- 3
- 0
- 约2.62万字
- 约 10页
- 2016-12-29 发布于贵州
- 举报
南京邮电大学通达学院
毕业设计(论文)外文资料翻译
学 院 通达学院 专 业 学生姓名 班级学号 外文出处 Thomas Karagiannis, Andre Broido, Michalis Faloutsos, and Kimberly C. Claffy October 2004
附件:1.外文资料翻译译文;2.外文原文
指导教师评价:
1.翻译内容与课题的结合度: □ 优 □ 良 □ 中 □ 差
2.翻译内容的准确、流畅: □ 优 □ 良 □ 中 □ 差
3.专业词汇翻译的准确性: □ 优 □ 良 □ 中 □ 差
4.翻译字符数是否符合规定要求:□ 符合 □ 不符合
指导教师签名:
年月日Transport Layer Identification of P2P Traffic
ABSTRACT
Since the emergence of peer-to-peer (P2P) networking in the late 90s, P2P applications have multiplied, evolved and established themselves as the leading `growth app of Internet traffic workload. In contrast to first-generation P2P networks which used well-defined port numbers, current P2P applications have the ability to disguise their existence through the use of arbitrary ports. As a result, reliable estimates of P2P traffic require examination of packet payload, a methodological landmine from legal, privacy, technical, logistic, and fiscal perspectives. Indeed, access to user payload is often rendered impossible by one of these factors, inhibiting trustworthy estimation of P2P traffic growth and dynamics. In this paper, we develop a systematic methodology to identify P2P flows at the transport layer, i.e., based on connection
patterns of P2P networks, and without relying on packet payload. We believe our approach is the first method for characterizing P2P traffic using only knowledge of network dynamics rather than any user payload. To evaluate our methodology, we also develop a payload technique for P2P traffic identification, by reverse engineering and analyzing the nine most popular P2P protocols, and demonstrate its efficacy with the discovery of P2P protocols in our traces that were previously unknown to us. Finally, our results indicate that P2P traffic continues to grow unabatedly, contrary to reports in the popular media.
1. INTRODUCTION
Over the last few years, peer-to-peer (P
原创力文档

文档评论(0)