NET0183 Networks and Communications Lecture 23 UDP: a transport layer protocol 8/25/20091 NET0183 Networks and Communications by Dr Andy Brooks Lecture.

Slides:



Advertisements
Similar presentations
Umut Girit  One of the core members of the Internet Protocol Suite, the set of network protocols used for the Internet. With UDP, computer.
Advertisements

CCNA – Network Fundamentals
NET0183 Networks and Communications Lecture 28 TCP: a transport layer protocol... the story continues... Sagan halda áfram 8/25/20091 NET0183 Networks.
Lecture 7 Transport Layer
CECS 474 Computer Network Interoperability Notes for Douglas E. Comer, Computer Networks and Internets (5 th Edition) Tracy Bradley Maples, Ph.D. Computer.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
Introduction to Transport Layer. Transport Layer: Motivation A B R1 R2 r Recall that NL is responsible for forwarding a packet from one HOST to another.
Understanding Networks. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets, 5e By Douglas E. Comer Lecture PowerPoints.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
IP-UDP-RTP Computer Networking (In Chap 3, 4, 7) 건국대학교 인터넷미디어공학부 임 창 훈.
Gursharan Singh Tatla Transport Layer 16-May
What Can IP Do? Deliver datagrams to hosts – The IP address in a datagram header identify a host IP treats a computer as an endpoint of communication Best.
Process-to-Process Delivery:
NET0183 Networks and Communications Lectures 19 and 20 Support Protocols: ARP and ICMP 8/25/20091 NET0183 Networks and Communications by Dr Andy Brooks.
1 Transport Layer Computer Networks. 2 Where are we?
G64INC Introduction to Network Communications Ho Sooi Hock Internet Protocol.
University of Calgary – CPSC 441.  UDP stands for User Datagram Protocol.  A protocol for the Transport Layer in the protocol Stack.  Alternative to.
Review: –What is AS? –What is the routing algorithm in BGP? –How does it work? –Where is “policy” reflected in BGP (policy based routing)? –Give examples.
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Protocol Layering Chapter 10. Looked at: Architectural foundations of internetworking Architectural foundations of internetworking Forwarding of datagrams.
Jaringan Komputer Dasar OSI Transport Layer Aurelio Rahmadian.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Transport Layer Introduction to Networking.
TCP/IP: Basics1 User Datagram Protocol (UDP) Another protocol at transport layer is UDP. It is Connectionless protocol i.e. no need to establish & terminate.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. © The McGraw-Hill Companies, Inc. Transport Layer Protocols – UDP and TCP Asst.
Introduction to Networks CS587x Lecture 1 Department of Computer Science Iowa State University.
FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA1 Part 2.6 UDP Principles (Chapter 24) (User Datagram Protocol)
Digital Multimedia, 2nd edition Nigel Chapman & Jenny Chapman Chapter 17 This presentation © 2004, MacAvon Media Productions Multimedia and Networks.
TCOM 509 – Internet Protocols (TCP/IP) Lecture 04_a Transport Protocols - UDP Instructor: Dr. Li-Chuan Chen Date: 09/22/2003 Based in part upon slides.
University of the Western Cape Chapter 12: The Transport Layer.
TCP/IP Transport and Application (Topic 6)
FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA1 Part 2.5 Internetworking Chapter 25 (Transport Protocols, UDP and TCP, Protocol Port Numbers)
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets, 5e By Douglas E. Comer Lecture PowerPoints.
User Datagram Protocol (UDP) IP headers cannot identify application programs running a computer UDP is an end-to-end or transport protocol that allows.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
NET0183 Networks and Communications Lectures 15 and 16 Datagram Forwarding 8/25/20091 NET0183 Networks and Communications by Dr Andy Brooks Lecture powerpoints.
Transport Layer COM211 Communications and Networks CDA College Theodoros Christophides
CPSC 441 TUTORIAL – FEB 13, 2012 TA: RUITNG ZHOU UDP REVIEW.
Multimedia and Networks. Protocols (rules) Rules governing the exchange of data over networks Conceptually organized into stacked layers – Application-oriented.
Institute of Technology Sligo - Dept of Computing Chapter 12 The Transport Layer.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets, 5e By Douglas E. Comer Lecture PowerPoints.
Digital Multimedia, 2nd edition Nigel Chapman & Jenny Chapman Chapter 17 This presentation © 2004, MacAvon Media Productions Multimedia and Networks.
2.1 Chapter 2 Network Models – cont. Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 End-to-End Protocols User Datagram Protocol (UDP) Transmission Control Protocol(TCP)
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
1 Kyung Hee University Chapter 11 User Datagram Protocol.
1 User Datagram Protocol. 2 Transport Protocols Provide logical communication between application processes running on different hosts Run on end hosts.
UDP: User Datagram Protocol Chapter 12. Introduction Multiple application programs can execute simultaneously on a given computer and can send and receive.
Data Communications and Networks Chapter 6 – IP, UDP and TCP ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
2: Transport Layer 11 Transport Layer 1. 2: Transport Layer 12 Part 2: Transport Layer Chapter goals: r understand principles behind transport layer services:
UDP: User Datagram Protocol. What Can IP Do? Deliver datagrams to hosts – The IP address in a datagram header identify a host – treats a computer as an.
© 2003, Cisco Systems, Inc. All rights reserved.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Chapter 11 User Datagram Protocol
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Process-to-Process Delivery:
Dr. John P. Abraham Professor UTPA
Net 323 D: Networks Protocols
CS4470 Computer Networking Protocols
Process-to-Process Delivery: UDP, TCP
Dr. John P. Abraham Professor UTPA
UDP Principles (Chapter 24) (User Datagram Protocol)
NET 323D: Networks Protocols
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Presentation transcript:

NET0183 Networks and Communications Lecture 23 UDP: a transport layer protocol 8/25/20091 NET0183 Networks and Communications by Dr Andy Brooks Lecture powerpoints from the recommended textbook are by Lami Kaya, Lecture powerpoints are © 2009 Pearson Education Inc. Their content has sometimes been edited by Andy Brooks.

8/25/2009 NET0183 Networks and Communications by Dr Andy Brooks 2 The recommended textbook is Computer Networks and Internets by Douglas E. Comer (for additional discounts and offers)

3 Two important protocols in the transport layer are TCP and UDP. TCP Transmission Control Protocol UDP User Datagram Protocol DHCP is an application layer protocol....just another protocol stack diagram

© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved Introduction UDP is one of the two major transport-layer protocols used in the Internet, the other being TCP. UDP is the only connectionless transport service. UDP is less compelx than TCP. “The device at one end of the communication transmits data to the other, without first ensuring that the recipient is available and ready to receive the data. The device sending a message simply sends it addressed to the intended recipient.” Connectionless Wikipedia 14. mars 2010

© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved Transport Protocols and End-to-End Communication IP cannot distinguish among multiple application programs running on a given host. –If a user runs an application and a web browser at the same time or runs multiple copies of a given application, they must be able to communicate independently. From IP's point of view, the source and destination fields in a datagram identify a host. –IP does not contain additional bits to identify an application on the host. –We say that IP treats a computer as an endpoint of communication. Transport-layer protocols are known as end-to-end protocols. –A transport protocol allows an application to be an endpoint of communication.

© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved The User Datagram Protocol Best-effort Delivery –UDP offers the same best-effort delivery semantics as IP. UDP allows an application: to send to many other applications receive from many other applications or communicate with exactly one other application Operating System independent –UDP provides a means of identifying application programs that does not depend on identifiers used by the local OS. port numbers UDP is sometimes characterized as a thin protocol layer.

© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved The Connectionless Paradigm UDP uses a connectionless communication paradigm. –An application using UDP does not need to pre-establish communication before sending data. Are you ready to receive a message? You receive flyers in the post at home from companies that never contacted you beforehand to ask if you are ready to receive the flyer. –An application using UDP can generate and send data at any time. –An application using UDP can delay an arbitrarily long time between the transmission of two messages. UDP does not maintain state. Companies do not know if their flyers are delivered. Companies do not know if their flyers are read. UDP does not use control messages. –Communication consists only of the data messages themselves. UDP has extremely low overhead.

© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved Message-Oriented Interface IP datagram size forms an absolute limit on the size. If an application sends extremely small UDP messages, the ratio of header octets to data octets will be large. –hhhhhhhhhhhhhhhhhhhhhhhhhhhhhd (representation only) –inefficient use of the network If an application sends extremely large UDP messages, datagrams will be larger than the network MTU, and will be fragmented by IP. –1500 & 1500 & 1500 & 1500 & 1500 (representation only) –inefficient use of the network

© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved UDP Communication Semantics UDP uses IP for all delivery. UDP provides best-effort delivery semantics as IP. This means messages can be: –Lost –Duplicated –Delayed –Delivered out-of-order –Corrupted UDP's best-effort delivery semantics have important consequences for applications. –An application must either be immune to the problems or the programmer must take additional steps to detect and correct problems. (e.g. what does DHCP software do at client and server?)

© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved UDP Communication Semantics As an example of an application that can tolerate packet errors, consider an audio transmission. –If the sender places a small amount of audio in each message, the loss of a single packet produces a small gap in the playback which can be tolerated by the person listening. Obviously problems arise if too many packets are lost. –“Th_ __gnal is bre_king u_.” At the opposite extreme, consider an on-line shopping application. –Such applications do not use UDP because packet errors can have serious consequences. e.g. message duplication might result in two orders being placed e.g. an incorrect amount might be charged to a credit card Would you run a hospital information system using UDP?

© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved Modes of Interaction and Broadcast Delivery UDP allows four styles of interaction: –1-to-1 –1-to-many –Many-to-1 –Many-to-many A 1-to-many interaction can be achieved as follows. –UDP allows an application to transmit the message via IP multicast or broadcast rather than require an application to repeatedly send the same message to many recipients. e.g. using IP's limited broadcast address A limited broadcast does not reach every node on the Internet, only the nodes on the local network.

© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved Endpoint Identification with Protocol Port Numbers UDP defines an abstract set of identifiers called protocol port numbers that are independent of the OS. UDP must provide a mapping between protocol port numbers and the program identifiers that the OS uses. –Operating Systems use the terms: process identifiers, job names, task identifiers,... All computers running UDP recognize the standard protocol port numbers, independent of the OS.

13

© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved The UDP Checksum and the Pseudo Header UDP header contains a 16-bit field named UDP checksum. (optional) –A sender can either choose to compute a checksum or set all bits of the checksum field to zero. When a message arrives at the destination, UDP software only verifies the checksum if the value is nonzero. UDP uses a ones-complement checksum. –if the computed checksum has a value of zero, a sender uses the all- ones form of zero To verify that messages reach the correct destination (host) without incurring the overhead of additional header fields for IP addresses, UDP extends the checksum.

© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved The UDP Checksum and the Pseudo Header UDP software includes a pseudo header that contains source, destination, and type (PROTOCOL) fields from the IP datagram and a UDP datagram length. –The sender computes a checksum as if the UDP header contained extra fields. To verify a checksum, a receiver must obtain the UDP length, and the source, destination, and type fields from the IP datagram. –The receiver appends them to the UDP message before verifying the checksum. Figure 25.2 illustrates fields in the pseudo header.

© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved The UDP Checksum and the Pseudo Header Figure 25.2 Illustration of the pseudo header used to calculate the UDP checksum. PROTO -> PROTOCOL

© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved UDP Encapsulation Each UDP datagram is encapsulated in an IP datagram for transmission across the Internet. Figure 25.3 (below) illustrates the encapsulation.

Some applications that use UDP Real-time audio and video streaming protocols use UDP because they can handle occasional lost packets. – e.g. RTP (Real-time Transport Protocol) DNS (Domain Name System) – provides the IP address of a domain name DHCP (Dynamic Host Configuration Protocol) – allocates an IP address to a host RIP (Routing Information Protocol) – “The routing algorithm used in RIP, the Bellman-Ford algorithm, was first deployed in a computer network in 1967, as the initial routing algorithm of the ARPANET.” Routing Information Wikipedia 15/3/10algorithmBellman-Ford algorithmARPANET 18 NET0183 Networks and Communications by Dr Andy Brooks 8/25/2009

NET0183 Networks and Communications by Dr Andy Brooks 19 Data Link Layer (OSI Model) Physical Layer (OSI Model)...just another protocol stack diagram

8/25/2009 NET0183 Networks and Communications by Dr Andy Brooks 20 how many protocols do you know?