Font Size: a A A

Design And Implementation Of Flow Identification And Control System Based On DPI And DFI Techniques

Posted on:2015-01-18Degree:MasterType:Thesis
Country:ChinaCandidate:H ZhangFull Text:PDF
GTID:2298330467963896Subject:Cryptography
Abstract/Summary:PDF Full Text Request
With the development of the Internet, network gradually becomes an indispensable part of people’s lives. When people enjoy a variety of powerful features and services from Internet, many network problems have come out. For example, many P2P applications occupy much bandwidth. This causes the network link congestion, makes user experience bad; secondly, it not only causes intellectual property arguments but also increases operator costs. In order to effectively monitor and analyze network bandwidth usage, and to prevent the excessive use of network bandwidth, this paper designs and implements a network flow control system for LAN.This paper focuses on key techniques of network traffic detection, especially about the P2P.traffic. On the basis of these techniques and methods, this paper implements a new network traffic identification and monitoring systems. The system uses many flow inspecting technologies to identify applications flow and record accurate flow statistic.At the same time, the system supports bandwidth control, distribution and network service. The main task includes the following aspects:1. This Paper has analyzed and researched many network traffic identification techniques and their advantages and disadvantages. The paper uses, rational flow identification techniques to identify different applications.2. This Paper has researched the definition, traffic characteristics and network model of P2P, and proposed a variety of P2P traffic identification techniques.3. The paper researched and designed of a new flow inspecting system architecture and deployment scenarios based on IP network. This system makes network flow identification accurately, it. also can be customized according to the needs of targeted control strategies. The system also has a traffic identification recording feature. Users can take advantage of results of the flow analysis to analyze user’s behavior on the Internet.4. This paper has researched and analyzed AC algorithm, and the paper used this algorithm to design flow identification module of the system. The module, combined with traffic techniques, identifies the network flow. The system uses DPI and DFI techniques.5. The paper used a variety of traffic identification techniques to deeply analyze many popular softwares. The paper test the system on performances and functionality. From test results, the design achieved well in the demand. It also achieved good extensibility, stability and portability.
Keywords/Search Tags:Flow identification, DPI, P2P, Network deployment, ACstate machine
PDF Full Text Request
Related items