Font Size: a A A

P2P Identification System Architecture Based On Cloud Computing (Cloud Wall)

Posted on:2015-02-05Degree:MasterType:Thesis
Country:ChinaCandidate:T ZhangFull Text:PDF
GTID:2298330467988865Subject:Computer technology
Abstract/Summary:PDF Full Text Request
P2P technology has been appeared for years, but as is appeared, the technology has beensuppressed by various copyright organizations and Internet service, the reason is that thetechnology allows all users to share data. But many of the data that users to share are notallowed to spread without authorization, and each node in the P2P downloading data willhave a lot of big traffic, network traffic will take a lot of P2P network bandwidth, networkcongestion, which will undoubtedly give the network service operators trouble. It is for thesereasons, P2P has been squeezed from the emergence suppressed. Cloud computing is anemerging technology in recent years, from the technology appeared to get a lot of attention,countries and the world-renowned IT companies have also invested a lot of manpower andresources to its research and development. As the cloud computing technology to rely on agood network to work, so in recent years, in order to promote the smooth development ofcloud computing major companies and network operators are actively improving the networkenvironment. The network is also one of the main limiting P2P development, so thedevelopment of cloud computing in virtually promoted the development of P2P, P2Ptechnology in recent years, the emerging video-based voice software, whether it is P2P filesharing or P2P technology, real-time communication will have a huge network traffic, P2Ptraffic in order to identify P2P traffic monitoring has become an urgent problem. There hasbeen a lot of P2P identification technology, but facing increasing P2P traffic identificationtechnology itself and the machine which is carrying these technologies are beginning to showhardware devices insufficient capacity.In response to these problems, this paper studies a single device on the P2P identificationported to the cloud systems that take advantage of parallel computing cloud features step willbe to identify P2P traffic slicing refinement, and cloud computing itself is super computingpower but also much higher than a single hardware device, which makes the identification ofexisting P2P technology force easily identify P2P traffic becomes increasingly likely. Thispaper introduces in detail in Chapter IV of the organizational structure of the system andmethod of mathematical analysis proved that this system really has been significantlyimproved in terms of recognition efficiency.
Keywords/Search Tags:cloud computing, P2P, traffic identification, System
PDF Full Text Request
Related items