Secure Multimedia Multicast: Interface and Multimedia Transmission GROUP 2: Melissa Barker Norman Lo Michael Mullinix server router client router client.

Slides:



Advertisements
Similar presentations
Push Technology Humie Leung Annabelle Huo. Introduction Push technology is a set of technologies used to send information to a client without the client.
Advertisements

INE1020: Introduction to Internet Engineering 5: Web-based Applications1 Lecture 12: Emerging Internet Technologies r Peer-to-peer vs. client-server computing.
Why to learn OSI reference Model? The answer is too simple that It tells us that how communication takes place between computers on internet but how??
CCNA – Network Fundamentals
Chapter 7: Transport Layer
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Transport Layer Introduction to Networking.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Transport Layer Introduction to Networking Assist. Prof.
Multicast Fundamentals n The communication ways of the hosts n IP multicast n Application level multicast.
Multimedia Over Internet. Growth of Internet ● No production cost ● Low cost infrastructure ● No fees for joining or licenses to buy ● Choice of products.
Internet Networking Spring 2006 Tutorial 12 Web Caching Protocols ICP, CARP.
Rheeve: A Plug-n-Play Peer- to-Peer Computing Platform Wang-kee Poon and Jiannong Cao Department of Computing, The Hong Kong Polytechnic University ICDCSW.
Secure Multicast Xun Kang. Content Why need secure Multicast? Secure Group Communications Using Key Graphs Batch Update of Key Trees Reliable Group Rekeying.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Java Socket Support Presentation by: Lijun Yuan Course Number: cs616.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #13 Web Caching Protocols ICP, CARP.
Chapter 2: Technology Infrastructure: The Internet and the World Wide Web.
Multicast Security May 10, 2004 Sam Irvine Andy Nguyen.
An Introduction to Internetworking. Why distributed systems - Share resources (devices & CPU) - Communicate people (by transmitting data)
Multicast Communication
Multicast Security CS239 Advanced Network Security April 16 th, 2003 Yuken Goto.
The OSI Model A layered framework for the design of network systems that allows communication across all types of computer systems regardless of their.
CSE679: Multicast and Multimedia r Basics r Addressing r Routing r Hierarchical multicast r QoS multicast.
Introduction to Streaming © Nanda Ganesan, Ph.D..
Communication Part IV Multicast Communication* *Referred to slides by Manhyung Han at Kyung Hee University and Hitesh Ballani at Cornell University.
Study of the Relationship between Peer to Peer Systems and IP Multicasting From IEEE Communication Magazine January 2003 學號 :M 姓名 : 邱 秀 純.
GIS technologies and Web Mapping Services
Network Layer (3). Node lookup in p2p networks Section in the textbook. In a p2p network, each node may provide some kind of service for other.
Chapter 22 Network Layer: Delivery, Forwarding, and Routing
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Multicast routing.
Chapter 4. After completion of this chapter, you should be able to: Explain “what is the Internet? And how we connect to the Internet using an ISP. Explain.
Jaringan Komputer Dasar OSI Transport Layer Aurelio Rahmadian.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Transport Layer Introduction to Networking.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Twelfth Edition.
Internet Addresses. Universal Identifiers Universal Communication Service - Communication system which allows any host to communicate with any other host.
Copyright Protection Allowing for Fair Use Team 9 David Dobbs William Greenwell Jennifer Kahng Virginia Volk.
CSC 600 Internetworking with TCP/IP Unit 8: IP Multicasting (Ch. 17) Dr. Cheer-Sun Yang Spring 2001.
Digital Multimedia, 2nd edition Nigel Chapman & Jenny Chapman Chapter 17 This presentation © 2004, MacAvon Media Productions Multimedia and Networks.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Outline Overview Video Format Conversion Connection with An authentication Streaming media Transferring media.
Lecture Week 3 Frame Relay Accessing the WAN. 3.1 Basic Frame Relay Concepts Accessing the WAN.
Multicast Routing Algorithms n Multicast routing n Flooding and Spanning Tree n Forward Shortest Path algorithm n Reversed Path Forwarding (RPF) algorithms.
Circuit & Packet Switching. ► Two ways of achieving the same goal. ► The transfer of data across networks. ► Both methods have advantages and disadvantages.
Chapter 6-2 the TCP/IP Layers. The four layers of the TCP/IP model are listed in Table 6-2. The layers are The four layers of the TCP/IP model are listed.
Lab 2 Group Communication Farnaz Moradi Based on slides by Andreas Larsson 2012.
Impact of Topology on Overlay Multicast Suat Mercan.
What is H.323? H.323 is standard providing a foundation for audio, video, and data communications across IP-based networks, including the Internet.
Group Communication Group oriented activities are steadily increasing. There are many types of groups:  Open and Closed groups  Peer-to-peer and hierarchical.
Farnaz Moradi Based on slides by Andreas Larsson 2013.
03/11/2015 Michael Chai; Behrouz Forouzan Staffordshire University School of Computing Streaming 1.
Multimedia and Networks. Protocols (rules) Rules governing the exchange of data over networks Conceptually organized into stacked layers – Application-oriented.
Presented by Rebecca Meinhold But How Does the Internet Work?
Push Technology Humie Leung Annabelle Huo. Introduction Push technology is a set of technologies used to send information to a client without the client.
Digital Multimedia, 2nd edition Nigel Chapman & Jenny Chapman Chapter 17 This presentation © 2004, MacAvon Media Productions Multimedia and Networks.
ISDS 4120 Project 1 DWAYNE CARRAL JR 3/27/15. There are seven layers which make up the OSI (Open Systems Interconnection Model) which is the model for.
Copyright © 2002 Pearson Education, Inc. Slide 3-1 Internet II A consortium of more than 180 universities, government agencies, and private businesses.
Chapter 5. An IP address is simply a series of binary bits (ones and zeros). How many binary bits are used? 32.
Group Communication A group is a collection of users sharing some common interest.Group-based activities are steadily increasing. There are many types.
1 CMPT 471 Networking II Multicasting © Janice Regan,
Chapter 7: Transport Layer
VoIP ALLPPT.com _ Free PowerPoint Templates, Diagrams and Charts.
The OSI Model Prof. Choong Seon HONG.
The Transport Layer Implementation Services Functions Protocols
Application layer tcp/ip
Network and the internet
RTP: A Transport Protocol for Real-Time Applications
Internet Networking recitation #12
Design and Implementation of Audio/Video Collaboration System Based on Publish/subscribe Event Middleware CTS04 San Diego 19 January 2004 PTLIU Laboratory.
Chapter 15 – Part 2 Networks The Internal Operating System
An Introduction to Internetworking
Presentation transcript:

Secure Multimedia Multicast: Interface and Multimedia Transmission GROUP 2: Melissa Barker Norman Lo Michael Mullinix server router client router client

What is Multicast? The most basic transmission method would be to send a single copy of data from the source (server) to each individual destination (client), which is known as unicast. This results in sending the same message multiple times to each of the individual destinations. To reduce congestion, multicast sends a single copy of data to each router its connected to and lets the routers decide whether it should make another copy of the information to send to the destination.

Multicast vs. Unicast Single virtual connection with a group address Uses only a little more bandwidth for a thousand clients than it does for a single client Access control difficult to implement because secret key is shared by all group members Point-to-Point Connection Consumes a lot of resources as number of clients increase (Congestion problems) Access control easy to implement because secret key can be established privately Server Client Group Address

What are the advantages of Multicast? (1) Decreased Network Utilization—Reduces the number of messages required by eliminating redundant packets and decreasing the number of point-to-point connections that must be established. Dynamic Participation—Multicasting provides flexibility in joining and leaving a group. This membership flexibility supports the transient behavior of peers.

What are the advantages of Multicast? (2) Multimedia support—Multimedia transmission continues to increase in popularity while at the same time it consumes a significant amount of bandwidth. This is one area where network optimization is of paramount importance. Multimedia data such as images, video, and audio generally require a large amount of memory and would require more time to transmit. Therefore it is highly profitable to reduce the number of redundant messages being sent in order to improve the efficiency of the system.

What is Secure Multicast? Many multicast applications require access control mechanisms to establish security in the system. Access control can be achieved by encryption. Since users may join and leave at any time, it is necessary to update the encryption keys. By establishing a key management structure, dynamic membership can be handled.

Key Management If a user leaves or stops paying for service, the encryption key must change so they can no longer decrypt data. Also, if a new user joins, the encryption key must change so they will not be able to decrypt any data collected before they started paying for the service.

Non-Tree Based Structure Tree based Structure If Client Joins: # of Messages = 2 If Client Leaves: # of Messages = N If Client Joins: # of Messages = L+1 If Client Leaves: # of Messages = D*L = 2*log 2 N (if tree binary) Session Key Key Encrypt Key Client Keys N = Number of Clients L = Level of Tree D = Degree of Tree K1K1 K0K0 Session Key Key Encrypt Key Client Keys

Goals Transmit and Display Multimedia Images Video Visualize the Key Management Process

Our Approach… 1. Meet with Professor and understand the Secure Multicast research and system provided. 2. Study the code to understand the system. 3. Build code in C to transfer and display a JPEG file. 4. Build code to transfer and display a sequence of JPEG files. 5. Build code to transmit the GOPs in a MPEG. 6. Build code to receive and play the MPEG data. 7. Build a graphical interface to visualize the key management process. 8. Create a User’s Manual.

Server Side (1) Request file type and file names Load Files Wait for client to join Check for client on Member List NOYES REJECTGenerate New Session Keys Key Visualization Given Created

Server Side (2) Update other Encryption Keys Send out Updated Keys Client Leaves Process multimedia data/Add Header TIMER Transmit Multimedia Data Key Visualization Generate New Session Keys

Client Side Register Request server to join Receive Session Key and Key Encryption Receive Data Decrypt the keys Process and Display Data to User

Visual Interface Use SVG to display tree structure for key management SVG – Scalable Vector Graphics developed by Adobe Developed based on XML and follow W3C Document Object Model (DOM) level 2 standard Deliver high quality image in efficient ways

Future Work Decode and Display Video Data Transmit and Receive Audio Data Complete Key Management Work Use Encryption for Multimedia

Secure Multimedia Multicast: Interface and Multimedia Transmission JPEG sequence MPEG DEMO

Works Cited ENEE408G Course Notes, Prof. Min Wu, Available online at Fall 2002 Final Presentation, MERIT Research Group, 2002 P2P Dynamic Networks, K. Ho, K. Patel, "MERIT 2002 README.txt," August 15, J. L. Mitchell, W.B Pennebaker, C.E. Fogg, and D. J. LeGall, "MPEG Video Compression Standard," International Thomson Publishers, J. Song, R. Poovendran, W. Trappe, and K.J. R. Liu, "A Dynamic Key Distribution Scheme using Data Embedding for Secure Multimedia Multicast." P. Pessi, "Secure Multicast," W. Trappe, J. Song, R. Poovendran, and K.J. R. Liu, "Key Management and Distribution for Secure Multimedia Multicast." T. Hardjono, G. Tsudik, "IP Multicast Security: Issues and Directions," W. Trappe, Y. Wang, K.J. R. Liu, "Establishment of Conference Keys in Heterogeneous Networks," H.M. Deitel, P.J. Deitel, "C++, How To Program," 2001.

Questions and Answers