Udp- datagram transport service, Computer Network Security

UDP- DATAGRAM TRANSPORT SERVICE

INTRODUCTION:

 UDP is the one of the transport protocols in TCP/IP protocol suite. UDP protocol accepts applications on the computers to transmit and receive datagram packet. UDP has a packet format. It uses best-effort delivery function.

 

THE NEED FOR TRANSPORT PROTOCOLS:

 Internet protocol can not differentiate between application programs running on the similar computer. Fields in the IP datagram header denote to computers, not applications. A protocol that gives an application program to operate as the end point of communication is called as a transport protocol or an end-to-end protocol.

 

THE USER DATAGRAM PROTOCOL (UDP):

 TCP/IP has two transport protocols:

  • UDP
  • TCP

 

UDP:

 UDP is less complex and simpler to understand. It does not give the type of service a typical application expects.

 

CHARACTERISTICS OF UDP:

UDP has the following functionalities.

  • It is an end-to-end protocol. It gives application-to-application communication.
  • It gives connectionless service.
  • It is a Message-Oriented architecture.
  • It uses best-effort delivery function.
  • It follows arbitrary interaction.
  • It is platform independent.


THE CONNECTIONLESS PARADIGM:

 

 UDP does not require to pre-establish communication and also there is no requirement to terminate communication. UDP allows an application to time delay long intervals between two messages. There are no Control Messages; only Data Messages. So it has very low load.

 

MESSAGE-ORIENTED INTERFACE:

 

 UDP gives application programs a Message-Oriented Interface. It does not split messages into packets for transmission and does not include messages for delivery.

 

ADVANTAGES:

 

  • Applications can relay on protocol to preserve data boundaries.


DISADVANTAGES:

 

  • Each UDP message have to fit into a single IP datagram.
  • It can result to an inefficient need of the underlying network.

 

Posted Date: 8/1/2012 9:44:05 AM | Location : United States







Related Discussions:- Udp- datagram transport service, Assignment Help, Ask Question on Udp- datagram transport service, Get Answer, Expert's Help, Udp- datagram transport service Discussions

Write discussion on Udp- datagram transport service
Your posts are moderated
Related Questions
a) Explain the contents of the Cost Assessment. b) Various Documents are needed for Configuration Management. State three of them, and describe their importance. c) Given tha

(a) Describe briefly the difference between flow control and congestion control in relation to a connection-oriented protocol such as TCP. (b)  What is the initial rate of data

Question An organization is planning to connect its networks to the Internet. The network is located within a four story building. A web server supporting online sales is also

STAR TOPOLOGY In this topology, all devices are attached to a central point, which is sometimes known as the "Hub" as given in the diagram below.   Figure: An ideal

#questioAn elliptic curve y^2=x^3+ax+b(mod29) includes points P=(7, 15) and Q=(16, 13) a)Determine the equation of the crve b) Determine all values of x for which there is no point

Question: (a) Distinguish between Steganograhy and Cryptography. (b) "Playfair cipher is more secure than Monoalphabetic cipher." Justify this statement. (c) Various ap

ACCESS CONTROL DEVICES Successful access control system includes number of components, which depends on system’s requirements for authentication and authorization. Powerful auth

types of firewall and backup


define .