WO2009124482A1 - 控制节点加入对等网络的方法和装置 - Google Patents

控制节点加入对等网络的方法和装置 Download PDF

Info

Publication number
WO2009124482A1
WO2009124482A1 PCT/CN2009/071080 CN2009071080W WO2009124482A1 WO 2009124482 A1 WO2009124482 A1 WO 2009124482A1 CN 2009071080 W CN2009071080 W CN 2009071080W WO 2009124482 A1 WO2009124482 A1 WO 2009124482A1
Authority
WO
WIPO (PCT)
Prior art keywords
peer
node
peer network
join
network
Prior art date
Application number
PCT/CN2009/071080
Other languages
English (en)
French (fr)
Inventor
郑合文
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to KR1020107023679A priority Critical patent/KR101141127B1/ko
Priority to EP09730726.8A priority patent/EP2259507B1/en
Publication of WO2009124482A1 publication Critical patent/WO2009124482A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • H04L67/1044Group management mechanisms 
    • H04L67/1046Joining mechanisms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • H04L67/1074Peer-to-peer [P2P] networks for supporting data block transmission mechanisms
    • H04L67/1078Resource delivery mechanisms
    • H04L67/1082Resource delivery mechanisms involving incentive schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service

Definitions

  • the present invention relates to the field of peer-to-peer network technologies, and in particular, to a method and apparatus for a control node to join a peer-to-peer network.
  • P2P Peer to Peer
  • the peer node has its own independent and unique identifier in the peer-to-peer network. This identifier is called Peer-ID (Peer Identity). Resources that are stored in a peer-to-peer network using a distributed storage service also have their own independent identity in the peer-to-peer network. This identity is called a resource identifier ( Resource-ID).
  • Resource-ID Resource identifier
  • Peer-to-peer networks have good self-organization and self-management characteristics. Nodes (including peer nodes and client nodes) can freely join and exit peer-to-peer networks, which makes peer-to-peer networks have good scalability.
  • a centralized registration server (Enrollment Server) is introduced in the peer-to-peer network to control the joining of the nodes, and is responsible for assigning IDs to the nodes to which the application is applied and specifying a secure boot node (Bootstrap Peer).
  • Endstrap Peer The process of joining a peer node to a peer-to-peer network is different from the process of joining a client node to a peer-to-peer network.
  • the joining peer When the peer node applies to join the peer-to-peer network, the joining peer (Joining Peer) first communicates with the registration server, and after being admitted to join, obtains the assigned peer node identifier and the specified secure boot node list, and then sends the Join.
  • the bootstrap node forwards the Join request message on the peer-to-peer network using the P2P routing mode until the permission node (Admitting Peer) responsible for the peer node identity receives the Join request message
  • the response message is then returned, thereby establishing a connection to the peer node to be joined to the licensed node, which is the node in the ID space of the peer-to-peer network that is closest to the node to be added to the peer node.
  • the client node When the client node applies to join the peer-to-peer network, the client node first communicates with the registration server, completes the authentication and authorization process, obtains the contact address of the candidate contact node (Associated Peer), and the possible client node identifier (Client-ID); Each of the candidate contact nodes sends an Inquire request message; the client node obtains information about the peer network service that the contact node can provide based on the Inquire response message returned by the candidate contact node, such as DHT (Distributed Hash Table) Histogram) algorithm and contact node status information, etc., selected The contact node sends a peer-to-peer network service connection Join request message; the contact node returns a Response message to permit the client node to join the peer-to-peer network, thereby completing the establishment of the connection.
  • DHT Distributed Hash Table
  • the effect of the first method relies heavily on the specific Puzzle mechanism, which requires storing a large number of problems, achieving a large overhead, and when a malicious node can give an answer, it still cannot prevent malicious nodes from frequently joining the peer-to-peer network.
  • the difficulty is to provide the number represented in the picture.
  • the method fails.
  • the second method cannot solve the routing jitter, signaling overhead, and possible denial of service caused by the frequent entry of malicious nodes into the peer-to-peer network, and if the malicious node joins the peer-to-peer network multiple times, the released resources are taken away when exiting and Backup, these resources are still unavailable or even lost. Summary of the invention
  • an embodiment of the present invention provides a method and apparatus for a control node to join a peer-to-peer network.
  • the technical solution is as follows:
  • a method for a control node to join a peer-to-peer network comprising:
  • a device for controlling a node to join a peer-to-peer network comprising:
  • a receiving module configured to receive a request message that the node joins the peer-to-peer network
  • a processing module configured to: after the receiving module receives the request message, determine, according to at least one of historical information of the node joining the peer network and the received history information of the request message joining the peer network When the node is not allowed to join the peer-to-peer network, the node is denied to join the peer-to-peer network.
  • the legality of the node is determined according to at least one of the historical information of the node joining the peer network and the historical information of the received request message, and it is determined that the node is not allowed to join the peer-to-peer network.
  • the node is added to the peer-to-peer network for control, which restricts the node from joining the peer-to-peer network frequently, thus solving the peer-to-peer network route caused by the frequent joining of malicious nodes to some extent. Jitter, resource unavailability or even loss and node denial of service.
  • DRAWINGS resource unavailability or even loss and node denial of service.
  • FIG. 1 is a flowchart of a method for a control node to join a peer-to-peer network according to an embodiment of the present invention
  • FIG. 2 is a flowchart of another method for a control node to join a peer-to-peer network according to an embodiment of the present invention
  • FIG. 3 is a schematic structural diagram of a peer-to-peer network provided by an embodiment of the present invention.
  • FIG. 4 is a schematic diagram of a process for a peer node to join a peer-to-peer network according to an embodiment of the present invention
  • FIG. 5 is a schematic diagram of a process for a client node to join a peer-to-peer network according to an embodiment of the present invention
  • FIG. 6 is a schematic structural diagram of an apparatus for a control node to join a peer-to-peer network according to an embodiment of the present invention
  • FIG. 7 is a schematic structural diagram of another apparatus for adding a control node to a peer-to-peer network according to an embodiment of the present invention
  • Another schematic diagram of a device structure in which a control node is added to a peer-to-peer network is provided by the embodiment.
  • the method for the control node to join the peer-to-peer network after receiving the request message of the peer-to-peer network, according to the history information of the node joining the peer-to-peer network and the received request message of joining the peer-to-peer network At least one of the historical information determines that the node is not allowed to join the peer-to-peer network when the node is not allowed to join the peer-to-peer network.
  • FIG. 1 is a flowchart of a method for a control node to join a peer-to-peer network according to an embodiment of the present disclosure, where the method specifically includes: 101: Receive a request message that a node joins the peer network.
  • Step 102 Determine, according to the history information of the node joining the peer-to-peer network, whether the node is allowed to join the peer-to-peer network, and if yes, execute 103; otherwise, execute 104.
  • multiple methods may be used, including but not limited to at least one of the following two types:
  • the predetermined time, the first threshold, and the second threshold may be set as needed, such as setting a specified time to be 1 hour, setting a first threshold to 10, and setting a second threshold to 5 minutes.
  • the peer-to-peer network mentioned in the historical information of the node joining the peer-to-peer network may be a designated peer-to-peer network, such as the peer-to-peer network that the node requests to join, or all peer-to-peer networks.
  • the node is refused to join the peer-to-peer network. Further, the request message may be discarded, and the log is generated or an alarm message is generated, and then the process ends.
  • the node may be notified to re-apply to join the peer-to-peer network after a specified time. For example, if the local device is busy, reject the current application of the node and set a delay time of 30 minutes to notify the node to re-apply the next application after 30 minutes.
  • the node may also add the related information of the current application to the peer-to-peer network, such as the result of the control (reject or allow to join), to record the history information of the saved node joining the peer-to-peer network, so as to facilitate the subsequent receiving of the join pair.
  • the request message of the network is received, the judgment is made based on the result of the current control.
  • the method shown in this embodiment determines the legitimacy of the node according to the historical information of the node joining the peer network, and determines that the node is not allowed to join the peer network when the node is not allowed to join the peer-to-peer network.
  • Controlling the joining of nodes to the peer-to-peer network restricts the nodes from joining the peer-to-peer network frequently, which solves to some extent the peer-to-peer network routing jitter, resource unavailability or even loss due to the frequent entry of malicious nodes into the peer-to-peer network. And problems such as node denial of service. Compared with the existing Puzzle mechanism, there is no need to store a large number of problems, which greatly saves overhead and has better control effects.
  • it may judge according to the frequency of receiving the request message, or judge according to the time of the node staying, or combine to judge, Single convenient, easy to implement, and more flexible to apply.
  • FIG. 2 is a flowchart of another method for a control node to join a peer-to-peer network according to an embodiment of the present disclosure, where the method specifically includes:
  • whether to allow the node to join the peer-to-peer network may be performed in various manners, including but not limited to the following:
  • the specified time and the third threshold may be set as needed, such as setting the specified time to 1 hour and setting the third threshold to 50.
  • the peer-to-peer network mentioned in the history information of the received request message for joining the peer-to-peer network may be a designated peer-to-peer network, such as the peer-to-peer network that the node requests to join, or all peer-to-peer networks.
  • the node may be notified to re-apply to join the peer-to-peer network after a specified time.
  • the node may also add the related information of the current application to the peer network, such as the result of the control (reject or allow to join), to record the history information of the saved request message of joining the peer network, so as to facilitate subsequent receiving.
  • the request message of the peer-to-peer network is combined with the result of the current control, the judgment is made.
  • the method shown in this embodiment determines the legality of the node according to the historical information of the received request message that is added to the peer-to-peer network, and refuses to join the node when it is determined that the node is not allowed to join the peer-to-peer network.
  • the peer-to-peer network implements the control of the node joining the peer-to-peer network, which restricts the nodes from joining the peer-to-peer network frequently, thus solving the peer-to-peer network route jitter caused by the malicious nodes frequently joining the peer-to-peer network. Resources are unavailable or even lost and nodes are denied service. Compared with the existing Puzzle mechanism, there is no need to store a large number of problems, which greatly saves overhead and has better control effects.
  • the two judgments are in no particular order, and may be determined according to the history information of the peer network added to the peer network, or may be based on the received The history information of the request message of the peer-to-peer network is determined, and the specific judgment process and the subsequent process are the same as those in the foregoing embodiment, and details are not described herein again.
  • better control effects can be achieved, avoiding nodes joining the peer-to-peer network too frequently, and better mitigating peer-to-peer network route jitter, resource unavailability or even loss due to frequent joining of malicious nodes. Node denial of service and other issues.
  • the functions of the foregoing technical solutions provided for determining the nodes that request to join the peer-to-peer network and the corresponding processing functions may be integrated on the registration server in the peer-to-peer network, or may be integrated on the peer nodes in the peer-to-peer network. , such as a bootstrap node, a peer node that provides peer-to-peer network services for client nodes, and so on.
  • the peer node When integrated on the peer node, the peer node can obtain historical information of the node to apply for joining from the registration server; if the peer node is fixed in the network deployment relative to the node to apply for (such as a gateway), The iB hai peer node can collect the history information of the node to which the application is applied; and all the peer nodes can record the history information of the node to which the application is applied as a kind of resource, and store the pair with the distributed storage service of the peer-to-peer network. On the network, to get it from the peer-to-peer network when needed.
  • peer node 1 there are seven peer nodes in the peer-to-peer network, peer node 1 to peer node 7, and the registration server is connected to peer node 1 and peer node 2, respectively.
  • the peer node 1 requests to join the peer-to-peer network, it can be judged and processed by the registration server integrated with the above functions, or can be judged and processed by other nodes integrated with the above functions, such as the peer node 2.
  • peer nodes can be coupled with SIP functions, such as SIP Proxy Server (proxy server) function, SIP Redirect Server.
  • SIP Proxy Server proxy server
  • SIP Redirect Server SIP Redirect Server
  • SIP UA User Agent
  • SIP UA User Agent
  • Client nodes are usually coupled to SIP UA functions.
  • P2P SIP Peer Protocol communication between peer nodes, client nodes and peer nodes without SIP coupling use P2P SIP ClientProtocol communication, SIP SIP communication is used between the UA entity and the peer node that is coupled with the SIP Proxy Server function or the SIP Redirect Server function.
  • the following takes the P2P SIP network reference model as an example to illustrate the process of joining a peer node and a client node to a peer-to-peer network.
  • the process of adding a peer-to-peer network to a peer-to-peer network is described as an example of the peer node 1 in Figure 3 requesting to join the peer-to-peer network.
  • the process is as follows:
  • the peer node 1 sends a Join request message requesting to join the peer network to the registration server;
  • the registration server determines whether to allow the peer node 1 to join the peer-to-peer network according to the above method, and if not, rejects absolutely wait for node 1 to join the peer network, discarding the Join request message;
  • the registration server If the peer node 1 is allowed to join the peer-to-peer network, the registration server returns information such as the peer node identifier, the boot node list, and the like allocated to the peer node 1;
  • Peer node 1 sends a Join request message to Peer node 2 (the boot node specified by the registration server for Peer node 1);
  • the peer node 2 forwards the Join request message to the peer node 3 (responsible for the licensed node identified by the peer node 1);
  • the peer node 3 replies a Response message to the peer node 2;
  • the peer node 2 forwards the Response message to the peer node 1, thereby completing the process in which the peer node 1 establishes a connection with the peer node 3, and ends the peer node 1 joining the peer-to-peer network.
  • the malicious peer nodes can be restricted from joining the peer-to-peer network frequently, thus solving the peer-to-peer network routing caused by the malicious peer nodes frequently joining the peer-to-peer network. Jitter, resource unavailability or even loss and node denial of service.
  • FIG. 5 a schematic diagram of a process for joining a peer node to a peer-to-peer network is illustrated by the client node 1 in FIG. 3 requesting to join the peer-to-peer network.
  • the process is as follows:
  • the client node 1 sends a Join request message requesting to join the peer network to the registration server;
  • the registration server determines, according to the foregoing method, whether the client node 1 is allowed to join the peer-to-peer network. If not, the client node 1 is denied to join the peer-to-peer network, and the request message is discarded.
  • the registration server If the client node 1 is allowed to join the peer-to-peer network, the registration server returns information such as the client node identifier, the candidate contact node list, and the like assigned to the client node 1, wherein the candidate contact node includes the peer node 1 and the peer node 2;
  • the client node 1 sends an Inquire request message to the peer node 1;
  • the client node 1 sends an Inquire request message to the peer node 2;
  • the peer node 1 replies a Response message to the client node 1, and carries information about the peer network service that the peer node 1 can provide, such as the DHT algorithm and the status information of the peer node 1;
  • the peer node 2 replies a Response message to the client node 1, and carries information about the peer-to-peer network service that the peer node 2 can provide, such as the DHT algorithm and the status information of the peer node 2;
  • the client node 1 selects the peer node 1 as the contact node according to the received information, and sends a Join request message to it;
  • the peer node 1 replies with a Response message, if the Join request message sent by the client node 1 is not carried. To authenticate the required identity information, the peer node 1 sends a response message to the client node 1, and carries a response code 404 in the response message, requesting the client node 1 to provide identity information;
  • the response code 404 can be carried by w/404.
  • the client node 1 sends a Join request message carrying the identity information to the peer node 1;
  • the peer node 1 replies with a Response response message, thereby completing the process in which the client node 1 establishes a connection with the peer node 1 and ends the client node 1 joining the peer-to-peer network.
  • the client node 1 If the client node 1 provides the identity information in step 408, the client node 1 establishes a connection with the peer node 1 after the peer node 1 replies to the Response message in step 409, and does not need to send a response message to the client node 1, and does not need to execute. Steps 410 and 411.
  • the malicious client node can be restricted from joining the peer-to-peer network frequently, thereby alleviating the performance degradation or even rejection of the peer node directly connected to the client node due to frequent entry of the malicious client node into the peer-to-peer network. service.
  • an embodiment of the present invention further provides an apparatus for a control node to join a peer-to-peer network, which specifically includes: a receiving module 501, configured to receive a request message that a node joins a peer-to-peer network;
  • the processing module 502 is configured to: after receiving the request message, the receiving module 501 determines, according to at least one of the historical information of the node joining the peer network and the received history information of the request message added to the peer network, When the node is allowed to join the peer-to-peer network, the node is denied to join the peer-to-peer network.
  • the processing module 502 specifically includes:
  • a first processing unit configured to determine, after the receiving module receives the request message, whether the number of request messages that the node receives the peer network in the specified time is higher than a preset first threshold, and if yes, rejects This node joins the peer-to-peer network.
  • processing module 502 specifically includes:
  • a second processing unit configured to: after the receiving module receives the request message, determine whether an average time that the node stays on the peer network multiple times is lower than a preset second threshold, and if yes, reject the node to join the pair Waiting for the network.
  • processing module 502 specifically includes:
  • a third processing unit configured to determine, after the receiving module receives the request message, whether the number of all the request messages received into the peer-to-peer network received within the specified time is higher than a preset third threshold, and if yes, rejecting This node joins the peer-to-peer network.
  • the above device further includes:
  • the recording module 503 is configured to record, after the processing module 502 rejects the node to join the peer-to-peer network, record information about the node applying to join the peer-to-peer network. Further, referring to FIG. 8, the foregoing apparatus may further include:
  • the notification module 504 is configured to notify the node to re-apply to join the peer-to-peer network after the specified time after the processing module 502 rejects the node to join the peer-to-peer network.
  • the device shown in this embodiment determines the legal component of the node to which the application is applied, and when it is determined that the node is not allowed to join the peer-to-peer network, the node is denied to join the peer-to-peer network, and the node is added to the peer-to-peer network.
  • Controlling restricting the nodes from joining the peer-to-peer network frequently, solves the problem of peer-to-peer network routing jitter, resource unavailability or even loss, and node denial of service due to the frequent entry of malicious nodes into the peer-to-peer network.
  • there is no need to store a large number of problems which greatly saves overhead and has better control effects.
  • Embodiments of the invention may be implemented in software, and the corresponding software program may be stored in a readable storage medium, such as a hard disk, a cache, or an optical disk of a computer.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Mathematical Physics (AREA)
  • Theoretical Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)

Description

控制节点加入对等网络的方法和装置 本申请要求于 2008年 4月 11 日提交中国专利局、 申请号为 200810103905.6、 发明名 称为 "控制节点加入对等网络的方法和装置" 的中国专利申请的优先权, 其全部内容通过 引用结合在本申请中。 说
技术领域
本发明涉及对等网络技术领域, 特别涉及一种控制节点加入对等网络的方法和装置。 背景技术 书
P2P (Peer to Peer, 对等网络) 由多个独立的节点相互连接形成, 这些节点被称为对等 节点。 对等节点在对等网络中有着自己独立并且唯一的标识, 这个标识被称为对等节点标 识(Peer-ID, Peer Identity)。 使用分布式存储服务保存在对等网络中的资源, 在对等网络中 也有自己独立的标识, 这个标识被称为资源标识 ( Resource-ID )。
对等网络具有良好的自组织与自管理特性, 节点 (包括对等节点与客户节点) 可以自 由的加入和退出对等网络, 这使得对等网络具有良好的可扩展性。 通常对等网络中会引入 集中式的注册服务器 (Enrollment Server) 来控制节点的加入, 并负责为申请加入的节点分 配 ID以及指定安全的引导节点 (Bootstrap Peer) 等。 对等节点加入对等网络的过程与客 户节点加入对等网络的过程是有区别的。 当对等节点申请加入对等网络时, 待加入对等节 点 (Joining Peer) 首先与注册服务器通讯, 被许可加入后, 获得分配的对等节点标识以及 指定的安全的引导节点列表, 然后发送 Join (加入)请求消息给选定的引导节点; 该引导节 点使用 P2P路由模式在对等网络上转发该 Join请求消息, 直到负责该对等节点标识的许可 节点 (Admitting Peer) 收到该 Join请求消息后返回 Response (应答) 消息, 从而建立了待 加入对等节点与许可节点的连接, 该许可节点是在对等网络的 ID空间中 ID最靠近待加入 对等节点的节点。 当客户节点申请加入对等网络时, 客户节点首先与注册服务器通讯, 完 成认证和授权处理, 获得候选的联系节点 (Associated Peer) 的联系地址以及可能的客户节 点标识 (Client-ID); 然后向候选的每个联系节点发送 Inquire (查询) 请求消息; 客户节点 根据候选的联系节点返回的 Inquire应答消息中的联系节点能提供的对等网络服务的信息, 如 DHT (Distributed Hash Table, 分布式哈希表) 算法以及联系节点状态信息等, 向选定的 联系节点发送对等网络服务连接 Join请求消息; 该联系节点返回 Response消息许可客户节 点加入对等网络, 从而完成建立连接。
当节点离开对等网络时, 其它的节点需要了解离开的节点的信息, 然后更新路由表以 防 l h路由黑洞 (即不可到达或访问的 ID空间) 持续存在, 但是在对等网络节点的路由收敛 之前不可避免存在路由黑洞, 这个过程即为路由抖动。 当有恶意节点频繁地加入和退出对 等网络时, 并且在退出对等网络时不将自己负责存储的资源转移到其它节点上, 这样将导 致对等网络的路由空间出现不可到达的黑洞, 同时还会导致大量存储在对等网络上的资源 不可用甚至丢失; 另外, 恶意节点频繁的加入和退出也会增加节点的处理负担, 从而导致 因为节点太忙而拒绝服务 (Denial of Service, DoS)。 由此可见, 对等网络中节点的自由加 入和退出将直接影响对等网络的路由以及资源的可用性。
现有技术中对于恶意节点频繁加入对等网络的行为, 通常有两种处理方法, 一种是在 收到节点加入对等网络的请求时, 抛出一个难题(Puzzle)给该节点解答, 只有当该节点给 出正确的答案时, 才允许该节点加入对等网络, 从而限制节点加入对等网络的频率。 另一 种是在资源发布到对等网络上进行分布式存储时, 通过复制和重发布的机制备份这些资源, 这样即使恶意节点频繁加入和退出对等网络, 也不会影响这些资源的可用性。
在对现有技术进行分析后, 发明人发现:
第一种方法的效果严重依赖于具体采用的 Puzzle机制, 需要存储大量的难题, 实现开 销比较大, 且当恶意节点能给出答案时, 仍不能防止恶意节点频繁加入对等网络。 比如难 题是要求提供图片中表示的数字, 当恶意节点采用对应的图片识别技术设别出图片中表示 的数字时, 导致该方法失效。 第二种方法不能解决由于恶意节点频繁加入对等网络带来的 路由抖动、 信令开销以及可能的拒绝服务, 而且如果恶意节点多次加入对等网络, 退出时 带走已发布的资源及其备份, 则这些资源仍然不可用甚至丢失。 发明内容
为了限制节点频繁地加入对等网络, 本发明实施例提供了一种控制节点加入对等网络 的方法和装置。 所述技术方案如下:
一种控制节点加入对等网络的方法, 所述方法包括:
接收节点加入对等网络的请求消息;
根据所述节点加入对等网络的历史信息和已接收的加入对等网络的请求消息的历史信 息中的至少一种, 确定出不允许所述节点加入所述对等网络时, 拒绝所述节点加入所述对 等网络。 一种控制节点加入对等网络的装置, 所述装置包括:
接收模块, 用于接收节点加入对等网络的请求消息;
处理模块, 用于在所述接收模块接收到所述请求消息后, 根据所述节点加入对等网络 的历史信息和已接收的加入对等网络的请求消息的历史信息中的至少一种, 确定出不允许 所述节点加入所述对等网络时, 拒绝所述节点加入所述对等网络。
本发明实施例, 通过根据节点加入对等网络的历史信息和已接收的请求消息的历史信 息中的至少一种对该节点的合法性进行判断, 并在确定出不允许该节点加入对等网络时, 拒绝该节点加入对等网络, 实现了对节点加入对等网络进行控制, 限制了节点频繁地加入 对等网络, 从而在一定程度上解决了由于恶意节点频繁加入而导致的对等网络路由抖动、 资源不可用甚至失去以及节点拒绝服务等问题。 与现有的 Puzzle机制相比, 不需要存储大 量的难题, 极大地节省了开销, 且具有更好的控制效果。 附图说明
图 1是本发明实施例提供的一种控制节点加入对等网络的方法流程图;
图 2是本发明实施例提供的另一种控制节点加入对等网络的方法流程图;
图 3是本发明实施例提供的对等网络结构示意图;
图 4是本发明实施例提供的对等节点加入对等网络流程示意图;
图 5是本发明实施例提供的客户节点加入对等网络流程示意图;
图 6是本发明实施例提供的一种控制节点加入对等网络的装置结构示意图; 图 7是本发明实施例提供的另一种控制节点加入对等网络的装置结构示意图; 图 8是本发明实施例提供的又一种控制节点加入对等网络的装置结构示意图。 具体实施方式
为使本发明的目的、 技术方案和优点更加清楚, 下面将结合附图对本发明实施方式作 进一步地详细描述。
本发明实施例提供的控制节点加入对等网络的方法, 通过在接收到节点加入对等网络 的请求消息后, 根据该节点加入对等网络的历史信息和已接收的加入对等网络的请求消息 的历史信息中的至少一种, 确定出不允许该节点加入对等网络时, 拒绝该节点加入该对等 网络。
参见图 1, 为本发明实施例提供的一种控制节点加入对等网络的方法流程图, 该方法具 体包括: 101: 接收某个节点加入对等网络的请求消息。
102: 根据该节点加入对等网络的历史信息, 判断是否允许该节点加入对等网络, 如果 是, 则执行 103 ; 否则, 执行 104。
根据该节点加入对等网络的历史信息判断是否允许该节点加入对等网络, 可以采用多 种方式, 包括但不限于以下两种中的至少一种:
1 )判断在规定时间内接收到该节点加入对等网络的请求消息的数目是否高于预设的第 一阈值, 如果是, 则拒绝该节点加入对等网络; 否则, 允许该节点加入对等网络。
2) 判断该节点在对等网络上多次停留的平均时间是否低于预设的第二阈值, 如果是, 则拒绝该节点加入对等网络; 否则, 允许该节点加入对等网络。
其中, 规定时间、 第一阈值和第二阈值可以根据需要进行设置, 如设置规定时间为 1 个小时、 设置第一阈值为 10、 设置第二阈值为 5分钟。 当同时采用上述两种方式进行判断 时, 二者不分先后顺序。
另外, 上述节点加入对等网络的历史信息中提及的对等网络可以是指定的对等网络, 如上述节点请求加入的对等网络, 也可以是所有的对等网络。
103: 允许该节点加入对等网络, 相应地, 回复应答消息给该节点, 并将为该节点分配 的节点标识以及引导节点列表等信息发送给该节点, 然后结束。
104: 拒绝该节点加入对等网络, 进一步地, 还可以丢弃该请求消息, 并记入日志或产 生告警信息, 然后结束。
进一步地, 拒绝该节点加入对等网络之后, 还可以通知该节点在规定时间后重新申请 加入对等网络。 例如, 在本地设备比较繁忙的情况下, 拒绝该节点本次的申请, 并设置延 迟时间 30分钟, 通知该节点可以在 30分钟后重新进行下一次申请。
另外, 还可以将该节点本次申请加入对等网络的相关信息如控制的结果 (拒绝或允许 加入) 记录到已保存的该节点加入对等网络的历史信息中, 以方便后续接收到加入对等网 络的请求消息时, 结合本次控制的结果进行判断。
本实施例所示的方法, 通过根据节点加入对等网络的历史信息对该节点的合法性进行 判断, 并在判断出不允许该节点加入对等网络时, 拒绝该节点加入对等网络, 实现了对节 点加入对等网络进行控制, 限制了节点频繁地加入对等网络, 从而在一定程度上解决了由 于恶意节点频繁加入对等网络, 而导致的对等网络路由抖动、 资源不可用甚至失去以及节 点拒绝服务等问题。 与现有的 Puzzle机制相比, 不需要存储大量的难题, 极大地节省了开 销, 且具有更好的控制效果。 在判断是否允许节点加入对等网络时, 既可以根据接收请求 消息的频率进行判断, 也可以根据节点停留的时间进行判断, 或者结合起来进行判断, 简 单方便、 容易实现、 应用更灵活。
参见图 2, 为本发明实施例提供的另一种控制节点加入对等网络的方法流程图, 该方法 具体包括:
201: 接收某个节点加入对等网络的请求消息。
202: 根据已接收的加入对等网络的请求消息的历史信息, 判断是否允许该节点加入对 等网络, 如果是, 则执行 203 ; 否则, 执行 204。
根据已接收的加入对等网络的请求消息的历史信息, 判断是否允许节点加入对等网络, 可以采用多种方式, 包括但不限于以下方式:
判断在规定时间内接收到的所有加入对等网络的请求消息的数目 (即所有节点加入对 等网络的平均频率) 是否高于预设的第三阈值, 如果是, 则拒绝该节点加入对等网络; 否 贝 U, 允许该节点加入对等网络。
其中, 规定时间和第三阈值可以根据需要进行设置, 如设置规定时间为 1 个小时、 设 置第三阈值为 50。
另外, 上述已接收的加入对等网络的请求消息的历史信息中提及的对等网络可以是指 定的对等网络, 如上述节点请求加入的对等网络, 也可以是所有的对等网络。
203: 允许该节点加入对等网络, 相应地, 回复应答消息给该节点, 并将为该节点分配 的节点标识以及引导对等节点列表等信息发送给该节点, 然后结束。
204: 拒绝该节点加入对等网络, 进一步地, 还可以丢弃该请求消息, 并记入日志或产 生告警信息, 然后结束。
进一步地, 拒绝该节点加入对等网络之后, 还可以通知该节点在规定时间后重新申请 加入对等网络。
另外, 还可以将该节点本次申请加入对等网络的相关信息如控制的结果 (拒绝或允许 加入) 记录到已保存的加入对等网络的请求消息的历史信息中, 以方便后续接收到加入对 等网络的请求消息时, 结合本次控制的结果进行判断。
本实施例所示的方法, 通过根据已接收的加入对等网络的请求消息的历史信息对该节 点的合法性进行判断, 并在判断出不允许该节点加入对等网络时, 拒绝该节点加入对等网 络, 实现了对节点加入对等网络进行控制, 限制了节点频繁地加入对等网络, 从而在一定 程度上解决了由于恶意节点频繁加入对等网络, 而导致的对等网络路由抖动、 资源不可用 甚至失去以及节点拒绝服务等问题。 与现有的 Puzzle机制相比, 不需要存储大量的难题, 极大地节省了开销, 且具有更好的控制效果。 判断是否允许节点加入对等网络的过程, 简 单方便、 容易实现、 应用更灵活。 为了达到更好的控制效果, 进一步地, 还可以将图 1所示的技术方案与图 2所示的技 术方案结合起来应用, 即根据节点加入对等网络的历史信息和已接收的加入对等网络的请 求消息的历史信息, 判断是否允许该节点加入对等网络, 此时, 两种判断不分先后, 可以 先根据该节点加入对等网络的历史信息进行判断, 也可以先根据已接收的加入对等网络的 请求消息的历史信息进行判断, 具体的判断过程以及后续的处理均与上述实施例中的相关 描述相同, 此处不再赘述。 通过以上两种判断, 可以达到更好的控制效果, 避免节点过于 频繁地加入对等网络, 并能较好地缓解由于恶意节点频繁加入而导致的对等网络路由抖动、 资源不可用甚至失去以及节点拒绝服务等问题。
上述所有实施例提供的技术方案中对请求加入对等网络的节点进行判断以及相应处理 的功能, 可以集成在对等网络中的注册服务器上, 也可以集成在对等网络中的对等节点上, 如引导节点、 为客户节点提供对等网络服务的对等节点等。 当集成在对等节点上时, 该对 等节点可以从注册服务器获取申请加入的节点的历史信息; 如果在网络部署中该对等节点 相对于申请加入的节点是固定的 (如网关), 贝 iB亥对等节点可以自己收集申请加入的节点的 历史信息; 并且所有的对等节点可以将申请加入的节点的历史信息作为一种资源记录, 并 使用对等网络的分布式存储服务存储到对等网络上, 以方便需要时从对等网络上获取。
例如, 参见图 3, 对等网络中有 7个对等节点, 对等节点 1至对等节点 7, 注册服务器 分别与对等节点 1和对等节点 2相连。 当对等节点 1请求加入对等网络时, 可以由集成了 上述功能的注册服务器进行判断和处理,也可以由集成了上述功能的其它节点如对等节点 2 进行判断和处理。
在 P2P SIP (Peer-to-Peer Session Initiation Protocol, 对等会话初始化协议) 网络参考模 型中,对等节点可以耦合 SIP功能,如 SIP Proxy Server (代理服务器)功能、 SIP Redirect Server
(重定向服务器) 功能、 SIP UA (User Agent, 用户代理) 功能和信令网关功能等等, 客户 节点通常耦合 SIP UA功能。对等节点之间通过 P2P SIP Peer Protocol (对等会话初始化对等 协议)通讯,客户节点与没有耦合 SIP功能的对等节点与之间使用 P2P SIP ClientProtocol (对 等会话初始化客户协议)通讯, SIP UA实体与耦合了 SIP Proxy Server功能或者 SIP Redirect Server功能的对等节点之间采用 SIP通讯。
下面以 P2P SIP 网络参考模型为例, 分别说明对等节点与客户节点加入对等网络的过 程。 参见图 4, 为对等节点加入对等网络的流程示意图, 以图 3中的对等节点 1请求加入对 等网络为例进行说明, 该过程具体如下:
301: 对等节点 1向注册服务器发送请求加入对等网络的 Join请求消息;
302: 注册服务器按照上述方法判断是否允许对等节点 1加入对等网络, 如果否, 则拒 绝对等节点 1加入对等网络, 丢弃该 Join请求消息;
303: 如果允许对等节点 1加入对等网络, 则注册服务器返回为对等节点 1分配的对等 节点标识、 引导节点列表等信息;
304: 对等节点 1 向对等节点 2 (注册服务器为对等节点 1指定的引导节点) 发送 Join 请求消息;
305: 对等节点 2将该 Join请求消息转发给对等节点 3 (负责对等节点 1标识的许可节 点);
306: 对等节点 3回复 Response消息给对等节点 2;
307: 对等节点 2将该 Response消息转发给对等节点 1, 从而完成对等节点 1与对等节 点 3建立连接, 结束对等节点 1加入对等网络的过程。
利用上述方法控制对等节点加入对等网络, 可以限制恶意对等节点频繁的加入对等网 络, 从而在一定程度上解决了由于恶意对等节点频繁加入对等网络, 而导致的对等网络路 由抖动、 资源不可用甚至失去以及节点拒绝服务等问题。
参见图 5, 为客户节点加入对等网络的流程示意图, 以图 3中的客户节点 1请求加入对 等网络为例进行说明, 该过程具体如下:
401: 客户节点 1向注册服务器发送请求加入对等网络的 Join请求消息;
402: 注册服务器按照上述方法判断是否允许客户节点 1加入对等网络, 如果否, 则拒 绝客户节点 1加入对等网络, 丢弃该请求消息;
403: 如果允许客户节点 1加入对等网络, 则注册服务器返回为客户节点 1分配的客户 节点标识、候选的联系节点列表等信息,其中候选的联系节点包括对等节点 1和对等节点 2;
404: 客户节点 1向对等节点 1发送 Inquire请求消息;
405: 客户节点 1向对等节点 2发送 Inquire请求消息;
406: 对等节点 1回复 Response消息给客户节点 1, 其中携带对等节点 1能提供的对等 网络服务的信息, 如 DHT算法以及对等节点 1的状态信息等;
例如: 在 Response消息中携带应答代码 200, 用 w/200 (with response code 200, 携带 应答代码 200) 表示。
407: 对等节点 2回复 Response消息给客户节点 1, 其中携带对等节点 2能提供的对等 网络服务的信息, 如 DHT算法以及对等节点 2的状态信息等;
408: 客户节点 1根据收到的信息选择对等节点 1为联系节点, 并向其发送 Join请求消 息;
409: 对等节点 1回复 Response消息, 如果客户节点 1发来的 Join请求消息中未携带 认证需要的身份信息, 则对等节点 1 向客户节点 1发送应答消息, 并在应答消息中携带应 答代码 404, 要求客户节点 1提供身份信息;
可以用 w/404表示携带应答代码 404。
410: 客户节点 1发送携带身份信息的 Join请求消息给对等节点 1 ;
411 :对等节点 1回复 Response应答消息,从而完成客户节点 1与对等节点 1建立连接, 结束客户节点 1加入对等网络的过程。
如果步骤 408中客户节点 1提供了身份信息, 则步骤 409中对等节点 1回复 Response 消息后即完成客户节点 1与对等节点 1建立连接, 不需要向客户节点 1发送应答消息、 不 需要执行步骤 410和 411。
利用上述方法控制客户节点加入对等网络, 可以限制恶意客户节点频繁的加入对等网 络, 从而缓解了由于恶意客户节点频繁加入对等网络而导致与客户节点直接相连的对等节 点性能降低甚至拒绝服务。
参见图 6, 本发明实施例还提供了一种控制节点加入对等网络的装置, 具体包括: 接收模块 501, 用于接收节点加入对等网络的请求消息;
处理模块 502, 用于在接收模块 501接收到上述请求消息后, 根据该节点加入对等网络 的历史信息和已接收的加入对等网络的请求消息的历史信息中的至少一种, 确定出不允许 该节点加入对等网络时, 拒绝该节点加入对等网络。
其中, 处理模块 502具体包括:
第一处理单元, 用于在接收模块接收到上述请求消息后, 判断在规定时间内接收到该 节点加入对等网络的请求消息的数目是否高于预设的第一阈值, 如果是, 则拒绝该节点加 入对等网络。
或者, 处理模块 502具体包括:
第二处理单元, 用于在接收模块接收到上述请求消息后, 判断该节点在对等网络上多 次停留的平均时间是否低于预设的第二阈值, 如果是, 则拒绝该节点加入对等网络。
或者, 处理模块 502具体包括:
第三处理单元, 用于在接收模块接收到上述请求消息后, 判断在规定时间内接收到的 所有加入对等网络的请求消息的数目是否高于预设的第三阈值, 如果是, 则拒绝该节点加 入对等网络。
进一步地, 参见图 7, 上述装置还包括:
记录模块 503, 用于在处理模块 502拒绝该节点加入对等网络后, 记录该节点本次申请 加入对等网络的相关信息。 进一步地, 参见图 8, 上述装置还可以包括:
通知模块 504, 用于在处理模块 502拒绝该节点加入对等网络后, 通知该节点在规定时 间后重新申请加入对等网络。
本实施例所示的装置, 通过对申请加入的节点的合法件进行判断, 并在判断出不允许 该节点加入对等网络时, 拒绝该节点加入对等网络, 实现了对节点加入对等网络进行控制, 限制了节点频繁地加入对等网络, 从而在一定程度上解决了由于恶意节点频繁加入对等网 络, 而导致的对等网络路由抖动、 资源不可用甚至失去以及节点拒绝服务等问题。 与现有 的 Puzzle机制相比, 不需要存储大量的难题, 极大地节省了开销, 且具有更好的控制效果。 在判断是否允许节点加入对等网络时, 可以根据接收请求消息的频率进行判断, 或根据该 节点停留的时间进行判断, 或根据收到的所有请求消息的数目进行判断, 或者结合起来进 行判断, 简单方便、 容易实现、 应用更灵活。 本发明实施例可以利用软件实现, 相应的软件程序可以存储在可读取的存储介质中, 例如, 计算机的硬盘、 缓存或光盘中。
以上所述仅为本发明的较佳实施例, 并不用以限制本发明, 凡在本发明的精神和原则 之内, 所作的任何修改、 等同替换、 改进等, 均应包含在本发明的保护范围之内。

Claims

权 利 要 求 书
1 . 一种控制节点加入对等网络的方法, 其特征在于, 所述方法包括:
接收节点加入对等网络的请求消息;
根据所述节点加入对等网络的历史信息和已接收的加入对等网络的请求消息的历史信 息中的至少一种, 确定出不允许所述节点加入所述对等网络时, 拒绝所述节点加入所述对 等网络。
2. 根据权利要求 1所述的控制节点加入对等网络的方法, 其特征在于, 所述根据所述 节点加入对等网络的历史信息, 确定出不允许所述节点加入所述对等网络时, 拒绝所述节 点加入所述对等网络, 具体包括:
判断在规定时间内接收到的所述节点加入对等网络的请求消息的数目是否高于预设的 第一阈值, 如果是, 则拒绝所述节点加入所述对等网络。
3 . 根据权利要求 1所述的控制节点加入对等网络的方法, 其特征在于, 所述根据所述 节点加入对等网络的历史信息, 确定出不允许所述节点加入所述对等网络时, 拒绝所述节 点加入所述对等网络, 具体包括:
判断所述节点在对等网络上多次停留的平均时间是否低于预设的第二阈值, 如果是, 则拒绝所述节点加入所述对等网络。
4. 根据权利要求 1所述的控制节点加入对等网络的方法, 其特征在于, 所述根据已接 收的加入对等网络的请求消息的历史信息, 确定出不允许所述节点加入所述对等网络时, 拒绝所述节点加入所述对等网络, 具体包括:
判断在规定时间内接收到的所有加入对等网络的请求消息的数目是否高于预设的第三 阈值, 如果是, 则拒绝所述节点加入所述对等网络。
5. 根据权利要求 1至 4中任一权利要求所述的控制节点加入对等网络的方法, 其特征 在于, 所述拒绝所述节点加入所述对等网络之后, 还包括:
记录所述节点本次申请加入所述对等网络的相关信息。
6. 根据权利要求 1至 4中任一权利要求所述的控制节点加入对等网络的方法, 其特征 在于, 所述拒绝所述节点加入所述对等网络之后, 还包括:
通知所述节点在规定时间后重新申请加入所述对等网络。
7. 一种控制节点加入对等网络的装置, 其特征在于, 所述装置包括:
接收模块, 用于接收节点加入对等网络的请求消息;
处理模块, 用于在所述接收模块接收到所述请求消息后, 根据所述节点加入对等网络 的历史信息和已接收的加入对等网络的请求消息的历史信息中的至少一种, 确定出不允许 所述节点加入所述对等网络时, 拒绝所述节点加入所述对等网络。
8. 根据权利要求 7所述的控制节点加入对等网络的装置, 其特征在于, 所述处理模块 具体包括:
第一处理单元, 用于在所述接收模块接收到所述请求消息后, 判断在规定时间内接收 到的所述节点加入对等网络的请求消息的数目是否高于预设的第一阈值, 如果是, 则拒绝 所述节点加入所述对等网络。
9. 根据权利要求 7所述的控制节点加入对等网络的装置, 其特征在于, 所述处理模块 具体包括:
第二处理单元, 用于在所述接收模块接收到所述请求消息后, 判断所述节点在对等网 络上多次停留的平均时间是否低于预设的第二阈值, 如果是, 则拒绝所述节点加入所述对 等网络。
10. 根据权利要求 7所述的控制节点加入对等网络的装置, 其特征在于, 所述处理模 块具体包括:
第三处理单元, 用于在所述接收模块接收到所述请求消息后, 判断在规定时间内接收 到的所有加入对等网络的请求消息的数目是否高于预设的第三阈值, 如果是, 则拒绝所述 节点加入所述对等网络。
11 . 根据权利要求 7至 10中任一权利要求所述的控制节点加入对等网络的装置, 其特 征于, 所述装置还包括:
记录模块, 用于在所述处理模块拒绝所述节点加入所述对等网络后, 记录所述节点本 次申请加入所述对等网络的相关信息。
12. 根据权利要求 7至 10中任一权利要求所述的控制节点加入对等网络的装置, 其特 征在于, 所述装置还包括:
通知模块, 用于在所述处理模块拒绝所述节点加入所述对等网络后, 通知所述节点在 规定时间后重新申请加入所述对等网络。
PCT/CN2009/071080 2008-04-11 2009-03-30 控制节点加入对等网络的方法和装置 WO2009124482A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
KR1020107023679A KR101141127B1 (ko) 2008-04-11 2009-03-30 동등 계층 네트워크에 접속하기 위해 노드를 제어하기 위한 방법 및 장치
EP09730726.8A EP2259507B1 (en) 2008-04-11 2009-03-30 Method and device for controlling a node to join in a peer-to-peer network

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN 200810103905 CN101557335B (zh) 2008-04-11 2008-04-11 控制节点加入对等网络的方法和装置
CN200810103905.6 2008-04-11

Publications (1)

Publication Number Publication Date
WO2009124482A1 true WO2009124482A1 (zh) 2009-10-15

Family

ID=41161543

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2009/071080 WO2009124482A1 (zh) 2008-04-11 2009-03-30 控制节点加入对等网络的方法和装置

Country Status (4)

Country Link
EP (1) EP2259507B1 (zh)
KR (1) KR101141127B1 (zh)
CN (1) CN101557335B (zh)
WO (1) WO2009124482A1 (zh)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102480422B (zh) * 2010-11-30 2016-03-02 中兴通讯股份有限公司 P2p终端在p2p叠加网中的通讯方法和系统
CN106412091A (zh) * 2016-10-25 2017-02-15 广东欧珀移动通信有限公司 数据传输的控制方法、装置及系统
CN109561160A (zh) * 2019-01-28 2019-04-02 众安信息技术服务有限公司 基于分布式哈希列表的网络初始节点引导方法及设备

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040083304A1 (en) * 2002-10-21 2004-04-29 Izumi Usuki Communication terminal and communication system
US20040181575A1 (en) * 2003-03-11 2004-09-16 Visual Circuits Corporation Method and apparatus for providing peer-to-peer push using broadcast query
CN101035270A (zh) * 2007-04-19 2007-09-12 苏州鹞鹰数据技术有限公司 基于互联网络的对等视频监控方法
CN101060455A (zh) * 2007-06-13 2007-10-24 中兴通讯股份有限公司 一种p2p网络应用方法

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7457874B2 (en) * 2004-02-20 2008-11-25 Microsoft Corporation Architecture for controlling access to a service by concurrent clients
KR100468374B1 (ko) * 2004-07-06 2005-01-31 주식회사 잉카인터넷 네트워크 유해 트래픽 제어 장치 및 방법
EP1847081B1 (en) * 2005-02-07 2014-12-24 BRITISH TELECOMMUNICATIONS public limited company Policing networks
US20060256729A1 (en) * 2005-05-10 2006-11-16 David Chen Method and apparatus for identifying and disabling worms in communication networks
US20070233832A1 (en) * 2006-03-30 2007-10-04 Matsushita Electric Industrial Co., Ltd. Method of distributed hash table node ID collision detection

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040083304A1 (en) * 2002-10-21 2004-04-29 Izumi Usuki Communication terminal and communication system
US20040181575A1 (en) * 2003-03-11 2004-09-16 Visual Circuits Corporation Method and apparatus for providing peer-to-peer push using broadcast query
CN101035270A (zh) * 2007-04-19 2007-09-12 苏州鹞鹰数据技术有限公司 基于互联网络的对等视频监控方法
CN101060455A (zh) * 2007-06-13 2007-10-24 中兴通讯股份有限公司 一种p2p网络应用方法

Also Published As

Publication number Publication date
EP2259507B1 (en) 2016-08-03
CN101557335A (zh) 2009-10-14
EP2259507A1 (en) 2010-12-08
KR20100123775A (ko) 2010-11-24
KR101141127B1 (ko) 2012-05-07
EP2259507A4 (en) 2011-03-23
CN101557335B (zh) 2012-11-21

Similar Documents

Publication Publication Date Title
JP4642022B2 (ja) 通信端末、通信方法、プログラムおよび通信システム
EP2230799B1 (en) User data server system, method and device
EP4218169A1 (en) Methods, systems, and computer readable media for mitigating spoofing attacks on security edge protection proxy (sepp) inter-public land mobile network (inter-plmn) forwarding interface
JP2023553496A (ja) 第5世代(5g)通信ネットワークにおいてメッセージ検証を実行するための方法、システムおよびコンピュータ可読媒体
US8914867B2 (en) Method and apparatus for redirecting data traffic
US8424086B2 (en) Suppression of malicious SIP messages using the resource priority header
US9113031B2 (en) Call control for conferencing calls
US9246906B1 (en) Methods for providing secure access to network resources and devices thereof
WO2010003354A1 (zh) 认证服务器及虚拟专用网的移动通信终端接入控制方法
WO2009109118A1 (zh) 一种终端接入控制方法、网络设备及系统
US20110078312A1 (en) Method and system for monitoring incoming connection requests in a Peer-to-Peer network
JP2024518417A (ja) 単一使用認証メッセージのための方法、システム、およびコンピュータ可読媒体
WO2009155817A1 (zh) 一种维护引导节点状态的方法、装置和系统
WO2011079650A1 (zh) 即时通讯控制的实现方法和系统
WO2022121589A1 (zh) 一种数据信息获取方法、装置、相关设备及介质
WO2009124482A1 (zh) 控制节点加入对等网络的方法和装置
WO2011120365A1 (zh) 多穴终端建立连接的方法和系统
US20040162899A1 (en) Terminating a session in a network
US11582258B2 (en) Methods, systems, and computer readable media for mitigating denial of service (DoS) attacks at network functions (NFs)
WO2012175006A1 (zh) 基于点对点的网络管理方法及代理选择服务器
CN116647538B (zh) 一种能够访问不同内网服务的连接装置
JP5112491B2 (ja) Ip基盤の有線無線統合ネットワークのための統合信号処理装置およびその方法
JP4561626B2 (ja) 情報処理装置およびその制御方法ならびにコンピュータプログラム

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 09730726

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

REEP Request for entry into the european phase

Ref document number: 2009730726

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2009730726

Country of ref document: EP

ENP Entry into the national phase

Ref document number: 20107023679

Country of ref document: KR

Kind code of ref document: A