Abstract
Multicasting technology uses the minimum network resources to serve multiple clients by duplicating the data packets at the closest possible point to the clients. This way at most only one data packets travels down a network link at any one time irrespective of how many clients receive this packet. Traditionally multicasting has been implemented over a specialized network built using multicast routers. This kind of network has the drawback of requiring the deployment of special routers that are more expensive than ordinary routers. Recently there is new interest in delivering multicast traffic over application layer overlay networks. Application layer overlay networks though built on top of the physical network, behave like an independent virtual network made up of only logical links between the nodes. Several authors have proposed systems, mechanisms and protocols for the implementation of multicast media streaming over overlay networks. In this paper, the author takes a critical look at these systems and mechanism with special reference to their strengths and weaknesses.
Highlights
Media multicasting is one of the most attractive applications that can exploit the network resources least while delivering the most to the clients
The author has taken a critical look at the literature on multicasting over overlay networks
Multicasting is one of the most promising applications over the Internet as it requires relatively lower overhead to serve a large number of clients compared to the traditional unicast or broadcast applications
Summary
Media multicasting is one of the most attractive applications that can exploit the network resources least while delivering the most to the clients. The proposed solution is based on the performance of spatial and temporal outlier analysis on measured and probed metrics to allow an honest node to make better use of available information before making an adaptation decision This algorithm creates a resilient overlay network in the both structured and unstructured overlay network in the presence of malicious attacks. It has been proposed a proactive recovery mechanism so that even if an upstream node leaves the tree, the downstream nodes can rejoin at predetermined nodes immediately, so that the recovery time of the disrupted nodes is the minimum These algorithms have several drawbacks including, the prior notice of the duration of stay in the network, This algorithm results in a good structure combining multicast and overlay, but the resulting network is still dependant on the physical network and managing the mesh network is expensive in terms of network resources.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Advanced Computer Science and Applications
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.