Chapter 11. User Datagram Protocol (UDP)



Similar documents
Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

8.2 The Internet Protocol

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst

Network Programming TDC 561

User Datagram Protocol - Wikipedia, the free encyclopedia

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

IP - The Internet Protocol

Transport and Network Layer

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring

TCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline

Transport Layer Protocols

Ethernet. Ethernet. Network Devices

Network Layer: Network Layer and IP Protocol

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology

Chapter 5. Transport layer protocols

Internet Architecture and Philosophy

Lecture 28: Internet Protocols

Network layer: Overview. Network layer functions IP Routing and forwarding

NETWORK LAYER/INTERNET PROTOCOLS

SSC - Communication and Networking Java Socket Programming (II)

Internet Control Protocols Reading: Chapter 3

The TCP/IP Reference Model

Improved Digital Media Delivery with Telestream HyperLaunch

Network layer" 1DT066! Distributed Information Systems!! Chapter 4" Network Layer!! goals: "

How do I get to

Transport Layer. Chapter 3.4. Think about

Chapter 3. Internet Applications and Network Programming

DEVELOPING A WEB-BASED PACKET MONITORING TOOL

Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)

Virtual Server and DDNS. Virtual Server and DDNS. For BIPAC 741/743GE

Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol

2. IP Networks, IP Hosts and IP Ports

IP address format: Dotted decimal notation:

Protocols. Packets. What's in an IP packet

Objectives of Lecture. Network Architecture. Protocols. Contents

Protocols and Architecture. Protocol Architecture.

IP addressing and forwarding Network layer

Lecture 2-ter. 2. A communication example Managing a HTTP v1.0 connection. G.Bianchi, G.Neglia, V.Mancuso

Interconnection of Heterogeneous Networks. Internetworking. Service model. Addressing Address mapping Automatic host configuration

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

TCP/IP Programming. Joel Snyder, Opus1 Geoff Bryant, Process Software

Network Working Group Request for Comments: 840 April Official Protocols

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Auxiliary Protocols

Overview of TCP/IP. TCP/IP and Internet

Internet Protocols. Background CHAPTER

Application Layer -1- Network Tools

Overview of Computer Networks

Chapter 3: Review of Important Networking Concepts. Magda El Zarki Dept. of CS UC Irvine

Network Address Translation (NAT)

Configuring Channel Access. Jeff Hill

EXPLORER. TFT Filter CONFIGURATION

Internet Protocol (IP) IP - Network Layer. IP Routing. Advantages of Connectionless. CSCE 515: Computer Network Programming IP routing

Kap. 2. Transport - Schicht

Voice over IP: RTP/RTCP The transport layer

CONNECTING WINDOWS XP PROFESSIONAL TO A NETWORK

Subnetting,Supernetting, VLSM & CIDR

IP Multicasting. Applications with multiple receivers

IP Subnetting and Addressing

IP Addressing. -Internetworking (with TCP/IP) -Classful addressing -Subnetting and Supernetting -Classless addressing

The Transport Layer. Antonio Carzaniga. October 24, Faculty of Informatics University of Lugano Antonio Carzaniga

Internetworking. Problem: There is more than one network (heterogeneity & scale)

ICOM : Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM

Introduction to TCP/IP

Computer Networks UDP and TCP

Lecture Computer Networks

The Internet. Internet Technologies and Applications

Review: Lecture 1 - Internet History

Unix System Administration

CS 78 Computer Networks. Internet Protocol (IP) our focus. The Network Layer. Interplay between routing and forwarding

CS335 Sample Questions for Exam #2

Internet Packets. Forwarding Datagrams

Advanced Networking Voice over IP: RTP/RTCP The transport layer

Technical Support Information Belkin internal use only

LESSON Networking Fundamentals. Understand TCP/IP

How To Understand The Internet Of S (Netware)

Architecture and Performance of the Internet

Network Models and Protocols

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

Computer Networks. Chapter 5 Transport Protocols

Industrial Communication Whitepaper. Principles of EtherNet/IP Communication

Linux MDS Firewall Supplement

TCP/IP Basis. OSI Model

Adding an Extended Access List

Gary Hecht Computer Networking (IP Addressing, Subnet Masks, and Packets)

Chapter 4 Network Layer

NAT & IP Masquerade. Internet NETWORK ADDRESS TRANSLATION INTRODUCTION. NAT & IP Masquerade Page 1 of 5. Internal PC

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

Computer Networks/DV2 Lab

Classful IP Addressing. Classless Addressing: CIDR. Routing & Forwarding: Logical View of a Router. IP Addressing: Basics

04 Internet Protocol (IP)

CS 457 Lecture 19 Global Internet - BGP. Fall 2011

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

Lecture 8. IP Fundamentals

Internet Protocol Version 6 (IPv6)

Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)

DO NOT REPLICATE. Analyze IP. Given a Windows Server 2003 computer, you will use Network Monitor to view and analyze all the fields of IP.

Transcription:

Chapter 11 User Datagram Protocol (UDP) The McGraw-Hill Companies, Inc., 2000 1

CONTENTS PROCESS-TO-PROCESS COMMUNICATION USER DATAGRAM CHECKSUM UDP OPERATION USE OF UDP UDP PACKAGE The McGraw-Hill Companies, Inc., 2000 2

Position of UDP in the TCP/IP protocol suite The McGraw-Hill Companies, Inc., 2000 3

UDP Services Process-to-process communication using Ports. Fundamentally, this is the only thing it adds on top of IP. Control: No flow control or acknowledgment Minimal error control: simply detect and drop. No Segmentation/Reassembly service. Incoming data must fit in a UDP packet. Connectionless & Unreliable transport. Minimal overhead, compared to TCP The McGraw-Hill Companies, Inc., 2000 4

11.1 PROCESS TO PROCESS COMMUNICATION UDP versus IP The McGraw-Hill Companies, Inc., 2000 5

Client-Server Paradigm & Ports A Client process on a local host sends a request to a Server process on a remote host. Client process identification: Local host IP Ephemeral port number (0-65,535) randomly chosen by UDP Server process identification Remote host IP Well-known port number The McGraw-Hill Companies, Inc., 2000 6

Role of IP addresses vs. Port numbers The McGraw-Hill Companies, Inc., 2000 7

IANA Port Number Ranges Port 7 13 111 123 161 Protocol Echo Daytime RPC NTP SNMP Description Echoes a received datagram back to sender Returns the date and time Remote procedure call Network Time Protocol Simple Network Management Protocol The McGraw-Hill Companies, Inc., 2000 8

Socket addresses IP Header UDP Header The McGraw-Hill Companies, Inc., 2000 9

11.2 UDP Packets or User Datagram Max UDP Data length = 65535 - UDP Header (8) - Smallest IP header(20) = 65,507 The McGraw-Hill Companies, Inc., 2000 10

11.3 Checksum Checksum covers three sections: 1. Pseudoheader (which does not physically exist as part of the user datagram) 2. UDP header 3. Data coming from Application Layer whose length must be an even number of Bytes. Padding may be added to help compute the checksum, then eliminated be. The McGraw-Hill Companies, Inc., 2000 11

Pseudoheader added to the UDP datagram The McGraw-Hill Companies, Inc., 2000 12

Checksum calculation of a simple UDP user datagram The McGraw-Hill Companies, Inc., 2000 13

11.4 UDP Operation Its Connectionless: Independent user datagrams, even if from same source socket to same destination socket. No streaming is supported. Data must be small enough to fit in one user datagram. No flow or error control If checksum fail, destination silently drops the datagram. Source gets no idea whether the user datagram has arrived. The McGraw-Hill Companies, Inc., 2000 14

Encapsulation and decapsulation + pair of sockets + data length + sender s socket Protocol = 17 + Sender/Receiver IP The McGraw-Hill Companies, Inc., 2000 15

Queues in UDP The McGraw-Hill Companies, Inc., 2000 16

Multiplexing and demultiplexing The McGraw-Hill Companies, Inc., 2000 17

11.5 Use of UDP Simple request-response communication (no bulk data) Processes with Internal flow and error-control mechanisms (e.g. Trivial FTP). Multicasting and Broadcasting Management processes (e.g. SNMP) Routing Information Protocol (RIP) for route updating. The McGraw-Hill Companies, Inc., 2000 18

11.6 UDP Package The McGraw-Hill Companies, Inc., 2000 19

Examples Control-block table at the beginning State Process ID Port Number Queue Number -------- ------------ -------------- ------------------ IN-USE 2,345 52,010 34 IN-USE 3,422 52,011 FREE IN-USE 4,652 52,012 38 FREE The McGraw-Hill Companies, Inc., 2000 20

Example 1 The first activity is the arrival of a user The McGraw-Hill Companies, Inc., 2000 21

Example 2 After a few seconds, a process starts. It asks The McGraw-Hill Companies, Inc., 2000 22

Modified table after Example 2 State Process ID Port Number Queue Number -------- ------------ -------------- ------------------ IN-USE 2,345 52,010 34 IN-USE 3,422 52,011 IN-USE 4,978 52,014 IN-USE 4,652 52,012 38 FREE The McGraw-Hill Companies, Inc., 2000 23

Example 3 A user datagram now arrives for port 52,011. The McGraw-Hill Companies, Inc., 2000 24

Modified table after Example 3 State Process ID Port Number Queue Number -------- ------------ -------------- ------------------ IN-USE 2,345 52,010 34 IN-USE 3,422 52,011 43 IN-USE 4,978 52,014 IN-USE 4,652 52,012 38 FREE The McGraw-Hill Companies, Inc., 2000 25

Example 4 After a few seconds, a user datagram arrives for port 52,222. The input module checks the table and cannot find the entry for this destination. The user datagram is dropped and a request is made to ICMP to send an unreachable port message to the source. The McGraw-Hill Companies, Inc., 2000 26

Example 5 After a few seconds, a process needs to send a user datagram. It delivers the data to the output module which adds the UDP header and sends it. The McGraw-Hill Companies, Inc., 2000 27