A network communication method, an apparatus and a network attached storage apparatus
A network communication and communication party technology, applied in the field of network communication methods, equipment and network-attached storage devices, can solve problems such as complicated operation and waste of resources, and achieve the effect of saving system resources
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example
[0031] Such as figure 1 As shown, the first embodiment of the network communication method of the present invention includes:
[0032] S110: Establish a P2P penetration connection between the first agent of the first communicating party and the second agent of the second communicating party;
[0033] The first agent is independent of the first application, the second agent is independent of the second application, and both the first agent and the second agent are transparent to the corresponding first application and second application.
[0034] The first agent and the second agent are programs that run independently, which are bridges and intermediaries for P2P penetration between each program of the machine and other devices. Of course, they can also be understood as a communication interface. The programs of the first agent and the second agent can be designed in accordance with the requirements and the local system environment. The first and second agents can be called by the na...
Example
[0040] reference figure 2 , The second embodiment of the network communication method of the present invention includes:
[0041] S210: The first agent of the first communicating party establishes a P2P penetration connection with the second agent of the second communicating party;
[0042] S220: The first application of the first communicating party sends the first data to the first loopback port of the first communicating party;
[0043] S230: The first agent of the first communicating party obtains the first data from the first loopback port, and sends it to the second agent of the second communicating party;
[0044] S240: After receiving the first data, the second agent of the second communicating party sends the first data to the second loopback port of the second communicating party;
[0045] S250: The corresponding second application of the second communication party obtains the first data from the second loopback port, and completes the first communication to send data to the ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap