Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1189355.1189374acmotherconferencesArticle/Chapter ViewAbstractPublication PagesacessnetsConference Proceedingsconference-collections
Article

Public infrastructures for internet access in metropolitan areas

Published: 04 September 2006 Publication History
  • Get Citation Alerts
  • Abstract

    Wireless Community Networks (WCNs) are metropolitan-area networks with nodes owned and managed by volunteers. These networks can be used to build large scale public infrastructures for providing ubiquitous wireless broadband access through the private contributions of individual community members who use their hotspots to forward foreign traffic from and to nearby low-mobility users. We have designed and developed a prototype aggregation scheme that (1) assumes that community members are selfish and do not trust each other and uses a secure incentive technique to encourage their contribution; (2) protects the real-world identities of community providers and clients by relying only on disposable opaque identifiers (public/private key pairs); (3) is fully distributed, open to all, and does not rely on any authority to resolve disputes or to control membership; (4) applies a Quality-of-Service mechanism to protect the resources of hotspot owners and punish or reward users with different QoS levels according to their contribution; (5) is automated, using standard, widely available hardware and software that we have developed for some of the main available platforms (Linux-based WLAN access points and Windows Mobile-based cell phones). Thus, it can easily complement cellular networks in metropolitan areas where some WCNs provide wide coverage.

    References

    [1]
    Athens Wireless Metropolitan Network, http://www.awmn.net]]
    [2]
    N. Ben Salem, J.-P. Hubaux, and M. Jakobsson, "Reputation-based Wi-Fi deployment," Mobile Computing and Communications Review (MC2R), July 2005.]]
    [3]
    E. C. Efstathiou, P. A. Frangoudis, and G. C. Polyzos, "Stimulating Participation in Wireless Community Networks," Proc. of the 25th IEEE Conference on Computer Communications (INFOCOM 2006), Barcelona, Spain, April 23--29, 2006.]]
    [4]
    FON, http://en.fon.com]]
    [5]
    P. A. Frangoudis, "The Peer-to-Peer Wireless Network Confederation Protocol: Design Specification and Performance Analysis," M.Sc. Thesis, Athens University of Economics and Business, 2005. Available as: http://mm.aueb.gr/technicalreports/2005-MMLAB-TR-02.pdf.]]
    [6]
    A. V. Goldberg and R. E. Tarjan, "A new approach to the maximum-flow problem," Journal of the ACM, vol. 35, no. 4, pp. 921--940, 1988.]]
    [7]
    Hierarchical Token Bucket packet scheduler, http://luxik.cdi.cz/~devik/qos/htb/]]
    [8]
    Iproute2, http://linux-net.osdl.org/index.php/Iproute2]]
    [9]
    Linksys Wireless-G broadband router, http://www.linksys.com]]
    [10]
    Linspot, http://www.linspot.com/businessmodel.html]]
    [11]
    NYCwireless, http://www.nycwireless.net]]
    [12]
    OpenWRT Linux Distribution, http://openwrt.org]]
    [13]
    The P2PWNC project website, http://mm.aueb.gr/research/P2PWNC/]]
    [14]
    QTEK 9100 Pocket PC Phone ed., WLAN-enabled, http://www.qtek.nu/europe/products/9100.aspx]]
    [15]
    Seattle Wireless, http://www.seattlewireless.net]]
    [16]
    Speakeasy WiFi NetShare Service, http://www.speakeasy.net/netshare/]]
    [17]
    É. Tardos and K. D. Wayne, "Simple generalized maximum flow algorithms," Proc. of the 6th International Conference on Integer Programming and Combinatorial Optimization, pp. 310--324, 1998.]]
    [18]
    The ttcp tool, http://ftp.arl.mil/ftp/pub/ttcp/]]
    [19]
    Wireless Philadelphia Executive Committee, http://www.phila.gov/wireless]]

    Cited By

    View all
    • (2019)Building a National Network through peered community area networks: realising ICTs within developing countries2019 Conference on Information Communications Technology and Society (ICTAS)10.1109/ICTAS.2019.8703621(1-5)Online publication date: Mar-2019
    • (2008)Coupling QoS provision with interference reporting in WLAN sharing communities2008 IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications10.1109/PIMRC.2008.4699902(1-5)Online publication date: Sep-2008
    • (2008)An Open Architecture for Monitoring and Measuring QoS Indicators in Wireless Community Networks2008 Next Generation Internet Networks10.1109/NGI.2008.45(284-291)Online publication date: Apr-2008
    • Show More Cited By

    Recommendations

    Reviews

    Amos O Olagunju

    The design and implementation of large-scale metropolitan-area networks (MANs) for negotiated allotment of wireless broadband access among communities of mobile user groups naturally set off intellectual questions. In open decentralized systems with vulnerability to security problems and scarcity of bandwidth risks, how should community groups of mobile users contribute wireless local area network (WLAN) access points__?__ The framework for the design and implementation of secured trust management in public computing utilities exists in the literature [1]. However, how should a reliable, fair resource-sharing protocol be designed for distributing wireless access points to mobile client roamers__?__ The authors of this paper put forth a plan, peer-to-peer wireless network confederation (P2PWNC), in which WLAN owners must share bandwidths to provide access points to mobile users seeking entry to neighboring and global networks. In the scheme, users are partitioned into groups that supervise and control a number of WLAN access points connected to cable or digital subscriber line links at locations in an MAN. Each group has an uncertified public/private key pair, and a group leader who preserves the private key. The group leader also enlists and issues certificates and public/private key pairs to members in the decentralized P2PWNC model. Local groups store historical transactions of digitally signed receipts for services provided to consumers of bandwidth. The signed receipts of wireless Internet access consumers contain the public keys of the group service providers, timestamps of sessions, and weights associated with consumed or contributed bandwidths. The authors present a maximum flow algorithm that uses receipts for decision making in granting wireless network access points among service providers, based on reciprocated wireless service contributions and utilizations among communicating providers. The reciprocity algorithm dynamically computes normalized indicators of services consumed or contributed each time mobile users are connected to or disconnected from group local wireless access points. The performance of the P2PWNC is evaluated on a platform of desktop personal computers, ethernet switches, and a Linksys wireless router that enclosed open Linux distribution firmware. The experimental results reveal minimal overhead due to the execution of the P2PWNC protocol operations. Consequently, the results are reliable enough to recommend the P2PWNC framework for providing roaming capabilities in MANs with bountiful wireless coverage. Online Computing Reviews Service

    Access critical reviews of Computing literature here

    Become a reviewer for Computing Reviews.

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    AcessNets '06: Proceedings of the 1st international conference on Access networks
    September 2006
    117 pages
    ISBN:1595935134
    DOI:10.1145/1189355
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 04 September 2006

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. WiFi networks
    2. community networks
    3. incentives
    4. peer-to-peer
    5. secure VoIP
    6. security

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)9
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 27 Jul 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2019)Building a National Network through peered community area networks: realising ICTs within developing countries2019 Conference on Information Communications Technology and Society (ICTAS)10.1109/ICTAS.2019.8703621(1-5)Online publication date: Mar-2019
    • (2008)Coupling QoS provision with interference reporting in WLAN sharing communities2008 IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications10.1109/PIMRC.2008.4699902(1-5)Online publication date: Sep-2008
    • (2008)An Open Architecture for Monitoring and Measuring QoS Indicators in Wireless Community Networks2008 Next Generation Internet Networks10.1109/NGI.2008.45(284-291)Online publication date: Apr-2008
    • (2007)Experimental evaluation of community-based WLAN voice and data servicesProceedings of the 3rd international conference on Mobile multimedia communications10.5555/1385289.1385308(1-6)Online publication date: 27-Aug-2007

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media