Abstract
Peer-to-Peer (P2P) networks work on the presumption that all nodes in the network are connectable. However, NAT boxes and firewalls prevent connections to many nodes on the Internet. For UDP based protocols, the UDP hole-punching technique has been proposed to mitigate this problem.
This paper presents a study of the efficacy of UDP hole punching on the Internet in the context of an actual P2P network. To the best of our knowledge, no previous study has provided similar measurements. Our results show that UDP hole punching is an effective method to increase the connectability of peers on the Internet: approximately 64% of all peers are behind a NAT box or firewall which should allow hole punching to work, and more than 80% of hole punching attempts between these peers succeed.
This work was partially supported by the European Community’s 7th Framework Programme through the P2P-Next and QLectives projects (grant no. 216217, 231200).
Chapter PDF
Similar content being viewed by others
References
Audet, F., Jennings, C.: Network Address Translation (NAT) Behavioral Requirements for Unicast UDP. RFC 4787 (Best Current Practice) (January 2007), http://www.ietf.org/rfc/rfc4787.txt
Biggadike, A., Ferullo, D., Wilson, G., Perrig, A.: NATBLASTER: Establishing TCP connections between hosts behind NATs. In: SIGCOMM Asia Workshop (April 2005)
Ford, B., Srisuresh, P., Kegel, D.: Peer-to-peer communication across network address translators. In: USENIX 2005 (April 2005)
Guha, S., Francis, P.: Characterization and measurement of tcp traversal through nats and firewalls. In: Proc. of the 5th ACM SIGCOMM Conf. on Internet Measurement (IMC 2005), Berkeley, CA, October 2005, pp. 199–211 (2005)
Hätönen, S., Nyrhinen, A., Eggert, L., Strowes, S., Sarolathi, P., Kajo, M.: An experimental study of home gateway characteristics. In: Proc. of the 10th Internet Measurement Conference (IMC 2010), Melbourne, Australia (November 2010)
Liu, Y., Pan, J.: The impact of NAT on BitTorrent-like P2P systems. In: Proc. of the 9th Int. Conf. on Peer-to-Peer Computing (P2P 2009), Seattle, WA, September 2009, pp. 242–251 (2009)
Mol, J., Bakker, A., Pouwelse, J., Epema, D., Sips, H.: The design and deployment of a bittorrent live video streaming solution. In: Proc. of the IEEE Int. Symp. on Multimedia (ISM 2009) (December 2009)
Noh, J., Baccichet, P., Girod, B.: Experiences with a large-scale deployment of stanford peer-to-peer multicast. In: Proc. of the 17th Int. Packet Video Workshop (PV 2009), Seattle, WA, May 2009, pp. 1–9 (2009)
Rosenberg, J., Mahy, R., Matthews, P., Wing, D.: Session Traversal Utilities for NAT (STUN). RFC 5389 (Proposed Standard) (October 2008), http://www.ietf.org/rfc/rfc5389.txt
Roverso, R., El-Ansary, S., Haridi, S.: NATCracker: NAT combinations matter. In: Proc. of the 18th Int. Conf. on Computer Communications and Networks (ICCN 2009), San Francisco, CA, August 2009, pp. 1–7 (2009)
Savage, S., Anderson, T., Aggarwal, A., Becker, D., Cardwell, N., Collins, A., Hoffman, E., Snell, J., Vahdat, A., Voelker, G., Zahorjan, J.: Detour: A case for informed internet routing and transport. IEEE Micro 19(1), 50–59 (1999)
Tang, L., Crovella, M.: Virtual landmarks for the internet. In: Proc. of the 3rd ACM SIGCOMM Conf. on Internet Measurement (IMC 2003), Miami Beach, FL, October 2003, pp. 143–152 (2003)
Zheng, H., Lua, E.K., Pias, M., Griffin, T.G.: Internet routing policies and round-trip-times. In: Dovrolis, C. (ed.) PAM 2005. LNCS, vol. 3431, pp. 236–250. Springer, Heidelberg (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 IFIP International Federation for Information Processing
About this paper
Cite this paper
Halkes, G., Pouwelse, J. (2011). UDP NAT and Firewall Puncturing in the Wild. In: Domingo-Pascual, J., Manzoni, P., Palazzo, S., Pont, A., Scoglio, C. (eds) NETWORKING 2011. NETWORKING 2011. Lecture Notes in Computer Science, vol 6641. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-20798-3_1
Download citation
DOI: https://doi.org/10.1007/978-3-642-20798-3_1
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-20797-6
Online ISBN: 978-3-642-20798-3
eBook Packages: Computer ScienceComputer Science (R0)