Udp interaction, Computer Network Security

UDP INTERACTION

 UDP follows four kinds of interaction

  • 1-to-1: One application can interact with one application.
  • 1-to-many: One application can interact with many applications.
  • Many-to-1: Many applications can interact with one application.
  • Many-to-many: Many applications can interact with many applications.

 

SUPPORT FOR UNICAST, MULTICAST AND BROADCAST:

 UDP gives multicast 1-to-many interaction using broadcast or a multicast. Sender uses a broadcast address as the receiver address to communicate with many applications. It is very useful for Ethernet networks.

 

ENDPOINT IDENTIFICATION WITH PROTOCOL PORT NUMBERS:

UDP checks an application as an endpoint. Mechanism cannot be similar as of the operating system. No common operation exist. There are multiple identifiers like job names, protocol identifiers and task identifiers.

 

 UDP gives a set of identifiers known 'protocol ports.' It is independent of the underlying platform. Every computer using UDP gives a mapping between the protocol port number and the program checks of its operating system.

 The address and protocol port specifications of an application describe the kind of interaction. To engage in a 1-to-1 communication, the application shows:

  • The local port number
  • Remote IP address
  • The remote port number

 

 

Posted Date: 8/1/2012 9:46:14 AM | Location : United States







Related Discussions:- Udp interaction, Assignment Help, Ask Question on Udp interaction, Get Answer, Expert's Help, Udp interaction Discussions

Write discussion on Udp interaction
Your posts are moderated
Related Questions
what is relation ship between computer security goals?

INFORMATION CLASSIFICATION The classification of information is an important aspect of policy and a control for the information protection. A clean desk policy stipulates that a

PACKETS: Packet is a generic word that define to small code of data. Packet have different format. Each hardware needs different packet format.  FRAME: A hardware frame or

#questioAn elliptic curve y^2=x^3+ax+b(mod29) includes points P=(7, 15) and Q=(16, 13) a)Determine the equation of the crve b) Determine all values of x for which there is no point

how did slavery influence life in the colonies

In broadcast topology there are further two types 1) SATELLITE\RADIO 2) RING TOPOLOGY In a radio or satellite topology every computers are connected to each other via radio o

SHIFT OPERATION:  This operation replaced all bits to the left one position. For example in the diagram below a 16-bit CRC hardware is given, which needs three Exclusive OR (

QUESTION (a) Hashing and salting is commonly used as password storage techniques for most applications. Describe how hashing and salting enable secure storage of password (b

Security Clearances For a security clearance in organizations each data user should be assigned a single level of authorization indicating classification level. Before approachi

QUESTION (a) Consider the following digital bit stream 01001100 is to be encoded in: i. NRZ-I ii. Pseudoternary iii. Manchester iv. Differential Manchester Show th