Method for improving penetration rate and stability of STUN-P2P through universal plug-n-play (UPnP)

A STUN-P2P, penetration rate technology, applied in the field of network multimedia, can solve the problems of default support, limited scope of application, and inability to establish P2P data links at the playback end, so as to improve stability, success rate, and practicality sexual effect

Active Publication Date: 2012-07-11
CHUANGO SECURITY TECHNOLOGY CORPORATION
View PDF2 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The UPnP protocol has the advantage of simple implementation. The network node connected to the back of the NAT can establish a specified port mapping on the NAT through the SOAP interface provided by the UPnP protocol, and obtain the external address and port of the mapping; because the port mapping is established at this time The process is realized through the internal network communication of the LAN, so the establishment speed is fast and stable; but its disadvantage is that not all routers support the UPnP function, and the scope of application is limited
[0004]1. More than 20% of the NATs or firewalls cannot establish the internal and external address mapping of the node, that is, the P2P data link between the playback end and the network camera end cannot be established
[0005] 2. At present, the new factory home routers support and open the UPnP port mapping function by default. This function can enable the network devices in the home network to quickly establish stable internal and external address port mapping on the NAT through the UPnP function.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for improving penetration rate and stability of STUN-P2P through universal plug-n-play (UPnP)
  • Method for improving penetration rate and stability of STUN-P2P through universal plug-n-play (UPnP)

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The invention consists of a UPnP port mapping client running on a network device node, a customized STUN client running on a network device node (which can accept specified NAT port mapping), and a control program. see figure 1 , the concrete steps of the present invention are as follows:

[0019] Step 1: Map client A to NAT through node UPnP port B Initiate a port mapping request.

[0020] Step 2: If the port mapping request is successful, feedback that UPnP has successfully established port mapping on the NAT to the node. If the feedback data cannot be obtained, proceed to step 4, and connect to the STUN server C to obtain the port.

[0021] Step 3: Pass the established port mapping above to the STUN client to optimize the STUN client and establish connections such as heartbeat messages with the STUN server. The STUN client here is the key point. The optimized STUN client can accept the specified NAT port mapping, can quickly map valid ports, and get connected to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for improving penetration rate and stability of STUN-P2P through universal plug-n-play (UPnP). Port mapping request is sent to network address translation (NAT) through an UPnP port mapping client-side. If the port mapping request succeeds, port mapping successively established by the UPnP on the NAT is fed back to nodes. Established port mapping is transmitted to a STUN client-side to as to establish heartbeat message connection with an STUN server. If feedback data cannot be obtained, the STUN client-side is started to be connected with the STUN server to obtain ports. The nodes acquire external ports of the NAT from the position of the STUN client-side. The nodes are exchanged with peer nodes about external addresses and ports established on the NAT through an XML-based messaging and presence protocol (XMPP) or a session initiation protocol (SIP). The method for improving the penetration rate and the stability of the STUN-P2P through the UPnP has high efficiency of the UPnP and the penetrability of the STUN, enables connection success rate of the P2P to be improved and to be fast and stable, improves the stability of connection between network devices and users, thereby improving zero configuration of the nodes or using practical applicability of plug and play devices.

Description

technical field [0001] The invention belongs to the technical field of network multimedia. Background technique [0002] The basis of establishing a P2P (peer-to-peer network) connection is to establish the internal and external addresses (or port mapping) of the node in NAT (Network Address Translation), so that the node can receive connections initiated from outside the NAT. At present, the two mainstream P2P NAT port mapping establishment standards are: 1. UPnP (Universal Plug and Play) protocol; 2. STUN (UDP Simple Traversal of NAT) protocol. The UPnP protocol has the advantage of simple implementation. The network node connected to the back of the NAT can establish a specified port mapping on the NAT through the SOAP interface provided by the UPnP protocol, and obtain the external address and port of the mapping; because the port mapping is established at this time The process is realized through the internal network communication of the LAN, so the establishment spe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/12
Inventor 何建亿
Owner CHUANGO SECURITY TECHNOLOGY CORPORATION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products