Udp interaction, Computer Network Security

UDP INTERACTION

 UDP follows four kinds of interaction

  • 1-to-1: One application can interact with one application.
  • 1-to-many: One application can interact with many applications.
  • Many-to-1: Many applications can interact with one application.
  • Many-to-many: Many applications can interact with many applications.

 

SUPPORT FOR UNICAST, MULTICAST AND BROADCAST:

 UDP gives multicast 1-to-many interaction using broadcast or a multicast. Sender uses a broadcast address as the receiver address to communicate with many applications. It is very useful for Ethernet networks.

 

ENDPOINT IDENTIFICATION WITH PROTOCOL PORT NUMBERS:

UDP checks an application as an endpoint. Mechanism cannot be similar as of the operating system. No common operation exist. There are multiple identifiers like job names, protocol identifiers and task identifiers.

 

 UDP gives a set of identifiers known 'protocol ports.' It is independent of the underlying platform. Every computer using UDP gives a mapping between the protocol port number and the program checks of its operating system.

 The address and protocol port specifications of an application describe the kind of interaction. To engage in a 1-to-1 communication, the application shows:

  • The local port number
  • Remote IP address
  • The remote port number

 

 

Posted Date: 8/1/2012 9:46:14 AM | Location : United States







Related Discussions:- Udp interaction, Assignment Help, Ask Question on Udp interaction, Get Answer, Expert's Help, Udp interaction Discussions

Write discussion on Udp interaction
Your posts are moderated
Related Questions
Benchmarking An alternative approach to risk management is Benchmarking. It is process of seeking out and studying practices in other organizations which one’s own organization de

Problem a) Give three reasons why traditional Network Design approach is less appropriate for many of today's networks? b) The network requires of users are organized into m

Risk Management Discussion Points Organizations should define level of risk it can live with Risk appetite: it defines quantity and nature of risk which organizations are wil

Question: (a) Which type of attacker represents the most likely and most damaging risk to your network? (b) What is the basic reason that social engineering attacks succeed?

Problem a) Give the destination IP address, upper layer protocol, TTL in decimal and header checksum in hexadecimal; the source port number and the destination port number in deci

SECURITY ANALYSIS Overview •    Know yourself: examine, identify, and understand the information and systems which are currently in place •    Know the enemy: examine, identify,

Evaluations, Assessment, and Maintenance of Risk Controls When the control strategy has been implemented, it should be monitored and measured on an ongoing basis to determine ef

QUESTION Testing of a Business Continuity Plan (BCP) does not need to be costly or to interrupt the daily operations of the business. The result of the test should also be look

Question: (i) ‘Implementation' is a critical stage of the Systems Development Life Cycle. Show the four approaches which are commonly used to implement information systems in

how to encryt the data in plaintext cipher