Question

List two solution to address the NAT TRAVERSAL PROBLEM (i.e how a client can establish contact to...

List two solution to address the NAT TRAVERSAL PROBLEM (i.e how a client can establish contact to host with private IP address )

0 0
Add a comment Improve this question Transcribed image text
Answer #1

1. STUN: STUN stands for Session Traversal Utilities for NAT. The peer address problem in NAT can be solved using STUN. With this technique, media packets can be sent to these addresses and mapping can be done in NAT. With this technique, the client and sender can communicate with each other easily.

2. TURN: TURN stands for Traversal Using Relays around NAT.In this technique media relay being used for transmission. It is costly since it requires more bandwidth and latency time.

Add a comment
Know the answer?
Add Answer to:
List two solution to address the NAT TRAVERSAL PROBLEM (i.e how a client can establish contact to...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • 1. In regards to NAT, How are private IP address ranges used? 2. Is NAT transparent...

    1. In regards to NAT, How are private IP address ranges used? 2. Is NAT transparent to the operating systems of the two hosts involved? 3. To all applications?

  • 1. Why do we need to assign an internal IP address (i.e., behind NAT) for Metasploitable2-Linux?...

    1. Why do we need to assign an internal IP address (i.e., behind NAT) for Metasploitable2-Linux? What will happen if we assign a public IP to it? 2. Besides the two vulnerabilities Vsftpd v2.3.4 Backdoor and Vsftpd v2.3.4 Backdoor that we used, exploit three vulnerability using msfconsole. Show me that you have placed a file in the exploited remote machine via screenshots and by creating the file with the command “touch ” where should be replaced with your full name.

  • (1) Computer hosts usually have two addresses, an Internet Protocol (IP) address and an Ethernet Media...

    (1) Computer hosts usually have two addresses, an Internet Protocol (IP) address and an Ethernet Media Access Control (MAC) address. For the benefit of humans, the IP address is normally represented as a dotted decimal notation, such as 192.168.10.2. Each of the decimal octets in the address or a mask can be converted to 8 binary bits. Remember that the computer only understands binary bits. If all 4 octets were converted to binary, how many bits would there be? (2)...

  • CST 2400 Assignment Question 1: In a client-server based network, the host is trying to connect...

    CST 2400 Assignment Question 1: In a client-server based network, the host is trying to connect to the remote host but is not making an active connection which means the connection has timed out. Specifically, the user uses the telnet command to send a packet to a specific address, but no hosts are responding. Assume that the user from the local TCP/IP host issued the following command: # telnet hostname telnet ....... connection timed out Please diagnose the network connection...

  • Problem # 1 (30 points): Suppose within your Web browser you click on a link to...

    Problem # 1 (30 points): Suppose within your Web browser you click on a link to obtain a web page Suppose that the IP address for the associated URL is not cached in your local host, so that a DNS look- up is necessary to obtain the IP address. Suppose that two (2) DNS servers are visited before your host receives the IP address from DNS; the successive visits incur an RTT of RTT1 and RTT2. Further suppose that the...

  • Q1 Error detection/correction Can these schemes correct bit errors: Internet checksums, two-dimendional parity, cyclic...

    Q1 Error detection/correction Can these schemes correct bit errors: Internet checksums, two-dimendional parity, cyclic redundancy check (CRC) A. Yes, No, No B. No, Yes, Yes c. No, Yes, No D. No, No, Yes E. Ho, hum, ha Q2 CRC vs Internet checksums Which of these is not true? A. CRC's are commonly used at the link layer B. CRC's can detect any bit error of up to r bits with an r-bit EDC. c. CRC's are more resilient to bursty...

  • JAVA How to add array to develop a contact list application for the person class objects...

    JAVA How to add array to develop a contact list application for the person class objects developed in this code? The application will include functionality to add, remove, sort and search the contact list. You should also include a method to output the contents of a contact searched for, and also to output the entire list. The code: package BankProg; public class personal {    private String facebook;    public personal() { }    public personal(String facebook) {    this.facebook...

  • How can the use of creativity in problem solving more effectively address unique situations? If you...

    How can the use of creativity in problem solving more effectively address unique situations? If you faced a particularly challenging problem, what mechanism(s) might you employ to improve the chance of coming up with a creative solution? PLEASE DO NOT COPY AND PASTE FROM ANOTHER ANSWER ON HERE

  • on calculations can i see how did the expect come to the solution ,all the workout...

    on calculations can i see how did the expect come to the solution ,all the workout should be included QUESTION 1 A file of size F = 8 Gbits needs to be distributed to10 peers. Suppose the server has an upload rate of u = 68 Mbps, and that the 10 peers have upload rates of: u1 = 20 Mbps, u2 = 22 Mbps, u3 = 12 Mbps, u4 = 19 Mbps, u5 = 25 Mbps, u6 = 24 Mbps,...

  • Project 4-3: In the following steps, you will learn more about the PING (Packet Internet Grouper)...

    Project 4-3: In the following steps, you will learn more about the PING (Packet Internet Grouper) utility, which can be used on a network running IPv4 to verify that TCP/IP is configured correctly and communicating with the network. A ping test is typically the first thing network professionals try when troubleshooting a TCP/IP connection problem. For this project, you can use any type of workstation that's running TCP/IPv4, preferably one connected to the Internet. The output described in the following...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT