Preview

User Datagram

Good Essays
Open Document
Open Document
844 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
User Datagram
USER DATAGRAM PROTOCOL(UDP): The User Datagram Protocol(UDP) is called a connectionless, unreliable transport protocol. It does not add anything to the services of IP except to provide process to process communication instead of host to host communication. USER DATAGRAM: UDP packets, called user datagrams, have a fixed size header of 8 bytes. The below diagram shows the format of a user datagram. User datagram format: Source port number: This is the port number used by the process running on the source host. It is 16 bits long, which means that the port number can range from 0 to 65,535. If the source host is the client (a client sending a request), the port number is an ephemeral port number requested by the process and chosen by the UDP software running on the source host. If the source host is the server (a server sending a response), the port number is a well-known port number. Destination port number: This is the port number used by the process running on the destination host. It is also 16 bits long. If the destination host is the server (a client sending a request), the port number is a well-known port number. If the destination host is the client (a server sending a response), the port number is an ephemeral port number. The server copies the ephemeral port number that it has received in the request packet. Length: This is a 16 –bit field that defines the total length of the user datagram (header plus data). The 16 bits can define a total length of 0 to 65,535 bytes. UDP length=IP length – IP header’s length. Checksum: This field is used to detect errors over the entire user datagram (header plus data). The checksum includes three sections: a pseudoheader, the UDP header, and the data coming from the application layer. The pseudoheader is the part of the header of the IP packet in which the user datagram is to be encapsulated with some fields filled with 0’s If the checksum does not include the pseudoheader, a user

You May Also Find These Documents Helpful

  • Satisfactory Essays

    What field in the IP header determines the transport layer protocol that handles the contents of the packet?…

    • 434 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    5. What is the destination port for the DNS query message? What is the source port…

    • 671 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    • A port with a full memory buffer can cause frames for available ports to be delayed.…

    • 2145 Words
    • 9 Pages
    Good Essays
  • Satisfactory Essays

    NT1120 Lab 3

    • 115 Words
    • 1 Page

    Because the frame header contains everything that it needs to get from the source to the destination without having to go through the higher addressing, it’s not going out to another network so it doesn’t need to have its headers changed.…

    • 115 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    nt 2640 studyguide

    • 720 Words
    • 3 Pages

    What process is used by a DNS server to add a UDP header to the contents of a DNS query response, followed by adding an IP header, and then adding a data link header and trailer is an example of what?…

    • 720 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    At the destination this layer is responsible for combining the packets into their original state. This layer also checks to see if the layers are in the right order when received and not in duplicated form. If there is an error in one of the packets there is a request for that packet's retransmission. There are two protocols that sit at this layer. First, the TCP protocol connects the sender and the receiver using a socket which is determined by the IP address and port number. TCP keeps track of the packet delivery order and which ones need to be resent. UDP on the other hand is a connectionless communication and does not guarantee packet delivery between sender and receiver. Because it is connectionless the sender sends the data into the network with an IP address of the receiver and hopes it makes it to its destination. Since there is not a way of asking the sender to retransmit because of an error there is little error protection if…

    • 1266 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    netw 240 week 7

    • 330 Words
    • 3 Pages

    What Field in the TCP header contains a well known port number that maps to the Application that will handle the segment Data Stream?…

    • 330 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Gives system addressing and routing, and does so in such a manner as additionally to give a regular address space across numerous lower-level protocols. This makes conceivable the interconnection of systems that describes the Internet. The IP protocol works at this level.…

    • 1263 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Nt1310 Unit 3 Assignment 1

    • 2469 Words
    • 10 Pages

    In order to do so, the packet analyzer must “understand” the structure of all messages exchanged by protocols. For example, suppose we are interested in displaying the various fields in messages exchanged by the HTTP protocol in Figure 1. The packet analyzer understands the format of Ethernet frames, and so can identify the IP datagram within an Ethernet frame. It also understands the IP datagram format, so that it can extract the TCP segment within the IP datagram. Finally, it understands the TCP segment structure, so it can extract the HTTP message contained in the TCP segment. Finally, it understands the HTTP protocol and so, for example, knows that the first bytes of an HTTP message will contain the string “GET,” “POST,” or “HEAD,” as shown in Figure 2.8 in the…

    • 2469 Words
    • 10 Pages
    Good Essays
  • Satisfactory Essays

    Unit 8 Assignment 1

    • 349 Words
    • 1 Page

    IP address: A 32-bit binary number, often written in the DDN format, that hosts use as their unique identifier in a TCP/IP network, much like a postal mailing address in the postal system.…

    • 349 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Router Simulation

    • 331 Words
    • 2 Pages

    9. What numeric port range is commonly used by clients in a client -> server communication session? 0 to 1023…

    • 331 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    TCP / IP Model - provides end-to-end connectivity specifying how data should be formatted, addressed, transmitted, routed and received at the destination. This functionality has been organized into four abstraction layers which are used to sort all related protocols according to the scope of networking involved.[1][2] From lowest to highest, the layers are the link layer, containing communication technologies for a single network segment (link), the internet layer, connecting hosts across independent networks, thus establishing internetworking.…

    • 559 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    Lab 4A

    • 1053 Words
    • 4 Pages

    Deliverable 1 - A PDU (Protocol Data Unit) is an important term related to the initial four layers of the OSI model. In Layer 2 it contains the frame, in layer 3 it contains a packet, and in layer 4 it is a segment. Layer 5 contains the data. The PDU has four field’s destination access point, source service point, control field and information field. The source where Wireshark retrieved the data from was www.cnn.com…

    • 1053 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Cnt 4513 Study Guild

    • 578 Words
    • 3 Pages

    Note: This study guild also include the material covered before midterm for completeness. You can focus on Chapter 4 and 5…

    • 578 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    distinguish how many of each packet size was transmitted on your LAN segment? Why is this important…

    • 338 Words
    • 2 Pages
    Satisfactory Essays