Software allows neighbors to improve Internet access at no extra cost

Apr 27, 2006

Computer scientists at the University of Illinois at Urbana-Champaign have developed software that enables the sharing of high-speed wireless connections without compromising security or privacy. The software can improve Internet connectivity in residential areas at no additional cost.

"Significantly improved speed and the 'always on' feature of wireless routers have been driving the rapid spread of broadband Internet access in many residential areas," said Haiyun Luo, a professor of computer science at the University of Illinois at Urbana-Champaign. "More than 56 percent of homes in the United States already have Internet access, and more than half of those homes are using Wi-Fi wireless home networks."

A typical residential user accesses his broadband home connection about 12 to 15 hours per week, Luo said. "So, while the Internet connection is always on, most of the time it sits idle." Luo would like to see that idleness put to good use by benefiting other users, and he and graduate student Nathanael Thompson came up with a way to do it.

Luo and Thompson have developed a software framework called PERM (Practical End-host collaborative Residential Multihoming) that allows neighbors to pool their Internet access and thereby improve both performance and resilience.

"PERM exploits the diversity of broadband Internet access in residential areas to improve connectivity in a managed way," Luo said. "Our design requires no support outside the user's wireless router, and is immediately deployable."

By pooling all available Internet connections, neighbors can enhance their Internet connectivity at no additional cost. That is, if neighbors are willing to share.

"PERM represents a paradigm shift in the Internet user community," Luo said. "Until now, most users have been unwilling to share their wireless connections for fear of losing security and privacy. We offer a solution that ensures mutual benefit, security and privacy."

The sharing of Internet connections is open only to registered users who, in exchange for using connections belonging to others, must offer the use of their own. This "peer-to-peer" sharing concept has enormous potential, with millions of possible nodes, Luo said.

Within PERM, flow-scheduling algorithms select the best connection from those available. In addition, higher performance is achieved by selecting and using multiple connections when appropriate. The software framework also provides a service scheduler, which gives the owner priority over his wireless router and reports any misuse by others.

But the scope of PERM is still limited: Neighbors can only benefit from sharing when they are around each other's homes. The next step is to expand beyond neighborhoods and take collaborative Internet access on the road, literally.

"Wireless routers are necessarily location-based," Luo said. "But the peer-to-peer sharing concept can just as easily be used between cars, or between homes and cars, as between homes. As more users join the system, the more powerful the system will become."

Thompson will present the peer-to-peer Internet sharing concept and flow-scheduling algorithms at the Institute of Electrical and Electronics Engineers INFOCOM 2006 meeting in Barcelona, Spain, April 23-29.

Source: University of Illinois at Urbana-Champaign

Explore further: 'Halo' makers shed light on live-action series

add to favorites email to friend print save as pdf

Related Stories

Recommended for you

Watching others play video games is the new spectator sport

Aug 29, 2014

As the UK's largest gaming festival, Insomnia, wrapped up its latest event on August 25, I watched a short piece of BBC Breakfast news reporting from the festival. The reporter and some of the interviewees appeared baff ...

SHORE facial analysis spots emotions on Google Glass

Aug 28, 2014

One of the key concerns about facial recognition software has been over privacy. The very idea of having tracking mechanisms as part of an Internet-connected wearable would be likely to upset many privacy ...

User comments : 0