User Datagram Protocol(UDP) • UDP is a connectionless protocol. • There is no mechanism for ensuring that data sent is received by the destination. • Hence, it is an unreliable protocol. • A unit of data sent using UDP is called a Datagram. • UDP is used in real time applications like audio or video broadcasting, chatting applications where prompt delivery is preferred over accurate delivery. • UDP attaches 8 bytes of header fields to the data to be sent. • These fields include: A length field, a checksum field, and source and destination port numbers.
13
Embed
User Datagram Protocol(UDP) - mitpolytechnic.ac.inmitpolytechnic.ac.in/downlaods/09_knowledge-bank/03_it/IT-SEM-4/DCN... · User Datagram Protocol(UDP) ... •Hence, the program is
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
User Datagram Protocol(UDP)
• UDP is a connectionless protocol.
• There is no mechanism for ensuring that data sent is received by the destination.
• Hence, it is an unreliable protocol.
• A unit of data sent using UDP is called a Datagram.
• UDP is used in real time applications like audio or video broadcasting, chatting applications where prompt delivery is preferred over accurate delivery.
• UDP attaches 8 bytes of header fields to the data to be sent.
• These fields include: A length field, a checksum field, and source and destination port numbers.
UDP Features
Connection-less service:All Datagrams are independent of each other even though they come from the same source. They are free to take up any network path to reach the destination.These datagrams are not numbered.
Flow and Error Control:It doesn’t provide any flow control so the receiver can overflow with incoming messages.
UDP doesn’t support any other error control mechanism , except for the checksum.There are no acknowledgements sent from destination to the source.
Encapsulation and De-capsulation: The UDP encapsulates and de-capsulates messages in an IP datagram for message exchange.
ICMP(Internet Control Message Protocol)
• The IP provides unreliable and connection-less datagram delivery.
• It doesn’t have any error detection or correction mechanism.
• The ICMP is used to overcome this drawback. It is used along with IP.
• It reports the presence of errors and sends the control messages on behalf of IP.
• ICMP is a network layer protocol.
• ICMP packets are encapsulated in the IP datagrams and then sent to lower layer.
• The ping command uses ICMP packet to test whether a station is reachable.
TCP Header Format
• Every TCP packet begins with a 20 byte fixed format header.
• The TCP header(segment) without data is used for sending the acknowledgements and the control information.
Ports and Sockets:
• A port is a 16 bit logical number assigned for uniquely identifying a process/application running on a host machine.
• When an application wants to communicate with another application on a different computer, ports are used.
• E.g., Application A running on computer 1 provides destination IP address and Port number of Application B for which data is intended.
• The TCP protocol of computer 2 uses the port number to direct the message to Application B.
• Ports numbers(0 to 1023)- Well known Ports, (1224 to 49151)-Registered ports, Private Ports-(49152-65535)
Sockets:
• A Socket is a logical number comprising of the IP address and the port number.
• So, a pair of Sockets is required to identify a TCP connection between two applications on two different hosts.
Domain Name Server(DNS)
• The application layer programs operate on the concept of clients and servers.
• Source and destination addresses are needed for this communication to take place.
• The addressing in application programs is different from the other layers. E.g., e-mail address is like [email protected] where web page address is like http://www.google.com.
• These addresses are easy for people to remember and use but not suitable for IP protocol.
• Therefore an alias address has to be mapped to the IP address.
• DNS is used to handle naming or addressing within the Internet.
• DNS is not directly used by the user. It is used by another application program to carry out the mapping.