Udp- datagram transport service, Computer Network Security

Assignment Help:

UDP- DATAGRAM TRANSPORT SERVICE

INTRODUCTION:

 UDP is the one of the transport protocols in TCP/IP protocol suite. UDP protocol accepts applications on the computers to transmit and receive datagram packet. UDP has a packet format. It uses best-effort delivery function.

 

THE NEED FOR TRANSPORT PROTOCOLS:

 Internet protocol can not differentiate between application programs running on the similar computer. Fields in the IP datagram header denote to computers, not applications. A protocol that gives an application program to operate as the end point of communication is called as a transport protocol or an end-to-end protocol.

 

THE USER DATAGRAM PROTOCOL (UDP):

 TCP/IP has two transport protocols:

  • UDP
  • TCP

 

UDP:

 UDP is less complex and simpler to understand. It does not give the type of service a typical application expects.

 

CHARACTERISTICS OF UDP:

UDP has the following functionalities.

  • It is an end-to-end protocol. It gives application-to-application communication.
  • It gives connectionless service.
  • It is a Message-Oriented architecture.
  • It uses best-effort delivery function.
  • It follows arbitrary interaction.
  • It is platform independent.


THE CONNECTIONLESS PARADIGM:

 

 UDP does not require to pre-establish communication and also there is no requirement to terminate communication. UDP allows an application to time delay long intervals between two messages. There are no Control Messages; only Data Messages. So it has very low load.

 

MESSAGE-ORIENTED INTERFACE:

 

 UDP gives application programs a Message-Oriented Interface. It does not split messages into packets for transmission and does not include messages for delivery.

 

ADVANTAGES:

 

  • Applications can relay on protocol to preserve data boundaries.


DISADVANTAGES:

 

  • Each UDP message have to fit into a single IP datagram.
  • It can result to an inefficient need of the underlying network.

 


Related Discussions:- Udp- datagram transport service

People, People,Procedures,Data Asset Identification-Risk Management Th...

People,Procedures,Data Asset Identification-Risk Management The human resources, data information and documentation assets are more difficult to identify. People having knowle

Mention most relevant clause of iso 27001:2005, QUESTION (In this ques...

QUESTION (In this question, you will need to use the ISO 27001:2005 and ISO 27002:2005 standards) For each of the situations below, comment on the following: 1. Mention

Network management system, Question (a) Draw a typical hybrid star-rin...

Question (a) Draw a typical hybrid star-ring topology paying attention to how the clients and switching hubs are connected. (b) State 3 main differences between a router

Fragmentation, FRAGMENTATION One method is to limit datagram size to s...

FRAGMENTATION One method is to limit datagram size to smallest MTU of any server. IP needs fragmentation i.e. datagrams can be divided into pieces to fit in network with small

Pseudonymous remailers and cypherpunk remailers, Problem (a) As a fore...

Problem (a) As a forensic investigator, you are needed to trace the source of an email. It is suspected that the email header has been forged. Show how you would proceed to

Wfabilling project in java, WFABilling project in Java:  Project Title...

WFABilling project in Java:  Project Title: WFABilling   Role                      : Developer Domain                 : Tele-Com Environment          : Java, J2EE, S

Address resolution with message exchange, ADDRESS RESOLUTION WITH MESSAGE E...

ADDRESS RESOLUTION WITH MESSAGE EXCHANGE An alternative to local calculation is a distributed function. A computer that requires to find an address transmits a message across

Describe the time limit problem, Problem: (a) Use a simple example to ...

Problem: (a) Use a simple example to explain what is meant by a finite state machine. (b) Describe the time limit problem in an interrupt-driven system. (c) A certain m

encrypt and decryption using rsa with the prime numbers, Problem (1) -...

Problem (1) - Alice, Bob and Charlie have a secret key a=3, b=4, c=5, respectively. - They want to find a common secret key using Diffie-Hellan key exchange protocol (with g

TCP / IP, Let me know the details of protocol tcp/ip

Let me know the details of protocol tcp/ip

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd