Metadata Independent Hashing for Media Identification & P2P Transfer Optimisation
نویسندگان
چکیده
Swarms within peer-to-peer networks are hindered by content containing incorrect metadata. After publishing, any incorrect metadata requires either a complete republish/swarm recreation or for each peer to manually make corrections (causing them to leave the swarm, decreasing performance). We present an approach which enables a swarm to both collaboratively upgrade embedded data to reflect changes in metadata, and identify additional candidates which contain metadata errors but a correct payload. Swarm degradation due to peer drop-off resulting from edits is eliminated, and additional peers can be identified in a fully automated fashion, increasing swarm lifetime and performance. Stemming from this metadata abstraction, automatic purification can be realised in situations where multiple incomplete/incorrect versions are available within one or more unconnected swarms. Variations associated with a content set are processed associatively using a knowledge discovery rule set to extrapolate a canonical tag set, which can also be reinforced using data from external corpora. After any update, these changes can again be automatically disseminated in a peer-topeer swarm. The system presented enables context-aware P2P data transfers which abstract metadata optimally, while also maximising swarm size and enabling cataloguing of content. A proof-of-concept implementation is presented, and its impact on swarm purification/optimisation is evaluated.
منابع مشابه
Exploring JXTASearch for P2P Educational Media Discovery
In this paper we present a Peer-to-Peer (P2P) application that aims at improving the discoverability of educational media typically distributed over different universities and institutions. We investigate JXTASearch, a distributed search engine constructed upon Sun’s open source P2P platform JXTA, and further extend it to support Dublin Core Metadata Element Set (DCMES) based P2P searches. Whil...
متن کاملCross-Layer Peer-to-Peer Traffic Identification and Optimization Based on Active Networking
P2P applications appear to emerge as ultimate killer applications due to their ability to construct highly dynamic overlay topologies with rapidly-varying and unpredictable traffic dynamics, which can constitute a serious challenge even for significantly over-provisioned IP networks. As a result, ISPs are facing new, severe network management problems that are not guaranteed to be addressed by ...
متن کاملResource-awareness and trade-off optimisation in P2P video streaming
Recently, various P2P platforms have become widely popular tools for delivering both real-time and on-demand video services over the internet. However, these P2P TV approaches do experience some limitations, which adversely affect their performance. For instance, most P2P applications are designed to balance CPU load and memory but not network resources or vice versa. Through an experimental-ba...
متن کاملBrokering Planning Metadata in a P2P Environment
In self-adaptive systems, metadata about resources in the system (e.g., services, nodes) must be dynamically published, updated, and discarded. Current adaptive middleware approaches use statically configured, centralized repositories for storing and retrieving of such metadata. In peer-to-peer (P2P) environments, we can not assume the existence of server nodes that are always available for hos...
متن کاملProactive Content Poisoning To Prevent Collusive Piracy in P2P File Sharing
Today’s peer-to-peer (P2P) networks are grossly abused by Illegal distributions of music, games, video streams, and popular software. These abuses have resulted in heavy financial loss in media and content industry. Collusive piracy is the main source of intellectual property violations within the boundary of P2P networks. This problem is resulted from paid clients (colluders) illegally sharing...
متن کامل