期刊文献+

P2P网络传输中NAT穿越的研究 被引量:2

Study on NAT transversal for Peer-to-Peer network communication
下载PDF
导出
摘要 NAT把一个区域的IP地址映射到另一个区域的IP地址,为主机之间提供透明的路由,所以它能有效地解决IPv4地址紧缺问题,但同时也给P2P通信带来了极大的困难,穿透NAT已经成为P2P应用必须面对和解决的问题。基于Internet的P2P技术和NAT的基本原理,文章分析了NAT对P2P的影响,介绍了几种穿透NAT的技术,并分析了其各自的特点,指出了影响NAT穿透的关键因素,给出了简单又健壮性很好的UDP Hole Punching技术以实现NAT的穿越,并以此为基础提出一种利用应用程序协助完成的TCP穿透NAT的方案。 Network Address Translation(NAT) is a method by which IP address is mapped from one realm to another, in an attempt to provide transparent routing to hosts. Although it can resolve the problem of IP address exhaustion, it brings some difficulties on Peer-to-Peer communication. Bases on the technology of internet Peer-to-Peer and NAT theory, this paper analyzes the NAT impact on P2P, introduces several NAT traversal techniques, analyses the characteristics respectively and points out the key factors affecting NAT traversal. The UDP Hole Punching technology and a solution on NAT traversal of TCP communications are also discussed in the paper.
作者 招俏春 李榕
出处 《电力系统通信》 2008年第7期60-64,共5页 Telecommunications for Electric Power System
关键词 P2P NAT UDP HOLE PUNCHING TCP P2P NAT UDP Hole Punching TCP
  • 相关文献

参考文献5

  • 1ZHOU Hu. NAT traversal techniques and Peer-to-Peer applications[ EB/OL]. http://www.tml. tkk. fi/Publications/C/18/hu.pdf,2005 - 09 - 18.
  • 2ROSENBERG J, WEINBERGER J, MAHY R. RFC3489, STUN simple traversal of User Datagram Protocol (UDP) through Network Address Translators(NATs) [ S] . 2003.
  • 3EGEZVANG K, FRANCIS P. The IP network address translator[ S]. RFC1631,1994.
  • 4BRYAN F, PYDA S, DAN K. Peer-to-Peer communication across network address translators[ EB/OL]. http ://www. brynosaurus. com/pub/net/p2pnat/.
  • 5叶润国,宋成,吴迪,李文印,陈震.P2P网络中对等节点间安全通信研究[J].微电子学与计算机,2004,21(6):95-99. 被引量:14

二级参考文献11

  • 1梁卫红.对等网络编程源代码解析.北京:电子工业出版社,2002.8.
  • 2S Kent. Security Architecture for the Internet Protocol.RFC2401, Nov. 1998.
  • 3Kent S and R Atkinson. IP Encapsulating Security Payload (ESP). RFC2406, Nov. 1998.
  • 4Harkins D, D Carrel. The Internet Key Exchange (IKE).RFC2409, Nov. 1998.
  • 5Netscape. Inc., SSL3.0 Specification, Mar. 1996.
  • 6Stunnel, http:∥www, stunnel.org.
  • 7Chris McKean. Peer-to-Peer Security and Intel's Peer-toPeer Trusted Library, SANS Institute Information Security Reading Room, Aug. 2001.
  • 8Steve Rysovy, Microsoft. NET P2P Application. http:∥seniord.ee.iastate .edu/dec0109/
  • 9Warwick Ford, etc. XML Key Management Specification (XKMS), W3C Notes. http:∥www.w3.org/, Mar. 2001.
  • 10许斌.JXTA-Java P2P网络编程技术.北京:清华大学出版社,2003.6.

共引文献13

同被引文献3

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部