Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Symmetrical NAT penetration method and device, storage medium, equipment and system

A symmetrical and equipment technology, applied in the field of communication, can solve the problems of penetration failure, redundant data packets, low penetration success rate, etc., and achieve the effect of improving the penetration success rate and strong anti-interference performance

Active Publication Date: 2021-10-08
普联国际有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] It can be seen that, under ideal conditions, Client1's contract sending situation is like As shown in Figure 2A, Client2's contract delivery is as follows Figure 2B, the parallel penetration method has successfully penetrated the NAT when Client1 and Client2 exchanged the first data packet. Packets are redundant, but in actual situations, Symmetric NAT is a kind of NAT that frequently creates / destroys port mappings, and often the ports are occupied by other application connections. For example, when port 10064 of NAT1 is occupied, Client1's The contract sending situation is shown in Figure 2C, the sending situation of Client2 As shown in Figure 2D, there is no pair of data at this time The packet can successfully penetrate the NAT, and the subsequent multiple data packets are also redundant, and the penetration fails
Therefore, the parallel penetration method can only successfully penetrate under ideal conditions, the anti-interference is zero, and the penetration success rate is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Symmetrical NAT penetration method and device, storage medium, equipment and system
  • Symmetrical NAT penetration method and device, storage medium, equipment and system
  • Symmetrical NAT penetration method and device, storage medium, equipment and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0052] The embodiment of the present invention provides a symmetric NAT traversal method, see image 3 Shown is a flowchart of a preferred embodiment of a symmetric NAT traversal method provided by the present invention, the method includes steps S11 to S15:

[0053] Step S11, obtaining the first port mapping rule corresponding to the first NAT device; wherein, the first port mapping rule includes the first predicted port number and the first port change tolerance,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a symmetric NAT penetration method and device, a storage medium, equipment and a system, and the method comprises the steps: obtaining a first port mapping rule of first NAT equipment, which comprises a first predicted port number and a first port change tolerance; obtaining a second port mapping rule of a second NAT device, wherein the second port mapping rule comprises a second predicted port number and a second port change tolerance; controlling the first client to send data packets to the plurality of second prediction ports starting from the first second prediction port by taking M times of second port variation tolerance as port incremental quantity; controlling a second client to send data packets to the plurality of first prediction ports starting from the first first prediction port by taking N times of first port change tolerance as port incremental quantity, m: N = 1: 2; and when the first client and the second client successfully send the data packets to each other through the same pair of the first prediction port and the second prediction port, determining that NAT penetration succeeds. According to the technical scheme, the anti-interference performance is high, and the penetration success rate of the symmetric NAT can be increased.

Description

technical field [0001] The present invention relates to the field of communication technology, and in particular to a symmetric NAT penetration method, device, computer-readable storage medium, equipment and system. Background technique [0002] NAT (Network Address Translation, Network Address Translation) is produced under the situation of the increasing shortage of IP addresses on the Internet. Its main purpose is to enable the reuse of IP addresses, thereby solving the problem of insufficient IP addresses. Through network address translation, the real IP address of the intranet host can be hidden. The problem caused by this is that host devices in different networks need to perform NAT penetration before communicating, and NAT penetration is essentially a predictive NAT The mapping port number of the device. Different types of NAT devices have different mapping port number rules. Therefore, NAT penetration is a problem that must be solved for various applications on the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/12
CPCH04L61/256H04L61/2578H04L61/2575
Inventor 杨涛陈金福
Owner 普联国际有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products