Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ [ÆóÁö] TTAS.KO-01.0091 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2006-12-27 ÃÑÆäÀÌÁö 12
ÇѱÛÇ¥Áظí SIP »ç¿ëÀÚ ¿¡ÀÌÀüÆ®ÀÇ NAT Åë°ú ÇÁ·ÎÆÄÀÏ: STUNÀ» ÀÌ¿ëÇÑ NAT Åë°ú
¿µ¹®Ç¥Áظí The Profile Standard for NAT Traversal of SIP User Agent: Using STUN
Çѱ۳»¿ë¿ä¾à º» Ç¥ÁØÀº °øÀθÁ¿¡ STUN ¼­¹ö°¡ Á¸ÀçÇÏ°í, »ç¼³¸Á¿¡ ¼ÓÇÑ SIP »ç¿ëÀÚ ¿¡ÀÌÀüÆ®´Â ±× STUN ¼­¹öÀÇ ÁÖ¼Ò¸¦ ÀÌ¹Ì ¾Ë°í ÀÖ´Ù´Â °ÍÀ» ±âº» ÀüÁ¦·Î ÇÏ°í ÀÖÀ¸¸ç, NAT °ËÃâ ÀýÂ÷ ¹× SIP »ç¿ëÀÚ ¿¡ÀÌÀüÆ®ÀÇ NAT Åë°ú °¡´É¼º µî¿¡ ´ëÇÏ¿© ±â¼úÇÏ°í ÀÖ´Ù. ¶ÇÇÑ, SIP »ç¿ëÀÚ ¿¡ÀÌÀüÆ®°¡ NAT¸¦ Åë°úÇϱâ À§ÇÏ¿© SIP ¸Þ½ÃÁö¸¦ ±¸¼ºÇÏ´Â ¹æ¹ý¿¡ ´ëÇÏ¿© ±â¼úÇÏ°í ÀÖ´Ù.
¿µ¹®³»¿ë¿ä¾à This standard assumes that STUN servers exist in public network and SIP user agents already know the existence and IP addresses of them. Under these assumptions, NAT detection procedures and the possibility of NAT traversal are described and how SIP user agents construct SIP message is also described in order to traverse NAT.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAS.KO-01.0091.pdf

ÀÌÀü
¸ð¹ÙÀÏ Áõ°­Çö½ÇÀ» À§ÇÑ QR ÄÚµå µ¥ÀÌÅÍ Ç¥Çö
´ÙÀ½
ÃÊ°í¼Ó ¹«¼±Åë½ÅÀ» À§ÇÑ Å׶óÇ츣Ã÷ ¿¬¼ÓÆÄ ¹ß»ý±âÀÇ ÃøÁ¤ ¹æ¹ý Áöħ