NAT traversal method

A traversal server and one-center technology, applied in the field of NAT traversal, can solve the problems of hindering end-user P2P communication requirements, low penetration success rate of NAT traversal methods, and insufficient consideration of NAT device types, etc., so as to improve penetration The effect on success rate

Inactive Publication Date: 2014-05-14
NINGBO SUNRUN ELEC & INFO ST&D
View PDF0 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

On the one hand, NAT technology can temporarily solve the problem of network address resource shortage and protect intranet address information; but on the other hand, the existence of a large number of NAT devices hinders the requirements for P2P communication between end users in different intranets, so it is necessary to Only by solving the NAT penetration problem can people meet the needs of a large number of P2P applic

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0016] The present invention will be further explained below in conjunction with examples.

[0017] The NAT penetration method of the present invention has the following processes:

[0018] 1). Pass-through server assisted registration process: after terminal user A and terminal user B are powered on, they send registration information to the pass-through server, and the pass-through server stores the identification information of end users A and B. After the information is successfully registered, terminal users A and B uses this channel to send heartbeat packets to maintain the connection with the penetration server;

[0019] 2) Realize the data exchange process:

[0020] Step 1: Terminal user A sends request information to the penetration server, requesting to connect to terminal user B;

[0021] Step 2: After the penetration server receives the request of the terminal user A, it searches for the registration information of the terminal users A and B. If the registration information...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an NAT traversal method which can increase the success rate of traversal. The NAT traversal method comprises the auxiliary logon procedure of a traversal server and the data exchange procedure. According to the data exchange procedure, after the traversal server receives the request of a terminal user, log-on messages of the terminal user A and a terminal user B are searched for, if the logon message of the terminal user B can be inquired, NAT equipment types of the terminal user A and the terminal user B are determined firstly, and the terminal user A and the terminal user B carry out data transmission through an address and a port number of a direct connection channel.

Description

technical field [0001] The invention relates to the technical field of Internet communication, in particular to a NAT penetration method. Background technique [0002] In the rapidly developing Internet field, due to the ever-expanding scale of the Internet, the network address space resources are facing the crisis of being exhausted, so people generally use a network address translation (NAT) technology to alleviate the current severe situation. . NAT is a technology that isolates the internal network from the public network and converts private addresses into legal IP addresses. In addition, NAT only allows the internal network to initiate a connection request to the public network, while all connection requests from the public network to the internal network will be rejected. However, as people's demand for P2P applications continues to increase, connecting the intranet and the public network through NAT devices has become a communication mode commonly used in the Inter...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/12
Inventor 何加铭屈龙李艳张延红樊玲慧
Owner NINGBO SUNRUN ELEC & INFO ST&D
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products