To see the other types of publications on this topic, follow the link: P2P traffic.

Dissertations / Theses on the topic 'P2P traffic'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 41 dissertations / theses for your research on the topic 'P2P traffic.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Zhang, Xu. "Cross-layer P2P traffic engineering in content-based networks." Thesis, University of Surrey, 2015. http://epubs.surrey.ac.uk/807619/.

Full text
Abstract:
Peer-to-peer (P2P) content sharing applications account for a significant fraction of the traffic volumes and is expected to increase [1]. Data is distributed to a large population of end client peers from end source peers in P2P systems, without the need for big investments to deploy servers. The costs of the content distribution are thus shared among end users and Internet service providers (ISPs). Consequently, negative impacts, such as increased inter-ISP traffic in particular, have become critical issues that need to be kept low, due to that most popular P2P protocols are not designed to
APA, Harvard, Vancouver, ISO, and other styles
2

Wang, Chaojiong. "Controlling P2P traffic in cooperative and non-cooperative network environments." Thesis, University of Surrey, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.549476.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Březina, Matej. "Detekce P2P sítí." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2008. http://www.nusl.cz/ntk/nusl-236012.

Full text
Abstract:
This document deals with design, implementation and testing of software system for detecting p2p (peer-to-peer) networks based on combination of BPF prefiltering and POSIX regular expressions packet payload matching with known p2p protocol communications. The proposed detection system includes a database with some rules of most effuse p2p protocols in format resembling to definitions for L7-filter classifier. The application is implemented in C, runs in userspace and is targeted to all POSIX compatible platforms. The combination of detector with user attached QoS controlling is complete soluti
APA, Harvard, Vancouver, ISO, and other styles
4

Ilie, Dragos. "Gnutella Network Traffic : Measurements and Characteristics." Licentiate thesis, Karlskrona : Department of Telecommunication Systems, School of Engineering, Blekinge Institute of Technology, 2006. http://www.bth.se/fou/Forskinfo.nsf/allfirst2/7790f6689ef361b0c12571490034a530?OpenDocument.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Soysal, Murat. "A Novel Method For The Detection Of P2p Traffic In The Network Backbone Inspired By Intrusion Detection Systems." Master's thesis, METU, 2006. http://etd.lib.metu.edu.tr/upload/3/12607315/index.pdf.

Full text
Abstract:
The share of peer-to-peer (P2P) protocol in the total network traffic grows dayby- day in the Turkish Academic Network (UlakNet) similar to the other networks in the world. This growth is mostly because of the popularity of the shared content and the great enhancement in the P2P protocol since it first came out with Napster. The shared files are generally both large and copyrighted. Motivated by the problems of UlakNet with the P2P traffic, we propose a novel method for P2P traffic detection in the network backbone in this thesis. Observing the similarity between detecting traffic that belongs
APA, Harvard, Vancouver, ISO, and other styles
6

Silverston, Thomas. "Peer-to-Peer video live streaming : measurement experiments and traffic analysis." Paris 6, 2009. http://www.theses.fr/2009PA066303.

Full text
Abstract:
L'Internet est en train de connaître l'un de ses plus importants bouleversements en termes de distribution de contenu depuis qu'il est utilisé comme support de diffusion : les utilisateurs jusqu'alors passifs récepteurs de contenu deviennent producteurs de contenus. Suite à ce changement, l'architecture de diffusion de contenu de l'Internet évolue également passant du modèle classique client/serveur au modèle pair-à-pair (P2P). Pour les nouveaux services de diffusion de contenu qui visent un grand nombre de récepteurs sur l'Internet, il y a des inquiétudes concernant leur aptitude à transmettr
APA, Harvard, Vancouver, ISO, and other styles
7

Li, Ying. "Interest management scheme and prediction model in intelligent transportation systems." Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/45856.

Full text
Abstract:
This thesis focuses on two important problems related to DDDAS: interest management (data distribution) and prediction models. In order to reduce communication overhead, we propose a new interest management mechanism for mobile peer-to-peer systems. This approach involves dividing the entire space into cells and using an efficient sorting algorithm to sort the regions in each cell. A mobile landmarking scheme is introduced to implement this sort-based scheme in mobile peer-to-peer systems. The design does not require a centralized server, but rather, every peer can become a mobile landmark nod
APA, Harvard, Vancouver, ISO, and other styles
8

Saddi, Oualid. "La métrologie dans les réseaux p2p." Paris 6, 2007. https://tel.archives-ouvertes.fr/tel-00803195.

Full text
Abstract:
Cette thèse s'inscrit dans le domaine de la métrologie du trafic Internet. Nous portons dans notre étude un intérêt particulier au trafic peer-to-peer (p2p) et plus précisément le trafic eDonkey, principale composante du trafic dans les réseaux de France Telecom. Nous avons analysé les différentes méthodes d'identification du trafic p2p afin d'extraire cette importante composante du trafic. Après avoir obtenu une proportion de trafic jugée représentative de l'échantillon de la population eDonkey étudiée, nous avons étudié les caractéristiques en termes de trafic de cette composante p2p en util
APA, Harvard, Vancouver, ISO, and other styles
9

Valenti, Silvio. "La gestion du trafic P2P dans les réseaux modernes : mesure, identification et contrôle." Phd thesis, Paris, Télécom ParisTech, 2011. https://pastel.hal.science/pastel-00645263.

Full text
Abstract:
Suite à la diffusion des applications P2P et en particulier du video P2P, le trafic P2P représente déjà une portion importante de la totalité du trafic sur Internet. Dans ce contexte cette thèse propose des nouveaux outils pour mesurer, identifier et contrôler le trafic P2P. Concernant la classification de trafic, vue l'inefficacité des techniques traditionnelles, nous proposons un nouveau classificateur comportemental, Abacus, spécifique pour les appllications P2P-TV. Nos expériences prouvent que Abacus, bien qu'iI soit basé sur la simple mesure du numéro des paquets et octets échanges par un
APA, Harvard, Vancouver, ISO, and other styles
10

Valenti, Silvio. "La gestion du trafic P2P dans les réseaux modernes : mesure, identification et contrôle." Phd thesis, Télécom ParisTech, 2011. http://pastel.archives-ouvertes.fr/pastel-00645263.

Full text
Abstract:
Suite à la diffusion des applications P2P et en particulier du video P2P, le trafic P2P représente déjà une portion importante de la totalité du trafic sur Internet. Dans ce contexte cette thèse propose des nouveaux outils pour mesurer, identifier et contrôler le trafic P2P. Concernant la classification de trafic, vue l'inefficacité des techniques traditionnelles, nous proposons un nouveau classificateur comportemental, Abacus, spécifique pour les applications P2P-TV. Nos expériences prouvent que Abacus, bien qu'il soit basé sur la simple mesure du numéro des paquets et octets échanges par un
APA, Harvard, Vancouver, ISO, and other styles
11

Hatahet, Sinan. "La Security in unstructured P2P networks." Compiègne, 2011. http://www.theses.fr/2011COMP1935.

Full text
Abstract:
Les réseaux P2P représentent aujourd’hui une partie considérable des échanges sur Internet, principalement parce qu’ils offrent aux utilisateurs du monde entier un moyen rapide et efficace pour partager des ressources. Les réseaux P2P offrent plusieurs avantages tels qu’un meilleur passage à l’échelle et une meilleure résistance aux pannes et par conséquent un meilleur rendement et une meilleure qualité de service. Ces apports ont largement favorisés l’apparition de nouvelles applications qui offrent des services divers et variés. Cependant, les réseaux P2P sont vulnérables à certaines attaque
APA, Harvard, Vancouver, ISO, and other styles
12

Ciccolini, Jimmy. "Sviluppo di soluzioni per il bilanciamento del traffico di rete su sistemi p2p con indicizzazione distribuita dei dati." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/3508/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Pougnet, Johan. "Régulation du trafic des récepteurs AMPA et de la plasticité synaptique induite par les récepteurs P2X." Thesis, Bordeaux 2, 2013. http://www.theses.fr/2013BOR22062/document.

Full text
Abstract:
Les récepteurs ionotropiques AMPA (AMPAR) activés par le glutamate sont les principaux acteurs de la transmission synaptique excitatrice rapide du cerveau. Ils jouent également un rôle crucial dans les processus de plasticité synaptique, reconnus pour être à la base des fonctions cognitives. Les récepteurs canaux P2X sont activés par l'adénosine-5'-triphosphate (ATP) extracellulaire libéré par les neurones ou les cellules gliales. Ils sont exprimés dans le cerveau en périphérie des synapses glutamatergiques, où ils participent à l’excitabilité neuronale et modulent la transmission synaptique a
APA, Harvard, Vancouver, ISO, and other styles
14

Nulkar, Hrishikesh. "Simulation and evaluation of pap a new routing architecture for differentiated services domains handling "expedite forwarding" traffic class /." [Gainesville, Fla.] : University of Florida, 2004. http://purl.fcla.edu/fcla/etd/UFE0004892.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Ellouze, Selim. "Mécanismes de collaboration entre réseaux et services applicatifs pour l'optimisation des ressources et des services." Thesis, Rennes 1, 2013. http://www.theses.fr/2013REN1S050/document.

Full text
Abstract:
Dans cette nouvelle ère du numérique, l'accès à l'information est entré désormais dans une autre dimension. Nous assistons à la dominance d'un modèle fondé sur les opportunités offertes par un accès mondialisé à l'Internet et à son application phare : le "World Wide Web". Les services se sont multipliés. Les terminaux se sont diversifiés. Les technologies de transport se sont améliorées. Les attentes se sont élevées. Dans cette spirale que nous nous abstenons de qualifier, les opérateurs se trouvent désormais confrontés à une croissance soutenue du trafic dans leurs réseaux, en grande partie d
APA, Harvard, Vancouver, ISO, and other styles
16

Yousef, Hiba. "Adaptive streaming using Peer-to-Peer and HTTP." Electronic Thesis or Diss., Institut polytechnique de Paris, 2021. http://www.theses.fr/2021IPPAT017.

Full text
Abstract:
La croissance du trafic vidéo liée à l’offre et au nombre d'utilisateurs, ainsi que les progrès des technologies vidéo et des appareils, ont augmenté les attentes des utilisateurs en termes de Qualité d'Expérience (QoE). Aujourd'hui, le trafic vidéo représente 79% du trafic Internet mondial, et ce pourcentage devrait atteindre 82% d'ici 2022 avec les services Over The Top (OTT) qui représentent plus de 50% du trafic de téléchargement de pointe dans le monde. Les solutions HTTP Adaptive Streaming (HAS) se sont révélées être l'une des techniques essentielles pour faire face à ce trafic vidéo en
APA, Harvard, Vancouver, ISO, and other styles
17

Bermolen, Paola. "Modèles probabilistes et statistiques pour la conception et l'analyse des systèmes de communications." Phd thesis, Télécom ParisTech, 2010. http://pastel.archives-ouvertes.fr/pastel-00005853.

Full text
Abstract:
Dans cette thèse nous abordons deux problématiques différentes : la prédiction et la classification de trafic et les mécanismes d'accès dans les réseaux MANETs. Dans la première partie de la thèse, nous abordons le problème de la prédiction et la classification du trafic. Sur la base des observations du passé et sans considérer aucun modèle en particulier, nous analysons le problème de la prédiction en ligne de la charge sur un lien. Concernant la classification du trafic, nous nous concentrons principalement sur des applications P2P, et particulièrement la télévision P2P (P2P-TV). Dans les de
APA, Harvard, Vancouver, ISO, and other styles
18

L'Ériger, Karine. "Régulation transcriptionnelle du récepteur P2X[indice inférieur 7] et son rôle dans le trafic membranaire du transporteur à glucose Glut2 dans les cellules épithéliales intestinales." Mémoire, Université de Sherbrooke, 2009. http://savoirs.usherbrooke.ca/handle/11143/4034.

Full text
Abstract:
Le récepteur ionotropique P2X[indice inférieur 7] (P2X[indice inférieur 7]R) est impliqué dans divers rôles physiologiques tels la prolifération, l'apoptose, la réponse inflammatoire et le trafic membranaire dans plusieurs types cellulaires. Cependant, peu est connu quant aux rôles physiologiques du P2X[indice inférieur 7]R dans les cellules épithéliales intestinales (CEIs). Dans la littérature scientifique, le P2X[indice inférieur 7]R est connu pour activer la protéine kinase Dl (PKD1/PKC[mu]) qui est impliquée dans le transport des protéines membranaires. Comme l'un des rôles physiologiques
APA, Harvard, Vancouver, ISO, and other styles
19

Smaili, Samia. "Modélisation et commande d'un système de trafic multimodal." Phd thesis, Université d'Evry-Val d'Essonne, 2012. http://tel.archives-ouvertes.fr/tel-00684018.

Full text
Abstract:
Le trafic routier englobe plusieurs facteurs, entre autres la géométrie des infrastructures routières, le comportement des conducteurs, la diversité des flux de véhicules, etc... Les situations auxquelles sont confrontés les exploitants des réseaux routiers dépendent du type de réseau dont ils ont la charge. Cette complexité du trafic en a fait un domaine de recherche d'un intérêt croissant et ce depuis les premières études qui ont donné naissance au modèle LWR au milieu des années cinquante. Afin de modéliser le trafic sur un réseau routier, deux approches, complémentaires l'une de l'autre so
APA, Harvard, Vancouver, ISO, and other styles
20

Mahrík, Tomáš. "Využití technologií google maps a GPS pro dopravní informace." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2011. http://www.nusl.cz/ntk/nusl-219055.

Full text
Abstract:
The aim of this master's thesis is design and implementation of traffic information system called Traffic Info. Its role is to provide actual traffic information (for example car accidents, traffic restrictions, reconstruction works on routes etc.) in the area of Slovak and Czech Republic. The system Traffic Info contains a web portal with database of traffic information and a client mobile application for Android platform. This solution provides access to actual traffic information in real time. The geolocation data from internal GPS module of mobile device is used to specify the exact releva
APA, Harvard, Vancouver, ISO, and other styles
21

Leontescu, Mihai, and Egija Svilane. "Incentive mechanisms for large Public-Private Partnerships : Empirical evidence from SESAR." Thesis, Högskolan i Jönköping, Internationella Handelshögskolan, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-18522.

Full text
Abstract:
The purpose of our thesis is to investigate the incentive mechanisms that may be used for a timely and successful implementation of Public-Private Partnership (PPP) projects. This purpose is achieved by investigating challenges and success factors within one of the largest Public-Private Partnership projects in Europe, the SESAR programme which stands for Single European Sky ATM Research and that aims at modernising the European air traffic management (ATM) system. The categories of SESAR actors that we investigated include: stakeholders (airspace users such as Air France, KLM, SAS; ANSPs from
APA, Harvard, Vancouver, ISO, and other styles
22

Deng, LiZhong, and 鄧立忠. "P2P Botnet Traffic Analysis and Identification." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/12410425287795271638.

Full text
Abstract:
碩士<br>國立新竹教育大學<br>資訊科學研究所<br>99<br>The Internet has become an indispensable part of the human life and it provides us with convenient services, for example, searching for information, using auction website, playing online game, and so on. Due to its convenience, hackers are trying to commit crimes to obtain some benefits. Therefore, network security has become a important issue of research area today. Usually, crackers use a variety of methods to achieve the purpose of attacks, for example, Distributed Denial of Service (DDOS) and spam mail. These methods require a large number of compute
APA, Harvard, Vancouver, ISO, and other styles
23

Yang, Yu-Si, and 楊敔晞. "Identify Encrypted P2P Traffic Using Edge." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/74241889165303782906.

Full text
Abstract:
碩士<br>逢甲大學<br>資訊工程學系<br>103<br>With the development of network technology, a large number of P2P applications are widely used. Thus, it is important for network managers to analyze and understand what application traffics exist in the network. However, some users make use of the encrypted tunnels techniques, in order to avoid network management. Therefore, it has become an important issue how to identify network traffic in the encrypted tunnel. This paper proposes a novel scheme to generate features, called edges, based on packet length and packet inter-arrival time. Then, edges are used to de
APA, Harvard, Vancouver, ISO, and other styles
24

Yang, Ya-Chu, and 楊雅筑. "P2P Real-Time Road Traffic Navigation System." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/45204203283585692657.

Full text
Abstract:
碩士<br>國立交通大學<br>網路工程研究所<br>96<br>Existing centralized real-time traffic information systems provide excellent road guidance. However, the cost for constructing and maintaining the traffic center is expensive. Recently, several decentralized ad-hoc based traffic information systems are proposed. Vehicles in this kind of system detect traffic conditions with GPS devices and exchange observed traffic conditions with each other through inter-vehicle communication. However, ad-hoc based traffic information system has problem to efficiently disseminated traffic condition in large scale places when t
APA, Harvard, Vancouver, ISO, and other styles
25

趙令堯. "P2P Streaming Traffic Detection in Encrypted Tunnel." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/23500649260178480503.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

LeeMingHung and 李明鴻. "Contruct P2P Botnet network traffic detecting system." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/58ch5y.

Full text
Abstract:
碩士<br>國立臺東大學<br>資訊管理學系碩士班<br>98<br>Botnet is a remote and multi-hierarchical network system to attack the internet information security. Because of its hidden features, it is not easy to monitor its work and completely prevent its attacks. However, if internet managers can detect and monitor the network traffic as soon as possible, it would be possible for them to minimize disasters of Botnet attacks. In fact, Botnet does contain specific network behaviors, such as network communicating through specific ports. In addition, its attack often targets specific services such as interrupting web ser
APA, Harvard, Vancouver, ISO, and other styles
27

Lin, Chiayen, and 林佳彥. "A P2P Traffic Localization Mechanism using Distributed Trackers." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/13637538027247247857.

Full text
Abstract:
碩士<br>國立屏東科技大學<br>資訊管理系所<br>101<br>A conventional Peer-to-peer (P2P) system is normally built as an overlay network without considering the geographical locations of peers. As a result, when peers share data, it is possible to create a large amount of inter-ISP traffic. With this regard, we propose a P2P traffic localization mechanism which is collaboratively performed by a group of distributed trackers. The mechanism tries to find peers, located in the same ISP domain, who own the data for sharing. If no peer can be found, three hashing functions with different search scopes will be utilized
APA, Harvard, Vancouver, ISO, and other styles
28

LEE, CHUN-YI, and 李俊儀. "P2P Traffic Classification Algorithm based on Hierarchical Aggregation." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/19568381451944400957.

Full text
Abstract:
碩士<br>逢甲大學<br>資訊工程學系<br>105<br>As the rapid development of network technology in recent years, there are many unknown P2P traffics in the internet and these P2P traffics will seriously affect the network Quality of Service (QoS). However, it is difficult for the traditional traffic classification technology to classify these unknown P2P traffics. In order to maintain the quality of network services, classifying these P2P traffics correctly is an important issue. In this thesis, we propose a P2P traffic classification algorithm based on hierarchical aggregation. The system aggregates flows
APA, Harvard, Vancouver, ISO, and other styles
29

Chou, Chi-Bin, and 周祺彬. "Tunnel Sniper: P2P Traffic Classification in Encrypted Tunnels." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/76888851513433662628.

Full text
Abstract:
碩士<br>逢甲大學<br>資訊工程學系<br>101<br>In recent years, users have begun using encrypted tunnels to transport data in order to protect transmitted messages. However, it is very difficult for network engineers to manage the quality of network traffic in encrypted tunnels. Therefore, the issue of how to classify encrypted tunnels becomes more important and it has been studied so far. However, these studies are usually based on the assumption that encrypted tunnels include only one application traffic. In fact, encrypted tunnels may include more than one kind of application traffic. Therefore, this paper
APA, Harvard, Vancouver, ISO, and other styles
30

蕭倫. "A Study of Multi-level P2P Traffic Classification System." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/44296792361742547219.

Full text
Abstract:
碩士<br>逢甲大學<br>資訊工程學系<br>101<br>In recent years, due to the rapid development of the P2P applications, the P2P network traffic occupies more than 50% of the overall network traffic. The users will occupy most of network bandwidth when using P2P file-sharing software which will affect other user’s network speed and reduce the overall network performance. Therefore, for network engineers, it is necessary to identify and control the P2P traffic effectively. Many techniques used to avoid detection have been proposed such as using dynamic port number, encrypt payload, etc.; these techniques make th
APA, Harvard, Vancouver, ISO, and other styles
31

Chen, Chun-Wei, and 陳峻偉. "Identification and Analysis of P2P traffic- An example of BitTorrent." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/59544026765746099368.

Full text
Abstract:
碩士<br>樹德科技大學<br>資訊工程學系<br>94<br>A payload-analysis approach to identification and measurement of peer-to-peer (P2P) network services is proposed. The proposed approach effectively and efficiently identifies the complicated traffic caused by P2P network services. The feature extraction, payload analysis and dynamic measurement are the three pillars of the proposed approach. The dynamics of BT connections are featured to generalize the packet-capture criteria. Followed up, a payload analysis of captured packets is used to identify and measure the traffic. The implementation of the proposed schem
APA, Harvard, Vancouver, ISO, and other styles
32

Ye, Jia-Siang, and 葉佳祥. "SCAP : A P2P Botnet Detection System by Analyzing Composite Traffic Characteristic." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/ug9sfz.

Full text
Abstract:
碩士<br>國立臺灣科技大學<br>資訊工程系<br>104<br>During the last two decades, P2P botnets have severe security threat to the contemporary information networks. Usually attackers first distribute malware to control the victim’s host and then use the host as a springboard to launch attack on the specific targets. Because the botnets become smarter than ever to avoid security detection,many researches on both centralized and decentralized botnets regarding security detection have been reported. Among them, some researchers focused on the conversation-based detection. However, the problem of composite traffic oc
APA, Harvard, Vancouver, ISO, and other styles
33

Huang, Ching-Yen, and 黃清艷. "A Study of Enterprise Network Traffic and P2P Behavior Patterns Mining." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/61832936706661694265.

Full text
Abstract:
碩士<br>國立高雄應用科技大學<br>資訊管理系碩士在職專班<br>101<br>The fast development of the Internet changes human life and business operation. The risk of information security is improved by diverse applications of the Internet. For companies, both Intranet services and information security are very important parts of business operation. Intranet services can help maximize efficacy of information resources application. Information security can ensure the intranet service be confidential, intact, and useful. However, changeable attack types of Internet get through the firewall by the firewall legitimate release. Th
APA, Harvard, Vancouver, ISO, and other styles
34

Chen, Yi-Hui, and 陳薏卉. "Real Time P2P File Sharing Traffic Identification Based on Connection Patterns." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/59516317023896469077.

Full text
Abstract:
碩士<br>國立交通大學<br>網路工程研究所<br>97<br>The use of peer-to-peer (P2P) applications is growing dramatically, particularly for sharing large video/audio files and software, which results in several serious problems, such as internet piracy and unreasonable utilization of network resources. To conquer these problems, in this thesis, we propose a heuristic-based real time file sharing traffic identification (RTI) scheme at the transport layer for facilitating network management. The proposed RTI only needs a 5 seconds trace to effectively identify P2P file sharing traffic in real time for network managem
APA, Harvard, Vancouver, ISO, and other styles
35

Su, Hao Wei, and 蘇浩崴. "An RTT Based Traffic Localization Mechanism for P2P Live Video Streaming System." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/03572364725788998932.

Full text
Abstract:
碩士<br>國立清華大學<br>資訊工程學系<br>103<br>With the advance and development in the networks, more and more applications are realized with the help of Internet networking. In the progress of the video applications, users nowadays are looking forward to being served with a high-quality real time video streaming besides the existing video file sharing services. There are already some services concerning video streaming being put on the shelf by the service providers, for instance, YouTube and Twitch. They adopt the Client/Server based architecture to serve the users who want to enjoy the real time video st
APA, Harvard, Vancouver, ISO, and other styles
36

黃國泰. "A study of P2P traffic classification algorithm based on the clustering technology." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/95301367325541548213.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Bai, Chun-Yuan, and 白淳元. "Traffic Localization with Information Guidance of Pseudo Peer Agent on BT-P2P Network." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/rsa3g5.

Full text
Abstract:
碩士<br>國立中央大學<br>資訊工程研究所<br>94<br>With the improvement of New network technologies and network bandwidth. Compare with the traditional Client-Server framework, the Peer-to-Peer network (P2P) technology allows users to share their computing power, disk spaces, bandwidth, and file that own on the overlay network.Then every user can share their resource directly. Bitorrent is a very popular distributed file transfer system. But in Bitorrent Peer can not know all of the other Peers, and does not know which LAN user have the same file. Partial Peer list and tit-for-tat make redundant traffic flow se
APA, Harvard, Vancouver, ISO, and other styles
38

Tsai, Tzong-Shiun, and 蔡宗勳. "Design and Prototyping of a High Performance P2P Traffic Detection and Filtering System." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/41449329079872304869.

Full text
Abstract:
碩士<br>國立交通大學<br>資訊科學與工程研究所<br>95<br>With Internet technology becoming more and more popular, various network applications have been proposed, for examples, World Wide Web (WWW), File Transfer Protocol (FTP), E-Mail, and Voice over IP (VoIP). In the last decade, another network service has been developed, that is Peer-to-Peer (P2P) Network. While P2P network spreading rapidly, P2P traffic has occupied up to 80% of corporations and schools’ network traffic. Under limited network resources, such high occupancy consumes most of network bandwidth. Since to there is no log file to keep connection
APA, Harvard, Vancouver, ISO, and other styles
39

Guan-ZhongChen and 陳冠中. "A Multi-Layer Neural Network Model Trained by Session-based Features for classifying P2P Botnet traffic." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/zk25n8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Esteves, André Filipe Ferreira. "Detection of encrypted traffic generated by peer-to-peer live streaming applications using deep packet inspection." Master's thesis, 2011. http://hdl.handle.net/10400.6/3733.

Full text
Abstract:
The number of applications using the peer-to-peer (P2P) networking paradigm and their popularity has substantially grown over the last decade. They evolved from the le-sharing applications to media streaming ones. Nowadays these applications commonly encrypt the communication contents or employ protocol obfuscation techniques. In this dissertation, it was conducted an investigation to identify encrypted traf c ows generated by three of the most popular P2P live streaming applications: TVUPlayer, Livestation and GoalBit. For this work, a test-bed that could simulate a near real scenario was c
APA, Harvard, Vancouver, ISO, and other styles
41

Grekelä, Harri. "Barn och trafikrelaterade luftföroreningar : En översyn av riskfaktorer associerade till astma och pip ljud." Thesis, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-15354.

Full text
Abstract:
INTRODUKTION: Trafikrelaterade utsläpp är ett globalt problem som orsakar dödlighet och sjuklighet i främst utvecklingsländer och större städer där problemet är störst. Astma är en av sjukdomarna som associeras med trafikrelaterade utsläpp och är globalt sett den vanligaste icke kommunicerbara sjukdomen bland barn, som är en särskild utsatt grupp eftersom de växer och deras organ utvecklas. En global uppskattning av World Health Organization visar att cirka två miljarder barn lever i områden där luftföroreningarna överskrider globala gränsvärden för utsläpp. SYFTE: Syftet med studien är att id
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!