Chapter 14. User Datagram Program (UDP)

Similar documents
Chapter 11. User Datagram Protocol (UDP)

Transport Layer Protocols

Ethernet. Ethernet. Network Devices

Final for ECE374 05/06/13 Solution!!

Protocols. Packets. What's in an IP packet

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst

Transport and Network Layer

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology

The OSI Model and the TCP/IP Protocol Suite

Protocols and Architecture. Protocol Architecture.

Lecture 28: Internet Protocols

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Protocol Data Units and Encapsulation

Improved Digital Media Delivery with Telestream HyperLaunch

IP - The Internet Protocol

Computer Networks. Chapter 5 Transport Protocols

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP

Networking Test 4 Study Guide

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

Encapsulating Voice in IP Packets

PART OF THE PICTURE: The TCP/IP Communications Architecture

Objectives of Lecture. Network Architecture. Protocols. Contents

The OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows:

Computer Networks UDP and TCP

ICOM : Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM

The Transport Layer. Antonio Carzaniga. October 24, Faculty of Informatics University of Lugano Antonio Carzaniga

Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose

CPS221 Lecture: Layered Network Architecture

How To Design A Layered Network In A Computer Network

(Refer Slide Time: 02:17)

User Datagram Protocol - Wikipedia, the free encyclopedia

Chapter 3. Internet Applications and Network Programming

Network Programming TDC 561

IP Subnetting and Addressing

Voice over IP: RTP/RTCP The transport layer

Transport Layer. Chapter 3.4. Think about

Network Layer: Network Layer and IP Protocol

Architecture and Performance of the Internet

CS335 Sample Questions for Exam #2

LESSON Networking Fundamentals. Understand TCP/IP

Internet Architecture and Philosophy

8.2 The Internet Protocol

Advanced Networking Voice over IP: RTP/RTCP The transport layer

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

Chapter 5. Transport layer protocols

TCP/IP Programming. Joel Snyder, Opus1 Geoff Bryant, Process Software

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Requirements of Voice in an IP Internetwork

technology standards and protocol for ip telephony solutions

How do I get to

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS

Names & Addresses. Names & Addresses. Hop-by-Hop Packet Forwarding. Longest-Prefix-Match Forwarding. Longest-Prefix-Match Forwarding

q Connection establishment (if connection-oriented) q Data transfer q Connection release (if conn-oriented) q Addressing the transport user

Communications and Computer Networks

Internet Packets. Forwarding Datagrams

First Midterm for ECE374 03/09/12 Solution!!

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, Lecturer: Kartik Krishnan Lecture 1-3

Lab 1: Packet Sniffing and Wireshark

SSC - Communication and Networking Java Socket Programming (II)

Access Control: Firewalls (1)

The TCP/IP Reference Model

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

EXPLORER. TFT Filter CONFIGURATION

Internet Control Protocols Reading: Chapter 3

Electronic Mail

CSIS CSIS 3230 Spring Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture

[Prof. Rupesh G Vaishnav] Page 1

Lecture 2-ter. 2. A communication example Managing a HTTP v1.0 connection. G.Bianchi, G.Neglia, V.Mancuso

Network Layer: and Multicasting Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

RARP: Reverse Address Resolution Protocol

Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007)

What is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir noubir@ccs.neu.

Today s Lecture : Introduction to Telecommunication Networks Lectures 2: Protocol Stack. Applications and Application Protocols

Per-Flow Queuing Allot's Approach to Bandwidth Management

Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol

Computer Networks/DV2 Lab

Introduction to Computer Networks

IP Addressing. -Internetworking (with TCP/IP) -Classful addressing -Subnetting and Supernetting -Classless addressing

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Topics. Computer Networks. Let s Get Started! Computer Networks: Our Definition. How are Networks Used by Computers? Computer Network Components

Multimedia Communications Voice over IP

The OSI and TCP/IP Models. Lesson 2

2.1 Introduction. 2.2 Voice over IP (VoIP)

Zarządzanie sieciami telekomunikacyjnymi

Module 1: Reviewing the Suite of TCP/IP Protocols

Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)

Sources: Chapter 6 from. Computer Networking: A Top-Down Approach Featuring the Internet, by Kurose and Ross

Overview of TCP/IP. TCP/IP and Internet

NETWORK LAYER/INTERNET PROTOCOLS

RTP / RTCP. Announcements. Today s Lecture. RTP Info RTP (RFC 3550) I. Final Exam study guide online. Signup for project demos

IP address format: Dotted decimal notation:

How To Understand The Internet Of S (Netware)

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

Module 7 Internet And Internet Protocol Suite

Computer Networks Homework 1

Jean Parrend 1/6 SNMP. Content. 1. Introduction...1

CS 78 Computer Networks. Internet Protocol (IP) our focus. The Network Layer. Interplay between routing and forwarding

An Introduction to VoIP Protocols

Transcription:

Chapter 14 User Datagram Program (UDP) TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Network layer versus transport layer TCP/IP Protocol Suite 2

Port numbers Ephemeral port number Well-known port number TCP/IP Protocol Suite 3

Note The well-known port numbers are less than 1,024. TCP/IP Protocol Suite 4

IP addresses versus port numbers Data 13 Destination port number selects the process TCP/IP Protocol Suite 5

Socket address Server socket address defines the server process uniquely. TCP/IP Protocol Suite 6

Encapsulation and Decapsulation Encapsulation happens at the sender site. The packets at the transport layers are called user datagrams, segments, or packets. Decapsulation happens at the receive site. TCP/IP Protocol Suite 7

Multiplexing and Demultiplexing The transport layer at the source performs multiplexing (many to one). The transport layer at the destination performs demultiplexing (one to many). TCP/IP Protocol Suite 8

Pushing or pulling Producer-Consumer paradigm One host produce items and another host consume them Balance between production and consumption rates Production rate is faster then consumption rate. The consumer needs to discard some items --- flow control Production rate is slower than consumption rate. The consumer should wait. Pushing --- producer delivers items whenever they are produced Pulling --- producer delivers the items after consumer has requested them TCP/IP Protocol Suite 9

Flow control at the transport layer TCP/IP Protocol Suite 10

Error control at the transport layer Packets Error Control TCP/IP Protocol Suite 11

Congestion Control Congestion The load on the network (the number of packets sent to the network) is greater than the capacity of the network (the number of packages a network can handle). Congestion Control The mechanism to keep the load below the capacity TCP/IP Protocol Suite 12

Connectionless service TCP/IP Protocol Suite 13

Connection-oriented service TCP/IP Protocol Suite 14

Chapter Outline TCP/IP Protocol Suite 15

14-1 INTRODUCTION Figure 14.1 shows the relationship of the User Datagram Protocol (UDP) to the other protocols and layers of the TCP/IP protocol suite: UDP is located between the application layer and the IP layer, and serves as the intermediary between the application programs and the network operations. TCP/IP Protocol Suite 16

Figure 14.1 Position of UDP in the TCP/IP protocol suite TCP/IP Protocol Suite 17

14-2 USER DATAGRAM UDP is a connectionless, unreliable transport protocol. No flow control, no error control, no congestion control Simple protocol using a minimum of overhead UDP packets, called user datagrams, have a fixed-size header of 8 bytes. Figure 14.2 shows the format of a user datagram. TCP/IP Protocol Suite 18

Figure 14.2 User datagram format TCP/IP Protocol Suite 19

Example 14.1 The following is a dump of a UDP header in hexadecimal format. a. What is the source port number? b. What is the destination port number? c. What is the total length of the user datagram? d. What is the length of the data? e. Is the packet directed from a client to a server or vice versa? f. What is the client process? TCP/IP Protocol Suite 20

Example 14.1 Continued Solution a. The source port number is the first four hexadecimal digits (CB84) 16 or 52100. b. The destination port number is the second four hexadecimal digits (000D) 16 or 13. c. The third four hexadecimal digits (001C) 16 define the length of the whole UDP packet as 28 bytes. d. The length of the data is the length of the whole packet minus the length of the header, or 28 8 = 20 bytes. e. Since the destination port number is 13 (well-known port), the packet is from the client to the server. f. The client process is the Daytime (see Table 14.1). TCP/IP Protocol Suite 21

TCP/IP Protocol Suite 22

14-3 UDP Services Process-to-Process communication Connectionless service No flow control No congestion control No error control except for checksum The sender does not know if a message has been lost or duplicated When the receiver detects an error through the checksum, the user datagram is silently discarded TCP/IP Protocol Suite 23

Figure 14.5 Encapsulation and decapsulation TCP/IP Protocol Suite 24

Figure 14.6 Queues in UDP TCP/IP Protocol Suite 25

Figure 14.7 Multiplexing and demultiplexing TCP/IP Protocol Suite 26

14-4 UDP APPLICATION UDP is a connectionless simple protocol with an optional checksum for error detection. If the request and response can each fit in one single user datagram, UDP may be preferable. Less overhead, less delay TCP/IP Protocol Suite 27

Example 14.4 A client-server application such as DNS (see Chapter 19) uses the services of UDP because a client needs to send a short request to a server and to receive a quick response from it. The request and response can each fit in one user datagram. Since only one message is exchanged in each direction, the connectionless feature is not an issue; the client or server does not worry that messages are delivered out of order. TCP/IP Protocol Suite 28

Example 14.5 A client-server application such as SMTP (see Chapter 23), which is used in electronic mail, cannot use the services of UDP because a user can send a long e-mail message, which may include multimedia (images, audio, or video). If the application uses UDP and the message does not fit in one single user datagram, the message must be split by the application into different user datagrams. Here the connectionless service may create problems. The user datagrams may arrive and be delivered to the receiver application out of order. The receiver application may not be able to reorder the pieces. This means the connectionless service has a disadvantage for an application program that sends long messages. TCP/IP Protocol Suite 29

Example 14.6 Assume we are downloading a very large text file from the Internet. We definitely need to use a transport layer that provides reliable service. We don t want part of the file to be missing or corrupted when we open the file. The delay created between the delivery of the parts are not an overriding concern for us; we wait until the whole file is composed before looking at it. In this case, UDP is not a suitable transport layer. TCP/IP Protocol Suite 30

Example 14.7 Assume we are watching a real-time stream video on our computer. Such a program is considered a long file; it is divided into many small parts and broadcast in real time. The parts of the message are sent one after another. If the transport layer is supposed to resend a corrupted or lost frame, the synchronizing of the whole transmission may be lost. The viewer suddenly sees a blank screen and needs to wait until the second transmission arrives. This is not tolerable. However, if each small part of the screen is sent using one single user datagram, the receiving UDP can easily ignore the corrupted or lost packet and deliver the rest to the application program. That part of the screen is blank for a very short period of the time, which most viewers do not even notice. However, video cannot be viewed out of order, so streaming audio, video, and voice applications that run over UDP must reorder or drop frames that are out of sequence. TCP/IP Protocol Suite 31

Summaries: To introduce UDP and show its relationship to other protocols in the TCP/IP protocol suite. To explain the format of a UDP packet and discuss the use of each field in the header. To discuss the services provided by the UDP such as process-toprocess delivery, multiplexing/demultiplexing, and queuing. To show how to calculate the optional checksum and the sender the needs to add a pseudoheader to the packet when calculating the checksum. To discuss how some application programs can benefit from the simplicity of UDP. To briefly discuss the structure of the UDP package. TCP/IP Protocol Suite 32