Professional Documents
Culture Documents
discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/237040650
CITATIONS
READS
182
3 authors:
Mohammed Abdul Qadeer
Shahid Habib
Independent Researcher
5 PUBLICATIONS 0 CITATIONS
SEE PROFILE
SEE PROFILE
Shahid Habib
A. Yazdan Javaid
maqadeer@gmail.com
shahid_lko2003@yahoo.com
ahmad2yazdan@gmail.com
ABSTRACT
In this paper, we present a new technique for Bandwidth
allocation among users in a server controlled network in a
technical, industrial or institutional setup. In creating our project
we shall be using fair queuing i.e. the system which is connected
to the internet and on which our software is installed will be
receiving all the packets requested from the user. Then putting all
packets in a queue and transmitting them after a suitable delay
will guarantee that the users receive the allocated bandwidth. The
method is to send all network traffic to a centralized bandwidth
manager that provides prioritization, rate limiting and other
related services.
General Terms
Algorithms, Management, Measurement, Documentation,
Performance, Design, Economics, Reliability, Experimentation,
Security.
Keywords
Resource Allocation, Bandwidth Limiting, Network Management,
Bandwidth management
1. INTRODUCTION
In the fields of networking and communications, there is a
continual concern over poor bandwidth utilization [1]. It is
sometimes the case that host computers can employ applications
or processes that are very bandwidth intensive, limit the amount
of bandwidth that other hosts have at their disposal. This in turn
limits the amount of work that can be done in a given amount of
time. In order to alleviate this problem, we believe that we can
develop a system wherein the amount of bandwidth that each
application or process uses on a network can be measured in realtime.
Permission to make digital or hard copies of all or part of this work for personal or classroom use is
granted without fee provided that copies are not made or distributed for profit or commercial
advantage and that copies bear this notice and the full citation on the first page. To copy otherwise,
or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a
fee.
International Conference On Advanced Infocomm Technology08,
Jul 2931, 2008, Shenzhen, China.
system.
2.2.1 Authentication
The first phase basically involves authentication of users on the
network to check whether the user is authorized to access internet
from that particular terminal. We dont require any username and
password based authentication instead we will use ip address or
MAC address based authentication which is very secure and
invulnerable to any kind of network problems and attacks (passive
or active). The system also checks the priority of the service
based on its protocol and thus, determines the amount of
bandwidth which needs to be allocated to that particular service.
As soon as a user becomes active, packets are exchanged between
the server and the user. The server during this process captures
those packets and determines their MAC address from the datalink header and matches the address with those present on the
database. If an entry is found for that MAC address then an o.k.
message is sent to the user else a message connection refused is
send to the user. Since, IP addresses can change in a DHCP
environment MAC addresses are used to make the system less
vulnerable to unauthorized access from the users.
After a valid packet has been received by the NIC, this generates
a request toward the bus controller for a bus mastering data
transfer. At this point the NIC takes control of the bus, transfers
the packet to the NIC buffer in the hosts memory, releases the
bus and generates a hardware interrupt towards the Advanced
Programmable Interrupt Controller (APIC) chip. This chip wakes
up the OS interrupt handling routine, which triggers the Interrupt
Service Routine of the NIC device driver
The ISR of a well written device driver has little to do. Basically
it checks if the interrupt to itself and acknowledges it. Then the
ISR schedules a lower priority function (called the Deferred
the stack, and it is then deleted from kernel space. Similarly, once
an outgoing packet has been processed by the application layer in
user space, it is copied to kernel space to be processed by the
remainder of the protocol stack, and it is then deleted from user
space.
3. PRACTICAL APPLICATIONS OF
BANDWIDTH LIMITING
With the increasing proliferation of broadband, more and more
users are using Peer-to-Peer (P2P) protocols to share very large
files, including software, multi-media files, and applications. This
trend has exponentially increased traffic flows across a very wide
area network. If you are coping with excessive bandwidth
consumption due to P2P traffic, such as Bit Torrent, our
Bandwidth Limiter can solve your problem of poor bandwidth
utilization and high bandwidth consumption. The applications of
bandwidth limiter are:
traffic loggers
traffic generators
network scanners
Security tools
Even with current technologies, it is not easy to determine in realtime how a network is being used. This situation leads to
uncontrolled allocation of network resources to host computers
that employ applications or processes that are very bandwidth
intensive, thereby limiting the amount of bandwidth that other
hosts have at their disposal. As mentioned earlier in this report,
the main technical objective of the project is to implement a
networking tool that will allow better management of network
traffic. A careful examination of the technical challenges,
combined with the financial aspect of what the processes and
equipment required will involve has led us to conclude that this
project is feasible. Some of the most important aspects considered
during the analysis of the products performance are its ability to
prioritize and allocate network bandwidth among hosts on a
network, provide enough security as to prevent tampering with or
taking over a disproportionate amount of bandwidth, centralized
operations, multiplatform GUI, etc. A short overview of what the
implementation of our project might look like can be seen in the
Figure 4.
5. REFERENCES
[1]. Tanenbaum, A.S., Computer Networks, third ed., PrenticeHall, Inc., Englewood Cliffs, NJ, 1996, 380 381.
[2]. Bertsekas, D.P., Gallager, R., Data Networks, Prentice-Hall,
Englewood Cliffs, NJ, 1992.
[3]. Bolliger, R.., Gross, T.R., Bandwidth monitoring for
network-aware applications, High Performance Distributed
Computing, 2001. Proceedings. 10th IEEE International
Symposium on , 7-9 Aug. 2001, 241 -251
[4]. Shreedhar, M., Varghese George, Efficient Fair Queuing
using Deficit Round Robin
[5]. Tommy K Paul 1994 Building Network Bandwidth
Network News - The Network Professional Association
monthly publication
http://www.sju.edu/%7Ejhodgson/netw/tp_asg4.html
[6]. Bandwidthcontroller.com
Internet
sharing
guide
http://bandwidthcontroller.com/internet-sharing.html
[7]. Douglas E. Comer., 1995, Internetworking with TCP/IP
Vol.1: Principles, Protocols, and Architecture. 4th Edition
Upper Saddle River: Prentice Hall.
[8]. H. Zhang, D. Ferrari, Rate-controlled service disciplines J.
High Speed Networks 3 (4) (1994) 389412 connection
admission control for bandwidth management of an Internet
access link, Communications Magazine, IEEE , Volume: 38
Issue: 5 , May 2000 Page(s): 160 -167
[9]. Dr Orhan Gemikonakli (2003) Network Management
http://www.cs.mdx.ac.uk/staffpages/orhan/csy4061/netman1.
htm
[10]. Juniper.net (1999) Managing Bandwidth from a Large
Traffic
Source
http://www.juniper.net/solutions/literature/solutionbriefs/351
000.pdf
[11]. Cisco Systems (2001) Meet the Cisco Intelligent Engine
2100 Service Provider Solutions
[12]. SearchNetworking.com (2001) Data Transfer Rate
http://searchnetworking.techtarget.com/sDefinition/0,,sid7_g
ci213492,00.html
[13]. The Internet Services Company (2002) Active Bandwidth
Management
Device
Networking
http://www.interchannel.net/product/networking/bandwidth.
htm