Font Size: a A A

Bt Traffic Identification Technology

Posted on:2010-05-15Degree:MasterType:Thesis
Country:ChinaCandidate:Y CengFull Text:PDF
GTID:2208360308967459Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
Along with the development and popularization of Internet, P2P has become one of"killing applications", and the BitTorrent, which is called BT for short, is the outstanding one of P2P. In China, according to statistic, in the current communication traffic of Internet backbone network, about 60% belongs to P2P application, and in P2P application, about 50% communication traffic belongs to BT application which developed in recent two or three years.With the wide application of multimedia and P2P,technologies of network traffic identification and control are becoming a hotspot in network traffic management area.It is guaranteed that key network flow can run smoothly on network by network traffic control technologies.Network traffic identification technologies support essential conditions for network traffic control by traffic identification.Based on the improvements of P2P traffic identification technology which characterized by Payload.It begin with the introduction of the P2P and the characteristics of P2P network,the typical P2P application BitTorrent is taken as the research object, through the BitTorrent protocol and the source code of the current research, as well as several typical P2P applications such as Bittorrent, Thunderbolt the actual transmission of data, such as the situation analysis of comparison to find out more BT streaming payload characteristics, the BT streaming can be identified from other data streams to enhance the accuracy and flexibility of the BT traffic to identify。Finally from the aspects of accuracy, scalability, the identification technology is discussed, false identification rate and leakage rate is analyzed, and the shortcomings exist in the technology is pointed out.By the actual data of BT traffic, the measurements show that the technique achieves less than 2% false positive and false negative ratios, and low packet loss ratio。But for the data which is transmitted by BitCommet,BitSpirit which extend the BT protocol, the scalability is not so good. However, the capability on high speed network is still waiting for studying.
Keywords/Search Tags:P2P, traffic identification, BitTorrent, payload
PDF Full Text Request
Related items