Font Size: a A A

The Research And Implementation Of The P2P Traffic Control System

Posted on:2008-06-29Degree:MasterType:Thesis
Country:ChinaCandidate:H TangFull Text:PDF
GTID:2178360272968725Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
The widespread use of the P2P technologies has brought a lot of serious problems, such as excessive bandwidth consumption and rapid virus spread. How to control the P2P traffic effectively when enjoying the convenience of the P2P is a research focus.DPTCS (DPI-based P2P Traffic Control System) is a P2P control model based on the analysis and study of the current P2P traffic control systems, which can be used in middle and small scale enterprise. The deep packet inspection is the core identification technology and has a high recognition rate to BitTorrent and eDonkey protocol. DPTCS adopts IP address identification and TCP/UDP ports identification to improve the recognition rate and system performance. The basic principle of DPTCS is excludeing the IP addresses which are no needs to control, the directory servers in centralized P2P networks and the super-peers in hybrid P2P networks across IP address identification, excludeing the P2P applications which use fixed ports across TCP/UDP ports identification, classifying the residual traffic across the deep packet inspection and manageing the traffic across the management strategies. The management strategies DPTCS adopted contains the management based on the source IP address and time, P2P forbidden strategy, P2P traffic shaping strategy. The management based on the source IP address can manage the traffic of the specified IP addresses. The time strategy can manage the traffic in specified time. P2P forbidden strategy can forbid the P2P traffic. P2P traffic shaping strategy can implement the Qos to specified P2P traffic.The implementation of DPTCS adopts many optimums to improve the performance of the system. The main optimums contains do not match all packets of a session but match the first several packets to determine a traffic is a P2P traffic or not, and the connection track is used to improve the processing speed of the followed packets. The performance test shows that the system can identify and control the P2P traffic effectively.
Keywords/Search Tags:Deep Packet Inspection, Traffic Identification, Traffic Control, Peer-to-Peer
PDF Full Text Request
Related items