Browse Definitions :
Definition

peercasting

Contributor(s): Matthew Haughn

Peercasting is a method of broadcasting audio or video through multiple streams of data that are transmitted by peers on the same platform, app or network.

Peercasting makes it possible for individuals to broadcast or stream content that might not otherwise be carried on other networks. Peercasting content allows even a single user with modest bandwidth to stream content of their choice as users supply bandwidth between one another. Examples of peercasting software include Alluvium, PeerCast, FreeCast, Tribler, PULSE, Rawflow, Red Swoosh, Veoh and PPstream.

Peercasting works in a number of ways:

  • By having streams of data relayed from peer to peer. The connections between peers in a stream are negotiated on an overlay network. This type of network can suffer during disconnecting of relays or when peers must switch to a new relay.
  • By minute swarming, where files are broken up into minute-long segments that are then distributed by a peer to peer client such as BitTorrent, Coral or Dijer. While able to muster high transfer rates with numbers of users, this method has a higher overhead due to the formation of new swarms every minute.
  • By striping the live stream into sub-streams akin to the way the data is striped on drives in a RAID 0 configuration. Forward error correction and timing data are separate from the other streams which contain the media data. The stream can generally recover from one or more dropped relays by switching relays. Data transmission is in the end completed by way of the first method described above.
  • By allowing peers switching relays to resume from where playback left off by using a buffer.

Content networks, like YouTube, can take measures to reduce visibility or demonetize channels that offend advertisers or the sensibilities of the network themselves. Content is often censored according to the networks rules. Peercasting has no network authority to offend and the only thing that limits audiences is a lack of awareness of shows or disinterest.

This was last updated in July 2018

Continue Reading About peercasting

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • certificate authority (CA)

    A certificate authority (CA) is a trusted entity that issues digital certificates, which are data files used to cryptographically...

  • hacktivism

    Hacktivism is the act of hacking, or breaking into a computer system, for a politically or socially motivated purpose.

  • advanced persistent threat (APT)

    An advanced persistent threat (APT) is a prolonged and targeted cyberattack in which an intruder gains access to a network and ...

SearchHealthIT

  • Cerner Corp.

    Cerner Corp. is a public company in North Kansas City, Mo., that provides various health information technologies, ranging from ...

  • clinical decision support system (CDSS)

    A clinical decision support system (CDSS) is an application that analyzes data to help healthcare providers make decisions and ...

  • Health IT (health information technology)

    Health IT (health information technology) is the area of IT involving the design, development, creation, use and maintenance of ...

SearchDisasterRecovery

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

  • ransomware recovery

    Ransomware recovery is the process of resuming options following a cyberattack that demands payment in exchange for unlocking ...

SearchStorage

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

  • cache (computing)

    A cache -- pronounced CASH -- is hardware or software that is used to store something, usually data, temporarily in a computing ...

  • mebibyte (MiB)

    A mebibyte (MiB) is a unit of measurement used in computer data storage.

Close