Caracterização de Falhas Relacionadas a Aplicações de Live Streaming na Internet

  • Ingrid Jansch-Pôrto UFRGS

Resumo


Sistemas de difusão de conteúdos em tempo real – live streaming – construídos sobre a Internet, e especialmente aqueles que exploram arquiteturas peer-to peer, estão sujeitos a falhas naturais e humanas. Para que as aplicações não só sobrevivam, mas apresentem características atrativas aos (muitos) milhares de usuários, diversos mecanismos precisam ser usados como suporte. Este artigo visa apresentar os principais tipos de falhas que afetam estes sistemas e bem como tecer comentários sobre dificuldades relacionadas ao seu tratamento, além de informações sobre a modelagem de falhas. O artigo não pretende oferecer soluções, mas servir como um alerta a pesquisadores iniciantes na área.

Referências

Androutsellis-Theotokis, S. and Spinellis D. (2006) “A Survey of Peer-to-peer Content Distribution Technologies.” ACM Computing Surveys v. 36, n. 4, December, pp. 335-371.

Avizienis, A., Laprie, J.-C., Randell, B. and Landwehr, C. (2004) “Basic Concepts and Taxonomy of Dependable and Secure Computing.” IEEE Transactions on Dependable and Secure Computing, v. 1, n. 1, pp. 11-33.

Awerbuch, B., Holmer, D., Nita-Rotaru C., and H. Rubens (2002) “An On-demand Secure Routing Protocol Resilient to Byzantine Failures”. Proceedings of the 1st ACM Workshop on Wireless Security. Atlanta, GA. pp. 21-30.

Ayer, A. S., Alvisi, L., Clement, A., Dahlin, M. Martin, J. P. and Porth, C. (2005) “BAR Fault Tolerance for Cooperative Services.” SIGOPS Oper. Syst. Rev., v.39, n. 5, October, pp. 45-58.

Castro, M., Druschel, P., Ganesh, A., Rowstron, A. and Wallach, D. S. (2002) “Secure Routing for Structured Peer-to-Peer Overlay Networks.” Proc. of the 5th Symposium on Operating Systems Design and Implementation (OSDI). Boston, MA. pp. 299-314.

DaSilva, L. A. and Srivastava, V. (2004) “Node Participation in Ad Hoc and Peer-to-Peer Networks: A Game-Theoretic Formulation”. Proceedings of the First Workshop on Games and Emergent Behaviors in Distributed Computing Environments. Birmingham, UK.

Dell'Amico, M. (2006) “Neighbourhood Maps: Decentralised Ranking in Small-World P2P Networks.” Proceedings of the Hot Topics in Peer-to-peer Systems (HoTP2P2006).

Douceur, R. (2002) “The Sybil attack.” Proceedings of the First International Workshop on Peer-to-peer Systems (IPTPS). Springer Berlin / Heidelberg, Cambridge, MA, USA, pp. 251-260.

Fodor, V., and Dán, G. (2007). “Resilience in Live Peer-to-peer Streaming.” IEEE Communications Magazine, v. 45, n. 6, June, pp. 116-123.

Friedman, E. J., and Resnick, P. (2001) “The Social Cost of Cheap Pseudonyms.” Journal of Economics & Management Strategy v.10, n.2, August, pp. 173-199.

Ge, Z., Figueiredo, D. R., Jaiswal, S., Kurose, J., Towsley, D. (2003) “Modeling Peer-Peer File Sharing Systems”. Proceedings of the Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2003), vol 3, pp. 2188-2198.

Hales, D. (2004) “From Selfish Nodes to Cooperative Networks - Emergent Link-Based Incentives in Peer-to-Peer Networks”. Proceedings of the Fourth International Conference on Peer-to-Peer Computing, pp. 151-158.

Haridasan, M., Jansch-Pôrto, I., and van Renesse, R. (2008) “Enforcing Fairness in a Live-Streaming System.” Proceedings of SPIE: Multimedia Computing and Networking. v. 6818. San Jose, CA.

Haridasan, M., and van Renesse, R. (2006) “Defense Against Intrusion in a Live streaming Multicast System.” Proceedings of the 6th IEEE International Conference on Peer-to-peer Computing (P2P). Cambridge, UK, pp. 185-192.

Li, H. C., et al. (2006) “BAR Gossip.” Proceedings of the 7th Symposium on Operating System Design and Implementation (OSDI '06). Seattle, WA, pp. 191-204.

Liao, X., Jin, H., Liu, Y., Ni, L. M., and Deng, D. (2006) “Anysee: Peer-to-Peer Live Streaming.” 25th IEEE Intl. Conf. on Computer Commun (INFOCOM) pp. 1-10.

Liu, J., Rao, S. G. and Zhang, H. (2008) “Opportunities and Challenges of Peer-to-peer Internet Video Broadcast.” Proceedings of the IEEE, v. 96, n. 1, Jan., pp. 11-24.

Magharei, N., and Rejaie, R. (2007) “PRIME: Peer-to-peer Receiver-drIven Mesh-based Streaming.” Proceedings of the 26th Conference on Computer Communications (INFOCOM). Anchorage, Alaska, pp. 1415-1423

Meddour, D.-E., Mushtag, M. and Ahmed, T. (2006) “Open Issues in P2P Multimedia Streaming.” Proc. IEEE ICC: Multimedia Commun. Workshop (MultiCom).

Nash, John (1950) “Equilibrium Points in n-person Games.” Proceedings of the National Academy of Sciences v. 36, n. 1, pp. 48-49.

Pai, V., Kumar, K., Kamilmani, K., Sambamurthy, V. and Mohr, E. (2005) “Chainsaw: Eliminating Trees from Overlay Multicast.” Proceedings of the 4th International Workshop on Peer-to-peer Systems (IPTPS). Ithaca, NY, pp. 127-140.

Piatek, M., Anderson, T. and Krishnamurthy, A. (2007) “A Case for Holistic Incentive Design.” Proc. Workshop Future Directions in Distr. Computing (FuDiCo III).

Shneidman, J., Parkes, D. C. (2003) “Rationality and Self-Interest in Peer to Peer Networks”. Proceedings of the 2nd International Workshop on Peer-to-Peer Systems (IPTPS'03). Berkeley, CA, USA, pp. 139-148

Singh, A., Castro, M., Rowstron, A. and Druschel P. (2004) “Defending against Eclipse attacks on overlay networks.” Proceedings of the 11th ACM SIGOPS European Workshop. Leuven, Belgium.

Yang, G.-H., Shen, D., Yang, D. and Li, V. O. K. (2006) “Adaptive Video Streaming over Multi-channel Ad Hoc Networks.” Global Telecommunications Conference IEEE (GLOBECOM'06). pp. 1-5.

Zhang, X., Liu, J., Li, B. and Yum, T.-S P. (2005) “CoolStreaming/DONet: A Data-Driven Overlay Network for Efficient Live Media Streaming.” Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM) v. 3. Miami, FL, USA, pp. 2102-2111.
Publicado
27/05/2008
Como Citar

Selecione um Formato
JANSCH-PÔRTO, Ingrid. Caracterização de Falhas Relacionadas a Aplicações de Live Streaming na Internet. In: WORKSHOP DE TESTES E TOLERÂNCIA A FALHAS (WTF), 9. , 2008, Rio de Janeiro/RJ. Anais [...]. Porto Alegre: Sociedade Brasileira de Computação, 2008 . p. 1-16. ISSN 2595-2684. DOI: https://doi.org/10.5753/wtf.2008.23142.