Udp- datagram transport service, Computer Network Security

Assignment Help:

UDP- DATAGRAM TRANSPORT SERVICE

INTRODUCTION:

 UDP is the one of the transport protocols in TCP/IP protocol suite. UDP protocol accepts applications on the computers to transmit and receive datagram packet. UDP has a packet format. It uses best-effort delivery function.

 

THE NEED FOR TRANSPORT PROTOCOLS:

 Internet protocol can not differentiate between application programs running on the similar computer. Fields in the IP datagram header denote to computers, not applications. A protocol that gives an application program to operate as the end point of communication is called as a transport protocol or an end-to-end protocol.

 

THE USER DATAGRAM PROTOCOL (UDP):

 TCP/IP has two transport protocols:

  • UDP
  • TCP

 

UDP:

 UDP is less complex and simpler to understand. It does not give the type of service a typical application expects.

 

CHARACTERISTICS OF UDP:

UDP has the following functionalities.

  • It is an end-to-end protocol. It gives application-to-application communication.
  • It gives connectionless service.
  • It is a Message-Oriented architecture.
  • It uses best-effort delivery function.
  • It follows arbitrary interaction.
  • It is platform independent.


THE CONNECTIONLESS PARADIGM:

 

 UDP does not require to pre-establish communication and also there is no requirement to terminate communication. UDP allows an application to time delay long intervals between two messages. There are no Control Messages; only Data Messages. So it has very low load.

 

MESSAGE-ORIENTED INTERFACE:

 

 UDP gives application programs a Message-Oriented Interface. It does not split messages into packets for transmission and does not include messages for delivery.

 

ADVANTAGES:

 

  • Applications can relay on protocol to preserve data boundaries.


DISADVANTAGES:

 

  • Each UDP message have to fit into a single IP datagram.
  • It can result to an inefficient need of the underlying network.

 


Related Discussions:- Udp- datagram transport service

Elliptic curve encryption - decryption scheme, (a) (i) If m = p·q·r where...

(a) (i) If m = p·q·r where p, q, and r are prime numbers, what is Φ(m)? (ii) Therefore, Determine Φ(440). (b) Describe the following terms as used in cryptography: (i)

Explain about structure of management information, Question 1 a) What is a...

Question 1 a) What is a NMS? Question 2 Explain about Structure of Management Information Question 3 A)In which UDP port number does a protocol entity receive message?

Firewall analysis tools-information security, FIREWALL ANALYSIS TOOLS Th...

FIREWALL ANALYSIS TOOLS There are a number of tools automate remote discovery of firewall rules and assist the administrator in analyzing rules Administrators who feel wary of u

Ipv6 next header, IPV6 NEXT HEADER It is given in the figure below:

IPV6 NEXT HEADER It is given in the figure below:

Explain the purpose of the dr and bdr, QUESTION a) Compare and contras...

QUESTION a) Compare and contrast between static and dynamic routing. b) What are the merits (five merits) and limitations (3 limitations) of using Open Shortest Path First

Selecting a risk control strategy-information security, Selecting a Risk Co...

Selecting a Risk Control Strategy Risk controls involve selecting one of the 4 risk control strategies for every vulnerability. The flowchart is shown in the figure given below

Secure clustering in WSNs, i have an idea of clustering in wsns . where eac...

i have an idea of clustering in wsns . where each and every sensor node use the reputation scheme and while clustering provide help against the selfishness atatck of the sensor nod

Security policies, implementing password policy in organisation

implementing password policy in organisation

Operation of the signature based intrusion detection system, Question : ...

Question : (a) State whether the following statement is FALSE or TRUE: It is always better to have various access points to the Internet so that if a hacker takes one down you

Distinguish between passive and active attacks, Problem (a) Distinguis...

Problem (a) Distinguish between passive and active attacks. (b) Give two reasons why it is important to organise security awareness programs for users. (c) Describe how

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd