kccvoip.com basic voip training NAT/PAT extract 2008
|
|
- Georgia Bradford
- 6 years ago
- Views:
Transcription
1 kccvop.com basc vop tranng NAT/PAT extract 28 As we have seen n the prevous sldes, SIP and H2 both use addressng nsde ther packets to rely nformaton. Thnk of an envelope where we place the addresses of telephone/devce and call setup nformaton we want to send to the other VoIP user TO: 555-7@ FROM: @ use: G72 port: 188 The envelope s addressed to the other user TO: kccvop.net basc vop tranng extract 28
2 74 74 servces serv c es d rector es set t ngs d rectores set tngs AB C PQR S 74 servces drectores settngs 74 servces drectores settngs kccvop.com basc vop tranng NAT/PAT extract 28 and the return address s on the envelope FROM: and sent va the routng to the address on the envelope. constructed wth the SIP or H2 content the same way an IP packet s All works fne as long as the return address on the envelope are the same as the addresses nsde the envelope. Both telephones can route traffc to each other. In more detal, for example n SIP the call setup would use port 5 (at default) so each end knows to open the 5 envelope and read the contents to setup the audo stream ; caller sends the envelope to the remote TO FROM: USE: G72 PORT: : :5 kccvop.net basc vop tranng extract 28
3 DE F WX YZ CISCO IP P HONE 74 servces MN O drectores settngs CI SCO IP PH ON E 74 servces drectores settngs GHI JK L TU V CISCO IP PHO NE 74 me ss ag es servces d re ct or e s sett ngs GHI JK L TU V 74 servc es CISCO IP PH ONE 74 drectores s ettngs servces drectores settngs AB C 74 servces drectores settngs kccvop.com basc vop tranng NAT/PAT extract 28 (SIP would send as call setup usng port 5 as default) (H22 would send as call setup usng port 172 as default) remote responds to the caller wth ts requrements n a 5 envelope TO FROM:555-7 USE: G72 PORT: : :5 Then the audo stream can begn and the conversaton start G72 audo G72 audo : : : : G72 audo G72 audo : : : :1422 kccvop.net basc vop tranng extract 28
4 CISCO I P P HONE 74 CISCO IP PH ONE 7 4 m ess age s dr ecto re s se rvce s settngs me ss ag es d re cto res se rvc es se ttn gs WX YZ 74 m ess age s dre ctor es se rvce s se ttng s WX Y Z CIS CO I P P HON E 74 mes sag es se rv ces d re ct or es se ttn gs kccvop.com basc vop tranng NAT/PAT extract 28 Even for more complex calls wth several addresses and optons n the envelope. All works fne, because all the addresses are vald and routable TO: @ FROM:555-@ TRANSFER: @ USE: G72, G711 PORT: : : : :5 TO: @ FROM:555-@ TRANSFER: @ USE: G72, G711 PORT:144 Addresses nsde the SIP packets are real routable addresses and real port numbers allocated by the telephone systems to carry the audo streams. Now n the real-world - we have NAT and PAT If we are not usng IPv, we have the problem of lmted IPv4 address space and securty. so NAT s used to translate a publc address nto a prvate address ; NAT TO: @ FROM: 555-@ USE: G72 PORT: : : : :1422 TO: @ FROM 555-@ USE: G72 PORT: 1844 NOTICE that the address on the envelope no longer matches the address nsde. NAT has changed the prvate address nto the outsde publc address as t forwards the envelope to the remote ste. The remote ste can not respond to ths request because t does not know where s. Call setup fals. Smply put ; the address on the envelope s the publc address, but the address nsde the envelope s the prvate address. The prvate address has no meanng outsde of the orgnatng ste. kccvop.net basc vop tranng extract 28
5 GH I JK L TU V MN O CI SCO IP PH ONE 7 4 me ss ag es d re cto res se rvc es se ttn gs 74 servces drectores sett ngs WX Y Z CIS CO I P P HON E 74 mes sag es se rv ces d re ct or es se ttn gs CI SCO I P PH ON E 74 serv ces drectores settngs kccvop.com basc vop tranng NAT/PAT extract 28 When the envelope s opened at the remote end. The requested call setup addresses are prvate addresses, can not be routed and therefore can not be used. call setup fals. To fx ths - there are varous methods avalable, but all result n the publc address from the outsde of the envelope beng coped to the packets nsde the envelope NAT TO: @ FROM: 555-@ USE: G72 PORT: 1844 ADDRESS CORRECTION DONE IN SOFTWARE TO: @ FROM 555-@18..1 USE: G72 PORT: 1844 TO: @ FROM: 555-@ USE: G72 PORT: : : : :1422 Software runnng n the router, SBC, proxy, gateway or end devce uses STUN, ICE or TURN technques to read the outsde envelope address and re-wrte the nternal packet contents replacng the prvate address wth the publc address as t s sent out through NAT. Ths ensures the remote end receves the envelope wth the correctly addressed contents and the call setup can then proceed to the correct addresses. The same technque has to be appled to the audo stream addresses and port numbers (n each drecton) to mantan a translaton table and ensure the NAT publc to prvate addresses are re-wrtten n the SIP and RTP audo packets NAT G72 audo SRC = :1888 DST = :1844 ADDRESS CORRECTION DONE IN SOFTWARE G72 audo SRC = :1888 DST = :1844 G72 audo SRC = :1888 DST = :1844 kccvop.net basc vop tranng extract 28
6 PQR S PQR S 74 m ess age s dr ect ore s settngs se rvc es 74 m ess age s dr ect ore s se rvc es settngs 74 m es sag es dr ect ore s servces sett n gs kccvop.com basc vop tranng NAT/PAT extract 28 NOW magne NAT at both ends of the crcut.. twce as many translatons, but stll an easy soluton to handle the problems caused by these one-to-one NAT address translatons. All s workng agan through the NAT translaton.. but usng NAT on ts own only provdes a one-to-one mappng of publc to prvate addressng = we stll would need a publc address for every devce nsde our networks. not scalable not real-world. Hence PAT = port address translaton enables the enterprse to share a publc address among the hundreds of prvate addressed devces n the nternal network. So all the external packets have the same publc address but use a dfferent port number to correlate them wth ther orgnal prvate address and orgnal port number. PROBLEM for SIP/H2 etc.. once agan - the address on the envelope wll no longer match the address nsde the envelope.. but now a much more complex problem to fx... We now need to keep a database of NAT and PAT and how they relate to each SIP/H2 call, each voce stream and each control flow (and each vdeo stream) NAT & PAT ADDRESS CORRECTION DONE IN SOFTWARE telephone1 SIP call setup :5 becomes :142 RTP audo stream :188 becomes 18..1:1422 RTP audo control :187 becomes telephone2 SIP call setup becomes :142 RTP audo stream :1888 becomes :1424 RTP audo control :1887 becomes :1425 CALL SETUP SEEN FROM :142 and 142 AUDIO SENT BACK TO :1422 and 1424 AUDIO CONTROL SENT ON :1421 and 1425 the software has to keep track of whch port belongs to whch devce. and whch audo stream was requested by whch end devce and make all the necessary changes to the addresses and port numbers nsde each envelope. not too bad untl you factor n the features requred by the modern telephony systems = transfer, hold, re-drect, conference and three way callng etc. The software has to keep track of every stream n every flow. qute complex. not really we are just begnnng Next - let us factor nto the path a frewall or two kccvop.net basc vop tranng extract 28
7 7 4 messag es servces drectores settngs kccvop.com basc vop tranng NAT/PAT extract 28 One of the jobs of the frewall s to block traffc from the outsde that was not orgnated from the nsde. Here s another problem for our SIP or H2 traffc In ths example our telephone requested RT audo stream to be sent to t on port 144, the remote telephone requested port aud stream SRC: :1888 DST: :144 FIREWALL BLOCKS TRAFFIC AS IT DID NOT ORIGINATE INSIDE So call setup functoned correctly, but the audo stream faled because the frewall was not mult-meda aware or confgured for the audo streams. The frewall does ts job and blocks that audo stream from the remote telephone, because port 144 was ntated from the outsde. Drty fx would be to allow the RTP port range through the frewall. Ths would be an un-secure soluton as t opens all the RTP ports to the outsde world. A better soluton s to have the ntellgence n the frewalls to look nto the call setup packets and be SIP and/or H2 aware = For example n SIP - usng the SDP packet nformaton to read the requred audo ports and open the frewall to those port when the call s made. Put these scenaros all together an you have a very basc understandng of SIP/H2 NAT/PAT and Frewall handlng problems you may encounter. Next we wll revew the call setup and packet structure of SIP and H2 to understand the call flow setup, redrect, transfer and other features and see how NAT/PAT and frewalls can really screw you up. kccvop.net basc vop tranng extract 28
Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory
Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process
More informationWightman. Mobility. Quick Reference Guide THIS SPACE INTENTIONALLY LEFT BLANK
Wghtman Moblty Quck Reference Gude THIS SPACE INTENTIONALLY LEFT BLANK WIGHTMAN MOBILITY BASICS How to Set Up Your Vocemal 1. On your phone s dal screen, press and hold 1 to access your vocemal. If your
More informationThomson Gateways and Multiple IP Adresses
Thomson Gateways and Multple IP Adresses Date: June 2007 Verson: v1.0 Abstract: Applcablty: Ths applcaton note provdes techncal nformaton on how the Thomson Gateway DSL routers can be ntegrated n varous
More informationReal-Time Guarantees. Traffic Characteristics. Flow Control
Real-Tme Guarantees Requrements on RT communcaton protocols: delay (response s) small jtter small throughput hgh error detecton at recever (and sender) small error detecton latency no thrashng under peak
More informationNotes on Organizing Java Code: Packages, Visibility, and Scope
Notes on Organzng Java Code: Packages, Vsblty, and Scope CS 112 Wayne Snyder Java programmng n large measure s a process of defnng enttes (.e., packages, classes, methods, or felds) by name and then usng
More informationComplex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following.
Complex Numbers The last topc n ths secton s not really related to most of what we ve done n ths chapter, although t s somewhat related to the radcals secton as we wll see. We also won t need the materal
More informationVRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) ,
VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual
More informationIP Training Programme
IP Tranng Programme Module 1: IP Generc Sesson 4: Applcatons and protocols ROUTING PROTOCOLS 1 Route table creaton The route table n routers can be created and mantaned n two ways 1: Statc route table
More informationSetup and Use. Version 3.7 2/1/2014
Verson 3.7 2/1/2014 Setup and Use MaestroSoft, Inc. 1750 112th Avenue NE, Sute A200, Bellevue, WA 98004 425.688.0809 / 800.438.6498 Fax: 425.688.0999 www.maestrosoft.com Contents Text2Bd checklst 3 Preparng
More informationSetup and Use. For events not using AuctionMaestro Pro. Version /7/2013
Verson 3.1.2 2/7/2013 Setup and Use For events not usng AuctonMaestro Pro MaestroSoft, Inc. 1750 112th Avenue NE, Sute A200, Bellevue, WA 98004 425.688.0809 / 800.438.6498 Fax: 425.688.0999 www.maestrosoft.com
More informationRESISTIVE CIRCUITS MULTI NODE/LOOP CIRCUIT ANALYSIS
RESSTE CRCUTS MULT NODE/LOOP CRCUT ANALYSS DEFNNG THE REFERENCE NODE S TAL 4 THESTATEMENT 4 S MEANNGLES UNTL THE REFERENCE PONT S DEFNED BY CONENTON THE GROUND SYMBOL SPECFES THE REFERENCE PONT. ALL NODE
More informationwith Optic65 and Optic25 Cameras FOR OUTDOOR TRACKING ONLY unless used in conjunction with the Indoor Tracking Accessory.
wth Optc6 and Optc Cameras Quck Start Gude FOR OUTDOOR TRACKING ONLY unless used n conjuncton wth the Indoor Trackng Accessory. CONGRATULATIONS ON SCORING YOUR SOLOSHOT Our category-creatng lne of personal
More informationEvaluation of an Enhanced Scheme for High-level Nested Network Mobility
IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.
More informationCisco TelePresence MCU 4200 Series
Csco TelePresence MCU 4200 Seres Gettng started 61-0002-08 Contents General nformaton... 3 About the Csco TelePresence MCU 4200 Seres... 3 Package contents... 3 Port and LED locaton... 3 LED behavor...
More informationAvaya Scopia XT Meeting Center
Avaya Scopa XT Meetng Center Quck Setup Gude Sngle Montor Dual Montor Package Content: Cart Components 3x/4x IEC320 Power Cords Internatonal (4xIEC) Outlet Strp Avaya Scopa XT Meetng Center Quck Setup
More informationCodian MCU MCU 4200 Series
Codan MCU MCU 4200 Seres Gettng started Codan MCU MCU 4200 Seres Gettng started Copyrght Codan 2008. All rghts reserved. Ths Gettng Started Gude may not be coped, photocoped, translated, reproduced, or
More informationAvaya T3 Telephones connected to Integral 5 Setting up and using conference bridge Appendix to user s guide
Avaya T3 Telephones connected to Integral 5 Settng up and usng conference brdge Appendx to user s gude Issue 1 Integral 5 Software Release 2.6 September 2009 Use conference room Use conference room Your
More informationELEC 377 Operating Systems. Week 6 Class 3
ELEC 377 Operatng Systems Week 6 Class 3 Last Class Memory Management Memory Pagng Pagng Structure ELEC 377 Operatng Systems Today Pagng Szes Vrtual Memory Concept Demand Pagng ELEC 377 Operatng Systems
More informationIP Camera Configuration Software Instruction Manual
IP Camera 9483 - Confguraton Software Instructon Manual VBD 612-4 (10.14) Dear Customer, Wth your purchase of ths IP Camera, you have chosen a qualty product manufactured by RADEMACHER. Thank you for the
More informationIf you miss a key. Chapter 6: Demand Paging Source:
ADRIAN PERRIG & TORSTEN HOEFLER ( -6- ) Networks and Operatng Systems Chapter 6: Demand Pagng Source: http://redmne.replcant.us/projects/replcant/wk/samsunggalaxybackdoor If you mss a key after yesterday
More informationADRIAN PERRIG & TORSTEN HOEFLER ( -6- ) Networks and Operatng Systems Chapter 6: Demand Pagng Page Table Structures Page table structures Page table structures Problem: smple lnear table s too bg Problem:
More informationDLK Pro the all-rounder for mobile data downloading. Tailor-made for various requirements.
DLK Pro the all-rounder for moble data downloadng Talor-made for varous requrements www.dtco.vdo.com Smply brllant, brllantly smple Always the rght soluton The DLK Pro s the VDO product famly, whch sets
More information#4 Inverted page table. The need for more bookkeeping. Inverted page table architecture. Today. Our Small Quiz
ADRIAN PERRIG & TORSTEN HOEFLER Networks and Operatng Systems (-6-) Chapter 6: Demand Pagng http://redmne.replcant.us/projects/replcant/wk/samsunggalaxybackdoor () # Inverted table One system-wde table
More informationRange images. Range image registration. Examples of sampling patterns. Range images and range surfaces
Range mages For many structured lght scanners, the range data forms a hghly regular pattern known as a range mage. he samplng pattern s determned by the specfc scanner. Range mage regstraton 1 Examples
More informationCircuit Analysis I (ENGR 2405) Chapter 3 Method of Analysis Nodal(KCL) and Mesh(KVL)
Crcut Analyss I (ENG 405) Chapter Method of Analyss Nodal(KCL) and Mesh(KVL) Nodal Analyss If nstead of focusng on the oltages of the crcut elements, one looks at the oltages at the nodes of the crcut,
More informationWireless Temperature Monitoring Overview
Wreless Temperature Montorng Overvew Wreless Temperature Montorng and Alerts. Your Dashboard gves you advanced montorng, alerts (SMS or Emals), graphng and PDF reports from anywhere n the world. Product
More informationSimulation Based Analysis of FAST TCP using OMNET++
Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months
More informationCMPS 10 Introduction to Computer Science Lecture Notes
CPS 0 Introducton to Computer Scence Lecture Notes Chapter : Algorthm Desgn How should we present algorthms? Natural languages lke Englsh, Spansh, or French whch are rch n nterpretaton and meanng are not
More informationLoop Transformations for Parallelism & Locality. Review. Scalar Expansion. Scalar Expansion: Motivation
Loop Transformatons for Parallelsm & Localty Last week Data dependences and loops Loop transformatons Parallelzaton Loop nterchange Today Scalar expanson for removng false dependences Loop nterchange Loop
More informationLOOP ANALYSIS. The second systematic technique to determine all currents and voltages in a circuit
LOOP ANALYSS The second systematic technique to determine all currents and voltages in a circuit T S DUAL TO NODE ANALYSS - T FRST DETERMNES ALL CURRENTS N A CRCUT AND THEN T USES OHM S LAW TO COMPUTE
More informationProblem Set 3 Solutions
Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,
More informationCompiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz
Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster
More informationAssembler. Building a Modern Computer From First Principles.
Assembler Buldng a Modern Computer From Frst Prncples www.nand2tetrs.org Elements of Computng Systems, Nsan & Schocken, MIT Press, www.nand2tetrs.org, Chapter 6: Assembler slde Where we are at: Human Thought
More informationSupport Vector Machines
/9/207 MIST.6060 Busness Intellgence and Data Mnng What are Support Vector Machnes? Support Vector Machnes Support Vector Machnes (SVMs) are supervsed learnng technques that analyze data and recognze patterns.
More informationReal-time interactive applications
Real-tme nteractve applcatons PC-2-PC phone PC-2-phone Dalpad Net2phone vdeoconference Webcams Now we look at a PC-2-PC Internet phone example n detal Internet phone over best-effort (1) Best effort packet
More informationRe-routing Instability in IEEE Multi-hop Ad-hoc Networks *
Re-routng Instablty n IEEE 802.11 Mult-hop Ad-hoc Networks * Png Chung Ng and Soung Chang Lew Department of Informaton Engneerng The Chnese Unversty of Hong Kong {pcng3, soung}@e.cuhk.edu.hk Abstract TCP
More informationNachos Project 3. Speaker: Sheng-Wei Cheng 2010/12/16
Nachos Project Speaker: Sheng-We Cheng //6 Agenda Motvaton User Programs n Nachos Related Nachos Code for User Programs Project Assgnment Bonus Submsson Agenda Motvaton User Programs n Nachos Related Nachos
More informationBrave New World Pseudocode Reference
Brave New World Pseudocode Reference Pseudocode s a way to descrbe how to accomplsh tasks usng basc steps lke those a computer mght perform. In ths week s lab, you'll see how a form of pseudocode can be
More informationIntro. Iterators. 1. Access
Intro Ths mornng I d lke to talk a lttle bt about s and s. We wll start out wth smlartes and dfferences, then we wll see how to draw them n envronment dagrams, and we wll fnsh wth some examples. Happy
More informationAMath 483/583 Lecture 21 May 13, Notes: Notes: Jacobi iteration. Notes: Jacobi with OpenMP coarse grain
AMath 483/583 Lecture 21 May 13, 2011 Today: OpenMP and MPI versons of Jacob teraton Gauss-Sedel and SOR teratve methods Next week: More MPI Debuggng and totalvew GPU computng Read: Class notes and references
More informationComputer Animation and Visualisation. Lecture 4. Rigging / Skinning
Computer Anmaton and Vsualsaton Lecture 4. Rggng / Sknnng Taku Komura Overvew Sknnng / Rggng Background knowledge Lnear Blendng How to decde weghts? Example-based Method Anatomcal models Sknnng Assume
More informationmquest Quickstart Version 11.0
mquest Quckstart Verson 11.0 cluetec GmbH Emmy-Noether-Straße 17 76131 Karlsruhe Germany www.cluetec.de www.mquest.nfo cluetec GmbH Karlsruhe, 2016 Document verson 5 27.04.2016 16:59 > Propretary notce
More informationExercises (Part 4) Introduction to R UCLA/CCPR. John Fox, February 2005
Exercses (Part 4) Introducton to R UCLA/CCPR John Fox, February 2005 1. A challengng problem: Iterated weghted least squares (IWLS) s a standard method of fttng generalzed lnear models to data. As descrbed
More informationCTS2134 Introduction to Networking. Module Network Implementation
CTS2134 Introduction to Networking Module 05.5 05.8 Network Implementation NAT Facts NAT (Network Address Translation) allows you to connect a private network to the Internet without obtaining registered
More informationSteps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices
Steps for Computng the Dssmlarty, Entropy, Herfndahl-Hrschman and Accessblty (Gravty wth Competton) Indces I. Dssmlarty Index Measurement: The followng formula can be used to measure the evenness between
More informationFault Detection in Rule-Based Software Systems
Fault Detecton n Rule-Based Software Systems Dong Wang, Rubng Hao and Davd Lee Bell Labs Research Chna Bejng, Chna, 100080 {wangd, rbhao, leedavd}@lucent.com Abstract Motvated by packet flterng of frewall
More informationTN348: Openlab Module - Colocalization
TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages
More informationService Provider PAT Port Allocation Enhancement for RTP and RTCP
Service Provider PAT Port Allocation Enhancement for RTP and RTCP Problem Overview With the increase in the use of multimedia and real-time traffic over the Internet, private network administrators face
More informationLobachevsky State University of Nizhni Novgorod. Polyhedron. Quick Start Guide
Lobachevsky State Unversty of Nzhn Novgorod Polyhedron Quck Start Gude Nzhn Novgorod 2016 Contents Specfcaton of Polyhedron software... 3 Theoretcal background... 4 1. Interface of Polyhedron... 6 1.1.
More informationConfiguring Hosted NAT Traversal for Session Border Controller
Configuring Hosted NAT Traversal for Session Border Controller The Cisco IOS Hosted NAT Traversal for Session Border Controller Phase-1 feature enables a Cisco IOS Network Address Translation (NAT) Session
More informationOperator's Manual EU4 / EU6 / EU8. External Unwinder. Made in Germany
Operator's Manual External Unwnder EU4 / EU6 / EU8 Made n Germany 2 Operator's Manual 2 for the followng products Part.-No. Descrpton Type 5946091 External Unwnder EU4 5946421 External Unwnder EU6 5945806
More informationSMART PHOTO PRINTER USER'S GUIDE. Version V MODEL SmartD90-EV
SMART PHOTO PRINTER MODEL SmartD90-EV USER'S GUIDE Verson V1.5.2.0 1 TABLE OF CONTENTS Introducton Introducton 3 Bascs 4 Constructon of compostons 5 Operaton Easy Prnt Servce 8 Fun Prnt Servce 10 Sharng
More informationCollaboratively Regularized Nearest Points for Set Based Recognition
Academc Center for Computng and Meda Studes, Kyoto Unversty Collaboratvely Regularzed Nearest Ponts for Set Based Recognton Yang Wu, Mchhko Mnoh, Masayuk Mukunok Kyoto Unversty 9/1/013 BMVC 013 @ Brstol,
More informationTechnical White Paper for NAT Traversal
V300R002 Technical White Paper for NAT Traversal Issue 01 Date 2016-01-15 HUAWEI TECHNOLOGIES CO., LTD. 2016. All rights reserved. No part of this document may be reproduced or transmitted in any form
More informationProfessional competences training path for an e-commerce major, based on the ISM method
World Transactons on Engneerng and Technology Educaton Vol.14, No.4, 2016 2016 WIETE Professonal competences tranng path for an e-commerce maor, based on the ISM method Ru Wang, Pn Peng, L-gang Lu & Lng
More informationGoals and Approach Type of Resources Allocation Models Shared Non-shared Not in this Lecture In this Lecture
Goals and Approach CS 194: Dstrbuted Systems Resource Allocaton Goal: acheve predcable performances Three steps: 1) Estmate applcaton s resource needs (not n ths lecture) 2) Admsson control 3) Resource
More informationConfiguration manual. Grandstream Type: Analog Telephone Adapter. Configuration manual Grandstream Version 1.2
Configuration manual Grandstream Type: Analog Telephone Adapter Configuration manual Grandstream Version 1.2 Contents 1 Introduction 1 2 Key terms and abbreviations 1 3 Logging on to the web interface
More informationCommon Components. Cisco Unified Border Element (SP Edition) Configuration Profile Examples 5 OL
The following components of the Cisco Unified Border Element are common to all of the configuration profile examples in this document. Secure Media Adjacencies Call Policies CAC Policies SIP Profiles 5
More informationThe example below contains two doors and no floor level obstacles. Your panel calculator should now look something like this: 2,400
Step 1: A r c h t e c t u r a l H e a t n g o begn wth you must prepare a smple drawng for each room n whch you wsh to nstall our Heat Profle Skrtng Heatng System. You certanly don't need to be Pcasso,
More informationOptimal Fault-Tolerant Routing in Hypercubes Using Extended Safety Vectors
Optmal Fault-Tolerant Routng n Hypercubes Usng Extended Safety Vectors Je Wu Department of Computer Scence and Engneerng Florda Atlantc Unversty Boca Raton, FL 3343 Feng Gao, Zhongcheng L, and Ynghua Mn
More informationT3 (IP) Classic connected to Integral 5
T3 (IP) Classc connected to Integral 5 Benutzerhandbuch User s gude Manual de usuaro Manuel utlsateur Manuale d uso Gebrukersdocumentate Contents Contents Famlarze yourself wth your telephone Important
More informationHybrid Non-Blind Color Image Watermarking
Hybrd Non-Blnd Color Image Watermarkng Ms C.N.Sujatha 1, Dr. P. Satyanarayana 2 1 Assocate Professor, Dept. of ECE, SNIST, Yamnampet, Ghatkesar Hyderabad-501301, Telangana 2 Professor, Dept. of ECE, AITS,
More information124 Chapter 8. Case Study: A Memory Component ndcatng some error condton. An exceptonal return of a value e s called rasng excepton e. A return s ssue
Chapter 8 Case Study: A Memory Component In chapter 6 we gave the outlne of a case study on the renement of a safe regster. In ths chapter wepresent the outne of another case study on persstent communcaton;
More informationT3 Classic connected to IP Office
elephony IP T Contact Centers Moblty Servces T3 Classc connected to IP Offce Benutzerhandbuch User s gude Manual de usuaro Manuel utlsateur Manuale d uso Gebrukersdocumentate Contents Contents Famlarse
More informationCHAPTER 2 DECOMPOSITION OF GRAPHS
CHAPTER DECOMPOSITION OF GRAPHS. INTRODUCTION A graph H s called a Supersubdvson of a graph G f H s obtaned from G by replacng every edge uv of G by a bpartte graph,m (m may vary for each edge by dentfyng
More informationSome Tutorial about the Project. Computer Graphics
Some Tutoral about the Project Lecture 6 Rastersaton, Antalasng, Texture Mappng, I have already covered all the topcs needed to fnsh the 1 st practcal Today, I wll brefly explan how to start workng on
More informationMachine Learning 9. week
Machne Learnng 9. week Mappng Concept Radal Bass Functons (RBF) RBF Networks 1 Mappng It s probably the best scenaro for the classfcaton of two dataset s to separate them lnearly. As you see n the below
More informationAgenda & Reading. Simple If. Decision-Making Statements. COMPSCI 280 S1C Applications Programming. Programming Fundamentals
Agenda & Readng COMPSCI 8 SC Applcatons Programmng Programmng Fundamentals Control Flow Agenda: Decsonmakng statements: Smple If, Ifelse, nested felse, Select Case s Whle, DoWhle/Untl, For, For Each, Nested
More information2x x l. Module 3: Element Properties Lecture 4: Lagrange and Serendipity Elements
Module 3: Element Propertes Lecture : Lagrange and Serendpty Elements 5 In last lecture note, the nterpolaton functons are derved on the bass of assumed polynomal from Pascal s trangle for the fled varable.
More informationK-means and Hierarchical Clustering
Note to other teachers and users of these sldes. Andrew would be delghted f you found ths source materal useful n gvng your own lectures. Feel free to use these sldes verbatm, or to modfy them to ft your
More informationCisco IP Phone Configuration Guide
Version 1.0 Date: 2016.09.21 Yeastar Information Technology Co. Ltd. Introduction This guide introduces how to configure Cisco IP phones with Yeastar S-Series VoIP PBX. You have multiple ways to configure
More informationProduct documentation. Issue:
Product documentaton Issue: 02.05.2017 Table of Contents Product documentaton 1 enet SMART HOME system... 5 1.1 System requrements... 5 1.2 Commssonng va... 5 1.3 Operaton va enet SMART HOME app... 7 2
More informationConnection-information-based connection rerouting for connection-oriented mobile communication networks
Dstrb. Syst. Engng 5 (1998) 47 65. Prnted n the UK PII: S0967-1846(98)90513-7 Connecton-nformaton-based connecton reroutng for connecton-orented moble communcaton networks Mnho Song, Yanghee Cho and Chongsang
More informationAnalysis of Collaborative Distributed Admission Control in x Networks
1 Analyss of Collaboratve Dstrbuted Admsson Control n 82.11x Networks Thnh Nguyen, Member, IEEE, Ken Nguyen, Member, IEEE, Lnha He, Member, IEEE, Abstract Wth the recent surge of wreless home networks,
More informationSolution Brief: Creating a Secure Base in a Virtual World
Soluton Bref: Creatng a Secure Base n a Vrtual World Soluton Bref: Creatng a Secure Base n a Vrtual World Abstract The adopton rate of Vrtual Machnes has exploded at most organzatons, drven by the mproved
More informationOracle Database: 12c Administrator
Oracle Database: 12c Admnstrator 1 Duraton: 5 Days (30 hours) What you wll learn: Ths Oracle Database: SQL and PL/SQL Fundamentals tranng delvers the fundamentals of SQL and PL/SQL along wth the benefts
More informationSRB: Shared Running Buffers in Proxy to Exploit Memory Locality of Multiple Streaming Media Sessions
SRB: Shared Runnng Buffers n Proxy to Explot Memory Localty of Multple Streamng Meda Sessons Songqng Chen,BoShen, Yong Yan, Sujoy Basu, and Xaodong Zhang Department of Computer Scence Moble and Meda System
More informationLOOP ANALYSIS. determine all currents and Voltages in IT IS DUAL TO NODE ANALYSIS - IT FIRST DETERMINES ALL CURRENTS IN A CIRCUIT
LOOP ANALYSS The second systematic technique to determine all currents and oltages in a circuit T S DUAL TO NODE ANALYSS - T FRST DETERMNES ALL CURRENTS N A CRCUT AND THEN T USES OHM S LAW TO COMPUTE NECESSARY
More informationConfigure Address Book. Configure Show Send To. Options Supervision Message. Options Flood Preventer
FlashPont Sotware Inc. eomega Pagng Sotware Qualty Sotware For The Fre Alarm Industry Descrpton eomega pagng sotware provdes a means o convertng prnter output rom a Smplex re alarm panel nto short messages.
More informationETAtouch RESTful Webservices
ETAtouch RESTful Webservces Verson 1.1 November 8, 2012 Contents 1 Introducton 3 2 The resource /user/ap 6 2.1 HTTP GET................................... 6 2.2 HTTP POST..................................
More informationT3 (IP) Classic connected to Integral 5
IP Telephony Contact Centers Moblty Servces T3 (IP) Classc connected to Integral 5 Benutzerhandbuch User s gude Manual de usuaro Manuel utlsateur Manuale d uso Gebrukersdocumentate Contents Contents Famlarze
More informationAP PHYSICS B 2008 SCORING GUIDELINES
AP PHYSICS B 2008 SCORING GUIDELINES General Notes About 2008 AP Physcs Scorng Gudelnes 1. The solutons contan the most common method of solvng the free-response questons and the allocaton of ponts for
More informationScaling IP Addresses DHCP CCNA 4
Scaling IP Addresses DHCP CCNA 4 Note to instructors If you have downloaded this presentation from the Cisco Networking Academy Community FTP Center, this may not be my latest version of this PowerPoint.
More informationMachine Learning: Algorithms and Applications
14/05/1 Machne Learnng: Algorthms and Applcatons Florano Zn Free Unversty of Bozen-Bolzano Faculty of Computer Scence Academc Year 011-01 Lecture 10: 14 May 01 Unsupervsed Learnng cont Sldes courtesy of
More informationT3 (IP) Comfort connected to Integral 5
IP Telephony Contact Centers Moblty Servces T3 (IP) Comfort connected to Integral 5 Benutzerhandbuch User s gude Manual de usuaro Manuel utlsateur Manuale d uso Gebrukersdocumentate Contents Contents Famlarze
More informationElements of a wireless network
Chapter 6 Wreless Elements of a wreless network network nfrastructure nfrastructure mode base staton connects mobles nto wred network handoff: moble changes base staton provdng connecton nto wred network
More informationLecture #15 Lecture Notes
Lecture #15 Lecture Notes The ocean water column s very much a 3-D spatal entt and we need to represent that structure n an economcal way to deal wth t n calculatons. We wll dscuss one way to do so, emprcal
More informationImplementing SBC Firewall Traversal and NAT
CHAPTER 15 The Session Border Controller (SBC) enables voice over IP (VoIP) signaling and media to be received from and directed to a device behind a firewall and NAT (Network Address Translator) at the
More informationMidterms Save the Dates!
Unversty of Brtsh Columba CPSC, Intro to Computaton Alan J. Hu Readngs Ths Week: Ch 6 (Ch 7 n old 2 nd ed). (Remnder: Readngs are absolutely vtal for learnng ths stuff!) Thnkng About Loops Lecture 9 Some
More informationResource-Efficient Multi-Source Authentication Utilizing Split-Join One-Way Key Chain
Resource-Effcent Mult-Source Authentcaton Utlzng Splt-Jon One-Way ey Chan Seonho Cho, un Sun, Hyeonsang Eom 3 Department of Computer Scence, Bowe State Unversty, Bowe, Maryland, U.S.A. Center for Secure
More informationT3 Comfort connected to IP Office
T3 Comfort connected to IP Offce Benutzerhandbuch User s gude Manual de usuaro Manuel utlsateur Manuale d uso Gebrukersdocumentate Contents Contents Famlarse yourself wth your telephone Important notes...
More informationGlobal Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights
Global Informaton Assurance Certfcaton Paper Copyrght SANS Insttute Author Retans Full Rghts Ths paper s taken from the GIAC drectory of certfed professonals. Repostng s not permted wthout express wrtten
More informationPost Operative: Six week follow-up
Post Operatve Sx Week Follow-up - Knee Dated 9/5/ Post Operatve: Sx week follow-up Uncompartmental Knee Replacement (UKR) / Total Knee Replacement (TKR) Please complete ths booklet as soon as possble and
More informationProgramming Assignment Six. Semester Calendar. 1D Excel Worksheet Arrays. Review VBA Arrays from Excel. Programming Assignment Six May 2, 2017
Programmng Assgnment Sx, 07 Programmng Assgnment Sx Larry Caretto Mechancal Engneerng 09 Computer Programmng for Mechancal Engneers Outlne Practce quz for actual quz on Thursday Revew approach dscussed
More informationSecurity. Workplace Manager
User Gude Manageablty and Securty Workplace Manager Congratulatons on your purchase of an nnovatve product from Fujtsu. The latest nformaton about our products, tps, updates etc. can be found on the Internet
More informationNUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS
ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana
More informationPrivate Information Retrieval (PIR)
2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market
More informationLoop Permutation. Loop Transformations for Parallelism & Locality. Legality of Loop Interchange. Loop Interchange (cont)
Loop Transformatons for Parallelsm & Localty Prevously Data dependences and loops Loop transformatons Parallelzaton Loop nterchange Today Loop nterchange Loop transformatons and transformaton frameworks
More information5.0 Quality Assurance
5.0 Dr. Fred Omega Garces Analytcal Chemstry 25 Natural Scence, Mramar College Bascs of s what we do to get the rght answer for our purpose QA s planned and refers to planned and systematc producton processes
More informationDEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS
DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS Arun Avudanayagam Yuguang Fang Wenjng Lou Department of Electrcal and Computer Engneerng Unversty of Florda Ganesvlle, FL 3261
More information