© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets, 5e By Douglas E. Comer Lecture PowerPoints.

Slides:



Advertisements
Similar presentations
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Advertisements

Umut Girit  One of the core members of the Internet Protocol Suite, the set of network protocols used for the Internet. With UDP, computer.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
NET0183 Networks and Communications Lecture 23 UDP: a transport layer protocol 8/25/20091 NET0183 Networks and Communications by Dr Andy Brooks Lecture.
CECS 474 Computer Network Interoperability Notes for Douglas E. Comer, Computer Networks and Internets (5 th Edition) Tracy Bradley Maples, Ph.D. Computer.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets, 5e By Douglas E. Comer Lecture PowerPoints.
UDP - User Datagram Protocol UDP – User Datagram Protocol Author : Nir Shafrir Reference The TCP/IP Guide - ( Version Version.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
CS335 Networking & Network Administration Tuesday, May 11, 2010.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
CSCI 4550/8556 Computer Networks Comer, Chapter 20: IP Datagrams and Datagram Forwarding.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets, 5e By Douglas E. Comer Lecture PowerPoints.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
Chapter 19 Binding Protocol Addresses (ARP) Chapter 20 IP Datagrams and Datagram Forwarding.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
IP-UDP-RTP Computer Networking (In Chap 3, 4, 7) 건국대학교 인터넷미디어공학부 임 창 훈.
Gursharan Singh Tatla Transport Layer 16-May
What Can IP Do? Deliver datagrams to hosts – The IP address in a datagram header identify a host IP treats a computer as an endpoint of communication Best.
Process-to-Process Delivery:
1 Chapter Internetworking Part 4 (Transport Protocols, UDP and TCP, Protocol Port Numbers)
1 Transport Layer Computer Networks. 2 Where are we?
G64INC Introduction to Network Communications Ho Sooi Hock Internet Protocol.
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
Protocol Layering Chapter 10. Looked at: Architectural foundations of internetworking Architectural foundations of internetworking Forwarding of datagrams.
TCP/IP: Basics1 User Datagram Protocol (UDP) Another protocol at transport layer is UDP. It is Connectionless protocol i.e. no need to establish & terminate.
Introduction to Networks CS587x Lecture 1 Department of Computer Science Iowa State University.
FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA1 Part 2.6 UDP Principles (Chapter 24) (User Datagram Protocol)
University of the Western Cape Chapter 12: The Transport Layer.
FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA1 Part 2.5 Internetworking Chapter 25 (Transport Protocols, UDP and TCP, Protocol Port Numbers)
User Datagram Protocol (UDP) Chapter 11. Know TCP/IP transfers datagrams around Forwarded based on destination’s IP address Forwarded based on destination’s.
User Datagram Protocol (UDP) IP headers cannot identify application programs running a computer UDP is an end-to-end or transport protocol that allows.
Dr. John P. Abraham Professor UTPA
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
1 Chapter 21 Internetworking Part 2 (Datagram Encapsulation, Transmission, Fragmentation, Reassembly)
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
NET0183 Networks and Communications Lectures 15 and 16 Datagram Forwarding 8/25/20091 NET0183 Networks and Communications by Dr Andy Brooks Lecture powerpoints.
1 An Error Reporting Mechanism (ICMP). 2 IP Semantics IP is best-effort Datagrams can be –Lost –Delayed –Duplicated –Delivered out of order –Corrupted.
1 Chapter 23 Internetworking Part 3 (Control Messages, Error Handling, ICMP)
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets, 5e By Douglas E. Comer Lecture PowerPoints.
S305 – Network Infrastructure Chapter 5 Network and Transport Layers.
2.1 Chapter 2 Network Models – cont. Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
1 User Datagram Protocol. 2 Transport Protocols Provide logical communication between application processes running on different hosts Run on end hosts.
UDP: User Datagram Protocol Chapter 12. Introduction Multiple application programs can execute simultaneously on a given computer and can send and receive.
Data Communications and Networks Chapter 6 – IP, UDP and TCP ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
Process-to-Process Delivery:
Ch 3. Transport Layer Myungchul Kim
UDP: User Datagram Protocol. What Can IP Do? Deliver datagrams to hosts – The IP address in a datagram header identify a host – treats a computer as an.
1 Chapter 24 Internetworking Part 4 (Transport Protocols, UDP and TCP, Protocol Port Numbers)
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Computer Networks and Internets, 5e By Douglas E. Comer
Internet Protocol: Connectionless Datagram Delivery
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Dr. John P. Abraham Professor UTPA
Process-to-Process Delivery:
Dr. John P. Abraham Professor UTRGV, EDINBURG, TX
Dr. John P. Abraham Professor UTPA
Dr. John P. Abraham Professor UTPA
COMPUTER NETWORKS CS610 Lecture-35 Hammad Khalid Khan.
Net 323 D: Networks Protocols
Process-to-Process Delivery: UDP, TCP
Dr. John P. Abraham Professor UTPA
UDP Principles (Chapter 24) (User Datagram Protocol)
NET 323D: Networks Protocols
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Presentation transcript:

© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets, 5e By Douglas E. Comer Lecture PowerPoints By Lami Kaya,

© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.2 Chapter 25 UDP: Datagram Transport Service

© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.3 Topics Covered 25.1 Introduction 25.2 Transport Protocols And End-To-End Communication 25.3 The User Datagram Protocol 25.4 The Connectionless Paradigm 25.5 Message-Oriented Interface 25.6 UDP Communication Semantics 25.7 Modes Of Interaction And Broadcast Delivery 25.8 Endpoint Identification With Protocol Port Numbers 25.9 UDP Datagram Format The UDP Checksum And The Pseudo Header UDP Encapsulation

© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved Introduction This chapter –considers UDP, one of the two major transport-layer protocols used in the Internet and the only connectionless transport service –discusses the UDP packet format and the ways UDP can be used –covers the important concept of protocol port numbers The next chapter –continues the discussion by focusing on the other major transport- layer protocol, TCP Later chapters –discuss Internet routing and network management, which each use transport protocols

© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved Transport Protocols And End-To- End Communication IP cannot distinguish among multiple application programs running on a given host –If a user runs an application and a web browser at the same time or runs multiple copies of a given application they must be able to communicate independently From IP's point of view, the source and destination fields in a datagram identify a host –IP does not contain additional bits to identify an application on the host –We say that IP treats a computer as an endpoint of communication Transport-layer protocols are known as end-to-end protocols –a transport protocol allows an application to be an endpoint of communication TCP/IP placed end-to-end protocols in Layer 4

© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved The User Datagram Protocol TCP/IP suite contains two transport protocols –User Datagram Protocol (UDP) –Transmission Control Protocol (TCP) They differ in the service they offer to applications UDP is less complex and easy to understand UDP can be characterized as: End-to-end –UDP can distinguish among multiple applications running on a given computer Connectionless Message-oriented –UDP sends and receives individual messages

© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved The User Datagram Protocol Best-effort Delivery –It offers applications the same best-effort delivery semantics as IP Arbitrary Interaction –UDP allows an application to send to many other applications receive from many other applications or communicate with exactly one other application Operating System Independent –UDP provides a means of identifying application programs –It does not depend on identifiers used by the local OS UDP is sometimes characterized as a thin protocol layer

© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved The Connectionless Paradigm UDP uses a connectionless communication paradigm –means that an application using UDP does not need to pre-establish communication before sending data –an application can generate and send data at any time –UDP allows an application to delay an arbitrarily long time between the transmission of two messages UDP does not maintain state UDP does not use control messages –communication consists only of the data messages themselves UDP has extremely low overhead

© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved Message-Oriented Interface UDP offers applications a message-oriented interface Each time an application requests that UDP send data –UDP places the data in a single message for transmission –UDP does not divide a message into multiple packets –UDP does not combine messages for delivery Message-oriented interface has several consequences: –On the positive side applications preserve data boundaries –each message will be exactly the same as was transmitted –On the negative side each UDP message must fit into a single IP datagram

© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved Message-Oriented Interface IP datagram size forms an absolute limit on the size UDP message size can lead to inefficient use of the network If an application sends extremely small messages –datagrams will have a large ratio of header octets to data octets If an application sends extremely large messages –Datagrams may be larger than the network MTU –Datagrams will be fragmented by IP An application programmer can achieve higher efficiency by using large transfers –With UDP, however, sending large messages leads to less efficiency because large messages cause fragmentation

© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved UDP Communication Semantics UDP uses IP for all delivery UDP provides best-effort delivery semantics as IP This means messages can be: –Lost –Duplicated –Delayed –Delivered out-of-order –Corrupted UDP's best-effort delivery semantics have important consequences for applications –An application must either be immune to the problems or the programmer must take additional steps to detect and correct problems

© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved UDP Communication Semantics As an example of an application that can tolerate packet errors, consider an audio transmission –If the sender places a small amount of audio in each message the loss of a single packet produces a small gap in the playback This gap will be heard as a pop or click This desirable noise, can be annoying in some cases At the opposite extreme, consider an on-line shopping application –Such applications do not use UDP because packet errors can have serious consequences (e.g., duplication of a message that carries a catalog order can result in two orders, with double charges being made to the buyer's credit card)

© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved Modes Of Interaction And Broadcast Delivery UDP allows four styles of interaction: –1-to-1 –1-to-many –Many-to-1 –Many-to-many An application using UDP has a choice A 1-to-many interaction can be achieved as follows –An application to repeatedly send a message to multiple recipients, UDP allows an application to transmit the message via IP multicast or broadcast For example, local broadcast can be specified by using IP's limited broadcast address,

© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved Endpoint Identification With Protocol Port Numbers How should UDP identify an application as an endpoint? –UDP could use the same mechanism that the OS uses –Because UDP must span heterogeneous computers no common mechanism exists For example –some OS use process identifiers –others use job names –and others use task identifiers To avoid ambiguity –UDP defines an abstract set of identifiers called protocol port numbers that are independent of the OS –UDP must provide a mapping between protocol port numbers and the program identifiers that the OS uses All computers running UDP recognize the standard protocol port numbers, independent of the OS

© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved UDP Datagram Format Each UDP message is called a user datagram and consists of two parts: –a short header that specifies the sending and receiving application –a payload that carries the data being sent Figure 25.1 (below) illustrates the user datagram format.

© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved The UDP Checksum And The Pseudo Header UDP header contains a 16-bit field named UDP checksum (optional) –A sender can either choose to compute a checksum or set all bits of the checksum field to zero When a message arrives at the destination –UDP software examines the checksum field –and only verifies the checksum if the value is nonzero UDP uses a ones-complement checksum –if the computed checksum has a value of zero a sender uses the all-ones form of zero To verify that messages to reach the correct destination without incurring the overhead of additional header fields –UDP extends the checksum

© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved The UDP Checksum And The Pseudo Header UDP software includes a pseudo header that contains –source –destination –type (i.e. PROTO) fields from the IP datagram and a UDP datagram length –The sender computes a checksum as if the UDP header contained extra fields Similarly, to verify a checksum –a receiver must obtain the UDP length, and the source, destination, and type fields from the IP datagram; –the receiver appends them to the UDP message before verifying the checksum Figure 25.2 illustrates fields in the pseudo header

© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved The UDP Checksum And The Pseudo Header

© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved UDP Encapsulation Each UDP datagram is encapsulated in an IP datagram for transmission across the Internet Figure 25.3 (below) illustrates the encapsulation