Font Size: a A A

P2P Network Monitoring Research And Technical Application

Posted on:2007-05-18Degree:MasterType:Thesis
Country:ChinaCandidate:F P CaiFull Text:PDF
GTID:2178360212960496Subject:Computer applications
Abstract/Summary:PDF Full Text Request
Peer-to-Peer systems (abbreviated to "P2P systems") have being experiencing a rapid growth in the past several years. Currently, it has become the one that occupies the most amount of Internet bandwidth among all the network applications.P2P regards building up an overlay networks overlaying current" WWW" as its purpose, and it involves such as the network frame,interconnection technology, information security and even the law issue ,etc. Along with its fast development, its safe problem is more and more outstanding. How to realize the effective control on P2P information dissemination to become a key problem that everybody should pay close attention to.This thesis rely on Nation 863 subject relevant work on " Peer to Peer protocol analysis and content control technical research " that author participate in, on the basis of analyzing in depth and studying P2P network monitoring technology , have tried to design an effective network monitoring system of a few typical model P2P software( Gnutella, Freenet, Skype).The main work of this thesis include:In the first place,Collect the related research result of P2P; Researched system build up, Freenet special node and content orient method, and the storage administrative skill of the data in Freenet; Researched Gnutella, Freenet, Skype network system structure, Gnutella,Freenet,Skype node and content orient method,and the storage administrative skill of data。Analyzed the characteristics of several kinds of main index keys and the method of the application, the movement mechanism of the network of Freenet, Skype carried on through study.Secondly,Read and analyze Gnutella, Freenet, Skype agreement, build the experiment environment to grasp the Gnutella, Freenet, Skype correspondence data, discovere the agreement characteristic and some safe weaknesses within mechanisms. To the security weakness that is found, propose the control technical.Finally,Synthesize to make use of the network scanner technique,the network data monitoring technique and block conversation technique, ARP attack technique and the firewall interact technique, carry out the control to the Gnutella, Freenet, Skype. Follow the P2P technique development, analyze the next generation routing technique.The research work of this thesis, contribute to raising the controllability of Gnutella,Freenet,Skype network, help the network administrator monitor and control effectively this kind of network information.
Keywords/Search Tags:P2P, AES, RSA, CHK, DHT
PDF Full Text Request
Related items