相似文献/References:
[1]宫博 王汝传.基于会话的局域网P2P流量识别方法的研究[J].计算机技术与发展,2010,(03):5.
GONG Bo,WANG Ru-chuan.Research on Method of Session - Based P2P Network Traffic Identification[J].,2010,(07):5.
[2]韩风 施寅.Http隧道在穿越NAT/防火墙技术中的应用[J].计算机技术与发展,2006,(05):163.
HAN Feng,SHI Yin.Application of Http Tunnel in Traversal NAT/Firewall[J].,2006,(07):163.
[3]魏臻 杨海潮.一种改进的IPSec穿越NAT方案[J].计算机技术与发展,2006,(08):80.
W-EI Zhen,YANG Hai-chao.An Improved IPSec- NAT Traversal Solution[J].,2006,(07):80.
[4]汤鹏杰 李奇润 唐凤仙.基于PPPoE的带宽汇聚NAT设计与实现[J].计算机技术与发展,2011,(10):95.
TANG Peng-jie,LI Qi-run,TANG Feng-xian.Design and Implementation of Bandwidth Aggregation NAT System Based on PPPoE[J].,2011,(07):95.
[5]周敏[],余慕春[],黄维丰[]. 综合UDP打洞与Http代理的SIP穿越NAT方案[J].计算机技术与发展,2014,24(08):147.
ZHOU Min[],YU Mu-chun[],HUANG Wei-feng[]. Solution of NAT Traversal in SIP Integrated UDP Hole Punching and Http Proxy[J].,2014,24(07):147.