Udp- datagram transport service, Computer Network Security



 UDP is the one of the transport protocols in TCP/IP protocol suite. UDP protocol accepts applications on the computers to transmit and receive datagram packet. UDP has a packet format. It uses best-effort delivery function.



 Internet protocol can not differentiate between application programs running on the similar computer. Fields in the IP datagram header denote to computers, not applications. A protocol that gives an application program to operate as the end point of communication is called as a transport protocol or an end-to-end protocol.



 TCP/IP has two transport protocols:

  • UDP
  • TCP



 UDP is less complex and simpler to understand. It does not give the type of service a typical application expects.



UDP has the following functionalities.

  • It is an end-to-end protocol. It gives application-to-application communication.
  • It gives connectionless service.
  • It is a Message-Oriented architecture.
  • It uses best-effort delivery function.
  • It follows arbitrary interaction.
  • It is platform independent.



 UDP does not require to pre-establish communication and also there is no requirement to terminate communication. UDP allows an application to time delay long intervals between two messages. There are no Control Messages; only Data Messages. So it has very low load.




 UDP gives application programs a Message-Oriented Interface. It does not split messages into packets for transmission and does not include messages for delivery.




  • Applications can relay on protocol to preserve data boundaries.



  • Each UDP message have to fit into a single IP datagram.
  • It can result to an inefficient need of the underlying network.


Posted Date: 8/1/2012 9:44:05 AM | Location : United States

Related Discussions:- Udp- datagram transport service, Assignment Help, Ask Question on Udp- datagram transport service, Get Answer, Expert's Help, Udp- datagram transport service Discussions

Write discussion on Udp- datagram transport service
Your posts are moderated
Related Questions
FRAGMENT IDENTIFICATION: IDENT field in every fragment matches IDENT field in real datagram. Fragments from different datagrams may arrive out of order and still be saved out.

Question 1 Explain the types of threats (Attacks) Question 2 What are the Characteristics of Good Encryption Technique? Question 3 Write a note on Digital Signatur

BALANCING SECURITY AND ACCESS Even with best planning and implementation, it is impossible to obtain perfect security, that is, it is a process, not an absolute. Security should

QUESTION: a) Below is a capture of an Ethernet II frame which has an IPv4 packet and a segment. Provide the source MAC address in hexadecimal; the source IP address, the length

Hybrid Cryptography Systems This makes use of different cryptography systems. Except digital certificates, pure asymmetric key encryption is not used extensively. Asymmetric enc

How can I get help for Linux automotion configuration (Network, virtualization, security and Firewal etc) with bash scrip. What is the charge for.

Scenario: A network with individual hosts (really, virtual machines) can run HTTP (web) servers that are available to the outside. (Here, available means the ability to read and wr

(a) Using the extended Euclidean algorithm, find the multiplicative inverse of 504 mod 67. (b) Decrypt the following ciphertext, which has been encrypted using Caesar cipher:

RSA Block and Vernam Stream Ciphers This assignment involves writing two small Python scripts and a report. Before you start you must download the ?le summarysheets.zip from th

Explain how can we achieved privacy in an e-mail system.  The full form of PEM is Privacy Enhanced Mail: PEM  is  the  internet  Privacy  Enhanced  Mail  standard  adopted