Multiple off-the-shelf, new and exciting solutions, including home automation, printing, image processing, audio/video entertainment, kitchen equipment, car networks and similar networks in public gathering places. UPnP isDistributed and open
I read a lot of articles on how to enable the UPnP function on the Internet, and found that no article can fully introduce the entire UPnP setup process. Therefore, I decided to write an article and at least take the overall idea of setting up UPnP
Read a lot on the internet about how to turn on the UPnP feature, and found that no article has been able to introduce the entire UPnP setup process, it is only part of the story. So decided to write an article, at least the overall idea of setting
1. Search for the UPnP devices on the current network. Control Point generates a multicastsocket, binds the multicast address 239.00000000250 port 1900, and then sends a search request. timetolive is set to 4 by default. The request is defined as
Article Title: Enable the LinuxNAT server to support UPnP. Linux is a technology channel of the IT lab in China. Including desktop applications, Linux system management, kernel research, embedded systems, open source, and other basic classification
Usage of UPnP Functions
Usage of UPnP Functions
I. Concepts of UPnP:
The following is an explanation of UPnP on the Microsoft Official Website:
Q: What is UPnP?A: Universal plug-and-play (UPnP) is a common architecture for peer-to-peer
1.1 UPnP Introduction
Generic plug-and-play (UPnP) is an architecture that supports point-to-point plug-and-play for network devices in Microsoft Windows. The UPnP specification is designed to simplify the installation and management of devices and
Let the Linux system NAT server support UPnP-Linux Enterprise Application-Linux server application information. The following is a detailed description. Note: If you have a high requirement on network security or a high requirement on Controllable
Specifically, UPnP (Universal Plug and play, Universal plug-and-match) automatic port mapping is suitable for intranet, but not limited to intranet. The intranet is characterized by the inability to open the listening port externally, thereby losing
WinXP system has never been more stable and secure, but there are still a variety of security vulnerabilities, if we are indifferent to this, online hackers will have the opportunity, they can easily steal your trade secrets, destroy your important
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.