How is intelligence traversal realized?
Last modified date: 2017/04/20 views: 606
Description

How is intelligence traversal realized?

Resolution

Traversal Technology: STUN/TURN/ICE
STUN
STUN protocol realizes NAT traversal by providing a way for terminals to find out its public mapped IP address after NAT and replace the private IP address on application layer with it. In the classic NAT traversal scenario of STUN: STUN client sends a Binding Request to STUN server on the public Internet. STUN server finds out client’s pubic mapped IP address of STUN client after receiving the request, then attaches it in the Binding Response and sends to STUN client. Hence, terminal A can complete the media negotiate with terminal B with its public IP address instead of private IP address.
TURN
TURN and STUN both realize NAT traversal by replacing private IP address with public mapped IP address. But the difference is that TURN realizes traversal through an ‘agent’ between two clients. In this way, each client needs to establish communication with TRUN server on public Internet, then TURN server forwards data for them.
ICE
Compared with STUN and TURN, ICE is not a NAT traversal protocol but a framework. In this framework, it integrates the existed NAT traversal protocols such as STUN, TURN, RSIP etc. Unlike the other NAT traversal solutions, ICE is more exploring and creative which tries to obtain as many information of itself and opposite ends as possible to establish data channel and update the early-released information at the same time to find out and select the feasible data channel which can traverse NAT.


Product Type
Yealink VC Cloud Management Service , VC Desktop Software , VC Mobile for Android , VC400 , VC120 , VC110 , T49G , CP860
200/200
Please login to post your comment