English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 113648/144635 (79%)
Visitors : 51573931      Online Users : 926
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/113865


    Title: 以封包內含為基礎的P2P訊務監測系統
    Authors: 楊素秋
    曾黎明
    Keywords: 文字分類;P2P訊務監測
    text classifier
    Date: 2006
    Issue Date: 2017-10-19 10:29:10 (UTC+8)
    Abstract: 隨著寬頻Internet網路的普及電腦硬碟容量的大幅提升,網路用戶很自然地藉由高效率的分散式P2P檔案軟體與廣大的網路用戶並行地交換他們喜愛,受到著作權保護的整張VCD或DVD的影片或歌曲,致造成Internet訊務的嚴重失衡:少數P2P用戶的訊務耗盡連線頻寬,影響大部分使用者的權益,及帶來頻繁的網路著作侵權抱怨。本研究實做以封包內含為基礎的P2P訊務監測系統,運用switch router的monitor功能,監聽網路主幹轉送的封包內容,追蹤明顯的BitTorrent, GUNTELLA, eMule/eDonkey P2P應用的多項特徵,統計Top-N P2P大戶的訊務量及辨識其使用的應用軟體。該系統已成功地架設於TANet區網中心,協助管理者監看/發現P2P大戶的主機IP, port number,使用的P2P種類甚至制定適當管理策略,適度限頻超量的P2P傳訊流,維持網路運作效能及改善著作侵權的問題。
    P2P technology not only removes central control of such resources as communication, computation, file storage and retrieval, current P2P applications also have the ability to use arbitrary ports to camouflage their existence. The participants in the system thus could easily hide personal identifying information easily. As most of the P2P traffic can not be classified by simply looking at the IP packet headers, and the deep inspection of packet payload of layer-7 patterns was usually employed for P2P traffic measurement. This work makes use of the packet payload snooped from a Gigabit Ethernet link over the backbone router to develop P2P traffic measurement that measures and identify the P2P traffic according to the signaling word of the prevalent P2P applications. The system has been deployed in one regional network center over a TANet network center for assisting network users grasping the Top-N P2P delivering hosts and the P2P application they used.
    Relation: TANET 2006 台灣網際網路研討會論文集
    網路規劃建置與管理營運
    Data Type: conference
    Appears in Collections:[TANET 台灣網際網路研討會] 會議論文

    Files in This Item:

    File Description SizeFormat
    615.pdf1054KbAdobe PDF2388View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback