Research on Symmetric NAT Traversal in P2P applications

For security and share of Internet IP addresses, NAT (network address translation) firewalls are widely used to isolate the private networks from Internet in some enterprises/organizations. Unfortunately, NATs block the data transmitted directly between two clients under different private networks in many P2P (peer to peer) applications. A protocol, STUN, has been proposed by IETF to solve the problem. But if the NAT is symmetric NAT, the STUN can't tackle it effectively. Another protocol of TURN has been proposed to complement the limitation of STUN, however, it brings the additional cost of resources. Now, almost all the research into the problem are concentrated on using middle server to transmit data among clients although this way brings the additional consumption of network bandwidth and transmission delays at the same time. To solve this problem, this paper makes many practices in symmetric NAT traversal and proposes a new algorithm PS-STUN that can traversal symmetric NAT and transmits data directly between the clients in the situations where the STUN isn't enabling. Through emulation tests, we prove that the algorithm is efficient and can solve the symmetric NAT traversal trouble about STUN

[1]  Yi-Bing Lin,et al.  Tunneling IPv6 through NAT with Teredo mechanism , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).

[2]  Bill N. Schilit,et al.  Context-aware computing applications , 1994, Workshop on Mobile Computing Systems and Applications.

[3]  Yutaka Takeda,et al.  Symmetric NAT Traversal using STUN , 2003 .

[4]  Christian Huitema,et al.  STUN - Simple Traversal of UDP Through Network Address Translators , 2003 .

[5]  Ce-Kuen Shieh,et al.  Smart Tunnel Union for NAT Traversal , 2005, Fourth IEEE International Symposium on Network Computing and Applications.

[6]  Pyda Srisuresh,et al.  Traditional IP Network Address Translator (Traditional NAT) , 2001, RFC.

[7]  Atsushi Kara Private-to-private communications over the internet , 2004, Computer.

[8]  Jonathan Rosenberg Traversal Using Relay NAT (TURN) , 2005 .

[9]  Keith Cheverst,et al.  Using Context as a Crystal Ball: Rewards and Pitfalls , 2001, Personal and Ubiquitous Computing.

[10]  Weidong Jin,et al.  Multi-agent system for multimedia communications traversing NAT/firewall in next generation networks , 2004, Proceedings. Second Annual Conference on Communication Networks and Services Research, 2004..

[11]  Jason Pascoe,et al.  Adding generic contextual capabilities to wearable computers , 1998, Digest of Papers. Second International Symposium on Wearable Computers (Cat. No.98EX215).

[12]  Anind K. Dey,et al.  Understanding and Using Context , 2001, Personal and Ubiquitous Computing.