期刊文献+

基于P2P的TCP穿透NAT技术研究 被引量:1

The Research of TCP Penetrating NAT Technology Based on P2P
原文传递
导出
摘要 P2P和NAT在现今的网络中都大面积使用,但基于P2P的TCP连接不能直接穿透NAT,需要借助第三方服务器协助才能完成三次握手的过程。本文详细描述TCP穿透NAT的全流程,并简单分析此方法的优劣。 P2P and NAT are both applied widely in network nowadays, but the TCP link based on P2P can't penetrates NAT directly, which needs aid from other server to finish three shaking hands. This paper describes the procedure of TCP penetrating NAT and analyzes its advantages and disadvantages briefly.
出处 《网络安全技术与应用》 2011年第3期40-41,共2页 Network Security Technology & Application
关键词 P2P TCP NAT 穿透 P2P TC P NAT Penetration
  • 相关文献

参考文献7

  • 1Jermigs C. NAT Classification Results using STUN. IETF lntemet Draft. October 2004.
  • 2RFC5389 Session Traversal Utilities for NAT (STERN). J. Rosenberg, R. Mahy, P. Matthews, D. Wing. October 2008.
  • 3BEHAVE-NAT MacDonald, D. and B. Lowekamp, "NAT Behavior Discovery Using STUN", Work in Progress, July 2008.
  • 4BEHAVE-TURN Rosenberg, J., Malay, R., and R MaUhews, "Traversal Using Relays around NAT (TURN): Relay Extensions to Session Traversal Utilities for NAT (STUN)", Work in Progress, July 2008.
  • 5Jeffrey L. Eppinger. TCP connections for P2P apps: A software approach to solving the NAT problem. Technical Report CMUISRI- 05-104, Carnegie Mello University. January 2005.
  • 6Andrew Biggadike, Daniel Ferullo, Geoffrey Wilson, and Adrian Perrig. NAT BLASTER: Establishing TCP connections between hosts behind NATs. In ACMSIGCOMM Asia Workshop, Beijing China. April 2005.
  • 7RFC2988 Computing TCP's Retransmission Timer. V. Paxson, M. Allman. November 2000.

同被引文献7

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部