Network firewall and NAT traversal for TCP and related protocols

a network firewall and nat traversal technology, applied in the field of computer networking, can solve the problems of nodes being unable to connect to each other, unable to reach a given node, and similar difficulties in reaching a given nod

Inactive Publication Date: 2011-09-08
VEETLE
View PDF8 Cites 40 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, if the intended recipient node is behind a firewall or other network address translation (NAT) device, this connection request may be blocked.
Alternatively, a NAT device may map a given internal IP address and port to a different external IP address and/or port for a multitude of reasons, making it similarly d...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network firewall and NAT traversal for TCP and related protocols
  • Network firewall and NAT traversal for TCP and related protocols
  • Network firewall and NAT traversal for TCP and related protocols

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

Reference in the specification to “one embodiment” or to “an embodiment” means that a particular feature, structure, or characteristic described in connection with the embodiments is included in at least one embodiment of the invention. The appearances of the phrase “in one embodiment” or “an embodiment” in various places in the specification are not necessarily all referring to the same embodiment.

Some portions of the detailed description that follows are presented in terms of algorithms or protocols and symbolic representations of operations on data bits within a computer memory. These algorithmic descriptions and representations are the means used by those skilled in the data processing arts to most effectively convey the substance of their work to others skilled in the art. An algorithm is here, and generally, conceived to be a self-consistent sequence of steps (instructions) leading to a desired result. The steps are those requiring physical manipulations of physical quantities...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A message passing protocol allows two clients to establish a connection even when the clients are behind different NAT devices such as NAT firewalls. Beneficially, the protocol does not require that either client has knowledge of where the other client is located (e.g., behind the same NAT device or behind a different NAT device). When two clients want to establish a connection, the clients exchange identifying information with each other by passing the information through a rendezvous server. Based on the identifying information, each client determines and sends a plurality of synchronization packets to a number of different predicted addresses. When synchronization packets reach the actual addresses of both devices, a connection can be established between the clients.

Description

BACKGROUND1. Field of the InventionThe invention relates generally to the field of computer networking and more particularly to traversing NAT devices and firewalls.2. Description of the Related ArtsIn many computer network applications (e.g., peer-to-peer networking), it is desirable for two or more clients to establish direct connections with each other without requiring all information to pass through a centralized server. To connect to another network node a client generally sends a message to a recipient node requesting a connection. However, if the intended recipient node is behind a firewall or other network address translation (NAT) device, this connection request may be blocked. This is because a NAT device may be configured to only allow messages to reach an intended recipient when the message is in response to communication initiated by the recipient. Unsolicited communications are generally dropped. Alternatively, a NAT device may map a given internal IP address and port...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F15/16
CPCH04L29/12103H04L29/12528H04L67/14H04L61/2575H04L63/029H04L61/1535H04L61/4535
Inventor YANG, BOGREENBERG, EVAN PEDROWANG, CHEN
Owner VEETLE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products