[jitsi-dev] Jitsi Meet in Mesh for <=2-3 peers


#1

Anybody experimented with using JVB with COLIBRI/XMPP as a pure signaling mechanism (and relay only IF necessary given NAT/FW restrictions), establishing a Mesh network between peers initially and only morphing into a Star with JVB proxying all traffic once you start going over a certain threshold (say 3+ peers)?

I’m attempting some experiments with that and was wondering if anyone had any tips/suggestions,

Roberto


#2

There was a thread about this just last week. Some people have tried this (e.g., we do it on talky.io) and it works fine as long as you don't mind writing the appropriate UI code to make it as seamless as possible.

Peter

···

On 11/18/15 7:28 AM, Roberto Andrade wrote:

Anybody experimented with using JVB with COLIBRI/XMPP as a pure
signaling mechanism (and relay only IF necessary given NAT/FW
restrictions), establishing a Mesh network between peers initially and
only morphing into a Star with JVB proxying all traffic once you start
going over a certain threshold (say 3+ peers)?

I’m attempting some experiments with that and was wondering if anyone
had any tips/suggestions,


#3

See this thread on the topic of p2p for 2-3 peers and then upgrading to use the jvb if there are more users in a room. http://lists.jitsi.org/pipermail/dev/2015-November/025815.html.

Devin

···

From: dev [mailto:dev-bounces@jitsi.org] On Behalf Of Roberto Andrade
Sent: Wednesday, November 18, 2015 7:29 AM
To: Jitsi Developers
Subject: [jitsi-dev] Jitsi Meet in Mesh for <=2-3 peers

Anybody experimented with using JVB with COLIBRI/XMPP as a pure signaling mechanism (and relay only IF necessary given NAT/FW restrictions), establishing a Mesh network between peers initially and only morphing into a Star with JVB proxying all traffic once you start going over a certain threshold (say 3+ peers)?

I’m attempting some experiments with that and was wondering if anyone had any tips/suggestions,

Roberto
This email message is for the sole use of the intended recipient(s) and may contain information that is privileged, confidential, and exempt from disclosure under applicable law. Any unauthorized review, use, copying, disclosure or dissemination is prohibited. If you are not the intended recipient, please contact the sender by reply email and destroy all copies of the original message.