Principle and Implementation of P2P UDP Penetration NAT