System and method for traversing firewalls, NATs, and proxies with rich media communications and other application protocols

a technology of rich media communication and application protocol, applied in the field of communication network firewalls, nats and proxies, can solve the problems of blocking or restricting unauthorized incoming data and unauthorized incoming requests from devices, external devices may not be able to identify or communicate with a specific local device, and potential security threats to any computer publicly accessible on the intern

Inactive Publication Date: 2006-07-27
AVAYA INC
View PDF5 Cites 82 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0017] A method and computerized system are provided for transmitting and receiving voice, video, and other data over the Internet and allowing the exchange of TCP / IP and / or UDP type data packets through tunnel connections created between devices on opposite sides of a firewall. The tunnels are created using TCP / IP to a single destination port to encapsulate multiple channels of TCP and UDP data destined to various other ports, across a firewall, NAT or HTTP Proxy, as well as emulate real-time performance for UDP data channels.

Problems solved by technology

But with the ease of networking, also introduced are potential security threats to any computer publicly accessible on the Internet.
These approaches block or restrict unauthorized incoming data and unauthorized incoming requests from devices on a private network.
Thus, external devices may not be able to identify or communicate with a specific local device because private addresses behind NATs are not directly accessible by entities on a public network.
However, for end-to-end rich media applications, such as videoconferencing, methods for initiating and maintaining a session through a gateway or firewall can be complex, requiring several channels to the same or different destinations just to establish a two-way or multi-way real-time conference.
In contrast, TCP is used for reliable transfer of data and has built in packet loss detection and retransmission and thus is not appropriate for real-time audio and video data.
When a public network transmission utilizes a connectionless type of protocol, like UDP as a transport for the voice and video data packets, the incoming and outgoing packets are often blocked by the firewall security.
As a result, connectionless type communications with third parties outside a private network are commonly disabled or blocked.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for traversing firewalls, NATs, and proxies with rich media communications and other application protocols
  • System and method for traversing firewalls, NATs, and proxies with rich media communications and other application protocols
  • System and method for traversing firewalls, NATs, and proxies with rich media communications and other application protocols

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] Reference will now be made in detail to the present embodiments of the invention, examples of which are illustrated in the accompanying drawings.

[0040] Reference to any specific operating system architecture (such as Microsoft® Windows™) is for demonstration purposes only as to how the present invention could be implemented. In addition, the terms ‘client’ and ‘server’ are for functional description only, since communication based on the tunneling approach disclosed supports bi-directional communication.

[0041] Network-based systems such as online conferences, online meetings, web seminars and application-sharing applications may depend on conditions associated with a client and server host system. Some components of a network-based application, including configuration information, may be previously installed on a client. Alternatively, the components and configuration information may be concurrently installed on the client as a network-based application is executing.

[0042]...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A tunneling system and method is described for traversing firewalls, NATs, and proxies. Upon a request from a device on the secure private network or on a public network such as the Internet, a connection to a designated or permitted device of the secure private network by way of the public network can be established, allowing selected devices of the private network to access devices on the public network. A bi-directional channel can be established where information such as rich multimedia and real-time voice and video can be accessed or communicated.

Description

CROSS REFERENCE TO RELATED APPLICATIONS [0001] This application is a non-provisional application claiming the benefits of provisional application No. 60 / 367,826, filed Mar. 27, 2002, titled “System and Method for Traversing Firewalls, NATs, and Proxies with Rich Media Communications and Other Application Protocols”.FIELD OF THE INVENTION [0002] This invention relates generally to traversing communication network firewalls, NATs and proxies, and more particularly, relates to a novel tunneling approach using endpoint plug-ins that permit UDP-based or other connectionless-based protocol information from a public or private network to traverse firewalls, proxies and NATs emulated in real-time by encapsulating UDP-based information on a connection layer to appear as TCP-based or full duplex connection-based communication. BACKGROUND OF THE INVENTION [0003] The Internet allows geographically and logically dispersed applications and nodes to easily communicate and exchange data. These data...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(United States)
IPC IPC(8): G06F15/173H04L29/06H04L29/08H04L29/12
CPCH04L29/06H04L29/1249H04L61/256H04L61/2592H04L63/0209H04L63/0218H04L63/0272H04L63/0281H04L63/029H04L63/168H04L67/34H04L69/16H04L69/166H04L69/14H04L69/161H04L69/164H04L69/162H04L69/165H04L69/32H04L69/329H04L69/326H04L9/40
Inventor EISENBERG, ALFRED J.THOMPSON, JOHN A.BUNDY, DAVID O.
Owner AVAYA INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products