Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network penetration method, device, system and network connectivity checking method

A connectivity check and network connectivity technology, applied in the Internet field, can solve problems such as low network penetration rate, achieve the effect of solving low network penetration rate and improving network penetration rate

Active Publication Date: 2021-10-08
上海京像微电子有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Embodiments of the present invention provide a network penetration method, device, system, and network connectivity inspection method to at least solve the problem of using a network address translation server in the prior art to enable two terminals located in a local network to perform data transmission through a local address The technical problem of low network penetration rate

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network penetration method, device, system and network connectivity checking method
  • Network penetration method, device, system and network connectivity checking method
  • Network penetration method, device, system and network connectivity checking method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] In order to enable those skilled in the art to better understand the solutions of the present invention, the following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments are only It is an embodiment of a part of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0022] It should be noted that the terms "first" and "second" in the description and claims of the present invention and the above drawings are used to distinguish similar objects, but not necessarily used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriate circums...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network penetration method, device, system and network connectivity checking method. Wherein, the method includes: in the case of transmitting data between two terminals located in different local networks, allocating multiple local ports for each session established for transmitting data between the two terminals; obtaining the mapping of each local port in the public The public network ports of the network are obtained to obtain multiple public network ports; the connectivity checks are performed on multiple public network ports one by one, and the public network ports that pass the connectivity check are used to transmit data. The invention solves the technical problem of low network penetration rate in the prior art when a network address translation server is used to enable two terminals located in a local network to transmit data through local addresses.

Description

technical field [0001] The present invention relates to the field of the Internet, in particular to a network penetration method, device, system and network connectivity checking method. Background technique [0002] IPv4 is the fourth version of the Internet Protocol (IP), and the first widely used protocol that forms the basis of today's Internet technology. The number of digits in an IPv4 address is 32 bits, that is to say, computers with a maximum of 2 to the power of 32 can be connected to the Internet. Due to the vigorous development of the Internet, the demand for IP addresses is increasing, making IP addresses exhausted. . However, the number of addresses in IPv6 is 128 bits, which can provide almost unlimited IP addresses. However, because the existing huge amount of network configurations only support IPv4, before fully switching from IPv4 to IPv6, in order to solve the problem of shortage of IPv4 addresses, NAT (Network Address Translation, Network Address Trans...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/12H04L29/06
CPCH04L61/2521H04L65/1066H04L65/65
Inventor 唐春平苏睿
Owner 上海京像微电子有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products