2009
DOI: 10.1016/j.jss.2009.03.078
|View full text |Cite
|
Sign up to set email alerts
|

Challenge and solutions of NAT traversal for ubiquitous and pervasive applications on the Internet

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
7
0

Year Published

2013
2013
2017
2017

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 15 publications
(7 citation statements)
references
References 29 publications
0
7
0
Order By: Relevance
“…The remote client receives the audio samples by phone and converts them back into NAT traversal configuration data. Chen and Jia (2009) attempted to redesign a new NAT framework to accommodate NAT problems all at once. NATng (Chen and Jia, 2009) is framework that includes a bidirectional NAT and a Domain Name System Application Level Gateway (DNSALG) for providing private address name resolutions and hole punching control function.…”
Section: Stun Servermentioning
confidence: 99%
See 3 more Smart Citations
“…The remote client receives the audio samples by phone and converts them back into NAT traversal configuration data. Chen and Jia (2009) attempted to redesign a new NAT framework to accommodate NAT problems all at once. NATng (Chen and Jia, 2009) is framework that includes a bidirectional NAT and a Domain Name System Application Level Gateway (DNSALG) for providing private address name resolutions and hole punching control function.…”
Section: Stun Servermentioning
confidence: 99%
“…Chen and Jia (2009) attempted to redesign a new NAT framework to accommodate NAT problems all at once. NATng (Chen and Jia, 2009) is framework that includes a bidirectional NAT and a Domain Name System Application Level Gateway (DNSALG) for providing private address name resolutions and hole punching control function. These components coordinate and provide bidirectional access capability between intranet and internet.…”
Section: Stun Servermentioning
confidence: 99%
See 2 more Smart Citations
“…The studies in the literature that focus on this problem are named NAT/Firewall Traversal. Protocols/techniques proposed for the solution to this problem like STUN [4], TURN [7], PS-STUN [10], C-STUN [11] and newly developed traversal mechanisms [8]- [12] are incapable of solving the problem because of their disadvantages or insufficiencies.…”
mentioning
confidence: 99%