2008
DOI: 10.1109/mcom.2008.4473088
|View full text |Cite
|
Sign up to set email alerts
|

IPTV over P2P streaming networks: the mesh-pull approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
82
0
2

Year Published

2009
2009
2021
2021

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 136 publications
(84 citation statements)
references
References 12 publications
0
82
0
2
Order By: Relevance
“…To address this problem, many mesh structures have been proposed [4][5][6][7][8]. In the mesh structures, even though a peer's neighbor leaves the network, it can still receive data from its remaining neighbors, since it receives data from several neighbor peers simultaneously.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…To address this problem, many mesh structures have been proposed [4][5][6][7][8]. In the mesh structures, even though a peer's neighbor leaves the network, it can still receive data from its remaining neighbors, since it receives data from several neighbor peers simultaneously.…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, highly scalable peer-to-peer (P2P)-based IPTV systems that can be implemented at low installation cost have emerged as an alternative to conventional systems [1,2]. In mesh-based structures that have been employed by most commercial P2P streaming systems, peers share data required for video playback [3][4][5][6][7][8]. To do so, they exchange buffermaps with their neighbor peers to find which peers have the necessary chunks.…”
Section: Introductionmentioning
confidence: 99%
“…For instance, it has been shown that even a small amount of free-riders in a P2PSIP network can significantly decrease the ability for calls to reach the callee [29]. For live video streaming, not enough chunks might arrive at users' clients so that either the video cannot be played at all or with less quality (in the case of codecs which can compensate lost chunks by playing the video stream at a lower bitrate), degrading the overall quality of the application for users [17].…”
Section: Real-time Communication Availability Requirementsmentioning
confidence: 99%
“…Presumably, this is due to the fact that these systems are fairly new and have only been started to be analysed in the literature. In [17], security issues for such systems are highlighted and briefly discussed. Dhungel et al investigate content pollution attacks in a concrete P2P live streaming system [15].…”
Section: Existing Security Approachesmentioning
confidence: 99%
“…Basically, existing work can be classified in either concentrating on specific network technologies, e.g., mobile networks like 3G [20], 4G [28], 5G [22], on specific media (e.g., video [32], voice [12]), on specific services like Internet Protocol television (IPTV) [31], Mobile Social Networks (MSN) [6] and YouTube [33], or on the type of service deployment like cloud services [2] or peer-to-peer networks [11]. Also combinations of the aforementioned categories are actively researched, e.g., in [5].…”
Section: Introductionmentioning
confidence: 99%