0% found this document useful (0 votes)
8 views

Lecture_5 (1) (1)

User Datagram Protocol (UDP) is a connectionless and unreliable transport layer protocol that allows fast transactions without the overhead of establishing a connection. It is commonly used in applications like NTP, DNS, and video streaming, offering advantages such as speed and lower latency, but lacks reliability, congestion control, and flow control. UDP is best suited for applications that can tolerate data loss, while being vulnerable to attacks and not ideal for reliable data delivery needs.

Uploaded by

esha46065
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views

Lecture_5 (1) (1)

User Datagram Protocol (UDP) is a connectionless and unreliable transport layer protocol that allows fast transactions without the overhead of establishing a connection. It is commonly used in applications like NTP, DNS, and video streaming, offering advantages such as speed and lower latency, but lacks reliability, congestion control, and flow control. UDP is best suited for applications that can tolerate data loss, while being vulnerable to attacks and not ideal for reliable data delivery needs.

Uploaded by

esha46065
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 8

User Datagram Protocol (UDP)

• Connectionless (Unreliable)

• Use Datagram

• No flag

• Error Control (optional)

• No Flow Control

• No Error Control

• Fast Transaction
User Datagram Protocol (UDP)
User Datagram Protocol (UDP)
Comparison of TCP and UDP
Applications of UDP

Following implementations uses UDP as a transport layer


protocol.

NTP (Network Time Protocol)


DNS (Domain Name Service)
BOOTP, DHCP.
NNP (Network News Protocol)
TFTP, RTSP, RIP.
User Datagram Protocol (UDP)

1.Source Port: Source Port is a 2 Byte long field used to identify


the port number of the source.

2.Destination Port: It is a 2 Byte long field, used to identify the


port of the destined packet.

1.Length: Length is the length of UDP including the header and


the data. It is a 16-bits field (min length 8 bytes).

1.Checksum: Checksum is 2 Bytes long field. It is the 16-bit one’s


complement of the one’s complement sum of the UDP header, the
pseudo-header of information from the IP header, and the data,
padded with zero octets at the end (if necessary) to make a multiple
of two octets.
Advantages of UDP

1. Speed: UDP is faster than TCP because it does not have the
overhead of establishing a connection and ensuring reliable data
delivery.
2. Lower latency: Since there is no connection establishment, there is
lower latency and faster response time.
3. Simplicity: UDP has a simpler protocol design than TCP, making it
easier to implement and manage.
4. Broadcast support: UDP supports broadcasting to multiple
recipients, making it useful for applications such as video streaming
and online gaming.
Disadvantages of UDP
1. No reliability: UDP does not guarantee delivery of packets or order
of delivery, which can lead to missing or duplicate data.
2. No congestion control: UDP does not have congestion control, which
means that it can send packets at a rate that can cause network
congestion.
3. No flow control: UDP does not have flow control, which means that
it can overwhelm the receiver with packets that it cannot handle.
4. Vulnerable to attacks: UDP is vulnerable to denial-of-service attacks,
where an attacker can flood a network with UDP packets,
overwhelming the network and causing it to crash.
5. Limited use cases: UDP is not suitable for applications that require
reliable data delivery, such as email or file transfers, and is better suited
for applications that can tolerate some data loss, such as video
streaming or online gaming.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy