach, IEEE Communications Magazine 46(2) (2008).
  • [13] Almeroth K.C, Ammar M.H., The use of multicast delivery to provide a scalable and interactive video-on-demand service, IEEE JSAC 3 (2004): 1467.
  • [14] Sengodan S., Li V. O. K. , A Shared Buffer Architecture for Interactive VOD Servers., infocom, pp.1341, INFOCOM ’97. Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Driving the Information Revolution (1997).
  • [15] Henderson T., The effects of relative delay in networked games, PhD thesis, University of London (2003).
  • [16] Che X., Cobley L. J., VoIP Performance over Different Interior Gateway Protocols, IJCNIS (2009).
  • [17] Rosenberg J., Mahy R., Matthews P., Wing D., Session Traversal Utilities for NAT, RFC 5389 (2008).
  • [18] Hu Z., NAT Traversal Techniques and Peer-to-Peer Applications, HUT T-110.551 Seminar on Internetworkingl (2005).
  • [19] Baden R. et al., Integrated services in the Internet architecture: An overview, Tech. Rep. IETF RFC 1633 (1994).
  • [20] Blake S. et al., An architecture for differentiated services, Tech. Rep. IETF RFC. 2475 (1998).
  • [21] Mazurczyk W., Kotulski Z., Adaptive VoIP with Audio Watermarking for Improved Call Quality and Security, Journal of Information Assurance and Security 2(3) (2007): 226.
  • [22] Pioro M., Medhi D., Routing, Flow, and Capacity Design in Communication and Computer Networks, The Morgan Kaufmann Series in Networking (2004).
  • [23] NIST Special Publication 800-38A, Recommendation for Block Cipher Modes of Operation, NIST (2001).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-c84d0613-13a7-45b0-834d-353231c1e367
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.