0% found this document useful (0 votes)
17 views

CNPPT

The document provides an overview of the User Datagram Protocol (UDP). It discusses UDP's use of well-known ports for addressing, its datagram format which includes source/destination port numbers and length/checksum fields, and its connectionless and unreliable nature without flow/error control. Finally, it lists some common uses of UDP, including for request-response communications, protocols with internal controls like TFTP, multicasting, network management tools like SNMP, and some routing protocols.

Uploaded by

disha.june23
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views

CNPPT

The document provides an overview of the User Datagram Protocol (UDP). It discusses UDP's use of well-known ports for addressing, its datagram format which includes source/destination port numbers and length/checksum fields, and its connectionless and unreliable nature without flow/error control. Finally, it lists some common uses of UDP, including for request-response communications, protocols with internal controls like TFTP, multicasting, network management tools like SNMP, and some routing protocols.

Uploaded by

disha.june23
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

THE INTERNET

TRANSPORT
PROTOCOL: UDP
-Disha K
AGENDA

Introduction to User Datagram Protocol

Well-Known Ports for UDP

User Datagram Format

Checksum

UDP Operation

Use of UDP
Process-to-process delivery
Introduction Addressing
to User Connectionless service

Datagram Unreliable

If UDP is so powerless, why


Protocol would a process want to use it?
Port Protocol Description

7 Echo Echoes a received datagram back to the sender

9 Discard Discards any datagram that is received

11 Users Active users

13 Daytime Returns the date and the time

17 Quote Returns a quote of the day


Well-Known
19 Chargen Returns a string of characters

53 Nameserver Domain Name Service


Ports for
67 BOOTPs Server port to download bootstrap information

8 BOOTPc Client port to download bootstrap information


UDP
69 TFTP Trivial File Transfer Protocol

111 RPC Remote Procedure Call

123 NTP Network Time Protocol

161 SNMP Simple Network Management Protocol

162 SNMP Simple Network Management Protocol (trap)


User Datagram Format
Sour ce por t number :

This is the por t number used by the proces s running on the source host .

Destination por t number :

This is the por t number used by the process running on the dest inat ion host.

Length:

This is a 16-bit f ield that def ines t he t otal length of the user dat agram , header plus
dat a.

Checksum:

This f ield is used to detect errors over the ent ire user data gram (header

plus dat a).


Checksum
The checksum
includes three
sections: a
pseudoheader, the
UDP header, and the
data coming from the
application layer.
Checksum calculation of a simple UDP user datagram
UDP Operation

Connectionless Services: Each user datagram sent by UDP is an independent datagram. There is
no relationship between the different user datagrams.

Flow and Error Control: There is no flow control and there is no error control.

Encapsulation and Decapsulation: To send a message from one process to another, the UDP
protocol encapsulates and decapsulates messages in an IP datagram.

Queuing: In UDP, the queues are associated with the ports and their implementation.
T h e f o ll o wi n g lis t s s o m e u s e s o f t h e U D P pr o t o c o l :

• U D P i s s ui t a b l e f o r a p r o c es s t h a t r e q u ir e s s im pl e
r e q u es t - r e s p o n s e c o m m un i c a t i o n w it h li t tl e c o n c e r n
f o r f l o w a n d e r r o r c on t r o l. I t is no t u s u a ll y u s ed f o r
a pr o c es s s u c h a s Fr P t h a t n e e d s t o s e nd b u lk d at a .

• U D P i s s ui t a b l e f o r a p r o c es s w it h in t e r n a l f lo w an d
e r r o r c o n t r o l m e c h a n is m s . Fo r e x a m p le , th e Tr iv ia l
F il e Tra ns f er P r o t o c o l ( T F T P ) p r o c e s s in c l u d es f l o w
Use of UDP a n d e r r o r c o n t r o l. I t c a n ea s ily u s e U D P.

• U D P i s a s u it a b le t ra n s p o r t pr o t o c o l fo r
m u l ti c a s ti n g . M u lt i c a s t i n g c a pa b il it y is e m b e d d e d i n
t h e U D P s o f t wa r e b u t n o t in t h e TC P s o f t war e.

• U D P i s u s e d f or m a n a g e m en t p r o c e s s e s s uc h as
S NM P.

• U D P i s u s e d f or s o m e r o u t e u pd a t in g p r o t oc o ls s u c h
a s Ro u t in g I n fo r m a t i on P r o t o c o l ( R I P) .
THANK YOU

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy