基于混合式P2P网络的NAT穿越技术的研究与应用
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
互联网技术的飞速发展对计算能力和带宽都提出了更高的要求,而传统互联网技术的计算能力和带宽主要依赖于少数几台服务器。对等互联网络(Peer-to-Peer, P2P)技术可以有效利用网络参与者的计算能力和带宽,而不完全依赖于服务器,打破了传统C/S方式下,一方提供服务,一方接受服务的模式。相比传统的C/S架构,P2P网络是完全分布式的系统,节点关系是完全对等的。所有的任务都是通过节点之间的协作来完成。因此P2P技术可以有效提高网络的计算能力和带宽利用率。正是由于这个优势,P2P技术得到了广泛的应用,目前的互联网中已有50%~80%的流量来自于P2P程序。
     然而P2P技术还存在着一些缺陷,其中最大的问题是NAT阻止了外部网络主机的连接请求,导致大多数P2P程序只能在局域网内部通信。针对该问题,本文尝试研究基于混合式P2P网络的NAT穿越技术,试图有效克服P2P技术的不足,以进一步提高网络的计算能力和带宽。本文研究在混合式P2P网络模型之上,使用ICE穿越技术,融合STUN直连和TURN中转两种穿越方式,对传统ICE穿越方案进行改进,并将改进后的方案应用到实际开发的远程家教系统中。远程家教系统的成功应用验证了本文所提出的NAT穿越方案的有效性。
The rapid development of Internet technology has put forward higher requirements to the computing power and bandwidth, which depend on a few servers in traditional Internet technology. Peer-to-Peer (P2P) networks technology can use the computing power and network bandwidth of the participants effectively, instead of entirely dependenting on the servers, which breaks the traditional C/S mode:some provide services and the other receive services. P2P networks are fully distributed system and the relationship of the nodes in the networks is completely equal, compared to the traditional C/S architecture. All tasks are completed by the collaboration of the nodes in the P2P networks. Therefore, the P2P technology can improve the computing power and the utilization of network bandwidth effectively. As a result of this, the P2P technology has been widely used in the current Internet, and 50% to 80% of the traffic comes from the P2P programs.
     However, there are still some shortcomings of the P2P technology, in which the biggest one is that the NAT prevents the connection request of the external network host, so that most of the P2P programs can only communicate within the LAN. In order to solve this problem, this paper attempts to study the hybrid P2P network based on NAT traversal technology, tries to overcome the deficiencies of P2P technology, and further enhances the computing power and network bandwidth. Based on the ICE technology, this paper integrates the direct connection of STUN and the transfer connection of TURN, proposes an interactive NAT traversal solution and applies to the actual developed remote tutoring system. The successful application of remote tutoring system verifies the effectiveness of the proposed NAT traversal in this paper.
引文
[1]胡懋智,徐恪,夏树涛,叶明江.TOW:一种新的P2P实时流媒体缓存替换算法[J].小型微型计算机系统,2009,30:1484-1489.
    [2]朱桂明,金士尧,郭得科,韦海亮SOSC一种基于自组织语义聚类的P2P查询路由算法[J].计算机学报,2011,48(5):736-745.
    [3]高磊,曾广周.SAN-EBON:一种基于结构化对等网的P2P工作流系统节点定位网络[J].计算机学报,2010,33:2353-2363.
    [4]孙伟峰,富童,刘铁星,覃振权.PeerDetector:一种基于连接模式的P2P流检测算法[J].2011,32:1972-1977.
    [5]毛军鹏,崔艳莉,黄建华,张建标.P2P网络资源负载模型研究[J].小型微型计算机系统,2010,31:215-219.
    [6]林可,杨珉,毛迪林.局域网下的P2P流媒体直播性能优化方案[J].小型微型计算机系统,2011,32:1281-1286.
    [7]MATHIEU B,PARIS P. A topology-aware P2P video streaming system[J]. Information Infrastructure Symposium,2009. GIIS'09. Global on 2009,6,23-26:1-8.
    [8]田俊峰,田瑞.基于领域和贝叶斯网络的P2P电子商务细粒度信任模型[J].计算机研究与发展,2011,48(6):974-982.
    [9]肖尚勤,卢正鼎,凌贺飞,邹复好.基于P2P系统信任机制的DRM模型[J].计算机研究与发展,2007,44(4):567-573.
    [10]刘义春,张焕国.基于Bayesian信任网络的P2P访问控制[J].小型微型计算机系统,2011,32:1059-1063.
    [11]黄宇,金蓓弘.非结构化P2P系统Overlay优化技术综述[J].小型微型计算机系统,2008,129:238-244.
    [12]TLILI M, AKBARINIA R.,PACITTI E.,et al. Scalable P2P Reconciliation Infrastructure for Collaborative Text Editing[J]. Advances in Databases Knowledge and Data Applications (DBKDA), 2010 Second International Conference on 2010,4,11-16:155-164.
    [13]王嵩,凌青,吴刚,郑烇.多级P2P架构VOD系统中分布式节点的设计与实现[J].小型微型计算机系统,2011,32:691-695.
    [14]陈志刚,霍英.对等网中一种具有激励效用的超节点选取机制[J].小型微型计算机系统,2011,32:1837-1840.
    [15]庄宏,许胤龙,胡燏翀,林晓斌.一种P2P和ISPs协作的P2P节点选择机制[J].小型微型计算机系统,2011,7(32):1260-1266.
    [16]ALHAISONI, M.LIOTTA A, GHANBARI M. Resource trade-off in P2P streaming[J]. Packet Video Workshop,2009. PV 2009.17th International on 2009,5,11-12:1-8.
    [17]沈时军,李三立.一个真实VoD/P2P系统Novasky的设计与实现[J].小型微型计算机系统,2011,6(32):1041-1048.
    [18]黄远强,栾钟治,钱德沛.一种面向大规模P2P环境的成员管理机制[J].计算机研究与发展,2011,48(7):1225-1236.
    [19]吴晨刚,金志刚,赵西满,王佳.一种实时纠错的P2P模式网络立体电视播放系统.小型微型计算机系统,2011,8(32):1526-1529.
    [20]袁泉,霍剑青,王晓蒲.异构环境通用CSCW系统模型与体系结构的设计与实现[J].小型微型计算机系统,2011,7(32):1456-1460.
    [21]周明,王太勇.因特网上基于对等网络的服务网格平台构建[J].小型微型计算机系统,2011,5(32):887-1890.
    [22]雷迎春,程实,吴产乐,龚奕利,康勍.应用网络编码的P2P内容分发[J].计算机研究与发展,2009,46(1):108-119.
    [23]方绍强,卫克,陈伟鹏,等.基于ARENA的UML建模及其在飞行保障中的应用[J].2008,20(11):3020-3027.
    [24]陆公正,吴澜波,张广泉.定义及验证UML Statechart图中的数据流语义[J].计算机工程与应用,2009,45(24):56-59.
    [25]赵莉苹,张海涛.基于UML-OCPN的嵌入式系统建模[J].计算机工程,2009,35(20):56-58.
    [26]李春亮,彭黎,黎潇,等.基于UML的SMP2模型设计方法研究[J].系统仿真学报,2011,23(6):1195-1199.
    [27]于明钊,刘文印,张宏江,等.应用对象过程图扩展UML建模环境[J].软件学报.2002,13(4):698-705.
    [28]HOC.Y, WANG F.Y, TSENG C.C, et al. NAT-compatibility testbed:an environment to automatically verify direct connection rate [J]. IEEE Communications Letters,2011,15(1):4-6.
    [29]吴贤国,刘敏,李忠诚.面向NAT用户的IPv6隧道技术研究[J].计算机学报,2007,30(1):1-9.
    [30]彭近兵,龙翔,高小鹏,等.一种新的IPSEC穿越NAT方法[J].北京航空航天大学学报,2007,33(1):63-66.
    [31]邓勇,屈玉贵,赵保华,等.一种SIP穿越NAT的解决方案[J].小型微型计算机系统,2007,28(5):769-773.
    [32]刘胜辉,周野.对ICE穿越Symmetric NAT技术的改进[J].计算机工程与应用,2010,46(3):109-111.
    [33]任浩,王劲林,鲁逸峰.UPnP和STUN相结合的NAT穿越技术研究[J].计算机工程与应用,2009,45(2):99-101.
    [34]张凯,钱焕延,徐延贵.混合型网络中蠕虫的传播研究[J].计算机工程与应用,2009,45(2):14-20.
    [35]秦勇,叶建锋,梁活民,等.一种IP分组重组的集群并行计算的方法[J].计算机工程与应用,2008,44(17):104-114.
    [36]郑伟平,齐德昱,向军,等.流媒体分发体系结构演化和关键技术进展综述[J].小型微型计算机系统,2010,1(1):73-82.
    [37]MULLER A, CARLE G, KLENK A. Behavior and classification of NAT devices and implications for NAT traversal [J]. IEEE Network,2008,22(5):14-19.
    [38]LIN Y D, TSENG C C, HO C Y, et al. How NAT-compatible are VoIP applications [J]. IEEE Communications Magazine,2010,48(12):58-65.
    [39]PARK C, JEONG K, KIM S, LEE Y. NAT issues in the remote management of home network devices [J]. IEEE Network,2008,22(5):48-55.
    [40]ZOLTAN M, HELENE W. The many meanings of UML 2 Sequence Diagrams:a survey [J]. Software and Systems Modeling,2011,10(4):489-514.
    [41]王汝传,黄海平,王海艳.基于联合签名机制的多移动代理系统MMAS的UML建模[J].通信学报,2004,25(2):23-29.
    [42]李留英,王戟,齐治昌.UML Statechart图的操作语义[J].软件学报,2001,12(12):1864-1873.
    [43]崔萌,李宣东,郑国梁.UML实时活动图的形式化分析[J].计算机学报,2004,27(3):339-346.
    [44]程亮,张阳.基于UML和模型检测的安全模型验证方法[J].计算机学报,2009,32(4):699-708.
    [45]王晓博,王欢,刘超.UML类图层次化自动布图算法[J].软件学报,2009,20(6):1487-1498.
    [46]BERNHARD R, ROBERT F. Variability in UML language and semantics [J]. Software and Systems Modeling,2011,10(4):439-440.
    [47]RUBEN C, ANGEL C, ALBERT A, et al. A collaborative P2P scheme for NAT traversal server discovery based on topological information [J]. Computer Networks.2010,54(12):2071-2085.
    [48]李书豪,云晓春,郝志宇,翟立东.MRRbot:基于冗余机制的多角色P2P僵尸网络模型[J].计算机研究与发展,2011,48(8):1488-1496.
    [49]黄德才,翁挺,龚卫华,朱凌.P2P环境下基于Vague集理论的主观信任模型研究[J].小型微型计算机系统,2011,32:1181-1187.
    [50]陈昊,李之棠,王斌斌,李冬.P2P僵尸控制行为识别技术研究[J].小型微型计算机系统.2011,32:647-650.
    [51]冯景瑜,张玉清,陈深龙,付安民.P2P声誉系统中GoodRep攻击及其防御机制[J].计算机研究与发展,2011,48(8):1473-1480.
    [52]乐光学,李仁发,陈志,周旭.P2P网络中搭便车行为分析与抑制机制建模[J].计算机研究与发展,2011,48(3):382-397.
    [53]付志鹏,王怀民,史殿习,邹鹏.对等网络的抖动特性研究综述[J].计算机学报,2011,34:1563-1576.
    [54]Ha, D.T.,Guanhua Yan, EIDENBENZ, S. On the effectiveness of structural detection and defense against P2P-based botnets[J]. Dependable Systems & Networks,2009. DSN'09:297-306.