Unlock instant, AI-driven research and patent intelligence for your innovation.

A nat penetration method based on kcp protocol

A protocol and server-side technology, applied in the field of UDP penetration and NAT type detection technology, can solve the problems of low reliability of UDP penetration and difficulty of NAT penetration, etc., and achieve the effect of improving the success rate and ensuring reliability

Active Publication Date: 2021-11-05
HANGZHOU QULIAN TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Aiming at the technical problems of high difficulty in TCP NAT penetration and low reliability of UDP penetration, the present invention provides a NAT penetration method based on the KCP protocol, which can guarantee a higher success rate of NAT penetration and good reliability, specifically The technical solution is as follows:

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A nat penetration method based on kcp protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The purpose and effect of the present invention will become more obvious by describing the present invention in detail according to the accompanying drawings and specific embodiments.

[0023] like figure 1 As shown, in the NAT penetration method based on the KCP protocol of the present invention, the client that needs to be assisted by NAT penetration in the method is C1, and the client that C1 wants to connect to is C2. The method specifically includes the following steps:

[0024] S1: C1 initiates a NAT traversal request to the server to penetrate C2;

[0025] S2: The server responds as follows according to the situation of the client C1:

[0026] (1) If C2 does not exist, the server replies to C1 with a message that C2 does not exist, and C1 ends this NAT penetration;

[0027] (2) If C2 exists and C1 is a public network node, the server will notify C2 to reversely connect to C1, and C1 will wait for a period of time for the connection from the other party. If the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a NAT penetration method based on the KCP protocol. First, a node in a P2P network needs to register NAT information with an auxiliary NAT penetration service node located on the public network, and then when the node needs to connect to another node, it uses the TCP protocol. When the node cannot be connected, first send the NAT penetration request to the service node, and the service node returns the network address and NAT penetration strategy of the other party to both parties according to the NAT information of the two nodes. Both nodes execute NAT penetration logic according to the received information, that is, first use UDP protocol for NAT penetration, if the penetration is successful, use KCP protocol to connect, otherwise, the NAT penetration fails this time. The invention solves the problem of high difficulty in NAT penetration by using TCP, improves the success rate by using UDP for NAT penetration, and simultaneously uses KCP protocol as a transport layer protocol to solve the problem of unreliable transmission of UDP protocol to a certain extent.

Description

technical field [0001] The invention relates to the fields of NAT type detection technology and UDP penetration, in particular to a NAT penetration method based on the KCP protocol. Background technique [0002] The full English name of NAT is "Network Address Translation", which means "Network Address Translation" in Chinese. It is an IETF (Internet Engineering Task Force, Internet Engineering Task Force) standard that allows an entire organization to appear with a public IP (Internet Protocol) address on the Internet. As the name suggests, it is a technology that translates internal private network addresses (IP addresses) into legal network IP addresses. NAT allows internal networks that use private addresses to connect to the Internet or other IP networks. [0003] Traditional traversal methods include TCP-based traversal and UDP-based traversal methods, both of which have defects to a certain extent; among them, the TCP-based traversal method has a connection-based mo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/12H04L29/06H04L29/08
CPCH04L61/256H04L67/141H04L69/164H04L69/326
Inventor 汪小益徐才巢李启雷李伟邱炜伟梁秀波尹可挺
Owner HANGZHOU QULIAN TECH CO LTD