Integrity-aware bandwidth guarding approach in P2P networks

Wen Hui Chiang, Ling Jyh Chen, Cheng Fu Chou

研究成果: 書貢獻/報告類型會議貢獻

摘要

Most Internet-based collaborative computing systems face the major problem: freeriding. The abundance of freeriders, and load imbalance it creates, punishes those peers who do actively contribute to the network by forcing them to overuse their resources. Hence, the overall system performance becomes to degrade quickly. The goal of this paper is aimed to provide an efficient approach to distinguish the dishonest peers from the honest peers. The key idea of our approach is to make use of the relationship between the perceived throughput and the available bandwidth. First, we do a comprehensive study of available bandwidth estimation tools. Next, we propose integrity-aware bandwidth guarding algorithm, which is designed according to the perceived throughput and the available bandwidth estimation. Finally, the simulation results illustrate that our approach can correctly identify dishonest peers and be of great help in constructing a better overlay structure for many peer-to-peer and multicast applications.

原文英語
主出版物標題NETWORKING 2007 Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet - 6th International IFIP-TC6 Networking Conference, Proceedings
頁面1060-1071
頁數12
出版狀態已發佈 - 2007 十二月 24
事件6th International IFIP-TC6 Networking Conference on NETWORKING 2007 Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet - Atlanta, GA, 美国
持續時間: 2007 五月 142007 五月 18

出版系列

名字Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
4479 LNCS
ISSN(列印)0302-9743
ISSN(電子)1611-3349

其他

其他6th International IFIP-TC6 Networking Conference on NETWORKING 2007 Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet
國家美国
城市Atlanta, GA
期間07/5/1407/5/18

指紋

P2P Network
Computer networks
Integrity
Bandwidth
Throughput
Computer supported cooperative work
Peer to Peer
Multicast
Overlay
Forcing
System Performance
Computer systems
Internet
Resources
Computing
Simulation

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

引用此文

Chiang, W. H., Chen, L. J., & Chou, C. F. (2007). Integrity-aware bandwidth guarding approach in P2P networks. 於 NETWORKING 2007 Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet - 6th International IFIP-TC6 Networking Conference, Proceedings (頁 1060-1071). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 卷 4479 LNCS).

Integrity-aware bandwidth guarding approach in P2P networks. / Chiang, Wen Hui; Chen, Ling Jyh; Chou, Cheng Fu.

NETWORKING 2007 Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet - 6th International IFIP-TC6 Networking Conference, Proceedings. 2007. p. 1060-1071 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 卷 4479 LNCS).

研究成果: 書貢獻/報告類型會議貢獻

Chiang, WH, Chen, LJ & Chou, CF 2007, Integrity-aware bandwidth guarding approach in P2P networks. 於 NETWORKING 2007 Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet - 6th International IFIP-TC6 Networking Conference, Proceedings. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 卷 4479 LNCS, 頁 1060-1071, 6th International IFIP-TC6 Networking Conference on NETWORKING 2007 Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet, Atlanta, GA, 美国, 07/5/14.
Chiang WH, Chen LJ, Chou CF. Integrity-aware bandwidth guarding approach in P2P networks. 於 NETWORKING 2007 Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet - 6th International IFIP-TC6 Networking Conference, Proceedings. 2007. p. 1060-1071. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Chiang, Wen Hui ; Chen, Ling Jyh ; Chou, Cheng Fu. / Integrity-aware bandwidth guarding approach in P2P networks. NETWORKING 2007 Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet - 6th International IFIP-TC6 Networking Conference, Proceedings. 2007. 頁 1060-1071 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{64c47be6341e402a9e16ea6df69f8fa2,
title = "Integrity-aware bandwidth guarding approach in P2P networks",
abstract = "Most Internet-based collaborative computing systems face the major problem: freeriding. The abundance of freeriders, and load imbalance it creates, punishes those peers who do actively contribute to the network by forcing them to overuse their resources. Hence, the overall system performance becomes to degrade quickly. The goal of this paper is aimed to provide an efficient approach to distinguish the dishonest peers from the honest peers. The key idea of our approach is to make use of the relationship between the perceived throughput and the available bandwidth. First, we do a comprehensive study of available bandwidth estimation tools. Next, we propose integrity-aware bandwidth guarding algorithm, which is designed according to the perceived throughput and the available bandwidth estimation. Finally, the simulation results illustrate that our approach can correctly identify dishonest peers and be of great help in constructing a better overlay structure for many peer-to-peer and multicast applications.",
keywords = "Available bandwidth, Freeriding, Peer-to-peer",
author = "Chiang, {Wen Hui} and Chen, {Ling Jyh} and Chou, {Cheng Fu}",
year = "2007",
month = "12",
day = "24",
language = "English",
isbn = "9783540726050",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "1060--1071",
booktitle = "NETWORKING 2007 Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet - 6th International IFIP-TC6 Networking Conference, Proceedings",

}

TY - GEN

T1 - Integrity-aware bandwidth guarding approach in P2P networks

AU - Chiang, Wen Hui

AU - Chen, Ling Jyh

AU - Chou, Cheng Fu

PY - 2007/12/24

Y1 - 2007/12/24

N2 - Most Internet-based collaborative computing systems face the major problem: freeriding. The abundance of freeriders, and load imbalance it creates, punishes those peers who do actively contribute to the network by forcing them to overuse their resources. Hence, the overall system performance becomes to degrade quickly. The goal of this paper is aimed to provide an efficient approach to distinguish the dishonest peers from the honest peers. The key idea of our approach is to make use of the relationship between the perceived throughput and the available bandwidth. First, we do a comprehensive study of available bandwidth estimation tools. Next, we propose integrity-aware bandwidth guarding algorithm, which is designed according to the perceived throughput and the available bandwidth estimation. Finally, the simulation results illustrate that our approach can correctly identify dishonest peers and be of great help in constructing a better overlay structure for many peer-to-peer and multicast applications.

AB - Most Internet-based collaborative computing systems face the major problem: freeriding. The abundance of freeriders, and load imbalance it creates, punishes those peers who do actively contribute to the network by forcing them to overuse their resources. Hence, the overall system performance becomes to degrade quickly. The goal of this paper is aimed to provide an efficient approach to distinguish the dishonest peers from the honest peers. The key idea of our approach is to make use of the relationship between the perceived throughput and the available bandwidth. First, we do a comprehensive study of available bandwidth estimation tools. Next, we propose integrity-aware bandwidth guarding algorithm, which is designed according to the perceived throughput and the available bandwidth estimation. Finally, the simulation results illustrate that our approach can correctly identify dishonest peers and be of great help in constructing a better overlay structure for many peer-to-peer and multicast applications.

KW - Available bandwidth

KW - Freeriding

KW - Peer-to-peer

UR - http://www.scopus.com/inward/record.url?scp=37249052285&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=37249052285&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:37249052285

SN - 9783540726050

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 1060

EP - 1071

BT - NETWORKING 2007 Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet - 6th International IFIP-TC6 Networking Conference, Proceedings

ER -