{"title":"蜂窝网络中TCP NAT穿越可行性的测量","authors":"L. Makinen, J. Nurminen","doi":"10.1109/NGI.2008.42","DOIUrl":null,"url":null,"abstract":"This paper studies various techniques to overcome the barriers that firewalls and NATs cause to peer-to-peer connectivity. In the mobile context firewalls and NATs are typically managed by the mobile operator and are thus beyond the control of the mobile user. Therefore the focus of this paper is on techniques that take advantage of known behaviors of NATs and firewalls. Instead of studying how to apply explicit control to these devices we analyze how the different NAT and firewall traversal techniques would work in different cellular networks. To get an idea of operator NAT/firewall behavior we measured six cellular networks in different parts of the world. The analysis of the results shows that there is much variance in these networks; three to four (depending on the used approach) of the networks seem to allow TCP traffic between peers behind NATs or firewalls.","PeriodicalId":182496,"journal":{"name":"2008 Next Generation Internet Networks","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"14","resultStr":"{\"title\":\"Measurements on the Feasibility of TCP NAT Traversal in Cellular Networks\",\"authors\":\"L. Makinen, J. Nurminen\",\"doi\":\"10.1109/NGI.2008.42\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper studies various techniques to overcome the barriers that firewalls and NATs cause to peer-to-peer connectivity. In the mobile context firewalls and NATs are typically managed by the mobile operator and are thus beyond the control of the mobile user. Therefore the focus of this paper is on techniques that take advantage of known behaviors of NATs and firewalls. Instead of studying how to apply explicit control to these devices we analyze how the different NAT and firewall traversal techniques would work in different cellular networks. To get an idea of operator NAT/firewall behavior we measured six cellular networks in different parts of the world. The analysis of the results shows that there is much variance in these networks; three to four (depending on the used approach) of the networks seem to allow TCP traffic between peers behind NATs or firewalls.\",\"PeriodicalId\":182496,\"journal\":{\"name\":\"2008 Next Generation Internet Networks\",\"volume\":\"26 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-04-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"14\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 Next Generation Internet Networks\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NGI.2008.42\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 Next Generation Internet Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NGI.2008.42","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Measurements on the Feasibility of TCP NAT Traversal in Cellular Networks
This paper studies various techniques to overcome the barriers that firewalls and NATs cause to peer-to-peer connectivity. In the mobile context firewalls and NATs are typically managed by the mobile operator and are thus beyond the control of the mobile user. Therefore the focus of this paper is on techniques that take advantage of known behaviors of NATs and firewalls. Instead of studying how to apply explicit control to these devices we analyze how the different NAT and firewall traversal techniques would work in different cellular networks. To get an idea of operator NAT/firewall behavior we measured six cellular networks in different parts of the world. The analysis of the results shows that there is much variance in these networks; three to four (depending on the used approach) of the networks seem to allow TCP traffic between peers behind NATs or firewalls.