相似文献/References:
[1]宫博 王汝传.基于会话的局域网P2P流量识别方法的研究[J].计算机技术与发展,2010,(03):5.
GONG Bo,WANG Ru-chuan.Research on Method of Session - Based P2P Network Traffic Identification[J].,2010,(10):5.
[2]王思敏 葛玮 王学强 潘天石.基于隧道模式的校园网多出口解决方案[J].计算机技术与发展,2008,(10):250.
WANG Si-min,GE Wei,WANG Xue-qiang,et al.A Solution about Multi- Export Campus Network Based on Tunnel Model[J].,2008,(10):250.
[3]韩风 施寅.Http隧道在穿越NAT/防火墙技术中的应用[J].计算机技术与发展,2006,(05):163.
HAN Feng,SHI Yin.Application of Http Tunnel in Traversal NAT/Firewall[J].,2006,(10):163.
[4]魏臻 杨海潮.一种改进的IPSec穿越NAT方案[J].计算机技术与发展,2006,(08):80.
W-EI Zhen,YANG Hai-chao.An Improved IPSec- NAT Traversal Solution[J].,2006,(10):80.
[5]梁武.基于ACE的TCP穿透NAT技术原理及实现[J].计算机技术与发展,2011,(07):224.
LIANG Wu.Realization of TCP Traversal through NATs Based on ACE[J].,2011,(10):224.
[6]周敏[],余慕春[],黄维丰[]. 综合UDP打洞与Http代理的SIP穿越NAT方案[J].计算机技术与发展,2014,24(08):147.
ZHOU Min[],YU Mu-chun[],HUANG Wei-feng[]. Solution of NAT Traversal in SIP Integrated UDP Hole Punching and Http Proxy[J].,2014,24(10):147.