Font Size: a A A

The Research Of P2P Traffic Identification Based On Application Layer

Posted on:2008-10-04Degree:MasterType:Thesis
Country:ChinaCandidate:X F CaiFull Text:PDF
GTID:2178360215982690Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
Peer to Peer network is a new technology that can change the application module of internet. P2P techonolgy provides the amazing convenience to users, and at the same time, it makes use of the potential resources of Internet effectively, changes the web based Internet into a free-interact network. On the other hand, P2P traffic has already been the largest traffic in the internet because of large numbers of users. The huge traffic gives ISPs much pressure, and they want to find a way to identify and manage the traffic of P2P applications through the traffic of internet.This thesis presents application layer characters of many popular P2P networks, implements an identification P2P network system based on Linux iptables, and puts forward a new string match scheme that can improve the efficiency of the system. The testing report proves that the system provides a solution of identifying P2P traffic accurately.There are eight chapters in the paper, Chapter 1 provides a brief introduction about the research background and the main research tasks. Chapter 2 mainly covers the key technology of P2P networks including the application area, the existing problems and the trends of P2P networks; in chapter 3, the traffic management utilities are researched and analysed. Chapter 4 summarizes the characters of application layer and transport layer of P2P networks through experiments and research on the P2P applications. In chapter 5, the implementation of a P2P identification system based on application layer is introduced. The system is based on Linux iptables. Chapter 6 provides the new scheme that can improve the string matching efficiency. Chapter 7 is the testing report of P2P identification system based on application layer and the new scheme, and the last chapter is the summarization of the research work and its prospect in future.
Keywords/Search Tags:P2P networks, traffic management, application character, iptables, regular expression
PDF Full Text Request
Related items