![]() For that process, a rule to select such node values is given. The proposed improvement is to find repeatedly used node values, store them internally, and use the stored node values without recalculation when required to reuse them. Hence, in this paper, the degree of the MHT’s inefficiency and the pattern of the iterated operation of the MHT are analyzed first. When a sender transmits data consisting of many segments through NDN, the data authentication time may take longer than the data transmission time. Therefore, as a result, the authentication scheme’s inefficiency is also more severe. The larger the size of the MHT is, the greater the number of calculation iterations. However, a data authentication scheme based on the MHT has an inefficient factor that repeatedly computes the same node values of the MHT and are repeatedly computed. NDN (named-data networking) and Bitcoin utilize MHT to verify transmitted data. MHT (Merkle hash tree) is suitable for efficiently verifying the set of segments shared in the network. Therefore, if these segments are retrieved from multiple unknown senders, the receiver must verify every segment to safely use the data. Moreover, a data sender generally fragments the data into several small segments and sends them. In this case, since a data receiver cannot identify a practical data sender, it is necessary to verify both the received data and the data sender. One of the most common approaches for enhancing network performance is to retrieve data from nearby data holders that have previously obtained the desired data, not only from the original data source itself. Insights obtained in this study will be valuable for the development and deployment of future hybrid CDN-P2P VoD streaming systems. Our results show that, by utilizing the slow-varying contents cached in peers and deploying various CDN enhancement mechanisms, Kankan provides a large-scale VoD streaming service with a small-scale fixed infrastructure. The average lifetime of cached videos is longer than one week. 4) According to our studies on the peer cache lists, the video contents stored in Kankan peers update quite slowly. ![]() It also provides the CDN acceleration in case of inefficient P2P streaming performance. ![]() 3) Kankan adopts a dual-server mechanism to enhance start-up video streaming. It adopts specific redirection servers to dispatch the nationwide requests. 2) Kankan deploys a small-scale CDN densely in three geographic clusters in China. 1) Kankan adopts a loosely-coupled hybrid architecture, in which the user requests are handled by its CDN and P2P network independently. Our measurements are multi-fold, as follows. In this paper, we conducted a comprehensive measurement study on Kankan, one of the leading VoD streaming service providers in China that is based on a hybrid CDN-P2P architecture. The hybrid architecture of content distribution network (CDN) and peer to peer (P2P) is promising in providing online streaming media services. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |