IPv4/IPv6网络中基于P2P的媒体分发系统关键技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着互联网的不断发展,网络极大的改变了人们的生活。网络上传递的信息种类越来越多,对计算机网络的数据传输技术也提出了新的要求,网络媒体分发技术也随之不断发展。P2P (Peer to Peer)是架构在互联网之上的一种覆盖网,它不同于传统客户端/服务器模式,P2P网络中的节点(Peer)可从多点获取资源,并共享自身已有资源。P2P技术在媒体数据分发上的优势也越来越得到展现。基于P2P的媒体分发系统逐渐成为研究热点。
     按照现有的P2P通信方式,在目前IPv4 (Internet Protocol version 4)与IPv6 (Internet Protocol version 6)共存环境下,一个IPv6的Peer是无法与网络中众多的IPv4的Peer进行通信以获取资源的。只有做好IPv4和IPv6网络下P2P通信的研究工作,才能深入研究基于P2P的媒体分发系统。伴随着P2P媒体分发技术的发展,盗版问题日益严重。基于P2P的媒体分发系统只有在DRM (Digital Rights Management)系统的支持下,才能阻止盗版侵权行为的发生,才能推进互联网的健康发展。
     本文首先调研了IPv4向IPv6过渡技术,结合P2P通信机制,提出IPv4与IPv6共存网络中基于请求转发机制的P2P通信方法,将双协议栈技术和P2P系统结合起来,利用双栈节点作为中转节点来实现资源在整个P2P网络中的分布扩散。本文使用OMNET++仿真平台模拟实现了该P2P通信方法,并对其进行了性能评估。通过仿真实验,证明本方法在IPv6网络演进的不同时期能维持整体P2P系统性能稳定。
     本文分析了DRM系统和P2P媒体分发系统的特点,研究了两者的融合方案。通过实验研究提出了可用于DRM系统的选择加密机制和信息隐藏技术。根据上述研究设计了P2P媒体分发系统中基于选择加密机制的DRM系统。最后本文实现了客户端版权管理子系统并进行了功能测试,验证了这些技术应用的正确性。
With the development of Internet, network has greatly changed people's life. There are numerous types of data transmitting on the network, which demands new data transmitting technology and promotes the development of media distribution system. P2P (Peer to Peer) is an overlay network built on Internet. It differs from traditional C/S mode. A peer in P2P can receive resource from other peers and share its resource with others. P2P technology has shown great advantage on media data distribution. The media distribution system based on P2P gradually becomes research hotspot.
     In existing P2P mode, an IPv6 peer cannot communicate with IPv4 peers which are majority in P2P system. Only we do a solid study on'P2P communication in IPv4 and IPv6 coexistence network, we can promote media distribution system based on P2P. With the development of P2P media distribution technology, the piracy is becoming a big problem. Only the media distribution system is supported by the DRM (Digital Rights Management) system, we can prevent the copyright pirate, so as to promote the healthy development of Internet.
     In this paper, we firstly investigate the IPv6 transition mechanisms. Combining the IPv6 transition mechanisms and P2P communication mechanism, we propose a P2P communication mechanism based on request forwarding in IPv4 and IPv6 coexistence network. In this method we use Dual-Stack technology on P2P system, which using a Dual-stack node as a forwarding node to spread the resource in the whole P2P network. This paper implements this P2P communication mechanism with the OMNET++ simulation platform and evaluates the performance of the proposed mechanism. The research shows the proposed mechanism can effectively solve the communication between IPv4 peer and IPv6 peer in P2P network and keep the system performance stable.
     In this paper, we analyse the P2P media distribution system and DRM system, and then research the combine method of the two systems above mentioned. With the related experiments, we propose the selective encryption mechanism and the information hiding technology which can be used in the DRM system. With the research above mentioned, we design DRM system based on selective encryption mechanism in P2P media distribution system. Finally, this paper implements the copyright management subsystem within the P2P media distribution system. And then we do the functional tests to verify the validity of the application of these technologies.
引文
[1]. A. Oram, ed. "Peer-to-Peer:Harnessing the Power of Disruptive Technologies", O'Reilly,2001, pp.1-20.
    [2]. C. Shikey, "What is P2P... and what isn't", O'Reilly Network, November 2000, pp.15-25.
    [3]. J. Postel, "Internet Protocol", RFC 791, September 1981.
    [4]. S. Deering and R. Hinden, "Internet Protocol. Version 6(IPv6) Specification", RFC 2460, December 1998.
    [5]. R. Hinden, S. Deering, "IP Version 6 Addressing Architecture" Internet Engineering Task Force, RFC 3513, April 2003.
    [6]. S.R.Subramanya and BYung.K.Yi, "Digital rights management. IEEE POTENTIALS", Volume 25, March-April 2006, pp.31-34.
    [7]. G. Tsirtsis, P. Srisuresh, "Network Address Translation-Protocol Translation (NAT-PT)", Ineternet Engineering Task Force, RFC 2766, February 2000.
    [8]. J. Bound, L. Toutain, H. Affifi, "Dual Stack Transition Mechanism (DSTM)", Ineternet Engineering Task Force, April 2004.
    [9]. S. Lee, M. Shin, Y. Lee, E. Nordmark, "Dual-Stack Hosts Using in the API (BIA)", Internet Engineering Task Force, RFC 3338, October 2002.
    [10]. A. Durand, P. Fasano, I. Guardini, D. Lento. "IPv6 tunnel Broker" Internet Engineering Task Force, RFC 3053, January 2001.
    [11]. R. Gilligan, E. Nordmark, "Transition Mechanisms for IPv6 hosts and Routers", Ineternet Engineering Task Force, RFC 2893, August 2000.
    [12]. A.Durand, P.Fasano, I.Guardini, D.Lento, "IPv6 Tunnel Broker", January 2001.
    [13]. B.Carpentef, K.Moore, "Connection of IPv6 Domains via IPv4 Clouds", RFC3056, February 2001.
    [14]. G.Tsirtsis, P.Srisuresh, "Network Address Translation-Protocol Translation (NAT-PT)", RFC2766, February 2000.
    [15]. P.Srisuresh, K.Egevang, "Traditional IP Network Address Translator (Traditional NAT)", RFC3022, January 2001.
    [16]. Tapestry homepage. http://www.cs.ucsb.edu/-ravenben/tapestry/.
    [17]. Oceanstore homepage. http://oceanstore.cs.berkeley.edu/.
    [18]. Chord homepage. http://pdos.csail.mit.edu/chord/.
    [19]. Kazaa homepage. www.kazaa.com.
    [20]. Fasttrack homepage. http://compnetworking.about.com/od/kazaa/g/bldef_fasttrack.htm.
    [21]. Maze homepage. maze.tianwang.com/.
    [22]. V. Bhat, "Reputation Management in Peer-to-peer Systems", Technical report, Department of Computer Sciences, University of Texas at Austin, December 2004.
    [23]. S. Kamvar, M. Schlosser, and H. Garcia-Molina, "The EigenTrust Algorithm for Reputation Management in P2P Networks", In Proceedings of the Twelfth International World Wide Web Conference, Association for Computing Machinery, May 2003, pp.640-651.
    [24]. Rahman AA, Hailes S, "Supporting trust in virtual communities", In Proc. of the 33rd Hawaii Int'1 Conf. on System Sciences, Hawaii, IEEE Computer Society Press,2000-04-07, pp.33-43
    [25]. Liu Yihe, Sheng Changxiang, "A New Information SecurityFunction And Application Model", Journal of computer aided design & computer graphics, Vol.17. No.12.2005, pp.34-38.
    [26]. "OMNET++ Discrete Event Simulation System". http://www.omnetpp.org.
    [27]. NS2 homepage. www.isi.edu/nsnam/ns/.
    [28]. OPNET. www.opnet.com/.
    [29]. Varga A, "OMNET++—Discrete Event Simulation System" Version 3.2 User Manual
    [30]. BitTorrent homepage. www.bittorrent.com/.
    [31]. Austin Russ, "Digital rights management overview", Security Essentials v1.2e, July 2001, pp.16-25.
    [32]. Liu.Q, Safavi-Naini.R, Sheppard.N.P, "Digital Rights Management for Content Distribution", In. Johnson.C, Montague. P and Steketee.C. (eds.). Australasian Information Security Workshop 2003, Adelaine. Australia:Australian Computer Society Inc,2003, pp.49-58.
    [33]. IMPRIMATUR, "Synthesis of the Imprimatur Business Model" http://www.icestandard.org/,2005-09-02.
    [34]. US National Bureau of Standards, "Data Encryption Standard", Federal Information Processing Standard (FIPS), Publication 46, January 1977.
    [35]. Diffie W, Hellman ME, "New Directions in Cryptography", IEEE Transaction on Information Theory, V.IT-22,1976 (6), pp.644-654.
    [36].秦志光,“密码算法的现状和发展研究”,计算机应用,February 2004, pp.35-42.
    [37].刘开国,“电子商务中商业秘密的技术保护”,现代情报,2003(11),pp.201-203.
    [38]. Johnson N F, Jajodia S, "Exploring steganography:Seeing the unseen", IEEE Computer, Vol.31(2),1998, pp.26-34.
    [39]. R.Anderson, R.Needham, A.Shamir, "The steganographic file system", In Proceedings of the Information Hiding Workshop, April 1998, pp.125-136.
    [40].刘福礼,“P2P技术在电子商务中的应用”,黑龙江对外经贸,October 2005,pp.40-41.
    [41].杨文涛,易志雄等, “P2P网络流媒体播放系统研究”,现代电子技术,June.2005,pp.66-68.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700