Home > Computer Tutorials > Computer Knowledge > How to change network location in win7

How to change network location in win7

PHPz
Release: 2024-02-12 22:50:24
forward
982 people have browsed it

php editor Xiaoxin brings you the method of changing the network location in Win7. When using Win7 system, we often encounter situations where we need to change the network location, such as switching from a public network to a home network. Changing network locations can help us better manage network connections and shared resources. Below, we will introduce two simple and easy methods to help you quickly change the network location of Win7. Whether you are a novice or a user with certain computer skills, you can easily master these techniques to make network configuration more convenient and flexible.

Note: In fact, the division of NAT types can easily lead to confusion. Many NAT devices will actually use a mix of translation methods instead of just one. Therefore, the definition of a NAT type can only be used to describe a working method, not a device. For example, many NAT devices use symmetric NAT to handle internally initiated connections and also support static port mapping. The latter can be regarded as a variant of full-cone NAT. In addition, in some cases, a public network address and port of the NAT device may be mapped to multiple internal servers at the same time to achieve load balancing. For example, a site that provides WEB servers may have hundreds or even thousands of servers providing HTTP services, but to the outside world, they only appear as one or a few IP addresses.

How to change network location in win7

NAT network structure only shows the NAT deployed on the router

NAT working principle: the network is divided into two parts: private network and public network, and the NAT gateway is set from the private network to the public network At the routing exit location, bidirectional traffic must pass through the NAT gateway; network access can only be initiated from the private network side first, and the public network cannot actively access the private network host; the NAT gateway completes two address conversions or translations in the two access directions. , the source information is replaced in the outbound direction, and the destination information is replaced in the inbound direction; the existence of the NAT gateway is transparent to both communicating parties; in order to realize the bidirectional translation function, the NAT gateway needs to maintain an association table to save the session information.

Judging from the above characteristics, NAT is mainly used to hide and convert internal network information. However, if you want to achieve communication between hidden devices under NAT (peer-to-peer network transmission), you must perform NAT penetration. In addition, it should be pointed out that although the NAT gateway can achieve a certain degree of transparency, it cannot completely hide the communicating parties because users can carry IP and port information in the data packet instead of only in the IP header. used in.

5. Problems caused by NAT: Peer-to-peer network transmission needs to penetrate NAT: In the definition of IP protocol, in theory, each site with an IP address has considerable ability to obtain services and provide services at the protocol level. There is no difference between different IP addresses. However, the working principle of NAT destroys this feature. If you want to achieve true peer-to-peer network transmission, you need to penetrate NAT. This is the focus of this article. The application layer needs to maintain UDP session connections: Since NAT resources are limited, the converted resources (i.e. ip/port combination) will be recycled according to certain rules, and UDP communication is connectionless, so the application layer protocol based on UDP cannot be used without data transmission. But when you need to maintain the connection, you need to send packets to keep the session from expiring, which is the usual heartbeat and the like. Complications of IP-based access restriction policies 2. Technical points and principles 1. Terminology: 1. Internal Tuple: refers to the tuple composed of the private address and port number of the internal host, that is, the source address of the packet sent by the internal host, A tuple composed of ports; 2. External Tuple: refers to a tuple consisting of external address and port obtained after the internal Tuple undergoes NAT source address/port conversion, that is, the external host receives the NAT converted tuple message, it sees the source address (usually the address of the NAT device) and source port of the message; 3. Target Tuple: refers to the tuple composed of the address and port of the external host, that is, the address of the internal host. A tuple consisting of the destination address and port of the sent message. 4. Hole punch: Penetrate NAT2. NAT type 1). Basic NAT

converts the private IP address of the intranet host into the public network IP address one-to-one, without converting TCP/UDP ports. For static NAT and dynamic NAT.

2).NAPT

NAPT will not only change the IP address of the IP datagram passing through this NAT device, but also change the TCP/UDP port of the IP datagram.

Full Cone NAT: All requests from the same internal Tuple X are translated by NAT to the same external Tuple Y, regardless of whether these requests belong to the same application or multiple applications. In addition, when the X-Y conversion relationship is established, any external host can use the address and port in Y as the target address and port at any time to send UDP messages to the internal host. , so although this method is simple enough, it is not so safe. How to change network location in win7

The above is the detailed content of How to change network location in win7. For more information, please follow other related articles on the PHP Chinese website!

Related labels:
source:pc-daily.com
Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
Popular Tutorials
More>
Latest Downloads
More>
Web Effects
Website Source Code
Website Materials
Front End Template