CN103442224A - NAT penetration-based video monitoring access strategy and realization method - Google Patents

NAT penetration-based video monitoring access strategy and realization method Download PDF

Info

Publication number
CN103442224A
CN103442224A CN2013104045666A CN201310404566A CN103442224A CN 103442224 A CN103442224 A CN 103442224A CN 2013104045666 A CN2013104045666 A CN 2013104045666A CN 201310404566 A CN201310404566 A CN 201310404566A CN 103442224 A CN103442224 A CN 103442224A
Authority
CN
China
Prior art keywords
server
client
equipment
nat
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2013104045666A
Other languages
Chinese (zh)
Inventor
葛益军
陈昌宝
孙杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
HANGZHOU JUFENG TECHNOLOGY Co Ltd
Original Assignee
HANGZHOU JUFENG TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by HANGZHOU JUFENG TECHNOLOGY Co Ltd filed Critical HANGZHOU JUFENG TECHNOLOGY Co Ltd
Priority to CN2013104045666A priority Critical patent/CN103442224A/en
Publication of CN103442224A publication Critical patent/CN103442224A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention provides a NAT penetration-based video monitoring access strategy and a realization method. The method comprises a network protocol, a penetration server and an agent server, wherein the network protocol refers to a complete NAT penetration flow as the basis of communication between a subsequent apparatus and a server; the penetration server refers to performing processing on a communication command at an apparatus end according to the network protocol so as to finish a NAT penetration process in a cooperative manner, and carrying out basic management on the apparatus actively registered over the server; and the agent server refers to forwarding the data of communication between the apparatus and a client end after the NAT penetration process fails according to the network protocol. According to the invention, the simple and convenient equipment arrangements enable the problems and defects in the prior art to be well handled, and ideal effects are achieved.

Description

A kind of video monitoring access strategy and implementation method penetrated based on NAT
Technical field
The multimedia data network transmission technology that a kind of video monitoring access strategy penetrated based on NAT of the present invention and implementation method relate generally to field of video monitoring, and the remote control technology of equipment under private network, mainly be applicable to the security protection field of video monitoring.
Background technology
1), universal due to the development of information technology and home network in the last few years, domestic type video monitoring demand is day by day vigorous, the setting for video monitoring equipment simultaneously also proposes simple and direct fool demand fast; Due to the scarcity of IPv4 address, the 3G network of home network or most of mobile phone is all to adopt the mode of NAT to access public network, uses traditional method for supervising not only to configure loaded down with trivial details but also the large laser propagation effect of server stress is bad.
2), in order to meet the remote monitoring demand of equipment, in traditional method that realizes remote monitoring, major part is to adopt DDNS to add the mode of port mapping; This configuration mode need to have certain setting authority to gateway router, but this demand at the net environment of 3G network environment and some cluster managements, can't realize, can't meet the requirement of video remote monitoring.
3), in order to meet the remote monitoring demand of equipment, in traditional method that realizes remote monitoring, the mode that fraction adopts media server to forward; But adopt this mode because all video datas are all to proceed to and to produce through server, server load meeting weight very, again due to the restriction of public-network bandwidth, so the equipment that can support is conditional simultaneously, can not accomplish the equipment support of huge quantity, and laser propagation effect is also bad.
4), when the mode penetrated based on NAT realizes the remote monitoring demand of equipment, due to the comparatively complexity of domestic network environment; For example there are a plurality of Virtual network operators, communication bandwidth between each Virtual network operator is unstable, and also there is the situation of two-wire outlet (referring to two and above Virtual network operator) in some regional network environment, or the NAT type of some gateway device is the situation of symmetric form; These situations are all to penetrate and to bring a lot of difficulties NAT, even cause the situation that penetrates failure; The success rate penetrated of this net environment of raising of maximum probability so how, and if in the situation that penetrates failure, use follow-up means to make up, transparent so that the user is accomplished in fact, this is also a problem that needs are important.
Summary of the invention
The object of the invention is to overcome the deficiency that prior art exists, and provide a kind of by the simple and direct configuration of equipment easily, can process preferably some problem and shortage that exist in prior art, reach the video monitoring access strategy and the implementation method that penetrate based on NAT of a more satisfactory effect.
The technical solution used in the present invention is: described a kind of video monitoring access strategy and implementation method penetrated based on NAT, the method comprises procotol, pass through server, acting server, wherein said procotol refers to a set of complete NAT penetration flow path, as the foundation of follow-up equipment and server communication; Described pass through server refers to according to procotol the communication command of equipment end is processed, and completes NAT with cooperation and penetrates process, and the equipment initiatively be registered on server is carried out to basic management; Described acting server refers to according to procotol, and the data that NAT penetrated to communication between equipment after procedure failure and client are forwarded.
Described NAT penetration flow path, it is initiatively to register to corresponding server to get on after device start, and regularly reports the state information of oneself to the server of registration; When having client to require and equipment when setting up data channel, first to server, initiate connection request, played internuncial effect by server, outer net address information separately is mutual transfer to the other side, the assistance both sides are shaken hands alternately; Equipment end and client send handshake information to this address respectively after the other side's outer net address information has been sent out in transmitting-receiving service, and after receiving handshake information, send to shake hands to the other side and definitely shake hands successfully with expression; Once shake hands successfully, data communication is with point-to-point mode polarity between equipment and client, and server exits communication process fully;
Described pass through server provides some essential informations mainly for penetrating in process to both sides; Pass through server maintains a facility information table, and the recording equipment label corresponds to the correspondence relationship information of the outer net address of equipment; At first inquire about the local device information table according to agreement when server is received connection request, reply to client if exist send to connect, forward to connect simultaneously and invite to equipment end, shake hands assisting; For the situation that adapts to domestic a plurality of Virtual network operator and deposit, we need to build many NAT pass through server and every station server supports multi-operator to connect.Adopt between the NAT pass through server load balancing that adopts DNS dynamic random allocation strategy to realize server simultaneously.
Described acting server is mainly in the situation that penetrate failure, and the data of communication between client and equipment are forwarded; Wherein mainly maintain an agent registration table and a transmitting-receiving mapping table, recording equipment numbering and corresponding outer net address in the agent registration table, record the corresponding relation of the network address and the network address in the transmitting-receiving mapping table, the destination address information that the data of from which address receiving will be sent to; Can in the agent registration table, record an information when receiving an agent registration order, and mated according to the purpose device numbering simultaneously; If the match is successful add transmitting-receiving to and go in mapping table.So far set up data and acted on behalf of passage, the follow-up data of receiving are just forwarded from this passage automatically; And introduce the shared strategy of timesharing in agency mechanism, and in the situation that can not meet whole client demand to some bandwidth resources, allow each client's time-sharing multiplex, avoid client situation hungry to death in competition.
NAT penetration flow path of the present invention comprises following several step, facility registration, and connection request, the confirmation of shaking hands, wherein:
1) facility registration: after the device power operation, according to the domain name of user configured NAT server, in dns server, inquire about corresponding IP address information, after acquisition, the pass through server corresponding to this IP address sends heartbeat request, the numbering that has comprised equipment in this information; After pass through server is received the heartbeat request that equipment end sends, at first according to the outer net address of this numbering and corresponding data bag, build a facility information table, and reply to equipment end transmission heartbeat; Even if now the connection between equipment and pass through server has been successfully established, in like manner when opening client, also can repeat the function of the said equipment end, to pass through server 2, sending heartbeat request, with the normal connection between foundation and server 2;
2) connection request: when having client needs and equipment to carry out data communication, at first newly-built connection, and connect to the pass through server at own place and send connection request by this; Pass through server, after taking this life request, at first can be inquired about the local device information table, if exist send to connect, replys to client, forwards to connect simultaneously and invites to equipment end, shakes hands assisting; If there is no to other pass through server in cluster, forward this connection request, allow other service assist penetrate; When other server is received the connection request forwarded, send to connect to equipment end and invite, to notify it to carry out Opposite direction connection, after equipment end receives that the connection forwarded is invited, also can newly-builtly connect, and connect oppositely and send connection request to client by this, server can repeat above-mentioned processing procedure after receiving, so far equipment end can be received to be connected with client and reply, thereby triggered the handshake procedure between the newly-built connection of equipment end and client, so far entered the next handshake procedure stage;
3) handshake procedure: connect when replying receiving when equipment end or client, will send handshaking information to the other side's outer net address, and wait for that shaking hands of the other side reply; Once receiving shakes hands, reply, P2P is successfully established, and just means that whole NAT penetrates successful connection and completes.
Described NAT penetration flow path is under the Single-Server sight, and the equipment end client is all single line,, under the pattern of a Virtual network operator, has comprised following several step:
1) agent registration: when in the situation that penetrate procedure failure, equipment end can send agent registration to corresponding acting server, record the numbering of this equipment and corresponding outer net address information in local agent registration table when acting on behalf of server and receive the agent registration order, and the numbering connected according to the purpose of appointment in the agent registration bag attempts coupling, client also can be to corresponding acting server transmission agent registration simultaneously; In like manner acting server also can record the numbering of this equipment and corresponding outer net address information in local agent registration table; Because now client and equipment have all been registered, can be successful when attempting coupling, can add one to and be recorded in the transmitting-receiving mapping table and go; So far be successfully established data and acted on behalf of passage, can have been forwarded the follow-up data of receiving;
2) confirmation of shaking hands: equipment end and client are after the agent registration success, can attempt thinking that acting server sends handshake information, and shaking hands of the other side of wait replied, because now the agent data passage is successfully established, handshake information can arrive the other side, once receiving shakes hands, reply, P2P is successfully established, and just means that acting on behalf of successful connection completes.
The present invention, in the network environment of reply as two-wire outlet, adopts a kind of new strategy, to the multiple servers in cluster, inquires about the mode of own outer net information simultaneously, knows as far as possible oneself residing network condition.Can in handshake procedure, these information exchanges be crossed to server and be transmitted to client like this, allow its attempt from a plurality of different net address connected, the probability of success penetrated with larger raising.
The present invention, by the simple and direct configuration of equipment easily, can process some problem and shortage that exist in prior art preferably, reaches a comparatively ideal effect.
The accompanying drawing explanation
Fig. 1 is whole penetration flow path figure of the present invention.
Fig. 2 is the flow chart of acting on behalf of of the present invention.
Fig. 3 is protocol format table of the present invention.
Fig. 4 is the interacting message route map of representative network scene of the present invention.
Fig. 5 is the interacting message route map of two-wire network scenarios of the present invention.
Embodiment
Below in conjunction with drawings and Examples, the present invention is done to detailed introduction: a kind of video monitoring access strategy and implementation method penetrated based on NAT of the present invention, the method comprises procotol, pass through server, acting server, wherein said procotol refers to a set of complete NAT penetration flow path, as the foundation of follow-up equipment and server communication; Described pass through server refers to according to procotol the communication command of equipment end is processed, and completes NAT with cooperation and penetrates process, and the equipment initiatively be registered on server is carried out to basic management; Described acting server refers to according to procotol, and the data that NAT penetrated to communication between equipment after procedure failure and client are forwarded.
Described NAT penetration flow path, it is initiatively to register to corresponding server to get on after device start, and regularly reports the state information of oneself to the server of registration; When having client to require and equipment when setting up data channel, first to server, initiate connection request, played internuncial effect by server, outer net address information separately is mutual transfer to the other side, the assistance both sides are shaken hands alternately; Equipment end and client send handshake information to this address respectively after the other side's outer net address information has been sent out in transmitting-receiving service, and after receiving handshake information, send to shake hands to the other side and definitely shake hands successfully with expression; Once shake hands successfully, data communication is with point-to-point mode polarity between equipment and client, and server exits communication process fully;
Described pass through server provides some essential informations mainly for penetrating in process to both sides; Pass through server maintains a facility information table, and the recording equipment label corresponds to the correspondence relationship information of the outer net address of equipment; At first inquire about the local device information table according to agreement when server is received connection request, reply to client if exist send to connect, forward to connect simultaneously and invite to equipment end, shake hands assisting.
Described acting server is mainly in the situation that penetrate failure, and the data of communication between client and equipment are forwarded; Wherein mainly maintain an agent registration table and a transmitting-receiving mapping table, recording equipment numbering and corresponding outer net address in the agent registration table, record the corresponding relation of the network address and the network address in the transmitting-receiving mapping table, the destination address information that the data of from which address receiving will be sent to; Can in the agent registration table, record an information when receiving an agent registration order, and mated according to the purpose device numbering simultaneously; If the match is successful add transmitting-receiving to and go in mapping table.So far set up data and acted on behalf of passage, the follow-up data of receiving are just forwarded from this passage automatically.
Embodiment:
Figure 1 shows that the whole penetration flow path figure of a kind of video monitoring access strategy penetrated based on NAT of the present invention and implementation method.This method penetration flow path figure is divided into following several step: facility registration, connection request, the confirmation of shaking hands; Previous step is basis and the trigger condition of a rear step.
1), facility registration: after the device power operation, according to the domain name of user configured NAT server, in dns server, inquire about corresponding IP address information.After acquisition, to this IP address, corresponding server (for example pass through server 1) sends heartbeat request as shown in Figure 1.The numbering that has comprised equipment in this information.After pass through server 1 is received the heartbeat request that equipment end sends, at first follow the outer net address according to this numbering and corresponding data bag to build a facility information table, and reply to equipment end transmission heartbeat.Even if now the connection between equipment and server 1 has been successfully established, in like manner when opening client, also can repeat the function of the said equipment end, to pass through server 2, sending heartbeat request, with the normal connection between foundation and server 2.
2), connection request: when having client to need and equipment when carrying out data communication, at first newly-built connection, and connect the pass through server 2 transmission connection requests to own place by this.Pass through server 2, after taking this life request, at first can be inquired about the local device information table, if exist send to connect, replys to client, forwards to connect simultaneously and invites to equipment end, shakes hands assisting.If there is no to other pass through server in cluster, forward this connection request, allow other service assist penetrate.As shown in Figure 1, in this example, need the equipment connected not in pass through server 2, so pass through server 2 forwards connection request to pass through server 1.When pass through server 1 is received the connection request that this forwards, send to connect to equipment end and invite, carry out Opposite direction connection to notify it.After equipment end receives that the connection that forwards is invited, also can newly-builtly connect, and connect and reverse to client, send connection request by this, server can repeat above-mentioned processing procedure after receiving.So far equipment end can be received to be connected with client and reply, thereby has triggered the handshake procedure between the newly-built connection of equipment end and client.So far enter the next handshake procedure stage.
3), handshake procedure: connect when replying receiving when equipment end or client, will send handshaking information to the other side's outer net address, and wait for that shaking hands of the other side reply.As shown in Figure 1, once receive to shake hands and reply, P2P is successfully established, and just means that whole NAT penetrates successful connection and completes.
Be illustrated in figure 2 the flow chart of acting on behalf of of a kind of video monitoring access strategy penetrated based on NAT of the present invention and implementation method.It is in the situation that penetrate procedure failure in above-mentioned Fig. 1 and just enter that this method is acted on behalf of flow chart.Be divided into following several step: agent registration, the confirmation of shaking hands.
1), agent registration: when in the situation that the equipment end in penetrating procedure failure Fig. 1 in above-mentioned Fig. 1 can send agent registration to corresponding acting server.Record the numbering of this equipment and corresponding outer net address information when acting on behalf of server and receive the agent registration order, and attempts mating according to the numbering that the purpose of appointment in the agent registration bag connects in local agent registration table.Client also can send agent registration to corresponding acting server simultaneously.In like manner acting server also can record the numbering of this equipment and corresponding outer net address information in local agent registration table.Because now client and equipment have all been registered, can be successful when attempting coupling, can add one to and be recorded in the transmitting-receiving mapping table and go.So far be successfully established data and acted on behalf of passage, can have been forwarded the follow-up data of receiving.
2), the confirmation of shaking hands: equipment end and client, after the agent registration success, can attempt thinking that acting server sends handshake information, and shaking hands of the other side of wait are replied.Because now the agent data passage is successfully established, handshake information can arrive the other side.Once receiving shakes hands, reply, P2P is successfully established, and just means that acting on behalf of successful connection completes.
Be protocol format table of the present invention as shown in Figure 3, it is that the concrete form of the communication command in Fig. 1 and Fig. 2 is determined.Wherein writing a Chinese character in simplified form as follows implication is explained as follows:
MsgID: the information order word, can be according to own demand self-defining.
UUID: be the unique number of equipment end or client connection.
My_WIP; Outer net IP address for the correspondence of equipment end or client
My_Wport; Outer net port for the correspondence of equipment end or client
My_LIP; IP address of internal network for the correspondence of equipment end or client
My_Lport; Intranet port for the correspondence of equipment end or client
The interacting message route map of a kind of representative network scene of the present invention as shown in Figure 4; It is under the sight of Single-Server and the equipment end client is all to carry out under the pattern of single line.
The explanation of icon implication:
Blue line: equipment or and client end and server between the long-term heartbeat kept connect.
Purple line: the handshake request message flow that client sends to equipment end.
Red line: the handshake request message flow that equipment end sends to client.
Server1: pass through server 1
Server2: pass through server 2
R_A: router rs name A
R_a: router rs name a
Specifically comprise the steps:
1), when client requires to be connected, the newly-built socket in this locality, and to outer net address and the port information (walking blue line) of server lookup oneself.So just at [R-a] end, open a new port; Server can be told the outer net information that this new port of client is corresponding.
2), client sends connection request to service, comprised outer net address and the port information of oneself in message, and the numbering of the target device that will connect (walking blue line).After server is received linking request, can send to connect to equipment end and invite.
3), equipment end after receiving that link is invited, can repeat above-mentioned 1 and 2 process.An also newly-built socket, and, to the outer net address to server lookup oneself and port information (walking blue line), so just at [R-A] end E, open a new port, server can be told the outer net information that this new port of equipment end is corresponding.Send the Opposite direction connection request to service simultaneously.
4), by just now at [R-a] end, opening a new port, to equipment end, the port on [R-A] sends handshake request (walking purple line) to client.
5), by just now at [R-A] end, opening a new port, to client, the port on [R-a] sends handshake request (walking red line) to equipment end.
6), entered the normal penetration flow path shown in Fig. 1.
The interacting message route map of a kind of two-wire network scenarios of the present invention as shown in Figure 5; It is under the sight of multiserver and equipment end is to carry out under the pattern of two-wire.With the interacting message route map of figure Fig. 4 representative network scene, compare, in equipment end or client in registration, be not only with a station server and connect, but connect with a plurality of servers simultaneously, like this, when penetrating, attempt obtaining mapped port from multiple servers.As long as ensure so a plurality of servers in the situation that different operators penetrates successful probability just higher.
Icon implication explanation: same Fig. 4.
Specifically comprise the steps:
1), when client requires to be connected, the newly-built socket in this locality, and to outer net address and the port information of inquiry oneself on server 1.Outer net address and the port information (walking blue line) of inquiry oneself on server 2 have been again simultaneously.
2), client sends connection request to service, comprised own whole outer net address and port information from multiple servers inquiry gained in message, and the numbering of the target device that will connect (walking blue line).After server is received linking request, can send to connect to equipment end and invite.
3), equipment end after receiving that link is invited, can repeat above-mentioned 1 and 2 process.An also newly-built socket, and to outer net address and port information (walking blue line) to server 1 and server 2 inquiries oneself.Send the Opposite direction connection request to service simultaneously.Comprised own whole outer net address and port information from multiple servers inquiry gained in connection request message.
4), by just now at [R-a] end, opening a new port, to equipment end, the port on [R-A] sends handshake request (walking purple line) to client.
5), by just now at [R-a] end, opening a new port, to equipment end, the port on [R-B] sends handshake request (walking purple line) to client.
6), by just now at [R-A] end, opening a new port, to client, the port on [R-a] sends handshake request (walking red line) to equipment end.
7), by just now at [R-B] end, opening a new port, to client, the port on [R-a] sends handshake request (walking red line) to equipment end.
8), entered the normal penetration flow path shown in Fig. 1.

Claims (5)

1. video monitoring access strategy and the implementation method penetrated based on NAT, it is characterized in that: the method comprises procotol, pass through server, acting server, wherein said procotol refers to a set of complete NAT penetration flow path, as the foundation of follow-up equipment and server communication; Described pass through server refers to according to procotol the communication command of equipment end is processed, and completes NAT with cooperation and penetrates process, and the equipment initiatively be registered on server is carried out to basic management; Described acting server refers to according to procotol, and the data that NAT penetrated to communication between equipment after procedure failure and client are forwarded.
2. video monitoring access strategy and the implementation method penetrated based on NAT according to claim 1, it is characterized in that described NAT penetration flow path, it is initiatively to register to corresponding server to get on after device start, and regularly reports the state information of oneself to the server of registration; When having client to require and equipment when setting up data channel, first to server, initiate connection request, played internuncial effect by server, outer net address information separately is mutual transfer to the other side, the assistance both sides are shaken hands alternately; Equipment end and client send handshake information to this address respectively after the other side's outer net address information has been sent out in transmitting-receiving service, and after receiving handshake information, send to shake hands to the other side and definitely shake hands successfully with expression; Once shake hands successfully, data communication is with point-to-point mode polarity between equipment and client, and server exits communication process fully;
Described pass through server provides some essential informations mainly for penetrating in process to both sides; Pass through server maintains a facility information table, and the recording equipment label corresponds to the correspondence relationship information of the outer net address of equipment; At first inquire about the local device information table according to agreement when server is received connection request, reply to client if exist send to connect, forward to connect simultaneously and invite to equipment end, shake hands assisting.
3. video monitoring access strategy and the implementation method penetrated based on NAT according to claim 1, is characterized in that described acting server is mainly in the situation that penetrate failure, and the data of communication between client and equipment are forwarded; Wherein mainly maintain an agent registration table and a transmitting-receiving mapping table, recording equipment numbering and corresponding outer net address in the agent registration table, record the corresponding relation of the network address and the network address in the transmitting-receiving mapping table, the destination address information that the data of from which address receiving will be sent to; Can in the agent registration table, record an information when receiving an agent registration order, and mated according to the purpose device numbering simultaneously; If the match is successful add transmitting-receiving to and go in mapping table; So far set up data and acted on behalf of passage, the follow-up data of receiving are just forwarded from this passage automatically.
4. video monitoring access strategy and the implementation method penetrated based on NAT according to claim 1 and 2, is characterized in that described NAT penetration flow path comprises following several step, facility registration, and connection request, the confirmation of shaking hands, wherein:
1) facility registration: after device power, by the domain name of NAT server, in dns server, inquire about corresponding IP address information, determine server corresponding to Xiang GaiIP address, interval and send heartbeat message thereafter, the numbering that has comprised equipment in information, server just can follow the outer net address according to this numbering and corresponding data bag to build a facility information table like this;
2) connection request: when client being arranged and want to carry out data communication with equipment, at first send connection request to pass through server, pass through server is after taking this life request, can inquire about the local device information table, if exist send to connect, reply to client, forward to connect simultaneously and invite to equipment end, shake hands with assistance; If there is no to other pass through server in cluster, forward this connection request, allow other service assist penetrate; After in like manner the pass through server at this equipment place is received this message, can be replied client, and can be forwarded connection request to equipment end simultaneously; After equipment end receives that the connection forwarded is invited, what meeting was reverse sends connection request to client, server can repeat process just now after receiving, so far equipment end can be received to be connected with client and reply, thereby has triggered handshake procedure each other;
3) handshake procedure: connect when replying receiving when equipment end or client, will send handshaking information to the other side's outer net address, and wait for that shaking hands of the other side reply, once receive to shake hands and reply, mean that whole NAT penetrates successful connection.
5. video monitoring access strategy and the implementation method penetrated based on NAT according to claim 1 and 2, it is characterized in that described NAT penetration flow path is under the Single-Server sight, and the equipment end client is all under the pattern of single line, comprised following several step:
1) when client requires to be connected, the newly-built socket in this locality, and attempt port mapping inquiry communication to the serve port of server, so just at [R-a] end, open a new port; Server can be told the outer net information that this new port of client is corresponding, and allows server send connection request to equipment end;
2) an equipment end also newly-built socket in like manner, and attempt port mapping inquiry communication to the serve port of server, so just at [R-A], hold and open a new port;
3) equipment end is connected by the new port of this new port and client, has entered normal penetration flow path.
CN2013104045666A 2013-09-09 2013-09-09 NAT penetration-based video monitoring access strategy and realization method Pending CN103442224A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2013104045666A CN103442224A (en) 2013-09-09 2013-09-09 NAT penetration-based video monitoring access strategy and realization method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2013104045666A CN103442224A (en) 2013-09-09 2013-09-09 NAT penetration-based video monitoring access strategy and realization method

Publications (1)

Publication Number Publication Date
CN103442224A true CN103442224A (en) 2013-12-11

Family

ID=49695884

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2013104045666A Pending CN103442224A (en) 2013-09-09 2013-09-09 NAT penetration-based video monitoring access strategy and realization method

Country Status (1)

Country Link
CN (1) CN103442224A (en)

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103686447A (en) * 2013-12-20 2014-03-26 广东威创视讯科技股份有限公司 Video transmission method and system
CN104104926A (en) * 2014-07-30 2014-10-15 浙江宇视科技有限公司 Universal plug and play (UPnP) monitoring terminal access method and access device
CN104184944A (en) * 2014-08-15 2014-12-03 小米科技有限责任公司 Method and device for obtaining multimedia data streams
CN104967590A (en) * 2014-09-18 2015-10-07 腾讯科技(深圳)有限公司 Method, apparatus and system for transmitting communication message
CN105610999A (en) * 2016-03-30 2016-05-25 上海斐讯数据通信技术有限公司 Method, device, server and system for implementing P2P communication by penetrating NAT (network address translator)
CN106331115A (en) * 2016-08-26 2017-01-11 深圳市同为数码科技股份有限公司 Distributed expandable server system in support of multi-device connection
CN106452978A (en) * 2016-11-25 2017-02-22 深圳怡化电脑股份有限公司 Method and device for detecting communication abnormity
CN106790722A (en) * 2017-03-22 2017-05-31 维沃移动通信有限公司 A kind of connection method of remote assistance, server and terminal
CN107105014A (en) * 2017-03-30 2017-08-29 联想(北京)有限公司 Communication means and the first equipment and the second equipment
CN107205026A (en) * 2017-05-22 2017-09-26 厦门市美亚柏科信息股份有限公司 A kind of Point-to-Point Data Transmission method and system
CN107645528A (en) * 2016-07-22 2018-01-30 上海云熵网络科技有限公司 Concentrating type nets the processing system and method for service thoroughly
CN107786536A (en) * 2017-09-11 2018-03-09 成都阜特科技股份有限公司 TCP reverse port penetration method and system thereof
CN108848099A (en) * 2018-06-22 2018-11-20 杭州叙简科技股份有限公司 A kind of port mapping system and its port mapping method based on reversed multi-connection
CN108886539A (en) * 2016-04-11 2018-11-23 西部数据技术公司 Connection is established between the data storage device being located at after NAT
CN109905397A (en) * 2019-03-12 2019-06-18 深圳市网心科技有限公司 A kind of method and intranet server for establishing data connection
CN112055037A (en) * 2019-06-06 2020-12-08 深圳市尚云互联技术有限公司 NAT (network Address translation) penetration connection method and system
CN112543239A (en) * 2020-12-23 2021-03-23 杭州安司源科技有限公司 Progressive NAT (network Address translation) penetration method
CN112995197A (en) * 2021-03-26 2021-06-18 苏州科达科技股份有限公司 Remote access method, system, equipment and storage medium of monitoring equipment
CN113824723A (en) * 2021-09-23 2021-12-21 上海安威士科技股份有限公司 End-to-end system solution applied to audio and video data transmission
CN116436929A (en) * 2023-06-14 2023-07-14 深圳市玩物科技有限公司 Auxiliary P2P hole punching method for assembling UDP message by using server and server
US11973824B2 (en) 2021-09-23 2024-04-30 Shanghai Anviz Technology Co., Ltd. Method for data transmission of audio and video in end-to-end system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006000802A2 (en) * 2004-06-28 2006-01-05 Amteus Secure Communications Limited Improvements relating to secure telecommunications
CN101207626A (en) * 2007-12-05 2008-06-25 中兴通讯股份有限公司 Control protocol and corresponding remote video supervisory control system
CN101557388A (en) * 2008-04-11 2009-10-14 中国科学院声学研究所 NAT traversing method based on combination of UPnP and STUN technologies
CN101883056A (en) * 2010-07-23 2010-11-10 华南理工大学 System and method for realizing NAT (Network Address Translation) traversal on basis of UDT (UDP (User Datagram Protocol)-based Data Transfer) and TCP (Transmission Control Protocol) transfer
CN102812773A (en) * 2010-03-23 2012-12-05 阿尔卡特朗讯 Method and apparatus for home network access
CN103166824A (en) * 2011-12-13 2013-06-19 华为技术有限公司 Interconnection method, device and system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006000802A2 (en) * 2004-06-28 2006-01-05 Amteus Secure Communications Limited Improvements relating to secure telecommunications
CN101207626A (en) * 2007-12-05 2008-06-25 中兴通讯股份有限公司 Control protocol and corresponding remote video supervisory control system
CN101557388A (en) * 2008-04-11 2009-10-14 中国科学院声学研究所 NAT traversing method based on combination of UPnP and STUN technologies
CN102812773A (en) * 2010-03-23 2012-12-05 阿尔卡特朗讯 Method and apparatus for home network access
CN101883056A (en) * 2010-07-23 2010-11-10 华南理工大学 System and method for realizing NAT (Network Address Translation) traversal on basis of UDT (UDP (User Datagram Protocol)-based Data Transfer) and TCP (Transmission Control Protocol) transfer
CN103166824A (en) * 2011-12-13 2013-06-19 华为技术有限公司 Interconnection method, device and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
银晶晶: "基于穿越NAT网络的点到点数据通信的研究与实现", 《万方数据学术论文》 *

Cited By (35)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103686447A (en) * 2013-12-20 2014-03-26 广东威创视讯科技股份有限公司 Video transmission method and system
CN103686447B (en) * 2013-12-20 2017-12-08 广东威创视讯科技股份有限公司 Video transmission method and system
CN104104926A (en) * 2014-07-30 2014-10-15 浙江宇视科技有限公司 Universal plug and play (UPnP) monitoring terminal access method and access device
CN104104926B (en) * 2014-07-30 2017-04-19 浙江宇视科技有限公司 Universal plug and play (UPnP) monitoring terminal access method and access device
CN104184944A (en) * 2014-08-15 2014-12-03 小米科技有限责任公司 Method and device for obtaining multimedia data streams
CN104184944B (en) * 2014-08-15 2016-03-16 小米科技有限责任公司 Obtain method and the device of multimedia data stream
RU2612389C2 (en) * 2014-08-15 2017-03-09 Сяоми Инк. Method and apparatus for acquiring multimedia data stream
CN104967590B (en) * 2014-09-18 2017-10-27 腾讯科技(深圳)有限公司 A kind of methods, devices and systems for transmitting communication information
CN104967590A (en) * 2014-09-18 2015-10-07 腾讯科技(深圳)有限公司 Method, apparatus and system for transmitting communication message
CN105610999A (en) * 2016-03-30 2016-05-25 上海斐讯数据通信技术有限公司 Method, device, server and system for implementing P2P communication by penetrating NAT (network address translator)
US11032240B2 (en) 2016-04-11 2021-06-08 Western Digital Technologies, Inc. Establishing connections between data storage devices
CN108886539B (en) * 2016-04-11 2022-03-04 西部数据技术公司 Establishing connections between data storage devices located behind a NAT
CN108886539A (en) * 2016-04-11 2018-11-23 西部数据技术公司 Connection is established between the data storage device being located at after NAT
CN107645528A (en) * 2016-07-22 2018-01-30 上海云熵网络科技有限公司 Concentrating type nets the processing system and method for service thoroughly
CN106331115A (en) * 2016-08-26 2017-01-11 深圳市同为数码科技股份有限公司 Distributed expandable server system in support of multi-device connection
CN106452978A (en) * 2016-11-25 2017-02-22 深圳怡化电脑股份有限公司 Method and device for detecting communication abnormity
CN106790722B (en) * 2017-03-22 2018-09-04 维沃移动通信有限公司 A kind of connection method of remote assistance, server and terminal
CN106790722A (en) * 2017-03-22 2017-05-31 维沃移动通信有限公司 A kind of connection method of remote assistance, server and terminal
CN107105014A (en) * 2017-03-30 2017-08-29 联想(北京)有限公司 Communication means and the first equipment and the second equipment
CN107205026A (en) * 2017-05-22 2017-09-26 厦门市美亚柏科信息股份有限公司 A kind of Point-to-Point Data Transmission method and system
CN107786536A (en) * 2017-09-11 2018-03-09 成都阜特科技股份有限公司 TCP reverse port penetration method and system thereof
CN107786536B (en) * 2017-09-11 2022-05-13 成都阜特科技股份有限公司 TCP reverse port penetration method and system thereof
CN108848099A (en) * 2018-06-22 2018-11-20 杭州叙简科技股份有限公司 A kind of port mapping system and its port mapping method based on reversed multi-connection
CN108848099B (en) * 2018-06-22 2020-11-03 杭州叙简科技股份有限公司 Port mapping system based on reverse multi-connection and port mapping method thereof
CN109905397A (en) * 2019-03-12 2019-06-18 深圳市网心科技有限公司 A kind of method and intranet server for establishing data connection
CN112055037A (en) * 2019-06-06 2020-12-08 深圳市尚云互联技术有限公司 NAT (network Address translation) penetration connection method and system
CN112543239A (en) * 2020-12-23 2021-03-23 杭州安司源科技有限公司 Progressive NAT (network Address translation) penetration method
CN112543239B (en) * 2020-12-23 2022-06-24 杭州安司源科技有限公司 Progressive NAT (network Address translation) penetration method
CN112995197A (en) * 2021-03-26 2021-06-18 苏州科达科技股份有限公司 Remote access method, system, equipment and storage medium of monitoring equipment
CN113824723A (en) * 2021-09-23 2021-12-21 上海安威士科技股份有限公司 End-to-end system solution applied to audio and video data transmission
WO2023046088A1 (en) * 2021-09-23 2023-03-30 上海安威士科技股份有限公司 End-to-end system solution method applied to audio and video data transmission
CN113824723B (en) * 2021-09-23 2023-12-08 上海安威士科技股份有限公司 End-to-end system solution method applied to audio and video data transmission
US11973824B2 (en) 2021-09-23 2024-04-30 Shanghai Anviz Technology Co., Ltd. Method for data transmission of audio and video in end-to-end system
CN116436929A (en) * 2023-06-14 2023-07-14 深圳市玩物科技有限公司 Auxiliary P2P hole punching method for assembling UDP message by using server and server
CN116436929B (en) * 2023-06-14 2023-09-08 深圳市玩物科技有限公司 Auxiliary P2P hole punching method for assembling UDP message by using server and server

Similar Documents

Publication Publication Date Title
CN103442224A (en) NAT penetration-based video monitoring access strategy and realization method
TWI408936B (en) Network traversal method and network communication system
CN102571749B (en) Data transmission system and method using relay server
US20130138819A1 (en) File server device
CN102045409B (en) Network penetrating method and network communication system
CN102325197B (en) Method for communication between intranet equipment and internet equipment and network address transformation equipment
CN103957287A (en) Internet of things device P2P connection method based on NAT penetration adapter
CN108833487A (en) A kind of TCP transmission protocol agent method
CN107852430A (en) The wide-area services of Internet of Things are found
JP4207078B2 (en) Relay server
JP4222397B2 (en) Relay server
CN104811371B (en) A kind of brand-new instantaneous communication system
CN104883390B (en) A kind of method and device accessing third party's video monitoring equipment
KR20080050973A (en) Control tunnel and direct tunnel configuration method in ipv6 service provide system based ipv4 network
CN102811335B (en) Set up the method, apparatus and system of video session
JP2024504006A (en) Data transmission methods, devices, equipment and computer programs for service integration
CN106604119B (en) Network penetration method and system for private cloud equipment of smart television
CN102281180A (en) Virtual network interface card (NIC) communication device applied in mutual communication of terminals in different local area networks
CN112437168B (en) Intranet penetration system
CN102355479A (en) Method and equipment for forwarding traffic of multi-NAT (network address translation) gateway
CN106101617A (en) A kind of message transmitting method, Apparatus and system
CN102420774A (en) Method for realizing intranet penetration by using Internet group management protocol (IGMP) and intranet penetration system
CN110933134A (en) Industrial internet-oriented edge computing server load balancing method and system
CN106331187A (en) NAT (Network Address Translation) penetration method, device and system
CN108123912B (en) Micro service system supporting P2P

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: Hangzhou City, Zhejiang province Fuyang District 311422 Silver Lake Street Fu Road No. 9 silver lake leisure Innovation Center 9 layer 8

Applicant after: HangZhou?JuFeng Technology co., Ltd.

Address before: 310052, B, building 2, building 4, No. 351 Changhe Road, Hangzhou, Zhejiang, Binjiang District

Applicant before: HangZhou?JuFeng Technology co., Ltd.

COR Change of bibliographic data
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20131211

WD01 Invention patent application deemed withdrawn after publication