期刊文献+

P2P业务流量识别与系统部署方案研究 被引量:3

Research on P2P Traffic Identification and System Deployment Solution
在线阅读 下载PDF
导出
摘要 在研究总结P2P业务流量识别最新技术的基础上,从部署原则、系统架构方案、网络架构方案等方面着重阐述了运营商部署P2P业务的具体方案,为进一步研究P2P流量控制策略和实际开展P2P业务提供了借鉴和技术支持。 Based on the newest P2P traffic identification technology, it expounds the specific solution on carriers' P2P service from deployment principle, system architecture solution and network architecture solution, to provide reference and support for further researching P2P traffic volume control strategy and deploying P2P service.
作者 张强
机构地区 河南省公安厅
出处 《邮电设计技术》 2009年第6期40-43,共4页 Designing Techniques of Posts and Telecommunications
关键词 P2P 流媒体 业务部署 P2P Stream media Service deployment
  • 相关文献

参考文献6

  • 1P2PWG Security Working [ EB/OL ]. [ 2008-03-27 ]. http://www.peerto-peerwg.org/tech/security/index.ht ml.
  • 2罗杰文.Peer-to-peer综述[EB/OL].http://www.huihoo.com/p2p/1.
  • 3周世杰,秦志光,吴春江.对等网络流量检测技术研究[J].中兴通讯技术,2007,13(5):14-18. 被引量:10
  • 4Subhabrata Sen, Oliver Spatscheck, Dongmei Wang. Accurate,Scalable In-Network Identification of P2P Traffic Using Application Signatures [ C ]. In Proceeding of the 13th International Conference on World Wide Web, New York, 2004.
  • 5Holger Bleul,Erwin P.Rathgeb. A Simple,Efficient and Flexible Approach to Measure Multi-protocol Peer-to-Peer Traffic. Lecture Notes in Computer Science, 2005 : 606-616.
  • 6李江涛,姜永玲.P2P流量识别与管理技术[J].电信科学,2005,21(3):57-61. 被引量:43

二级参考文献12

  • 1White paper Caspian&Cachelogic _P2P, http://www.caspiannetworks.corn/files/CaspianCacheLogic_P2P.pdf.
  • 2Yeager W, Williams J. Secure peer to peer networking: the JXTA example. IT Pro, 2002,4(2) :53-57.
  • 3CONSTANTINOU F,MAVROMMATIS P.Identifying known and unknown peer-to-peer traffic. Proceedings of FifthIEEE International Symposium on Network Computing and Applications Jul24-26,2006 . 2006
  • 4KARAGIANNIS T,BROIDO A,FALOUTSOS M,et al.Transport layer identification of P2P traffic. Proceedings of the4th ACM SIGCOMM Conference on Internet Measurement Oct25-27,2004 . 2004
  • 5HORNG Mong-Fong,CHEN Chun-Wei,Chuang Chin-Shun,et al.Identification and analysis of P2P traffic-an example of bit torrent[].Proceedings of International Conference on Innovative ComputingInformation and Control(ICICICAug-Sep).2006
  • 6ZHOU Lijuan,LI Zhitong,LIU Bin.P2P traffic identification by TCP flow analysis[].Proceedings of International Workshop on NetworkingArchitectureand StoragesSep.2006
  • 7SUH K,FIGUEIREDO D R,KUROSE J,et al.Characterizing and detecting skype-relayed traffic[].Proceedings of IEEE Conference on Computer Communications(INFOCOM)Apr.2006
  • 8SEN S,SPATSCHECKO,WANG Dongmei.Accurate,scalable in-network identification of P2P traffic using application signatures. Proceedings of the13th International Conference on World Wide Web,May17-20,2004 . 2004
  • 9WANG Rui,LIU Yang,YANG Yuexiang,et al.Solving the app-level classification problem of P2P traffic via optimized support vector machines. Proceedings of Sixth International Conference on Intelligent Systems Design and Applications(ISDA‘06):Oct16-18,2006 . 2006
  • 10Cisco Systems Inc.NetFlow services solutions guide. http:∥www.cisco.com . 2007

共引文献57

同被引文献9

引证文献3

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部