Peer-To-Peer (P2P) Technologies and Services

Total Page:16

File Type:pdf, Size:1020Kb

Peer-To-Peer (P2P) Technologies and Services Technical Report 009 Peer-to-Peer (P2P) Technologies and Services EBU TECHNICAL Your reference in media technology and innovation Geneva May 2010 ° Issued by EBU TECHNICAL L’Ancienne Route 17A 1218 Le Grand-Saconnex Switzerland [email protected] All rights reserved. EBU Technical Report 009 P2P Technologies & Services A year in the Internet business is like a dog year, equivalent to seven years in a regular person’s life. Vint Cerf, Internet pioneer Contents General Glossary ................................................................................................... 9 Executive Summary ..............................................................................................15 1. Introduction..............................................................................................19 2. Internet Media Distribution Technologies .........................................................22 2.1 Unicast streaming ..................................................................................... 22 2.2 IP Multicast streaming ................................................................................ 23 2.3 File Downloading....................................................................................... 24 2.4 Progressive Download ................................................................................. 24 2.5 Peer-to-Peer (P2P) .................................................................................... 25 2.6 Podcasting .............................................................................................. 26 2.7 Content Distribution Networks (CDNs) ............................................................. 26 2.8 Hybrid P2P – CDN systems ............................................................................ 28 3. A short history of P2P..................................................................................29 3.1 First generation P2P................................................................................... 29 3.2 Second generation P2P ............................................................................... 30 3.3 Third generation P2P.................................................................................. 31 4. A wealth of P2P networks and clients..............................................................31 4.1 Freenet .................................................................................................. 33 4.2 Gnutella ................................................................................................. 34 4.3 Kazaa .................................................................................................... 35 4.4 BitTorrent............................................................................................... 36 4.5 µTorrent................................................................................................. 38 4.6 Tribler ................................................................................................... 39 4.7 P2P-enabled Adobe Flash player .................................................................... 40 5. P2P Business Environment ............................................................................40 5.1 Business Model and Cost Considerations ........................................................... 42 5.2 P2P Business Opportunities and Challenges ....................................................... 43 5.3 P2P Business Models................................................................................... 43 6. P2P use cases ............................................................................................46 6.1 Streaming media services ............................................................................ 46 6.2 P2P-enabled Internet-format catch-up TV services.............................................. 46 6.3 P2P-enabled Internet device to record broadcast programmes................................ 46 6.4 Progressive download services ...................................................................... 47 6.5 Deferred download services ......................................................................... 47 6.6 Broadcast content related URI available from P2P-enabled Internet device ................ 47 6.7 Protected content with Portal....................................................................... 47 3 EBU Technical Report 009 P2P Technologies & Services 6.8 Protected content without Portal ...................................................................47 6.9 PIP to display signing services........................................................................47 6.10 P2P-enabled IPTV HNED accessing CoD services ..................................................48 6.11 Broadcast subtitles to be carried by P2P...........................................................48 6.12 P2P-enabled Internet DVR to record broadcast content .........................................48 6.13 Protected content on multiple devices.............................................................48 6.14 Picture-in-Picture (PIP) to display Internet content related to main broadcast.............48 6.15 Pre-positioned download services ...................................................................48 6.16 Customized Programming Guides....................................................................49 7. Broadcast Technical and Commercial Requirements for a Viable P2P System ............ 49 7.1 Motivations and objectives ...........................................................................50 7.2 Working assumptions ..................................................................................51 7.3 System architecture ...................................................................................51 7.4 General P2P-related requirements ..................................................................53 7.5 P2P delivery-related requirements..................................................................54 7.6 Social networks and user preferences ..............................................................55 7.7 Content formats ........................................................................................55 7.8 Content delivery........................................................................................55 7.9 Content acquisition ....................................................................................56 7.10 Service management and service monitoring......................................................56 7.11 Management of P2P functions in a CE device......................................................57 7.12 Security issues ..........................................................................................57 7.13 Geolocation, DRM and storage-related issues .....................................................57 7.14 Network neutrality.....................................................................................58 8. Existing commercial P2P services................................................................... 58 8.1 Octoshape ...............................................................................................59 8.2 RawFlow .................................................................................................59 8.3 Abacast ..................................................................................................60 8.4 BitTorrent DNA .........................................................................................61 8.5 PPlive ....................................................................................................62 8.6 SwarmPlayer ............................................................................................63 9. P2P Trials, Experiments and Experiences......................................................... 64 9.1 Eurovision Song Contest...............................................................................64 9.2 EBU Member Services..................................................................................64 9.3 EBU Test at IBC 2006 ..................................................................................65 9.4 Prix Europa 2006 concert .............................................................................66 9.5 WDR evaluations of PPLive and TVants .............................................................66 9.6 Danish Broadcasting corporation P2P trials using RawFlow and Octoshape ..................67 9.7 EBU P2P Media Portal..................................................................................69 9.8 EBU’s Tribler experiences ............................................................................70 9.9 IBC 2008 and IBC 2009 – P2P-Next trial using a Pioneer set-top-box...........................71 4 EBU Technical Report 009 P2P Technologies & Services 10. P2P Social Networks....................................................................................72 10.1 Free-riding issue ....................................................................................... 72 10.2 User data and privacy issues......................................................................... 73 11. Consumer Electronics..................................................................................74 11.1 P2P-enabled Devices .................................................................................. 74 11.2 Implications of P2P for CE Devices.................................................................. 74 11.3 Motivation for CE vendors to build P2P
Recommended publications
  • Najlepsze Programy Do Pobierania Torrentów
    TOP 10: Najlepsze programy do pobierania torrentów Wpisany przez Wojtek Onyśków Wtorek, 10 Listopad 2015 09:00 Wybieramy dziesięć najlepszych programów do pobierania plików torrent. {reklama-artykul} Torrenty to nie najnowszy, aczkolwiek jeden z najbardziej popularnych sposobów pobierania plików z internetu. Zasada działania tej sieci jest bardzo prosta - każdy z użytkowników pobierając jakiś plik, udostępnia go także innym osobom, a prędkość pobierania jest uzależniona głównie od ilości aktywnych internautów. Do pobierania torrentów służą specjalne programy, różniące się między sobą ilością opcji konfiguracyjnych oraz poziomem skomplikowania. Poniżej przedstawiamy dziesięć najlepszych według nas klientów sieci torrent, które sprostają oczekiwaniom nawet najbardziej wymagających użytkowników. Kolejność rankingu jest całkowicie losowa. Vuze Licencja: Bezpłatna (freeware) / Rozmiar: 10.3 MB / System: Windows XP/Vista/7/8/10 Vuze obsługuje wszystkie popularne typy plików torrent, choć jego działanie nie kończy się na pobieraniu i udostępnianiu danych. Twórcy skupili się na szerszych możliwościach związanych z multimediami. Program posiada wbudowaną wyszukiwarkę, za pomocą której znajdziemy najnowsze filmy czy też muzykę na najpopularniejszych stronach z torrentami. To jednak nie wszystko. Vuze posiada również rozbudowane opcje społecznościowe, dzięki którym udostępnimy pliki naszym znajomym, a nawet przydzielimy im odpowiednią ilość pasma internetowego. Aplikacja posiada wbudowany odtwarzacz plików multimedialnych, by bez wychodzenia z programu podejrzeć to, co właśnie ściągnęliśmy. Vuze należy zatem traktować jako kombajn multimedialny oferujący możliwość pobierania plików torrent. Vuze - Pobierz za darmo! Program Vuze 1 / 7 TOP 10: Najlepsze programy do pobierania torrentów Wpisany przez Wojtek Onyśków Wtorek, 10 Listopad 2015 09:00 uTorrent Licencja: Bezpłatna (freeware) / Rozmiar: 1.73 MB / System: Windows XP/Vista/7/8/10 uTorrent to jeden z najpopularniejszych programów do pobierania plików torrent.
    [Show full text]
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • The Wealth of Networks How Social Production Transforms Markets and Freedom
    Name /yal05/27282_u00 01/27/06 10:25AM Plate # 0-Composite pg 3 # 3 The Wealth of Networks How Social Production Transforms Markets and Freedom Yochai Benkler Yale University Press Ϫ1 New Haven and London 0 ϩ1 Name /yal05/27282_u00 01/27/06 10:25AM Plate # 0-Composite pg 4 # 4 Copyright ᭧ 2006 by Yochai Benkler. All rights reserved. Subject to the exception immediately following, this book may not be repro- duced, in whole or in part, including illustrations, in any form (beyond that copy- ing permitted by Sections 107 and 108 of the U.S. Copyright Law and except by reviewers for the public press), without written permission from the publishers. The author has made an online version of the book available under a Creative Commons Noncommercial Sharealike license; it can be accessed through the author’s website at http://www.benkler.org. Printed in the United States of America. Library of Congress Cataloging-in-Publication Data Benkler, Yochai. The wealth of networks : how social production transforms markets and freedom / Yochai Benkler. p. cm. Includes bibliographical references and index. ISBN-13: 978-0-300-11056-2 (alk. paper) ISBN-10: 0-300-11056-1 (alk. paper) 1. Information society. 2. Information networks. 3. Computer networks—Social aspects. 4. Computer networks—Economic aspects. I. Title. HM851.B457 2006 303.48'33—dc22 2005028316 A catalogue record for this book is available from the British Library. The paper in this book meets the guidelines for permanence and durability of the Committee on Production Guidelines for Book Longevity of the Council on Library Resources.
    [Show full text]
  • Cisco SCA BB Protocol Reference Guide
    Cisco Service Control Application for Broadband Protocol Reference Guide Protocol Pack #60 August 02, 2018 Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at www.cisco.com/go/offices. THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    [Show full text]
  • Comodo System Cleaner Version 3.0
    Comodo System Cleaner Version 3.0 User Guide Version 3.0.122010 Versi Comodo Security Solutions 525 Washington Blvd. Jersey City, NJ 07310 Comodo System Cleaner - User Guide Table of Contents 1.Comodo System-Cleaner - Introduction ............................................................................................................ 3 1.1.System Requirements...........................................................................................................................................5 1.2.Installing Comodo System-Cleaner........................................................................................................................5 1.3.Starting Comodo System-Cleaner..........................................................................................................................9 1.4.The Main Interface...............................................................................................................................................9 1.5.The Summary Area.............................................................................................................................................11 1.6.Understanding Profiles.......................................................................................................................................12 2.Registry Cleaner............................................................................................................................................. 15 2.1.Clean.................................................................................................................................................................16
    [Show full text]
  • The Edonkey File-Sharing Network
    The eDonkey File-Sharing Network Oliver Heckmann, Axel Bock, Andreas Mauthe, Ralf Steinmetz Multimedia Kommunikation (KOM) Technische Universitat¨ Darmstadt Merckstr. 25, 64293 Darmstadt (heckmann, bock, mauthe, steinmetz)@kom.tu-darmstadt.de Abstract: The eDonkey 2000 file-sharing network is one of the most successful peer- to-peer file-sharing applications, especially in Germany. The network itself is a hybrid peer-to-peer network with client applications running on the end-system that are con- nected to a distributed network of dedicated servers. In this paper we describe the eDonkey protocol and measurement results on network/transport layer and application layer that were made with the client software and with an open-source eDonkey server we extended for these measurements. 1 Motivation and Introduction Most of the traffic in the network of access and backbone Internet service providers (ISPs) is generated by peer-to-peer (P2P) file-sharing applications [San03]. These applications are typically bandwidth greedy and generate more long-lived TCP flows than the WWW traffic that was dominating the Internet traffic before the P2P applications. To understand the influence of these applications and the characteristics of the traffic they produce and their impact on network design, capacity expansion, traffic engineering and shaping, it is important to empirically analyse the dominant file-sharing applications. The eDonkey file-sharing protocol is one of these file-sharing protocols. It is imple- mented by the original eDonkey2000 client [eDonkey] and additionally by some open- source clients like mldonkey [mlDonkey] and eMule [eMule]. According to [San03] it is with 52% of the generated file-sharing traffic the most successful P2P file-sharing net- work in Germany, even more successful than the FastTrack protocol used by the P2P client KaZaa [KaZaa] that comes to 44% of the traffic.
    [Show full text]
  • Faster Interconnects for Next-Generation Data Centers 2
    Faster Interconnects for Next- Generation Data Centers Summary Insight With the data deluge washing over today’s data centers, IT Author: Jean S. Bozman infrastructure benefits from Introduction faster interconnects. Faster storage requires faster A wave of change is sweeping over the data center – and a multi- networks. Even more terabyte data deluge is coming along with it. This rapid change is being generated by new sources of data coming from Cloud performance can be achieved by Computing, Mobility, Social Media and Big Data/Analytics. All of using iSER, a maturing these workloads must now be supported, along with transactional standard for extending iSCSI processing, enterprise applications and data warehouses. with RDMA (Remote Direct For many IT professionals, the new demands are causing a “rethink” Memory Access). Using iSER, of their data-transfer infrastructure. The Fibre Channel high-performing storage can be interconnects and slower Ethernet links are showing their age – and connected to fast Ethernet links the aging links must be updated or replaced as quickly as possible. via iSCSI, speeding data Otherwise, these slow links will be “bottlenecks” that slow down the transfers from the network to business or organization that depends on that IT infrastructure. servers and storage systems. This process of data center transformation requires thoughtful These technologies can be used planning – but IT organizations cannot afford to wait too long, or together to replace aging high- performance of mission-critical applications and databases will speed interconnects, such as suffer. Fibre Channel links and older Ethernet links. Flash Storage and Your Network Many technologies will need to become more efficient in the process, including the storage systems that house the data – and send it to the compute engines for processing.
    [Show full text]
  • From Sony to SOPA: the Technology-Content Divide
    From Sony to SOPA: The Technology-Content Divide The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters Citation John Palfrey, Jonathan Zittrain, Kendra Albert, and Lisa Brem, From Sony to SOPA: The Technology-Content Divide, Harvard Law School Case Studies (2013). Citable link http://nrs.harvard.edu/urn-3:HUL.InstRepos:11029496 Terms of Use This article was downloaded from Harvard University’s DASH repository, and is made available under the terms and conditions applicable to Open Access Policy Articles, as set forth at http:// nrs.harvard.edu/urn-3:HUL.InstRepos:dash.current.terms-of- use#OAP http://casestudies.law.harvard.edu By John Palfrey, Jonathan Zittrain, Kendra Albert, and Lisa Brem February 23, 2013 From Sony to SOPA: The Technology-Content Divide Background Note Copyright © 2013 Harvard University. No part of this publication may be reproduced, stored in a retrieval system, used in a spreadsheet, or transmitted in any form or by any means – electronic, mechanical, photocopying, recording, or otherwise – without permission. "There was a time when lawyers were on one side or the other of the technology content divide. Now, the issues are increasingly less black-and-white and more shades of gray. You have competing issues for which good lawyers provide insights on either side." — Laurence Pulgram, partner, Fenwick & Westi Since the invention of the printing press, there has been tension between copyright holders, who seek control over and monetary gain from their creations, and technology builders, who want to invent without worrying how others might use that invention to infringe copyrights.
    [Show full text]
  • Informed Content Delivery Across Adaptive Overlay Networks
    Informed Content Delivery Across Adaptive Overlay Networks John Byers Jeffrey Considine Michael Mitzenmacher Stanislav Rost [email protected] [email protected] [email protected] [email protected] Dept. of Computer Science EECS MIT Laboratory for Boston University Harvard University Computer Science Boston, Massachusetts Cambridge, Massachusetts Cambridge, Massachusetts Abstract Categories and Subject Descriptors C.2 [Computer Systems Organization]: Computer- Overlay networks have emerged as a powerful and highly flexible Communication Networks method for delivering content. We study how to optimize through- put of large transfers across richly connected, adaptive overlay net- General Terms works, focusing on the potential of collaborative transfers between Algorithms, Measurement, Performance peers to supplement ongoing downloads. First, we make the case for an erasure-resilient encoding of the content. Using the digital Keywords fountain encoding approach, end-hosts can efficiently reconstruct Overlay, peer-to-peer, content delivery, digital fountain, erasure ¡ the original content of size ¡ from a subset of any symbols drawn correcting code, min-wise summary, Bloom filter, reconciliation, from a large universe of encoded symbols. Such an approach af- collaboration. fords reliability and a substantial degree of application-level flex- ibility, as it seamlessly accommodates connection migration and 1 Introduction parallel transfers while providing resilience to packet loss. How- ever, since the sets of encoded symbols acquired by peers during Consider the problem of distributing a large new file across a downloads may overlap substantially, care must be taken to enable content delivery network of several thousand geographically dis- them to collaborate effectively. Our main contribution is a collec- tributed machines.
    [Show full text]
  • Forescout Counteract® Endpoint Support Compatibility Matrix Updated: October 2018
    ForeScout CounterACT® Endpoint Support Compatibility Matrix Updated: October 2018 ForeScout CounterACT Endpoint Support Compatibility Matrix 2 Table of Contents About Endpoint Support Compatibility ......................................................... 3 Operating Systems ....................................................................................... 3 Microsoft Windows (32 & 64 BIT Versions) ...................................................... 3 MAC OS X / MACOS ...................................................................................... 5 Linux .......................................................................................................... 6 Web Browsers .............................................................................................. 8 Microsoft Windows Applications ...................................................................... 9 Antivirus ................................................................................................. 9 Peer-to-Peer .......................................................................................... 25 Instant Messaging .................................................................................. 31 Anti-Spyware ......................................................................................... 34 Personal Firewall .................................................................................... 36 Hard Drive Encryption ............................................................................. 38 Cloud Sync ...........................................................................................
    [Show full text]
  • A Nova Mídia Podcast: Um Estudo De Caso Do Programa Matando Robôs Gigantes
    UNIVERSIDADE FEDERAL DO RIO DE JANEIRO ESCOLA DE COMUNICAÇÃO CENTRO DE FILOSOFIA E CIÊNCIAS HUMANAS JORNALISMO A NOVA MÍDIA PODCAST: UM ESTUDO DE CASO DO PROGRAMA MATANDO ROBÔS GIGANTES TÁBATA CRISTINA PIRES FLORES RIO DE JANEIRO 2014 UNIVERSIDADE FEDERAL DO RIO DE JANEIRO ESCOLA DE COMUNICAÇÃO CENTRO DE FILOSOFIA E CIÊNCIAS HUMANAS JORNALISMO A NOVA MÍDIA PODCAST: UM ESTUDO DE CASO DO PROGRAMA MATANDO ROBÔS GIGANTES Monografia submetida à Banca de Graduação como requisito para obtenção do diploma de Comunicação Social/ Jornalismo. TÁBATA CRISTINA PIRES FLORES Orientador: Octávio Aragão RIO DE JANEIRO 2014 UNIVERSIDADE FEDERAL DO RIO DE JANEIRO ESCOLA DE COMUNICAÇÃO TERMO DE APROVAÇÃO A Comissão Examinadora, abaixo assinada, avalia a Monografia A nova mídia podcast: um estudo de caso do programa Matando Robôs Gigantes, escrita por Tábata Flores. Monografia examinada: Rio de Janeiro, ___ de _______________ de 2014. Comissão Examinadora: Orientador: Prof. Octávio Aragão Doutor em Artes Visuais pela Escola de Belas Artes - UFRJ Departamento de Comunicação - UFRJ Prof. Fernando Mansur Doutor em Comunicação pela Escola de Comunicação - UFRJ Departamento de Comunicação - UFRJ Lúcio Luiz Corrêa da Silva Doutorando em Educação pela Universidade Estácio de Sá Programa de Pós-Graduação em Educação (Tecnologias de Informação e Comunicação nos Processos Educacionais) – Universidade Estácio de Sá RIO DE JANEIRO 2014 FICHA CATALOGRÁFICA FLORES, Tábata. A nova mídia podcast: um estudo de caso do programa Matando Robôs Gigantes. Rio de Janeiro, 2014. Monografia (Graduação em Comunicação Social/Jornalismo) – Universidade Federal do Rio de Janeiro – UFRJ, Escola de Comunicação – ECO. Orientador: Octávio Aragão Orientadora: Raquel Paiva de Araújo Soares FLORES, Tábata. A nova mídia podcast: um estudo de caso do programa Matando Robôs Gigantes.
    [Show full text]
  • Despliegue España-América Latina De Broadcatching E-Learning
    Despliegue España-América Latina de Broadcatching e-learning Rafael García Monroy E.T.S.I.T. U.P.M. Departamento Ingeniería de Sistemas Telemáticos e-mail: [email protected] Abstract . Los avances tecnológicos y la eliminación de fronteras que resultan del potente y exponencial despliegue de Internet permiten que compartir vídeos de material educativo de gran calidad sea viable. Ya que las exigencias de los usuarios finales –alumnos- crecen paralelamente a la adopción de los avances mencionados, y las posibilidades reales de mejorar los servicios son una realidad, no queda más que emplear las herramientas existentes para crear nuevos modelos innovadores que mejoren constantemente las plataformas de difusión de conocimiento, pilar del desarrollo sostenible. El siguiente artículo describe el despliegue de un modelo e-learning basado en Broadcatching (BitTorrent, + RSS), a través del cual clases de vídeo grabadas en España podrán ser inmediatamente distribuidas a universidades latinoamericanas con las que se tenga convenio, compartiendo recursos de red y, de gran importancia, diseminando los ficheros educativos con una excelente calidad de contenido. De esta manera, la distancia, el costo de distribución y las limitaciones temporales pasan a segundo plano, permitiendo que los contenidos educativos de primera calidad tengan un acceso de naturaleza universal. Palabras clave: BitTorrent, broadcatching, e-learning, P2P, RSS, vídeo. 1 Introducción redes de distribución. Y es precisamente este el punto que hay que explotar para que el alumno obtenga el La cooperación en cualquier ámbito conlleva al mejor contenido educativo posible: la obtención de desarrollo sostenible, en que las partes implicadas vídeos de clase de alta definición que son pesados, comparten el fruto de la inversión.
    [Show full text]