Udp- datagram transport service, Computer Network Security

Assignment Help:

UDP- DATAGRAM TRANSPORT SERVICE

INTRODUCTION:

 UDP is the one of the transport protocols in TCP/IP protocol suite. UDP protocol accepts applications on the computers to transmit and receive datagram packet. UDP has a packet format. It uses best-effort delivery function.

 

THE NEED FOR TRANSPORT PROTOCOLS:

 Internet protocol can not differentiate between application programs running on the similar computer. Fields in the IP datagram header denote to computers, not applications. A protocol that gives an application program to operate as the end point of communication is called as a transport protocol or an end-to-end protocol.

 

THE USER DATAGRAM PROTOCOL (UDP):

 TCP/IP has two transport protocols:

  • UDP
  • TCP

 

UDP:

 UDP is less complex and simpler to understand. It does not give the type of service a typical application expects.

 

CHARACTERISTICS OF UDP:

UDP has the following functionalities.

  • It is an end-to-end protocol. It gives application-to-application communication.
  • It gives connectionless service.
  • It is a Message-Oriented architecture.
  • It uses best-effort delivery function.
  • It follows arbitrary interaction.
  • It is platform independent.


THE CONNECTIONLESS PARADIGM:

 

 UDP does not require to pre-establish communication and also there is no requirement to terminate communication. UDP allows an application to time delay long intervals between two messages. There are no Control Messages; only Data Messages. So it has very low load.

 

MESSAGE-ORIENTED INTERFACE:

 

 UDP gives application programs a Message-Oriented Interface. It does not split messages into packets for transmission and does not include messages for delivery.

 

ADVANTAGES:

 

  • Applications can relay on protocol to preserve data boundaries.


DISADVANTAGES:

 

  • Each UDP message have to fit into a single IP datagram.
  • It can result to an inefficient need of the underlying network.

 


Related Discussions:- Udp- datagram transport service

Network analysis and network representation of a project, Question: Net...

Question: Network diagrams combine with a set of systematic analysis procedures, serve to remedy the shortcomings of the Gantt chart. Explain the following terms used in the ne

Ip datagrams, on LAN,where are IP datagrams transported?

on LAN,where are IP datagrams transported?

Wireless networks, Wireless Networks The origin of wireless networks a...

Wireless Networks The origin of wireless networks and their ubiquity in the technological environment poses a new type of exposure and vulnerability for network security. Cont

Distinguish between steganograhy and cryptography, Question: (a) Disti...

Question: (a) Distinguish between Steganograhy and Cryptography. (b) "Playfair cipher is more secure than Monoalphabetic cipher." Justify this statement. (c) Various ap

Secure routing protocols for wireless sensor networks, Q. Secure routing Pr...

Q. Secure routing Protocols for Wireless Sensor Networks? A secure routing information protocol enables effective implementation of authentication and integrity checking defens

Encryption, How safe is the encryption of virtual private networks?

How safe is the encryption of virtual private networks?

Biology, Ask question #Minimum 100 words are there non parasitic v...

Ask question #Minimum 100 words are there non parasitic viruses

Digital signatures, Digital Signatures Digital Signatures are encrypted ...

Digital Signatures Digital Signatures are encrypted messages which can be proven mathematically to be authentic. These are created in response to rising requirement to verify in

Lan topologies, Network can be distinguished by shape. According to which t...

Network can be distinguished by shape. According to which there are three most popular methodologies, which are shown as follows; Star Ring Bus

Bus topology, BUS TOPOLOGY In a bus topology all devices are attached ...

BUS TOPOLOGY In a bus topology all devices are attached to a single long cable and any device can send data to any other device. For this function, coordination is needed to d

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd