Unlock instant, AI-driven research and patent intelligence for your innovation.

Network communication method, device and network attached storage device

A technology for network communication and communication parties, applied in the field of equipment and network-attached storage devices, and network communication methods, which can solve problems such as running and failing to implement services such as HTTP and FTP

Active Publication Date: 2018-11-09
SHENZHEN ADVANCE RIVER SYST TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The P2P connection uses the UDP protocol. HTTP, FTP and other servers are based on the TCP protocol and cannot be directly operated on the P2P connection, so services such as HTTP and FTP cannot be implemented on the P2P connection.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network communication method, device and network attached storage device
  • Network communication method, device and network attached storage device
  • Network communication method, device and network attached storage device

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0036] refer to figure 1, the first embodiment of the network communication method of the present invention includes:

[0037] S101, the first agent with the identifier of the first communication party establishes a P2P connection with the second agent with the same identification of the second communication party;

[0038] The identification is sent by the server that manages the first communication party and the second communication party. The identification can be a software account or an identification code. Only devices with the same identification can establish a P2P connection. The identification code is used to distinguish the network where different devices are located. network model.

[0039] The first agent is independent of the first application and the second agent is independent of the second application.

[0040] Both the first agent and the second agent are programs that run independently, and are bridges and intermediaries for P2P penetration connections bet...

no. 4 example

[0078] refer to image 3 , the fourth embodiment of the network communication method of the present invention includes:

[0079] S301. A first agent with an identifier of the first communication party establishes a P2P connection with a second agent with the same identification of the second communication party;

[0080] S302. Convert the access request based on the first protocol from the first application of the first communication party to an access request based on the second protocol;

[0081] S303, the first agent of the first communication party sends the access request based on the second protocol to the second agent of the second communication party; so that the second agent of the second communication party receives the access request based on the second protocol ;

[0082] Wherein the first agent is independent of the first application.

[0083] Through the implementation of the above-mentioned embodiment, a P2P connection is established between devices that are no...

no. 7 example

[0091] refer to Figure 5 , the seventh embodiment of the network communication method of the present invention includes:

[0092] S501. A first agent with an identifier of the first communication party establishes a P2P connection with a second agent with the same identification of the second communication party;

[0093] S502. The second agent of the second communication party receives the access request based on the second protocol sent from the first agent of the first communication party;

[0094] S503. Convert the access request based on the second protocol from the second agent of the second communication party into an access request based on the third protocol;

[0095] S504. The second application of the second communication party receives the access request based on the third protocol, and completes the process of the second application of the second communication party receiving data from the first application of the first communication party.

[0096] Wherein the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network communication method, which includes: establishing a P2P connection between a first agent with an identifier of a first communication party and a second agent with the same identification of a second communication party; The application's access request based on the first protocol is converted into an access request based on the second protocol; the first agent of the first communication party sends the access request based on the second protocol to the second agent of the second communication party; the second communication party The second agent of the second communication party receives the access request based on the second protocol; converts the access request based on the second protocol from the second agent of the second communication party into an access request based on the third protocol; the second application of the second communication party The access request based on the third protocol is received, and the access content based on the third protocol is sent in response to the access request based on the third protocol. The invention enables the network transmission service based on different protocols to be used under the P2P connection through mutual conversion of access data based on different protocols.

Description

technical field [0001] The present invention relates to communication technology, in particular to a network communication method, equipment and network attached storage equipment. Background technique [0002] P2P (peer to peer, peer-to-peer network) technology makes full use of the capabilities of each computer in the network to provide services to each other. Each computer can not only act as a requester of network services, but also respond to requests from other computers and provide resources and services. [0003] P2P connections use the UDP protocol, and servers such as HTTP and FTP are based on the TCP protocol and cannot directly operate on P2P connections, so services such as HTTP and FTP cannot be implemented on P2P connections. Contents of the invention [0004] The technical problem mainly solved by the present invention is to provide a network communication method, equipment and network attached storage equipment, which can realize network transmission serv...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/08
CPCH04L67/104H04L67/1097H04L67/565H04L65/40
Inventor 张日和沈敬优
Owner SHENZHEN ADVANCE RIVER SYST TECH CO LTD