Large-scale P2P Networks

Source: Internet
Author: User
Release a technical solution-mass P2P network for commercial use

At present, the main technical measures for anti-mass mailing are as follows:

(1) Account Control: only accounts can be sent, and the sending frequency of accounts is limited.

(2) IP Control: limits the sending frequency of a specified IP Address

(3) Protocol control: non-open protocol

(4) Verification code control

 

This solution mainly breaks through the two points above (1) and (2), and provides third-party support services for (3) and (4 ).

 

The slogan of this solution is not to do evil, but to achieve the goal of Group Sending with the smallest evil.

 

If a mass software installation volume reaches a certain level and these installation software forms a large P2P network, the P2P network can provide the following resources:

 

(1) A wide range of IP addresses. Each customer may lease IP resources of other clients.

(2) You can use an account to lease and share a large number of accounts.

 

The commercial mass P2P network has a central server. The central server provides the controllable P2P commercial network proxy protocol Management Service and connects other application server programs.

 

(1) controllable P2P commercial network proxy protocol:

A) any client's lease of other client's network resources must be authorized by the central server, which facilitates billing and controls the content to be sent-it is best not to send illegal information, the protocol can be designed to make it difficult for hackers to use the network, even if the central server is cracked by hackers.

B) The network proxy must be transparent to the client, that is, it is sent locally;

C) Security of resources-Account resources cannot be easily obtained by proxy clients. It is technically difficult to implement, which can reduce requirements and minimize the risk of easily obtaining account resources by proxy clients.

(2) Application Service:

A) crawling and data extraction rule service: the client can crawl a website based on specified rules and extract data based on specified data extraction rules. Data can be extracted from the central server and crawled without being extracted, so as to avoid excessive pressure on the target website.

B) UI script macro rule service: Many Group Sending services, such as QQ group and trademanager group. If the simulation cannot be performed on the protocol layer, you can take a step back and call the official client software to send the group by using the software such as the key wizard, this script macro can be used as a rule and placed on the server side. For important rules, you need to divide the rules into two parts: one part is sent to the client, and the other part is left to the server (the client sends key data, and the server processes the data according to the rules to get the result, to prevent clients from intercepting rules.

C) account Leasing Service: provides a large number of application account leasing services.

D) Verification code recognition service: simple verification codes can be identified by machines. For complex verification codes, they can be handed over to dedicated persons for identification. Specialized identification staff are hired in underdeveloped areas, reduce the recognition cost to about 1 cent for a verification code. Of course, you will be charged for the Internet, and you will be charged for five cents per verification code.

E) protocol simulation service: for non-public protocols, the protocol simulation service-the client submits the operation primitive, the server processes the Protocol content and sends it to the client, and then the client sends it to the official server.

 

Network role:

(1) Operator: responsible for maintaining and operating the entire network;

(2) free users: free users can use some services at the cost of complying with the controllable P2P commercial network proxy protocol to share their IP resources;

(3) paying users: paid users can use the VIP service at the cost of money. A certain level of paid users can also disable P2P network services on the client;

(4) Agent: The agent is also a paying user. It can provide the Group agency service externally, and the group agency is charged less than the ordinary paying user;

(5) account subscriber: The subscriber can manually register an account or register an account with a program and submit it to the application account to rent a server. The registrar can be an operator, an agent, or a third party;

(6) Verification code recognition service provider: employees can be hired directly in underdeveloped areas, or a software can be designed. Anyone can download the software, receive the identification task, and submit it;

(7) rule and script submitted by a third party: the rules and scripts not available in the system are developed and submitted by a third party. The rules and scripts are divided according to the usage.

 

Operation Mode:

(1) pay-as-you-go, subscription, and yearly subscription

 

How to Reduce evil:

 

(1) When capturing data, minimize the number of requests to the target server-for the same page, the P2P network should have as few accesses as possible, the closer it is to 1, the better;

(2) Precise extraction of sending targets: ensures data quality. At the same time, the prices for sending single-pick messages are increased;

(3) Approval-sending mechanism: only approved information can be sent.

 

Technical solution:

 

(1) Client: C #, winform

(2) server: Linux, C ++, and Java

(3) Transport Layer Protocol Selection: development based on UDP protocol as much as possible

(4) P2P protocol design: Consider Google protocol buff

(5) protocol simulation tool: repast

0 0

0

(Please comment on the article)

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.