NAT penetration-based video monitoring access strategy and realization method

A technology of access strategy and implementation method, which is applied in closed-circuit television systems, electrical components, transmission systems, etc., can solve problems such as inability to support equipment, difficulty in NAT penetration, and cumbersome configuration, so as to achieve simple and convenient equipment configuration and improve success The effect of probability

Inactive Publication Date: 2013-12-11
HANGZHOU JUFENG TECH
View PDF6 Cites 32 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] 1) In recent years, due to the development of information technology and the popularization of home networks, the demand for home-based video surveillance has become increasingly strong. Or the 3G network of most mobile phones uses NAT to access the public network. Using traditional monitoring methods is not only cumbersome to configure, but also the server is under heavy pressure and the transmission effect is not good.
[0003] 2) In order to meet the remote monitoring requirements of the equipment, most of the traditional remote monitoring methods use DDNS plus port mapping; this configuration method requires a certain setting authority for the gateway router, but this requirement It cannot be realized in the 3G network environment and some cluster management network environments, that is, it cannot meet the requirements of video remote monitoring
[0004] 3) In order to meet the remote monitoring requirements of the equipment, in the traditional method of realizing remote monitoring, a small part adopts the way of media server forwarding; but in this way, because all video data must be transferred in and out through the server, The server load will be very heavy, and due to the limitation of public network bandwidth, the devices that can be supported at the same time are limited, it cannot support a large number of devices, and the transmission effect is not good
[0005] 4) When realizing the remote monitoring requirements of equipment based on NAT penetration, due to the complexity of the domestic network environment; for example, there are multiple network operators, the communication bandwidth between network operators is unstable, and some In the regional network environment, there are still two-line exits (referring to two or more network operators), or the NAT type of some gateway devices is symmetrical; these situations may bring a lot of difficulties to NAT penetration , and even cause penetration failure; then how to increase the success rate of penetration in this network environment with the greatest probability, and how to use follow-up means to make up for the penetration failure in order to be transparent to users? It is also an important subject

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • NAT penetration-based video monitoring access strategy and realization method
  • NAT penetration-based video monitoring access strategy and realization method
  • NAT penetration-based video monitoring access strategy and realization method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0030] figure 1 Shown is a whole penetration flow chart of a NAT penetration-based video surveillance access strategy and implementation method of the present invention. This method is divided into the following steps through the flow chart: device registration, connection request, and handshake confirmation; the former step is the basis and trigger condition of the latter step.

[0031] 1) Device registration: After the device is powered on and running, it will go to the DNS server to query the corresponding IP address information according to the domain name of the NAT server configured by the user. After obtaining, such as figure 1 As shown, a heartbeat request is sent to the server corresponding to the IP address (for example, penetration server 1). This information includes the serial number of the device. After the penetration server 1 receives the heartbeat request sent by the device, it first constructs a device information table according to the number and the exte...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a NAT penetration-based video monitoring access strategy and a realization method. The method comprises a network protocol, a penetration server and an agent server, wherein the network protocol refers to a complete NAT penetration flow as the basis of communication between a subsequent apparatus and a server; the penetration server refers to performing processing on a communication command at an apparatus end according to the network protocol so as to finish a NAT penetration process in a cooperative manner, and carrying out basic management on the apparatus actively registered over the server; and the agent server refers to forwarding the data of communication between the apparatus and a client end after the NAT penetration process fails according to the network protocol. According to the invention, the simple and convenient equipment arrangements enable the problems and defects in the prior art to be well handled, and ideal effects are achieved.

Description

technical field [0001] The NAT penetration-based video monitoring access strategy and implementation method of the present invention mainly relate to the multimedia data network transmission technology in the field of video monitoring and the remote monitoring technology of equipment in a private network, and are mainly applicable to the field of security video monitoring. Background technique [0002] 1) In recent years, due to the development of information technology and the popularization of home networks, the demand for home-based video surveillance has become increasingly strong. Or the 3G network of most mobile phones is connected to the public network through NAT. The traditional monitoring method is not only cumbersome to configure, but also the server is under heavy pressure and the transmission effect is not good. [0003] 2) In order to meet the remote monitoring requirements of the equipment, most of the traditional remote monitoring methods use DDNS plus port m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04N7/18H04L29/08H04L29/12
Inventor 葛益军陈昌宝孙杰
Owner HANGZHOU JUFENG TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products