Latest P2P traffic monitoring and management solution-P2P, monitoring and manage
Abstract: The new version of the P2P applications P2P management leading to some of the traditional means of failure, many P2P networks are managed to re-invasion, once again become strained bandwidth, the hardest hit. Rapid evolution of P2P applications face, how to effectively manage network traffic in 2008 to become a major problem. Network Solutions should be used what P2P applications respond to changing it? Because P2P applications
seize unlimited bandwidth, which makes the original is not rich network bandwidth is stretched. Various P2P management system (Poly Health Network, online behavior management software, application traffic managers, P2P management module with routing, etc.) emerged to achieve the effective management of P2P. However, beginning in 2008, began to upgrade all kinds of P2P applications, P2P applications introduced new encryption techniques, camouflage agreement, encryption, IP destination address ways to prevent P2P applications such as packet identification and testing. The new version of the P2P applications P2P management led to some of the traditional means of failure, many P2P networks are managed to re-invasion, once again become strained bandwidth, the hardest hit. Rapid evolution of P2P applications face, how to effectively manage network traffic in 2008 to become a major problem. Network solution should deal with how the changing P2P applied?
P2P features and management of difficult
To deal with first thing is to understand the characteristics of P2P applications. The main features of P2P application traffic as follows: to seize idle bandwidth, symmetrical downstream and upstream traffic, point-to-many links, most of the port variable, the agreement is relatively fixed, flow was not obvious. These characteristics lead to P2P in the collection and analysis, identification and management more difficult.
P2P data acquisition and analysis from the point of view, as traffic was not obvious, it needs some storage and computing power to achieve real-time detection and filtering effect. Traditional network devices have limited storage and processing can not meet the requirements. Only the application of traffic management devices as built-in storage and processing power to achieve real-time acquisition and analysis. Of course, can also be used off-line detection methods (which are online behavior management system approach), but this method is effective and timely flow of processing more than 10Mbps. Therefore, data collection and analysis of P2P high requirements.
P2P traffic identification from the perspective, P2P is now most dynamic port, and the encrypted data packet has started, and its link to the IP wide, so a fixed IP link or port through the identification can not meet the requirements. Need for in-depth analysis of the data packets in order to accurately identify P2P packets and all its internal data link. The depth analysis of the data packet has a certain technological barriers, but also another layer of computing power equipment test.
From P2P traffic management point of view, the P2P application identification, if only the shield only needs to P2P packets can be screened out, but if you need now to a range of P2P traffic, the best way is to request queue make certain changes, which also need to manage the device has some computing power, it would be a P2P management is also difficult. P2P applications and upgrades are faster, more recognition and management of this caused great difficulties, require regular updates, particularly in domestic P2P applications (such as: Thunder, BaiDuX, etc.). It is also difficult in the P2P network equipment abroad, the management of the main base, after all the equipment related to foreign R & D and other aspects of the lack of localization.
Common P2P management solution To achieve the rapid identification of P2P traffic management, Cisco, WSDOM, NetAPP and the other companies of different solutions to management.
1. Flow Statistics status routers: Cisco and other manufacturers made the exchange of routing. Flow statistics at the IP layer router can state statistical flow characteristics of the way through the identification of P2P streams, which can be extracted through the encoding and decoding, or the new P2P streaming is unknown. In this way regeneration is relatively slow, difficult to deal with P2P updates. However, low investment, shielding effect is not obvious.
The e-commerce company in China offers quality products such as finger splint manufacturer , china forearm arm sling, and more. For more , please visit china cervical collar today!