Font Size: a A A

Identification And Analysis Of P2P Traffic

Posted on:2011-10-25Degree:MasterType:Thesis
Country:ChinaCandidate:T HanFull Text:PDF
GTID:2178360308968334Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
P2P technology is an emerging technology of resource's distributed storage and sharing. Corresponding with the dominant C/S (Client/Server) network architecture. This network architecture changes the way of storage from centralization to distribution, and the way of use from distribution to centralization. Therefore, it is a very innovative technology and has been applied to many areas.When the application in full swing, the problem is followed. One of the most prominent problems is that the bandwidth occupy. A large number of Internet bandwidth have been occupied by P2P applications. In order to enable P2P develop, at the same time not to harm the interests of ISP, people began to restrict and management P2P traffic to ease the bandwidth pressure. The first task is to correctly identify the P2P traffic. At first, because of early P2P protocol use of fixed TCP or UDP port, the identification for P2P is easy. However, with the continuous development of P2P technology, many P2P applications start using dynamic port and pseudo port to conceal there whereabouts. In testing, we found that some P2P traffic is even use 80, 25 ports. The emergence of these new features lead to the traditional methods of identification for P2P traffic is no longer applicable.Therefore, how to propose a more reasonable and effective method has become a difficult problem.This article is based on the use of tools such as Ethereal to monitor traffic of P2P applications with the LAN, and carried out a detailed analysis and research on the traffic features of common P2P software and P2P traffic identification method. First, this article describes in detail the application of P2P technology and the development process. Second, this article gives the depth and detailed analysis of the current popular P2P traffic identification technology: port identification technology, based on traffic statistical features identification technology and the identification technology based on deep packet inspection (DPI), their advantages, disadvantages and application. For a variety of identification technologies, using Ethereal and other protocol analysis tool carried out corresponding experiments in the LAN environment and draw some of own conclusions. Finally, the author proposes a heuristic identification model through analysis and synthesis of various identification techniques. Although the validity and accuracy of the model remains to be verified, however, the model provides an idea about comprehensive identification and analysis of P2P traffic for P2P traffic identification researchers and network managers. In addition, the experimental data in this artical is real data running in real network environment, which is also a rich source of reliable data for the P2P technology researchers. At the same time, these datas can help network administrators to effectively limit and manage P2P network traffic and then enhance the quality of service of other normal network applications.
Keywords/Search Tags:P2P, C/S, Ethereal, Port identification technology, Based on traffic statistical identification technology, Deep Packet Inspection technology
PDF Full Text Request
Related items