Font Size: a A A

The Study On The Implementation Of P2P VPN Network And Its Application

Posted on:2016-12-26Degree:MasterType:Thesis
Country:ChinaCandidate:L HuFull Text:PDF
GTID:2308330470960219Subject:Computational Mathematics
Abstract/Summary:PDF Full Text Request
The peer to peer network is the common way of network for small local area network. In this kind of networking, the server and workstation have no principal difference. Their role and the importance are equal. Peer to peer(P2P) mode is used to share computer resources and services through direct exchange. It does not rely on dedicated centralized server. However, the security of the data privacy is poor and the file management is scattered. It is insufficient in the aspect of network security.This paper study the P2P-based virtual private network, and focus on the technology implementation details of two kinds of architectures including N2 N and IPOP, in which including the NAT traversal technology, tunnel encapsulation technology and distributed hash table technology. They use unstructured and structured P2 P system. This will give full decentralized P2 P technology advantages combined with high natural VPN network security to maximize protection of the privacy of communication between the two sides. According to these two kinds of networks, we built a secure and stable network connection experimental platform and on top of this platform, integration testing some of the more pressing basic applications, including instant messaging, sharing gateway, publishing a website, etc.Based on above mentioned system, an experiment platform with secure and stable network connection has been built. Using the built platform, we integrated some of the basic applications meeting the real needs, including instant messaging, gateway sharing and website publishing, etc. The built platform and its peer to peer network will provide more secure and reliable network environment for the upper level network application. We also carried out the sharing gateway experiment in the research work, and explained in detail that this P2 P VPN can exchange information with the Internet. It is based on the operation of the Internet, and can in turn influence and solve some important issues faced by the Internet, such as information security issues, a variety of man-made firewall restrictions. It will promote the development of network security technology.
Keywords/Search Tags:P2P, VPN, decentralized, structured, DTH
PDF Full Text Request
Related items