Cloud Computing: Business Trends and Technologies by Faynberg Igor & Lu Hui-Lan & Skuler Dor
Author:Faynberg, Igor & Lu, Hui-Lan & Skuler, Dor [Faynberg, Igor]
Language: eng
Format: azw3
ISBN: 9781118736142
Publisher: Wiley
Published: 2015-11-08T16:00:00+00:00
Figure 5.30 Different NATs for different paths.
Consequently, a process on a host within a given network may have different reflexive addresses depending on which TURN server it obtained them from.
Now we are ready to describe one definitive mechanism that uses STUN and TURN for NAT traversal. The name of this mechanism is Interactive Connectivity Establishment (ICE). It is by no means universal in that it applies only to a set of so-called offer/answer protocols, which allow two processes to arrive at a common view of a multimedia session using the SDP protocol. SIP is one such protocol, and it serves as the original inspiration for defining the common features of the offer/answer family. For the purposes of this book, we can assume that the protocol in question is indeed SIP.
ICE is defined in RFC 5245.84 The ultimate objective of ICE is to find two transport addresses best suited for establishing an RTP/RTCP session between two peers. With that, the peers are assumed to communicate between themselves through SIP, which knows how to traverse NAT. (Of course, the transport addresses used for this signaling are likely to be different from those best suitable for carrying the media stream over UDP.) These transport addresses are exchanged through SDP. ICE achieves this objective by accumulating the transport addresses, testing them for connectivity, and selecting the best-performing ones.
Altogether there are three types of addresses, as shown in Figure 5.31:
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7796)
Grails in Action by Glen Smith Peter Ledbrook(7706)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6706)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6704)
Running Windows Containers on AWS by Marcio Morales(6223)
Kotlin in Action by Dmitry Jemerov(5077)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(4990)
Combating Crime on the Dark Web by Nearchos Nearchou(4578)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4484)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4428)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4248)
The Age of Surveillance Capitalism by Shoshana Zuboff(3966)
Python for Security and Networking - Third Edition by José Manuel Ortega(3818)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3517)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3485)
Learn Wireshark by Lisa Bock(3400)
Mastering Python for Networking and Security by José Manuel Ortega(3364)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3339)
Blockchain Basics by Daniel Drescher(3309)
