P2P 之 UDP穿透NAT的原理與實現(附源代碼) 原創:shootingstars 參考:http://midcom-p2p.sourceforge.net/draft-ford-midcom-p2p-01.txt baidu 論壇上經常有對P2P原理的討論,但是討論歸討論,很少有實質的東西產生(源代碼)。呵呵,在這里我就用自己實現的一個源代碼來說明UDP穿越NAT的原理。 首先先介紹一些基本概念: NAT(Network Address Translators),網絡地址轉換:網絡地址轉換是在IP地址日益缺乏的情況下產生的,它的主要目的就是為了能夠地址重用。NAT分為兩大類,基本的NAT和NAPT(Network Address/Port Translator)。 最開始NAT是運行在路由器上的一個功能模塊。 最先提出的是基本的NAT,它的產生基于如下事實:一個私有網絡(域)中的節點中只有很少的節點需要與外網連接(呵呵,這是在上世紀90年代中期提出的)。那么這個子網中其實只有少數的節點需要全球唯一的IP地址,其他的節點的IP地址應該是可以重用的。 因此,基本的NAT實現的功能很簡單,在子網內使用一個保留的IP子網段,這些IP對外是不可見的。子網內只有少數一些IP地址可以對應到真正全球唯一的IP地址。如果這些節點需要訪問外部網絡,那么基本NAT就負責將這個節點的子網內IP轉化為
標簽: draft-ford-midcom shootingstars sourceforge midcom-p
上傳時間: 2015-12-08
上傳用戶:kernaling
The Microsoft® Active Directory™ Service Interfaces (ADSI) Software Development Kit (SDK) is a client-side product, based on the Component Object Model (COM), that defines a directory service model and a set of COM interfaces that enables Microsoft Windows NT® /Windows® 2000 and Windows 95 client applications to access several network directory services.
標簽: Development Interfaces Microsoft Directory
上傳時間: 2013-12-25
上傳用戶:daguda
In addition to all the people who contributed to the first edition, we would like to thank the following individuals for their generous help in writing this edition. Very special thanks go to Jory Prather for verifying the code samples as well as fixing them for consistency. Thanks to Dave Thaler, Brian Zill, and Rich Draves for clarifying our IPv6 questions, Mohammad Alam and Rajesh Peddibhotla for help with reliable multicasting, and Jeff Venable for his contributions on the Network Location Awareness functionality. Thanks to Vadim Eydelman for his Winsock expertise. And finally we would like to thank the .NET Application Frameworks team (Lance Olson, Mauro Ottaviani, and Ron Alberda) for their help with our questions about .NET Sockets.
標簽: the contributed addition to
上傳時間: 2015-12-17
上傳用戶:dongqiangqiang
This code was used to produce simulation results described in: Using Directional Antennas to Prevent Wormhole Attacks Lingxuan Hu and David Evans. Network and Distributed System Security Symposium, San Diego, 5-6 February 2004.
標簽: Directional simulation described Antennas
上傳時間: 2014-12-06
上傳用戶:xieguodong1234
The present document specifies the CAMEL Application Part (CAP) supporting the fourth phase of the network feature Customized Applications for Mobile network Enhanced Logic. CAP is based on a sub-set of the ETSI Core INAP CS-2 as specified by ETSI EN 301 140 1 [26]. Descriptions and definitions provided by ETSI EN 301 140 1 [26] are directly referenced by this standard in the case no additions or clarifications are needed for the use in the CAP.
標簽: the Application supporting specifies
上傳時間: 2015-12-24
上傳用戶:84425894
With User Mode Linux you can create virtual Linux machines within a Linux computer and use them to safely test and debug applications, network services, and even kernels. You can try out new distributions, experiment with buggy software, and even test security. Now, for the first time, the creator and maintainer of User Mode Linux shows how to put it to work hands-on. Jeff Dike covers everything from getting started through running enterprise-class User Mode Linux servers. You ll find authoritative advice on bootup, compilation, administration, specialized configurations, and much more.
標簽: Linux computer machines virtual
上傳時間: 2013-12-19
上傳用戶:xinzhch
This a journal paper on the optimization of Max Connection problem in a telecommunication optical network.
標簽: telecommunication optimization Connection journal
上傳時間: 2015-12-27
上傳用戶:xaijhqx
如果有人搞網絡協議仿真,想必一定聽過NS2這個仿真軟件,小弟這里真好有《NS and Network Simulation》書后源碼
上傳時間: 2016-01-06
上傳用戶:Altman
《Linux程序設計權威指南》源代碼,包含: awk copyright curses cvs debug framebuffer gnome gnutools gtk i18n kde manual motif network newt qt regexp rpm shell style svgalib system thread xlib ya
上傳時間: 2016-01-07
上傳用戶:tyler
CCISP考試指南與導讀 CISSP STUDY NOTES FROM CISSP PREP GUIDE 1 DOMAIN 1 – SECURITY MANAGEMENT PRACTICES 2 DOMAIN 2 – ACCESS CONTROL SYSTEMS 7 DOMAIN 3 – TELECOM AND NETWORK SECURITY 13 DOMAIN 4 – CRYPTOGRAPHY 34 DOMAIN 5 – SECURITY ARCHITECTURE AND MODELS 46 DOMAIN 6 – OPERATIONS SECURITY 56 DOMAIN 7 – APPLICATIONS AND SYSTEM DEVELOPMENT 63 DOMAIN 8 – BUSINESS CONTINUITY AND DISASTER RECOVERY PLANNING 70 DOMAIN 9 – LAW, INVESTIGATION AND ETHICS 78 DOMAIN 10 – PHYSICAL SECURITY 87
標簽: CISSP MANAGEMENT PRACTICES SECURITY
上傳時間: 2014-02-13
上傳用戶:sy_jiadeyi