Box clever.

This commit is contained in:
z3d
2009-06-03 04:01:11 +00:00
parent 8155955585
commit 87af1d2795
2 changed files with 5 additions and 4 deletions

View File

@ -63,7 +63,8 @@ allocation ("lease") of some tunnels that will be used for sending and receiving
network. I2P has its own internal <a href="how_networkdatabase">network database</a> (using a modification of
the Kademlia algorithm) for scalably distributing routing and contact information securely.</p>
<p><img src="/_static/images/net.png" alt="Network topology example" /></p>
<p><center><div class="box"><img src="_static/images/net.png" alt="Network topology example" title="Network topology example" /></div></center></p><br>
<p>In the above, Alice, Bob, Charlie, and Dave are all running routers with a single Destination on their
local router. They each have a pair of 2-hop inbound tunnels per destination (labeled 1,2,3,4,5 and 6),
@ -102,7 +103,7 @@ Notice the different use of terms! All data from a to h is end-to-end encrypted,
between the I2P router and the applications is not end-to-end encrypted!
A and h are the routers of alice and bob, while alice and bob in following chart are the applications running atop of I2P.</p>
<p><img src="/_static/images/endToEndEncryption.png" alt="end to end layered encryption" /></p>
<center><div class="box"><img src="_static/images/endToEndEncryption.png" alt="End to end layered encryption" title="End to end layered encryption." /></div></center><br>
<p>The specific use of these algorithms are outlined <a href="how_cryptography">elsewhere</a>.</p>

View File

@ -70,7 +70,7 @@ Tunneln, die zum Senden und Empfangen von Nachrichten durch das Netzwerk benutzt
hat eine eigene <a href="how_networkdatabase">Netzwerk Datenbank</a> ("Floodfill") zum skalierbaren sicherem Verteilen von Routing
und Kontaktinformationen.</p>
<p><img src="/_static/images/net.png" alt="Network topology example" /></p>
<p><center><div class="box"><img src="_static/images/net.png" alt="Network topology example" title="Network topology example" /></div></center></p><br>
<p>Im oberen Bild betreiben Alice, Bob, Charlie und Dave je einen Router mit einer einzigen
Destination auf ihren lokalen Router. Sie haben alle ein paar 2-Hop Eingangstunnel je
@ -114,7 +114,7 @@ der Ende-zu-Ende Verschl&uuml;sselung von Router zu Router, Alice und Bob hingeg
die mittels(unverschl&uuml;sseltem) I2CP mit den I2P Routern kommunizieren! Sprich: bis zum I2P Router
sind die Daten unverschl&uuml;sselt, ab dem I2P Router ist alles Ende-zu-Ende verschl&uuml;sselt.</p>
<p><img src="/_static/images/endToEndEncryption.png" alt="end to end layered encryption" /></p>
<center><div class="box"><img src="_static/images/endToEndEncryption.png" alt="End to end layered encryption" title="End to end layered encryption." /></div></center><br>
<p>Die genaue Anwendung dieser Algorhytmen sind <a href="how_cryptography">woanders</a> beschrieben.</p>