Udp interaction, Computer Network Security

UDP INTERACTION

 UDP follows four kinds of interaction

  • 1-to-1: One application can interact with one application.
  • 1-to-many: One application can interact with many applications.
  • Many-to-1: Many applications can interact with one application.
  • Many-to-many: Many applications can interact with many applications.

 

SUPPORT FOR UNICAST, MULTICAST AND BROADCAST:

 UDP gives multicast 1-to-many interaction using broadcast or a multicast. Sender uses a broadcast address as the receiver address to communicate with many applications. It is very useful for Ethernet networks.

 

ENDPOINT IDENTIFICATION WITH PROTOCOL PORT NUMBERS:

UDP checks an application as an endpoint. Mechanism cannot be similar as of the operating system. No common operation exist. There are multiple identifiers like job names, protocol identifiers and task identifiers.

 

 UDP gives a set of identifiers known 'protocol ports.' It is independent of the underlying platform. Every computer using UDP gives a mapping between the protocol port number and the program checks of its operating system.

 The address and protocol port specifications of an application describe the kind of interaction. To engage in a 1-to-1 communication, the application shows:

  • The local port number
  • Remote IP address
  • The remote port number

 

 

Posted Date: 8/1/2012 9:46:14 AM | Location : United States







Related Discussions:- Udp interaction, Assignment Help, Ask Question on Udp interaction, Get Answer, Expert's Help, Udp interaction Discussions

Write discussion on Udp interaction
Your posts are moderated
Related Questions
RISK ASSESSMENT Risk assessment is a step in a risk management technique. Risk assessment is the determination of quantitative or qualitative value of risk related to a concrete

Identify Possible Controls For each threat and linked vulnerabilities which have residual risk, create primary list of control ideas. Residual risk is the risk which remains to

?Examples should include direct costs items, indirect costs items, as well as variable costing. ?What are at least 5 types of expenses that are associated with manufacturing the

what are the participant of marketing channal?

Hardware, Software, and Network Asset Identification What information attributes to track is dependent on: •    Requires of organization/risk management efforts •    Management

VULNERABILITY SCANNERS Active vulnerability scanners scan networks for detailed information, it initiate traffic to determine security holes. This scanner identifies usernames a


In the early days when there were some dozen computers machine on the network, it was done individually but now as we have looked that there are millions of computers on the intern

You have been asked to setup a remote temperature sensing system for an electric furnace. The system consists of a sensor unit which feeds an analogue signal to a PCM encoder. The

Vulnerability Identification Specific avenues threat agents can exploit to attack an information asset are known as vulnerabilities. Examine how each threat can be generated and