0
3.7kviews
Explain term UDP.
1 Answer
1
50views

The User Datagram Protocol (UDP) is an unreliable, connectionless transport layer protocol. It is very simple protocol that provides on;y two additional services beyond IP: demultiplexing and error checking on data. UDP adds a mechanism that distinguishes among multiple applications in the host. UDP can optionally check the integrity of the entire UDP datagram. Applications that use UDP include Trivial file Transfer Protocol, DNS, SNMP and Real-Time Protocol (RTP).

enter image description here

Source port number: This is the port number used by the process running on the source host. It is 16 bits long, which means that the port number can range from 0 to 65,535. If the source host is the client (a client sending a request), the port number, in most cases, is an ephemeral port number requested by the process and chosen by the UDP software running on the source host. If the source host is the server (a server sending a response), the port number, in most cases, is a well-known port number.

Destination port number: This is the port number used by the process running on the destination host. It is also 16 bits long. If the destination host is the server (a client sending a request), the port number, in most cases, is a well-known port number. If the destination host is the client (a server sending a response), the port number, in most cases, is an ephemeral port number. In this case, the server copies the ephemeral port number it has received in the request packet.

Length: This is a 16-bit field that defines the total length of the user datagram, header plus data. The 16 bits can define a total length of 0 to 65,535 bytes. However, the total length needs to be much less because a UDP user datagram is stored in an IP datagram with a total length of 65,535 bytes. The length field in a UDP user datagram is actually not necessary. A user datagram is encapsulated in an IP datagram. There is a field in the IP datagram that defines the total length. There is another field in the IP datagram that defines the length of the header. So if we subtract the value of the second field from the first, we can deduce the length of a UDP datagram that is encapsulated in an IP datagram.

Checksum: This field is used to detect errors over the entire user datagram (header plus data)

The following lists some uses of the UDP protocol:

  • UDP is suitable for a process that requires simple request-response communication with little concern for flow and error control. It is not usually used for a process such as FTP that needs to send bulk data.
  • UDP is suitable for a process with internal flow and error control mechanisms. For example, the Trivial File Transfer Protocol (TFTP) process includes flow and error control. It can easily use UDP.
  • UDP is a suitable transport protocol for multicasting. Multicasting capability is embedded in the UDP software but not in the TCP software.
  • UDP is used for management processes such as SNMP.
  • UDP is used for some route updating protocols such as Routing Information Protocol (RIP).
Please log in to add an answer.