期刊文献+

基于P2P技术的远程协同通信平台的设计与实现 被引量:1

DESIGN AND IMPLEMENTATION OF REMOTE COOPERATING COMMUNICATION SYSTEM BASED ON P2P TECHNOLOGY
下载PDF
导出
摘要 由于NAT(Network Address Transformation)技术本身的设计原理,导致原本透明的端到端变的不可达。就如何不改变现有网络配置的情况下,恢复端到端的可达性,实现不同内网之间的主机穿透NAT,并在此平台上实现WWW访问、远程桌面管理等功能给出了相应的解决办法,本系统通过重新组合TCP连接的方法实现通信功能,不受防火墙等网络设备的限制,具有比传统的方法容纳更多用户的能力。 Because of the limitation of the principle of NAT, the network data cannot arrive from one host computer to the other.transparently. This paper gives how to transmit network data from one host computer to the other transparently by no any change of the network configures,it can transmit network data through different intranets which adopt the NAT technology. Based on this, it can realize many network applications between hosts which in different intranets, such as www, telnet, etc. Through afresh the TCP connecting method, the System can realize the interact communicating function that no any limitation of the equipment, such as firework, etc, and by this technology. Comparing to the traditional method, it can be used by more users.
作者 聂哲
出处 《计算机应用与软件》 CSCD 北大核心 2008年第8期217-218,共2页 Computer Applications and Software
关键词 P2 P协同通信平台 NAT网络服务 内网穿透 P2P Cooperating communication system NAT Network service Intranet transmitting
  • 相关文献

参考文献5

二级参考文献30

  • 1Napster-file sharing system[EB/OL]. http://www.napster.com/,2005 - 05.
  • 2Clips. The Gnutella Protocol pecifications v0.4[EB/OL]. http:/dss. clio2. com/Gnutella Protocol 04. pdf, 2005 - 05.
  • 3Clarke I, Sandberg O, Wiley B, et al. Freenet: A distributed anonymous information storage and retrieval system[A]. Proceedings of International Workshop on Designing Privacy Enhancing Technologies:Design Issues in Anonymity and Unobservability[C].Berkeley. CA: Springer'Verlag, 2001.46 -66.
  • 4Searlata V, Levine BN, Shields C. Responder anonymity and anonymous peer to peer file sharing[A]. Proceedings of the 9th International Conference on Network Protocols( ICNP2001 )[C].Riverside, CA: IEEE Computer Society, 2001.272 - 280.
  • 5Reed M, Syverson P, Goldschlag D. Proxies for anonymous routing[A]. Proceedings of 12th Annual Computer Security Applications Conference[C]. Sandiego, CA: IEEECS Press, 1996.95-104.
  • 6Reiter MK, Rubin AD. Crowds: Anonymity for Web transactions[J]. ACM Transaction Information and System Security, 1998, 1(1):66 - 92.
  • 7Schlosser M,Sintek M,Decker S.HyperCuP-Hypercubes,Ontologies and Efficient Search on P2P Networks[Z].Computer Science Department,Stanford University,2002-07.
  • 8Wolpers M,Siberski W,Schmitz C.Super-peer-based Routing Strategies for RDF-based Peer-to-peer Networks[Z].Germany Computation and Information Structures Institute,Technical University Berlin,Germany 2003.
  • 9McIlraith S,Son T C,Zeng H.Semantic Web Services[J].IEEE Intelligent Systems,2002,16(2 (Special Issue on the Semantic Web)):46-53.
  • 10Pandurangan G,Raghavan P,Upfal E.Building Low Diameter P2P Networks[C].Proc.of the 42^nd Annual IEEE Symposium on the Foundations of Computer Science,2001.

共引文献21

同被引文献9

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部