Metadata Independent Hashing for Media Identification & P2P Transfer Optimisation

نویسندگان

  • Jeff Warren
  • Michael Clear
  • Ciaran McGoldrick
چکیده

Swarms within peer-to-peer networks are hindered by content containing incorrect metadata. After publishing, any incorrect metadata requires either a complete republish/swarm recreation or for each peer to manually make corrections (causing them to leave the swarm, decreasing performance). We present an approach which enables a swarm to both collaboratively upgrade embedded data to reflect changes in metadata, and identify additional candidates which contain metadata errors but a correct payload. Swarm degradation due to peer drop-off resulting from edits is eliminated, and additional peers can be identified in a fully automated fashion, increasing swarm lifetime and performance. Stemming from this metadata abstraction, automatic purification can be realised in situations where multiple incomplete/incorrect versions are available within one or more unconnected swarms. Variations associated with a content set are processed associatively using a knowledge discovery rule set to extrapolate a canonical tag set, which can also be reinforced using data from external corpora. After any update, these changes can again be automatically disseminated in a peer-topeer swarm. The system presented enables context-aware P2P data transfers which abstract metadata optimally, while also maximising swarm size and enabling cataloguing of content. A proof-of-concept implementation is presented, and its impact on swarm purification/optimisation is evaluated.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Exploring JXTASearch for P2P Educational Media Discovery

In this paper we present a Peer-to-Peer (P2P) application that aims at improving the discoverability of educational media typically distributed over different universities and institutions. We investigate JXTASearch, a distributed search engine constructed upon Sun’s open source P2P platform JXTA, and further extend it to support Dublin Core Metadata Element Set (DCMES) based P2P searches. Whil...

متن کامل

Cross-Layer Peer-to-Peer Traffic Identification and Optimization Based on Active Networking

P2P applications appear to emerge as ultimate killer applications due to their ability to construct highly dynamic overlay topologies with rapidly-varying and unpredictable traffic dynamics, which can constitute a serious challenge even for significantly over-provisioned IP networks. As a result, ISPs are facing new, severe network management problems that are not guaranteed to be addressed by ...

متن کامل

Resource-awareness and trade-off optimisation in P2P video streaming

Recently, various P2P platforms have become widely popular tools for delivering both real-time and on-demand video services over the internet. However, these P2P TV approaches do experience some limitations, which adversely affect their performance. For instance, most P2P applications are designed to balance CPU load and memory but not network resources or vice versa. Through an experimental-ba...

متن کامل

Brokering Planning Metadata in a P2P Environment

In self-adaptive systems, metadata about resources in the system (e.g., services, nodes) must be dynamically published, updated, and discarded. Current adaptive middleware approaches use statically configured, centralized repositories for storing and retrieving of such metadata. In peer-to-peer (P2P) environments, we can not assume the existence of server nodes that are always available for hos...

متن کامل

Proactive Content Poisoning To Prevent Collusive Piracy in P2P File Sharing

Today’s peer-to-peer (P2P) networks are grossly abused by Illegal distributions of music, games, video streams, and popular software. These abuses have resulted in heavy financial loss in media and content industry. Collusive piracy is the main source of intellectual property violations within the boundary of P2P networks. This problem is resulted from paid clients (colluders) illegally sharing...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012