Interactive services such as multiplayer games may fail to find all players connected through address translators, says Tom Laemmel, a Windows product manager at Microsoft Corp.
12.
When receiving a message from a user agent a network address translator binds the private IP address of the user agent to a public IP address.
13.
Many computers designed to be used by a single user, such as office PCs or home PCs, are behind a network address translator ( NAT ).
14.
The technical details of many VoIP protocols create challenges in routing VoIP traffic through firewalls and network address translators, used to interconnect to transit networks or the Internet.
15.
An address translator maps the available real memory to physical memory, residing on disk drives ( either'spinning'or solid-state ), or on a SAN server ( such as the V7000 ).
16.
Originally, STUN was an acronym for "'Simple Traversal of User Datagram Protocol ( UDP ) through Network Address Translators "', but this title was changed in a specification of an updated set of methods published as RFC 5389, retaining the same acronym.
17.
However, IP packets addressed from them cannot be transmitted through the public Internet, and so if such a private network needs to connect to the Internet, it must do so via a network address translator ( NAT ) gateway, or a proxy server.
18.
Ultimately, SBCs allow the network operators to manage the calls that are made on their networks, fix or change protocols and protocol syntax to achieve interoperability, and also overcome some of the problems that firewalls and network address translators ( NATs ) present for VoIP calls.
19.
DS-Lite ( Dual-Stack Light ) uses tunnels from the customer premises equipment to a network address translator at the ISP . The consumer premises equipment encapsulates the IPv4 packets in an IPv6 wrapper and sends them to a host known as the " AFTR element ".
20.
"' UDP hole punching "'is a commonly used technique employed in network address translator ( NAT ) applications for maintaining User Datagram Protocol ( UDP ) packet streams that traverse the NAT . NAT traversal techniques are typically required for client-to-client networking applications on the Internet involving hosts connected in private networks, especially in peer-to-peer, Direct Client-to-Client ( DCC ) and Voice over Internet Protocol ( VoIP ) deployments.