Method for realizing intranet penetration by using Internet group management protocol (IGMP) and intranet penetration system

A technology of intranet penetration and decree, applied in the direction of transmission system, electrical components, etc., to achieve the effect of good effect, convenient use and reasonable structure

Active Publication Date: 2014-04-30
SHENZHEN GONGJIN ELECTRONICS CO LTD
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method needs to modify the router, and requires a certain understanding of the router to configure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing intranet penetration by using Internet group management protocol (IGMP) and intranet penetration system
  • Method for realizing intranet penetration by using Internet group management protocol (IGMP) and intranet penetration system
  • Method for realizing intranet penetration by using Internet group management protocol (IGMP) and intranet penetration system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The present invention will be described in detail below in conjunction with the accompanying drawings and embodiments.

[0024] When a client (such as a PC) sends a request to a server A on the Internet, the router (router) assigns it a session and a port number. The router records the source IP, source port, destination IP and destination port of this session. If the client sends the same request to another server B at this time, the router will assign another session to it. If the assigned port number remains unchanged, this type of NAT is called Cone NAT, such as figure 2 shown. If the router assigns another port to it, this type of NAT is called Symmetric NAT.

[0025] In the case of a Cone NAT router, a client can actively access another client through the external network by "punching a hole". This "hole punching" operation requires a host with a fixed Internet IP address as a server, that is, as a transfer station for connection establishment.

[0026] Such...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for realizing intranet penetration by using an Internet group management protocol (IGMP), and aims to overcome the shortcoming that a system using a Symmetric network address translator (NAT) cannot actively access another terminal by using one terminal. The method mainly comprises the following steps that: a first terminal transmits a request to a server, and is kept to be connected with the server; a second terminal transmits an IGMP message, establishes a multicast domain, is classified into a group, locally establishes a user datagram protocol (UDP) socket and performs snooping on a port; the second terminal transmits a multicast domain value and a port value to the server, and initiates an access request; the server forwards the access request to the first terminal; and the first terminal transmits data to a second router, and the second router forwards the data to the second terminal. The invention also discloses an intranet penetration system, which comprises at least two terminals, a router and the server. The method is applied to various systems of which each accesses another terminal by using one terminal, particularly to the system using the Symmetric NAT.

Description

technical field [0001] The invention relates to a method for realizing internal network penetration by using IGMP and an internal network penetration system. Background technique [0002] At present, most users access the Internet through a router (router) dial-up, and the user's computer (PC) is behind the router (router), and the computer (PC) uses a private network address. Such as figure 1 shown. [0003] When the PC needs to access the external network, the router performs NAPT (Network Address Port Translation) on the IP address of the PC (Network Address Port Translation) and converts it into a public network address, and records a session for this purpose, recording the source of the data address, source port, destination address, and destination port. Afterwards, when the corresponding data from the external network is sent back, the router performs matching according to the session record. If the matching is successful, the data will be forwarded to the corresp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/12
Inventor 闫瑞轩王金桂马建军
Owner SHENZHEN GONGJIN ELECTRONICS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products