CN114900502B - Network registration method, device, electronic equipment and readable storage medium - Google Patents

Network registration method, device, electronic equipment and readable storage medium Download PDF

Info

Publication number
CN114900502B
CN114900502B CN202210535742.9A CN202210535742A CN114900502B CN 114900502 B CN114900502 B CN 114900502B CN 202210535742 A CN202210535742 A CN 202210535742A CN 114900502 B CN114900502 B CN 114900502B
Authority
CN
China
Prior art keywords
stun
attribute
client
network address
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210535742.9A
Other languages
Chinese (zh)
Other versions
CN114900502A (en
Inventor
董洪乾
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing QIYI Century Science and Technology Co Ltd
Original Assignee
Beijing QIYI Century Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing QIYI Century Science and Technology Co Ltd filed Critical Beijing QIYI Century Science and Technology Co Ltd
Priority to CN202210535742.9A priority Critical patent/CN114900502B/en
Publication of CN114900502A publication Critical patent/CN114900502A/en
Application granted granted Critical
Publication of CN114900502B publication Critical patent/CN114900502B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/1066Session management
    • H04L65/1073Registration or de-registration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • General Business, Economics & Management (AREA)
  • Multimedia (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The embodiment of the application provides a network registration method, a network registration device, electronic equipment and a readable storage medium. The method comprises the following steps: acquiring a Stun server list to be registered according to the geographical area deployed by the service server; when a client accesses servers in the Stun server list in turn, a public network address and Stun attribute of the client are obtained; determining a target Stun attribute in the Stun attributes according to the designated priority corresponding to the Stun attribute; and registering the client side initiating the service node registration request according to the public network address, and setting the Stun attribute of the client side as the target Stun attribute. The embodiment of the application can improve the Penetrate communication rate and the P2P utilization rate in the multi-outlet network, and simultaneously saves the bandwidth cost.

Description

Network registration method, device, electronic equipment and readable storage medium
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a network registration method, a device, an electronic apparatus, and a readable storage medium.
Background
NAT (Network Address Translation ), also known as network masking, is a technique for rewriting source or destination IP addresses as IP packets pass through routers or firewalls, which is commonly used in private networks having multiple hosts but accessing the internet through only one public IP address.
P2P (Peer to Peer), peer-to-peer communication, otherwise known as peer-to-peer networking, is a distinct distinction from the traditional server-client model. When P2P makes a connection, different connection policies are required to be used according to network attributes of P2P nodes. The existing network is more and more complex, the network of some users has a multi-exit scene, the network attribute of each exit is not identical, when the client requests to the service node from the registration server, the client initiating the registration request of the service node is usually registered according to the public network address when the client accesses the server most recently, at this time, a pennetrate (penetration) failure occurs, the registered node cannot provide network services for the client sending the registration request, for example, service servers are deployed in Beijing and Wuhan, and the Stun server deploys 6 servers according to the access amount of the client, which are 49.7.30.128 Beijing telecom, 49.7.30.118 Beijing telecom, 39.156.40.52 Beijing mobile, 122.190.66.85 Wuhan Unicom, 1122.190.66.105 Wuhan Unicom and 111.48.119.106 Chinese mobile respectively. A client a of an Shanghai user, the local IP is 10.4.154.82, when started, performs Stun, randomly accesses a Stun server 49.7.30.128, and obtains the public network IP1 as: 122.190.66.146, belonging to Shanghai telecom, the NAT type is Port Restrict, so the client's NAT type is Port Restrict. When the client registers as a service node with the server, the public network IP registers according to IP1, and the NAT type is Port service. Since NAT ports change when the external port is not accessed for a certain period of time and re-mapped due to the nature of NAT, stun is performed again at intervals. When Stun, the server 101.227.12.153 is randomly accessed, and the obtained public network IP2 is: 122.190.66.85, the NAT type is nutrict, the NAT type of the client is updated to nutrict. When the client registers as a service node with the server, the public network IP registers according to IP2, and the NAT type is the attribute. At this time, if the client C requests to the registration server to the service node a and transmits to the a peerate, the C penetrates to the IP2, and in fact, it accesses through the exit IP1 of the a instead of the IP2, and the NAT type Port component of the IP1 is more strict than the NAT type component of the IP2, and the peerate fails, so that the node a cannot provide the service to the node C. The above situation may reduce the pennetrate communication rate in the multi-outlet network, and reduce the P2P usage.
Disclosure of Invention
An object of the embodiments of the present application is to provide a network registration method, apparatus, electronic device, and readable storage medium, so as to improve the peenetrate communication rate in a multi-outlet network, improve the P2P usage rate, and save the bandwidth cost. The specific technical scheme is as follows:
in a first aspect of the present application, there is first provided a network registration method, applied to a service server, including:
acquiring a Stun server list to be registered according to the geographical area deployed by the service server;
when a client accesses servers in the Stun server list in turn, a public network address and Stun attribute of the client are obtained;
determining a target Stun attribute in the Stun attributes according to the designated priority corresponding to the Stun attribute;
and registering the client side initiating the service node registration request according to the public network address, and setting the Stun attribute of the client side as the target Stun attribute.
Optionally, the acquiring the Stun server list to be registered according to the geographic area where the service server is deployed includes:
acquiring a geographic area deployed by the service server and an operator of the service server;
Acquiring servers which are deployed in the geographic area and are affiliated to the operators and can perform Stun;
and screening servers belonging to different operators from the servers capable of carrying out Stun, and generating a Stun server list.
Optionally, when the client accesses the servers in the Stun server list in turn, the method includes:
when the client side accesses the servers in the Stun server list in sequence based on a preset address inquiry time interval, a first public network address and a first Stun attribute of the client side at the time of the access are obtained;
acquiring a second public network address and a second Stun attribute when the client accesses the server in the Stun server list;
and taking the first public network address and the second public network address as the public network address, and taking the first Stun attribute and the second Stun attribute as the Stun attribute.
Optionally, the determining the target Stun attribute in the Stun attributes according to the designated priority corresponding to the Stun attribute includes:
determining a first network address switching type corresponding to the first Stun attribute and a second network address switching type corresponding to the second Stun attribute according to the network address switching type when the client accesses the server;
Sequencing the first Stun attribute and the second Stun attribute according to the order of the priority of the first network address switching type and the second network address switching type from high to low;
and determining the first-order Stun attribute in the first Stun attribute and the second Stun attribute according to the ordering result, and taking the first-order Stun attribute as the target Stun attribute.
Optionally, after the root registers the client that initiates the service node registration request according to the public network address, and sets the Stun attribute of the client as the target Stun attribute, the method further includes:
after the client finishes registration, acquiring first provider information corresponding to the public network address and a first geographic area corresponding to the public network address;
after receiving a network service request of a target client, acquiring second provider information for providing internet service for the target client and a second geographical area where the target client is located;
determining a public network address to be serviced in the public network addresses according to the first provider information, the first geographic area, the second provider information and the second geographic area;
And providing network service for the target client based on the public network address to be serviced.
Optionally, the Stun attribute is an attribute indicating a network address switching type when the client accesses a server,
the network address switching type includes: full cone, limiting cone, port limiting cone, and symmetrical.
Optionally, the specified priority corresponding to the Stun attribute is determined according to the network address switching type, and the network address switching type is sequentially ordered from low to high: the full cone, the limiting cone, the port limiting cone, and the symmetrical.
In a second aspect, an embodiment of the present application provides a network registration apparatus, applied to a service server, including:
the server list acquisition module is used for acquiring a Stun server list to be registered according to the geographical area deployed by the service server;
the Stun attribute acquisition module is used for acquiring a public network address and Stun attributes of the client when the client accesses the servers in the Stun server list in sequence;
the target attribute determining module is used for determining target Stun attributes in the Stun attributes according to the designated priorities corresponding to the Stun attributes;
And the client registration module is used for registering the client initiating the service node registration request according to the public network address and setting the Stun attribute of the client as the target Stun attribute.
Optionally, the server list obtaining module includes:
a geographical region acquiring unit, configured to acquire a geographical region deployed by the service server and an operator of the service server;
a Stun server obtaining unit, configured to obtain a Stun-capable server that is deployed in the geographic area and is affiliated to the operator;
and the server list generation unit is used for screening servers belonging to different operators from the servers capable of carrying out Stun and generating a Stun server list.
Optionally, the Stun attribute obtaining module includes:
a first Stun attribute obtaining unit, configured to obtain a first public network address and a first Stun attribute of the client when the client accesses servers in the Stun server list in sequence based on a preset address query time interval;
a second Stun attribute obtaining unit, configured to obtain a second public network address and a second Stun attribute when the client accesses a server in the Stun server list before;
And the Stun attribute acquisition unit is used for taking the first public network address and the second public network address as the public network address and taking the first Stun attribute and the second Stun attribute as the Stun attribute.
Optionally, the target attribute determining module includes:
an address switching type determining unit, configured to determine a first network address switching type corresponding to the first Stun attribute and a second network address switching type corresponding to the second Stun attribute according to a network address switching type when the client accesses the server;
a Stun attribute ordering unit, configured to order the first Stun attribute and the second Stun attribute according to a sequence from high priority to low priority of the first network address switching type and the second network address switching type;
and the target attribute acquisition unit is used for determining the first-order Stun attribute in the first Stun attributes and the second Stun attribute according to the ordering result, and taking the first-order Stun attribute as the target Stun attribute.
Optionally, the apparatus further comprises:
the first geographic area acquisition module is used for acquiring first provider information corresponding to the public network address and a first geographic area corresponding to the public network address after the client finishes registration;
The second geographic area acquisition module is used for acquiring second provider information for providing internet service for the target client and a second geographic area in which the target client is located after receiving a network service request of the target client;
the to-be-serviced address determining module is used for determining to-be-serviced public network addresses in the public network addresses according to the first provider information, the first geographical area, the second provider information and the second geographical area;
and the network service providing module is used for providing network service for the target client based on the public network address to be serviced.
Optionally, the Stun attribute is an attribute indicating a network address switching type when the client accesses a server,
the network address switching type includes: full cone, limiting cone, port limiting cone, and symmetrical.
Optionally, the specified priority corresponding to the Stun attribute is determined according to the network address switching type, and the network address switching type is sequentially ordered from low to high: the full cone, the limiting cone, the port limiting cone, and the symmetrical.
In yet another aspect of the present application, there is also provided an electronic device, including:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor to enable the at least one processor to perform any one of the methods described above.
In yet another aspect of the embodiments of the present application, there is also provided a non-transitory computer-readable storage medium storing computer instructions for causing the computer to perform the method of any one of the above.
In a further aspect of the application implementation, there is also provided a computer program product comprising a computer program which, when executed by a processor, implements a method according to any of the preceding claims.
According to the network registration method, the device, the electronic equipment and the readable storage medium, a to-be-registered Stun server list is obtained according to a geographic area deployed by a service server, when a client accesses servers in the Stun server list in sequence, a public network address and Stun attributes of the client are obtained, a target Stun attribute in the Stun attributes is determined according to a designated priority corresponding to the Stun attributes, the client initiating a service node registration request is registered according to the public network address, and the Stun attribute of the client is set as the target Stun attribute. According to the embodiment of the application, the target Stun attribute in the Stun attribute is determined according to the designated priority corresponding to the Stun attribute, the client initiating the service node registration request is registered according to the public network address, the Stun attribute of the client is set to be the target Stun attribute, and the client is not registered according to the newly accessed public network address and Stun attribute, so that the condition that the Penetrate fails when other clients send the service node Penetrate to the service node can be avoided, the Penetrate communication rate in a multi-outlet network is improved, and the P2P utilization rate is further improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below.
Fig. 1 is a flowchart of steps of a network registration method according to an embodiment of the present application;
fig. 2 is a flowchart of steps of another network registration method according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of a network registration device according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application.
Referring to fig. 1, a flowchart illustrating steps of a network registration method provided in an embodiment of the present application, where the network registration method may be applied to a service server, as shown in fig. 1, the network registration method may include the following steps:
step 101: and acquiring a Stun server list to be registered according to the geographical position of the service server deployment.
The embodiment of the application can be applied to a scene that the target public network address is selected according to the priority of the Stun attribute to perform network registration on the client so as to improve the Penetrate communication rate in the multi-outlet network.
A traffic server refers to a server that can provide network services for clients.
The Stun server list refers to a list formed by servers capable of performing Stun for providing network services for clients, and a plurality of servers can be stored in the Stun server list, and each server can provide network services for clients.
It will be appreciated that the service server and the servers in the server list described above may be used as a server cluster, the service server may be used as a master server, the servers in the server list may be used as slave servers, and the service server may receive a registration request of a client and allocate a certain server in the server list to the client to provide a network service for the client.
In this embodiment, first, a geographic location where a service server is deployed may be obtained, and a Stun server list to be registered may be deployed according to the geographic location, specifically, a plurality of servers capable of performing Stun in the geographic location may be obtained, and these servers form a server list. In particular, the detailed description may be made in connection with the following detailed description.
In a specific implementation of the present application, the step 101 may include:
Substep A1: and acquiring the geographical area where the service server is deployed and an operator of the service server.
In this embodiment, the UDP (User Datagram Protocol ) of Stun (Simple Traversal of UDP over NATs, NAT (Network Address Translation ) is a network protocol. The Stun protocol is a client-to-server protocol, and a Stun client sends a request to a Stun server to find the public network address and port of the client itself.
An operator refers to a provider that provides network services, such as china mobile, china telecommunications, etc.
When acquiring the Stun server list, the geographical area where the service server is deployed and the operator providing the network service for the service server may be acquired first.
After acquiring the geographical area where the service server is deployed and the operator of the service server, a sub-step A2 is performed.
Substep A2: and acquiring servers which are deployed in the geographic area and are affiliated to the operators and can perform Stun.
After the geographical area where the service server is deployed and the service server's operator are acquired, servers which are deployed in the geographical area and are affiliated to the operator and can perform Stun may be acquired, for example, the geographical area where the service server is deployed is a city, the service server's operator is operator 1, at this time, servers which are deployed in the city a and affiliated to operator 1 may be acquired, and servers which can perform Stun may be screened from the acquired servers.
After acquiring Stun-capable servers affiliated with the operator deployed in the geographic area, sub-step A3 is performed.
Substep A3: and screening servers belonging to different operators from the servers capable of carrying out Stun, and generating a Stun server list.
After servers which are deployed in the geographic area and are subject to the operators and can be subjected to Stun are obtained, servers which are subject to different operators can be screened from the servers which can be subjected to Stun, and a Stun server list can be generated according to the screened servers. For example, the geographic areas where the service servers are deployed are city a and city B, the operators of the service servers deployed in city a and city B are operator 1, operator 2, operator 3 and operator 4, the servers that are affiliated to operator 1 in city a and city B and that can perform Stun are server 1, server 2 and server 3, the servers that are affiliated to operator 2 in city a and city B and that can perform Stun are server 4 and server 5, the servers that are affiliated to operator 3 in city a and city B and that can perform Stun are server 6, the servers that are affiliated to operator 4 in city a and city B are server 7, server 8 and server 9, and at this time, the lists of servers 1, 4, 6 and 8 can be selected from these servers to generate Stun server can be selected from these servers, and the lists of servers 2, 5, 6 and 7 can also be selected from these servers to generate Stun server can be selected from these servers.
It will be appreciated that the above examples are only examples listed for better understanding of the technical solutions of the embodiments of the present application, and are not to be construed as the only limitation of the present embodiments.
After acquiring a list of Stun servers to be registered according to the geographical area in which the service server is located, step 102 is performed.
Step 102: and when the client accesses the servers in the Stun server list in turn, acquiring the public network address and Stun attribute of the client.
The Stun attribute refers to an attribute for indicating a network address switching type when the client accesses the server, that is, an attribute corresponding to NAT.
In this example, the network address switch type may include: full cone (i.e., fullcone), limited cone (i.e., nutrict), port limited cone (i.e., port nutrict), and symmetrical (i.e., symmetry).
Next, the above four network address switching types are described in detail with reference to specific examples.
For example, an intranet user a (i.e., private Endpoint) creates an address mapping session when sending a packet out for the first time, and the server assigns a public network address and Port (i.e., IP and Port), which can be defined as PA (Public Endpoint), with which the external host communicates:
1. Any external host (such as host B, host C, etc.) can receive the communication message as long as it sends the communication message to the PA, and at this time, the NAT type corresponding to a is a full cone.
2. The host B sends the communication message to the PA, and the host IP of A and B are communicated in the history communication process, the A can only receive the communication message, and at the moment, the NAT type corresponding to the A is limited to a cone type.
3. The host B sends the communication message to the PA, and in the history communication process, the A and the Endpoint (IP and Port) of the B communicate, and the A can only receive the communication message, and at the moment, the NAT type corresponding to the A is the Port limiting cone type.
4. A communicates with different external hosts, NAT is distributed to different public Endpoints of A, the external hosts (such as host B, host C, etc.) want to communicate with A, and the external hosts can respond to A by sending communication information first, at this time, the NAT type corresponding to A is symmetrical.
Among the four types of NAT, the order of priority from low to high is: the appointed priority corresponding to the Stun attribute corresponding to the four NAT types is the same as the priority sequence of the four NAT types, and the higher the appointed priority corresponding to the Stun attribute is, the higher the degree of registration to the client side initiating the service node registration request according to the public network address corresponding to the Stun attribute is.
After the Stun server list to be registered is acquired according to the geographic location of the service server, when the client accesses the servers in the Stun server list in turn, the public network address (i.e. public network IP (Internet Protocol, internet protocol)) used by the client when accessing and the Stun attribute corresponding to the client can be acquired.
In a specific implementation, when a client accesses a server in the Stun server list each time, a port is not changed, but the NAT type may be changed, and a Stun attribute corresponding to the client may also be changed.
In a specific implementation of the present application, the step 102 may include:
substep B1: and when the client side accesses the servers in the Stun server list in sequence based on a preset address inquiry time interval, acquiring a first public network address and a first Stun attribute of the client side in the current access.
In this embodiment, the address query time interval refers to a preset time interval for accessing a server in the Stun server list, and the specific value of the address query time interval may be determined according to the service requirement, which is not limited in this embodiment.
In practical application, when the client can access the servers in the Stun server list in turn based on a preset address query time interval, a first public network address and a first Stun attribute of the client in the current access can be obtained.
Substep B2: and acquiring a second public network address and a second Stun attribute when the client accesses the server in the Stun server list.
When the client accesses the servers in the Stun server list in advance, the second public network address and the second Stun attribute when the client accesses the servers in the Stun server list in advance can be recorded.
Substep B3: and taking the first public network address and the second public network address as the public network address, and taking the first Stun attribute and the second Stun attribute as the Stun attribute.
After the first public network address and the second public network address corresponding to the client side when the client side accesses the client side and accesses the client side in advance and the corresponding first Stun attribute and second Stun attribute are obtained, the first public network address and the second public network address can be used as all public network addresses of the client side until the client side accesses the client side is cut off, and the first Stun attribute and the second Stun attribute can be used as all Stun attributes of the client side until the client side accesses the client side is cut off the client side.
After the public network address and Stun attribute of the client are obtained, step 103 is performed.
Step 103: and determining a target Stun attribute in the Stun attributes according to the designated priority corresponding to the Stun attributes.
In this example, the specified priority corresponding to the Stun attribute is determined according to the network address switch type.
The network address switching types are orderly sequenced from low priority to high priority: full cone, port limiting cone, and symmetrical. Then, the specified priority corresponding to the Stun attribute is the same as the priority order of the network address switching type, and the higher the specified priority corresponding to the Stun attribute is, the higher the degree of registration to the client initiating the service node registration request according to the public network address corresponding to the Stun attribute is.
After the Stun attribute of the client is obtained, determining a target Stun attribute in the Stun attributes according to the designated priority corresponding to the Stun attribute, specifically, the obtained Stun attribute comprises a first Stun attribute and a second Stun attribute, and the target Stun attribute can be screened out from the first Stun attribute and the second Stun attribute according to the priority of the network address switching type corresponding to the first Stun attribute and the second Stun attribute respectively.
The above process may be described in detail in connection with the following detailed description.
In a specific implementation of the present application, the step 103 may include:
substep C1: and determining a first network address switching type corresponding to the first Stun attribute and a second network address switching type corresponding to the second Stun attribute according to the network address switching type when the client accesses the server.
In this embodiment, when the client accesses the server in the Stun server list, the network address switching type when the client accesses the server may be obtained, and according to the network address switching type when the client accesses the server, the first network address switching type corresponding to the first Stun attribute and the second network address switching type corresponding to the second Stun attribute are determined.
And C2, after determining a first network address switching type corresponding to the first Stun attribute and a second network address switching type corresponding to the second Stun attribute according to the network address switching type when the client accesses the server.
Substep C2: and sequencing the first Stun attribute and the second Stun attribute according to the order of the priorities of the first network address switching type and the second network address switching type from high to low.
After the first network address switching type corresponding to the first Stun attribute and the second network address switching type corresponding to the second Stun attribute are obtained, the first Stun attribute and the second Stun attribute may be ordered according to the order of the priorities of the first network address switching type and the second network address switching type from high to low.
Substep C3: and determining the first-order Stun attribute in the first Stun attribute and the second Stun attribute according to the ordering result, and taking the first-order Stun attribute as the target Stun attribute.
After the first Stun attribute and the second Stun attribute are sequenced, a sequencing result of the Stun attribute can be obtained, the Stun attribute sequenced in the first position in the first Stun attribute and the second Stun attribute is determined according to the sequencing result, the Stun attribute sequenced in the first position is used as a target Stun attribute, namely, the network address switching type with the highest priority is screened out from the corresponding network address switching types according to the network address switching types respectively corresponding to the first Stun attribute and the second Stun attribute, and the Stun attribute corresponding to the network address switching type with the highest priority is used as the target Stun attribute.
After determining the target Stun attribute in the Stun attributes according to the specified priority corresponding to the Stun attribute, step 104 is performed.
Step 104: and registering the client side initiating the service node registration request according to the public network address, and setting the Stun attribute of the client side as the target Stun attribute.
After the target Stun attribute is obtained, the client that initiates the service node registration request may be registered according to the public network address, and the Stun attribute of the client is set as the target Stun attribute.
The above-described process may be described in detail in connection with the following specific examples.
Service servers are deployed in Beijing and Wuhan, operators have telecom, unicom and mobile, so the Stun server deploys 6 servers, namely 111.202.74.188 Beijing Unicom, 49.7.30.118 Beijing telecom, 39.156.40.52 Beijing mobile, 122.190.66.85 Wuhan Unicom, 116.211.199.64 Wuhan telecom, 111.48.119.106 Wuhan mobile.
A client of the Shanghai user, with local IP 10.4.154.82, accesses server 111.202.74.188 first, accesses server 49.7.30.118 after 1 minute intervals, then accesses server 39.156.40.52 because the service triggered a new Stun, accesses server 122.190.66.85 after 1 minute, accesses server 116.211.199.64 again, and finally accesses 111.48.119.106, so that all servers access is completed.
The first Stun obtains the public network IP 101.227.12.153, belongs to Shanghai telecom, and the NAT type is the branch. Since there is only one public network IP1 at this time, the NAT type of the client is nutrict. The client side calculates a Remote node Penetrate according to the type of the attribute; when a client registers as a service node with a server, the public network IP registers according to IP1, and the Stun attribute of the client is set as a target Stun attribute, wherein the target Stun attribute can be used for indicating that the NAT type of the client is a branch.
The second and third stuns obtain 116.211.199.227 public network IP, so the NAT type of the client keeps the rest unchanged. The client and the new node Penetrate are carried out according to the type of the resource; when the client registers as a service node with the server, the public network IP registers according to IP1, and sets the Stun attribute of the client as a target Stun attribute, where the target Stun attribute may indicate that the NAT type of the client is a server.
The public network IP2 acquired by the fourth Stun is 122.190.66.146, belongs to the Wuhan Union, and the NAT type is Port distribution, at this time, 2 public networks IP are available, and the second NAT type Port distribution is arranged behind the distribution, so that the NAT type of the client is changed into Port distribution. When the client and the new Remote node are in a Penetrate, the client and the new Remote node are performed according to a new NAT type Port resource; when the client registers as a service node with the server, the public network IP registers according to IP1 and IP2, and the client Stun attribute is set as a target Stun attribute, wherein the target Stun attribute can be used for indicating that the NAT type of the client is Port server.
The public network IP3 acquired by the Stun for the fifth time is 116.211.199.227, belongs to the Wuhan telecom, the NAT type is FullCone, which is the 3 rd public network IP, and the NAT type FullCone corresponding to the IP is arranged before the rest and the Port rest, so that the NAT type of the client keeps the Port rest unchanged. When the client and the new Remote node are Penetrate, the client and the new Remote node are performed according to NAT type Port rest; when a client registers as a service node with a server, the public network IP registers according to IP1, IP2 and IP3, and the Stun attribute of the client is set as a target Stun attribute, wherein the target Stun attribute can be used for indicating that the NAT type of the client is Port server.
The public network IP acquired by the sixth Stun is 122.190.66.146, which is the same as the result acquired by the fourth Stun, and the NAT type of the client is unchanged. When the client and the new Remote node are Penetrate, the client and the new Remote node are performed according to NAT type Port rest; when a client registers as a service node with a server, the public network IP registers according to IP1, IP2 and IP3, and the Stun attribute of the client is set as a target Stun attribute, wherein the target Stun attribute can be used for indicating that the NAT type of the client is Port server.
In the above example, in the process of multiple stuns, all acquired public network addresses and Stun attributes are saved, the Stun attributes are ordered according to Fullcone, restrict, port rest and symmetry, the Stun attribute ordered at the last is set as the Stun attribute of the client requesting to register as the service node, and the Penetrate is performed according to the Stun attribute.
According to the network registration method provided by the embodiment of the invention, a to-be-registered Stun server list can be obtained according to a geographic area deployed by a service server, when a client accesses servers in the Stun server list in sequence, a public network address and Stun attributes of the client are obtained, a target Stun attribute in the Stun attributes is determined according to a designated priority corresponding to the Stun attributes, a first client initiating a service node registration request is registered according to the public network address, and the Stun attribute of the first client is set as the target Stun attribute. According to the embodiment of the application, the target Stun attribute in the Stun attribute is determined according to the designated priority corresponding to the Stun attribute, the client initiating the service node registration request is registered according to the public network address, the Stun attribute of the client is set to be the target Stun attribute, and the client is not registered according to the public network address and the Stun attribute which are accessed currently, so that the condition that the Penetrate fails when other clients send the Penetrate to the service node can be avoided, the Penetrate communication rate in a multi-outlet network is improved, and the P2P use rate is further improved.
Referring to fig. 2, a flowchart illustrating steps of another network registration method provided in an embodiment of the present application, where the network registration method may be applied to a service server, as shown in fig. 2, the network registration method may include the steps of:
Step 201: and acquiring a Stun server list to be registered according to the geographical area deployed by the service server.
Step 202: and when the client accesses the servers in the Stun server list in turn, acquiring the public network address and Stun attribute of the client.
Step 203: and determining a target Stun attribute in the Stun attributes according to the designated priority corresponding to the Stun attributes.
Step 204: and registering the client side initiating the service node registration request according to the public network address, and setting the Stun attribute of the client side as the target Stun attribute.
In this embodiment, the implementation manners of the steps 201 to 204 are similar to the implementation manners of the steps 101 to 104 in the above embodiment, and the detailed description of the implementation processes of the steps 201 to 204 is omitted here.
Step 205: after the client finishes registration, first provider information corresponding to the public network address and a first geographic area corresponding to the public network address are acquired.
The first provider information refers to provider information corresponding to a public network address for providing internet service for the client. In this example, the first provider information is provider information corresponding to a public network address obtained each time when the client accesses a server in the Stun server list. The provider information is an Internet service provider (ISP, internet Service Provider) and refers to a provider that provides network services for clients, and typically, a personal user's computer or a group user's computer network is connected to a host computer of the ISP through some communication line, and then connected to the Internet through a connection channel of the ISP. The ISP mainly has two functions, namely, providing Internet access service for users and providing various information services such as email service, information release proxy service and the like for users.
The first geographic area refers to a geographic area corresponding to the public network address, namely an area where a provider providing network services for the client is located.
After the client is registered as a service node, first provider information corresponding to the public network address and a first geographic area corresponding to the public network address may be acquired.
Step 206: and after receiving the network service request of the target client, acquiring second provider information for providing internet service for the target client and a second geographical area where the target client is located.
After the client is registered as the service node, if the target client requests the available service node from the server, that is, receives the network service request of the target client, at this time, the second provider information for providing the internet service for the target client and the second geographical area where the target client is located may be obtained.
Step 207: and determining a public network address to be serviced in the public network addresses according to the first provider information, the first geographic area, the second provider information and the second geographic area.
The public network address to be serviced refers to a public network address which is screened from public network addresses obtained when the client accesses the server and is used for providing network services for the target client.
After the first provider information and the first geographical area corresponding to the public network address of the client registered as the service node and the second provider information and the second geographical area of the target client requesting the network service are obtained, the public network address to be serviced in the public network address can be determined according to the first provider information, the first geographical area, the second provider information and the second geographical area. The process of screening the public network address to be serviced may be described in detail in connection with the following examples.
When the client C requests the server S to register as a service node, the obtained public network address includes: after the client C is registered as a service node, IP1, IP2, IP3, and IP4 may screen the public network address to be serviced from IP1, IP2, IP3, and IP4 according to the ISP corresponding to the four public network addresses of the client C and the geographic area of the client C, and the ISP and the geographic area of the target client B, so as to provide network services for the target client B, which specifically includes the following cases:
1. the ISP corresponding to the IP1 is the same as the ISP of the B, and the geographic area corresponding to the IP1 is the same as the geographic area of the B;
2. the ISP corresponding to the IP1 is the same as the ISP of the B, and the geographic area corresponding to the IP1 is different from the geographic area of the B;
3. The ISP corresponding to the IP1 is different from the ISP of the B, and the geographic area corresponding to the IP1 is the same as the geographic area of the B;
4. the ISP corresponding to IP1 is different from the ISP of B, and the geographic area corresponding to IP1 is different from the geographic area of B.
According to the above several cases, IP1 is preferentially selected as the public network address to be served, so that the C provides the network service for B through IP 1. If the Penetrate fails, IP2 is selected as the public network address to be serviced, so that C can provide network service for B through the IP 2. If the Penetrate fails, IP3 is selected as the public network address to be serviced, so that the C provides network service for the B through the IP 3. If the Penetrate fails, finally, IP4 is selected as the public network address to be served, so that C can provide network service for B through the IP 4. If the Penetrate fails, it indicates that B cannot communicate with C, at which point B may request a new available node from server S.
By the selection mode of the public network address to be served, the public network address with the same ISP and the same geographic area can be selected as much as possible as the public network address to be served while the communication between the client registered as the service node and the client requesting the network service is ensured, so that the network bandwidth can be saved.
Step 208: and providing network service for the target client based on the public network address to be serviced.
After the public network address to be serviced is obtained, network services can be provided for the target client based on the public network address to be serviced.
In addition to the advantages of the first embodiment, the network registration method provided in the embodiment of the present invention may perform screening of public network addresses to be served according to provider information and geographic areas, and may select public network addresses identical to the ISP and identical to the geographic areas as public network addresses to be served as much as possible while ensuring connectivity between clients registered as service nodes and clients requesting network services, so as to save network bandwidth.
Referring to fig. 3, a schematic structural diagram of a network registration device provided in an embodiment of the present application, where the network registration device may be applied to a service server, as shown in fig. 3, the network registration device 300 may include the following modules:
a server list obtaining module 310, configured to obtain a Stun server list to be registered according to a geographic area in which the service server is deployed;
a Stun attribute obtaining module 320, configured to obtain a public network address and a Stun attribute of a client when the client accesses servers in the Stun server list in sequence;
A target attribute determining module 330, configured to determine a target Stun attribute in the Stun attributes according to a specified priority corresponding to the Stun attribute;
the client registration module 340 is configured to register a client that initiates a service node registration request according to the public network address, and set a Stun attribute of the client as the target Stun attribute.
Optionally, the server list obtaining module 310 includes:
a geographical region acquiring unit, configured to acquire a geographical region deployed by the service server and an operator of the service server;
a Stun server obtaining unit, configured to obtain a Stun-capable server that is deployed in the geographic area and is affiliated to the operator;
and the server list generation unit is used for screening servers belonging to different operators from the servers capable of carrying out Stun and generating a Stun server list.
Optionally, the Stun attribute obtaining module 320 includes:
a first Stun attribute obtaining unit, configured to obtain a first public network address and a first Stun attribute of the client when the client accesses servers in the Stun server list in sequence based on a preset address query time interval;
A second Stun attribute obtaining unit, configured to obtain a second public network address and a second Stun attribute when the client accesses a server in the Stun server list before;
and the Stun attribute acquisition unit is used for taking the first public network address and the second public network address as the public network address and taking the first Stun attribute and the second Stun attribute as the Stun attribute.
Optionally, the target attribute determining module 330 includes:
an address switching type determining unit, configured to determine a first network address switching type corresponding to the first Stun attribute and a second network address switching type corresponding to the second Stun attribute according to a network address switching type when the client accesses the server;
a Stun attribute ordering unit, configured to order the first Stun attribute and the second Stun attribute according to a sequence from high priority to low priority of the first network address switching type and the second network address switching type;
and the target attribute acquisition unit is used for determining the first-order Stun attribute in the first Stun attributes and the second Stun attribute according to the ordering result, and taking the first-order Stun attribute as the target Stun attribute.
Optionally, the apparatus further comprises:
the first geographic area acquisition module is used for acquiring first provider information corresponding to the public network address and a first geographic area corresponding to the public network address after the client finishes registration;
the second geographic area acquisition module is used for acquiring second provider information for providing internet service for the target client and a second geographic area in which the target client is located after receiving a network service request of the target client;
the to-be-serviced address determining module is used for determining to-be-serviced public network addresses in the public network addresses according to the first provider information, the first geographical area, the second provider information and the second geographical area;
and the network service providing module is used for providing network service for the target client based on the public network address to be serviced.
Optionally, the Stun attribute is an attribute indicating a network address switching type when the client accesses a server,
the network address switching type includes: full cone, limiting cone, port limiting cone, and symmetrical.
Optionally, the specified priority corresponding to the Stun attribute is determined according to the network address switching type, and the network address switching type is sequentially ordered from low to high: the full cone, the limiting cone, the port limiting cone, and the symmetrical.
According to the network registration device provided by the embodiment of the invention, a to-be-registered Stun server list can be obtained according to a geographic area deployed by a service server, when a client accesses servers in the Stun server list in sequence, a public network address and Stun attributes of the client are obtained, a target Stun attribute in the Stun attributes is determined according to a designated priority corresponding to the Stun attributes, a first client initiating a service node registration request is registered according to the public network address, and the Stun attribute of the first client is set as the target Stun attribute. According to the embodiment of the application, the target Stun attribute in the Stun attribute is determined according to the designated priority corresponding to the Stun attribute, the client initiating the service node registration request is registered according to the public network address, the Stun attribute of the client is set to be the target Stun attribute, and the client is not registered according to the public network address and the Stun attribute which are accessed currently, so that the condition that the Penetrate fails when other clients send the Penetrate to the service node can be avoided, the Penetrate communication rate in a multi-outlet network is improved, and the P2P use rate is further improved.
The embodiment of the present application further provides an electronic device, as shown in fig. 4, including a processor 401, a communication interface 402, a memory 403, and a communication bus 404, where the processor 401, the communication interface 402, and the memory 403 complete communication with each other through the communication bus 404,
A memory 403 for storing a computer program;
the processor 401, when executing the program stored in the memory 403, implements the following steps:
acquiring a Stun server list to be registered according to the geographical area deployed by the service server;
when a client accesses servers in the Stun server list in turn, a public network address and Stun attribute of the client are obtained;
determining a target Stun attribute in the Stun attributes according to the designated priority corresponding to the Stun attribute;
and registering the client side initiating the service node registration request according to the public network address, and setting the Stun attribute of the client side as the target Stun attribute.
Optionally, the acquiring the Stun server list to be registered according to the geographic area where the service server is deployed includes:
acquiring a geographic area deployed by the service server and an operator of the service server;
acquiring servers which are deployed in the geographic area and are affiliated to the operators and can perform Stun;
and screening servers belonging to different operators from the servers capable of carrying out Stun, and generating a Stun server list.
Optionally, when the client accesses the servers in the Stun server list in turn, the method includes:
when the client side accesses the servers in the Stun server list in sequence based on a preset address inquiry time interval, a first public network address and a first Stun attribute of the client side at the time of the access are obtained;
acquiring a second public network address and a second Stun attribute when the client accesses the server in the Stun server list;
and taking the first public network address and the second public network address as the public network address, and taking the first Stun attribute and the second Stun attribute as the Stun attribute.
Optionally, the determining the target Stun attribute in the Stun attributes according to the designated priority corresponding to the Stun attribute includes:
determining a first network address switching type corresponding to the first Stun attribute and a second network address switching type corresponding to the second Stun attribute according to the network address switching type when the client accesses the server;
sequencing the first Stun attribute and the second Stun attribute according to the order of the priority of the first network address switching type and the second network address switching type from high to low;
And determining the first-order Stun attribute in the first Stun attribute and the second Stun attribute according to the ordering result, and taking the first-order Stun attribute as the target Stun attribute.
Optionally, after the root registers the client that initiates the service node registration request according to the public network address, and sets the Stun attribute of the client as the target Stun attribute, the method further includes:
after the client finishes registration, acquiring first provider information corresponding to the public network address and a first geographic area corresponding to the public network address;
after receiving a network service request of a target client, acquiring second provider information for providing internet service for the target client and a second geographical area where the target client is located;
determining a public network address to be serviced in the public network addresses according to the first provider information, the first geographic area, the second provider information and the second geographic area;
and providing network service for the target client based on the public network address to be serviced.
Optionally, the Stun attribute is an attribute indicating a network address switching type when the client accesses a server,
The network address switching type includes: full cone, limiting cone, port limiting cone, and symmetrical.
Optionally, the specified priority corresponding to the Stun attribute is determined according to the network address switching type, and the network address switching type is sequentially ordered from low to high: the full cone, the limiting cone, the port limiting cone, and the symmetrical.
The communication bus mentioned by the above terminal may be a peripheral component interconnect standard (Peripheral Component Interconnect, abbreviated as PCI) bus or an extended industry standard architecture (Extended Industry Standard Architecture, abbreviated as EISA) bus, etc. The communication bus may be classified as an address bus, a data bus, a control bus, or the like. For ease of illustration, the figures are shown with only one bold line, but not with only one bus or one type of bus.
The communication interface is used for communication between the terminal and other devices.
The memory may include random access memory (Random Access Memory, RAM) or non-volatile memory (non-volatile memory), such as at least one disk memory. Optionally, the memory may also be at least one memory device located remotely from the aforementioned processor.
The processor may be a general-purpose processor, including a central processing unit (Central Processing Unit, CPU for short), a network processor (Network Processor, NP for short), etc.; but also digital signal processors (Digital Signal Processing, DSP for short), application specific integrated circuits (Application Specific Integrated Circuit, ASIC for short), field-programmable gate arrays (Field-Programmable Gate Array, FPGA for short) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components.
In yet another embodiment provided herein, a computer readable storage medium having instructions stored therein that when run on a computer cause the computer to perform the network registration method of any of the above embodiments is also provided.
In yet another embodiment provided herein, there is also provided a computer program product containing instructions that, when run on a computer, cause the computer to perform the network registration method of any of the above embodiments.
In the above embodiments, it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, produces a flow or function in accordance with embodiments of the present application, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable apparatus. The computer instructions may be stored in or transmitted from one computer-readable storage medium to another, for example, by wired (e.g., coaxial cable, optical fiber, digital Subscriber Line (DSL)), or wireless (e.g., infrared, wireless, microwave, etc.). The computer readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that contains an integration of one or more available media. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., solid State Disk (SSD)), etc.
It is noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
In this specification, each embodiment is described in a related manner, and identical and similar parts of each embodiment are all referred to each other, and each embodiment mainly describes differences from other embodiments. In particular, for system embodiments, since they are substantially similar to method embodiments, the description is relatively simple, as relevant to see a section of the description of method embodiments.
The foregoing description is only of the preferred embodiments of the present application and is not intended to limit the scope of the present application. Any modifications, equivalent substitutions, improvements, etc. that are within the spirit and principles of the present application are intended to be included within the scope of the present application.

Claims (10)

1. A network registration method applied to a service server, comprising:
acquiring a Stun server list to be registered according to the geographical area deployed by the service server;
when a client accesses servers in the Stun server list in turn, a public network address and Stun attributes of the client are obtained, wherein the Stun attributes are attributes indicating a network address switching type when the client accesses the servers, and a designated priority corresponding to the Stun attributes is determined according to the NAT type;
determining a target Stun attribute in the Stun attributes according to the designated priority corresponding to the Stun attribute;
and registering the client side initiating the service node registration request according to the public network address, and setting the Stun attribute of the client side as the target Stun attribute.
2. The method according to claim 1, wherein the obtaining a Stun server list to be registered according to the geographic area in which the service server is deployed includes:
Acquiring a geographic area deployed by the service server and an operator of the service server;
acquiring servers which are deployed in the geographic area and are affiliated to the operators and can perform Stun;
and screening servers belonging to different operators from the servers capable of carrying out Stun, and generating a Stun server list.
3. The method according to claim 1, wherein the obtaining the public network address and the Stun attribute of the client when the client accesses the servers in the Stun server list sequentially includes:
when the client side accesses the servers in the Stun server list in sequence based on a preset address inquiry time interval, a first public network address and a first Stun attribute of the client side at the time of the access are obtained;
acquiring a second public network address and a second Stun attribute when the client accesses the server in the Stun server list;
and taking the first public network address and the second public network address as the public network address, and taking the first Stun attribute and the second Stun attribute as the Stun attribute.
4. A method according to claim 3, wherein said determining a target Stun attribute of said Stun attributes according to a specified priority corresponding to said Stun attributes comprises:
Determining a first network address switching type corresponding to the first Stun attribute and a second network address switching type corresponding to the second Stun attribute according to the network address switching type when the client accesses the server;
sequencing the first Stun attribute and the second Stun attribute according to the order of the priority of the first network address switching type and the second network address switching type from high to low;
and determining the first-order Stun attribute in the first Stun attribute and the second Stun attribute according to the ordering result, and taking the first-order Stun attribute as the target Stun attribute.
5. The method according to claim 1, further comprising, after the registering the client that initiates the service node registration request according to the public network address and setting a Stun attribute of the client to the target Stun attribute:
after the client finishes registration, acquiring first provider information corresponding to the public network address and a first geographic area corresponding to the public network address;
after receiving a network service request of a target client, acquiring second provider information for providing internet service for the target client and a second geographical area where the target client is located;
Determining a public network address to be serviced in the public network addresses according to the first provider information, the first geographic area, the second provider information and the second geographic area;
and providing network service for the second client based on the public network address to be serviced.
6. The method according to any one of claims 1 to 5, wherein the Stun attribute is an attribute indicating a network address switching type when the client accesses a server,
the network address switching type includes: full cone, limiting cone, port limiting cone, and symmetrical.
7. The method of claim 6, wherein the specified priority corresponding to the Stun attribute is determined according to the network address switch type, and the network address switch type is ordered in order from low to high: the full cone, the port limiting cone, and the symmetrical.
8. A network registration apparatus for use with a service server, comprising:
the server list acquisition module is used for acquiring a Stun server list to be registered according to the geographical area deployed by the service server;
A Stun attribute obtaining module, configured to obtain, when a client accesses servers in the Stun server list in sequence, a public network address of the client and a Stun attribute, where the Stun attribute is an attribute indicating a network address switching type when the client accesses the servers, and a specified priority corresponding to the Stun attribute is determined according to a NAT type;
the target attribute determining module is used for determining target Stun attributes in the Stun attributes according to the designated priorities corresponding to the Stun attributes;
and the client registration module is used for registering the client initiating the service node registration request according to the public network address and setting the Stun attribute of the client as the target Stun attribute.
9. An electronic device, comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of any one of claims 1-7.
10. A non-transitory computer readable storage medium storing computer instructions for causing the computer to perform the method of any one of claims 1-7.
CN202210535742.9A 2022-05-17 2022-05-17 Network registration method, device, electronic equipment and readable storage medium Active CN114900502B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210535742.9A CN114900502B (en) 2022-05-17 2022-05-17 Network registration method, device, electronic equipment and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210535742.9A CN114900502B (en) 2022-05-17 2022-05-17 Network registration method, device, electronic equipment and readable storage medium

Publications (2)

Publication Number Publication Date
CN114900502A CN114900502A (en) 2022-08-12
CN114900502B true CN114900502B (en) 2024-02-27

Family

ID=82724268

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210535742.9A Active CN114900502B (en) 2022-05-17 2022-05-17 Network registration method, device, electronic equipment and readable storage medium

Country Status (1)

Country Link
CN (1) CN114900502B (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101094171A (en) * 2006-06-22 2007-12-26 华为技术有限公司 Method and system for implementing interaction of media streams, controller of media gateway, and media gateway
WO2009065996A1 (en) * 2007-11-22 2009-05-28 Nokia Corporation Virtual network interface for relayed nat traversal
CN102025769A (en) * 2010-09-10 2011-04-20 香港城市大学深圳研究院 Access method of distributed internet
KR101586058B1 (en) * 2014-12-10 2016-01-22 경희대학교 산학협력단 Device for connecting peer-to-peer communication considering nat types and method connecting peer-to-peer communication using the same
CN105472060A (en) * 2016-01-25 2016-04-06 互联天下科技发展(深圳)有限公司 Kademlia network node identifier generating method
CN105827748A (en) * 2016-05-12 2016-08-03 东莞市南星电子有限公司 Method for traversing Symmetric NAT (Network Address Translator) device by SIP (Session Initiation Protocol) based on ICE (Interactive Connectivity Establishment)
CN107846430A (en) * 2016-09-19 2018-03-27 北京优朋普乐科技有限公司 Node screening technique and device, the login service device of P2P networks
WO2021051880A1 (en) * 2019-09-18 2021-03-25 平安科技(深圳)有限公司 Resource data acquisition method and apparatus, computer device and storage medium
CN113261257A (en) * 2018-12-31 2021-08-13 谷歌有限责任公司 Operator integration via user network interface proxy
EP3879402A1 (en) * 2020-03-13 2021-09-15 Deutsche Telekom AG Methods and systems for service discovery and tunnelling in a distributed architecture

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080080532A1 (en) * 2006-09-29 2008-04-03 O'sullivan Mark Methods and apparatus for managing internet communications using a dynamic STUN infrastructure configuration
US20160380966A1 (en) * 2015-06-25 2016-12-29 Microsoft Technology Licensing, Llc Media Relay Server

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101094171A (en) * 2006-06-22 2007-12-26 华为技术有限公司 Method and system for implementing interaction of media streams, controller of media gateway, and media gateway
WO2009065996A1 (en) * 2007-11-22 2009-05-28 Nokia Corporation Virtual network interface for relayed nat traversal
CN102025769A (en) * 2010-09-10 2011-04-20 香港城市大学深圳研究院 Access method of distributed internet
KR101586058B1 (en) * 2014-12-10 2016-01-22 경희대학교 산학협력단 Device for connecting peer-to-peer communication considering nat types and method connecting peer-to-peer communication using the same
CN105472060A (en) * 2016-01-25 2016-04-06 互联天下科技发展(深圳)有限公司 Kademlia network node identifier generating method
CN105827748A (en) * 2016-05-12 2016-08-03 东莞市南星电子有限公司 Method for traversing Symmetric NAT (Network Address Translator) device by SIP (Session Initiation Protocol) based on ICE (Interactive Connectivity Establishment)
CN107846430A (en) * 2016-09-19 2018-03-27 北京优朋普乐科技有限公司 Node screening technique and device, the login service device of P2P networks
CN113261257A (en) * 2018-12-31 2021-08-13 谷歌有限责任公司 Operator integration via user network interface proxy
WO2021051880A1 (en) * 2019-09-18 2021-03-25 平安科技(深圳)有限公司 Resource data acquisition method and apparatus, computer device and storage medium
EP3879402A1 (en) * 2020-03-13 2021-09-15 Deutsche Telekom AG Methods and systems for service discovery and tunnelling in a distributed architecture

Also Published As

Publication number Publication date
CN114900502A (en) 2022-08-12

Similar Documents

Publication Publication Date Title
US11075802B2 (en) Methods for dynamic router configuration in a mesh network
US20180324105A1 (en) Gateway Address Spoofing for Alternate Network Utilization
US9160706B2 (en) Addressing scheme
WO2019214560A1 (en) Dhcp packet processing method and device
KR101510103B1 (en) Method for remote access in network environment comprising NAT device
EP2154821A1 (en) Method and apparatus for sending and receiving multicast packets
WO2017211235A1 (en) Client device management method and system, automatic configuration server, and storage medium
CN107395496B (en) Data forwarding method and device, gateway equipment and storage medium
EP3326074A1 (en) Methods, systems, and apparatus for geographic location using trace routes
US20100088427A1 (en) Selective Routing of Data Transmission Between Clients
WO2020253631A1 (en) Configuration method, device, and system for ip address
US20150067033A1 (en) Relay Server Load Balancing and Placement using In-Band Signaling
WO2014094633A1 (en) Method, relay device, and system for acquiring internet protocol address in network
CN109040243B (en) Message processing method and device
CN112654049B (en) Method, system, node and medium for configuring a wireless communication coverage extension system
US9049122B2 (en) Bandwidth probing messages
WO2013040970A1 (en) Relay node selecting method and device
US10075354B2 (en) Identification of servers by common wide area network addresses
US9559942B2 (en) Media stream providing device and method for connecting thereto, media streaming system, and computer-readable medium
EP2690832B1 (en) Communication device, communication system, and communication method
EP3048756B1 (en) Management method and apparatus for dynamic host configuration protocol server and relay
CN114900502B (en) Network registration method, device, electronic equipment and readable storage medium
CN110247778B (en) Operating system installation method and device, electronic equipment and storage medium
WO2016177185A1 (en) Method and apparatus for processing media access control (mac) address
CN115150312A (en) Routing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant