Private network detection and traverse compounding method for P2P (Peer-to-Peer) network application system

A P2P network and application system technology, applied in the field of large-scale network applications, can solve the problems that network nodes cannot provide internal and external network address mapping, difficult to support large transmission volume, performance bottlenecks, etc., to achieve good adaptability and traversal rate, The effect of improving data sharing efficiency and high pass rate

Active Publication Date: 2014-06-18
SHANGHAI BROADBAND TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method cannot provide stable internal and external network address mapping for network nodes hidden behind symmetric NAT
TURN technology is implemented by using the transit service of a specific public network server, such as figure 2 As shown, it completely solves the problem of multi-layer network nesting, but completely uses the intermediate server to forward data so that the intermediate server becomes the performance bottleneck and single-point single-point obstacle of the system, and it is difficult to realize the system's support for large transmission volume

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Private network detection and traverse compounding method for P2P (Peer-to-Peer) network application system
  • Private network detection and traverse compounding method for P2P (Peer-to-Peer) network application system
  • Private network detection and traverse compounding method for P2P (Peer-to-Peer) network application system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0024] The method of the present invention comprises the following steps:

[0025] 1. Set different priorities for the three methods, the priority order is: UPNP, STUN, TURN.

[0026] 2. Detect and classify the network where the node is located. If the detection result shows that the network environment where the node is located can be opened to external nodes through UPNP technology, then use UPNP technology to realize NAT traversal of the internal nodes of the network.

[0027] 3. For a node that cannot support the UPNP method, use the STUN mechanism to detect the traversal problem of the node in the STUN environment; if the network environment where the node is located can meet the requirements of the STUN technology, use the STUN technology to realize the private network traversal of the node .

[0028] 4. For network nodes that cannot be realized by the above methods, the TURN method is used to realize private network traversal.

Embodiment 2

[0030] This embodiment provides a compound method for private network detection and traversal in a P2P network application system, such as image 3 As shown, the detailed steps of the method are:

[0031] Step 1, client node A checks whether the current gateway supports UPNP technology, if so, applies for a UPNP external network port, and sends an application to join the network to the global routing server B through this port.

[0032] Step 2, the global routing server B initiates a connection to client node A, and sends a handshake protocol; if the handshake is successful, it means that client node A is behind an effective UPNP gateway, and the inward address of client node A sending data is recorded by global routing server B, And determine that the inbound address is the external mapping address of client node A; other system nodes can actively communicate with client node A after obtaining the external mapping address of client node A through the global routing server B. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a private network detection and traverse compounding method for a P2P (Peer-to-Peer) network application system, which comprises the following steps of: firstly, setting different priority levels for tree methods, namely UPNP (Universal Plug-n-Play), STUN (Simple Traversal of UDP (User Datagram Protocol) over NATs) and TURN (Traversal Using Relay NAT (Network Address Translation)), with the sequence as the UPNP, the STUN and the TURN; and detecting and classifying networks where nodes are positioned; secondly, if the detection result shows that the open of external nodes can be realized by a network environment where the nodes are positioned through the UPNP technology, realizing the NAT traverse of internal nodes of the network by using the UPNP technology and otherwise executing the third step; thirdly, if the network environment supports the STUN technology, realizing the private network traverse of the nodes by using the STUN technology and otherwise executing the fourth step; and fourthly, if the network environment supports the TURN technology, realizing the private network traverse of the nodes by adopting the TURN technology. Compared with single private network traverse method, the method disclosed by the invention has better adaptability and traversing rate, can be used for improving the data sharing efficiency of the P2P system and provides technical assurance for the large-scale and high-capacity P2P application system.

Description

technical field [0001] The invention belongs to the technical field of large-scale network applications, and relates to a composite method for private network detection and traversal in a P2P network application system. Background technique [0002] P2P (Peer-to-Peer, point-to-point) technology occupies an important position in many network application systems (such as live video, video on demand, file download, network security, etc.). The prerequisite for improving the performance of the P2P system is the interconnection and intercommunication capability between the system nodes. The characteristics of real networks determine the importance of NAT detection methods and traversal methods in P2P systems. Traditional network detection and traversal methods generally provide targeted solutions for a specific application, but with the increase in network complexity and the high requirements of P2P systems for private network connectivity indicators, it is necessary to design a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/08H04L29/06H04L29/12
Inventor 吴言华
Owner SHANGHAI BROADBAND TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products