Udp- datagram transport service, Computer Network Security

Assignment Help:

UDP- DATAGRAM TRANSPORT SERVICE

INTRODUCTION:

 UDP is the one of the transport protocols in TCP/IP protocol suite. UDP protocol accepts applications on the computers to transmit and receive datagram packet. UDP has a packet format. It uses best-effort delivery function.

 

THE NEED FOR TRANSPORT PROTOCOLS:

 Internet protocol can not differentiate between application programs running on the similar computer. Fields in the IP datagram header denote to computers, not applications. A protocol that gives an application program to operate as the end point of communication is called as a transport protocol or an end-to-end protocol.

 

THE USER DATAGRAM PROTOCOL (UDP):

 TCP/IP has two transport protocols:

  • UDP
  • TCP

 

UDP:

 UDP is less complex and simpler to understand. It does not give the type of service a typical application expects.

 

CHARACTERISTICS OF UDP:

UDP has the following functionalities.

  • It is an end-to-end protocol. It gives application-to-application communication.
  • It gives connectionless service.
  • It is a Message-Oriented architecture.
  • It uses best-effort delivery function.
  • It follows arbitrary interaction.
  • It is platform independent.


THE CONNECTIONLESS PARADIGM:

 

 UDP does not require to pre-establish communication and also there is no requirement to terminate communication. UDP allows an application to time delay long intervals between two messages. There are no Control Messages; only Data Messages. So it has very low load.

 

MESSAGE-ORIENTED INTERFACE:

 

 UDP gives application programs a Message-Oriented Interface. It does not split messages into packets for transmission and does not include messages for delivery.

 

ADVANTAGES:

 

  • Applications can relay on protocol to preserve data boundaries.


DISADVANTAGES:

 

  • Each UDP message have to fit into a single IP datagram.
  • It can result to an inefficient need of the underlying network.

 


Related Discussions:- Udp- datagram transport service

Network management system, Question (a) Draw a typical hybrid star-rin...

Question (a) Draw a typical hybrid star-ring topology paying attention to how the clients and switching hubs are connected. (b) State 3 main differences between a router

Professional issues in information technology, Thinking ethically is diffic...

Thinking ethically is difficult without a background in moral philosophy. Asking people to embrace ethics without offering practical explanation of the efficacy of so doing, is a t

Advantages and disadvantage of packet filtering firewall, Advantages and Di...

Advantages and Disadvantage of Packet Filtering firewall   Advantages One screening router can help protect entire network One key advantage of packet filter

Explain the random key distribution, Q. Explain the random key distribution...

Q. Explain the random key distribution? The triple key management mechanisms ensure a better and complete security solution using the random key distribution mechanism. In this

Listing assets in order of importance-risk management, Listing Assets in Or...

Listing Assets in Order of Importance Weighting should be created for each category based on the answers to questions. The relative importance of each asset is calculated usin

Draw the waveform for an asynchronous transmission, Question: (a) Draw...

Question: (a) Draw the waveform for an asynchronous transmission with the following specifications: Character "H", one even parity bit, one start bit, one stop bit, and a b

Elliptic curve encryption - decryption scheme, (a) (i) If m = p·q·r where...

(a) (i) If m = p·q·r where p, q, and r are prime numbers, what is Φ(m)? (ii) Therefore, Determine Φ(440). (b) Describe the following terms as used in cryptography: (i)

What is border gateway protocol, Border Gateway Protocol It is a proto...

Border Gateway Protocol It is a protocol needed to advertise the set of networks that can be achieved within an autonomous machine. BGP activates this information to be shared

What is the use of digital certificate, Question: (a) What is the use ...

Question: (a) What is the use of digital certificate? (b) What is meant by a hierarchical trust model in a Public Key Infrastructure? How does the Pretty Good Privacy (PG

Logic bombs - attacks information security, Example 3: Logic bombs In th...

Example 3: Logic bombs In the year 2000, Timothy Lloyd was found responsible of causing $10 million and $12 million of damage to Omega Engineering, an American company specializ

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd