[go: up one dir, main page]

CN1300721C - Method for realizing peer-to-peer network system architecture - Google Patents

Method for realizing peer-to-peer network system architecture Download PDF

Info

Publication number
CN1300721C
CN1300721C CNB021134928A CN02113492A CN1300721C CN 1300721 C CN1300721 C CN 1300721C CN B021134928 A CNB021134928 A CN B021134928A CN 02113492 A CN02113492 A CN 02113492A CN 1300721 C CN1300721 C CN 1300721C
Authority
CN
China
Prior art keywords
entity
peer
entities
online
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB021134928A
Other languages
Chinese (zh)
Other versions
CN1447256A (en
Inventor
鄢萍
刘飞
贺德强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CHONGQING HAITEKE SYSTEM INTEGRATION Co Ltd
Chongqing University
Original Assignee
CHONGQING HAITEKE SYSTEM INTEGRATION Co Ltd
Chongqing University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CHONGQING HAITEKE SYSTEM INTEGRATION Co Ltd, Chongqing University filed Critical CHONGQING HAITEKE SYSTEM INTEGRATION Co Ltd
Priority to CNB021134928A priority Critical patent/CN1300721C/en
Publication of CN1447256A publication Critical patent/CN1447256A/en
Application granted granted Critical
Publication of CN1300721C publication Critical patent/CN1300721C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Landscapes

  • Computer And Data Communications (AREA)

Abstract

一种对等网络体系结构实现方法,该体系结构中的对等网络建立在TCP/IP协议之上,由抽象的对等实体之间组成无层次结构的逻辑网络,实体之间的地位完全平等,每个实体既作为向其它实体提供服务的服务器,又作为使用其它实体所提供服务的客户端,实体的具体实现形式为在计算机上运行的特定软件实例或专用的信息终端设备。本方法在正常的网络形态和具有防火墙或NAT路由器的网络中均能实现无中心交换机或中心服务器的轻负荷的对等网络结构,并可以使任何该类型的实体连接上网后通过认证可以立即获知其它相关实体是否在线,并通知已在线的实体,告知本实体已在线的信息。

Figure 02113492

A method for implementing a peer-to-peer network architecture. The peer-to-peer network in this architecture is established on top of the TCP/IP protocol, and a logical network without a hierarchical structure is formed between abstract peer entities, and the status of the entities is completely equal. , each entity acts as a server providing services to other entities, and as a client using services provided by other entities. The specific implementation form of an entity is a specific software instance running on a computer or a dedicated information terminal device. This method can realize a light-load peer-to-peer network structure without a central switch or a central server in a normal network form and a network with a firewall or a NAT router, and can make any entity of this type immediately know through authentication after connecting to the Internet Whether other relevant entities are online or not, and notify the online entities to inform the entity that they are online.

Figure 02113492

Description

一种对等网络体系结构实现方法A Realization Method of Peer-to-Peer Network Architecture

一、技术领域1. Technical field

本发明涉及到网络与通讯技术领域,具体涉及一种对等网络体系结构的实现方法。The invention relates to the field of network and communication technology, and in particular to a method for realizing a peer-to-peer network architecture.

二、背景技术2. Background technology

所谓对等网络(P2P,peer-to-peer)是一种用于不同PC用户之间,不经过服务器直接交换数据或服务的技术,它允许Internet用户直接使用对方的资源或直接进行交流。每个联网用户可以直接连接到其他用户的计算机上,并进行数据的交换,而不需要连接到服务器上再进行浏览与下载。因为消除了中间环节,对等网络技术使得网络上的沟通变得更快速、更直接。The so-called peer-to-peer network (P2P, peer-to-peer) is a technology used to directly exchange data or services between different PC users without going through a server. It allows Internet users to directly use each other's resources or communicate directly. Each networked user can directly connect to other users' computers and exchange data without connecting to the server for browsing and downloading. Peer-to-peer network technology makes communication on the network faster and more direct because of the elimination of intermediate links.

目前可以实现对等网络技术的软件国外有Napstere及ICQ,国内有OICQ、Ezpeer等,其中Ezpeer的具体的运作方式为:首先,所有安装了Ezpeer软件的用户均会登陆Ezpeer的服务器,服务器即可掌握各电脑所储藏的档案资料;当某一用户连入Internet时,即可看到装有此一软件的所有其它连网用户及其共享信息,当输入欲搜寻的关键词后,Ezpeer服务器会寻找其他储存此类文件的电脑资料,然后显示在此用户的搜寻结果中,用户随即可从其他用户的电脑上直接下传所需的资料。整个资料的传递仅在用户的电脑之间进行,并无须经过Ezpeer的服务器,但用户之间的连接不是直接的,需要有位于中心的服务器来协调。At present, the software that can realize peer-to-peer network technology includes Napstere and ICQ in foreign countries, and OICQ and Ezpeer in China. The specific operation mode of Ezpeer is as follows: First, all users who have installed Ezpeer software will log in to the Ezpeer server, and the server can be Grasp the file data stored in each computer; when a user connects to the Internet, he can see all other networked users who have installed this software and their shared information. After entering the keywords to be searched, the Ezpeer server will Find other computer data storing such files, and then display them in this user's search results, and the user can then directly download the required data from other users' computers. The transmission of the entire data is only carried out between users' computers, without going through Ezpeer's server, but the connection between users is not direct, and a central server is needed for coordination.

现有的相关发明已有一些,但与本发明有着根本区别。如发明专利“用于下载的程序之间的保密对等通信的系统和方法(公告号:1163433)”是用于在来自同一保密域、但运行在第一和第二计算机上的计算机程序之间建立对等通信联系的系统和方法,其对等通讯的建立过程为:第一计算机程序在第一计算机上运行,同时发送一条信息到第二计算机,请求建立对等通信联系。当在第二计算机上收到该信息时,第二计算机确定是否有一个满足建立对等通信联系的预定条件的第二计算机程序运行在第二计算机上,如果是,第二计算机向第一计算机发送一条接受该请求的回答信息。当第一计算机收到该回答信息后,所请求的在第一和第二计算机程序之间的对等通信联系即被建立。上述对等网络软件及方法在具体实现时或者通过电信公司的P2P服务器以ASP的方式实现或者通过企业自己在电信公司的IDC中架设P2P服务器来实现,所以它们并不是完全对等,只是减轻了服务器的负担,并不能完全脱离服务器,且不能穿透防火墙和NAT路由器,同时还存在信任和安全问题。There are some existing related inventions, but they are fundamentally different from the present invention. For example, the invention patent "System and method for secure peer-to-peer communication between downloaded programs (publication number: 1163433)" is used to communicate between computer programs from the same security domain but running on the first and second computers A system and method for establishing a peer-to-peer communication relationship between peers. The peer-to-peer communication establishment process is as follows: the first computer program runs on the first computer, and at the same time sends a message to the second computer, requesting to establish a peer-to-peer communication relationship. When receiving this information on the second computer, the second computer determines whether there is a second computer program that meets the predetermined conditions for establishing a peer-to-peer communication connection to run on the second computer, and if so, the second computer sends a message to the first computer Send a reply message accepting the request. When the response message is received by the first computer, the requested peer-to-peer communication link between the first and second computer programs is established. The above-mentioned peer-to-peer network software and method are implemented either through the P2P server of the telecommunications company in the form of ASP or through the enterprise's own P2P server in the IDC of the telecommunications company. The burden on the server cannot be completely separated from the server, and it cannot penetrate firewalls and NAT routers. At the same time, there are trust and security issues.

三、发明内容3. Contents of the invention

本发明针对上述现有技术的不足之处,提出了一种对等网络体系结构实现方法,本发明解决其技术问题所采用的技术方案是:The present invention proposes a kind of peer-to-peer network system structure realization method at the weak point of above-mentioned prior art, the technical scheme that the present invention adopts to solve its technical problem is:

该体系结构中的对等网络建立在TCP/IP协议之上,由抽象的对等实体之间组成无层次结构的逻辑网络,实体之间的地位完全平等,每个实体既作为向其它实体提供服务的服务器,又作为使用其它实体所提供服务的客户端,实体的具体实现形式为在计算机上运行的特定软件实例或专用的信息终端设备。The peer-to-peer network in this architecture is established on top of the TCP/IP protocol, and a logical network without hierarchical structure is formed between abstract peer entities. The server of the service acts as a client using the services provided by other entities, and the specific implementation form of the entity is a specific software instance running on a computer or a dedicated information terminal device.

实体之间建立对等网络的步骤如下:(1)新连接到网络中的实体A,通过UDP端口向本实体的已在线实体名单中的其中之一实体B,发出表示本实体A已在线的通知信息。(2)收到该信息的实体B,向发出信息的实体A返回一个应答,确认收到该信息,同时向其发出一个数据包,其内容为实体B所有知道的已在线实体名称;(3)实体A将所收到的名单加入本实体的已在线实体名单;(4)实体B将实体A加入本实体的已在线实体名单;(5)实体A从已在线实体名单中选取下一个已在线实体,并重复上述四个步骤,直至与所有已在线实体完成上述通信过程。The steps for establishing a peer-to-peer network between entities are as follows: (1) Entity A, which is newly connected to the network, sends a message indicating that entity A is online to one of entity B in the online entity list of this entity through a UDP port. notification information. (2) The entity B receiving the information returns a response to the entity A that sent the information, confirming the receipt of the information, and at the same time sends a data packet to it, the content of which is the name of all online entities that entity B knows; (3 ) Entity A adds the received list to the entity's online entity list; (4) Entity B adds entity A to the entity's online entity list; (5) Entity A selects the next online entity list from the online entity list online entities, and repeat the above four steps until the above communication process is completed with all online entities.

网络实体之间通信步骤如下:(1)当实体A需要与实体B通信时,实体A向实体B发出一个通信请求;(2)收到该信息的实体B向发出信息的实体A返回一个应答,确认收到该信息;(3)实体A与实体B协商确定由其中一方作为服务器,另一端作为客户端,其选择原则为:若实体A和实体B均在同一透明网络环境中,中间没有隔离防火墙,则实体B作为服务器,实体A作为客户端;若有且只有其中一个实体处于防火墙之后,则未处于防火墙之后的实体作为服务器,处于防火墙之后的实体作为客户端;若双方均处于防火墙之后且分属于不同的防火墙,则请求一未处于防火墙之后的实体C作为服务代理,实体B作为服务器,其服务由实体C代理,实体A作为客户端;(4)实体B与实体A间以服务器与客户机方式进行通信。(5)通信内容传输完毕后,由实体A发起拆除服务请求,实体B应答,通信过程结束。The communication steps between network entities are as follows: (1) When entity A needs to communicate with entity B, entity A sends a communication request to entity B; (2) entity B that receives the information returns a response to entity A that sent the information , to confirm receipt of the information; (3) Entity A negotiates with entity B to determine that one of them will be the server and the other end will be the client. The selection principle is: if entity A and entity B are in the same transparent network environment, there is no If the firewall is isolated, entity B acts as the server, and entity A acts as the client; if there is only one entity behind the firewall, the entity not behind the firewall acts as the server, and the entity behind the firewall acts as the client; if both parties are behind the firewall Afterwards and belonging to different firewalls, request an entity C that is not behind the firewall as a service agent, entity B as a server, its service is represented by entity C, and entity A as a client; (4) between entity B and entity A The server communicates with the client. (5) After the transmission of the communication content is completed, entity A initiates a teardown service request, entity B responds, and the communication process ends.

本发明中的实现方法在正常的网络形态和具有防火墙或NAT路由器的网络中均能实现无中心交换机或中心服务器的轻负荷的对等网络结构,并可以使任何该类型的实体连接上网后通过认证可以立即获知其它相关实体是否在线,并通知已在线的实体,告知本实体已在线的信息。从而可使各种联网企业与用户之间安全地进行信息交流与资源共享。The implementation method in the present invention can realize the light-load peer-to-peer network structure without a center switch or a center server in a normal network form and a network with a firewall or a NAT router, and can make any entity of this type connect to the Internet and pass through Authentication can immediately know whether other relevant entities are online, and notify the online entities to inform the entity that it is online. Thus, information exchange and resource sharing can be safely carried out between various networked enterprises and users.

本发明通过把认证、授权和加密三个要素结合在一起创建一个安全的对等网络体系结构。认证涉及到在一个网络(如因特网)中对等点向其他对等点认证它们自己;授权涉及到授予一个认证过的实体实施某些行为或访问某些资源的许可的过程。在一个对P2P应用中,一个对等点可能被认证为只可以访问另一个对等点的部分资源;加密涉及到把易理解的信息转化为一种对未授权的个人和系统来说难理解的形式的过程,解密是这一过程的逆过程。加密可以保护在一个不安全网络(如因特网)中的对等点间流动的信息,而这通过与每个对等点的安全认证结合在一起,可确保交换数据不会在通信中被窃听,如果信息是被数字签名过的或在其中加入了MAC(消息认证码),那么双方还能确定该信息没有被修改过。The invention creates a secure peer-to-peer network architecture by combining three elements of authentication, authorization and encryption. Authentication involves peers authenticating themselves to other peers in a network such as the Internet; authorization involves the process of granting an authenticated entity permission to perform certain actions or access certain resources. In a peer-to-peer application, a peer may be authenticated to only have access to a portion of another peer's resources; encryption involves converting intelligible information into a form that is incomprehensible to unauthorized individuals and systems The form of the process, decryption is the reverse process of this process. Encryption protects the information flowing between peers in an insecure network (such as the Internet), and this, combined with the security authentication of each peer, ensures that the exchanged data cannot be eavesdropped on the communication, If the message is digitally signed or has a MAC (Message Authentication Code) added to it, both parties can also be sure that the message has not been modified.

四、附图说明4. Description of drawings

下面结合附图和实施例对本发明作进一步说明。The present invention will be further described below in conjunction with drawings and embodiments.

图1是本发明中网络实体间建立对等网络的示意图。FIG. 1 is a schematic diagram of establishing a peer-to-peer network among network entities in the present invention.

图2是本发明中基于专有协议的端到端通讯流程图。Fig. 2 is a flow chart of the end-to-end communication based on the proprietary protocol in the present invention.

图3是本发明中处于不同防火墙内的网络实体间通讯过程流程图。Fig. 3 is a flow chart of the communication process between network entities in different firewalls in the present invention.

五、具体实施方式5. Specific implementation

实体(对等点)之间建立对等网络的步骤如图1所示:(1)新连接到网络中的实体A通过UDP端口向已在线实体名单中的其中之一实体B发出表示本实体A已在线的通知信息;(2)收到该信息的实体B向发出信息的实体A返回一个应答,确认收到该信息并要求实体A认证实体B,同时向其发出一个数据包,其内容为实体B所有知道的已在线实体名称。认证过程中实体A和实体B都用一个共享密钥交换秘密的信息;(3)实体A对实体B进行认证后,将所收到的名单加入实体A的已在线实体名单并要求实体B认证实体A;(4)实体B对实体A进行认证后,将实体A加入本实体的已在线实体名单,并通过分配给实体A特权的方式来授权实体A访问某些资源;(5)在进一步的通信发生之前,这两个对等点可以协商加密它们之间的通道连接。然后,实体A从已在线实体名单中选取下一个已再线实体,并重复上述四个步骤,直至与所有已在线实体完成上述对等网络连接。The steps for establishing a peer-to-peer network between entities (peer points) are shown in Figure 1: (1) Entity A newly connected to the network sends a message to one of the entity B in the online entity list through the UDP port to indicate that this entity A notification message that A is online; (2) The entity B that received the message returns a response to the entity A that sent the message, confirming the receipt of the message and asking entity A to authenticate entity B, and at the same time send a data packet to it, the content of which is Names of all online entities known to entity B. During the authentication process, both entity A and entity B exchange secret information with a shared key; (3) after entity A authenticates entity B, it adds the received list to entity A's online entity list and requires entity B to authenticate Entity A; (4) After Entity B authenticates Entity A, Entity A is added to the entity's online entity list, and Entity A is authorized to access certain resources by assigning Entity A privilege; (5) In further Before the communication takes place, the two peers can negotiate to encrypt the channel connection between them. Then, entity A selects the next online entity from the online entity list, and repeats the above four steps until the above-mentioned peer-to-peer network connection is completed with all online entities.

对等实体间内容的验证采用基于数字签名的机制,其过程为:(1)如图1所示,实体A和实体B建立了一个安全的连接;(2)在它们建立好通道后,实体A向实体B要求一个内容,如果实体B创建了该内容,它就会在传送该内容之前为其数字签名,如果实体B只是发布在别处创建的内容,那么该内容是已经被签名过的;(3)在实体A收到内容后,它将验证附在内容上的数字签名。The verification of content between peer entities adopts a mechanism based on digital signatures, and the process is as follows: (1) As shown in Figure 1, entity A and entity B establish a secure connection; (2) after they have established a channel, entities A requests a content from entity B. If entity B creates the content, it will digitally sign the content before transmitting it. If entity B just publishes the content created elsewhere, then the content has already been signed; (3) After entity A receives the content, it will verify the digital signature attached to the content.

本发明中所提出的建立在TCP/IP上的专有协议(Firewall Special Protocol,FSP)可以使防火墙后的实体能够不受限制地运行各种端到端的应用。其核心技术是TCP/IP数据包的再封装,下面介绍基于此协议的端到端通讯过程:如图2所示,首先,位于防火墙外的实体A上的应用程序向位于防火墙内的实体B发送一个网络请求,经过网络层后,数据包由本地的FSP软件处理,经过编码和封装成为一个HTTP数据包,然后发送到HTTP/TCP/IP通道,经由80端口通过防火墙到达实体B。在实体B,数据包先通过HTTP/TCP/IP通道送交以上FSP软件,经过解码后插入本实体的网络协议栈,最后到达实体B的应用程序,就像没有经过防火墙一样。在FSP中,每个TCP/IP包都以HTTP的GET请求或回应GET请求消息的形式出现,因而在通过防火墙时不会造成兼容性问题。IP包经过MIME编码成为HTTP消息体,而TCP包头信息被分析后编码到HTTP头信息中。其中数据包被定义为由信封和正文组成的任意大小的束。信封是标准格式,它包括:报头、源端点信息(URI格式)、目的地端点信息(URI格式)、消息摘要(用于安全性目的),消息正文的长度是任意的,包含一个可选的信任状(用于安全性目的)和内容。The proprietary protocol (Firewall Special Protocol, FSP) based on TCP/IP proposed in the present invention can enable entities behind the firewall to run various end-to-end applications without restriction. Its core technology is the re-encapsulation of TCP/IP data packets. The following describes the end-to-end communication process based on this protocol: As shown in Figure 2, first, the application program on entity A located outside the firewall communicates with entity B located inside the firewall. Send a network request. After passing through the network layer, the data packet is processed by the local FSP software, encoded and encapsulated into an HTTP data packet, and then sent to the HTTP/TCP/IP channel, and then reaches entity B through the firewall through port 80. In entity B, the data packet is first sent to the above FSP software through the HTTP/TCP/IP channel, after being decoded, it is inserted into the network protocol stack of the entity, and finally reaches the application program of entity B, as if it has not passed through the firewall. In FSP, each TCP/IP packet appears in the form of HTTP GET request or response GET request message, so it will not cause compatibility problems when passing through the firewall. The IP packet is encoded into the HTTP message body through MIME, and the TCP header information is analyzed and encoded into the HTTP header information. where a packet is defined as an arbitrarily sized bundle consisting of an envelope and a body. The envelope is a standard format, which includes: header, source endpoint information (URI format), destination endpoint information (URI format), message digest (for security purposes), the length of the message body is arbitrary, and contains an optional Credentials (for security purposes) and content.

本发明的具体实施例是在网络化的产品协同开发中的应用,如图3所示,企业1和企业2都组建有自己的局域网,且通过防火墙与外界的广域网相连,安装有实现FSP协议应用软件的计算机A和计算机B分别属于局域网1与局域网2。计算机A和计算机B根据本发明中的方法建立对等网络的体系结构:因双方均处于防火墙之后且分属于不同的防火墙,则计算机A请求一未处于防火墙之后的联网计算机C作为服务代理,计算机B作为服务器,其服务由计算机C代理,计算机A作为客户端。计算机B与计算机A之间以服务器与客户机方式进行对等通信。当计算机A和计算机B的通讯过程建立后,双方用户在产品协同设计过程中只需把自己的各种设计文档保存或拖放到本机共享文件夹中,对方就可以对这些文件进行访问,同时双方用户还可以进行实时网上交流。企业1和企业2内的各部门、业务伙伴之间都可以通过以上方法建立起对等网络关系,而不通过服务器直接共享和传输数据、文件、信息、代码或多媒体信息等。The specific embodiment of the present invention is the application in the collaborative development of networked products, as shown in Figure 3, both enterprise 1 and enterprise 2 have set up their own local area network, and are connected with the wide area network of the outside through the firewall, and are installed with FSP agreement Computer A and computer B of the application software belong to LAN 1 and LAN 2, respectively. Computer A and computer B set up the architecture of peer-to-peer network according to the method among the present invention: because both sides are all behind the firewall and belong to different firewalls, then computer A requests a networked computer C that is not behind the firewall as a service agent, and the computer B acts as a server whose services are proxied by computer C, and computer A acts as a client. The peer-to-peer communication between computer B and computer A is carried out in the way of server and client. After the communication process between computer A and computer B is established, the users of both parties only need to save or drag and drop their various design documents into the shared folder of the computer during the product collaborative design process, and the other party can access these files. At the same time, both users can also communicate online in real time. All departments and business partners in Enterprise 1 and Enterprise 2 can establish a peer-to-peer network relationship through the above methods, without directly sharing and transmitting data, files, information, codes or multimedia information through servers.

Claims (1)

1、一种对等网络体系结构实现方法,该方法实现的对等网络建立在TCP/IP协议之上,由抽象的对等实体之间组成无层次结构的逻辑网络,实体之间的地位完全平等;每个实体既作为向其它实体提供服务的服务器,又作为使用其它实体所提供服务的客户端;实体的具体实现形式为在计算机上运行的特定软件实例或专用的信息终端设备;其特征在于:1. A method for implementing a peer-to-peer network architecture. The peer-to-peer network realized by the method is established on the TCP/IP protocol, and a logical network without a hierarchical structure is formed between abstract peer entities, and the status between entities is completely Equality; each entity serves as a server providing services to other entities, and as a client using services provided by other entities; the specific implementation form of an entity is a specific software instance running on a computer or a dedicated information terminal device; its characteristics in: I、实体之间建立对等网络的步骤如下:I. The steps to establish a peer-to-peer network between entities are as follows: (1)新连接到网络中的实体A,通过UDP端口向本实体的已在线实体名单中的其中之一实体B,发出表示本实体A已在线的通知信息;(1) The entity A newly connected to the network sends a notification message indicating that the entity A is online to one of the entities B in the entity's online entity list through the UDP port; (2)收到该信息的实体B,向发出信息的实体A返回一个应答,确认收到该信息,同时向其发出一个数据包,其内容为实体B所有已知道的已在线实体名称;(2) The entity B receiving the information returns a response to the entity A that sent the information, confirming the receipt of the information, and at the same time sends a data packet to it, the content of which is the name of all known online entities of the entity B; (3)实体A将所收到的名单加入本实体的已在线实体名单;(3) Entity A adds the received list to its online entity list; (4)实体B将实体A加入本实体的已在线实体名单;(4) Entity B adds entity A to its online entity list; (5)实体A从已在线实体名单中选取下一个已在线实体,并重复上述四个步骤,直至与所有已在线实体完成上述通信过程;(5) Entity A selects the next online entity from the online entity list, and repeats the above four steps until the above communication process is completed with all online entities; II、网络实体之间通信步骤如下:II. The communication steps between network entities are as follows: (1)当实体A需要与实体B通信时,实体A向实体B发出一个通信请求;(1) When entity A needs to communicate with entity B, entity A sends a communication request to entity B; (2)收到该信息的实体B向发出信息的实体A返回一个应答,确认收到该信息;(2) The entity B receiving the information returns a response to the entity A that sent the information, confirming the receipt of the information; (3)实体A与实体B协商确定由其中一方作为服务器,另一端作为客户端,其选择原则为:若实体A和实体B均在同一透明网络环境中,中间没有隔离防火墙,则实体B作为服务器,实体A作为客户端;若有且只有其中一个实体处于防火墙之后,则未处于防火墙之后的实体作为服务器,处于防火墙之后的实体作为客户端;若双方均处于防火墙之后且分属于不同的防火墙,则请求一未处于防火墙之后的实体C作为服务代理,实体B作为服务器,其服务由实体C代理,实体A作为客户端;(3) Entity A negotiates with Entity B to determine that one of them will be the server and the other end will be the client. The selection principle is: if Entity A and Entity B are in the same transparent network environment and there is no isolation firewall in between, then Entity B will serve as The server, entity A as the client; if there is one and only one of the entities behind the firewall, the entity not behind the firewall acts as the server, and the entity behind the firewall acts as the client; if both parties are behind the firewall and belong to different firewalls , then request an entity C that is not behind the firewall as a service proxy, entity B as a server, its service is proxied by entity C, and entity A as a client; (4)实体B与实体A间以服务器与客户机方式进行通信;(4) Entity B communicates with entity A in a server-client manner; (5)通信内容传输完毕后,由实体A发起拆除服务请求,实体B应答,通信过程结束。(5) After the transmission of the communication content is completed, entity A initiates a teardown service request, entity B responds, and the communication process ends.
CNB021134928A 2002-03-21 2002-03-21 Method for realizing peer-to-peer network system architecture Expired - Fee Related CN1300721C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB021134928A CN1300721C (en) 2002-03-21 2002-03-21 Method for realizing peer-to-peer network system architecture

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB021134928A CN1300721C (en) 2002-03-21 2002-03-21 Method for realizing peer-to-peer network system architecture

Publications (2)

Publication Number Publication Date
CN1447256A CN1447256A (en) 2003-10-08
CN1300721C true CN1300721C (en) 2007-02-14

Family

ID=28048578

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB021134928A Expired - Fee Related CN1300721C (en) 2002-03-21 2002-03-21 Method for realizing peer-to-peer network system architecture

Country Status (1)

Country Link
CN (1) CN1300721C (en)

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7496955B2 (en) * 2003-11-24 2009-02-24 Cisco Technology, Inc. Dual mode firewall
US20060004837A1 (en) * 2004-06-30 2006-01-05 Genovker Victoria V Advanced switching peer-to-peer protocol
DE102004047370A1 (en) * 2004-09-29 2006-03-30 Siemens Ag Method for operating an ad hoc communication network and corresponding device
CN100401683C (en) * 2005-07-11 2008-07-09 华为技术有限公司 Reporting method between peer-to-peer resource admission control subsystem entities in the network
WO2007078789A2 (en) * 2005-12-15 2007-07-12 Lehman Brothers Inc. System and method for secure remote desktop access
CN101083581B (en) * 2006-05-30 2010-05-26 明基电通(上海)有限公司 Method and device for controlling multicast in self-organizing peer-to-peer network
US8533327B2 (en) * 2007-04-04 2013-09-10 Zte Corporation System and method of providing services via a peer-to-peer-based next generation network
CN101123610B (en) * 2007-09-13 2011-04-27 北京交通大学 A hybrid distributed overlay network device and its service registration method
CN101340457B (en) * 2008-08-29 2011-12-14 北京邮电大学 Peer-to-peer network starting method and system independent of central server
CN101534309B (en) 2009-04-14 2013-03-13 华为技术有限公司 A node registration method, a routing update method, a communication system and the relevant equipment
CN101834895B (en) * 2010-04-20 2013-03-06 南京邮电大学 Trust data management method in peer-to-peer network
CN105693508A (en) * 2016-03-01 2016-06-22 苏州艾缇克药物化学有限公司 Method for synthesizing 4-(4-phenylbutoxy) benzoic acid

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6144992A (en) * 1997-05-09 2000-11-07 Altiris, Inc. Method and system for client/server and peer-to-peer disk imaging
WO2001046843A2 (en) * 1999-12-21 2001-06-28 Tivo, Inc. Intelligent peer-to-peer system and method for collaborative suggestions and propagation of media

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6144992A (en) * 1997-05-09 2000-11-07 Altiris, Inc. Method and system for client/server and peer-to-peer disk imaging
WO2001046843A2 (en) * 1999-12-21 2001-06-28 Tivo, Inc. Intelligent peer-to-peer system and method for collaborative suggestions and propagation of media

Also Published As

Publication number Publication date
CN1447256A (en) 2003-10-08

Similar Documents

Publication Publication Date Title
TW480862B (en) Dynamic connection to multiple origin servers in a transcoding proxy
Johnston et al. Taking on webRTC in an enterprise
JP5239341B2 (en) Gateway, relay method and program
US9112875B2 (en) System and method for anonymous addressing of content on network peers and for private peer-to-peer file sharing
JP5797739B2 (en) Method and system for reliable protocol tunneling over HTTP
JP4727125B2 (en) Secure dual channel communication system and method through a firewall
US20090064300A1 (en) Application network appliance with built-in virtual directory interface
CN103563301B (en) Incoming Redirection Mechanism on Reverse Proxy
JP2005534106A (en) Implementation of e-commerce community networks and secure routing between and within communities
CN1300721C (en) Method for realizing peer-to-peer network system architecture
Farrell et al. AAA authorization requirements
Cabrera et al. An introduction to the web services architecture and its specifications
Selkirk Using XML security mechanisms
JP4950096B2 (en) Service providing system, service providing method, and service providing program
CN108366078A (en) The penetrating method and penetrating system of equipment under different NAT nodes
Ventura Diameter: Next generations AAA protocol
Park et al. Trusted P2P computing environments with role-based access control
Gurbani et al. Domain certificates in the session initiation protocol (SIP)
Buchheim et al. Implementing the intrusion detection exchange protocol
Khandkar et al. Masking host identity on internet: encrypted TLS/SSL handshake
WO2004001630A1 (en) Network system and program
Smith et al. SOCKS5 Bytestreams
Smith et al. XEP-0065: SOCKS5 Bytestreams
Dowling et al. A proxy-based security architecture for Internet applications in an extranet environment
CN118057762A (en) Data collection method, device, related equipment and program product

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20070214

Termination date: 20130321