scholarly journals Achieving robust global bandwidth along with bypassing geo-restriction for internet users

Author(s):  
Gazi Zahirul Islam ◽  
Aman Ullah Juman ◽  
Al- Nahian Bin Emran ◽  
Md. Abbas Ali Khan ◽  
Md. Fokhray Hossain ◽  
...  

<p class="Abstract">Not all Internet Service Providers provide a sufficient amount of bandwidth to their users. Although the amount of local bandwidth is reasonable, global bandwidth is not satisfactory at all. Based on bandwidth allocation, location and price; service providers capped their users’ global bandwidth i.e., reducing global internet speed. As a consequence, we observe severe global bandwidth limitation among Internet users. In this article, we implement a flexible and pragmatic solution for Internet users to bypass global bandwidth restriction. To achieve robust global bandwidth, we utilize a combination of communication technologies and devices namely, Internet Exchange Point, Virtual Private Network, chain VPN technology etc. In this project, we show that internet speed of international route i.e., global bandwidth can enhance significantly if there are multiple ISPs use a common IXP and at least one of those ISPs provides pleasant global bandwidth. Usually, regional ISPs use a common IXP to route their local traffic using local bandwidth within the region without wasting global bandwidth. We show that using our proposed method global internet speed of a user can raise several times effectively utilizing assigned local bandwidth. In addition, we also implement a geo-restriction bypassing technique integrating an offshore ISP with local ISP using VPN. Thus, we enjoy tremendous Internet speed along with unrestricted access to the websites.</p>

2017 ◽  
Vol 11 (60) ◽  
pp. 2967-2980
Author(s):  
Diego F. Rocha ◽  
Octavio Jose Salcedo Parra ◽  
Giovanny Mauricio Tarazona Bermudez

The paper must have abstract. The rapid growth of networks base on IP, and the current challenge posed by the technological deployment of IPv6 and annexed applications, challenges that must confront the Internet Service Provider and have stimulated the development for rigorous researches on the topic. The Internet Service Providers ISP offer infrastructure for implementation of virtual private network VPN, where is fundamental the definition of routing schemas between the border route of client CE and the provider PE. In this sense, have been proposed different schemas where the new protocols as Open Short Path First version 3 OSPFv3 have a key role. In the context of VPN, the routing protocol BGP is used to distribute the client’s path, the multi-protocol label switching MPLS is used to send the information packages through the network core in tunnel mode. Originally, only IPv4 was supported and expanded after support OSPFv2 and VPN IPv6. Based on the new specifications in order to support OSPFv3 as a routing protocol PE-CE and the current technological infrastructures begin the process of IPv6 deployment, these elements driving this research which evaluate the performance of routing protocol OSPFv3 on border scenarios MPLS/VPN/IPv6.


2011 ◽  
Vol 474-476 ◽  
pp. 79-82 ◽  
Author(s):  
Kun Zhang ◽  
Hai Feng Wang ◽  
Yu Chun Ma ◽  
Zhuang Li

Virtual Private Network (VPN) refers to rely on the ISP (Internet service providers) and other NSP (Network service provider), in the public network, to establish a dedicated data communication network technologies. In the virtual private network, between any two nodes connected no dedicated network for the traditional end-to-end physical link, but to use a public network composed of dynamic resources. VPN technology can reduce the internal network building costs, improve user network operation and management flexibility, and enable communication between computers and private circuits on computer communications with the same security.


2019 ◽  
Vol 8 (3) ◽  
pp. 8715-8720

Exchanging the data packets seems as very challenging task due to exponential growth in network interface. Meanwhile, this increased interface makes use of next generation of internet protocol (IPv6) which will eventually replace the IPv4. Major issues in this replacement is the compatibility, both requires different set of routing protocols. Multi-Protocol Label Switching, a rapidly growing telecommunication infrastructure technology which works on special protocol suitable for both versions of Internet Protocol. MPLS uses the third OSI layer addressing coupled to second layer speed in switching and this paves the way for greater transfer of information, voice and video traffic. Virtual Private Network is the fastest growing technology for connecting the dispersed sites of same customer using the public network without any interference with other networks. This is an attractive technology to service providers because it enhances the flexibility for using variety of classes of services. This paper deals with the implementation of IPv6 networks for internet services using MPLS background which offers increased transfer in data, voice and video traffic. It also deals with, implementing MPLS based Virtual Private Network in IPv6 infrastructure using GNS3 simulator. This is done on behalf of the Border Gateway Protocol (BGP) which isolates the dispersed site in an Autonomous System (AS), connected to a public network


ADALAH ◽  
2020 ◽  
Vol 4 (2) ◽  
Author(s):  
Munadhil Abdul Muqsith

Abstract:The internet developed for the first time in Indonesia in the early 1990s. Starting from the pagayuban network, it is now expanding without boundaries anywhere. A survey conducted by the Indonesian Internet Service Providers Association (APJII) said that the number of internet users in Indonesia in 2012 reached 63 million people or 24.23 percent of the country's total population. Next year, that figure is predicted to increase by close to 30 percent to 82 million users and continue to grow to 107 million in 2014 and 139 million or 50 percent of the total population in 2015. million people. This matter also results in political communication with the internet media, or is often said to be cyber politics. Cyber politics in Indonesia has faced growth in recent years. There are many facilities that support the growth of cyber politics, such as Facebook, Twitter, mailing list, YouTube, and others.Keywords: Cyberpolitik, Internet  Abstrak:Internet berkembang pertama kali di Indonesia pada awal tahun 1990-an. Diawali dari pagayuban network kini berkembang luas tanpa batas dimanapun juga. Suatu survei yang diselenggarakan Asosiasi Penyelenggara Jasa Internet Indonesia (APJII) mengatakan kalau jumlah pengguna internet di Indonesia tahun 2012 menggapai 63 juta orang ataupun 24,23 persen dari total populasi negeri ini. Tahun depan, angka itu diprediksi naik dekat 30 persen jadi 82 juta pengguna serta terus berkembang jadi 107 juta pada 2014 serta 139 juta ataupun 50 persen total populasi pada 2015. juta orang. Perihal ini pula berakibat pada komunikasi politik dengan media internet, ataupun kerap diucap dengan cyber politic. Cyber politic di Indonesia hadapi pertumbuhan sebagian tahun terakhir. Banyaknya fasilitas yang menunjang pertumbuhan cyber politic semacam terdapatnya facebook, Twitter, mailing list, youtobe, serta lain-lain.Kata Kunci: Cyberpolitik, Internet 


Author(s):  
Bangaly Kaba

The purpose of this study is to understand the difference between Internet users' continuing use behavior in the context of digital inequality. Data were collected through a survey of Internet users in the Ivory Coast. The structural equation modeling technique was used to test the research hypothesis. This study showed empirically that concern over information and communication technologies (ICT) access as an explanation for digital inequality should be toned down. This research suggests emphasizing alternative factors to explain Internet sustained use intention by underprivileged individuals, including normative beliefs. The results will help internet service providers, governments, and international aid agencies to better understand users' behaviors or reactions to ICT available to them. This understanding provides a foundational platform upon which viable and effective information technology-enabled solutions and policies can be conceptualized and implemented. This study is one of the few that integrate three salient beliefs to differentiate ICT use continuance intention in the context of digital inequality.


2021 ◽  
Vol 7 (3) ◽  
pp. 111-118
Author(s):  
Murad Madzhumayev

Collective actions, particularly organization, promotion, encouragement, and incitement to civil disturbances, are hard to imagine without use of information and communication technologies (ICTs). Recent events such as the Arab Spring, the colour revolutions (e.g. in former Eastern Bloc and the Balkan countries), the unrest in Minneapolis in 2020 which subsequently spread to other US cities, and the US Capitol riots 2021 present significant evidence in this regard. The dissemination of information online inciting to riots involves internet service providers (ISPs) alongside the author. The aim of the paper is to specify the actors in accordance with their functions and determine their eligibility to be prosecuted in cases of incitement to riots using ICTs. Formulated a conclusion about the onset of intermediary liability of ISPs, holding the organizational and technical capacity to influence the information social relations of their users at any time.


Author(s):  
Tung-Hsiang Chou ◽  
Ching-Chang Lee ◽  
Chin-Wen Lin

The Internet has come a long way over the past twenty years, and many Internet-era enterprises have had to face daunting challenges while trying to create innovative business models. Many types of Internet interactions can facilitate networking (e.g., The Web, Web services). Since the advent of the Internet, service requesters and service providers have generated diverse electronic services (e-services), and since 2003, many experts have proposed the concept of Web 2.0. People rely on Internet e-services to execute activities and meet requirements; however, e-services lack a standardization method for constructing and managing them. The current study presents a framework design and a comprehensive interface for e-service providers and requesters. The study adopts the concept of Web 2.0 by using Web services with related standards for developing the framework design. Specifically, the study uses semantic Web technologies to complete the construction of e-services. After that, Internet users can quickly and conveniently access the framework to obtain suitable e-services.


Author(s):  
Eliamani Sedoyeka

In this article, Quality of Experience (QoE) is discussed as experienced by Tanzanian internet users for the second biannual of 2016. It presents findings of the research that aimed at among other things, finding out the QoE in internet services offered by telecommunication companies and other internet service providers in the country. A qualitative approach was used to establish practical quality of experience issues considered important by Tanzanians. Online questionnaires distributed over social media mainly WhatsApp and Facebook were used to ask users about their experiences of the services they had been receiving, in which over 2000 responses were collected from all districts of Tanzania. It was established that usability, quality of service, price and after sale support were the main issues found to influence quality of experience for many. The findings in this article are useful for academicians, QoS and QoE researchers, policy makers and ICT professionals.


2015 ◽  
Vol 6 (2) ◽  
pp. 263-270 ◽  
Author(s):  
Eric Luiijf ◽  
Marieke Klaver

With respect to critical information and communication technologies (ICT), nations most often declare their national critical infrastructure to include telecommunication services and in some cases critical services offered by key Internet Service Providers (ISP). This paper debates whether nations, their policy-makers, legislation and regulation largely overlook and fail to properly govern the full set of ICT elements and services critical to the functioning of their nation. The related societal and economical risk, however, needs to be closely mitigated, managed and governed. Legal and regulatory obligations to increase the ICT resilience may sometimes encourage this process.


Sign in / Sign up

Export Citation Format

Share Document