Udp interaction, Computer Network Security

UDP INTERACTION

 UDP follows four kinds of interaction

  • 1-to-1: One application can interact with one application.
  • 1-to-many: One application can interact with many applications.
  • Many-to-1: Many applications can interact with one application.
  • Many-to-many: Many applications can interact with many applications.

 

SUPPORT FOR UNICAST, MULTICAST AND BROADCAST:

 UDP gives multicast 1-to-many interaction using broadcast or a multicast. Sender uses a broadcast address as the receiver address to communicate with many applications. It is very useful for Ethernet networks.

 

ENDPOINT IDENTIFICATION WITH PROTOCOL PORT NUMBERS:

UDP checks an application as an endpoint. Mechanism cannot be similar as of the operating system. No common operation exist. There are multiple identifiers like job names, protocol identifiers and task identifiers.

 

 UDP gives a set of identifiers known 'protocol ports.' It is independent of the underlying platform. Every computer using UDP gives a mapping between the protocol port number and the program checks of its operating system.

 The address and protocol port specifications of an application describe the kind of interaction. To engage in a 1-to-1 communication, the application shows:

  • The local port number
  • Remote IP address
  • The remote port number

 

 

Posted Date: 8/1/2012 9:46:14 AM | Location : United States







Related Discussions:- Udp interaction, Assignment Help, Ask Question on Udp interaction, Get Answer, Expert's Help, Udp interaction Discussions

Write discussion on Udp interaction
Your posts are moderated
Related Questions
Gateways They transfer packets among network machines that have different protocols (e.g. between a WAN and a LAN). They access a packet formatted for one protocol and change


In 10 or more pages, address the following topics (be sure to use diagrams as well as references). 1) Define broadband and baseband transmission technology. 2) Describe broadban

TRANSMISSION ERRORS:  Transmission exceptions may happen due to different causes for example power surges or interference may delete data during transmission. In result of wh

ARP MESSAGE FORMAT Although the ARP data packet format is sufficiently general to allow hardware addresses and arbitrary protocol. ARP is almost usually used to bind a 32-bit

Hypothetical reliable data transfer protocol: A jumping window based Go-back-N  ARQ protocol for file transfer using UDP as the transport protocol: In this protocol, a window o

CRC in matlab

Identify Possible Controls For each threat and linked vulnerabilities which have residual risk, create primary list of control ideas. Residual risk is the risk which remains to

Question: a) Differentiate between ‘Gross Settlement' and ‘Multilateral Net Settlement' providing suitable examples where necessary to support your answer. b) Differentia

QUESTION: (a) Briefly explain the steps involved in Network Simplex Method. (b) What data structures you would expect in the Network Simplex Method. Show the data struct