Measurements on the Feasibility of TCP NAT Traversal in Cellular Networks

This paper studies various techniques to overcome the barriers that firewalls and NATs cause to peer-to-peer connectivity. In the mobile context firewalls and NATs are typically managed by the mobile operator and are thus beyond the control of the mobile user. Therefore the focus of this paper is on techniques that take advantage of known behaviors of NATs and firewalls. Instead of studying how to apply explicit control to these devices we analyze how the different NAT and firewall traversal techniques would work in different cellular networks. To get an idea of operator NAT/firewall behavior we measured six cellular networks in different parts of the world. The analysis of the results shows that there is much variance in these networks; three to four (depending on the used approach) of the networks seem to allow TCP traffic between peers behind NATs or firewalls.

[1]  Pyda Srisuresh NAT Behavioral Requirements for ICMP protocol , 2006 .

[2]  Saikat Guha,et al.  Characterization and measurement of TCP traversal through NATs and firewalls , 2005, IMC '05.

[3]  Saikat Guha,et al.  NUTSS: a SIP-based approach to UDP and TCP network connectivity , 2004, FDNA '04.

[4]  Jon Postel,et al.  DOD standard transmission control protocol , 1980, CCRV.

[5]  Melinda Shore,et al.  Middlebox Communications (midcom) Protocol Requirements , 2002, RFC.

[6]  Jeffrey L. Eppinger TCP Connections for P2P Apps: A Software Approach to Solving the NAT Problem , 2005 .

[7]  Jonathan D. Rosenberg,et al.  Interactive Connectivity Establishment (ICE): A Protocol for Network Address Translator (NAT) Traversal for Offer/Answer Protocols , 2010, RFC.

[8]  Bryan Ford,et al.  Peer-to-Peer Communication Across Network Address Translators , 2005, USENIX Annual Technical Conference, General Track.

[9]  Hu Shaohai,et al.  Establishing TCP connections between hosts behind NATs , 2006 .

[10]  Henning Schulzrinne,et al.  An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol , 2004, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[11]  Cullen Jennings,et al.  NAT Behavioral Requirements for Unicast UDP , 2004 .

[12]  T. Nixon,et al.  Home networking with Universal Plug and Play , 2001 .

[13]  Christian Huitema,et al.  STUN - Simple Traversal of User Datagram Protocol (UDP) Through Network Address Translators (NATs) , 2003, RFC.

[14]  Adrian Perrig,et al.  NATBLASTER: Establishing TCP Connections Between Hosts Behind NATs ∗ , 2005 .