期刊文献+

基于ABV的BT流量识别与分类

Identification and classification of BT traffic based on ABV
下载PDF
导出
摘要 基于P2P技术的BT应用为人们提供了高效率的网络传输,同时这些应用也消耗了大量的网络带宽。从网络运营的层面来看,要保障网络的正常运行,需要有效地管理和控制不同类别的网络流量,并分配各种网络应用合理的带宽,特别要保证关键业务所需的带宽不会受到BT应用的影响。基于ABV算法提出了一种高效率的BT流量识别与分类方法,通过BT报文的内容分析,正确地识别和分类BT流量,进而可以根据约定的控制规则实现对BT流量的有效控制。通过实验验证了这种BT流量识别和分类方法的有效性和正确性。 While BT applications which are based on P2P technology providing people with efficient transmission, these applications consume massive bandwidth of network. From the view of network operation, to ensure the ordinary operation of network, the efficient management and control on various network traffics are necessary. And different network application is allocated with reasonable bandwidth, especially the bandwidth of key businesses is guaranteed without any disturbance from BT. A method that can identify and classify the BT traffic efficiently is proposed. With the content analysis of BT message, the BT traffic is correctly identified and classified. And further control on the BT traffic is done by arranged control rules. The experimental results show the efficiency and correctness of this method.
出处 《计算机工程与设计》 CSCD 北大核心 2008年第3期629-632,共4页 Computer Engineering and Design
关键词 流量识别 流量分类 BITTORRENT协议 聚集比特向量算法 点对点 traffic identification traffic classification BitTorrentprotocol aggregate bit vector P2P
  • 相关文献

参考文献8

二级参考文献9

  • 1[1]Gupta P, McKeown N. Algorithms for Packet Classification. IEEE Network March/April, 2001
  • 2[2]Gupta P, McKeown N. Packet Classifcation Using Hierarchical Intelligent Cuttings. In Proc. Hot Interconnects VII, 1999-08
  • 3[3]Thedi, Kazi F D, Nijhawan G. Advances in Packet Classification.http://www.cse.unsw.edu.au/~cs9333/m ini-con f/repg 12tl2.pdf
  • 4[4]Lakshman T V, Stidialis D. High Speed Policy-based Packet Forwarding Using Efficient Multi-dimensional Range Matching. In Proc.ACM Sigcomm 98, 1998-09
  • 5Woo T Y C,Proc IEEE INFOCOM 2000,2000年,1210页
  • 6Gupta P,ACM Computer Review,1999年,29卷,4期,146页
  • 7White paper Caspian&Cachelogic _P2P, http://www.caspiannetworks.corn/files/CaspianCacheLogic_P2P.pdf.
  • 8Yeager W, Williams J. Secure peer to peer networking: the JXTA example. IT Pro, 2002,4(2) :53-57.
  • 9徐恪,熊勇强,吴建平.宽带IP路由器的体系结构分析[J].软件学报,2000,11(2):179-186. 被引量:47

共引文献61

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部