Currently, in order to BitTorrent (hereinafter referred to as BT) on behalf of the P2P download software for the traffic takes up a lot of bandwidth, broadband access, according to statistics more than 50%. This shared bandwidth Ethernet access and other broadband access method presents a great challenge, a large number of access layer switch port to long-term work online speed state, has seriously affected the users normal Web, E-mail and video on demand services. Therefore, operators, business users and users of education and other industries have to restrict such traffic requirements. In this paper, BT, for example, describes the control of P2P traffic in general and to download special method.
BT carried out?
BT and the traditional way to download the biggest difference is the full play to the characteristics of Internet hosts on the other, that each run the TCP / IP stack can be equal to the host (end) to receive or initiate a request, please visit. Although as NAT, firewall and other technology to the public, the whole network (Internet) end of the era has passed, but there are still many hosts still have Interenet end to end capability, in addition, even in the isolated campus network by the firewall, enterprises within the network, the hosts also have end to end environment.
The traditional way is to download the C / S model, or centralized model, that all the host files were downloaded from the server, the host is not available for download, while the server is usually available for download.
The BT download mechanism to download only the host, but also to provide download services, while the server is available for download on the host and the file directory information, as shown in Figure 2. The choice of the host content download some hash features, which often involved downloading the hosts have not yet downloaded the content of other hosts, which can provide download services to other hosts. In this mechanism, the host can be simultaneously downloaded from multiple locations, so download speeds can be increased significantly.
What role BT server?
BT's server provides unified management released, BT client needs to connect to the server to download to get involved in a host of other nodes. In fact, this limit BT traffic for us to provide a simple and feasible means.
BT's. Torrent file includes the server address, file name, directory name, file length and other information, BT client software in the analysis. Torrent file, download the request to the server, the requested URL, including its own port information , download progress and status information.
BT server uses the track program to manage the download request, De Dao 鍚?URL will look for the list to locate corresponding documents to download the hosts. Clients can download, at the same time, if the client has the ability to accept connection requests, track program will host information is also added to the list so that other hosts to find the host and to download.
As the P2P clients can specify their own are often used to provide a download / upload ports, so the traditional way of blocking the port is difficult to work.
How to control the P2P traffic?
Using QoS
Objectively speaking, P2P technology is very suitable for Internet structure, the ability to network resources to maximize the use of a mechanism, in many cases, P2P network infrastructure resources can be saved, for example, a broadband access network, if there are 100 users outside the network to download the same file, the traditional way is to go through the same flow rate of 100 times the export operator. Unless operators or distributed caching service. In BT mode, the flow through the export of a significant decrease because intranet users can download each other. And P2P applications have become a trend, it is difficult to stop blocking P2P alone development.
However, due to the superiority of the mechanism, P2P is inevitable at this stage this model will impact the traditional application, affect the normal business flow.
Therefore, a reasonable starting point is the use of QoS mechanisms to guarantee the normal operation of the business case, allowing users to use P2P application.
More difficulties in this way, the first is how to define the normal business flow, how to plan the bandwidth.
This stage, voice, video traffic, corporate users of e-commerce transactions flows, as well as broadband access users of Web traffic, E-mail and instant messaging traffic flow can be included in the normal course of business, is divided into different priority. Since then, operators can use the user and application development, modification and optimization of QoS configuration.
For this approach, from the traffic analysis point of view, the existing MRTG and other SNMP-based traffic detection methods have been difficult to meet the requirements. To this end, poly Health Science and Technology developed the real-time bandwidth control technology, which directly analyze the data packet transmission communication protocol used, and directly block the agreement signature. P2P transfer tools for a variety of different protocol signature, which can analyze the specific P2P tool that is a normal transmission used in the business (voice, e-commerce transactions flows), or used by non-normal business needs (eg BT to download movies, music), which can provide real-time according to business types differentiate traffic reports, and control.
Control P2P download 1
Control P2P download 2
Port and bandwidth constraints
In the gateway, firewall, port blocking on the most common practice is the current, lower cost, but the results are often unsatisfactory. Applications such as BT to allow users to modify the download, upload port, and therefore be placed on transfer port can be easily bypassed, but as noted, if the limit is usually not modified the tracker port (usually 6969) is relatively easier to achieve purpose.
In the conventional method to be ineffective, you can use the bandwidth limitations of the method to control the BT traffic.
Figure 1 set the bandwidth of the LAN host
Figure 2: Set the LAN host traffic
P2P traffic control for the long term QoS and network traffic by sensing technology (eg, Network Identification Code on the P2P protocol) combination, to achieve intelligent control of the business transparent. From the present perspective, QoS and network traffic has a certain perception may have been implemented, but no effective mechanism for integration. In addition, the use of ports and other infrastructure constraints and bandwidth constraints means, to a certain extent, inhibition of BT traffic.
相关链接:
Magic Video Capture/Convert/Burn Studio
Mp4 To Wmv Converter Free
Christmas-Idea XBox PS2 PS3 Converter
Beautiful images grabbed
Digital RA AMR to AAC Player
video converter
Recommend Newsgroup Clients
Liang Wang: Whitman's China Troubles
Youtube Video Backup + Player Pro
EASY Kids Education
Compare Accounting And Finance
Christmasgift DVD to M4V
The brilliant idea to computer speed Do not waste your big memory
M4v File
Value DVD to Zune Converter
ts format
No comments:
Post a Comment