Network communication method, device and network attached storage device
A technology for network communication and communication parties, applied in the field of equipment and network-attached storage devices, and network communication methods, which can solve problems such as running and failing to implement services such as HTTP and FTP
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0036] refer to figure 1, the first embodiment of the network communication method of the present invention includes:
[0037] S101, the first agent with the identifier of the first communication party establishes a P2P connection with the second agent with the same identification of the second communication party;
[0038] The identification is sent by the server that manages the first communication party and the second communication party. The identification can be a software account or an identification code. Only devices with the same identification can establish a P2P connection. The identification code is used to distinguish the network where different devices are located. network model.
[0039] The first agent is independent of the first application and the second agent is independent of the second application.
[0040] Both the first agent and the second agent are programs that run independently, and are bridges and intermediaries for P2P penetration connections bet...
no. 4 example
[0078] refer to image 3 , the fourth embodiment of the network communication method of the present invention includes:
[0079] S301. A first agent with an identifier of the first communication party establishes a P2P connection with a second agent with the same identification of the second communication party;
[0080] S302. Convert the access request based on the first protocol from the first application of the first communication party to an access request based on the second protocol;
[0081] S303, the first agent of the first communication party sends the access request based on the second protocol to the second agent of the second communication party; so that the second agent of the second communication party receives the access request based on the second protocol ;
[0082] Wherein the first agent is independent of the first application.
[0083] Through the implementation of the above-mentioned embodiment, a P2P connection is established between devices that are no...
no. 7 example
[0091] refer to Figure 5 , the seventh embodiment of the network communication method of the present invention includes:
[0092] S501. A first agent with an identifier of the first communication party establishes a P2P connection with a second agent with the same identification of the second communication party;
[0093] S502. The second agent of the second communication party receives the access request based on the second protocol sent from the first agent of the first communication party;
[0094] S503. Convert the access request based on the second protocol from the second agent of the second communication party into an access request based on the third protocol;
[0095] S504. The second application of the second communication party receives the access request based on the third protocol, and completes the process of the second application of the second communication party receiving data from the first application of the first communication party.
[0096] Wherein the...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


