• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Hu Xiaoyan, Tong Zhongq, Xu Ke, Zhang Guoqiang, Zheng Shaoqi, Zhao Lixia, Cheng Guang, Gong Jian. Video Delivery over Named Data Networking: A Survey[J]. Journal of Computer Research and Development, 2021, 58(1): 116-136. DOI: 10.7544/issn1000-1239.2021.20190697
Citation: Hu Xiaoyan, Tong Zhongq, Xu Ke, Zhang Guoqiang, Zheng Shaoqi, Zhao Lixia, Cheng Guang, Gong Jian. Video Delivery over Named Data Networking: A Survey[J]. Journal of Computer Research and Development, 2021, 58(1): 116-136. DOI: 10.7544/issn1000-1239.2021.20190697

Video Delivery over Named Data Networking: A Survey

Funds: This work was supported by the National Natural Science Foundation of China (61602114, 61772279), the National Key Research and Development Program of China (2017YFB0801703, 2018YFB1800602), the CERNET Innovation Project (NGII20170406), and the Zhishan Youth Scholar Program of SEU.
More Information
  • Published Date: December 31, 2020
  • The Internet has developed into a network dominated by content delivery services such as delivering live and on-demand videos. There are some problems in traditional IP network in terms of supporting video delivery, such as the complexity and high overhead of the deployment of multicast, the disability to effectively utilize multipath transmission, the poor support for mobility and so on. Named data networking (NDN), a promising future Internet architecture, intrinsically supports in-network caching and multipath transmission. Consumers actively use interest message to request data packet from producer, and this consumer-driven communication model enables NDN to naturally support the mobility of consumers. These features offer the potential for NDN to efficiently deliver videos. This paper first introduces the background of video delivery and NDN, and then elaborates some schemes that take the advantages of NDN to deliver video: firstly, how do the strategies in NDN improve video bit rate; secondly, how do the strategies in NDN improve video playback stability; thirdly, how do the strategies in NDN protect video copyright and privacy; finally, how do the strategies in NDN transfer new types of video. According to the analysis of these existing schemes and the comparison of their performance over IP and NDN, the challenges of delivering videos over NDN are finally pointed out.
  • Related Articles

    [1]Yang Yongpeng, Jiang Dejun. A Method for Solving the wandering B+ tree Problem[J]. Journal of Computer Research and Development, 2023, 60(3): 539-554. DOI: 10.7544/issn1000-1239.202220555
    [2]Chen Yewang, Shen Lianlian, Zhong Caiming, Wang Tian, Chen Yi, Du Jixiang. Survey on Density Peak Clustering Algorithm[J]. Journal of Computer Research and Development, 2020, 57(2): 378-394. DOI: 10.7544/issn1000-1239.2020.20190104
    [3]Zhang Ming, Hua Yu, Liu Lurong, Hu Rong, Li Ziyi. A Write-Optimized Re-computation Scheme for Non-Volatile Memory[J]. Journal of Computer Research and Development, 2020, 57(2): 243-256. DOI: 10.7544/issn1000-1239.2020.20190524
    [4]Gao Peng, Wang Dongsheng, Wang Haixia. Extending PCM Lifetime by Redirecting Writes from the Most Modified Byte[J]. Journal of Computer Research and Development, 2019, 56(12): 2733-2743. DOI: 10.7544/issn1000-1239.2019.20180267
    [5]Niu Dejiao, He Qingjian, Cai Tao, Wang Jie, Zhan Yongzhao, Liang Jun. APMSS: The New Solid Storage System with Asymmetric Interface[J]. Journal of Computer Research and Development, 2018, 55(9): 2083-2093. DOI: 10.7544/issn1000-1239.2018.20180198
    [6]Cui Yu, Zhang Hongli, Tian Zhihong, and Fang Binxing. Multi-Addresses Amplification DoS Attacks by Native IPv6 and IPv6Tunnels[J]. Journal of Computer Research and Development, 2014, 51(7): 1594-1603.
    [7]Sun Zhizhuo, Zhang Quanxin, Li Yuanzhang, Tan Yu'an, Liu Jingyu, Ma Zhongmei. Write Optimization for RAID5 in Sequential Data Storage[J]. Journal of Computer Research and Development, 2013, 50(8): 1604-1612.
    [8]Hu Chaojian, Li Zhoujun, Guo Tao, Shi Zhiwei. Detecting the Vulnerability Pattern of Writing Tainted Value to Tainted Address[J]. Journal of Computer Research and Development, 2011, 48(8): 1455-1463.
    [9]Qiu Yuanjie and Liu Xinsong. Writing Mechanism in Digital Organism File System[J]. Journal of Computer Research and Development, 2010, 47(12).
    [10]Huan Dandan, Li Zusong, Hu Weiwu, Liu Zhiyong. A Cache Adaptive Write Allocate Policy[J]. Journal of Computer Research and Development, 2007, 44(2): 348-354.
  • Cited by

    Periodical cited type(0)

    Other cited types(5)

Catalog

    Article views (1076) PDF downloads (435) Cited by(5)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return