Font Size: a A A

The Research Of Resource-visit Problems Of Network Based On P2P

Posted on:2010-10-28Degree:MasterType:Thesis
Country:ChinaCandidate:Z H ShuFull Text:PDF
GTID:2248360272988057Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Compared to the traditional C/S model, P2P model is of non-center、scalability、robustness、high performance/price ratio、load balancing, and other advantages in favor of privacy protection. In the actual network environment, P2P type of software encounters a wide range of problems, which limits the spread of P2P technology. Objective and comprehensive analysis of the problems of the practical application of P2P software may run into is of great practical significance for a deep understanding of the principle of P2P technology and for continuous technique-improvement to facilitate the users.In this paper, we study in-depth of the problems that may be encountered in the actual applications of P2P type of software (Funshion as an example) and have a number of specific research and analysis on the points that may affect the use of P2P software in a variety of factors, and offer the solution of relative superiority under the same conditions.1) To get information about the conditions of hardware and software of a user’s computer, including the detection of the computer configuration and possible software conflicts, and determining whether to add firewall exceptions and so on.2) To determine the network-related factors. Mainly to determine the value of TcpMaxHalfOpen、the network connectivity status、the nature of a network situation where the user is(within private network or within public network? If within the private network, then prompt the user to do port mapping), also to determine the connectivity to the designated server. Then to give the corresponding solutions on the basis of a more comprehensive analysis of the problems above.3) Collecting Useful information. Finally, to upload the zip-package of useful diagnostic information generated to the specified server. In order to ensure system security, user account number and password are needed before uploading. Components based on COM programming techniques were fully adopted in programming to offer greater flexibility, scalability and reusability to system, and multi-thread programming techniques were used for a large-scale data processing. This paper described in details the main data structures and related algorithms. Testing proves that the subject has achieved the desired results.
Keywords/Search Tags:P2P, Software collision, Firewall exception, TcpMaxHalfOpen, Port mapping
PDF Full Text Request
Related items