• Title/Summary/Keyword: Internet Bandwidth

Search Result 831, Processing Time 0.032 seconds

ELiSyR: Efficient, Lightweight and Sybil-Resilient File Search in P2P Networks

  • Kim, Hyeong-S.;Jung, Eun-Jin;Yeom, Heon-Y.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.6
    • /
    • pp.1311-1326
    • /
    • 2010
  • Peer-to-peer (P2P) networks consume the most bandwidth in the current Internet and file sharing accounts for the majority of the P2P traffic. Thus it is important for a P2P file sharing application to be efficient in bandwidth consumption. Bandwidth consumption as much as downloaded file sizes is inevitable, but those in file search and bad downloads, e.g. wrong, corrupted, or malicious file downloads, are overheads. In this paper, we target to reduce these overheads even in the presence of high volume of malicious users and their bad files. Sybil attacks are the example of such hostile environment. Sybil attacker creates a large number of identities (Sybil nodes) and unfairly influences the system. When a large portion of the system is subverted, either in terms of the number of users or the number of files shared in the system, the overheads due to the bad downloads rapidly increase. We propose ELiSyR, a file search protocol that can tolerate such a hostile environment. ELiSyR uses social networks for P2P file search and finds benign files in 71% of searches even when more than half of the users are malicious. Furthermore, ELiSyR provides similar success with less bandwidth than other general efforts against Sybil attacks. We compare our algorithm to SybilGuard, SybilLimit and EigenTrust in terms of bandwidth consumption and the likelihood of bad downloads. Our algorithm shows lower bandwidth consumption, similar chances of bad downloads and fairer distribution of computation loads than these general efforts. In return, our algorithm takes more rounds of search than them. However the time required for search is usually much less than the time required for downloads, so the delay in search is justifiable compared to the cost of bad downloads and subsequent re-search and downloads.

Charging the Assured-Bandwidth Service (최저대역보장형 서비스에 대한 과금)

  • 이훈;이광휘
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.41 no.3
    • /
    • pp.179-179
    • /
    • 2004
  • In the near future we can expect a change in charging the Internet service. The flat charging maybe replaced with a usage-based charging. In line with this movement, we propose a method of charging the assured-quality Internet services for the next generation network by introducing a UBC (usage-based charging) scheme over the conventional flat charging platform. First, we investigate the attribute of elastic traffic generated by assured services in IP network. Next, we propose a new method to relate the bandwidth usage with the pricing for the elastic traffic, which is based partially on the usage rate of the network bandwidth. Next, we propose a charging function for elastic traffic, which is applicable to any type of assured Internet services. Finally, we discuss the implication of the work via simple numerical experiments.

Charging the Assured-Bandwidth Service (최저대역보장형 서비스에 대한 과금)

  • Seok, Seung-Hak;Lee, Hoon;Lee, Kwang-Hui
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.41 no.3
    • /
    • pp.21-28
    • /
    • 2004
  • In the near future we can expect a change in charging the Internet service. The flat charging maybe replaced with a usage-based charging. In line with this movement, we propose a method of charging the assured-quality Internet services for the next generation network by introducing a UBC (usage-based charging) scheme over the conventional flat charging platform. First, we investigate the attribute of elastic traffic generated by assured services in IP network. Next, we propose a new method to relate the bandwidth usage with the pricing for the elastic traffic, which is based partially on the usage rate of the network bandwidth. Next, we propose a charging function for elastic traffic, which is applicable to any type of assured Internet services. Finally, we discuss the implication of the work via simple numerical experiments.

The Analysis of Random Propagating Worms using Network Bandwidth

  • Ko, Kwang-Sun;Jang, Hyun-Su;Park, Byuong-Woon;Eom, Young-Ik
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.2
    • /
    • pp.191-204
    • /
    • 2010
  • There is a well-defined propagation model, named the random constant spread (RCS) model, which explains worms that spread their clones with a random scanning strategy. This model uses the number of infected hosts in a domain as a factor in the worms' propagation. However, there are difficulties in explaining the characteristics of new Internet worms because they have several considerable new features: the denial of service by network saturation, the utilization of a faster scanning strategy, a smaller size in the worm's propagation packet, and to cause maximum damage before human-mediated responses are possible. Therefore, more effective factors are required instead of the number of infected hosts. In this paper, the network bandwidth usage rate is found to be an effective factor that explains the propagations of the new Internet worms with the random scanning strategy. The analysis and simulation results are presented using this factor. The simulation results show that the scan rate is more sensitive than the propagation packet for detecting worms' propagations.

Performance Evaluation of a Bandwidth Allocation Algorithm of E-PON (가입자 통신망을 위한 대역 할당 알고리즘 성능 분석)

  • Ju, Un-Gi;Lee, Sang-U;Kim, Chan;Gwon, Yul
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2005.10a
    • /
    • pp.361-364
    • /
    • 2005
  • As increasing the Internet traffic, many researches on access network are reported for end-to-end high-speed broadband network, where E-PON(Ethernet-Passive Active Network) is one of reasonable candidate fur the network with respect to cost and bandwidth utilization. For the high-speed access network, E-PON need an efficient bandwidth allocation method. This paper suggests a WFA(Water-Filling Allocation) algorithm for the efficient bandwidth allocation with various simulation test.

  • PDF

Dynamic Right Sizing of Maximum-windows for Efficient Bandwidth Allocation on EPON (EPON에서 효율적 대역폭 할당을 위한 최대전송윈도우 크기의 동적변화기법)

  • Lee, Sang-Ho;Lee, Tae-Jin;Chung, Min-Young;Lee, You-Ho;Choo, Hyun-Seung
    • Journal of Internet Computing and Services
    • /
    • v.8 no.4
    • /
    • pp.41-49
    • /
    • 2007
  • Ethernet passive optical network(EPON) is the next-generation technology for supporting services of high-quality at low-cost. In the EPON, all optical network units(ONUs) have to share a limited uplink channel for upstream data. In order to satisfy bandwidth demands of users on high-capacity local access networks(LANs), the optical line terminal(OLT) efficiently divides and allocates time slots of uplink channel to all ONUs. We discuss previous schemes for dynamic bandwidth allocation(DBA), such as interleaved polling with adaptive cycle time(IPACT) and sliding cycle time(SLICT). In this paper, dynamic right sizing of maximum-windows(DRSM), as a novel bandwidth allocation service, is proposed for more effective and efficient time slot allocation of the uplink channel. DRSM which is based on past information of bandwidth allocated by OLT calculates maximum available bandwidth and dynamically alters the maximum window size for the next ONU. This scheme does not only exert every effort to meet bandwidth demands of ONUs with the possible scope, it also seeks fairness of bandwidth allocation among ONUs.

  • PDF

Design of Square Patch Reflectarray Antenna with U-type Slot (U자형 슬롯을 갖는 정사각형 패치 리플렉트어레이 안테나의 설계)

  • Kim, Seon-Hye;Choi, Hak-Keun;Park, Jae-Hyun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.3
    • /
    • pp.9-15
    • /
    • 2011
  • The microstrip reflectarray antenna is rapidly becoming an attractive alternative solution to the traditional parabolic reflector antenna. However, the bandwidth of the microstrip reflectarray using the single layer structure is very narrow. To obtain wide bandwidth characteristic, the microstrip reflectarray using the multi-layer structure has been used, but it has some disadvantages such as high cost and complicated design. In this paper, to obtain low cost and wide bandwidth, the microstrip reflectarray antenna composed of square patch with two U-slots using the single-layer structure is proposed. The proposed antenna demonstrate radiation efficiency closed to 55.5 % and 1 dB gain bandwidth over 14 % at 12.5 GHz.

An Expanded Patching Technique using Four Types of Streams for True VoD Services

  • Ha, Sook-Jeong;Bae, Ihn-Han;Kim, Jin-Gyu;Park, Young-Ho;Oh, Sun-Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.5
    • /
    • pp.444-460
    • /
    • 2009
  • In this paper, we propose an expanded patching technique in order to reduce the server network bandwidth requirements to support true VoD services in VoD Systems. Double Patching, which is a typical multicast technique, ensures that a long patching stream delivers not only essential video data for the current client but also extra video data for future clients. Since the extra data may include useless data, it results in server network bandwidth wastage. In order to prevent a server from transmitting useless data, the proposed patching technique uses a new kind of stream called a linking stream. A linking stream is transmitted to clients that have received short patching streams, and it plays a linking role between a patching stream and a regular stream. The linking stream enables a server to avoid transmitting unnecessary data delivered by a long patching stream in Double Patching, so the server never wastes its network bandwidth. Mathematical analysis shows that the proposed technique requires less server network bandwidth to support true VoD services than Double Patching. Moreover, simulation results show that it has better average service latency and client defection rate compared with Double Patching.

An Asynchronous Burst Time Plan Generation Method for Broadband Satellite Multimedia System

  • Feng, Shaodong;Wang, Fan;Lin, Yuan;Gou, Liang;Li, Guangxia
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.2
    • /
    • pp.386-404
    • /
    • 2013
  • In broadband satellite multimedia (BSM) system, burst time plan (BTP) is always periodically generated. We find that this method can have a great effect on the system response ability to bandwidth requests. A general analysis model of BTP generation method is given. An optimized BTP generation (O-BTPG) method is presented by deducing the optimal bandwidth allocation period (BAP) and bandwidth allocation latency (BAL) without considering the signaling overhead caused by BTP. Then a novel asynchronous BTP generation (A-BTPG) method in which the BTP is generated asynchronously according to the traffic load from users' bandwidth requests is proposed. Simulation results show that A-BTPG can flexibly realize a trade-off between the system response ability and BTP signaling overhead. What's more, it can be widely used in various regenerative onboard switching BSM systems.

Bandwidth-efficient Cooperative Diversity with Rotated Constellations and Its Performance Analysis

  • Lei, Weijia;Xie, Xianzhong;Li, Xiangming
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.6
    • /
    • pp.989-1005
    • /
    • 2010
  • Cooperative diversity is a technique with which a virtual multiple antenna array is established among the single antenna users of the wireless network to realize space diversity. Signal space diversity (SSD) is a bandwidth-efficient diversity technique, which uses constellation rotation and interleaving techniques to achieve diversity gain. A new cooperative diversity scheme with rotated constellations (RCCD) is proposed in this paper. In this scheme, data are modulated by using a rotated constellation, and the source and the relays transmit different components of the modulated symbols. Since any one of the components contains full information of the symbols, the destination can obtain multiple signals conveying the same information from different users. In this way, space diversity is achieved. The RCCD scheme inherits the advantage of SSD - being bandwidth-efficient but without the delay problem of SSD brought by interleaving. The symbol error rate of the RCCD scheme is analyzed and simulated. The analysis and simulation results show that the RCCD scheme can achieve full diversity order of two when the inter-user channel is good enough, and, with the same bandwidth efficiency, has a better performance than amplify-and-forward and detect-and-forward methods.