Font Size: a A A

Internet P2P Application Signature Extraction And Flow Control Study

Posted on:2014-01-27Degree:MasterType:Thesis
Country:ChinaCandidate:D J KangFull Text:PDF
GTID:2268330401953195Subject:Signal and Information Processing
Abstract/Summary:PDF Full Text Request
Since the advent of P2P technology, a variety of P2P applications has been developed and applied to the actual network. The rapid development of P2P applications has brought new opportunities and challenges to network management:P2P applications completely change the traditional mode of resource request and access, its originality mode of to the center, has efficiently integrated the scattered resources in the system, Gives users unprecedented network experience, brought new development opportunities for telecom operators also.However, P2P traffic has swallowed a lot of network bandwidth, reduced the performance of many traditional network applications, led to the traditional voice traffic of telecom operators diversion, brought about the dilemma "Traffic but not income increment" to telecom operators. Therefore, it is that how to make reasonable use of P2P technology, taking full use of its advantages and avoiding its disadvantages, and finally achieve the win-win goal of the P2P application developers and telecom operators, has become the common subject of academic and research institutions, business groups, enterprises and institutions, plays a very important role in the normally, healthful development of network.By means of analyzing the current staple methods of P2P traffic identification and conformity, it has been found that the signature-based identification method is the most widely applyed, the control effect of P2P traffic identification most satisfactory method in this paper. And extracting currently, accurate signatures plays a decisive role to identify the effect of this method. It has selected three popular P2P applications as a representative analysis in this paper, analyze their working principles and extract their respective signature.Finally, it is based on small and medium-sized network that which network management is relatively weak in this paper, comparativly analyzed the realization of three free P2P traffic identification and control method, analyzed them working principles, key technologies; and verified the identification and monitoring effect of Panabit by experiment, Summarized the lack of Panabit and proposed its improvements. Provided technical reference to traffic control of small and medium-sized network, lay the foundation for follow-up study and work.
Keywords/Search Tags:P2P applications, Signature, Traffic control, Netfilter, Panabit
PDF Full Text Request
Related items