Font Size: a A A

The Research And Implementation Of Multicast Source Traceback

Posted on:2006-10-12Degree:MasterType:Thesis
Country:ChinaCandidate:W M ZhaoFull Text:PDF
GTID:2168360155471503Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
So-called "multicast source traceback" is that when multicast is carrying on or had already ended, according to the information which existing, it could determine multicast transmission position. According to accuracy gradually enhance,it may divide into location to the network the main engine, the process, the user which initiates multicast data package. The Internet rapid development has produced many new applications, specially high band width demand multimedia applications. In order to alleviate the network bottleneck, the researcher proposed some solutions:Increase network band width;Uses QoS (Quality of Service) mechanism, the control different service band width use;Server disperser and colony;IP Multicast technology. Among them, IP Multicast technology becomes the network technology hot spot in recent years because it has the unique superiority. However,The IP multicast network security with unicast network security has the similar request,such as User authentication,data uniformity inspection,data encryption, and user authorization. But IP multicast have the technical characteristic:first communications are one to one for unicast,the destination is explicit;but multicast is one to one or one to many,the destination is not explicit.Second, the multicast receiver use " anonymous joins " way,anybody may join in the multicast group anytime and don't verify one's certification.Third, IP multicast transfer data with UDP protocol.which is the nonconnection situation.Fourthly,TCP/IP suit don't have check mechanism for the source ip address in the packet,sender may use the false IP source address to transmit the multicast data package,thus it is very difficult to determine the multicast sender position.These factors cause the multicast communication face the more serious secure problems.Once it occurs the malicious attack under the environment, it creates the more serious harm.Therefore, in order to provide the judicial evidence and the penalty evil intention multicast attack,the research for "multicast source traceback" has the extremely important theory significance and the practical value. In this Master paper the main work may summarize for following several aspects: 1,The analysis at present the domestic &external source traceback aspect research situation, it points out current existing technical insufficiency. The network source traceback plan basis on suitable environment may divide into unicast source traceback and multicast source traceback. At present the domestic &external source traceback research had done many work, but emphasis puts on unicast source traceback research, the multicast source traceback research is not very many. In the various source traceback plan, according to the source recollection algorithm which they uses they may converge following four kinds:1,link testing, Submerging the direct connected link through the burst massive telegram, it can confirm the data package of transmission way according to the package of transmission influence,such as controlled flooding.2, Each router Retransmiting the data telegram transmit ICMP tracing telegram to receiver. The receive basis on receivered ICMP tracing telegram restructure data telegram retransmission path again,such as ICMP Traceback Message.3, Each router must log IP package which retransmits, then traces the transmission path according to the router log information,such as route log.4, The revision transmission data package form, and router address information storage in the package. In receivers reconstruction data package transmission path using the route information in the data package, then determination transmission position,such as node sampling marking. 2,In view of the original source system existence question, this article proposes Multicast Router Reverse Algorithm -based Multicast Source Traceback -MMST, And in the multicast environment it realizes this paper plan. 3. Regarding "Multicast Router Reverse Algorithm" the paper carries on the detailed analysis and give the the formalization describes.the thesis give MRRA and the current source traceback algorithm contrast,and analyzes this algorithm time complex, and it proves its effectiveness. Simultaneously the paper performs this solution mentality example solution to realize, and proves this solution mentality realization. 4.The paper Analyzes the multicast source traceback thought merit and the insufficiency, and points out the next step of research direction. The MMST plan proposeed in this paper is easy to deploy and to realize in the current network multicast environment which universally support multicast and Mtrace. We made the massiveexperimental confirmation and the on-line experiment in the paper work process to the MMST system, produced the experiment analyzed and tests reports. The experimental result indicates: in view of the multicast source traceback question, From the " Multicast Router Reverse Arithmetic-based Multicast Source Traceback " plan proof conclusion and the experimental result, this paper attention question in the research is effective, the design is feasible, the plan realization is correct. At last,we carry on the summary to the paper research work, simultaneously also propose the following work plan.
Keywords/Search Tags:Multicast, Unicast, Multicast route protocol, Multicast source traceback, Multicast router reverse algorithm
PDF Full Text Request
Related items