Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Sharing method based on NAT (Network Address Translation) penetration

A NAT-A, client technology, applied in the field of computer network, to achieve the effect of stable and reliable data transmission

Active Publication Date: 2011-11-02
北京思创银联科技股份有限公司
View PDF4 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] Aiming at the shortcomings of the prior art, in order to solve the problem of sharing applications based on the TCP protocol through NAT, the present invention establishes a direct TCP connection between clients in two different private networks through the assistance of the server host in the Internet, so that different The shared application of the client in the private network can penetrate NAT for implementation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Sharing method based on NAT (Network Address Translation) penetration
  • Sharing method based on NAT (Network Address Translation) penetration
  • Sharing method based on NAT (Network Address Translation) penetration

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are part of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0035] First, see figure 2 , Server S has an IP on the public network, and two private networks are connected to the public network through NAT routers NAT-A and NAT-B respectively. There is a client A in the private network behind NAT-A, and a client A in the private network behind NAT-B. There is a client B in the network. Now, we need to establish a direct TCP connection between client A and client B with the help of server S, that is, establish a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the field of a computer network and particularly provides a sharing method based on NAT (Network Address Translation) penetration, wherein two clients which are respectively positioned in different private networks can penetrate through the respective NAT equipment to carry out the stable and reliable data transmission by establishing a tunnel based on a TCP (Transmission Control Protocol). The method provided by the invention can be used for flexibly realizing the data receiving and transmitting among different networks, realizing the communication among different network segments and further supporting the safe and reliable sharing application among different private network users.

Description

technical field [0001] The invention relates to the field of computer networks, in particular to a sharing method based on NAT penetration. Background technique [0002] With the popularization of the Internet and the rapid development of network equipment, the number of users and devices connected to the Internet is increasing exponentially. However, according to the current IPv4 protocol, each Internet host has a unique IP address. Represented by a 32-bit binary number. Since the 32-bit binary number is only a billion-level value, as the number of computers connected to the Internet continues to increase, IP address resources will become more and more stretched. In fact, except for China Education and Research Computer Network (CERNET), general users can hardly apply for the entire class C IP address. In other ISPs, even for large LAN users with hundreds of computers, when applying for IP addresses, the addresses allocated are only a few or a dozen IP addresses. Obvious...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/12H04L29/06
Inventor 于晓军万雪松赵辰清
Owner 北京思创银联科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products