跳到主要內容

臺灣博碩士論文加值系統

(2600:1f28:365:80b0:1742:3a1e:c308:7608) 您好!臺灣時間:2024/12/08 09:16
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:鄭伊騏
研究生(外文):Yi-Chi Cheng
論文名稱:網際網路上加密通話之辨識及動態頻寬保證設計實作—以Skype為例
論文名稱(外文):Implicit Classification and Bandwidth Management for Encrypted Internet Voice Traffic: Case study of Skype
指導教授:潘仁義
指導教授(外文):Jen-Yi Pan
學位類別:碩士
校院名稱:國立中正大學
系所名稱:通訊工程研究所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2006
畢業學年度:94
語文別:中文
論文頁數:76
中文關鍵詞:頻寬管理服務品質SkypeVoIP
外文關鍵詞:SkypeQuality of ServiceVoIPBandwidth management
相關次數:
  • 被引用被引用:2
  • 點閱點閱:339
  • 評分評分:
  • 下載下載:66
  • 收藏至我的研究室書目清單書目收藏:1
隨著網際網路成長快速,多樣化的網路應用與服務也進入我們的生活中,而VoIP大舉入侵傳統電信市場,消耗掉大量的網路頻寬。在有限的頻寬下,面對大量的資料傳輸,如何讓頻寬做最有效的應用,在近年來成為相當重要的課題,但對於使用私有或加密的通訊協定的VoIP軟體來說,管理者往往無法控管,導致頻寬使用量無法預估或限制。
為了解決上述問題,本研究以Skype為例,主要針對使用私有或加密通訊協定的語音傳輸所作的頻寬管理。此機制是透過Conntrack獲取現有已建立連線的會談,並利用Pcap擷取封包內容並且分析夾帶的資訊,如:傳輸速率、每秒傳輸封包個數、通訊埠…等。利用K-平均法及最近鄰居分類法來進行群聚分析和樣式識別。最後交由流量管理工具配置所需頻寬。
使用此機制可以確保使用VoIP時,具有服務品質保證,且對於使用者的VoIP軟體或硬體並不需要做任何修改或設定,即可達到良好的通話品質。
With the rapid growth of Internet, various applications and information has developed dramatically in the last couple of years. VoIP, being a significant portion of the network traffic today, constitutes a highly desirable class for identification. Accurate classification of proprietary VoIP traffic is a challenging problem, and becomes even more challenging when we are constrained to use only transport-layer header information and encrypted packets.
In this paper, we present a new approach for proprietary VoIP traffic identification that uses fundamental characteristics of proprietary VoIP protocols, such as constant bandwidth consumption and frequent sending rate. We do not use any application specific information and still could identify proprietary VoIP protocols in a simple and efficient way. A bandwidth management system is also built to handle the traffic and guarantee the QoS in bandwidth limited network environment.
Finally, this mechanism is implemented and evaluated on a network processor board. Based on the network traffic of department electrical engineering of Chung Cheng University, the evolution result shows our system can recognize 90% Skype sessions. It could be transplanted to identify other encrypted Internet voice traffic easily.
第一章 緒論 1
1.1 簡介 1
1.2 研究動機 2
1.3 章節大綱 3
第二章 相關研究及背景介紹 4
2.1 VoIP簡介 4
2.1.1 VoIP應用模式 6
2.1.2 VoIP與傳統電信比較 8
2.1.3 VoIP面臨之挑戰 8
2.2 Skype簡介 9
2.2.1 Skype架構及運作方式 11
2.2.2 Skype核心技術 14
2.2.3 Skype優勢與挑戰 17
2.3 服務品質保證 19
2.3.1 頻寬管理機制 20
2.3.2 Linux排程機制 21
2.4 封包過濾與連線分析 26
2.4.1 Netfilter 26
2.4.2 Connection Tracking 28
2.5 網路處理器 31
2.6 群聚分析與樣式辨識技術 33
2.6.1 群聚分析 35
2.6.2 樣式辨識 39
2.7 語音品質評價指標 40
2.7.1 平均意見分數 40
2.7.2 E-Model 42
第三章 系統設計與實作 46
3.1 系統架構 46
3.2 實作環境 48
3.3 實作方法 48
3.4 Skype行為分析 49
3.4.1 Skype會談特性 49
3.4.2 Skype會談辨識 51
3.5 系統模組實作 54
3.5.1 會談分析模組實作 54
3.5.2 頻寬配置模組實作 58
3.5.3 流量控制指令模組實作 59
3.5.4 Admin UI模組實作 60
3.5.5 整體運行架構 62
第四章 系統量測與驗證 64
4.1 測試平台與設備 64
4.2 辨識成必v分析 65
4.3 網路品質分析 67
4.4 語音品質評量分析 68
4.5 系統延展性 71
第五章 結論與未來展望 72
5.1 結論 72
5.2 未來展望 73
參考文獻 74
[1]Skype, [online]. Available:http://www.skype.com/.
[2]L Deri, “Open Source VoIP Traffic Monitoring”, SANE 2006, May 2006.
[3]J. Rosenberg, H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson, R. Sparks, M. Handley and E. Schooler, "SIP: Session Initiation Protocol", IETF RFC 3261, June 2002.
[4]F. Andreasen and B. Foster, "Media Gateway Control Protocol (MGCP) Version 1.0", IETF RFC 3435, January 2003.
[5]ITU-T Recommendation H.323, "Packet-based multimedia communications systems", 2003.
[6]S. L. Garfinkel, “VoIP and Skype Security”, Skype Security Overview, January 2005.
[7]G. Prentice “Hello, we’re Skype – we really like big new ideas”, Skype Hardware Development & Business Opportunity Seminar, June 2006.
[8]Y. Gong, “Identifying P2P users using traffic analysis”, July 2005, [online]. Available:http://www.securityfocus.com/infocus/1843/.
[9]D. Bergström, “An analysis of Skype VoIP application for use in a corporate environment”, October 2004, [online]. Available:http://www.geocities.com/bergstromdennis/.
[10]S. A. Baset and H. G. Schulzrinne, “An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol”, In Proceedings of IEEE INFOCOM 2006, Barcelona, Spain, April 2006.
[11]K. Suh, D. R. Figueriredo, J. Kurose, and D. Towsley, “Characterizing and detecting Skype relayed traffic: A case study using Skype”, In Proceedings of IEEE INFOCOM 2006, Barcelona, Spain, April 2006.
[12]J. Rosenberg, J. Weinberger, C. Huitema, and R. Mahy, “STUN: Simple Traversal of User Datagram Protocol (UDP) Through Network Address Translators (NATs)”, RFC 3489, IETF, March 2003.
[13]B. Ford, P. Srisuresh, and D. Kegel, “Peer-to-peer communication across network address translators”, USENIX Annual Technical Conference, April 2005.
[14]J. Rosenberg, R. Mahy, and C. Huitema, Internet draft: “TURN—Traversal Using Relay NAT”, March 2006.
[15]S. Guha, N. Daswani, and R. Jain, “An experimental study of the Skype peer-to-peer VoIP system”, IPTPS., Santa Barbara, CA, February 2006.
[16]Global Index(GI), [online]. Available:http://www.skype.com/skype_p2pexplained.html/.
[17]Global IP Sound, [online]. Available:http://www.globalipsound.com/.
[18]邱家偉, 潘仁義, “網際網路電話動態頻寬保證之設計與實作”, 國立中正大學通訊工程研究所, 2005年碩士畢業論文.
[19]ITU-T Recommendation P.800.1, “Mean opinion score (MOS) Terminology”, February 2003.
[20]J. Stephens, Iptables – How does it work? , [online]. Available:http://www.sns.ias.edu/~jns/security/iptables/iptables_conntrack.html.
[21]O. Andreasson, Iptables Tutorial 1.1.19, 2003, [online]. Available:http://www.faqs.org/docs/iptables/index.html.
[22]黃仲君, 孫雅麗, “設計與實作狀態化封包內容分類器的描述語言、編譯器,與引擎”, 國立台灣大學資訊管理研究所, 2004年碩士畢業論文.
[23]R. Braden, D. Clark and S. Shenker, "Integrated Services in the Internet Architecture: an Overview", IETF RFC1633, June 1994.
[24]S. Blake, D. Black, M. Carlson, E. Davies, Z. Wang and W. Weiss, "An Architecture for Differentiated Services", IETF RFC 2475, December 1998.
[25]S. Floyd and V. Jacobson, "Link-Sharing and Resource Management Models for Packet Networks", IEEE/ACM Transactions on Networking, Vol. 3 No. 4, pp. 365-386, August 1995.
[26]HTB Home, [online]. Available: http://luxik.cdi.cz/~devik/qos/htb/.
[27]Class-Based Queuing, [online]. Available: http://www.icir.org/floyd/cbq.html.
[28]R. Braden, L. Zhang, S. Berson, S. Herzog and S. Jamin, "Resource Reservation Protocol(RSVP)Version 1 Functional Specification", IETF RFC 2205, Proposed Standard, September 1997.
[29]何振毅, 王欣平, “HTB與CBQ在Linux上階層性頻寬分享機制實作分析和探討”, 大葉大學資訊工程學系, 2004年碩士畢業論文.
[30]Harvard Sentences, [online]. Available: http://www.cs.columbia.edu/~hgs/audio/harvard.html.
[31]ITU-T, “G.107 The E-model, a computational model for use in transmission planning”, ITU-T, March 2005.
[32]J. Mercier, “Is the Growth of Skype Slowing Down?”, Skype Journal, May 2005, [online]. Available: http://www.skypejournal.com/blog/archives/2005/05/is_the_growth_o.php
[33]郭伯臣, “統計樣式辨認於測驗資料之應用”, 測驗統計年刊第十三輯, December 2005.
[34]張智星, “資料分群與樣式辨認(Data Clustering and Pattern Recognition)” , [online]. Available: http://neural.cs.nthu.edu.tw/jang/books/dcpr/.
[35]l7-filter uses the Skype to Skype pattern, [online]. Available: http://l7-filter.sourceforge.net/layer7-protocols/protocols/skypetoskype.pat.
[36]莊樹諄, “VOIP:網路電話發展概況簡介” , 中央研究院計算中心通訊第17卷25期, December 2001.
[37]F. Cuervo, N. Greene, A. Rayhan, C. Huitema, B. Rosen and J. Segers, “Megaco Protocol Version 1.0”, IETF RFC 3015, November 2000.
[38]D. Awduche, J. Malcolm, J. Agogbua, M. O'Dell and J. McManus, “Requirements for Traffic Engineering Over MPLS”, IETF RFC 2702, September 1999.
[39]R. Russell, “Linux Netfilter Hacking HOWTO”, February 2002, [online]. Available: http://www.collaborium.org/onsite/benin/docs/services/NETFILTER_RELATED/netfilter-hacking/netfilter-hacking-HOWTO.html#toc4
[40]A. Clark, “Voice Quality Measurement”, February 2005, [online]. Available: http://www.tmcnet.com/tmcnet/articles/2005/voice-quality-measurement-voip-alan-clark-telchemy.htm.
[41]W. J. Campbell, “Learning Skype Plug-In Architecture”, Skype Journal, April 2005.
[42]E. Mattila, “An Analysis of Hybrid and Pure Peer-to-Peer Technologies for IP Telephony”, Helsinki University of Technology, April 2005.
[43]G. Lisha and L. Junzhou, “Performance Analysis of a P2P-Based VoIP Software”, AICT-ICIW 2006, February 2006.
[44]K. T. Chen, C. Y. Huang, P. Huang and C. L. Lei, “Quantifying Skype User Satisfaction”, In Proceedings of ACM SIGCOMM 2006, Pisa, Italy, September 2006.
[45]毛治國, “電信業面臨「一場正在形成中的完美風暴」”, 2005 IP電信產業交流會, [online]. Available: http://www.teema.org.tw/publish/moreinfo.asp?autono=2491
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top