Download presentation
Presentation is loading. Please wait.
Published byEdward Miles Modified over 6 years ago
1
改良UDP洞穿技術設計物聯網通訊: 以遠端門鈴監控系統為例 Improving UDP Hole Punching Technique For IoT Communications: A Remote Door-bell Monitoring System 報告時間28~32分佳 楊凱勝 指導教授:柯開維 博士 2017/6/29
2
Outline Introduction Background Proposed Method
Network Address Translator (NAT) UDP Hole Punching Proposed Method Experiment and Result Analysis Conclusion Reference
3
Introduction
4
Introduction The IPv4 address is not enough and IPv6 is still not widespread. The necessary of IP address in IoT environment. Improve the existed NAT traversal method – UDP hole punching. Make an smart home IoT application to verify the usability of the proposed method.
5
Background
6
Network Address Translator (NAT)
Translate private IP addresses to a global IP address.
7
Network Address Translator (NAT)
In general, there are for types of NAT. Full Cone NAT Restricted Cone NAT Port Restricted Cone NAT Symmetric NAT
8
Full Cone NAT
9
Restricted Cone NAT
10
Port Restricted Cone NAT
11
Symmetric NAT
12
UDP Hole Punching Technique
13
Proposed Method
14
Proposed Method Establish TCP connection to make sure the client can receive control message from server. Predict the next port number used by Symmetric NAT. Create a number of mappings (holes) of NAT to increase success rate. Add two retry process. 現在有許多穿越NAT的方法 像是UPnP ICE ALG TURN等等 我簡單介紹一下TURN TURN足以穿透Symmetric NAT 防火牆,他的運作原理是: Sender先將他想送的資料全部送給有Global IP地址的TURN Server, TURN Server再把資料轉送給Receiver。 雖然這樣可以穿越防火牆,但已經喪失了P2P通訊的特色,變成Client-Server模式,Server須承擔所有頻寬。因此,這個解決辦法應該是在萬不得已下才能考慮使用的。 那因為這一篇PAPER有用到STUN的概念,因此下一頁我會詳細說明STUN
15
I. Register Phase
16
II. Port Prediction Phase
18
III. Hole Punching Phase
19
IV. Peer-to-Peer Connection Phase
21
Experiment and Result Analysis
22
Experiment Step Use the “Stun client” application downloaded from Google Play to determine the type of 7 NAT device.
23
Experiment Step (con’t)
Implement the original and proposed method. Use the methods 10 times per combinations of NAT devices to traverse the NAT. In each try, if two peers got packet from another, then success, otherwise fail.
24
Architecture
26
Success Rate (Original Method)
O = 100%, X = 0% in 10 tries
27
Success Rate (Proposed Method)
O = 100%, X = 0% in 10 tries
28
Time Cost (Original Method)
29
Time Cost (Proposed Method)
30
Experiment Step (con’t)
A smart-home IoT application to verify the usability of the proposed method – A remote doorbell monitoring system. Two android phones, one acts doorbell, the other one acts monitor.
31
Experiment Step (con’t)
32
Conclusion
33
Conclusion This proposed an improved UDP hole punching technique.
The proposed method gets higher successful rate than the original one. Although it increases the cost of time, but the overhead can be ignored by human in most cases. The method can be applied to Android phone application and to smart home IoT environment.
34
References P. Srisuresh, B.Ford, D.Kegel, “State of Peer-to-Peer (P2P) Communication across Network Address Translators (NATs),” RFC- 5128, 2008 Wei, Y., Yamada, D., Yoshida, S., Goto, S., “A New Method for Symmetric NAT Traversal in UDP and TCP Network”, 2008 Kuan-Lin Chen, Shaw-Hwa Hwang, Cheng-Yu Yeh, "Symmetric NAT Traversal Method for Session Initial Protocol (SIP)", Applied Mechanics and Materials, pp , 2013. Ha Tran Thi Thu, Jaehyung Park, Yonggwan Won, Jinsul Kim, ”Combining STUN Protocol and UDP Hole Punching Technique for Peer-To-Peer Communication across Network Address Translation”, IT Convergence and Security (ICITCS) International Conference, 2014
35
進度報告 未完成進度 論文初稿 App優化
36
Thanks.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.