Udp interaction, Computer Network Security


 UDP follows four kinds of interaction

  • 1-to-1: One application can interact with one application.
  • 1-to-many: One application can interact with many applications.
  • Many-to-1: Many applications can interact with one application.
  • Many-to-many: Many applications can interact with many applications.



 UDP gives multicast 1-to-many interaction using broadcast or a multicast. Sender uses a broadcast address as the receiver address to communicate with many applications. It is very useful for Ethernet networks.



UDP checks an application as an endpoint. Mechanism cannot be similar as of the operating system. No common operation exist. There are multiple identifiers like job names, protocol identifiers and task identifiers.


 UDP gives a set of identifiers known 'protocol ports.' It is independent of the underlying platform. Every computer using UDP gives a mapping between the protocol port number and the program checks of its operating system.

 The address and protocol port specifications of an application describe the kind of interaction. To engage in a 1-to-1 communication, the application shows:

  • The local port number
  • Remote IP address
  • The remote port number



Posted Date: 8/1/2012 9:46:14 AM | Location : United States

Related Discussions:- Udp interaction, Assignment Help, Ask Question on Udp interaction, Get Answer, Expert's Help, Udp interaction Discussions

Write discussion on Udp interaction
Your posts are moderated
Related Questions
What are Transmission Impairments? Explain the following concepts with respect to Transmission Impairments a) Attenuation b) Delay Distortion c) Noise ion #Minimum 100 words ac

Risk Control Strategies Once the ranked vulnerability risk worksheet has created, they should choose one of following 4 strategies to control each risk: •Apply safeguards which

Question 1 The speech act theory is used as the model for communication among computational agents. Locution, illocution, and perlocution are the 3 aspects of this theory Using

Question: (a) Describe the term interference in the space, time, frequency, and code domain. (b) Consider a 1 G - AMPS: 824-849 MHz (forward) ; 869-894 MHz (reverse). B

Scenario: A network with individual hosts (really, virtual machines) can run HTTP (web) servers that are available to the outside. (Here, available means the ability to read and wr

QUESTION: (a) Briefly explain the steps involved in Network Simplex Method. (b) What data structures you would expect in the Network Simplex Method. Show the data struct

The Internet is known as the set of networks connected by routers that are configured to pass traffic among any machine attached to any network in the set. By internet several

Ask question #Minimum.. 100 words accepted#

?Examples should include direct costs items, indirect costs items, as well as variable costing. ?What are at least 5 types of expenses that are associated with manufacturing the

Limitations of firewall Firewalls cannot protect a network if security rules are not followed properly by an organization or if the rules are not defined properly. Firewalls ar