How is intelligence traversal realized?
Last modified date: 2017/04/20 views: 936

How is intelligence traversal realized?


Traversal Technology: STUN/TURN/ICE
STUN protocol realizes NAT traversal by providing a way for terminals to find out its public mapped IP address after NAT and replace the private IP address on application layer with it. In the classic NAT traversal scenario of STUN: STUN client sends a Binding Request to STUN server on the public Internet. STUN server finds out client’s pubic mapped IP address of STUN client after receiving the request, then attaches it in the Binding Response and sends to STUN client. Hence, terminal A can complete the media negotiate with terminal B with its public IP address instead of private IP address.
TURN and STUN both realize NAT traversal by replacing private IP address with public mapped IP address. But the difference is that TURN realizes traversal through an ‘agent’ between two clients. In this way, each client needs to establish communication with TRUN server on public Internet, then TURN server forwards data for them.
Compared with STUN and TURN, ICE is not a NAT traversal protocol but a framework. In this framework, it integrates the existed NAT traversal protocols such as STUN, TURN, RSIP etc. Unlike the other NAT traversal solutions, ICE is more exploring and creative which tries to obtain as many information of itself and opposite ends as possible to establish data channel and update the early-released information at the same time to find out and select the feasible data channel which can traverse NAT.

Product Type
Yealink Cloud , VC Desktop Software , VC Mobile for Android , VC400 , VC120 , VC110 , T49G , CP860
Please login to post your comment