1. What is P2P:
P2P is the abbreviation of peer-to-peer. Peer has the meanings of "peer-to-peer", "peer", and "peer" in English. In this way, P2P can be understood as "peer-to-peer", or "Peer-to-Peer Networking. At present, people think that it has a bright future in strengthening the communication, file exchange, and distributed computing among others on the Internet ....
See http://www.kuqin.com/p2p/20080411/6476.html for detailsWhat we usually call peer network is a P2P network. The concept o
We all know that. Nat is located in the internal and external network, used for internal and external network address conversion, in the current is still IPv4 as the mainstream Protocol IP network, NAT technology is widely used, because it can save scarce public network IP address. But do not think that NAT technology is very simple, think just the internal (or
First, NAT typeThis article transferred from: http://www.cnblogs.com/hummersofdie/archive/2013/05/21/3090163.html1, the basic NAT type: Only forwarding IP, do not turn the port;Tips: A basic NAT often needs to have multiple public IP addresses for simultaneous access to applications with the same port in multiple intranet nodes. Because this type of
A little grumbling and hope
I have been very dissatisfied with Linux NAT, and also wrote the "How the Linux system smooth effective NAT" series of articles in the patch to repair, but also wrote some of the class Cisco implementation of the patch, but the effect is not good, torrential rain night, the last long vacation the second night, Although there is no October 7 night rainfall is big, but October 6 n
Network Address Translation (NAT): Network Address Translation is generated when IP addresses are increasingly lacking. Its main purpose is to reuse addresses. Nat is divided into two categories: Basic Nat and napt (Network Address/port translator ). Nat is a functional module running on a vro.The first solution is the
Network Address Translation (NAT): Network Address Translation is generated when IP addresses are increasingly lacking. Its main purpose is to reuse addresses. NAT is divided into two categories: Basic NAT and NAPT (Network Address/Port Translator ). NAT is a functional module running on a vro.The first solution is the
Vronat NAT Function Configuration
With the rapid development of internet, the shortage of IP addresses has become a very prominent problem. A variety of solutions have emerged to solve this problem. The following describes an effective method in the current network environment: address translation (NAT.
1. NAT Introduction
NA
Principles and implementation of P2P UDP Nat penetration (Source Code) (zz)
Note: This article is a classic P2P article that uses UDP to penetrate NAT Chinese data, although the technology used is similar to stun. However, it combines the source code and is more practical.
========================================================== ========================================================== ===
Principles and
NAT/ALG Mode
Normal NAT implements address translation by modifying the UDP or TCP packet header address information. However, for VOIP applications, address information must also be included in the TCP/UDP net load, ALG Mode means that the VOIP Terminal in the private network fills in the private network address in the Net Load. The address information is changed to the external address on the
Principles and implementation of P2P udp nat penetrationOriginal: shootingstarsReference: http://midcom-p2p.sourceforge.net/draft-ford-midcom-p2p-01.txt
There are often discussions on P2P principles on the Forum, but the discussion is based on the discussion, and there are very few substantive issues (source code ). Haha, here I will use a source code implemented by myself to illustrate the principle of UDP N
I. NAT/ALG Mode
Normal Nat implements address translation by modifying the UDP or TCP packet header address information. However, for VoIP applications, address information must also be included in the TCP/UDP net load, ALG Mode means that the VoIP Terminal in the private network fills in the private network address in the Net Load. The address information is changed to the external address on the
1. There are four Nat models for the SIP protocol.A) Full cone full coneB) Restricted cone of restricted coneC) Restricted cone of port restricted portD) symmetric ricA, B, and C are also called asymmetric Nat.
2. If the SIP terminal is behind Nat, problems may occur in its work. The reason is that the path of the sip signaling is different from that of the media
NAT Basic Description:Network Address translation (Nat,network addressing translation) is an Access wide area network (WAN) technology. is a conversion technology that converts a private (reserved) address into a legitimate IP address, which is widely used in various types of Internet access and various types of networks. The reason is very easy,nat not only perf
Labels: TCPIP
Basic Introduction to Nat:
NAT (Network Address Translation) is a WAN technology used to convert private (retained) addresses into valid IP addresses, it is widely used in various types of Internet access methods and networks. The reason is simple. Nat not only perfectly solves the problem of insufficient LP addresses, but also effectively avoids at
Set up a NAT test environment on VMWare Workstation
1. What is Nat (napt type ):
To address the shortage of IP addresses, the concept of NAT is introduced. All Intranet devices access the Internet through a unified Internet address and different ports, however, because the Internet device does not know the specific Internet IP address of the Intranet device and
P2P Nat ResearchPart 1: Nat IntroductionPart 2: Nat type detection
Part 1: Nat Introduction
Various types of NAT (according to RFC)
Full cone NAT:
The Intranet host establishes a UDP socket (localip: localport). When the socket
1 IntroductionVoIP is the most representative of the development of the new generation of Internet age.One of the application technologies. As a signaling control protocol in VoIPThere is great potential for growth. Therefore, in order to better promote the development of VoIP servicesIt will be a major research topic to solve the problem of SIP traversing NAT. This article mainlyBased on the stun method, it aims at its inability to traverse symmetric
This section is mainly to analyze the NAT module-related hook function and target function, mainly to clarify the principle of NAT module implementation.
1.NAT-related hook function analysis
NAT module is mainly in the nf_ip_prerouting, nf_ip_postrouting, Nf_ip_local_out, nf_ip_local_in four nodes on the
NatTypes and detection methods
The stun protocol is a client/server protocol. A large number of stun servers exist on the public network. You can run the stun client on your host to remotely connect to the stun server to confirm your network conditions.
The network of the client host can be divided into the following types:
1. Opened:That is, the host has a public IP address and does not have a firewall, so it can freely communicate with the outside.
2, full cone NAT:There is a
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.