A p2p penetration synchronization method and system

A technology for synchronizing systems and penetrating time, applied in the network field, can solve the problems of high probability of P2P penetrating failure and achieve the effect of increasing the probability of success

Active Publication Date: 2019-02-22
SHENZHEN UXIN NETWORK TECH
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The purpose of the present invention is to provide a P2P penetration synchronization method, aiming to solve the existing problem of high probability of P2P penetration failure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A p2p penetration synchronization method and system
  • A p2p penetration synchronization method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In order to make the purpose, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0025] figure 1 The P2P penetration synchronization method provided by an embodiment of the present invention is shown, the method includes the following steps:

[0026] S101. When the client sends a data packet to the public network server, the data packet includes a sending time T1.

[0027] In this step, start the public network server and the exchange server, and start the P2P clients, that is, client A and client B. When client A sends a data packet to the public network server, the data packet includes the sending time of the data packet T1, and the data packet also includes the local IP address and port of the client.

[0028] S102. After receiving the data packet, the public network server sends a return data packet to the clien...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of network technology and provides a P2P penetration synchronizing method. The method comprises steps that client sends a data packet to a public network server, wherein the data packet includes first sending time T1; the public network server sends a return data packet to the client after receiving the data packet, wherein the return data packet includes the first sending time T1 and second sending time TN; the client, when receiving the return data packet, records receiving time T2 of the return data packet and computing the calibration time T=TN+(T2-T1) / 2 of the public network server according to the sending time T1 and TN and the receiving time T2; the clients determine synchronous penetration time when exchanging NAT addresses, wherein the synchronous penetration time is TP=T+N, the N is the negotiation time of the clients; the clients simultaneously initiate P2P penetration when reaching the synchronous penetration time TP. The method enables the clients to be capable of simultaneously initiating network penetration so as to increase the success probability of P2P penetration.

Description

technical field [0001] The present invention relates to the field of network technology, in particular to a P2P penetration synchronization method and system. Background technique [0002] The software client is located behind NAT (Network Address Translation) or multiple NATs, and establishes a network connection with the server deployed on the public network to obtain its own NAT address. After exchanging NAT IP with other clients, it initiates P2P ( peer-to-peer, known as peer-to-peer networking or point-to-point technology), that is, direct communication between two points on the network. This kind of direct communication has no speed limit, the speed is determined by the network transmission speed between two points, and only depends on the computing power and bandwidth of two points (participants) in the network, instead of gathering dependencies in fewer On several servers, this technique can greatly reduce the burden on the server. However, since the time of each c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/08H04L7/00
CPCH04L7/0016H04L61/256H04L67/104
Inventor 凌奇伟
Owner SHENZHEN UXIN NETWORK TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products