2013 IEEE International Conference on Communications (ICC) 2013
DOI: 10.1109/icc.2013.6655107
|View full text |Cite
|
Sign up to set email alerts
|

Implementing NAT traversal with Private Realm Gateway

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
9
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
5
1

Relationship

4
2

Authors

Journals

citations
Cited by 10 publications
(9 citation statements)
references
References 15 publications
0
9
0
Order By: Relevance
“…Multiple approaches are discussed in [2] that allow devices behind NATs to become reachable for hosts in the public domain. An overview of the existing NAT traversal solutions including Session Traversal Utilities for NAT (STUN), Traversal Using Relays around NAT (TURN) and User Datagram Protocol (UDP) hole punching is presented in [12].…”
Section: A Nat Middleboxesmentioning
confidence: 99%
See 1 more Smart Citation
“…Multiple approaches are discussed in [2] that allow devices behind NATs to become reachable for hosts in the public domain. An overview of the existing NAT traversal solutions including Session Traversal Utilities for NAT (STUN), Traversal Using Relays around NAT (TURN) and User Datagram Protocol (UDP) hole punching is presented in [12].…”
Section: A Nat Middleboxesmentioning
confidence: 99%
“…The existing NAT traversal solutions either require a separate Application Layer Gateway (ALG) for handling application layer traffic through NAT, bypass the firewall/NAT functionality for NAT unfriendly protocols, or require polling of the network on application layer making them undesirable. After careful analysis of the existing NAT traversal mechanisms we developed a custom NAT solution called Realm Gateway (RGW) [2] [3] for establishing end-to-end connectivity between the hosts in public address realm and private address realm. RGW acts as a traditional Source NAT (SNAT) for the outbound connections and behaves as a Destination NAT (DNAT) for inbound connections.…”
Section: Introductionmentioning
confidence: 99%
“…The adoption of CES does not require changes to end hosts. To this end, a customer edge switch can be complemented with a realm gateway (RG), [19][20][21][22] which allows dynamic and unilateral initiation of communication by legacy Internet hosts to the servers located in the private networks. The behavior of CES for outbound connections to legacy hosts is the same as NAT.…”
Section: Trust-oriented Approach To Network Securitymentioning
confidence: 99%
“…The CES can contribute to meet the energy challenge of 5G 58 : facilitating longer battery lifetimes for wireless devices, such as mobile hosts or sensors, by allowing them to sleep as long as possible. 20 This is because the hosts in the private realm will have an improved network-based firewall, which can filter the malicious flows before they reach the end devices, and because hosts are only reachable via a policy.…”
Section: Trust-oriented Approach To Network Securitymentioning
confidence: 99%
See 1 more Smart Citation