博碩士論文 945902012 詳細資訊




以作者查詢圖書館館藏 以作者查詢臺灣博碩士 以作者查詢全國書目 勘誤回報 、線上人數:27 、訪客IP:18.222.161.123
姓名 黃志閔(Chih-min Huang)  查詢紙本館藏   畢業系所 資訊工程學系
論文名稱 在P2P網路中SIP服務合法監聽之研究
(A Study of Lawful Interception on SIP Services over P2P Networks)
相關論文
★ 無線行動隨意網路上穩定品質服務路由機制之研究★ 應用多重移動式代理人之網路管理系統
★ 應用移動式代理人之網路協同防衛系統★ 鏈路狀態資訊不確定下QoS路由之研究
★ 以訊務觀察法改善光突發交換技術之路徑建立效能★ 感測網路與競局理論應用於舒適性空調之研究
★ 以搜尋樹為基礎之無線感測網路繞徑演算法★ 基於無線感測網路之行動裝置輕型定位系統
★ 多媒體導覽玩具車★ 以Smart Floor為基礎之導覽玩具車
★ 行動社群網路服務管理系統-應用於發展遲緩兒家庭★ 具位置感知之穿戴式行動廣告系統
★ 調適性車載廣播★ 車載網路上具預警能力之車輛碰撞避免機制
★ 應用於無線車載網路上之合作式交通資訊傳播機制以改善車輛擁塞★ 智慧都市中應用車載網路以改善壅塞之調適性虛擬交通號誌
檔案 [Endnote RIS 格式]    [Bibtex 格式]    [相關文章]   [文章引用]   [完整記錄]   [館藏目錄]   至系統瀏覽論文 ( 永不開放)
摘要(中) 在以往使用者採取撥接上網,或網路頻寬較小的時代,多媒體服務會因為頻寬的限制,無法達到使用者能滿意的品質,但因為網路的技術越來越成熟,頻寬的加大,網路的普及性,讓多媒體的服務也漸漸的受到大家的注目,也越來越多人開始使用多媒體的服務,例如網路電話 (Voice over IP,簡稱VoIP) 及視訊會議 (Video Conference) 等,這些服務目前又以VoIP最廣為使用。在各種VoIP技術中目前最廣為使用的協定是會議初始協定 (Session Initiation Protocol,簡稱SIP),其優點在於簡單、擴展性強,足以承載快速演進的各種多媒體服務。而點對點網路 (Peer-to-Peer,簡稱P2P) 這種不需要中央集權式伺服器的架構,同樣有著良好的擴展性、強韌度與容錯能力,因此很適合、也很常用來做為提供VoIP服務的平台,由目前的趨勢看來,以P2P 為基礎的SIP服務將漸漸普及,使用者也將日益增加。但是隨著P2P SIP服務普及而扮演傳統電話角色時,傳統電話所需處理的問題P2P SIP也將面。其中包括合法監聽就是一個很重要的議題。
目前對於合法監聽方面,已有多項研究正在進行中或已定義出規範,其中對於傳統電話網路的監聽已行之多年。近年來,網際網路多媒體服務發展迅速,由於SIP over P2P網路的傳輸方式與架構與傳統的不同,因此傳統舊有的監聽架構,對於新興的網路多媒體服務,並無法提供相同的監聽效用。
本論文將針對在P2P網路上使用SIP的多媒體服務,提出三個合法的監聽策略。套用本論文的監聽策略,最後將可接近99%的監聽率。
摘要(英) The quality of multimedia services is limited on bandwidth in past few year when people using dial-up or low speed access networks to access the Internet. Due to the development of internet & high bandwidth, multimedia services are getting more and more attractive to people. VoIP is the most popular services among all these multimedia services, and SIP (Session Initiation Protocol) is the most popular protocol among all the VoIP technologies due to its simplicity and scalability to support quickly evolved multimedia services. The P2P network which does not need a central server also has good scalability, robustness and fault tolerance. So it is suitable and often adapted to be the platform to provide the VoIP services. Trend shows that the P2P based SIP will getting popular and play the same role as the PSTN(Public Switched Telephone network), so it will face the same issues that the PSTN faces. Lawful interception is one of the most important topics.
To the aspect of lawful interception, there are many researches in progress and specifications are already defined. Among them, the lawful interception of the PSTN has been conducted for many years. With rapid developments of internet multimedia services in recent years, it is more difficult to use traditional methods on monitoring VoIP over P2P networks. So a thesis proposes the lawful interception system to intercept and collect various forms of communications while using VoIP over P2P networks, and proposes three interception strategies for lawful interception. Simulations are done to verify the proposed strategies.
關鍵字(中) ★ SIP
★ P2P
★ 合法監聽
關鍵字(英) ★ SIP
★ P2P
★ Lawful Interception
論文目次 第 1 章 緒論 1
1.1 概要 1
1.2 研究動機 2
1.3 研究目的 3
1.4 章節架構 4
第 2 章 背景知識與相關研究 5
2.1 Peer-to-Peer網路 5
2.1.1 集中式和非集中式P2P網路架構 6
2.1.2 結構化與非結構化的P2P網路架構 8
2.1.3 使用DHT的P2P網路演算法 10
2.2 SIP會議啟始協定 12
2.2.1 SIP基本架構 13
2.2.2 SIP的基本訊號流程 15
2.2.3 SDP會議描述協定 16
2.3 P2P-SIP的相關研究 17
2.3.1 SOSIMPLE 19
2.3.2 P2P-SIP網路電話 20
2.4 合法的監聽技術 22
2.4.1 合法的監聽 23
2.4.2 SIP監聽機制 25
第 3 章 P2P-SIP服務之監聽策略 28
3.1 網路環境與假設 28
3.2 P2P-SIP監聽策略 31
3.2.1 增加監聽點之監聽策略 32
3.2.2 最大資源點之監聽策略 35
3.2.3 適當置入點之監聽策略 40
第 4 章 模擬結果與討論 45
4.1 模擬環境說明 45
4.2 模擬結果與討論 46
4.2.1 Simulation 1 :網路拓樸的比較 46
4.2.2 Simulation 3 :固定總點數-監聽點對監聽率的影響 48
4.2.3 Simulation 3 : 固定普通點-監聽點對監聽率的影響 49
4.2.4 Simulation 4 :增加監聽點與最大資源點的比較 50
4.2.5 Simulation 5 :普通點對試驗次數的影響 52
4.2.6 Simulation 6 :固定點數-試驗次數對監聽率的影響 53
4.2.7 Simulation 7 :三種監聽方法的比較 55
第 5 章 結論與未來展望 57
5.1 結論 57
5.2 未來展望 58
參考文獻 59
參考文獻 [1] O. Hersent, D. Gurle, J.-P. Petit, Packet Based Multimedia Communications Systems, Addison-Wesley, Jul. 2003.
[2] M. Arango, I. Elliott, C. Huitema, S. Pickett, A. Dugan, RFC 2705, http://www.ietf.org/rfc/rfc2705.txt?number=2705.
[3] H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson, R. Sparks, M. Handley, E. Schooler. RFC 3261, http://www.ietf.org/rfc/rfc3261.txt?number=3261.
[4] L.-R. Bevier, “Communications Assistance for Law Enforcement Act of 1994 ,” Stanford Law Review, vol. 51, No. 103-414, June, 2006.
[5] eMule, http://zh.wikipedia.org/wiki/EMule
[6] Skype, http://www.skype.com/intl/zh-Hant/
[7] Gnutella v0.6 protocol, http://groups.yahoo.com/group/thegdf/files/
[8] S. Ratnasamy, P. Francis, M. Handley, R. Karp, S. Shenker, “A Scalable Content-Addressable Network,” SIGCOMM, San Diego, California, United States, Aug., 2001
[9] I. Stoica, R. Morris, D. Karger, M.-F. Kaashoek, H. Balakrishnan “Chord: A Scalable Peertopeer Lookup Service for Internet Applications,” SIGCOMM, San Diego, California, United States, Aug., 2001
[10] B.-Y. Zhao, L. Huang, J. Stribling, S.-C. Rhea, A.-D. Joseph, “Tapestry: A Resilient Global-Scale Overlay for Service Deployment,” Selected Areas in Communications, Vol. 22, pp. 41-53, Jan., 2004
[11] A. Rowstron1 , P. Druschel, Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems, Springer Berlin, Nov., 2001
[12] M. Handley, H. Schulzrinne, E. Schooler, J. Rosenberg, RFC 2543, http://www.ietf.org/rfc/rfc2543.txt
[13] M. Handley, V. Jacobson, RFC 2327, http://www.ietf.org/rfc/rfc2327.txt
[14] D Kutscher, J Ott, C Bormann, “Session Description and Capability Negotiation,” Internet Draft, http://www.ietf.org/internet-drafts/draft-ietf-mmusic-sdpng-07.txt, Oct. 2003
[15] A. Johnston, H. Sinnreich, “SIP, P2P, and Internet Communications,“ Internet Draft ,March , 2006
[16] J. Quittek, M. Stiemerling, T. Dietz, S. Niccolini, “Problem Statement for SIP-signalled Peer-to-Peer Communication across Middleboxes,” Internet Draft, February , 2006
[17] K. Singh, H. Schulzrinne, “Data format and interface to an external peer-to-peer network for SIP location service Department of Computer Science,” Internet Draft , May , 2006
[18] D. Willis, E.-D. Byran, “Concepts and Terminology for Peer to Peer SIP,” Internet Draft, June , 2006
[19] E. Shim, S. Narayanan, G. Daley, “An Architecture for Peer-to-Peer Session Initiation Protocol (P2P SIP),” Internet Draft, February , 2006
[20] International Packet Communication Consortium, Lawfully Authorized Electronic Surveillance For Softswitch-based Networks, IPCC, Jul. 2003.
[21] F. Baker, B. Foster, C. Sharp, “Cisco Architecture for Lawful Intercept in IP Networks,” Internet Draft, Oct. 2003.
[22] Telecommunications Industry Association, “Lawfully Authorized Electronic Surveillance for traditional voice telephony,” Business Wire, Apr. 2000.
[23] D.-A. Bryan, B.-B. Lowekamp, C. Jennings, “SOSIMPLE: A Serverless, Standards-based, P2P SIP Communication System,” AAA-IDEA, pp. 42 – 49, June, 2005.
[24] L.-D. Chou, Y.-C. Lai , Design and Implementation for Lawful Interception of SIP-based Services, National Centurl University, June, 2004.
[25] K. Singh, H. Schulzrinne, “Peer-to-Peer Internet Telephony using SIP,” NOSSDAV, Stevenson, Washington, USA, pp. 63 – 68, June, 2005.
[26] PeerSim, http://peersim.sourceforge.net/
[27] J. Seedorf, “Lawful Interception in P2P-Based VoIP Systems,” Lecture Notes In Computer Science, pp. 217-235, July, 2008.
[28] B. Karpagavinayagam, R. State, O. Festor, “Monitoring Architecture for Lawful Interception in VoIP Networks,” Internet Monitoring and Protection, pp. 5-5, July 2007
指導教授 周立德、陳瑞明
(Li-der Chou、Jui-ming Chen)
審核日期 2009-7-28
推文 facebook   plurk   twitter   funp   google   live   udn   HD   myshare   reddit   netvibes   friend   youpush   delicious   baidu   
網路書籤 Google bookmarks   del.icio.us   hemidemi   myshare   

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明