Font Size: a A A

P2P Protocol Identifacation And Traffic Control Based On Network Processor

Posted on:2007-04-04Degree:MasterType:Thesis
Country:ChinaCandidate:P L YanFull Text:PDF
GTID:2178360185468273Subject:Computer applications
Abstract/Summary:PDF Full Text Request
Along with the development of Internet, the technology of P2P ( Peer to Peer ) has become one of the fastest developing network application. P2P brings too many questions while brings the huge convenience to the people. According to the incomplete statistics, along with the P2P software development, above 60% even 70% band width has been occupied by the P2P traffic, and the proportion is becoming bigger and bigger. P2P not only occupies the massive band width, but also possibly causes the serious security problem, moreover, P2P has also greatly impacted the original copyright system, the fundamental mode of network pirate is peer to peer network sharing (P2P). These questions urgently request us to identify the P2P traffic and control it while developing P2P technology.The thesis has mainly discussed how to realize the identification and control of P2P application based on the IXP2400 network processor . Network processor (NP) is special instructions processor designed for network applications, at the same time, it is a piece of software programmable chip. As a new emerging network technology, it is in a period of rapid development. The thesis focuses on researching and analyzing several most widespread used typical P2P applications, such as Bittorrent, eDonkey, Gnutella protocol and so on, and has put forward the scheme of protocol identification and traffic control based on signature.
Keywords/Search Tags:P2P, IXP2400 Network Processor, Protocol Idntification Traffic control
PDF Full Text Request
Related items