© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.

Slides:



Advertisements
Similar presentations
IP datagrams Service paradigm, IP datagrams, routing, encapsulation, fragmentation and reassembly.
Advertisements

Umut Girit  One of the core members of the Internet Protocol Suite, the set of network protocols used for the Internet. With UDP, computer.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
NET0183 Networks and Communications Lecture 23 UDP: a transport layer protocol 8/25/20091 NET0183 Networks and Communications by Dr Andy Brooks Lecture.
CECS 474 Computer Network Interoperability Notes for Douglas E. Comer, Computer Networks and Internets (5 th Edition) Tracy Bradley Maples, Ph.D. Computer.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets, 5e By Douglas E. Comer Lecture PowerPoints.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
CS335 Networking & Network Administration Tuesday, May 11, 2010.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
CSCI 4550/8556 Computer Networks Comer, Chapter 20: IP Datagrams and Datagram Forwarding.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets, 5e By Douglas E. Comer Lecture PowerPoints.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
IP-UDP-RTP Computer Networking (In Chap 3, 4, 7) 건국대학교 인터넷미디어공학부 임 창 훈.
Gursharan Singh Tatla Transport Layer 16-May
What Can IP Do? Deliver datagrams to hosts – The IP address in a datagram header identify a host IP treats a computer as an endpoint of communication Best.
NET0183 Networks and Communications Lectures 19 and 20 Support Protocols: ARP and ICMP 8/25/20091 NET0183 Networks and Communications by Dr Andy Brooks.
G64INC Introduction to Network Communications Ho Sooi Hock Internet Protocol.
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
TCP/IP: Basics1 User Datagram Protocol (UDP) Another protocol at transport layer is UDP. It is Connectionless protocol i.e. no need to establish & terminate.
TCP/IP PROTOCOL SUITE The TCPIIP protocol suite was developed prior to the OSI model. Therefore, the layers in the TCP/IP protocol suite do not exactly.
Introduction to Networks CS587x Lecture 1 Department of Computer Science Iowa State University.
FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA1 Part 2.6 UDP Principles (Chapter 24) (User Datagram Protocol)
Fall 2005Computer Networks20-1 Chapter 20. Network Layer Protocols: ARP, IPv4, ICMPv4, IPv6, and ICMPv ARP 20.2 IP 20.3 ICMP 20.4 IPv6.
FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA1 Part 2.5 Internetworking Chapter 25 (Transport Protocols, UDP and TCP, Protocol Port Numbers)
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets, 5e By Douglas E. Comer Lecture PowerPoints.
User Datagram Protocol (UDP) Chapter 11. Know TCP/IP transfers datagrams around Forwarded based on destination’s IP address Forwarded based on destination’s.
User Datagram Protocol (UDP) IP headers cannot identify application programs running a computer UDP is an end-to-end or transport protocol that allows.
Chapter 81 Internet Protocol (IP) Our greatest glory is not in never failing, but in rising up every time we fail. - Ralph Waldo Emerson.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
NET0183 Networks and Communications Lectures 15 and 16 Datagram Forwarding 8/25/20091 NET0183 Networks and Communications by Dr Andy Brooks Lecture powerpoints.
CPSC 441 TUTORIAL – FEB 13, 2012 TA: RUITNG ZHOU UDP REVIEW.
1 An Error Reporting Mechanism (ICMP). 2 IP Semantics IP is best-effort Datagrams can be –Lost –Delayed –Duplicated –Delivered out of order –Corrupted.
1 Chapter 23 Internetworking Part 3 (Control Messages, Error Handling, ICMP)
BZUPAGES.COM Presentation on TCP/IP Presented to: Sir Taimoor Presented by: Jamila BB Roll no Nudrat Rehman Roll no
Lecture 4 Overview. Ethernet Data Link Layer protocol Ethernet (IEEE 802.3) is widely used Supported by a variety of physical layer implementations Multi-access.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets, 5e By Douglas E. Comer Lecture PowerPoints.
S305 – Network Infrastructure Chapter 5 Network and Transport Layers.
COP 4930 Computer Network Projects Summer C 2004 Prof. Roy B. Levow Lecture 9.
2.1 Chapter 2 Network Models – cont. Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
UDP & TCP BS IT 4 th Semester By: Muhammad Hanif User Datagram Protocol & Transmission Control Protocol.
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
1 Kyung Hee University Chapter 11 User Datagram Protocol.
1 User Datagram Protocol. 2 Transport Protocols Provide logical communication between application processes running on different hosts Run on end hosts.
UDP: User Datagram Protocol Chapter 12. Introduction Multiple application programs can execute simultaneously on a given computer and can send and receive.
Process-to-Process Delivery:
3. END-TO-END PROTOCOLS (PART 1) Rocky K. C. Chang Department of Computing The Hong Kong Polytechnic University 22 March
UDP: User Datagram Protocol. What Can IP Do? Deliver datagrams to hosts – The IP address in a datagram header identify a host – treats a computer as an.
1 Chapter 24 Internetworking Part 4 (Transport Protocols, UDP and TCP, Protocol Port Numbers)
Chapter 5 Network and Transport Layers
Chapter 11 User Datagram Protocol
Computer Networks and Internets, 5e By Douglas E. Comer
Computer Networks and Internets, 5e By Douglas E. Comer
Internet Protocol: Connectionless Datagram Delivery
Net 431: ADVANCED COMPUTER NETWORKS
Net431:advanced net services
Process-to-Process Delivery:
Dr. John P. Abraham Professor UTPA
COMPUTER NETWORKS CS610 Lecture-35 Hammad Khalid Khan.
CPEG514 Advanced Computer Networkst
Net 323 D: Networks Protocols
Dr. John P. Abraham Professor UTPA
UDP Principles (Chapter 24) (User Datagram Protocol)
NET 323D: Networks Protocols
Presentation transcript:

© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas E. Comer Lecture PowerPoints By Lami Kaya,

© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.2 Chapter 24 User Datagram Protocol (UDP) Datagram Transport Service

© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.3 Topics Covered 24.1 Introduction 24.2 The Need For End-To-End Transport Protocols 24.3 The User Datagram Protocol 24.4 The Connectionless Paradigm 24.5 Message-Oriented Interface 24.6 UDP Communication Semantics 24.7 Arbitrary Interaction 24.8 Support For Unicast, Multicast, And Broadcast 24.9 Endpoint Identification With Protocol Port Numbers UDP Datagram Format The UDP Checksum And The Pseudo Header UDP Encapsulation

© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved Introduction This chapter considers UDP, a protocol that allows applications to send and receive datagrams discusses the UDP packet format explain the ways UDP can be used shows that although UDP is efficient and flexible, –it has the undesirable property of using best-effort delivery covers the important concept of protocol port numbers

© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved The Need For End-To-End Transport Protocols IP cannot distinguish among multiple application programs running on the same computer Why IP is incapable of supporting multiple applications? –The source/destination addresses identify a host computer The endpoint of a communication is –known as an “end-to-end protocol” or a “transport protocol” TCP / IP protocols chose to place end-to-end protocols in a separate layer, Layer 4, transport layer

© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved The User Datagram Protocol UDP can be characterized as: End-to-end Connectionless Message-oriented –An application that uses UDP sends and receives individual messages Best-effort –offers applications the same best-effort delivery semantics as IP Arbitrary interaction –an application can interact with many other applications Operating system (OS) independent –does not depend on identifiers used by the local OS

© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved The Connectionless Paradigm An application using UDP does not need to pre-establish a connection before sending data UDP allows an application to delay an arbitrarily long time between the transmissions If two applications stop sending data –no other packets are exchanged UDP does not need/use any control messages UDP has extremely low overhead

© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved Message-Oriented Interface UDP offers a message-oriented interface (MOI) UDP does not divide or combine messages The MOI has several important consequences: –UDP can depend on the protocol to preserve data boundaries –each UDP message must fit into a single IP datagram –datagram size forms an absolute limit on the size of a UDP Message size can cause inefficient use of the network –For small messages datagrams will have a large ratio of header/data –For large messages datagrams will be larger than the network MTU, and will be fragmented

© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved UDP Communication Semantics UDP provides best-effort delivery like IP, a message can be –lost –duplicated –delivered out of order –corrupted UDP does not detect or correct delivery problems. An application must either be immune to the problems –or take additional steps to detect and correct problems. UDP suitable for applications such as voice or video –applications that can tolerate delivery errors –but no delays

© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved Arbitrary Interaction UDP allows four styles of interaction: 1-to-1 –application exchanges messages with exactly one other apps. 1-to-many –application sends a message to multiple recipients many-to-1 –application receives messages from multiple senders many-to-many –a set of applications exchange messages with one another

© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved Support For Unicast, Multicast, And Broadcast Transmit the message via IP multicast or broadcast. –Assuming the underlying network supports broadcast IP will send the datagram in a broadcast frame –UDP allows an application to multicast messages Delivery via broadcast or multicast is especially useful for Ethernet networks –HW supports both types efficiently

© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved Endpoint Identification With Protocol Port Numbers How should UDP identify an application program as an endpoint? UDP Defines an abstract set of identifiers called protocol port number –independent of the underlying OS Provides a mapping between protocol port numbers and the program identifiers that the OS uses Allows only one application to specify a given pair of endpoints at any time

© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved UDP Datagram Format Each message is called a user datagram, has two parts: –a short header that specifies the sending/receiving applications –a payload that carries the data being sent Figure 24.1 illustrates the user datagram format. –SOURCE PORT –DESTINATION PORT –MESSAGE LENGTH –CHECKSUM

© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.14

© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved The UDP Checksum And The Pseudo Header CHECKSUM field is optional –A sender can either choose to compute a checksum –or make all bits of the checksum field zero Destination examines the checksum –verifies the checksum if the value is nonzero UDP extends the checksum –UDP software includes a pseudo header that contains source destination and type fields

© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved UDP Encapsulation UDP uses IP for delivery Like ICMP, UDP is encapsulated –in IP datagram and then in a LAN HW frame Figure 24.2 illustrates the concept

© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.17