Font Size: a A A

Design And Implementation Of A Distributed Monitoring And Controlling System About Network Traffic

Posted on:2008-05-27Degree:MasterType:Thesis
Country:ChinaCandidate:P F FanFull Text:PDF
GTID:2178360215457300Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The network application is changing formly from traditional business to P2P, Web2.0 and other forms, high-efficiency network traffic monitoring and controlling system (NTMCS) is needed urgently to analyze and control kinds of business on network promptly and accurately. This paper based on "The Research & Manufacture of P2P Resilient Overlay Network Intelligent Node based on IPv6" project has designed and realized a new NTMCS which based on distributed system.The main research content of this paper is as below:1. Analyzed two kinds of the NTMCS framework, get united with project's request, distributed system structure is selected to realize real-time and high-efficiency monitor for some key output of network.2. Analyzed network data gathering technology and access network (series connection & bypass connection), based on actual requirement of project, bypass access is selected to monitor the network.3. Analyzed recent port match, characteristic code match and flow control, has designed and realized monitor poly dynamic configuration technology which based on application layer protocol, application layer protocol analysis technology is based first matching & second matching & PASV-FTP matching, TCP flow bypass preventation technology is optimized.4. A testing based on function and performance is done for this system, the result shows the function of this system is achieving the demand of the project; the system is stable, expandable, and easyto use.The innovate point of this paper includes: To optimize analysis and statistics performance of application layer protocol, application layer protocol monitoring & controlling dynamic configuration technology is given, combined first matching, second matching and PASV_FTP matching for application layer protocol analysis. At the same time, TCP traffic bypass interdiction technology is also optimized.
Keywords/Search Tags:Network Traffic, Bypass Monitoring and Controlling, First Matching, Second Matching, PASV_FTP
PDF Full Text Request
Related items