Video P2P Solution

The schematic is above.

Process: 1. A P2P penetration auxiliary program is transplanted into the front-end device. The P2P penetration auxiliary program will register the device with the server, and the server can also identify whether the device is online or not. At the same time, the P2P auxiliary program will exchange necessary information with the server to realize network analysis and connection establishment functions.

2. The client applies to the server to connect to the device.

3. The server communicates the command to apply for connection to the device.

4. The device allows the connection response and the network parameters of the device.

5. The server returns to the client to allow the connection response

6. The client connects with the device.

Guess you like

Origin blog.csdn.net/howlaa/article/details/115456790