摘要:
The present invention discloses a user device for implementing direct penetrating communication between a user device under a NAT and another user device under a different NAT and a method for the same. Detection message is sent to an auxiliary detecting device in an external network through a selected local port. Then the reply message from said auxiliary detecting device will be received and the NAT-translated NAT source port of said detection message can be obtained. By comparing the NAT source ports of a plurality of detection messages, it can be determined whether or not the selected port is a penetrated port. After that, the corresponding NAT source address and NAT penetrated port will be informed to another user device under a different NAT (also, the NAT penetrated port and NAT source port determined by said another user device will be received via said external-network device). Therefore, said user device and the opposite-end user device directly communicating with each other through the determined local source port and with the received NAT external-network address and NAT port of the other party as the destination address and destination port.
摘要:
This disclosure provides methods and servers to transmit data packets via Transmission Control Protocol (TCP) connections. In some aspects, transmitting data packets includes receiving a data packet from a first application on a first server. The data packet is analyzed to determine a destination address associated with a second server. The data packet is transmitted based on the address associated with the second server. In some aspects, transmitting data packets includes receiving a data packet from a second application on a second server. The data packet is analyzed to determine the destination address associated with a first application on the first server. The data packet is transmitted based on the address associated with the first application. In some aspects, transmitting data packets includes a flow control mechanism to control data transmission.
摘要:
This disclosure provides methods and servers to transmit data packets via Transmission Control Protocol (TCP) connections. In some aspects, transmitting data packets includes receiving a data packet from a first application on a first server. The data packet is analyzed to determine a destination address associated with a second server. The data packet is transmitted based on the address associated with the second server. In some aspects, transmitting data packets includes receiving a data packet from a second application on a second server. The data packet is analyzed to determine the destination address associated with a first application on the first server. The data packet is transmitted based on the address associated with the first application. In some aspects, transmitting data packets includes a flow control mechanism to control data transmission.
摘要:
A computer-implemented method of locking-in investment gains can include initializing an investment fund having a net asset value per share. The investment fund can include assets allocated to at least a discount instrument and a derivative instrument, where the discount instrument provides a floor value of the net asset value per share. The method can further include selecting a target value for the investment fund. In addition, in some instances, the method can include reinitializing the investment fund in response to one or more of the following: (a) the investment fund at least achieving the target value and (b) expiration of an investment period of the investment fund. Reinitializing the investment fund can include rolling over the assets of the investment fund.
摘要:
The present invention discloses a user device for implementing direct penetrating communication between a user device under a NAT and another user device under a different NAT and a method for the same. Detection message is sent to an auxiliary detecting device in an external network through a selected local port. Then the reply message from said auxiliary detecting device will be received and the NAT-translated NAT source port of said detection message can be obtained. By comparing the NAT source ports of a plurality of detection messages, it can be determined whether or not the selected port is a penetrated port. After that, the corresponding NAT source address and NAT penetrated port will be informed to another user device under a different NAT (also, the NAT penetrated port and NAT source port determined by said another user device will be received via said external-network device).
摘要:
A mounting apparatus is configured for mounting a slide rail to a bracket. The bracket includes a flange with a plurality of mounting holes defined therein. A plurality of mounting rods is arranged on the slide rail for engaging in the corresponding mounting holes of the flange. The mounting apparatus includes a resisting member fixed to the slide rail, and an operating member pivotably attached to the resisting member. The resisting member includes a resisting portion configured for engaging with the flange. The operating member is capable of urging the resisting portion of the resisting member away from the flange.
摘要:
A method and system for extending the capabilities of resource-constrained embedded devices by leveraging the memory and processing resources of clients such as web browsers (“clients”) installed on host computational devices (“host computers”). The embedded device delegates computational tasks such as generation of content (e.g., user interfaces, reports, configuration files, etc.) to clients and acts as a simple file and data server. The embedded device provides static resource files to each client, including static template files and a client processing engine. The client processing engine: interprets processing instructions contained in static template files; utilizes managed communication channels to exchange dynamic data sets with the embedded device in real-time; generates various forms of content by processing, transforming, manipulating, and aggregating dynamic data sets and static resource files; and reads and writes arbitrarily large files from and to the host computer, overcoming resource limitations of the embedded device.