[1]孙卫喜,席少龙.P2P中NAT穿越问题的研究[J].计算机技术与发展,2014,24(02):242-245.
 SUN Wei-xi,XI Shao-long.Research on NAT Traversal Problem in Peer-to-Peer[J].,2014,24(02):242-245.
点击复制

P2P中NAT穿越问题的研究()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
24
期数:
2014年02期
页码:
242-245
栏目:
应用开发研究
出版日期:
2014-02-28

文章信息/Info

Title:
Research on NAT Traversal Problem in Peer-to-Peer
文章编号:
1673-629X(2014)02-0242-04
作者:
孙卫喜席少龙
渭南师范学院 数学与信息科学学院 计算机网络工程技术中心
Author(s):
SUN Wei-xiXI Shao-long
关键词:
对等网络网络地址转换ICMP生存时间穿越
Keywords:
P2PNATICMPTTLtraversal
分类号:
TP393
文献标志码:
A
摘要:
针对目前常用的几种NAT穿越技术存在的需要改变网络环境、不支持Symmetric NAT与TCP的穿越、延时、丢包等问题,在对P2P网络环境下NAT穿越原理认真分析的基础上,以穿越原理为基点,对目前NAT穿越技术存在的问题进行了研究。给出了‘采用端口预测穿越NAT的新方案爷,该新方案在不需要改变现有网络设备的情况下实现了TCP对各种NAT的穿越,减少了延时和丢包等NAT穿越常见的问题。通过大量的实验表明该新方案更适合于对网络安全需求更高而使用对称型NAT的企业。
Abstract:
Due to several problems in the common technology of the NAT traversal at present,such as the need of changing the environ-ment,non-supporting the Symmetric NAT and TCP traversal,delaying,the lost of data and so on,after carefully analyzing the theory of the NAT traversal in P2P,based on the traversing theory,studied the appearing problems of the NAT traversal,then give a new method of using pot to predict the NAT traversal. This new method achieves the way of TCP crossing all kinds of NAT in no need of changing the original equipment of the Internet,which reduced the common problems in the field of NAT traversal such as delaying and the lost of da-ta. Some experiments which has been verified present that the method can adapt to the enterprises which have higher requirement of net-work security and using a class of symmetry NAT.

相似文献/References:

[1]张祖昶,王诚.P2P网络的信任评估安全模型研究[J].计算机技术与发展,2014,24(01):163.
 ZHANG Zu-chang,WANG Cheng.Research of a Safe Model of Trust Evaluation for P2 P Network[J].,2014,24(02):163.
[2]孙名松 邸明星 王湛昱.多决策树算法在P2P网络流量检测中的应用[J].计算机技术与发展,2010,(06):126.
 SUN Ming-song,DI Ming-xing,WANG Zhan-yu.Application of Decision Tree Algorithm in Traffic Detection of P2P Network[J].,2010,(02):126.
[3]李莹峰 邓晓衡.DHT网络中基于测量的QoS监控系统[J].计算机技术与发展,2009,(05):188.
 LI Ying-feng,DENG Xiao-heng.Measurement- Based QoS Monitor System in DHT Network[J].,2009,(02):188.
[4]贺锋 王汝传.一种基于PKI的P2P身份认证技术[J].计算机技术与发展,2009,(10):181.
 HE Feng,WANG Ru-chuan.A Peer- to- Peer Identity Authentication Technology Based on PKI[J].,2009,(02):181.
[5]吴敏 王汝传 王治平.基于支持向量机的P2P网络DoS攻击检测[J].计算机技术与发展,2009,(11):151.
 WU Min,WANG Ru-chuan,WANG Zhi-ping.Detection Mechanism of DoS Attacks in Peer- to- Peer Networks Based on Support Vector Machine[J].,2009,(02):151.
[6]郭晶 吴国新 李想.P2P网络环境下信任模型的研究与实现[J].计算机技术与发展,2009,(03):102.
 GUO Jing,WU Guo-xin,LI Xiang.Research and Design for Trust Model in P2P Network[J].,2009,(02):102.
[7]王洪臣 朱尚明.多连接校园网策略路由的研究与实现[J].计算机技术与发展,2008,(04):25.
 WANG Hong-chen,ZHU Shang-ming.Research and Implementation on Policy- Based Routing in Multihoming Campus Network[J].,2008,(02):25.
[8]周华平.防火墙中规则的翻译及检测方法的研究[J].计算机技术与发展,2007,(11):135.
 ZHOU Hua-ping.Research of Firewall Rules Translation and Examination Method[J].,2007,(02):135.
[9]李新国.Linux环境下H.323协议ALG的实现研究[J].计算机技术与发展,2007,(02):212.
 LI Xin-guo.The ALG Processing Module of H. 323 Agreement in Linux Environment[J].,2007,(02):212.
[10]许加兴 汪厚新 周艳 金炜东.P2P网中基于IP组播的发现机制研究[J].计算机技术与发展,2006,(06):32.
 XU Jia-xing,WANG Hou-xin,Zhou yah,et al.Discovery Implementation by IP Multicast in Peer to Peer Network[J].,2006,(02):32.

更新日期/Last Update: 1900-01-01