Font Size: a A A

P2p Application Traffic Management To Achieve Voice Packet Inspection Flow Module

Posted on:2008-01-27Degree:MasterType:Thesis
Country:ChinaCandidate:Z R LiFull Text:PDF
GTID:2208360215482701Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
Breaking the formal C/S based mode of business, P2P(Peer to Peer) technology has been widely applied in recent years on document exchange, distributed computing, cooperative work , distributed search, e-commerce and so on. Security and management on internet are meeting the new challenge because the application of P2P technology is based on its own flexible network structure.On the basis of the former network and among NGN (Next Generation Network) , audio and video flow occur widely, which leads to the target of network management becomes more complicated and network performance and stability management become more important.This thesis mainly explains research and realization of P2P traffic management during the author's postgraduate studies, including P2P technology introduction, research on transport layer property of all kinds of P2P application, research on transport layer new identifying algorithm of P2P application and realization of identifying algorithm and its function analysis.As to carriers, P2P service forms a new challenge to the mode of broad band network operation, which is the disproportion of expanding investment and business income caused by traffic growth. So a new charge mode is needed here, such as traffic management, billing based on content and so on. In that case, it will be more difficult for network planning and increase investment risk.To a corporation, P2P application takes up massive enterprise network bandwidth, which is moreover unable to distinguish legal and illegal P2P traffic. The firewall cannot resist P2P application software so that P2P software can be made into virus, Trojan horse virus and spy software resulting forming a threat to network. At the same time, it is the flaw of P2P network itself that is easy to be taken advantage of so that it meets with attacks.At the same time, this thesis also expounds research on flow module of voice package's inspecting, including introduction on project background and structure of voice package's inspecting system, and research on RTP identifying statistic method in flow module.The former network traffic and protocol analysis software, ntop and Ethereal, are not good enough to solve statistic property of flow (RTP) as well as signals (H.323,MGCP,SIP). Our purpose is to analyze audio and video operation, monitor traffic and performance of audio and video flow.
Keywords/Search Tags:P2P, VoIP inspecting, SIP, RTP, RTCP
PDF Full Text Request
Related items