• <ins id="pjuwb"></ins>
    <blockquote id="pjuwb"><pre id="pjuwb"></pre></blockquote>
    <noscript id="pjuwb"></noscript>
          <sup id="pjuwb"><pre id="pjuwb"></pre></sup>
            <dd id="pjuwb"></dd>
            <abbr id="pjuwb"></abbr>
             P2P communication across middleboxes(翻譯3)

            原文版權:Copyright (C) The Internet Society (2003).All Rights Reserved.

            原文地址:http://midcom-p2p.sourceforge.net/draft-ford-midcom-p2p-01.txt



            3.3.2. Peers behind the same NAT  客戶端都處于相同的NAT之后



            Now consider the scenario in which the two clients (probably unknowingly) happen to reside behind the same NAT, and are therefore located in the same private IP address space.  Client A has established a UDP session with server S, to which the common NAT has assigned public port number 62000.  Client B has similarly established a session with S, to which the NAT has assigned public port number 62001.



            現在讓我們來考慮一下兩個客戶端(很有可能不知不覺的就會)同時位于相同的NAT之后,而且是在同一個子網內部的情況, Client A與S之間的會話使用了NAT的62000端口,Client B與S之間的會話使用了62001端口,如下圖所示:


               Suppose that A and B use the UDP hole punching technique as outlined above to establish a communication channel using server S as an introducer.  Then A and B will learn each other's public IP addresses and port numbers as observed by server S, and start sending each other messages at those public addresses.The two clients will be able to communicate with each other this way as long as the NAT allows hosts on the internal network to open translated UDP sessions with other internal hosts and not just with external hosts. We refer to this situation as "loopback translation," because packets arriving at the NAT from the private network are translated and then "looped back" to the private network rather than being passed through to the public network.  For example, when A sends a UDP packet to B's public address, the packet initially has a source IP address and port number of 10.0.0.1:124 and a destination of 155.99.25.11:62001.  The NAT receives this packet, translates it to have a source of  155.99.25.11:62000 (A's public address) and a destination of 10.1.1.3:1234, and then forwards it on to B.  Even if loopback translation is supported by the NAT, this translation and forwarding   step is obviously unnecessary in this situation, and is likely to add latency to the dialog between A and B as well as burdening the NAT.

               

            我們假設,Client A 和 Client B 要使用上一節我們所描述的 “UDP打洞技術”,并通過服務器S這個“媒人”來認識,這樣Client A 和Client B首先從服務端S得到了彼此的公網IP地址和端口,然后就往對方的公網IP地址和端口上發送消息。在這種情況下,如果NAT 僅僅允許在 內部網主機與其他內部網主機(處于同一個NAT之后的網絡主機)之間打開UDP會話通信通道,而內部網主機與其他外部網主機就不允許的話,那么Client A 和Client B就可以通話了。我們把這種情形叫做“loopback translation”(“回環轉換”),因為數據包首先從局域網的私有IP發送到NAT轉換,然后“繞一圈”,再回到局域網中來,但是這樣總比這些數據通過公網傳送好。舉例來說,當 Client A發送了一個UDP數據包到 Client B的公網IP地址,這個數據包的報頭中就會有一個源地址10.0.0.1:124和一個目標地址155.99.25.11:62001。NAT接收到這個包以后,就會(進行地址轉換)解析出這個包中有一個公網地址源地址155.99.25.11:62000和一個目標地址10.1.1.3:1234,然后再發送給B,雖說NAT支持“loopback translation”,我們也發現,在這種情形下,這個解析和發送的過程有些多余,并且這個Client A 和Client B 之間的對話可能潛在性地給NAT增加了負擔。



            The solution to this problem is straightforward, however. When A and B initially exchange address information through server S, they should include their own IP addresses and port numbers as "observed" by themselves, as well as their addresses as observed by S.The clients    then simultaneously start sending packets to each other at each of the alternative addresses they know about, and use the first address that leads to successful communication. If the two clients are behind the same NAT, then the packets directed to their private addresses are likely to arrive first, resulting in a direct communication channel not involving the NAT.  If the two clients are behind different NATs, then the packets directed to their private addresses will fail to reach each other at all, but the clients will hopefully establish connectivity using their respective public addresses. It is important that these packets be authenticated in some way, however, since in the case of different NATs it is entirely possible for A's messages directed at B's private address to reach some other, unrelated node on A's private network, or vice versa.



            其實,解決這個問題的方案是顯而易見的。當 Client A和ClientB 最初通過服務器S交換彼此的地址信息時,他們也就應該“發現”了自己的IP地址和端口——也就是服務器S所發現的。兩個客戶端同時的發送 數據包 到對方的公網地址和私有地址上,然后選擇首先使得通信成功的那個地址就可以了。如果兩個客戶端都位于同一個NAT之后,那么發往私有地址的數據包應該先于發往公網地址的數據包到達,這樣就建立了一個不包括NAT的直連通信通道。如果兩個客戶端位于不同NAT之后,雖然發送到對方私有地址的數據包會毫無疑問的發送失敗,但還是很有可能使用他們各自的公網IP地址來建立一條通信通道的。所以檢測這些數據包的方法和工作就變得非常重要,不論如何,只要雙方都處于不同NAT之后,就完全有可能 Client A 想發送到 Client B 的信息會被發到別的無關的地方去,反之亦然(Client B 想發送到 Client A的消息也會被發到別的無關的地方去)。



            (最后一句“unrelated node on A's private network”沒有完全理解是什么意思,總之,放到整個語境中,應該就是說,Client A 瞄準 Client B的私有地址端口的信息會被NAT轉發到別的地方去,因為兩者處于不同的NAT之后,NAT A 如果在 內部網絡 找到了一個擁有與Client B相同的私有地址的電腦,就會把信息發送過去,這樣,就根本不會發送到 Client B 上去)

            Posted on 2006-01-12 14:22 艾凡赫 閱讀(415) 評論(1)  編輯 收藏 引用 所屬分類: P2P

            Feedback

            # re: P2P communication across middleboxes(翻譯3)  回復  更多評論   

            2009-04-21 15:52 by 星綻紫輝
            非常不錯~~~感謝作者~~
            久久久精品日本一区二区三区| 亚洲精品tv久久久久| 久久精品国产亚洲av日韩| 青青草原精品99久久精品66| 97久久精品国产精品青草| 久久AⅤ人妻少妇嫩草影院| 中文字幕无码av激情不卡久久| 久久偷看各类wc女厕嘘嘘 | 久久e热在这里只有国产中文精品99| 日韩精品无码久久一区二区三| 一本一本久久aa综合精品| 亚洲国产精品久久久久婷婷软件| 色青青草原桃花久久综合| 91久久精品91久久性色| 久久久亚洲AV波多野结衣| 狠狠久久综合| 久久亚洲私人国产精品| 一级a性色生活片久久无| 超级碰久久免费公开视频| 欧美亚洲色综久久精品国产| 亚洲а∨天堂久久精品9966| 国产L精品国产亚洲区久久| 国产精品美女久久久m| 亚洲伊人久久大香线蕉综合图片 | 午夜精品久久影院蜜桃| 婷婷综合久久狠狠色99h| 亚洲av日韩精品久久久久久a| 无码精品久久一区二区三区 | 欧洲人妻丰满av无码久久不卡| 一本大道久久东京热无码AV| 久久精品成人欧美大片| 91久久香蕉国产熟女线看| 久久精品免费观看| 国产精品一久久香蕉国产线看| 久久精品a亚洲国产v高清不卡| 久久久久久久久久久久中文字幕 | 人人狠狠综合88综合久久| 青春久久| 婷婷久久香蕉五月综合加勒比| 亚洲AV日韩精品久久久久久| 久久夜色精品国产噜噜麻豆|