search
HomeDatabaseMysql TutorialTor 与 I2P 有何不同

原址:http://www.i2p2.de/faq_zh.html#difftor Tor 与 I2P 有何不同 ? Tor与I2P都是混淆式网络(MixNetwork)但实现上存在差异。 同一个连接中的指令与数据在Tor中沿着通过TCP协议建立的信道(Ciruit)流动至目的节点,而在I2P中,连接被消息机制(Message)打散

原址:http://www.i2p2.de/faq_zh.html#difftor


Tor 与 I2P 有何不同 ?

Tor与I2P都是混淆式网络(MixNetwork)但实现上存在差异。

同一个连接中的指令与数据在Tor中沿着通过TCP协议建立的信道(Ciruit)流动至目的节点,而在I2P中,连接被消息机制(Message)打散为数据包经由不同的TCP或UDP隧道(Tunnel)交叉传输后在接收方重组为数据流。简而言之I2P基于包切换而Tor基于信道切换。另外Tor网络由中央目录服务器管理,而I2P使用基于Kad算法的分布式数据库。

这里以简单情况为例进行对比,其传输过程的异同如下图所示:

Tor 与 I2P 有何不同
  1. I2P通过本地网络数据库NetDb得知其他节点的存在,NetDb通过Kad算法在连接其他节点时获悉更多节点的存在。
    Tor通过连接中央目录服务器得知所有中继、进入/退出节点的存在。
  2. I2P接入网络后,I2P建立2个隧道:出站隧道A-C及入站隧道A-G,分别负责数据的传出和传入,实际的隧道数更多,可能存在A-C1,A-C2,A-G1,A-G2...。
    Tor接入网络后,Tor建立1一个信道:a-c-d负责数据的双向传输。
  3. 现在I2P用户A发出HTTP请求希望访问用户E的匿名资源。
    现在Tor用户a发出http请求希望访问Internt服务器e的资源。
  4. I2P将请求拆分并加密为数据包由出站隧道A-C(A-C1 A-C2...)发送至对方的入站隧道网关D(D1,D2...)通过入站隧道D-E(D1-E,D2-E...)到达E的I2P被接收并重组为HTTP请求。
    Tor将请求加密送入信道a-c-d通过d转接至Internet服务器e
  5. 反之亦然,用户E的HTTP响应经过E=>E-F(E-F1...)=>G(G1...)=>G-A(G1-A...)返回给I2P用户A。
    反之亦然,Internet服务器e的http响应经过e=>d-c-a 返回给Tor用户a
Statement
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
What are the different storage engines available in MySQL?What are the different storage engines available in MySQL?Apr 26, 2025 am 12:27 AM

MySQLoffersvariousstorageengines,eachsuitedfordifferentusecases:1)InnoDBisidealforapplicationsneedingACIDcomplianceandhighconcurrency,supportingtransactionsandforeignkeys.2)MyISAMisbestforread-heavyworkloads,lackingtransactionsupport.3)Memoryengineis

What are some common security vulnerabilities in MySQL?What are some common security vulnerabilities in MySQL?Apr 26, 2025 am 12:27 AM

Common security vulnerabilities in MySQL include SQL injection, weak passwords, improper permission configuration, and unupdated software. 1. SQL injection can be prevented by using preprocessing statements. 2. Weak passwords can be avoided by forcibly using strong password strategies. 3. Improper permission configuration can be resolved through regular review and adjustment of user permissions. 4. Unupdated software can be patched by regularly checking and updating the MySQL version.

How can you identify slow queries in MySQL?How can you identify slow queries in MySQL?Apr 26, 2025 am 12:15 AM

Identifying slow queries in MySQL can be achieved by enabling slow query logs and setting thresholds. 1. Enable slow query logs and set thresholds. 2. View and analyze slow query log files, and use tools such as mysqldumpslow or pt-query-digest for in-depth analysis. 3. Optimizing slow queries can be achieved through index optimization, query rewriting and avoiding the use of SELECT*.

How can you monitor MySQL server health and performance?How can you monitor MySQL server health and performance?Apr 26, 2025 am 12:15 AM

To monitor the health and performance of MySQL servers, you should pay attention to system health, performance metrics and query execution. 1) Monitor system health: Use top, htop or SHOWGLOBALSTATUS commands to view CPU, memory, disk I/O and network activities. 2) Track performance indicators: monitor key indicators such as query number per second, average query time and cache hit rate. 3) Ensure query execution optimization: Enable slow query logs, record and optimize queries whose execution time exceeds the set threshold.

Compare and contrast MySQL and MariaDB.Compare and contrast MySQL and MariaDB.Apr 26, 2025 am 12:08 AM

The main difference between MySQL and MariaDB is performance, functionality and license: 1. MySQL is developed by Oracle, and MariaDB is its fork. 2. MariaDB may perform better in high load environments. 3.MariaDB provides more storage engines and functions. 4.MySQL adopts a dual license, and MariaDB is completely open source. The existing infrastructure, performance requirements, functional requirements and license costs should be taken into account when choosing.

How does MySQL's licensing compare to other database systems?How does MySQL's licensing compare to other database systems?Apr 25, 2025 am 12:26 AM

MySQL uses a GPL license. 1) The GPL license allows the free use, modification and distribution of MySQL, but the modified distribution must comply with GPL. 2) Commercial licenses can avoid public modifications and are suitable for commercial applications that require confidentiality.

When would you choose InnoDB over MyISAM, and vice versa?When would you choose InnoDB over MyISAM, and vice versa?Apr 25, 2025 am 12:22 AM

The situations when choosing InnoDB instead of MyISAM include: 1) transaction support, 2) high concurrency environment, 3) high data consistency; conversely, the situation when choosing MyISAM includes: 1) mainly read operations, 2) no transaction support is required. InnoDB is suitable for applications that require high data consistency and transaction processing, such as e-commerce platforms, while MyISAM is suitable for read-intensive and transaction-free applications such as blog systems.

Explain the purpose of foreign keys in MySQL.Explain the purpose of foreign keys in MySQL.Apr 25, 2025 am 12:17 AM

In MySQL, the function of foreign keys is to establish the relationship between tables and ensure the consistency and integrity of the data. Foreign keys maintain the effectiveness of data through reference integrity checks and cascading operations. Pay attention to performance optimization and avoid common errors when using them.

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

WebStorm Mac version

WebStorm Mac version

Useful JavaScript development tools

mPDF

mPDF

mPDF is a PHP library that can generate PDF files from UTF-8 encoded HTML. The original author, Ian Back, wrote mPDF to output PDF files "on the fly" from his website and handle different languages. It is slower than original scripts like HTML2FPDF and produces larger files when using Unicode fonts, but supports CSS styles etc. and has a lot of enhancements. Supports almost all languages, including RTL (Arabic and Hebrew) and CJK (Chinese, Japanese and Korean). Supports nested block-level elements (such as P, DIV),

EditPlus Chinese cracked version

EditPlus Chinese cracked version

Small size, syntax highlighting, does not support code prompt function

DVWA

DVWA

Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software

SublimeText3 English version

SublimeText3 English version

Recommended: Win version, supports code prompts!