P2P proposal

advertisement
Project proposal
for
Network based P2P Flow Recognition
Network based P2P Recognition
A peer-to-peer (P2P) is any distributed network architecture composed of participants that make
a portion of their resources (such as processing power, disk storage or network bandwidth) directly
available to other network participants, without the need for central coordination instances (such as
servers or stable hosts). Peers are both suppliers and consumers of resources, in contrast to the
traditional client-server model where only servers supply, and clients consume. P2P applications have a
significant share in Internet traffic. Protocol wise distribution of P2P traffic is shown in the Fig below
[1].
Fig: P2P protocol distribution by volume, Germany 2007
In the current project, we will identify the P2P flows so that they can be treated by the downstream
routers as per policy. The entity performing P2P flow recognizer will be the part of ISP network and all
the traffic coming from customer’s edge and/or Internet will be dumped to that entity. Following
diagram will describe the proposed architecture.
In this diagram, copy of all the flows from the users and Internet will be forwarded to the P2P
flow recognizer. Upon the reception of a packet, the P2P application identification module will come
into act. It will identify that whether a particular packet belongs to a P2P flow or not. If a packet
corresponds to a P2P flow, it will instruct the marking and policing module to mark that packet as per
policy. All the packets will be passing offline through the proposed machine and it has to conduct
analysis instantly so that traffic flow can be treated as urgently as possible and the number of packets
passing through the network without policy will be minimized. Therefore we assume that this will be
an entity with higher memory resources and processing power.
Team:
1. Dr. Amir Qayyum
(Project Director)
2. Mr. Ehsan Elahi
(Project Coordinator)
3. Ms Sadaf Yasmin
(Research Engineer)
4. Mr. Yasir Majeed
(Developer)
5. Mr. Amer Zaheer
(Developer)
Molestones:
1. Identification of target applications
2. Comprehensive report on literature survey and analysis
3. Algorithm Development
4. Detailed design specification
5. Algorithm Implementation
6. Offline testing
7. Optimized architecture
8. Online deployment and testing
Deliverables:
1. Release of prototype
2. Initial test report
3. Optimized version release
4. Final test report
5. Final release
Timeline:
Starting date: January 1, 2010
End date: June 15, 2010
Tasks to be accomplished in January 2010:

Target application identification

Literature survey and analysis report

Implementation options and selection
Tasks to be accomplished in February 2010:

Algorithm development and optimization
Tasks to be accomplished in March 2010:

Implementation and prototype release
Tasks to be accomplished in April 2010:

Prototype testing and optimization
Tasks to be accomplished in May 2010:

Optimization of Architecture

Final testing

Final release

Release Document
Tasks to be accomplished in June 2010:

Deployment
Future Work:
It is a usual practice that sometimes government agency or ISP itself blocks a website from its
subscribers. It can be done by installing a firewall in the main stream of traffic coming from
subscribers. This can create a bottleneck point. Also this blockage is based upon the IP filtering. But if
on that IP address, there are some other web servers running for some legitimate websites, these
websites will also be blocked. Moreover if the government wants to block one specific page of a
website, not the whole site, then the ISP has no such facility to do that without Deep Packet Inspection
(DPI) techniques. For example ISP wants to block a video from the www.youtube.com, it has no other
option except to block the IP address of this site. We planned to extend this project to solve the above
mentioned problems by looking into the packets coming from the subscribers without intervening into
the main traffic stream. Through this idea, we let the subscriber’s request go outside the network but in
the meanwhile we recognize it and block the reply from the web server and also block the subsequent
requests from that subscriber.
References:
[1] “The absolute majority of all Internet traffic is p2p file-sharing” available online at
http://liquidculture.wordpress.com/2008/03/14/the-absolute-majority-of-all-internet-traffic-is-p2p-filesharing/
Download