• 藍色版面
  • 綠色版面
  • 橘色版面
  • 粉紅色版面
  • 棕色版面
帳號:guest(120.119.126.29)          離開系統
字體大小: 字級放大   字級縮小   預設字形  

詳目顯示

研究生: 陳峻偉
研究生(外文): Chun-Wei Chen
論文名稱: P2P流量偵測與分析技術-以BitTorrent為例
論文名稱(外文): Identification and Analysis of P2P traffic- An example of BitTorrent
指導教授: 洪盟峰
指導教授(外文): Mong-Fong Horng
學位類別: 碩士
校院名稱: 樹德科技大學
系所名稱: 資訊工程學系
論文出版年: 2006
畢業學年度: 94
語文別: 中文
論文頁數: 56
中文關鍵詞: 點對點傳輸技術流量偵測流量分析網際網路
外文關鍵詞: P2PBitTorrent
相關次數:
  • 被引用:0
  • 點閱:39
  • 評分:*****
  • 下載:0
  • 書目收藏:0
點對點(Peer-to-Peer Communication,P2P)網路服務與主從架構(Client-Server Model)最大的不同在於,點對點網路服務可以提供群組成員間,直接地、相等地進行資料傳輸或資訊服務,目前此技術被廣泛的應用在各個領域中,然而卻因P2P的盛行,網際網路上產生了大量的交換音樂及電影的訊息,使得現有網際網路頻寬不足的問題顯現,為了能有效的使用頻寬,本論文將研究點對點網路服務、流量偵測與分析技術,使點對點服務的流量可以快速且有效地識別,以便提供未來流量管理機制構建參數。並以BitTorrent這個知名點對點服務做研究實例說明,流量偵測的程序與方法,包括特徵分析、封包擷取與分析以及流量計算,最後並以程式加以實作,來驗證上述方法的可行性、有效性與準確性,結果顯示,上述方法確實可以有效地偵測、分析BitTorrent流量,也為日後的流量管理機制建立了良好的基礎。
A payload-analysis approach to identification and measurement of peer-to-peer (P2P) network services is proposed. The proposed approach effectively and efficiently identifies the complicated traffic caused by P2P network services. The feature extraction, payload analysis and dynamic measurement are the three pillars of the proposed approach. The dynamics of BT connections are featured to generalize the packet-capture criteria. Followed up, a payload analysis of captured packets is used to identify and measure the traffic. The implementation of the proposed scheme has been realized on a Pentium-III computer. The results shows the effectiveness of the proposed scheme and the efficient measurement of the traffic parameters, such as peer IPs, port numbers, data rates, etc. The parameter measurement facilitates this possible bandwidth management of P2P traffic in the near future.
一、  簡介  1
二、  相關研究及技術  3
2.1 P2P技術  3
2.1.1 Napster  5
2.1.2 Gnutella  8
2.1.3 BitTorrent  12
2.1.4 Skype  17
2.2 流量分析  21
2.2.1 OSI模型架構與TCP/IP模型架構  21
2.2.2特性識別  28
三、  BITTORRENT流量偵測方法  34
3.1驗證BITTORRENT訊息傳遞及封包內容分析  34
3.2流量偵測  37
3.3 流量偵測程式設計  37
四、  實驗結果分析  47
五、  結論  52
參考文獻:  53
附件1  55
[1]BitTorrent,http://www.bittorrent.com/, available from 07/20/2006
[2]Napster,http://www.napster.com/,available from 07/20/2006
[3]edonkey,http://www.edonkey2000.com/,available from 07/20/2006
[4]emule,http://www.emule.org/,available from 07/20/2006
[5]MSN,http://www.msn.com.tw/,available from 07/20/2006
[6]Skype,http://www.skype.com/products/explained.html,available from 07/20/2006
[7]ICQ,http://www.icq.com/,available from 07/20/2006
[8]GPU,http://gpu.sourceforge.net/,available from 07/20/2006
[9]劉怡玟,點對點檔案分享軟體使用行為之研究,2004;國立中山大學傳播管理研究所碩士論文
[10]MRTG,http://oss.oetiker.ch/mrtg/,available from 07/20/2006
[11]Ethereal,http://www.ethereal.com/,available from 07/20/2006
[12]Steve Crocker, ”Host Software,”RFC0001, Apr. 1969.
[13]Guntella,http://www.gnutella.com/,available from 07/20/2006
[14]賴俊廷,P2P 軟體對網路影響之研究,2005;國立交通大學資訊工程學系碩士論文
[15]Stefan Saroiu, P. Krishna Gummadi, Steven D. Gribble, “A Measurement Study of Peer-to-Peer File Sharing Systems,” Proc. In Proceedings of Multimedia Computing and Networking 2002 (MMCN '02), January 2002.
[16]Napster protocol specification,http://opennap. sourceforge.net/napster.txt,available from 07/20/2006
[17]Siu Man Lui and Sai Ho Kwok ,” Interoperability of peer-to-peer file sharing protocols,” Proc. of  ACM SIGecom Exchanges, Summer 2002, pp. 25-33.
[18]The Gnutella Protocol Specification v0.4,http://www9.limewire.com/developer/gnutella_protocol_0.4.pdf,available from 07/20/2006
[19]Matei Ripeanu, Adriana Iamnitchi and  Ian Foster, “Mapping the Gnutella network,” Proc. of Internet Computing on IEEE, Jan/Feb 2002.
[20]Bram Cohen, “Incentives Build Robustness in BitTorrent,” Proc. of Workshop on Economics of Peer-to-Peer Systems, Jun. 2003.
[21]Bittorrent Protocol Specification v1.0,http://wiki.theory.org/BitTorrentSpecification,available from 07/20/2006
[22]Petar Maymounkov and David Mazieres, “Kademlia: A Peer-to-peer Information System Based on the XOR Metric,” Proc. of 1st International Workshop on Peer-to-Peer Systems (IPTPS'02), 2002.
[23]KaZaa,http://www.kazaa.com/,available from 07/20/2006
[24]智邦,http://www.acctran.com.tw/,available from 07/20/2006
[25]Salman A. Baset and Henning Schulzrinne ,“An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol,” Proc. of Technical Report CUCS-039-04, Sep 2004.
[26]ISO,http://www.iso.org/iso/en/ISOOnline.frontpage,available from 07/20/2006
[27]Zimmermann, H. , “OSI Reference Model-The ISO Model of Architecture for Open Systems Interconnection,” Communications, Proc. of IEEE Trans. Commun. COM-28 (Apr.), 425-432., Apr 1980
[28]J. Postel, J. Reynolds.,”FILE TRANSFER PROTOCOL (FTP),” RFC0959, Oct-1985
[29]R. Braden,” Requirements for Internet Hosts -- Communication Layers,” RFC1122,Oct- 1989
[30]T. Socolofsky and C. Kale,"A TCP/IP tutorial," RFC 1180, Jan 1991.
[31]Thomas Karagiannis, Andre Broido, Michalis Faloutsos and Kc claffy, ”Transport Layer Identification of P2P Traffic,”Proc. of Internet Measurement Conference, Oct. 2004.
[32]Subhabrata Sen, Oliver Spatscheck and Dongmei Wang, ”Accurate, Scalable In¬Network Identification of P2P Traffic Using Application Signatures ,”Proc. of 13th international conference on WWW, May 2004.
[33]bitcomet,http://www.bitcomet.com/,available from 07/20/2006
[34]Raw Packet Sniffer,http://www.pscode.com/vb/scripts/ShowCode.asp?txtCodeId=46567&lngWId=1,available from 07/20/2006
[35]RamDisk,http://home.tiscali.be/ir006712/RAMDisk/ramdriv.htm,available from 07/20/2006
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關期刊
 
* *