跳到主要內容

簡易檢索 / 詳目顯示

研究生: 鍾珍慧
Chen-Hui Chung
論文名稱: 基於中國餘式定理的 CDN-P2P 隨選視訊系統
A Chinese Remainder Theorem based CDN-P2P Video-On-Demand System
指導教授: 曾黎明
Li-Ming Tseng
口試委員:
學位類別: 碩士
Master
系所名稱: 資訊電機學院 - 資訊工程學系
Department of Computer Science & Information Engineering
論文出版年: 2013
畢業學年度: 101
語文別: 中文
論文頁數: 48
中文關鍵詞: 隨選視訊系統線性網路編碼基於中國餘式定理的群鑰管理
外文關鍵詞: Video-on-Demand System, Linear Network Coding, Chinese Remainder Theorem based Group Key Managemeng
相關次數: 點閱:16下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 近年來隨著寬頻網路的拓展,網路協定電視(Internet Protocol Television)也越來越普及,但收費的網路協定電視節目卻往往受到需要安裝機上盒(Set-top Box, STB)的限制;不收費的網路協定電視節目卻多為侵權內容,損害了內容供應商(content provider)的權益。如何讓社會大眾能透過具有寬頻網路服務的個人電腦(Personal Computer)收看電視節目,減少安裝機上盒的成本與時間,又能阻止版權影片的散播,維護內容供應商的權益成為本篇論文探討的課題。
    本篇論文試著以 CDN-P2P 網路架構結合基於中國餘式定理群組金鑰管理(Chinese Remainder Theorem based group key management)與線性網路編碼(Linear Network Coding)的方法,重製影片內容並驗證,使只有系統中合法使用者才可成功還原原始影片觀看。本文除了實驗測試外,我們也試著討論所提出方法的優點及效率──服務供應商只需控制部分影片的子片段就能防止非法使用者觀看影片。


    In recent years, IPTV service has been popular with the growth of broadband networks. More and more content providers and service providers try to provide their own IPTV services to their users with copyright content. To prevent copyright protected videos from illegal users watching, legal users must install set-top box or media player which is provided by the service provider. Neither installing set-top box takes lots of time and cost nor most of videos played by specific media player cause the leakage path which violate copyright protection. How to provide a safer environment for content service providers and how to save cost and time in installing set-up box are the two main issues in this paper.
    In this paper, we try to provide an environment with Chinese Remainder Theorem based group key management and linear Network coding to solve the illegal watching problems. And we also verify the videos can only been watched by legal
    users. After the experiment results, we discuss the advantage of the proposed system that service provider only need to control a few sub-chunks of video to prevent from illegal watching behavior.

    摘    要 i ABSTRACT ii 誌    謝 iii 目    錄 iv 圖 目 錄 vi 表 目 錄 vii 符 號 說 明 viii 一. 緒論 1 1-1 研究背景 1 1-2 研究動機 1 1-3 論文架構 2 二. 相關研究 3 2-1  基於中國餘式定理群鑰管理 3 2-1-1 中國餘式定理 3 2-1-2 中國餘式定理群鑰協定 3 2-2  Linear Network Coding 7 2-2-1 蝴蝶網路(Butterfly Network) 7 2-2-2 編碼與解碼 8 2-3  CDN-P2P 10 2-3-1 內容遞送網路(Content Delivery Network) 10 2-3-2 對等網路(Peer-to-peer Network) 13 2-3-3 CDN-P2P 14 2-4  BitTorrent Protocol 17 2-4-1 BT的組成 17 2-4-2 BT的最佳化策略 19 三. 系統設計與架構 21 3-1  目標 21 3-2  系統架構 22 3-3  系統設計 25 3-3-1 影片處理 25 3-3-2 註冊 27 3-3-3 觀看影片 28 3-3-4 更新群體金鑰 32 四. 實驗與討論 33 4-1  實驗環境 33 4-2  實驗操作與實驗結果 34 4-2-1 Tracker 34 4-2-2 Initial Seeder 35 4-2-3 Peers 38 4-3  實驗結果討論 42 五. 結論 46 參 考 文 獻 47

    [ 1] Lou, Xiaosong and Kai Hwang, "Collusive piracy prevention in P2P content delivery networks.", Computers, IEEE Transactions on, Vol 58, Issue 7, pp.970-983, July 2009
    [ 2] LI, S.-YR; YEUNG, Raymond W.. ; CAI, Ning. Linear network coding.Information Theory, IEEE Transactions on, 2003, 49.2: 371-381.
    [ 3] HO, Tracey, et al. A random linear network coding approach to multicast.Information Theory, IEEE Transactions on, 2006, 52.10: 4413-4430.
    [ 4] ZHENG, Xinliang; HUANG, Chin-Tser; MATTHEWS, Manton. Chinese remainder theorem based group key management. In: Proceedings of the 45th annual southeast regional conference. ACM, 2007. p. 266-271.
    [ 5] James F. Kurose, & Keith W. Ross, Computer Networking a top-down approach 5ed,Pearson, Boston,2009
    [ 6] LU, ZhiHui; WANG, Ye; YANG, Yang Richard. An Analysis and Comparison of CDN-P2P-hybrid Content Delivery System and Model. journal of communications, 2012, 7.3: 232-245.
    [ 7] IEEE, 2012. p. SARKAR, Saikat; WANG, Mea. A Measurement Study of Network Coding in Peer-to-Peer Video-on-Demand Systems. In: Modeling, Analysis & Simulation of Computer and Telecommunication Systems (MASCOTS), 2012 IEEE 20th International Symposium on. 423-430.
    [ 8] SARKAR, Saikat; WANG, Mea. A Measurement Study of Network Coding in Peer-to-Peer Video-on-Demand Systems. In: Modeling, Analysis & Simulation of Computer and Telecommunication Systems (MASCOTS), 2012 IEEE 20th International Symposium on. IEEE, 2012. p. 423-430.
    [ 9] ATTANEO, Alessandro, et al. Using digital fountains in future IPTV streaming platforms: a future perspective. Communications Magazine, IEEE, 2012, 50.5: 202-207.
    [10] TAO ZHU, Wen. Towards secure and communication-efficient broadcast encryption systems. Journal of Network and Computer Applications, 2012.
    [11] ZHANG, Yuan; HUANG, Yongfeng; YUAN, Jian. An efficient group rekey scheme for P2P IPTV DRM system. In: Advanced Communication Technology (ICACT), 2011 13th International Conference on. IEEE, 2011. p. 1479-1483.
    [12] http://www.morehawes.co.uk/the-bittorrent-protocol
    [13] http://www.akamai.com/
    [14] http://www.bittorrent.com/
    [15] http://www.pptv.com/
    [16] http://www.pps.tv/

    QR CODE
    :::