When.com Web Search

  1. Ad

    related to: nat hole punching diagram

Search results

  1. Results From The WOW.Com Content Network
  2. Hole punching (networking) - Wikipedia

    en.wikipedia.org/wiki/Hole_punching_(networking)

    Hole punching (or sometimes punch-through) is a technique in computer networking for establishing a direct connection between two parties in which one or both are behind firewalls or behind routers that use network address translation (NAT). To punch a hole, each client connects to an unrestricted third-party server that temporarily stores ...

  3. TCP hole punching - Wikipedia

    en.wikipedia.org/wiki/TCP_hole_punching

    All TCP NAT traversal and hole punching techniques have to solve the port prediction problem. A NAT port allocation can be one of the two: predictable the gateway uses a simple algorithm to map the local port to the NAT port. Most of the time a NAT will use port preservation, which means that the local port is mapped to the same port on the NAT.

  4. UDP hole punching - Wikipedia

    en.wikipedia.org/wiki/UDP_hole_punching

    UDP hole punching is a method for establishing bidirectional UDP connections between Internet hosts in private networks using network address translators. The technique is not applicable in all scenarios or with all types of NATs, as NAT operating characteristics are not standardized.

  5. NAT traversal - Wikipedia

    en.wikipedia.org/wiki/NAT_traversal

    Traversal Using Relays around NAT (TURN) is a relay protocol designed specifically for NAT traversal. NAT hole punching is a general technique that exploits how NATs handle some protocols (for example, UDP, TCP, or ICMP) to allow previously blocked packets through the NAT. UDP hole punching; TCP hole punching; ICMP hole punching

  6. Network address translation - Wikipedia

    en.wikipedia.org/wiki/Network_address_translation

    The most popular technique for TCP NAT traversal is TCP hole punching. TCP hole punching requires the NAT to follow the port preservation design for TCP. For a given outgoing TCP communication, the same port numbers are used on both sides of the NAT. NAT port preservation for outgoing TCP connections is crucial for TCP NAT traversal because ...

  7. ICMP hole punching - Wikipedia

    en.wikipedia.org/wiki/ICMP_hole_punching

    ICMP hole punching is a technique employed in network address translator (NAT) applications for maintaining Internet Control Message Protocol (ICMP) packet streams that traverse the NAT. NAT traversal techniques are typically required for client-to-client networking applications on the Internet involving hosts connected in private networks ...

  8. STUN - Wikipedia

    en.wikipedia.org/wiki/STUN

    STUN (Session Traversal Utilities for NAT; originally Simple Traversal of User Datagram Protocol (UDP) through Network Address Translators) is a standardized set of methods, including a network protocol, for traversal of network address translator (NAT) gateways in applications of real-time voice, video, messaging, and other interactive communications.

  9. Teredo tunneling - Wikipedia

    en.wikipedia.org/wiki/Teredo_tunneling

    That ensures that the server can always contact any of its clients—which is required for NAT hole punching to work properly. If a Teredo relay (or another Teredo client) must send an IPv6 packet to a Teredo client, it first sends a Teredo bubble packet to the client's Teredo server, whose IP address it infers from the Teredo IPv6 address of ...