Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Penetrating method and device of symmetric NAT

A symmetrical, one-way technology, applied in the field of communication, can solve the problems of symmetrical NAT and port-restricted NAT that cannot be punched, and achieve the effect of improving the success rate

Active Publication Date: 2018-01-12
BEIJING QIYI CENTURY SCI & TECH CO LTD
View PDF5 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] In view of this, the present invention provides a symmetric NAT penetration method, which solves the problem of using different public network port numbers each time when the symmetric NAT establishes a connection for the same private network address. , Symmetrical NAT and port-restricted NAT can not be hole-punched

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Penetrating method and device of symmetric NAT
  • Penetrating method and device of symmetric NAT
  • Penetrating method and device of symmetric NAT

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 2

[0062] Based on the symmetric NAT penetration method disclosed in the first embodiment above, when the first host is the initiator of the hole punching request, and the NAT corresponding to the second host is a symmetric NAT,

[0063] In step S102: after sending the first assistance hole punching request carrying the predicted public network port number to the hole punching server, the method further includes:

[0064] receiving a second hole punching command carrying the NAT public network port number predicted by the second host sent by the hole punching server;

[0065] Set the second port range of the NAT corresponding to the second host according to the public network port number predicted by the second host, and send to each public network port in the second port range of the NAT corresponding to the second host respectively No. sends the second hole punching request;

[0066] When the second host receives the second hole punching request, a P2P connection between the f...

Embodiment 3

[0075] Based on the symmetric NAT penetration method disclosed in the first embodiment above, when the first host is the initiator of the hole punching request, and the NAT corresponding to the second host is a port-restricted NAT,

[0076] Before step S102: before sending the first assistance hole punching request carrying the predicted public network port number to the hole punching server, the method further includes:

[0077] sending a third hole punching request to the second host;

[0078] And, after step S102: after sending the first assisting hole punching request carrying the predicted symmetric NAT public network port number to the hole punching server, the method further includes:

[0079] A first hole punching request sent by the second host is received, and a P2P connection between the first host and the second host is established.

[0080] Specifically, when the first host is the initiator of the hole punching request, and the NAT corresponding to the second hos...

Embodiment 4

[0086] Based on the symmetric NAT penetration method disclosed in the first embodiment above, when the second host is the initiator of the hole punching request, and the NAT corresponding to the second host is a port-restricted NAT,

[0087] Before step S102: before sending the first assisting hole punching request carrying the predicted symmetric NAT public network port number to the hole punching server, the method further includes:

[0088] After the second host sends a second assist hole punching request to the hole punching server, receiving a third hole punching command sent by the hole punching server, and sending a fourth hole punching request to the second host;

[0089] And, after step S102: after sending the first assisting hole punching request carrying the predicted symmetric NAT public network port number to the hole punching server, the method further includes:

[0090] A first hole punching request sent by the second host is received, and a P2P connection between...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a penetrating method of a symmetric NAT. The NAT corresponding to a host of at least one party in the P2P connection is the symmetric NAT. The method is applied to a first hostin the symmetric NAT network, after the first host and a second host respectively establish the connection with a traversing server, a first traversing assistant request carrying a predicted public network port number is sent to the traversing server, so that the traversing server sends a first traversing command with the predicted public network port number to the second host, and the second hostcan send a first traversing request to the first port range of the symmetric NAT. On the basis of the above-mentioned situations, the method provided by the invention respectively proposes three traversing procedures for the following conditions: the first host is the initiator of the traversing request, and the NAT corresponding to the second host is the symmetric NAT; the first host is the initiator of the traversing request, and the NAT corresponding to the second host is the port restricted NAT; the second host is the initiator of the traversing request, and the NAT corresponding to the second host is the port restricted NAT; and the success rate of the traversing is improved.

Description

technical field [0001] The present invention relates to the technical field of communications, and more specifically, to a symmetric NAT penetration method and device. Background technique [0002] NAT (Network Address Translation, Network Address Translation), by mapping different private network addresses to different port numbers of the same public network address, it realizes the function that multiple hosts in the intranet can use the same IP address to connect to the Internet. This solves the problem of insufficient IP addresses, but introduces new challenges to P2P (Peer to Peer, peer-to-peer) connections. [0003] There are four types of NAT: [0004] 1. Full cone NAT (Full Cone NAT), the connection request of the same private network address X (including IP address and port number) will be mapped to the same public network address Y (including IP address and port number), which is consistent with the purpose of the request The address is irrelevant. NAT will forw...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/12
Inventor 王亚楠袁鹏肖剑庹虎
Owner BEIJING QIYI CENTURY SCI & TECH CO LTD
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More