虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

network-shy

  • P2P 之 UDP穿透NAT的原理与实现(附源代码) 原创:shootingstars 参考:http://midcom-p2p.sourceforge.net/draft-ford-midcom

    P2P 之 UDP穿透NAT的原理与实现(附源代码) 原创:shootingstars 参考:http://midcom-p2p.sourceforge.net/draft-ford-midcom-p2p-01.txt baidu 论坛上经常有对P2P原理的讨论,但是讨论归讨论,很少有实质的东西产生(源代码)。呵呵,在这里我就用自己实现的一个源代码来说明UDP穿越NAT的原理。 首先先介绍一些基本概念: NAT(Network Address Translators),网络地址转换:网络地址转换是在IP地址日益缺乏的情况下产生的,它的主要目的就是为了能够地址重用。NAT分为两大类,基本的NAT和NAPT(Network Address/Port Translator)。 最开始NAT是运行在路由器上的一个功能模块。 最先提出的是基本的NAT,它的产生基于如下事实:一个私有网络(域)中的节点中只有很少的节点需要与外网连接(呵呵,这是在上世纪90年代中期提出的)。那么这个子网中其实只有少数的节点需要全球唯一的IP地址,其他的节点的IP地址应该是可以重用的。 因此,基本的NAT实现的功能很简单,在子网内使用一个保留的IP子网段,这些IP对外是不可见的。子网内只有少数一些IP地址可以对应到真正全球唯一的IP地址。如果这些节点需要访问外部网络,那么基本NAT就负责将这个节点的子网内IP转化为

    标签: draft-ford-midcom shootingstars sourceforge midcom-p

    上传时间: 2015-12-08

    上传用户:kernaling

  • The Microsoft® Active Directory™ Service Interfaces (ADSI) Software Development Kit (SDK) is

    The Microsoft® Active Directory™ Service Interfaces (ADSI) Software Development Kit (SDK) is a client-side product, based on the Component Object Model (COM), that defines a directory service model and a set of COM interfaces that enables Microsoft Windows NT® /Windows® 2000 and Windows 95 client applications to access several network directory services.

    标签: Development Interfaces Microsoft Directory

    上传时间: 2013-12-25

    上传用户:daguda

  • In addition to all the people who contributed to the first edition, we would like to thank the follo

    In addition to all the people who contributed to the first edition, we would like to thank the following individuals for their generous help in writing this edition. Very special thanks go to Jory Prather for verifying the code samples as well as fixing them for consistency. Thanks to Dave Thaler, Brian Zill, and Rich Draves for clarifying our IPv6 questions, Mohammad Alam and Rajesh Peddibhotla for help with reliable multicasting, and Jeff Venable for his contributions on the Network Location Awareness functionality. Thanks to Vadim Eydelman for his Winsock expertise. And finally we would like to thank the .NET Application Frameworks team (Lance Olson, Mauro Ottaviani, and Ron Alberda) for their help with our questions about .NET Sockets.

    标签: the contributed addition to

    上传时间: 2015-12-17

    上传用户:dongqiangqiang

  • This code was used to produce simulation results described in: Using Directional Antennas to Pre

    This code was used to produce simulation results described in: Using Directional Antennas to Prevent Wormhole Attacks Lingxuan Hu and David Evans. Network and Distributed System Security Symposium, San Diego, 5-6 February 2004.

    标签: Directional simulation described Antennas

    上传时间: 2014-12-06

    上传用户:xieguodong1234

  • The present document specifies the CAMEL Application Part (CAP) supporting the fourth phase of the n

    The present document specifies the CAMEL Application Part (CAP) supporting the fourth phase of the network feature Customized Applications for Mobile network Enhanced Logic. CAP is based on a sub-set of the ETSI Core INAP CS-2 as specified by ETSI EN 301 140 1 [26]. Descriptions and definitions provided by ETSI EN 301 140 1 [26] are directly referenced by this standard in the case no additions or clarifications are needed for the use in the CAP.

    标签: the Application supporting specifies

    上传时间: 2015-12-24

    上传用户:84425894

  • With User Mode Linux you can create virtual Linux machines within a Linux computer and use them to s

    With User Mode Linux you can create virtual Linux machines within a Linux computer and use them to safely test and debug applications, network services, and even kernels. You can try out new distributions, experiment with buggy software, and even test security. Now, for the first time, the creator and maintainer of User Mode Linux shows how to put it to work hands-on. Jeff Dike covers everything from getting started through running enterprise-class User Mode Linux servers. You ll find authoritative advice on bootup, compilation, administration, specialized configurations, and much more.

    标签: Linux computer machines virtual

    上传时间: 2013-12-19

    上传用户:xinzhch

  • This a journal paper on the optimization of Max Connection problem in a telecommunication optical ne

    This a journal paper on the optimization of Max Connection problem in a telecommunication optical network.

    标签: telecommunication optimization Connection journal

    上传时间: 2015-12-27

    上传用户:xaijhqx

  • 如果有人搞网络协议仿真

    如果有人搞网络协议仿真,想必一定听过NS2这个仿真软件,小弟这里真好有《NS and Network Simulation》书后源码

    标签: 网络协议 仿真

    上传时间: 2016-01-06

    上传用户:Altman

  • 《Linux程序设计权威指南》源代码

    《Linux程序设计权威指南》源代码,包含: awk copyright curses cvs debug framebuffer gnome gnutools gtk i18n kde manual motif network newt qt regexp rpm shell style svgalib system thread xlib ya

    标签: Linux 程序设计 源代码

    上传时间: 2016-01-07

    上传用户:tyler

  • CCISP考试指南与导读 CISSP STUDY NOTES FROM CISSP PREP GUIDE 1 DOMAIN 1 – SECURITY MANAGEMENT PRACTICES 2

    CCISP考试指南与导读 CISSP STUDY NOTES FROM CISSP PREP GUIDE 1 DOMAIN 1 – SECURITY MANAGEMENT PRACTICES 2 DOMAIN 2 – ACCESS CONTROL SYSTEMS 7 DOMAIN 3 – TELECOM AND NETWORK SECURITY 13 DOMAIN 4 – CRYPTOGRAPHY 34 DOMAIN 5 – SECURITY ARCHITECTURE AND MODELS 46 DOMAIN 6 – OPERATIONS SECURITY 56 DOMAIN 7 – APPLICATIONS AND SYSTEM DEVELOPMENT 63 DOMAIN 8 – BUSINESS CONTINUITY AND DISASTER RECOVERY PLANNING 70 DOMAIN 9 – LAW, INVESTIGATION AND ETHICS 78 DOMAIN 10 – PHYSICAL SECURITY 87

    标签: CISSP MANAGEMENT PRACTICES SECURITY

    上传时间: 2014-02-13

    上传用户:sy_jiadeyi