Network penetration method, apparatus and system, and network connectivity checking method

A connectivity check and network connectivity technology, applied in the Internet field, can solve problems such as low network penetration rate, achieve the effect of solving low network penetration rate and improving network penetration rate

Active Publication Date: 2018-07-27
上海京像微电子有限公司
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Embodiments of the present invention provide a network penetration method, device, system, and network connectivity inspection method to at least solve the problem of using a network address translation server in the prior art to enable two terminals located in a local network to perform data transmission through a local address The technical problem of low network penetration rate

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network penetration method, apparatus and system, and network connectivity checking method
  • Network penetration method, apparatus and system, and network connectivity checking method
  • Network penetration method, apparatus and system, and network connectivity checking method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] In order to enable those skilled in the art to better understand the solutions of the present invention, the following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments are only It is an embodiment of a part of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.

[0022] It should be noted that the terms "first" and "second" in the description and claims of the present invention and the above drawings are used to distinguish similar objects, but not necessarily used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriate ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network penetration method, apparatus and system, and a network connectivity checking method. The method comprises the following steps: in the case of data transmission between two terminals in different local networks, allocating a plurality of local ports to each session established for the data transmission between two terminals; obtaining a public network port mappedby each local port to a public network so as to obtain a plurality of public network ports; and performing connectivity check on the plurality of public network ports one by one, and transmitting databy using the public network ports passing the connectivity check. By adoption of the invention, the technical problem of low network penetration efficiency during the data transmission of two terminals in the local network through local addresses by using a network address converter in the prior art is solved.

Description

technical field [0001] The present invention relates to the field of the Internet, in particular to a network penetration method, device, system and network connectivity checking method. Background technique [0002] IPv4 is the fourth version of the Internet Protocol (IP), and the first widely used protocol that forms the basis of today's Internet technology. The number of digits in an IPv4 address is 32 bits, that is to say, computers with a maximum of 2 to the power of 32 can be connected to the Internet. Due to the vigorous development of the Internet, the demand for IP addresses is increasing, making IP addresses exhausted. . However, the number of addresses in IPv6 is 128 bits, which can provide almost unlimited IP addresses. However, because the existing huge amount of network configurations only support IPv4, before fully switching from IPv4 to IPv6, in order to solve the problem of shortage of IPv4 addresses, NAT (Network Address Translation, Network Address Trans...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/12H04L29/06
CPCH04L61/2521H04L65/1066H04L65/65
Inventor 唐春平苏睿
Owner 上海京像微电子有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products