Method for penetrating NAT (Network Address Translation) equipment

A kind of equipment and equipment type technology, applied in the field of Internet communication, can solve the problems that nodes cannot be interconnected, reduce user network experience, and unfavorable enterprise internal user network applications, etc., to reduce penetration costs, improve network experience, and meet real-time network application requirements Effect

Active Publication Date: 2011-02-16
BEIJING LONGSHINE TECH
View PDF3 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the network that can perform UPNP operation is only a small part of the actual network, and the NAT that cannot be translated will not be able to complete the penetration
In the actual network, the nodes of NAT1 occupy a considerable proportion, and the nodes of NAT2 occupy more than 60%, so the penetration barrier between NAT1 and NAT2 or NAT1 and NAT1 causes a large part of the network The nodes cannot be interconnected, which is not conducive to real-time network applications for internal users of the enterprise, and reduces the user's network experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for penetrating NAT (Network Address Translation) equipment
  • Method for penetrating NAT (Network Address Translation) equipment
  • Method for penetrating NAT (Network Address Translation) equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0065] Example 1: Penetration between NAT2 and NAT1.1 or NAT1.2.

[0066] figure 2 It is the method flowchart of Embodiment 1 of performing NAT device penetration according to the device type of NAT node A in the method of the present invention, as figure 2 As shown, the type of NAT node A is NAT1.1 or NAT1.2, the type of NAT node B is NAT2, and the NAT information of NAT node B is known to NAT node A. The method includes:

[0067] Step S101: NAT node A obtains the latest local external network port, and sends an instruction to find NAT node B to all nodes connected to it, and the instruction carries the NAT information of NAT node A;

[0068] The NAT information includes: NAT type, local IP and port, external network IP and port.

[0069] Step S102: After receiving the instruction, the handshaking node C determines that it is connected to the NAT node B, and then sends a notification instruction to the NAT node B, the instruction carrying the NAT information of the NAT no...

Embodiment 2

[0075] Example 2: Penetration between NAT1.2 and NAT1.1 or NAT1.2.

[0076] image 3 It is the method flowchart of embodiment 2 of performing NAT device penetration according to the device type of NAT node A in the method of the present invention, as image 3 As shown, the type of NAT node A is NAT1.2, the type of NAT node B is NAT1.1 or NAT1.2, NAT node A knows the NAT information of NAT node B, and the method includes:

[0077] Step S201: NAT node A sends an instruction to find NAT node B to all nodes connected to it, and the instruction carries NAT information of NAT node A;

[0078] The NAT information includes: NAT type, local IP and port, external network IP and port.

[0079] Step S202: After receiving the instruction, the handshake node C determines that it is connected to the NAT node B, and then sends a notification instruction to the NAT node B, which carries the NAT information of the NAT node A, and sends a confirmation to the NAT node A at the same time Instru...

Embodiment 3

[0086] Example 3: Penetration between NAT1.1 and NAT1.1.

[0087] Figure 4 It is the method flow chart of embodiment 3 of performing NAT device penetration according to the device type of NAT node A in the method of the present invention, as Figure 4 As shown, the types of NAT node A and NAT node B are both NAT1.1, and NAT node A knows the NAT information of NAT node B. The method includes:

[0088] Step S301: NAT node A sends an instruction to find NAT node B to all nodes connected to it, and the instruction carries NAT information of NAT node A;

[0089] The NAT information includes: NAT type, local IP and port, external network IP and port.

[0090] Step S302: After receiving the instruction, the handshaking node C determines that it is connected to the NAT node B, and then sends a notification instruction to the NAT node B, which carries the NAT information of the NAT node A, and sends a confirmation to the NAT node A at the same time Instruction, will find the messag...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for penetrating NAT (Network Address Translation) equipment. The method comprises the steps of: 20: detecting the equipment type of an NAT node A; and 30: carrying out NAT equipment penetration according to the equipment type of the NAT node A. Before the step (20), the method further comprises a step 10: carrying out UPNP (Universal Plug and Play) operation on anappointed port of the NAT node A. In the invention, the penetrating cost is decreased by utilizing the UPNP operation, and an appropriate penetrating method is adopted according to the mapping characteristics and the penetrating characteristics of each NAT type through more meticulous and overall divisions of the NAT type, so that the penetration of the NAT equipment can be realized, the real-time network application requirements on the enterprise internal users can be satisfied, and the internet experience of the users can be enhanced.

Description

technical field [0001] The invention relates to the technical field of Internet communication, in particular to a method for penetrating NAT equipment. Background technique [0002] At present, with the continuous increase of Internet users, the Internet Protocol Version 4 (IPv4) address resources used by the Internet are already very tight, and it is simply not enough for every user to have an IPv4 address that can directly access the Internet, that is, External network IP address. A large number of enterprise units only have a small number of external network IP addresses, so the enterprise can only use a large number of internal network (that is, local) IP addresses that cannot directly access the Internet to meet the internal network communication needs of users in the enterprise. Users can use Internet resources, and enterprises generally use NAT (Network Address Translation, Network Address Translation) equipment to convert the internal network IP address within the e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/12
Inventor 邵思瑶
Owner BEIJING LONGSHINE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products