WO2013167086A2 - 一种网络地址转换穿透方法及设备 - Google Patents
一种网络地址转换穿透方法及设备 Download PDFInfo
- Publication number
- WO2013167086A2 WO2013167086A2 PCT/CN2013/080243 CN2013080243W WO2013167086A2 WO 2013167086 A2 WO2013167086 A2 WO 2013167086A2 CN 2013080243 W CN2013080243 W CN 2013080243W WO 2013167086 A2 WO2013167086 A2 WO 2013167086A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- network address
- address
- updated network
- updated
- local
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 31
- 238000013519 translation Methods 0.000 title claims abstract description 15
- 238000004891 communication Methods 0.000 claims abstract description 176
- 238000001514 detection method Methods 0.000 claims abstract description 32
- 239000000523 sample Substances 0.000 claims description 62
- 230000035515 penetration Effects 0.000 claims description 52
- 239000000284 extract Substances 0.000 claims description 16
- 230000005540 biological transmission Effects 0.000 claims description 6
- 238000010586 diagram Methods 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 4
- 230000003993 interaction Effects 0.000 description 3
- 238000011161 development Methods 0.000 description 2
- 238000005259 measurement Methods 0.000 description 2
- 230000000149 penetrating effect Effects 0.000 description 2
- 230000005641 tunneling Effects 0.000 description 2
- 238000000605 extraction Methods 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 238000011330 nucleic acid test Methods 0.000 description 1
- 238000012913 prioritisation Methods 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/09—Mapping addresses
- H04L61/25—Mapping addresses of the same type
- H04L61/2503—Translation of Internet protocol [IP] addresses
- H04L61/256—NAT traversal
- H04L61/2589—NAT traversal over a relay server, e.g. traversal using relay for network address translation [TURN]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/09—Mapping addresses
- H04L61/25—Mapping addresses of the same type
- H04L61/2503—Translation of Internet protocol [IP] addresses
- H04L61/256—NAT traversal
- H04L61/2575—NAT traversal using address mapping retrieval, e.g. simple traversal of user datagram protocol through session traversal utilities for NAT [STUN]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/50—Address allocation
- H04L61/5076—Update or notification mechanisms, e.g. DynDNS
Definitions
- the present invention relates to a network address translation technology in the field of communication, and in particular, to a peer-to-peer (P2P) network address translation (NAT) method and device for network address translation in a network address change environment.
- P2P peer-to-peer
- NAT network address translation
- FIG. 1 shows a typical NAT network architecture.
- the access mechanism based on the network architecture is: The hosts in the intranets A and B access the external Internet (Internet) through NAT-A and NAT-B respectively. Resources, external hosts can not initiate connections to the intranet.
- This feature plays a major role in solving security and IP address shortages, but it also restricts the deployment of many applications, such as P2P communication, network conferencing, audio and video transmission, etc. Blocked the development of the Internet. Therefore, the penetration technology of NAT has become the development direction of research.
- NAT penetration schemes such as UDP Simple Traversal of UDP over NATs, NAT (TURN, Traversal Using Relay NAT), intermediate box, and interactive connection establishment (ICE). )Wait. Most of them are deployed on a server (Server) on the external network. As shown in Figure 1, NAT is used to penetrate the server.
- the RFC5245 standard of ICE technology can be used to better penetrate NAT.
- the existing NAT penetration scheme has the following problems: When the device address is changed, use ICE or other The NAT penetration scheme needs to re-establish the ICE process, and re-establishing the ICE process will interrupt the existing communication, or spend a lot of time for the ICE to re-establish.
- the problem of NAT penetration in such an environment where the address is constantly changing there is no corresponding solution without interrupting the existing P2P service. Summary of the invention
- the main purpose of the embodiments of the present invention is to provide a NAT penetration method and device, which can implement NAT penetration in an environment where network addresses frequently change without interrupting existing P2P services.
- a network address translation penetration method comprising:
- the local communication party whose network address changes changes the NAT penetration channel through the original network address, and sends the updated network address information or the reflected address information of the updated network address to Peer communication party
- the local communication party After receiving the probe message, the local communication party establishes a new AT penetration channel between the local communication party and the opposite communication party after the network address is updated.
- the method further includes: the local communication party listening on the updated network address The probe message sent by the peer communication party.
- the sending the probe message to the updated network address of the local communication party according to the updated network address information includes:
- the sending the probe message to the updated network address of the local communication party according to the updated address information of the updated network address includes:
- a network address translation penetrating device where the device is a local communication device whose network address changes, configured to send the updated network address information or the reflected address information of the updated network address through the original NAT penetration channel. Giving the peer communication device; receiving a new NAT penetration channel between the communication device and the communication device.
- the local communication device is further configured to: when the updated network address information or the reflected address information of the updated network address is sent to the peer communication device, monitor the pair on the updated network address.
- a network address translation penetrating device wherein the device is a peer communication device that communicates with the local communication device whose network address changes, and is configured to receive the updated network address information sent by the local communication device or the updated The reflected address information of the network address is sent to the updated network address of the local communication device according to the updated network address information or the reflected address information of the updated network address.
- the peer communication device is further configured to: when the probe message is sent to the updated network address of the local communication device according to the updated network address information, extract the network address information from the updated network address information. And sending the detected network message to the updated network address of the local communication device by using the NAT address; or
- the probe message is sent by the updated network address of the communicating party.
- the peer communication device is further configured to send, according to the updated address information of the updated network address, a probe message to the updated network address of the local communication device, from the updated network address. Extracting the updated network address measurement message from the reflected address information, and forwarding the probe message to the updated network address of the local communication device; or
- a network address translation penetration method comprising:
- the local communication party whose network address has changed transmits the reflected address information of the updated network address to the opposite communication party through the original NAT penetration channel;
- the original NAT penetration channel will be the second reflective ground
- the address is sent to the local communication party
- the first probe message is forwarded to the updated network address of the local communication party;
- the method further includes: the local communication party listening to the first probe message sent by the peer communication party on the updated network address.
- the local communication party when the network address of one of the two communication parties changes, the local communication party whose network address changes changes the updated network address information or the updated network address through the original NAT penetration channel.
- the address information is sent to the peer communication party; the peer communication party receives the updated network address information or the reflected address information of the updated network address, according to the received updated network address information or the reflected address of the updated network address
- the information sends a probe message to the updated network address of the local communication party.
- the local communication party After receiving the probe message, the local communication party establishes a new NAT penetration channel between the local communication party and the opposite communication party after the network address is updated.
- the new communication between the local communication party and the opposite communication party after the network address update can be established.
- the NAT penetrates the channel for subsequent communication interaction without interrupting the service. Therefore, NAT penetration in an environment where network addresses are constantly changed can be realized without interrupting the existing P2P service.
- FIG. 1 is a schematic diagram of a typical NAT network topology
- FIG. 3 is a Restricted Cone type when an address change party is located in an external network according to an embodiment of the present invention. Schematic diagram of the topology of the NAT;
- FIG. 4 is a schematic diagram of a Restricted Cone type NAT topology structure when an address change party is located in a full cone NAT according to an embodiment of the present invention
- FIG. 5 is a schematic structural diagram of a Symmetric NAT topology when an address change party is located in an external network according to an embodiment of the present invention
- FIG. 6 is a schematic diagram of a Symmetric-type NAT topology structure when an address change party is located in a Full cone NAT according to an embodiment of the present invention. detailed description
- Step 101 When the network address of one of the two parties changes, the local communication party whose address changes is penetrated through the original NAT.
- the channel sends an address update message to the peer communication party, indicating that the network address of the local communication party will change to the updated network address.
- the address update message carries the updated network address of the local communication party or the reflected address of the updated network address. It should be noted that the message carrying the updated network address of the local communication party is not limited to the address update message.
- the updated network address of the local communication party or the reflected address of the updated network address may also be encapsulated in the updated network address information or the reflected address information of the updated network address, and sent to the opposite communication party.
- the end communication party performs parsing and extraction.
- Step 102 The peer communication party receives the address update message, and if the extracted network address is extracted, directly sends a probe message to the updated network address of the local communication party; if the updated network is extracted The reflected address of the address first sends a probe message to the reflected address of the updated network address, and then forwards the probe message to the updated network address of the local communication party.
- Step 103 After receiving the probe message sent by the peer communication party, the local communication party establishes a new NAT penetration channel between the updated network address and the peer communication party network address.
- the message can be sent to the network address changed by the local communication party, so that the network address of the local communication party and the peer communication party network are updated.
- a new NAT tunneling channel is established between the addresses for subsequent message interaction, without interrupting the service, and re-establishing the process, so as to achieve NAT penetration in an environment where the network address changes frequently without interrupting the existing P2P service.
- the solution of the embodiment of the present invention can implement NAT penetration in an environment where network addresses frequently change, and implement uninterrupted handover of P2P services, for example, uninterrupted handover of VoIP. There is no need to re-establish the ICE process after the address is updated, such as address collection, address prioritization, connectivity testing, SDP information exchange, and so on. Moreover, the solution of the embodiment of the present invention does not require the participation of intermediate nodes, and can completely switch the P2P communication, thereby accelerating the establishment of a new NAT tunnel.
- the scenarios in the address change environment of the embodiment of the present invention mainly include four-way NAT (Full Cone NAT), restricted NAT (Restricted Cone NAT), port-restricted NAT (Port Restricted Cone NAT), and symmetric NAT (Symmetric NAT).
- the flow of the NAT topology network architecture is described in the following. The embodiments of the present invention are further described below.
- the IP address and corresponding port number in all the figures in this figure are described here: LA indicates the address of the address change party, NA indicates the reflection address of the NAT, RA indicates the address where the address change occurred, and the thick line Indicates the original NAT penetration channel.
- Embodiment 1 The peer communication party (Host A) is located in the restricted NAT/port restricted NAT, and the local communication party (Host B) whose address changes is located in the external network.
- the restricted NAT/port-restricted NAT As shown in Figure 3, the restricted NAT/port-restricted NAT, host A is located in the NAT network, and host B is located in the external network.
- the NAT penetration scheme includes the following:
- Host B sends the updated address 201.23.123.2 to the NAT address 202.12.1.2:1111 through the original address 201.23.123.1, that is, the original NAT penetration channel is used, indicating that the address will change to the updated address 201.23.123.2. And listen to the message from NAT on the updated address 201.23.123.2;
- A2 NAT forwards the message to host A;
- host A3 After receiving the message from host B, host A extracts the updated address 201.23.123.2, and sends a probe message to host B's 201.23.123.2 through the NAT address 202.12.1.2:1111.
- A4 After receiving the probe message of A, host B can switch the communication between the original A and B (B-1, 201.23.123.1) to A, B (B-2, 201.23.123.2).
- Host B can later release the original address 201.23.123.1 address, for example, returning the address pool in DHCP.
- 201.23.123.2:6678 is sent to the host via 201 ⁇ 23 ⁇ 123 ⁇ 1 :5678 ⁇ (for forwarding via NAT's 202.12.1.2:1111).
- host A in A3 extracts 201.23.123.2:6678 and sends a message to host B 201.23.123.2:6678 through NAT address 202.12.1.2:1111.
- host B in A4 can change the communication between the original A and B (B-1, 201.23.123.1:5678) to A, B (B-2, 201.23.123.2:6678).
- Embodiment 2 The peer communication party (Host A) is located in the restricted NAT/port restricted NAT, and the local communication party (Host B) whose address changes is located in the omnidirectional NAT.
- host A is in a restricted NAT and host B is in an omni-directional NAT.
- host B is in an omni-directional NAT.
- the solution implements NAT penetration.
- the NAT penetration scheme when the address of host B changes includes the following:
- Host B obtains the address of the updated address 192.168.1.3:6678 201.23.123.2:3333;
- 201.23.123.1: 2222 is sent to the NAT-A address 202.12.1.2:1111, that is, the original NAT tunneling channel is used, indicating that the address will change to the updated address. And listen to the message from NAT-B at the updated address 192.168.1.3:6678;
- the host A After receiving the message of the host B, the host A extracts the updated address 201.23.123.2:3333, and sends a probe message to the NAT-B 201.23.123.2:3333 through the NAT-A 202.12.1.2:1111;
- NAT-B forwards the probe message received from 201.23.123.2:3333 to host B 192.168.1.3:6678;
- Host B After receiving the probe message, Host B can switch the communication between the original A and B (B-1, 192.168.1.2:5678) to eight, B (B-2, 192.168.1.3:6678).
- Embodiment 3 The peer communication party (host A) is located in a symmetric (Symmetric) type NAT, and the local communication party (host B) whose address changes is located in the external network.
- host A is in symmetric NAT and host B is in the external network.
- the NAT penetration scheme when the address of the external network host changes changes includes the following:
- Host B sends the updated address 201.23.123.2:6678 to the NAT address 202.12.1.2:1111 through the original address 201.23.123.1:5678, that is, the original NAT penetration channel is used, indicating that the address will change to the updated address 201.23. 123.2:6678, and listen for messages from NAT on the updated address 201.23.123.2:6678;
- C2 NAT forwards the message to host A;
- C3 After receiving the message of host B, host A extracts the updated address 201.23.123.2:6678; C4: host A obtains the reflection address 202.12.1.3:2111 (second reflection address) sent to 201.23.123.2:6678;
- Host A sends a probe message to host B 201.23.123.2:6678 through the reflection address 202.12.1.3:2111.
- host B After receiving the message of A, host B can switch the communication between the original A and B (B-1, 201.23.123.1:5678) to A, B (B-2, 201.23.123.2:6678). Implement the changed NAT penetration.
- Embodiment 4 The peer communication party (Host A) is located in a symmetric NAT, and the local communication party (Host B) whose address changes is located in the omnidirectional NAT.
- host A is located in a symmetric NAT.
- the NAT penetration scheme includes the following:
- Host B obtains the address of the updated address 192.168.1.3:6678 NA:201.23.123.2:3222;
- Host B sends the reflection address 201.23.123.2:3222 to the NAT-A address 202.12.1.2:1111 via the original address 201.23.123.1:2222 through 192.168.1.2:5678, that is, the original NAT penetration channel is used, indicating that the address will be Change to the updated address. And listen to the message from NAT-B at the updated address 192.168.1.3:6678;
- D6 Host A sends a probe message to NAT-B's 201.23.123.2:3222 by reflecting address 202.12.1.3:2111; D7: NAT-B forwards the probe message received from 201.23.123.2:3222 to host B 192.168.1.3:6678;
- Host B After receiving the probe message, Host B can switch the communication between the original A and B (B-1, 192.168.1.2:5678) to In, B (B-2, RA: 192.168.1.3:6678).
- Embodiment 5 The peer communication party (Host A) is located in a symmetric NAT, and the local communication party (Host B) whose address changes is located in the restricted NAT port restricted NAT/symmetric NAT.
- the NAT wears.
- the solution includes the following:
- Host B gets the reflected address of the updated address 192.168.1.3:6678
- Host B sends the reflection address 201.23.123.2:3222 to the NAT-A address 202.12.1.2:1111 via the original address 201.23.123.1:2222 through 192.168.1.2:5678, that is, the original NAT penetration channel is used, indicating that the address will be Change to the updated address. And listen to the message from NAT-B at the updated address 192.168.1.3:6678;
- E4 After receiving the message from Host B, Host A extracts the updated address 201.23.123.2:3222; E5: Host A obtains the reflection address 202.12.1.3:2111 sent to NAT-A to 201.23.123.2:3222 (second reflection) Address);
- 201.12.1.2:1111 is sent to NAT-B 201.23.123.1:2222 (original NAT penetration channel);
- Host A sends a probe message (first probe message) to 201.23.123.2:3222 through the reflection address 202.12.1.3:2111;
- NAT-B forwards the probe message received from 201.23.123.2:3222 to host B 192.168.1.3:6678.
- the above E6 and E7 have no order.
- Host B receives the message in E8 and sends a probe message (second probe message) to NAT-A's 202.12.1.3:2111 via 192.168.1.3:6678 via 201.23.123.2:3222.
- NAT-A forwards the probe message received from 202.12.1.3:2111 to Host A. After Host A and Host B receive the probe message sent by the peer, respectively, the NAT penetration of the updated address is completed.
- E10 Host B switches the communication between the original A, B (B-1, 192.168 ⁇ 2:5678) to In, B (B-2, 192.168.1.3:6678).
- a NAT-penetrating device the local communication device and the peer communication device whose network address changes, wherein the local communication device whose network address changes is configured to be updated after the original NAT penetration channel
- the network address information or the reflected address information of the updated network address is sent to the peer communication device; after receiving the probe message sent by the peer communication device, the through channel is established.
- the updated network address information is: information indicating to the opposite communication device that the network address of the local communication device will change to the updated network address.
- the local communication device is further configured to: when the updated network address information or the reflected address information of the updated network address is sent to the opposite communication device, the neighboring communication device is sent on the updated network address. Probe message.
- the peer communication device that communicates with the local communication device whose network address changes is configured to receive the updated network address information sent by the local communication device or the reflected address information of the updated network address, according to the updated network.
- the address information or the reflected address information of the updated network address sends a probe message to the updated network address of the local communication device.
- the peer communication device is further configured to: when the probe message is sent to the updated network address of the local communication device according to the updated network address information, extract the updated network address from the updated network address information. Sending the probe message directly to the updated network address of the local communication device by using the NAT address or the new reflection address of the peer communication device.
- the peer communication device is further configured to: when the probe message is sent to the updated network address of the local communication device according to the updated address information of the updated network address, extract the reflected address information of the updated network address.
- the reflected address of the updated network address is sent to the reflected address of the updated network address by the NAT address or the new reflective address of the peer communication device, and then the probe message is forwarded to the updated communication device of the local communication device. website address.
- the local communication party when the network address of one of the two communication parties changes, the local communication party whose network address changes changes the updated network address information or the reflected address information of the updated network address through the original NAT penetration channel.
- the peer communication party sends to the peer communication party; the peer communication party receives the updated network address information or the reflected address information of the updated network address, according to the received updated network address information or the reflected address information of the updated network address
- the updated network address of the local communication party sends a probe message; after receiving the probe message, the local communication party establishes a new NAT penetration channel between the local communication party and the opposite communication party after the network address is updated.
- the new communication between the local communication party and the opposite communication party after the network address update can be established.
- the NAT penetrates the channel for subsequent communication interaction without interrupting the service. Therefore, NAT penetration in an environment where the network address frequently changes is realized without interrupting the existing P2P service.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Small-Scale Networks (AREA)
Abstract
本发明公开了一种网络地址转换穿透方法及设备,该方法包括:通信双方的一方网络地址发生变化时,地址发生变化的本端通信方通过原有的网络地址转换(NAT)穿透通道将更新后的网络地址信息发送给对端通信方;对端通信方接收到更新后的网络地址信息,向本端通信方的更新后的网络地址发送探测消息;本端通信方接收到探测消息后,建立起网络地址更新后的本端通信方与对端通信方间的新NAT穿透通道。其中一种设备为与网络地址发生变化的本端通信设备进行通信的对端通信设备,用于接收到更新后的网络地址信息,向本端通信设备的更新后的网络地址发送探测消息。采用本发明,在不中断现有P2P业务情况下,实现网络地址经常变化的环境下的NAT穿透。
Description
一种网络地址转换穿透方法及设备 技术领域
本发明涉及通信领域的网络地址转换技术, 尤其涉及一种在网络地址 变化环境下点对点 (P2P, Peer-to-Peer ) 的网络地址转换(NAT, Network Address Translation ) 穿透方法及设备。 背景技术
NAT作为一种广泛部署的网络技术, 在解决安全与网际协议(IP )地 址短缺方面发挥着巨大的作用。 如图 1所示为现有的一种典型的 NAT网络 架构,基于该网络架构的访问机制为: 内网 A、 B中的主机分别通过 NAT-A 和 NAT-B访问外部的因特网 (Internet ) 资源, 外部主机不能主动向内网发 起连接, 这一特性在解决安全与 IP地址短缺领域发挥着重大的作用, 但也 制约着许多应用的部署, 如 P2P通信、 网络会议、 音视频传输等, 阻碍了 互联网的发展。 因此 NAT的穿透技术就成为了研究的发展方向。
目前, 已有多种 NAT穿透方案, 例如 NAT 的 UDP简单穿越( STUN, Simple Traversal of UDP over NATs )、 通过 Relay方式穿越 NAT ( TURN, Traversal Using Relay NAT ), 中间盒、 交互连接建立 ( ICE )等。 它们中的 大多数技术是在外网部署一台服务器(Server ),如图 1所示,通过此 Server 实现 NAT的穿透技术。
在 P2P通信上可以利用 ICE技术的 RFC5245标准较好地穿透 NAT。但 在地址经常变化的环境下, 例如 Mobile IP、 DHCP租约到期、 WIFI网络变 化等环境下, 采用现有的 NAT穿透方案存在的问题是: 当设备地址发送改 变时, 使用 ICE或其他的 NAT穿透方案需重新建立 ICE流程, 而重新建立 ICE流程将会中断现有的通信、 或耗费大量的时间用以 ICE的重新建立。
针对这种地址经常变化的环境下 NAT穿透存在的问题, 在不中断现有 P2P 业务情况下, 目前还没有相应的解决方案。 发明内容
有鉴于此, 本发明实施例的主要目的在于提供一种 NAT穿透方法及设 备,在不中断现有 P2P业务情况下,实现网络地址经常变化的环境下的 NAT 穿透。
为达到上述目的, 本发明实施例的技术方案是这样实现的:
一种网络地址转换穿透方法, 该方法包括:
通信双方的一方网络地址发生变化时, 网络地址发生变化的本端通信 方通过原有的网络地址转换 NAT穿透通道, 将更新后的网络地址信息或更 新后的网络地址的反射地址信息发送给对端通信方;
所述对端通信方根据接收的所述更新后的网络地址信息或所述更新后 的网络地址的反射地址信息向所述本端通信方的更新后的网络地址发送探 测消息;
本端通信方接收到所述探测消息后, 建立起网络地址更新后的本端通 信方与对端通信方间的新 AT穿透通道。
其中, 所述将更新后的网络地址信息或更新后的网络地址的反射地址 信息发送给对端通信方后, 该方法还包括: 所述本端通信方在所述更新后 的网络地址上监听所述对端通信方发送的所述探测消息。
其中, 根据所述更新后的网络地址信息向所述本端通信方的更新后的 网络地址发送探测消息具体包括:
从所述更新后的网络地址信息中提取出所述更新后的网络地址, 通过 NAT地址直接向本端通信方的所述更新后的网络地址发送探测消息或者, 从所述更新后的网络地址信息中提取出所述更新后的网络地址, 获取 对端通信方向更新后的网络地址发送探测消息需要的第二反射地址, 通过
所述第二发射地址向本端通信方的所述更新后的网络地址发送探测消息。 其中, 根据所述更新后的网络地址的反射地址信息向所述本端通信方 的更新后的网络地址发送探测消息具体包括:
从所述更新后的网络地址的反射地址信息中提取出更新后的网络地址 测消息, 再将所述探测消息转发给本端通信方的所述更新后的网络地址; 或者,
从所述更新后的网络地址的反射地址信息中提取出更新后的网络地址 的反射地址, 获取对端通信方向更新后的网络地址的反射地址发送探测消 息需要的第二反射地址, 通过所述第二发射地址向本端通信方的所述更新 后的网络地址的反射地址发送探测消息, 再将所述探测消息转发给本端通 信方的所述更新后的网络地址。
一种网络地址转换穿透设备, 该设备为网络地址发生变化的本端通信 设备, 配置为通过原有的 NAT穿透通道将更新后的网络地址信息或更新后 的网络地址的反射地址信息发送给对端通信设备; 接收到对端通信设备发 通信设备间的新 NAT穿透通道。
其中, 所述本端通信设备, 进一步配置为将更新后的网络地址信息或 更新后的网络地址的反射地址信息发送给对端通信设备的情况下, 在所述 更新后的网络地址上监听对端通信设备发送的所述探测消息。
一种网络地址转换穿透设备, 该设备为与网络地址发生变化的本端通 信设备进行通信的对端通信设备, 配置为接收到本端通信设备发送的更新 后的网络地址信息或更新后的网络地址的反射地址信息, 根据所述更新后 的网络地址信息或所述更新后的网络地址的反射地址信息向本端通信设备 的更新后的网络地址发送探测消息。
其中, 所述对端通信设备, 进一步配置为根据所述更新后的网络地址 信息向本端通信设备的更新后的网络地址发送探测消息的情况下, 从所述 更新后的网络地址信息中提取出所述更新后的网络地址, 通过 NAT地址直 接向本端通信设备的更新后的网络地址发送所述探测消息 ; 或者,
从所述更新后的网络地址信息中提取出所述更新后的网络地址, 获取 对端通信方向更新后的网络地址发送探测消息需要的第二反射地址, 通过 所述第二发射地址向本端通信方的更新后的网络地址发送所述探测消息。
其中, 所述对端通信设备, 进一步配置为根据所述更新后的网络地址 的反射地址信息向本端通信设备的更新后的网络地址发送探测消息的情况 下, 从所述更新后的网络地址的反射地址信息中提取出更新后的网络地址 测消息, 再将所述探测消息转发给所述本端通信设备的更新后的网络地址; 或者,
从所述更新后的网络地址的反射地址信息中提取出更新后的网络地址 的反射地址, 获取对端通信方向更新后的网络地址的反射地址发送探测消 息需要的第二反射地址, 通过所述第二发射地址向本端通信方的所述更新 后的网络地址的反射地址发送探测消息, 再将所述探测消息转发给本端通 信方的所述更新后的网络地址。
一种网络地址转换穿透方法, 该方法包括:
通信双方的一方网络地址发生变化时, 网络地址发生变化的本端通信 方通过原有的 NAT穿透通道, 将更新后的网络地址的反射地址信息发送给 对端通信方;
从所述更新后的网络地址的反射地址信息中提取出更新后的网络地址 的反射地址, 获取对端通信方向更新后的网络地址的反射地址发送第一探 测消息需要的第二反射地址, 通过原有的 NAT穿透通道将所述第二反射地
址发送给本端通信方;
通过所述第二发射地址向所述更新后的网络地址的反射地址发送所述 第一探测消息后, 将所述第一探测消息转发给本端通信方的更新后的网络 地址;
通过所述更新后的网络地址经由所述更新后的网络地址的反射地址向 第二反射地址发送第二探测消息, 将所述第二探测消息转发给对端通信方, 建立起网络地址更新后的本端通信方与对端通信方间的新 NAT穿透通道。
其中, 该方法还包括: 所述本端通信方在所述更新后的网络地址上监 听所述对端通信方发送的所述第一探测消息。
本发明实施例的方法是通信双方的一方网络地址发生变化时, 网络地 址发生变化的本端通信方通过原有的 NAT穿透通道, 将更新后的网络地址 信息或更新后的网络地址的反射地址信息发送给对端通信方; 对端通信方 接收到更新后的网络地址信息或更新后的网络地址的反射地址信息, 根据 接收的更新后的网络地址信息或更新后的网络地址的反射地址信息向本端 通信方的更新后的网络地址发送探测消息; 本端通信方接收到探测消息后, 建立起网络地址更新后的本端通信方与对端通信方间的新 NAT穿透通道。
采用本发明实施例, 由于通信双方的一方能获知网络地址发送变化的 另一方的更新后的网络地址信息, 因此, 可以建立起网络地址更新后的本 端通信方与对端通信方间的新 NAT穿透通道, 用以后续通信交互, 并不需 要中断业务。 从而, 在不中断现有 P2P业务情况下, 实现网络地址经常变 化的环境下的 NAT穿透。 附图说明
图 1为现有典型的 NAT网络拓朴结构示意图;
图 2为本发明实施例方法的实现流程图;
图 3 为本发明实施例的地址变化方位于外网时的 Restricted Cone 型
NAT拓朴结构示意图;
图 4为本发明实施例的地址变化方位于 Full cone NAT时的 Restricted Cone型 NAT拓朴结构示意图;
图 5为本发明实施例的地址变化方位于外网时 Symmetric型 NAT拓朴 结构示意图;
图 6为本发明实施例的地址变化方位于 Full cone NAT中时 Symmetric 型 NAT拓朴结构示意图。 具体实施方式
下面结合附图对技术方案的实施作进一步的详细描述。
一种 NAT穿透方法, 如图 2所示, 该方法的实现流程包括以下步骤: 步骤 101、通信双方的一方网络地址发生变化时, 地址发生变化的本端 通信方通过原有的 NAT穿透通道将地址更新消息发送给对端通信方, 指示 本端通信方的网络地址将变化到更新后的网络地址。
这里, 地址更新消息中携带本端通信方的更新后的网络地址或更新后 的网络地址的反射地址。 需要指出的是: 携带本端通信方的更新后的网络 地址的消息并不限于所述地址更新消息。 本端通信方的更新后的网络地址 或更新后的网络地址的反射地址, 也可以封装在更新后的网络地址信息或 更新后的网络地址的反射地址信息中发送给对端通信方, 由对端通信方进 行解析和提取。
步骤 102、对端通信方接收到地址更新消息, 若提取出的是更新后的网 络地址, 则直接向本端通信方的更新后的网络地址发送探测消息; 若提取 出的是更新后的网络地址的反射地址, 则先向更新后的网络地址的反射地 址发送探测消息, 再将探测消息转发给本端通信方的更新后的网络地址。
步骤 103、本端通信方接收到对端通信方发送的探测消息后, 建立起该 更新后的网络地址与对端通信方网络地址间的新 NAT穿透通道。
这里, 由于对端通信方能获取到本端通信方的网络地址变更, 能向本 端通信方变更后的网络地址发送消息, 从而在本端通信方更新后的网络地 址与对端通信方网络地址间建立新的 NAT穿透通道,以便后续的消息交互, 无需中断业务, 重新建立流程, 从而在不中断现有 P2P业务情况下, 实现 网络地址经常变化的环境下的 NAT穿透。
综上所述, 采用本发明实施例的方案, 能实现网络地址经常变化的环 境下的 NAT穿透, 实现 P2P业务的不中断切换, 例如 VoIP的不中断切换。 在地址发生更新后不需要重新建立 ICE的流程, 例如地址收集、 地址优先 级排序、 连通性测试、 SDP信息交换等。 而且, 本发明实施例的方案不需 要中间节点的参与, 可完全实现 P2P通信的切换, 从而加速了新的 NAT穿 透通道的建立。
本发明实施例在地址变化环境下的场景主要有全向 NAT ( Full Cone NAT )、受限 NAT( Restricted Cone NAT )、端口受限 NAT( Port Restricted Cone NAT ) 以及对称 NAT ( Symmetric NAT )等四种类型的 NAT拓朴网络架构 对应的流程, 以下进一步说明本发明实施例, 对各个场景分别进行说明。 另, 对本文所有图中的 IP地址和相应的端口号在此做一说明: LA表示未 发生地址变化方的地址, NA表示 NAT的反射地址, RA表示发生了地址变 化方的地址, 粗线表示原有 NAT穿透通道。
实施例 1: 对端通信方 (主机 A )位于受限 NAT/端口受限 NAT, 地址 变化的本端通信方 (主机 B )位于外网中。
如图 3所示为受限 NAT/端口受限 NAT, 主机 A位于 NAT网中, 主机 B位于外网中。
当内网中的主机 A的地址变化时,可采用现有的 NAT方案,比如 STUN 实现 NAT穿透。 当外网的设备 B地址由原地址 201.23.123.1变化到更新后 地址 201.23.123.2时。由于受限 NAT/端口受限 NAT的性质决定了采用更新
后地址 201.23.123.2将不能发送数据到设备 A上(反方向可以)。 因此, 针 对此场景, NAT穿透方案包括以下内容:
A1 :主机 B将更新后地址 201.23.123.2通过原地址 201.23.123.1发送给 NAT地址 202.12.1.2:1111, 即采用原有 NAT穿透通道, 指示地址将变化到 更新后地址 201.23.123.2。并在更新后地址 201.23.123.2上监听来自 NAT的 消息;
A2: NAT将消息转发给主机 A;
A3: 主机 A接收到主机 B的消息后, 提取更新后地址 201.23.123.2, 并通过 NAT的反射地址 202.12.1.2:1111向主机 B的 201.23.123.2发送探测 消息;
A4: 主机 B接收到 A的探测消息后,可将原 A、 B ( B-1, 201.23.123.1 ) 间的通信切换化到 A、 B ( B-2 , 201.23.123.2 )上。
稍后主机 B可将原地址 201.23.123.1地址释放, 例如在 DHCP中归还 地址池。
需要指出的是: 如果是端口受限 NAT, 则在 A1 中主机 B 需将
201.23.123.2:6678 通过 201·23· 123· 1 :5678 发送给主机 Α (通过 NAT 的 202.12.1.2:1111 转发)。 A3 中主机 A 接收到主机 B 的消息后, 提取 201.23.123.2:6678, 并通过 NAT 地址 202.12.1.2:1111 向主机 B 201.23.123.2:6678发送消息。 A4中主机 B接收到 A的消息后, 可将原 A、 B ( B-1, 201.23.123.1 :5678 )间的通信变化到 A、 B ( B-2, 201.23.123.2:6678 ) 上。
实施例 2: 对端通信方(主机 A )位于受限 NAT/端口受限 NAT中, 地 址变化的本端通信方 (主机 B )位于全向 NAT中。
如图 4所示, 主机 A位于受限 NAT中, 主机 B位于全向 NAT中。 当主机 A的地址变化时, 由于 NAT-B为全向 NAT,可采用现有的 NAT
方案实现 NAT穿透。 当主机 B的地址变化时的 NAT穿透方案包括以下内 容:
B1: 主机 B 获取更新后地址 192.168.1.3:6678 的反射地址 201.23.123.2:3333;
B2 : 通过原地址 192.168.1.2:5678 将反射地址 201.23.123.2:3333 经
201.23.123.1 :2222发送给 NAT-A地址 202.12.1.2:1111, 即采用原有 NAT穿 透通道, 指示地址将变化到更新后地址。 并在更新后地址 192.168.1.3:6678 上监听来自 NAT-B的消息;
B3: NAT-A将消息转发给主机 A;
B4:主机 A接收到主机 B的消息后,提取更新后地址 201.23.123.2:3333, 并通过 NAT- A的 202.12.1.2:1111向 NAT-B的 201.23.123.2:3333发送探测消 息;
B5 : NAT-B 将从 201.23.123.2:3333 接收的探测消息转发给主机 B 192.168.1.3:6678;
B6: 主机 B接收到探测消息后, 可将原 A、 B ( B-1 , 192.168.1.2:5678 ) 间的通信切换到八、 B ( B-2, 192.168.1.3:6678 )上。
实施例 3: 对端通信方 (主机 A )位于对称( Symmetric )型 NAT中, 地址发生变化的本端通信方 (主机 B )位于外网中。
如图 5所示, 主机 A在对称 NAT中, 主机 B位于外网中。
当内网地址发生变化时可采用现有 NAT方案实现 NAT穿透。当外网主 机的地址发送变化时的 NAT穿透方案包括以下内容:
C1: 主机 B 将更新后地址 201.23.123.2:6678 通过原地址 201.23.123.1 :5678发送给 NAT地址 202.12.1.2:1111, 即采用原有 NAT穿透 通道, 指示地址将变化到更新后地址 201.23.123.2:6678, 并在更新后地址 201.23.123.2:6678上监听来自 NAT的消息;
C2: NAT将消息转发给主机 A;
C3:主机 A接收到主机 B的消息后,提取更新后地址 201.23.123.2:6678; C4:主机 A获取发往 201.23.123.2:6678的反射地址 202.12.1.3:2111 (第 二反射地址);
C5: 主机 A通过反射地址 202.12.1.3:2111向主机 B 201.23.123.2:6678 发送探测消息。
C6:主机 B接收到 A的消息后,可将原 A、 B ( B-1, 201.23.123.1 :5678 ) 间的通信切换到 A、 B ( B-2, 201.23.123.2:6678 )上。 实现变化后的 NAT 穿透。
实施例 4: 对端通信方 (主机 A )位于对称 NAT中, 地址发生变化的 本端通信方 (主机 B )位于全向 NAT中。
如图 6所示, 主机 A位于对称 NAT中, 当地址发生变化的本端通信 方 (主机 B )位于全向 NAT中时的 NAT穿透方案包括以下内容:
D1: 主机 B 获取更新后地址 192.168.1.3:6678 的反射地址 NA:201.23.123.2:3222;
D2: 主机 B通过 192.168.1.2:5678将反射地址 201.23.123.2:3222经原 地址 201.23.123.1 :2222发送给 NAT-A地址 202.12.1.2: 1111,即采用原有 NAT 穿透通道,指示地址将变化到更新后地址。并在更新后地址 192.168.1.3:6678 上监听来自 NAT-B的消息;
D3: NAT-A将消息转发给主机 A;
D4:主机 A接收到主机 B的消息后,提取更新后地址 201.23.123.2:3222;
D5 : 主机 A 向 NAT-A 获取发往 201.23.123.2:3222 的反射地址 202.12.1.3:2111 (第二反射地址);
D6:主机 A通过反射地址 202.12.1.3 :2111向 NAT-B的 201.23.123.2:3222 发送探测消息;
D7 : NAT-B 将从 201.23.123.2:3222 接收的探测消息转发给主机 B 192.168.1.3:6678;
D8: 主机 B接收到探测消息后, 可将原 A、 B ( B-1 , 192.168.1.2:5678 ) 间的通信切换到入、 B ( B-2, RA: 192.168.1.3:6678 )上。
实施例 5: 对端通信方 (主机 A )位于对称 NAT中, 地址变化的本端 通信方 (主机 B )位于受限 NAT端口受限 NAT /对称 NAT中。
如图 6所示,在对称 NAT中, 当地址发生变化的本端通信方(主机 B ) 位于受限 NAT/端口受限 NAT /对称 NAT中时(图 6中的 NAT-B ) 的 NAT 穿透方案包括以下内容:
E1: 主机 B 获取更新后地址 192.168.1.3:6678 的反射地址
NA:201.23.123.2:3222;
E2:主机 B通过 192.168.1.2:5678将反射地址 201.23.123.2:3222经原地 址 201.23.123.1 :2222发送给 NAT-A地址 202.12.1.2:1111 , 即采用原有 NAT 穿透通道,指示地址将变化到更新后地址。并在更新后地址 192.168.1.3:6678 上监听来自 NAT-B的消息;
E3: NAT-A将消息转发给主机 A;
E4:主机 A接收到主机 B的消息后,提取更新后地址 201.23.123.2:3222; E5 : 主机 A 向 NAT-A 获取发往 201.23.123.2:3222 的反射地址 202.12.1.3:2111 (第二反射地址);
E6 : 主机 A 通过 192.168.0.2:1234 将反射地址 202.12.1.3:2111 经
201.12.1.2:1111发送给 NAT-B的 201.23.123.1 :2222 (原 NAT穿透通道);
E7: 主机 A通过反射地址 202.12.1.3:2111向 201.23.123.2:3222发送探 测消息 (第一探测消息);
这里, NAT-B将从 201.23.123.2:3222接收到的探测消息转发给主机 B 192.168.1.3:6678。 上述 E6、 E7没有先后顺序。
E8: NAT-B将从 201.23.123.1 :2222接收的消息(上述 E6中的消息 )转 发给主机 B的 192.168.1.2:5678;
E9 : 主机 B 接收到 E8 中的消息后通过 192.168.1.3:6678 经由 201.23.123.2:3222向 NAT-A的 202.12.1.3:2111发送探测消息 (第二探测消 息)。
这里, NAT-A将从 202.12.1.3:2111接收到的探测消息转发给主机 A。 当主机 A和主机 B分别接收到对方发送的探测消息后, 完成了更新后地址 的 NAT穿透;
E10: 主机 B将原 A、 B ( B-1, 192.168丄 2:5678 ) 间的通信切换到入、 B ( B-2, 192.168.1.3:6678 )上。
一种 NAT穿透设备, 该设备分网络地址发生变化的本端通信设备和对 端通信设备, 其中, 网络地址发生变化的本端通信设备, 配置为通过原有 的 NAT穿透通道将更新后的网络地址信息或更新后的网络地址的反射地址 信息发送给对端通信设备; 接收到对端通信设备发送的探测消息后, 建立 透通道。
这里, 所述更新后的网络地址信息为: 向对端通信设备指示本端通信 设备的网络地址将变化到所述更新后的网络地址的信息。
这里, 本端通信设备, 进一步配置为将更新后的网络地址信息或更新 后的网络地址的反射地址信息发送给对端通信设备的情况下, 在更新后的 网络地址上监听对端通信设备发送的探测消息。
与网络地址发生变化的本端通信设备进行通信的对端通信设备, 配置 为接收到本端通信设备发送的更新后的网络地址信息或更新后的网络地址 的反射地址信息, 根据更新后的网络地址信息或更新后的网络地址的反射 地址信息向本端通信设备的更新后的网络地址发送探测消息。
这里, 对端通信设备, 进一步配置为根据更新后的网络地址信息向本 端通信设备的更新后的网络地址发送探测消息的情况下, 从更新后的网络 地址信息中提取出更新后的网络地址, 通过 NAT地址或者对端通信设备新 的反射地址直接向本端通信设备的更新后的网络地址发送所述探测消息。
或者, 对端通信设备, 进一步配置为根据更新后的网络地址的反射地 址信息向本端通信设备的更新后的网络地址发送探测消息的情况下, 从更 新后的网络地址的反射地址信息中提取出更新后的网络地址的反射地址, 先通过 NAT地址或者对端通信设备新的反射地址向更新后的网络地址的反 射地址发送探测消息, 再将探测消息转发给本端通信设备的更新后的网络 地址。
以上所述, 仅为本发明的较佳实施例而已, 并非用于限定本发明的保 护范围。 工业实用性
本发明实施例是通信双方的一方网络地址发生变化时, 网络地址发生 变化的本端通信方通过原有的 NAT穿透通道, 将更新后的网络地址信息或 更新后的网络地址的反射地址信息发送给对端通信方; 对端通信方接收到 更新后的网络地址信息或更新后的网络地址的反射地址信息, 根据接收的 更新后的网络地址信息或更新后的网络地址的反射地址信息向本端通信方 的更新后的网络地址发送探测消息; 本端通信方接收到探测消息后, 建立 起网络地址更新后的本端通信方与对端通信方间的新 NAT穿透通道。 采用 本发明实施例, 由于通信双方的一方能获知网络地址发送变化的另一方的 更新后的网络地址信息, 因此, 可以建立起网络地址更新后的本端通信方 与对端通信方间的新 NAT穿透通道, 用以后续通信交互, 并不需要中断业 务。 从而, 在不中断现有 P2P业务情况下, 实现网络地址经常变化的环境 下的 NAT穿透。
Claims
1、 一种网络地址转换穿透方法, 该方法包括:
通信双方的一方网络地址发生变化时, 网络地址发生变化的本端通信 方通过原有的网络地址转换 NAT穿透通道, 将更新后的网络地址信息或更 新后的网络地址的反射地址信息发送给对端通信方;
所述对端通信方根据接收的所述更新后的网络地址信息或所述更新后 的网络地址的反射地址信息向所述本端通信方的更新后的网络地址发送探 测消息;
本端通信方接收到所述探测消息后, 建立起网络地址更新后的本端通 信方与对端通信方间的新 NAT穿透通道。
2、 根据权利要求 1所述的方法, 其中, 所述将更新后的网络地址信息 或更新后的网络地址的反射地址信息发送给对端通信方后, 该方法还包括: 所述本端通信方在所述更新后的网络地址上监听所述对端通信方发送的所 述探测消息。
3、 根据权利要求 1或 2所述的方法, 其中, 根据所述更新后的网络地址 信息向所述本端通信方的更新后的网络地址发送探测消息具体包括:
从所述更新后的网络地址信息中提取出所述更新后的网络地址, 通过 NAT地址直接向本端通信方的所述更新后的网络地址发送探测消息或者, 从所述更新后的网络地址信息中提取出所述更新后的网络地址, 获取 对端通信方向更新后的网络地址发送探测消息需要的第二反射地址, 通过 所述第二发射地址向本端通信方的所述更新后的网络地址发送探测消息。
4、 根据权利要求 1或 2所述的方法, 其中, 根据所述更新后的网络地址 的反射地址信息向所述本端通信方的更新后的网络地址发送探测消息具体 包括:
从所述更新后的网络地址的反射地址信息中提取出更新后的网络地址
测消息, 再将所述探测消息转发给本端通信方的所述更新后的网络地址; 或者,
从所述更新后的网络地址的反射地址信息中提取出更新后的网络地址 的反射地址, 获取对端通信方向更新后的网络地址的反射地址发送探测消 息需要的第二反射地址, 通过所述第二发射地址向本端通信方的所述更新 后的网络地址的反射地址发送探测消息, 再将所述探测消息转发给本端通 信方的所述更新后的网络地址。
5、 一种网络地址转换穿透设备, 该设备为网络地址发生变化的本端通 信设备, 配置为通过原有的 NAT穿透通道将更新后的网络地址信息或更新 后的网络地址的反射地址信息发送给对端通信设备; 接收到对端通信设备 发送的探测消息后, 建立起网络地址更新后的所述本端通信设备与所述对 端通信设备间的新 NAT穿透通道。
6、 根据权利要求 5所述的设备, 其中, 所述本端通信设备, 进一步配 置为将更新后的网络地址信息或更新后的网络地址的反射地址信息发送给 对端通信设备的情况下, 在所述更新后的网络地址上监听对端通信设备发 送的所述探测消息。
7、 一种网络地址转换穿透设备, 该设备为与网络地址发生变化的本端 通信设备进行通信的对端通信设备, 配置为接收到本端通信设备发送的更 新后的网络地址信息或更新后的网络地址的反射地址信息, 根据所述更新 后的网络地址信息或所述更新后的网络地址的反射地址信息向本端通信设 备的更新后的网络地址发送探测消息。
8、 根据权利要求 7所述的设备, 其中, 所述对端通信设备, 进一步配 置为根据所述更新后的网络地址信息向本端通信设备的更新后的网络地址 发送探测消息的情况下, 从所述更新后的网络地址信息中提取出所述更新
后的网络地址, 通过 NAT地址直接向本端通信设备的更新后的网络地址发 送所述探测消息 ; 或者,
从所述更新后的网络地址信息中提取出所述更新后的网络地址, 获取 对端通信方向更新后的网络地址发送探测消息需要的第二反射地址, 通过 所述第二发射地址向本端通信方的更新后的网络地址发送所述探测消息。
9、 根据权利要求 7所述的设备, 其中, 所述对端通信设备, 进一步配 置为根据所述更新后的网络地址的反射地址信息向本端通信设备的更新后 的网络地址发送探测消息的情况下, 从所述更新后的网络地址的反射地址 信息中提取出更新后的网络地址的反射地址, 先通过 NAT地址向所述更新 后的网络地址的反射地址发送探测消息, 再将所述探测消息转发给所述本 端通信设备的更新后的网络地址; 或者,
从所述更新后的网络地址的反射地址信息中提取出更新后的网络地址 的反射地址, 获取对端通信方向更新后的网络地址的反射地址发送探测消 息需要的第二反射地址, 通过所述第二发射地址向本端通信方的所述更新 后的网络地址的反射地址发送探测消息, 再将所述探测消息转发给本端通 信方的所述更新后的网络地址。
10、 一种网络地址转换穿透方法, 该方法包括:
通信双方的一方网络地址发生变化时, 网络地址发生变化的本端通信 方通过原有的 NAT穿透通道, 将更新后的网络地址的反射地址信息发送给 对端通信方;
从所述更新后的网络地址的反射地址信息中提取出更新后的网络地址 的反射地址, 获取对端通信方向更新后的网络地址的反射地址发送第一探 测消息需要的第二反射地址, 通过原有的 NAT穿透通道将所述第二反射地 址发送给本端通信方;
通过所述第二发射地址向所述更新后的网络地址的反射地址发送所述
第一探测消息后, 将所述第一探测消息转发给本端通信方的更新后的网络 地址;
通过所述更新后的网络地址经由所述更新后的网络地址的反射地址向 第二反射地址发送第二探测消息, 将所述第二探测消息转发给对端通信方, 建立起网络地址更新后的本端通信方与对端通信方间的新 NAT穿透通道。
11、 根据权利要求 10所述的方法, 其中, 该方法还包括: 所述本端通 信方在所述更新后的网络地址上监听所述对端通信方发送的所述第一探测 消息。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210528106.XA CN103873600B (zh) | 2012-12-10 | 2012-12-10 | 一种网络地址转换穿透方法及设备 |
CN201210528106.X | 2012-12-10 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2013167086A2 true WO2013167086A2 (zh) | 2013-11-14 |
WO2013167086A3 WO2013167086A3 (zh) | 2014-01-03 |
Family
ID=49551377
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2013/080243 WO2013167086A2 (zh) | 2012-12-10 | 2013-07-26 | 一种网络地址转换穿透方法及设备 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN103873600B (zh) |
WO (1) | WO2013167086A2 (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113609137A (zh) * | 2021-08-27 | 2021-11-05 | 四川中电启明星信息技术有限公司 | 一种基于反射的内外网穿透方法 |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104243283A (zh) * | 2014-09-16 | 2014-12-24 | 合肥协知行信息系统工程有限公司 | 一种基于nat的即时通讯方法 |
CN104363312B (zh) * | 2014-11-14 | 2018-07-13 | 浙江宇视科技有限公司 | 一种简洁高效的nat打洞方法和装置 |
CN110366169B (zh) | 2018-09-13 | 2021-02-26 | 新华三技术有限公司 | 漫游方法和装置 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101207531A (zh) * | 2006-12-21 | 2008-06-25 | 浙江工业大学 | 一种可跨越多级子网的p2p覆盖网建立方法及系统 |
CN101483764A (zh) * | 2009-01-19 | 2009-07-15 | 北京中星微电子有限公司 | 网络视频监控系统中监控双方媒体流发送方法 |
CN102685262A (zh) * | 2012-04-16 | 2012-09-19 | 中兴通讯股份有限公司 | 一种探测网络地址转换信息的方法、装置及系统 |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100426769C (zh) * | 2005-01-12 | 2008-10-15 | 腾讯科技(深圳)有限公司 | 一种建立对等直连通道的方法 |
CN101493764A (zh) * | 2008-01-22 | 2009-07-29 | 江苏省金思维信息技术有限公司 | 企业业务流程可视化动态建模与功能操作联动方法 |
US8493981B2 (en) * | 2010-11-03 | 2013-07-23 | Broadcom Corporation | Switch module |
-
2012
- 2012-12-10 CN CN201210528106.XA patent/CN103873600B/zh not_active Expired - Fee Related
-
2013
- 2013-07-26 WO PCT/CN2013/080243 patent/WO2013167086A2/zh active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101207531A (zh) * | 2006-12-21 | 2008-06-25 | 浙江工业大学 | 一种可跨越多级子网的p2p覆盖网建立方法及系统 |
CN101483764A (zh) * | 2009-01-19 | 2009-07-15 | 北京中星微电子有限公司 | 网络视频监控系统中监控双方媒体流发送方法 |
CN102685262A (zh) * | 2012-04-16 | 2012-09-19 | 中兴通讯股份有限公司 | 一种探测网络地址转换信息的方法、装置及系统 |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113609137A (zh) * | 2021-08-27 | 2021-11-05 | 四川中电启明星信息技术有限公司 | 一种基于反射的内外网穿透方法 |
CN113609137B (zh) * | 2021-08-27 | 2023-06-02 | 四川中电启明星信息技术有限公司 | 一种基于反射的内外网穿透方法 |
Also Published As
Publication number | Publication date |
---|---|
CN103873600B (zh) | 2018-10-26 |
WO2013167086A3 (zh) | 2014-01-03 |
CN103873600A (zh) | 2014-06-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN114866521B (zh) | 会议服务器 | |
US8611354B2 (en) | Method and apparatus for relaying packets | |
TWI434595B (zh) | 網路系統之連線建立管理方法及其相關系統 | |
US20110082941A1 (en) | Method of providing direct communication in internet protocol network | |
US20100088427A1 (en) | Selective Routing of Data Transmission Between Clients | |
WO2006089481A1 (fr) | Méthode de contrôle de communication de pénétration directe dont deux parties sont dans différents nat et dispositif correspondant | |
CN102025594A (zh) | Nat环境下的路由动态调整方法和系统 | |
WO2019184262A1 (zh) | 多类型媒体数据网络地址转换穿越方法、终端及系统 | |
US20170230484A1 (en) | Network System and Method for Establishing Data Link by Using Relay Node | |
CN101895590A (zh) | 基于udt实现nat穿越的系统和方法 | |
WO2013167086A2 (zh) | 一种网络地址转换穿透方法及设备 | |
WO2014190643A1 (zh) | 一种数据交互的方法、装置及系统 | |
US20140337478A1 (en) | Peer-to-peer network communications | |
JP6101997B2 (ja) | リアルタイム通信セッションを確立する通信システム | |
CN105376338B (zh) | 一种IPv4与IPv6之间的翻译方法及装置 | |
CN102457580B (zh) | Nat穿越方法及系统 | |
CN109194778B (zh) | 一种基于kcp协议的nat穿透方法 | |
WO2017119219A1 (ja) | 通信方法 | |
US10771511B2 (en) | Communication method to maintain an application session between a terminal and an application server | |
JP2015012601A (ja) | ネットワーク端末装置同士の接続方法 | |
WO2016161774A1 (zh) | 终端应用访问nas的方法及装置 | |
WO2011044810A1 (zh) | 实现多方通信的方法、装置及系统 | |
EP3044929B1 (en) | A mobile-device based proxy for browser-originated procedures | |
KR101394579B1 (ko) | Ip 네트워크에서의 직접 통신 제공 방법 | |
KR101586058B1 (ko) | Nat환경을 고려한 피투피 통신 연결 장치 및 이를 이용한 피투피 통신 연결 방법 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
122 | Ep: pct application non-entry in european phase |
Ref document number: 13787521 Country of ref document: EP Kind code of ref document: A2 |