English  |  正體中文  |  简体中文  |  Items with full text/Total items : 78111/78111 (100%)
Visitors : 30638609      Online Users : 142
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version

    Please use this identifier to cite or link to this item: http://ir.lib.ncu.edu.tw/handle/987654321/8295

    Title: 隨機指定埠號對稱式網址轉換器穿透之研究;A Study of P2P Traversal through Symmetric NAT with Random Port Assignment
    Authors: 蔡勝全;Sheng-Quan Tsai
    Contributors: 通訊工程研究所
    Keywords: 穿透;隨機埠號;網址轉換器;random port;traversal;NAT
    Date: 2008-07-10
    Issue Date: 2009-09-22 11:22:39 (UTC+8)
    Publisher: 國立中央大學圖書館
    Abstract: 隨著網際網路的日益普及,網路的相關技術也越來越日新月異。又因為使用網路的使用者數量日漸增加,IPv4網址數量不敷使用,在IPv6普及使用之前,使用少數網址即可讓多數使用者可以正常連線上網的網址轉換器(NAT)便成為一項必要的網路設備;也因為網址轉換器使得外部使用者無法真正得知網址轉換器內確切使用者的情形,使得網址轉換器也兼具了防火牆的網路安全功能。 但不幸的是,因為網址轉換器的發展初期並未有一定的標準及規格,使得網址轉換器的製造商各說各話,製造了各種不同類型的機器。使得使用網址轉換器造成很多網路應用程式的不便。例如:端點對端點的網路應用,像是語音網路電話及網路連線遊戲。因此在需要兼具網路安全性及網路通透性的情形下,要達到直接點對點連線的穿透網址轉換器的技術也變得相當重要。 目前來說,研究網址轉換器的穿透研究都著重在最一般的網址轉換器類型,也就是所謂的錐形的網址轉換器(cone type NAT)。以STUN及TURN為主要的穿透技術基礎,但STUN技術對於對稱式網址轉換器並無法穿透,而TURN則是會對中間轉送的伺服器造成很高的負擔。在錐型的網址轉換器及對稱式網址轉換器的穿透研究裡,目前只能穿透錐型及其中一種對稱式依序增加對外埠號的網址轉換器,以事先預測出下一個使用的埠號來做穿透;而對於亂數選定對外埠號的網址轉換器則還是只能用中繼轉送伺服器來解決。 本篇論文提出一個基於前人研究中,可以穿透一般的錐形網址轉換器及依序增加埠號的對稱式網址轉換器的最佳解法,再加上本文所提出的方法去針對對外埠號亂數選定的對稱式網址轉換器作直接的點對點穿透,進而達到穿透所有市面上所有類型的網址轉換器的目標。使網路應用程式可以使用本方法達到原本應該有的端點到端點的原則(End-to-end principle),使網路達到可靠的特性並兼顧到原本網址轉換器的網路安全跟成本方面的優點。 本論文使用C語言撰寫程式碼,再配合Linux作業系統環境及數家廠牌型號的網址轉換器來做測試。研究結果發現本方法的確是可以穿透各種網址轉換器,尤其是目前都無解的對外埠號亂數選定的網址轉換器。相信日後再將本文提出的解法結合其他網路應用程式,可以使網路更通透便利及網路安全。 As the Internet has been pervasively used these days, the relative technology has also been developed day by day. For the number of users who use the Internet increasing gradually, the number of IPv4 becomes too few to use. So far the Network Address Translator (NAT) which makes many users use Internet with fewer or one static public IP address becomes necessary network equipment until IPv6 becomes universal. The NAT makes external users unable to know the real situation of its internal users, it therefore functions like firewall. Unfortunately, there was no standard or specification when making NAT in early times. Therefore, manufactures made many types of NAT in their own way and it obstructed many Internet applications such as peer-to-peer Internet applications. Hence it is important to achieve the goal of NAT traversal with point to point connection directly under the condition of both security and network permeability. The present studies of NAT traversal are focused on the commonest cone type of NAT type which has the biggest market share. There are two basic techniques of NAT traversal which are STUN (Simple Traversal of UDP through NAT) and TURN (Traversal Using Relay NAT). STUN cannot traversal symmetric NAT and TURN would cause high loading on relay server. Except for cone type NAT has been solved, symmetric NAT which assigned outgoing port number increase by sequence has been traversal successfully by predicting next possible outgoing port number. It still exists one type of symmetric NAT which assign outgoing port randomly has not been traversal directly except for using relay server. This paper is intended traversal the symmetric NAT with random port assignment directly. This research will indicate a reasonable and flexible solution which can establish direct connection between each type of NAT, especially symmetric NATs with random port assignment. The proposed method of this paper will achieve a reliable network. It takes into account the characteristics of the NATs which are the Internet security and cost advantages. In this research, the test environment includes Linux Fedora 8, C program and various brands of NATs. As the result, the proposed method can traverse all types of NATs, though symmetric NAT with random port assignment which has not obtained any of it. Plus, it will efficiently facilitate Internet fluency and safety of Internet with integration of other Internet applications.
    Appears in Collections:[通訊工程研究所] 博碩士論文

    Files in This Item:

    File SizeFormat

    All items in NCUIR are protected by copyright, with all rights reserved.

    社群 sharing

    ::: Copyright National Central University. | 國立中央大學圖書館版權所有 | 收藏本站 | 設為首頁 | 最佳瀏覽畫面: 1024*768 | 建站日期:8-24-2009 :::
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 隱私權政策聲明