EP3243315A1 - Method of protocol management and operation of a content distribution network - Google Patents
Method of protocol management and operation of a content distribution networkInfo
- Publication number
- EP3243315A1 EP3243315A1 EP16700952.1A EP16700952A EP3243315A1 EP 3243315 A1 EP3243315 A1 EP 3243315A1 EP 16700952 A EP16700952 A EP 16700952A EP 3243315 A1 EP3243315 A1 EP 3243315A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- peer
- network
- peers
- piece
- content
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
- H04L67/1061—Peer-to-peer [P2P] networks using node-based peer discovery mechanisms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
- H04L67/1044—Group management mechanisms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
- H04L67/1074—Peer-to-peer [P2P] networks for supporting data block transmission mechanisms
- H04L67/1078—Resource delivery mechanisms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/08—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
- H04L43/0876—Network utilisation, e.g. volume of load or congestion level
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
- H04L67/1042—Peer-to-peer [P2P] networks using topology management mechanisms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
- H04L67/1061—Peer-to-peer [P2P] networks using node-based peer discovery mechanisms
- H04L67/1068—Discovery involving direct consultation or announcement among potential requesting and potential source peers
Definitions
- the present invention relates to methods and computer program products for exerting an action on the management of peer-to-peer networks, also called P2P, and the dissemination of information in these networks, operating according to an exchange protocol.
- P2P peer-to-peer networks
- Peer-to-Peer is a network approach where all users, called peers, behave as both a client and a server depending on the nature of the request they receive. This procedure provides fast and efficient sharing in which content is available within multiple devices by replication.
- peer-to-peer architecture adapts to changes in the size of the network, the latter generating in particular its own organization to the addition of a new peer.
- the operations of the peer-to-peer networks mentioned above are globally similar to each other. The few differences are in the methods of distribution or provision of content, and in the policy of choosing the peer to serve.
- a peer who wants to share content makes it accessible by proposing for example a "torrent" file, in the case of the BitTorrent network, or by connecting to an application, such as eMule or Shareaza for the eDonkey networks or Gnutella, which offers a search tool and makes some of the peer's personal storage space available to other connected peers.
- the BitTorrent network exchange protocol uses powerful bandwidth peers to ensure network survival, by randomly selecting the first list sent by a "tracker", which is a server listing which peers are involved in the distribution desired content.
- Other networks operate on a waiting list, for example with an age coefficient in the case of the eDonkey network.
- the contents are not directly available.
- the peer must search for a file corresponding to the desired content on Internet sites that act as directories, called meta-information files.
- the peer launches its application and begins sharing with a peer group built around that same content.
- the desired content may be available on an Internet page, which requires the launch of an extension module, or "plugin” in English, on the page.
- Internet browser or "browser” in English, for example the AceStream plug-in.
- launching an application after retrieving the link broadcasting the content may be necessary, for example the Sopcast or AceStream applications.
- the peer contacts a tracker, which responds with a list of peers who already have or are downloading the desired content.
- the peer sends queries to the list of peers sent by the tracker and starts sharing if they accept.
- Exchange protocols for peer-to-peer networks are used to define a basic operation to manage different exchanges between peers.
- peers in the network can exchange peers lists to find the most suitable peer, a step called "peer exchange" in English.
- This technique makes it possible to use the bandwidth of the peers downloading content for searching for peers, information and content present in the network, instead of using the bandwidth of the network server.
- a peer who has finished downloading a piece of content may send to the other peers with which he is connected an acknowledgment message, "Hâve message” in English, indicating that the peer has received a piece and has verified its integrity through hash tables.
- This allows to have a local vision, limited to the vicinity of said peer, that is to say to the peers with which it is connected, the progress of these neighboring peers in the download.
- Peers can also know who to turn to for parts that interest them. This also allows you to calculate the rarest piece in a certain neighborhood and ask for it later.
- peers may send a message to signal their interest, "interested" in English.
- the peer In response to this message of interest, if the peer agrees to share the piece, he may send an acceptance message, "unchocke message” in English. If not, it sends a refusal message, "choke” in English, and puts the interested peer on hold.
- the peers can exchange with each other a message containing a string of bits indicating the possession or not of a piece, a message called "Bitfield" in English.
- trackers listing which peers are involved in the distribution of the searched content only serve as a directory role.
- the trackers send an initial peer list to which the current peer, called “user”, can connect and passively collect information, such as the numbers of peers connected, the size of the desired content, information from hashes for the integrity of file sharing, "hash information" in English, the timestamp of content, or "timestamp” in English, especially in the case of real-time sharing.
- these trackers can quickly be overloaded.
- the power of a peer's bandwidth may further privilege it more than others, allowing it to be served throughout its connection.
- Some peers may have selfish behavior by not making other peers, also known as “network nodes”, benefit from their good bandwidth.
- network nodes also known as “network nodes”
- peers do not invest in the survival of the network and do not seek to help other peers in difficulty because of their low download rates: the notion of "super-node” or "super-peer” is nonexistent.
- the application FR 2 989 241 describes a method for broadcasting content in client / server mode to at least one client in a format allowing its subsequent distribution. in P2P mode. To do this, the client receives the IP coordinates and the port of the other clients of the network when broadcasting a piece of content in client / server mode.
- the application EP 2 109 289 discloses a method for facilitating the distribution of content in P2P mode.
- a peer can know the other members of the swarm through a stream of metadata received with the content and containing information to identify the members of the swarm, these metadata being used directly by the peer to optimize the swarm and reception of content.
- peers only have a local view of the state of the network, which limits their actions within it. They do not know for example where the download of any particular piece at the network level, are not aware of the rarest part of the network, the average download rate, the overall power of the network nor of its real size.
- the aim of the invention is to meet this need and it succeeds, according to one of its aspects, thanks to a method of managing a peer-to-peer network operating according to at least one exchange protocol intended to broadcast data. pieces of content within said network between a plurality of peers,
- the peer receiving said piece further receives status information from the peer-to-peer network having at least one value of a network parameter from peers other than those with which the peer is connected,
- the peer determines, from said information accompanying the piece received, at least one at least partially updated value of the parameter of the peer-to-peer network, in order to induce an operation of the protocol exchange dependent on said at least one updated value of the network parameter and at least one parameter representative of the state of said peer.
- the operation of the exchange protocol can thus depend on the updated values of the network parameters after each coin reception by a peer.
- An operation of the exchange protocol depending on the updated values of the network parameters and at least one parameter representative of the state of said pair is advantageously induced.
- the peers manage themselves, the choice of an adapted protocol position being determined locally by each pair according to its state and from precise information of the state of the network, brought locally to each peer and retrieved from other peers, including remote peers in the network and without direct data exchange with that peer.
- the exchange protocol is thus evolving, not fixed, taking shape, evolving and adapting through the peers that integrate the network.
- the invention during exchanges between peers, a calculation of the dynamic aspects of the peers and the network, in particular the bandwidth, the pieces already downloaded, the rare pieces of the neighborhood, the state of the neighborhood peers, is realized simultaneously. to estimate the exact state of the network, giving the possibility to each peer to act on the network according to its state, in order to adopt the most appropriate protocol attitude.
- the invention makes it possible to involve the peers of the network so that they invest themselves at their true level of capacity in the decision-making, by relating to each peer of the network the global information locally so that he can choose his protocol posture.
- the combination of the global parameters of the network gives the possibility to the peers to act according to their own capacities. Having a global view of the network allows peers to move forward in a harmonious way in downloading, and to reduce the phenomenon of clusters of peers, very common in this type of network. This allows optimal and decentralized management of the network.
- CDN content delivery network
- network-connected peer refers to a peer connected to the network, seeking to retrieve content and / or having at least some of the content sought.
- peerers other than those with which the peer is connected one must understand distant peers, not belonging to the neighborhood of the peer, which groups together only about 20 to 30 neighboring peers.
- the method according to the invention thus enables the current peer to have a precise, global and extended network vision, not limited to its vicinity.
- the invention is also adapted to real-time downloading of content, including content corresponding to television programs, films or sports events. This makes it possible to quickly adapt the behavior of the network throughout the downloading of the pieces forming the content.
- the content to be downloaded is preferably a multimedia content, being for example in * .arr, * .mpg, * .mov, * .esf, * .wmv, * .dvx, * .qt, * .avi format, among others . It can also be at least one musical file in * .wav format, * .mp3, * .ra, * .ram, * .aiff, * .en * .mid, among others or in images * .jpg, * .bmp, * .png, * .tif, * .ps, * .eps, among others. It can still be software packages, games or any other program, including protected by intellectual property rights.
- the content is advantageously divided into several pieces of content.
- Each peer connects advantageously to the network and begins its exchanges by a basic protocol operation, as described above.
- the status information of the peer-to-peer network comprising at least one value of a network parameter is advantageously transmitted between the peers.
- the peer rather quickly, for example after the download of about 10 or 15 pieces, the peer thus begins to have a good vision of the network, transported by the neighbors of his neighbors.
- the information accompanying each piece received by the peer contains at least one value of a parameter concerning the parts shared between the peers, in particular the download rate of each piece or a list. some of the rarest pieces available on the peer-to-peer network.
- the list of the rarest parts available on the peer-to-peer network can group the indices of the rarest pieces calculated according to "Bitfield" messages sent by each peer to the other peers in the network when connecting to the network and reporting the pieces it has already received, and "Have” acknowledgment messages received by network peers each time a coin is received and containing the index of said piece and the estimate of the index of the rarest part of the network at this time.
- the information accompanying each piece received by the peer contains at least one value of a parameter relating to the peer-to-peer network itself, in particular the overall bandwidth of the network, the number network peers, the estimated wait time for each part, a potential peer waiting list, or an index of the quality of the peer connection to the network.
- the overall bandwidth of the network can be calculated from an average bandwidth using an estimate of the bandwidth of the peer made at the moment when the latter begins to download a piece and the sum of the bandwidths contained in the messages received. by peers with which said peer is connected divided by the number of peers having sent said messages.
- Wi (t) Weight, which is the number of peers who contributed to the download.
- the information accompanying each piece received by the peer contains at least one value of a parameter concerning the security of the network, in particular the ratio between the number of pieces broadcast and the number of pieces received or a reliability index on the presence of false content pieces. This ratio makes it possible to evaluate the number of pieces "lost" on the network during their distribution.
- This reliability index is used to calculate the number of malicious peers, in order to measure the effectiveness of the network and its level of security.
- the peer advantageously checks whether the piece received corresponds to the expected piece or if it is corrupted content, using hash tables, including SHA1 technology. In the second hypothesis, the peer may increment said reliability index of the number of new malicious peers transmitting the corrupted content.
- the maximum value between the value of the reliability index of the peer and those of neighboring peers is advantageously recorded and sent by the peer in the message "Have".
- Said reliability index is preferably reset periodically, in order to avoid ending up with an erroneous index, especially in the case where malicious peers leave the network at the instant t when the corrupted content is received. This makes it possible to have a more accurate view of the security level of the network, based on the coins received from time t + 1 and on the reliability indices of neighboring peers calculated in the same way.
- the parameter representative of the peer state and used to adapt the operation of the exchange protocol may concern its bandwidth, its quality of connection, the parts already received and / or the power of the processor on which the peer operates.
- the peer advantageously transmits to the other peers of the network said at least one value of a parameter of the peer-to-peer network at least partially updated after receiving a piece of content, in order to contribute to the transport of the state information to other peers, who will in turn be able to update this information and adapt their protocol position.
- the status information of the peer-to-peer network comprising at least one value of a network parameter and accompanying the broadcast of a piece of content is advantageously inserted into the "Have" acknowledgment message, indicating to the others network peers that such piece, in particular identified by an index, was received by the peer.
- the network status information can be integrated following the message "Have" of a peer Po, in the form of indices, for example presented as follows: “Have (index piece received, index of the room the most rare, (Bandwidth, Weight), Reliability Index, ...) ", and noted P 0 (Idp, Irp, (B (t), W (t)), Is, ).
- a peer having a bandwidth greater than a predefined threshold and / or a power processor greater than a predefined threshold may be oriented to at least one other peer suffering from a poorer quality of connection to serve as a gateway to the network, then playing a role of "super-peer".
- predefined thresholds advantageously depend on the nature of the exchanges on the network, consisting for example of the sharing of files of the network or the exchange of content broadcast in real time, and the quality of the content, for example HD ("High Definition”). in English) or SD (“Standard Definition”).
- Said predefined bandwidth threshold may be equal to 300 Kb / s, better at 600 Kb / s, for example in the case of SD quality content and broadcast in real time.
- Said predefined threshold of processor power may be equal to 1 GHz, for example in the case of SD quality content and broadcast in real time.
- a peer having a bandwidth less than said predefined threshold is oriented towards areas of the network comprising peers having higher bandwidths.
- the peer may have sufficient bandwidth, but later, for example, other tasks may be performed on the processor of the device by which it is connected to the network, thus decreasing its bandwidth, and therefore its quality of service. Thanks to the invention, the peer can adapt its protocol position within the network according to the evolution of its bandwidth and its global knowledge of the network.
- the action of the peer on the network can be in the form of a disconnection of a peer or peer group in the network to connect to another peer or group in order to smoothly advance the download. .
- the peer may move to another peer group in the network more appropriate according to its resources.
- a peer having a bandwidth greater than the overall bandwidth of the network may be disconnected from a portion of the peers with which it is connected in order to be connected to peers in the network with lower bandwidth.
- a peer comprising rare pieces is oriented towards areas of the network where the entropy of said parts rare is weak. This allows remote peers to also benefit from these rare contents. Indeed, in a peer-to-peer network, peers may own no part, some parts, or all parts of the content.
- the bandwidth parameters and the list of the rarest parts can serve as orientation rule: a peer that shares a high download average represents a neighborhood with an interesting download average. Peers who have difficulty starting their downloads in a consistent manner can move on their own to be able to track the download speed of the network.
- the distribution of the pieces within the network can be switched from the peer-to-peer mode to said client / mode. server according to the values of the network parameters updated after each reception of a piece of content and at least one parameter representative of the state of said peer.
- the method according to the invention makes it possible to determine the moment of switching between the two modes and how to proceed. . For example, if the average bandwidth and the size of the network show that the peers are not able to ensure a sufficient quality of service, the additional server or servers will be solicited by the peers most in difficulty to receive the parts and the missing bandwidth. Thanks to the invention, the intervention of servers is accurate and targeted.
- the invention also relates to a computer program product for implementing the method of managing a peer-to-peer network according to the invention, operating according to at least one exchange protocol. intended to broadcast pieces of content within said network between a plurality of peers, the program product computer having code instructions that, executed on a processor, cause:
- the peer receiving said piece further receives status information from the peer-to-peer network comprising at least one value of a network parameter from peers other than those with which said peer is connected, and that
- the peer determines, from said information accompanying the piece received, at least one at least partially updated value of said peer-to-peer network parameter in order to induce an operation of the exchange protocol dependent on said at least one updated value of the network parameter and at least one parameter representative of the state of said pair.
- a peer Po can integrate, during a step 11, a peer-to-peer network in order to download and share pieces of content.
- Said peer P 0 advantageously starts its exchanges in the peer-to-peer network by basic protocol operation, using network peer lists exchanged between peers to find the best matched pair according to the desired content.
- Po peer when finished downloading a piece of content advantageously sends to the other peers of the network with which it is connected a message "Hâve" of acknowledgment, indicating that he received a piece and checked his integrity through hash tables, including SHA1 technology.
- other peers can send an "interested” message to signal their interest.
- the peer P 0 if the peer P 0 agrees to share the coin, it can send an "unchocke” acceptance message. Otherwise, it sends a "choke” rejection message, and puts the interested peer on hold.
- Network peers also exchange advantageously between them a "Bitfield” message comprising a string of bits indicating the possession or not of a part.
- the state of the network is measured, during a step 12 shown in FIG. 1, during the diffusion of a piece of content between two peers, and the peer P 0 receiving said piece further receives network status information having at least one value of a network parameter from peers other than the peer neighbors of said peer.
- the state of the peer Po is also advantageously measured.
- the peer P 0 can determine, from said information accompanying the received part, at least one at least partially updated value of the peer-to-peer network parameter in order to induce, in a step 14, an operation of the exchange protocol depending on the updated values of the parameters of the network and at least one parameter representative of the state of said peer.
- the status information of the peer-to-peer network comprising at least one value of a network parameter and accompanying the broadcasting of a piece of content, during a step 21, can be inserted in a message "Have”.
- the peer P 0 After each reception of a room, as shown in FIG. 2, the peer P 0 transmits to the other peers of the network Pi ... P N said at least one value of a parameter of the at least partially updated peer-to-peer network.
- said information accompanying each piece received by the peer Po advantageously contains at least one value of a parameter relating to the pieces shared between the peers, for example a list of the rarest pieces available on the peer-to-peer network. peer.
- This list of the rarest parts available on the peer-to-peer network can gather the indices of the rarest pieces calculated according to "Bitfield" messages sent by each peer to the other peers of the network during its connection to the network and signaling the parts it has already received, and "Have" messages received by network peers each time a coin is received containing the index of the coin and the estimate of the index of the rarest coin in the network at this moment.
- a bit equal to 0 advantageously corresponds to a missing piece, a bit equal to 1 corresponding to a coin in possession.
- the index of the rarest piece then corresponds advantageously to: Min (sum Bitfields).
- the peers Pi, P 2 and P 3 can include in their messages "Hâve" information Pi (index of the downloaded part, the rarest piece according to the global vision of the peer), for example: Pi (1,5), P 2 (11, 9) and P 3 ( 3, 13 ).
- Pi index of the downloaded part, the rarest piece according to the global vision of the peer
- the peer P 0 recalculates the index of the rarest part as follows:
- the information accompanying each piece received by the peer Po contains the download rate of each piece.
- the information accompanying each piece received by the peer P 0 may also contain, as represented in FIG. 2, at least one value of a parameter relating to the peer-to-peer network itself, for example the global bandwidth of the network, the number of peers in the network, and a possible queue of parts to be recovered, particularly in the case of sharing content broadcast in real time.
- the overall bandwidth of the network can be calculated from an average bandwidth using the estimate of the bandwidth of the peer Po at the moment when the latter begins to download a piece and the sum bandwidths contained in the messages received by the peers with which said peer P 0 is connected, divided by the number of peers having sent said messages.
- the information accompanying each piece received by the peer Po contains the estimated waiting time for each piece and / or an index on the quality of the peer connection to the network.
- the information accompanying each piece received by the peer may also contain, as in the example shown in FIG. 2, at least one value of a parameter relating to the security of the network, in particular the ratio between the number of pieces broadcast and the number of pieces received or a reliability index on the presence of false pieces of content.
- the peer Po advantageously checks whether the piece received corresponds to the expected piece or if it is corrupted content, using hash tables.
- the peer P 0 can increment said reliability index of the number of new malicious peers transmitting the corrupted content.
- the maximum value between the value of the reliability index of the peer Po and those of the neighboring pairs is advantageously recorded and sent by the peer Po in the message "Have".
- Said reliability index is preferably reset periodically.
- index max (index index_swarm)
- Said parameter representative of the peer state P 0 used to adapt the operation of the exchange protocol may concern its bandwidth, its connection quality, the parts already received or the power of the processor on which the peer operates.
- the peer P 0 has a bandwidth greater than a predefined threshold and / or a power processor greater than a predefined threshold, it can be directed to at least one other peer suffering from a poorer quality of connection to serve as a gateway to the network.
- the peer P 0 has a bandwidth less than said predefined threshold, as a function of the values of the network parameters updated after each reception of a piece of content, it may be directed to areas of the network comprising peers having higher bandwidths.
- the peer Po According to the values of the network parameters updated after each reception of a piece of content, in the case where the peer Po has a bandwidth greater than the overall bandwidth of the network, it can be disconnected from a part of the peers with which it is connected to be connected to peers of the network having a lower bandwidth.
- the peer P 0 comprises rare pieces
- it may be directed towards areas of the network where the entropy of said rare pieces is low.
- the dissemination of the parts within the network is advantageously switched from the peer-to-peer mode to said client / server mode as a function of the values of the updated network parameters after each reception of a piece of content and at least one parameter representative of the state of said peer Po.
- the peer Po advantageously has a device, including a computer, a tablet or a smart mobile phone, "smartphone" in English, comprising a processor on which can run a computer product program with code instructions for the implementation of implementation of the management method according to the invention.
- the method according to the invention can be implemented in any peer-to-peer exchange network, such as BitTorrent, Gnutella or eDonkey, for example.
- the network connection used may be the Internet, or a local network such as Ethernet or a university campus network. It can also be networks using wireless technologies such as telephone networks.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Mathematical Physics (AREA)
- Theoretical Computer Science (AREA)
- Computer And Data Communications (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR1550172A FR3031643B1 (en) | 2015-01-09 | 2015-01-09 | METHOD FOR THE MANAGEMENT AND PROTOCOLIAL OPERATION OF A CONTENT DISTRIBUTION NETWORK |
PCT/EP2016/050307 WO2016110583A1 (en) | 2015-01-09 | 2016-01-08 | Method of protocol management and operation of a content distribution network |
Publications (1)
Publication Number | Publication Date |
---|---|
EP3243315A1 true EP3243315A1 (en) | 2017-11-15 |
Family
ID=52824413
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP16700952.1A Withdrawn EP3243315A1 (en) | 2015-01-09 | 2016-01-08 | Method of protocol management and operation of a content distribution network |
Country Status (4)
Country | Link |
---|---|
US (1) | US20170374142A1 (en) |
EP (1) | EP3243315A1 (en) |
FR (1) | FR3031643B1 (en) |
WO (1) | WO2016110583A1 (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11172021B2 (en) * | 2018-02-06 | 2021-11-09 | Hewlett-Packard Development Company, L.P. | File objects download and file objects data exchange |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100682967B1 (en) * | 2006-02-22 | 2007-02-15 | 삼성전자주식회사 | Xor logic circuit using magnetic tunneling junction cell and method for operating the xor logic circuit |
WO2007110865A1 (en) * | 2006-03-27 | 2007-10-04 | Rayv Inc. | Realtime media distribution in a p2p network |
US7814146B2 (en) * | 2006-12-05 | 2010-10-12 | International Business Machines Corporation | File fragment trading based on rarity values in a segmented file sharing system |
US9172751B2 (en) * | 2008-04-09 | 2015-10-27 | Nokia Technologies Oy | Content distribution |
FR2989241B1 (en) * | 2012-04-05 | 2018-01-26 | Easybroadcast | METHOD FOR DIFFUSION OF CONTENT IN A COMPUTER NETWORK |
-
2015
- 2015-01-09 FR FR1550172A patent/FR3031643B1/en active Active
-
2016
- 2016-01-08 WO PCT/EP2016/050307 patent/WO2016110583A1/en active Application Filing
- 2016-01-08 US US15/542,581 patent/US20170374142A1/en not_active Abandoned
- 2016-01-08 EP EP16700952.1A patent/EP3243315A1/en not_active Withdrawn
Also Published As
Publication number | Publication date |
---|---|
FR3031643B1 (en) | 2018-03-02 |
US20170374142A1 (en) | 2017-12-28 |
WO2016110583A1 (en) | 2016-07-14 |
FR3031643A1 (en) | 2016-07-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
FR2855691A1 (en) | Hybrid peer to peer network central server for digital document distribution, has program with communication module sending message with document reference, address of system likely to contain document and access key, to client | |
WO2006016055A2 (en) | Referencing method and server of station-to-station broadcast of files requested by downloading to said server | |
FR3034943A1 (en) | METHOD FOR CONTINUOUS READING ON CUSTOMER EQUIPMENT OF DIFFUSE CONTENT WITHIN A PAIR AUDIO NETWORK | |
EP3156920B1 (en) | Method for broadcasting content in a computer network | |
FR2928800A1 (en) | METHOD OF MANAGING PEER IDENTIFIER RECEIVERS TO ACCESS P2P MODE TO CONTENTS THAT THEY STORE, AND ASSOCIATED MANAGEMENT DEVICE AND NETWORK EQUIPMENT THEREFOR. | |
Li et al. | Challenges, designs, and performances of large-scale open-P2SP content distribution | |
EP2039126B1 (en) | Method for combatting the illicit distribution of protected material and computer system for carrying out said method | |
EP2856719B1 (en) | Technique for communication in an information-centred communication network | |
WO2016110583A1 (en) | Method of protocol management and operation of a content distribution network | |
WO2008062140A2 (en) | Method for reacting to the broadcast of a file in a p2p network | |
WO2009027612A2 (en) | Method for constructing a virtual environment in a p2p network of the delaunay type by dynamic grouping of nodes, assistance device and related equipment | |
EP3205067B1 (en) | Broadcasting contents by streaming in a peer-to-peer network | |
Bronzino et al. | An adaptive hybrid CDN/P2P solution for content delivery networks | |
Dhungel et al. | The seed attack: Can bittorrent be nipped in the bud? | |
Allali et al. | Measurement of edonkey activity with distributed honeypots | |
Yang et al. | A novel on-demand streaming service based on improved BitTorrent | |
WO2011080465A1 (en) | Method and device for transmitting content | |
WO2009056743A2 (en) | Device and method for supervising source equipment | |
EP2633642B1 (en) | Methods of communication, communication device, management entity, computer program and storage medium for the hybrid distribution of data | |
FR3079099A1 (en) | METHOD FOR DIFFUSION OF CONTENT | |
Legout | Peer-to-Peer Applications: From BitTorrent to Privacy | |
Talaei et al. | Adding multimedia streaming to BitTorrent | |
EP2604019B1 (en) | Method for slowing down, or even eliminating, the illegal propagation of a protected video content broadcast by streaming in a peer-to-peer network | |
Legout et al. | Peer-to-Peer Applications | |
Parkes et al. | CS 186 Lecture 3—P2P File-Sharing |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE |
|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE |
|
17P | Request for examination filed |
Effective date: 20170809 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
AX | Request for extension of the european patent |
Extension state: BA ME |
|
DAV | Request for validation of the european patent (deleted) | ||
DAX | Request for extension of the european patent (deleted) | ||
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
RIN1 | Information on inventor provided before grant (corrected) |
Inventor name: MNIE-FILALI, IMANE Inventor name: ROUIBIA, SOUFIANE Inventor name: CASALTA, BASTIEN |
|
17Q | First examination report despatched |
Effective date: 20180525 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20200603 |