SlideShare a Scribd company logo
CChhaapptteerr 1111 
UUsseerr DDaattaaggrraamm 
PPrroottooccooll 
Objectives 
Upon completion you will be able to: 
• Be able to explain process-to-process communication 
• Know the format of a UDP user datagram 
• Be able to calculate a UDP checksum 
• Understand the operation of UDP 
• Know when it is appropriate to use UDP 
• Understand the modules in a UDP package 
TCP/IP Protocol Suite 1
Figure 11.1 Position of UDP in the TCP/IP protocol suite 
TCP/IP Protocol Suite 2
11.1 PROCESS-TO-PROCESS 
COMMUNICATION 
Before we examine UDP, we must first uunnddeerrssttaanndd hhoosstt--ttoo--hhoosstt 
ccoommmmuunniiccaattiioonn aanndd pprroocceessss--ttoo--pprroocceessss ccoommmmuunniiccaattiioonn aanndd tthhee 
ddiiffffeerreennccee bbeettwweeeenn tthheemm.. 
TThhee ttooppiiccss ddiissccuusssseedd iinn tthhiiss sseeccttiioonn iinncclluuddee:: 
PPoorrtt NNuummbbeerrss 
SSoocckkeett AAddddrreesssseess 
TCP/IP Protocol Suite 3
Figure 11.2 UDP versus IP 
TCP/IP Protocol Suite 4
Figure 11.3 Port numbers 
TCP/IP Protocol Suite 5
Figure 11.4 IP addresses versus port numbers 
TCP/IP Protocol Suite 6
Figure 11.5 ICANN ranges 
TCP/IP Protocol Suite 7
NNoottee:: 
The well-known port numbers are less 
than 1024. 
TCP/IP Protocol Suite 8
TTaabbllee 1111..11 WWeellll--kknnoowwnn ppoorrttss uusseedd wwiitthh UUDDPP 
TCP/IP Protocol Suite 9
ExamplE 1 
In UNIX, the well-known ports are stored in a file called 
/etc/services. Each line in this file gives the name of the server 
and the well-known port number. We can use the grep utility to 
extract the line corresponding to the desired application. The 
following shows the port for TFTP. Note TFTP can use port 69 
on either UDP or TCP. 
$ grep tftp /etc/services 
tftp 69/tcp 
tftp 69/udp 
See Next Slide 
TCP/IP Protocol Suite 10
ExamplE 1 (ContinuEd) 
SNMP uses two port numbers (161 and 162), each for a 
different purpose, as we will see in Chapter 21. 
$ grep snmp /etc/services 
snmp 161/tcp #Simple Net Mgmt Proto 
snmp 161/udp #Simple Net Mgmt Proto 
snmptrap 162/udp #Traps for SNMP 
TCP/IP Protocol Suite 11
Figure 11.6 Socket address 
TCP/IP Protocol Suite 12
11.2 USER DATAGRAM 
UDP packets are called user datagrams and have aa ffiixxeedd--ssiizzee hheeaaddeerr ooff 
88 bbyytteess.. 
TCP/IP Protocol Suite 13
Figure 11.7 User datagram format 
TCP/IP Protocol Suite 14
NNoottee:: 
UDP length = 
IP length − IP header’s length 
TCP/IP Protocol Suite 15
11.3 CHECKSUM 
UDP checksum calculation is different from tthhee oonnee ffoorr IIPP aanndd IICCMMPP.. 
HHeerree tthhee cchheecckkssuumm iinncclluuddeess tthhrreeee sseeccttiioonnss:: aa ppsseeuuddoohheeaaddeerr,, tthhee UUDDPP 
hheeaaddeerr,, aanndd tthhee ddaattaa ccoommiinngg ffrroomm tthhee aapppplliiccaattiioonn llaayyeerr.. 
TThhee ttooppiiccss ddiissccuusssseedd iinn tthhiiss sseeccttiioonn iinncclluuddee:: 
CChheecckkssuumm CCaallccuullaattiioonn aatt SSeennddeerr 
CChheecckkssuumm CCaallccuullaattiioonn aatt RReecceeiivveerr 
OOppttiioonnaall UUssee ooff tthhee CChheecckkssuumm 
TCP/IP Protocol Suite 16
Figure 11.8 Pseudoheader for checksum calculation 
TCP/IP Protocol Suite 17
Figure 11.9 Checksum calculation of a simple UDP user datagram 
TCP/IP Protocol Suite 18
11.4 UDP OPERATION 
UDP uses concepts common to the transport layer. TThheessee ccoonncceeppttss wwiillll 
bbee ddiissccuusssseedd hheerree bbrriieeffllyy,, aanndd tthheenn eexxppaannddeedd iinn tthhee nneexxtt cchhaapptteerr oonn tthhee 
TTCCPP pprroottooccooll.. 
TThhee ttooppiiccss ddiissccuusssseedd iinn tthhiiss sseeccttiioonn iinncclluuddee:: 
CCoonnnneeccttiioonnlleessss SSeerrvviicceess 
FFllooww aanndd EErrrroorr CCoonnttrrooll 
EEnnccaappssuullaattiioonn aanndd DDeeccaappssuullaattiioonn 
QQuueeuuiinngg 
MMuullttiipplleexxiinngg aanndd DDeemmuullttiipplleexxiinngg 
TCP/IP Protocol Suite 19
Figure 11.10 Encapsulation and decapsulation 
TCP/IP Protocol Suite 20
Figure 11.11 Queues in UDP 
TCP/IP Protocol Suite 21
Figure 11.12 Multiplexing and demultiplexing 
TCP/IP Protocol Suite 22
11.5 USE OF UDP 
We discuss some uses of the UDP pprroottooccooll iinn tthhiiss sseeccttiioonn.. 
TCP/IP Protocol Suite 23
11.6 UDP PACKAGE 
To show how UDP handles the sending and receiving ooff UUDDPP ppaacckkeettss,, 
wwee pprreesseenntt aa ssiimmppllee vveerrssiioonn ooff tthhee UUDDPP ppaacckkaaggee.. TThhee UUDDPP ppaacckkaaggee 
iinnvvoollvveess ffiivvee ccoommppoonneennttss:: aa ccoonnttrrooll--bblloocckk ttaabbllee,, iinnppuutt qquueeuueess,, aa 
ccoonnttrrooll--bblloocckk mmoodduullee,, aann iinnppuutt mmoodduullee,, aanndd aann oouuttppuutt mmoodduullee.. 
TThhee ttooppiiccss ddiissccuusssseedd iinn tthhiiss sseeccttiioonn iinncclluuddee:: 
CCoonnttrrooll--BBlloocckk TTaabbllee 
IInnppuutt QQuueeuueess 
CCoonnttrrooll--BBlloocckk MMoodduullee 
IInnppuutt MMoodduullee 
OOuuttppuutt MMoodduullee 
TCP/IP Protocol Suite 24
Figure 11.13 UDP design 
TCP/IP Protocol Suite 25
TTaabbllee 1111..22 TThhee ccoonnttrrooll--bblloocckk ttaabbllee aatt tthhee bbeeggiinnnniinngg ooff eexxaammpplleess 
TCP/IP Protocol Suite 26
ExamplE 2 
The first activity is the arrival of a user datagram with 
destination port number 52,012. The input module searches for 
this port number and finds it. Queue number 38 has been 
assigned to this port, which means that the port has been 
previously used. The input module sends the data to queue 38. 
The control-block table does not change. 
TCP/IP Protocol Suite 27
ExamplE 3 
After a few seconds, a process starts. It asks the operating 
system for a port number and is granted port number 52,014. 
Now the process sends its ID (4,978) and the port number to 
the control-block module to create an entry in the table. The 
module takes the first FREE entry and inserts the information 
received. The module does not allocate a queue at this moment 
because no user datagrams have arrived for this destination 
(see Table 11.3). 
See Next Slide 
TCP/IP Protocol Suite 28
TTaabbllee 1111..33 CCoonnttrrooll--bblloocckk ttaabbllee aafftteerr EExxaammppllee 33 
TCP/IP Protocol Suite 29
ExamplE 4 
A user datagram now arrives for port 52,011. The input 
module checks the table and finds that no queue has been 
allocated for this destination since this is the first time a user 
datagram has arrived for this destination. The module creates 
a queue and gives it a number (43). See Table 11.4. 
See Next Slide 
TCP/IP Protocol Suite 30
TTaabbllee 1111..44 CCoonnttrrooll--bblloocckk aafftteerr EExxaammppllee 44 
TCP/IP Protocol Suite 31
ExamplE 5 
After a few seconds, a user datagram arrives for port 52,222. 
The input module checks the table and cannot find an entry for 
this destination. The user datagram is dropped and a request is 
made to ICMP to send an “unreachable port” message to the 
source. 
TCP/IP Protocol Suite 32

More Related Content

What's hot

Chap 14 rip, ospf
Chap 14 rip, ospfChap 14 rip, ospf
Chap 14 rip, ospf
Noctorous Jamal
 
Chap 05 ip addresses classfless
Chap 05 ip addresses classflessChap 05 ip addresses classfless
Chap 05 ip addresses classfless
Noctorous Jamal
 
Chap 21 snmp
Chap 21 snmpChap 21 snmp
Chap 21 snmp
Noctorous Jamal
 
Chap 27 next generation i pv6
Chap 27 next generation i pv6Chap 27 next generation i pv6
Chap 27 next generation i pv6
Noctorous Jamal
 
Chap 06 delivery and routing of ip packets
Chap 06 delivery and routing of ip packetsChap 06 delivery and routing of ip packets
Chap 06 delivery and routing of ip packets
Noctorous Jamal
 
Chap 22 www http
Chap 22 www httpChap 22 www http
Chap 22 www http
Noctorous Jamal
 
Chap 28 security
Chap 28 securityChap 28 security
Chap 28 security
Noctorous Jamal
 
Chap 24 mobile ip
Chap 24 mobile ipChap 24 mobile ip
Chap 24 mobile ip
Noctorous Jamal
 
Chap 04 ip addresses classful
Chap 04 ip addresses classfulChap 04 ip addresses classful
Chap 04 ip addresses classful
Noctorous Jamal
 
Chap 13 stream control transmission protocol
Chap 13 stream control transmission protocolChap 13 stream control transmission protocol
Chap 13 stream control transmission protocol
Noctorous Jamal
 
Chap 23 ip over atm
Chap 23 ip over atmChap 23 ip over atm
Chap 23 ip over atm
Noctorous Jamal
 
Chap 10 igmp
Chap 10 igmpChap 10 igmp
Chap 10 igmp
Noctorous Jamal
 
Chap 25 multimedia
Chap 25 multimediaChap 25 multimedia
Chap 25 multimedia
Noctorous Jamal
 
icmp , igmp
icmp , igmpicmp , igmp
icmp , igmp
AKSHIT KOHLI
 
Meeting 7 : host configuration: dhcp
Meeting 7 : host configuration: dhcpMeeting 7 : host configuration: dhcp
Meeting 7 : host configuration: dhcp
Syaiful Ahdan
 

What's hot (20)

Chap 14 rip, ospf
Chap 14 rip, ospfChap 14 rip, ospf
Chap 14 rip, ospf
 
Chap 05 ip addresses classfless
Chap 05 ip addresses classflessChap 05 ip addresses classfless
Chap 05 ip addresses classfless
 
Chap 21 snmp
Chap 21 snmpChap 21 snmp
Chap 21 snmp
 
Chap 27 next generation i pv6
Chap 27 next generation i pv6Chap 27 next generation i pv6
Chap 27 next generation i pv6
 
Chap 06 delivery and routing of ip packets
Chap 06 delivery and routing of ip packetsChap 06 delivery and routing of ip packets
Chap 06 delivery and routing of ip packets
 
Chap 22 www http
Chap 22 www httpChap 22 www http
Chap 22 www http
 
Chap 28 security
Chap 28 securityChap 28 security
Chap 28 security
 
Chap 24 mobile ip
Chap 24 mobile ipChap 24 mobile ip
Chap 24 mobile ip
 
Chap 04 ip addresses classful
Chap 04 ip addresses classfulChap 04 ip addresses classful
Chap 04 ip addresses classful
 
Chap 13 stream control transmission protocol
Chap 13 stream control transmission protocolChap 13 stream control transmission protocol
Chap 13 stream control transmission protocol
 
Chap 23 ip over atm
Chap 23 ip over atmChap 23 ip over atm
Chap 23 ip over atm
 
Chap 10 igmp
Chap 10 igmpChap 10 igmp
Chap 10 igmp
 
Chap 25 multimedia
Chap 25 multimediaChap 25 multimedia
Chap 25 multimedia
 
Ch11
Ch11Ch11
Ch11
 
Chap 11
Chap 11Chap 11
Chap 11
 
Ch21
Ch21Ch21
Ch21
 
Ch10
Ch10Ch10
Ch10
 
icmp , igmp
icmp , igmpicmp , igmp
icmp , igmp
 
Meeting 7 : host configuration: dhcp
Meeting 7 : host configuration: dhcpMeeting 7 : host configuration: dhcp
Meeting 7 : host configuration: dhcp
 
Ch09
Ch09Ch09
Ch09
 

Viewers also liked

Week13 lec2
Week13 lec2Week13 lec2
Week13 lec2
syedhaiderraza
 
Week14 lec2
Week14 lec2Week14 lec2
Week14 lec2
syedhaiderraza
 
ICMP
ICMPICMP
Chap 03 underlying technology
Chap 03 underlying technologyChap 03 underlying technology
Chap 03 underlying technology
Noctorous Jamal
 
Chap 15 multicasting
Chap 15 multicastingChap 15 multicasting
Chap 15 multicasting
Noctorous Jamal
 
Chap 12 tcp
Chap 12 tcpChap 12 tcp
Chap 12 tcp
Sparsh Samir
 
Chap 26 vpn
Chap 26 vpnChap 26 vpn
Chap 26 vpn
Noctorous Jamal
 
CS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKSCS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKS
Kathirvel Ayyaswamy
 
Transport layer services
Transport layer servicesTransport layer services
Transport layer services
Melvin Cabatuan
 
OSI Transport Layer
OSI Transport LayerOSI Transport Layer
OSI Transport Layer
Sachii Dosti
 
Congestion control in tcp
Congestion control in tcpCongestion control in tcp
Congestion control in tcp
samarai_apoc
 

Viewers also liked (11)

Week13 lec2
Week13 lec2Week13 lec2
Week13 lec2
 
Week14 lec2
Week14 lec2Week14 lec2
Week14 lec2
 
ICMP
ICMPICMP
ICMP
 
Chap 03 underlying technology
Chap 03 underlying technologyChap 03 underlying technology
Chap 03 underlying technology
 
Chap 15 multicasting
Chap 15 multicastingChap 15 multicasting
Chap 15 multicasting
 
Chap 12 tcp
Chap 12 tcpChap 12 tcp
Chap 12 tcp
 
Chap 26 vpn
Chap 26 vpnChap 26 vpn
Chap 26 vpn
 
CS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKSCS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKS
 
Transport layer services
Transport layer servicesTransport layer services
Transport layer services
 
OSI Transport Layer
OSI Transport LayerOSI Transport Layer
OSI Transport Layer
 
Congestion control in tcp
Congestion control in tcpCongestion control in tcp
Congestion control in tcp
 

Similar to Chap 11 udp

User datagram protocol
User datagram protocolUser datagram protocol
User datagram protocolMohd Arif
 
Chap 18 telnet
Chap 18 telnetChap 18 telnet
Chap 18 telnet
Raja Kumar Ranjan
 
Transportlayer.ppt
Transportlayer.pptTransportlayer.ppt
Transportlayer.ppt
AayushMishra89
 
PowerPoint_merge (2).pdf
PowerPoint_merge (2).pdfPowerPoint_merge (2).pdf
PowerPoint_merge (2).pdf
ssuser3b47e6
 
PowerPoint_merge.ppt
PowerPoint_merge.pptPowerPoint_merge.ppt
PowerPoint_merge.ppt
ssuser3b47e6
 
Chap-13.ppt
Chap-13.pptChap-13.ppt
Chap-13.ppt
SadhanaBijrothiya
 
TransportLayerServices.ppt
TransportLayerServices.pptTransportLayerServices.ppt
TransportLayerServices.ppt
SwatiRani13
 
IGMP.ppt
IGMP.pptIGMP.ppt
Internet technology unit 3
Internet technology unit 3Internet technology unit 3
Internet technology unit 3
WE-IT TUTORIALS
 
User Datagram Protocol
User Datagram ProtocolUser Datagram Protocol
User Datagram Protocol
Purushottam Kamble
 
UDP and TCP header.ppt
UDP and TCP header.pptUDP and TCP header.ppt
UDP and TCP header.ppt
nehayarrapothu
 
Multipath TCP Upstreaming
Multipath TCP UpstreamingMultipath TCP Upstreaming
Multipath TCP Upstreaming
Graham G. Turnbull
 
User Datagram protocol For Msc CS
User Datagram protocol For Msc CSUser Datagram protocol For Msc CS
User Datagram protocol For Msc CSThanveen
 
Transport layer
Transport layer   Transport layer
Transport layer
AnusuaBasu
 
07 coms 525 tcpip - udp
07    coms 525 tcpip - udp07    coms 525 tcpip - udp
07 coms 525 tcpip - udp
Palanivel Kuppusamy
 
TCU upgrade and configure
TCU  upgrade and configureTCU  upgrade and configure
TCU upgrade and configure
Ämjed Othman
 
COMPUTER NETWORKS UNIT 4
COMPUTER NETWORKS UNIT 4COMPUTER NETWORKS UNIT 4
COMPUTER NETWORKS UNIT 4
BON SECOURS COLLEGE FOR WOMEN
 

Similar to Chap 11 udp (20)

User datagram protocol
User datagram protocolUser datagram protocol
User datagram protocol
 
Chap 13
Chap 13Chap 13
Chap 13
 
Chap 18 telnet
Chap 18 telnetChap 18 telnet
Chap 18 telnet
 
Chap 14
Chap 14Chap 14
Chap 14
 
Transportlayer.ppt
Transportlayer.pptTransportlayer.ppt
Transportlayer.ppt
 
PowerPoint_merge (2).pdf
PowerPoint_merge (2).pdfPowerPoint_merge (2).pdf
PowerPoint_merge (2).pdf
 
PowerPoint_merge.ppt
PowerPoint_merge.pptPowerPoint_merge.ppt
PowerPoint_merge.ppt
 
Chap-13.ppt
Chap-13.pptChap-13.ppt
Chap-13.ppt
 
TransportLayerServices.ppt
TransportLayerServices.pptTransportLayerServices.ppt
TransportLayerServices.ppt
 
Telnethappy
TelnethappyTelnethappy
Telnethappy
 
IGMP.ppt
IGMP.pptIGMP.ppt
IGMP.ppt
 
Internet technology unit 3
Internet technology unit 3Internet technology unit 3
Internet technology unit 3
 
User Datagram Protocol
User Datagram ProtocolUser Datagram Protocol
User Datagram Protocol
 
UDP and TCP header.ppt
UDP and TCP header.pptUDP and TCP header.ppt
UDP and TCP header.ppt
 
Multipath TCP Upstreaming
Multipath TCP UpstreamingMultipath TCP Upstreaming
Multipath TCP Upstreaming
 
User Datagram protocol For Msc CS
User Datagram protocol For Msc CSUser Datagram protocol For Msc CS
User Datagram protocol For Msc CS
 
Transport layer
Transport layer   Transport layer
Transport layer
 
07 coms 525 tcpip - udp
07    coms 525 tcpip - udp07    coms 525 tcpip - udp
07 coms 525 tcpip - udp
 
TCU upgrade and configure
TCU  upgrade and configureTCU  upgrade and configure
TCU upgrade and configure
 
COMPUTER NETWORKS UNIT 4
COMPUTER NETWORKS UNIT 4COMPUTER NETWORKS UNIT 4
COMPUTER NETWORKS UNIT 4
 

More from Noctorous Jamal

Chap 18 telnet
Chap 18 telnetChap 18 telnet
Chap 18 telnet
Noctorous Jamal
 
Chap 16 bootp & dhcp
Chap 16 bootp & dhcpChap 16 bootp & dhcp
Chap 16 bootp & dhcp
Noctorous Jamal
 
Chap 01 intro
Chap 01 introChap 01 intro
Chap 01 intro
Noctorous Jamal
 
Lecture 8 The Communication System Finalterm Slides
Lecture 8  The Communication System Finalterm SlidesLecture 8  The Communication System Finalterm Slides
Lecture 8 The Communication System Finalterm Slides
Noctorous Jamal
 
Lecture 7 The Communication System Finalterm Slides
Lecture 7  The Communication System Finalterm SlidesLecture 7  The Communication System Finalterm Slides
Lecture 7 The Communication System Finalterm Slides
Noctorous Jamal
 
Lecture 6 The Communication System Finalterm Slides
Lecture 6  The Communication System Finalterm SlidesLecture 6  The Communication System Finalterm Slides
Lecture 6 The Communication System Finalterm Slides
Noctorous Jamal
 

More from Noctorous Jamal (6)

Chap 18 telnet
Chap 18 telnetChap 18 telnet
Chap 18 telnet
 
Chap 16 bootp & dhcp
Chap 16 bootp & dhcpChap 16 bootp & dhcp
Chap 16 bootp & dhcp
 
Chap 01 intro
Chap 01 introChap 01 intro
Chap 01 intro
 
Lecture 8 The Communication System Finalterm Slides
Lecture 8  The Communication System Finalterm SlidesLecture 8  The Communication System Finalterm Slides
Lecture 8 The Communication System Finalterm Slides
 
Lecture 7 The Communication System Finalterm Slides
Lecture 7  The Communication System Finalterm SlidesLecture 7  The Communication System Finalterm Slides
Lecture 7 The Communication System Finalterm Slides
 
Lecture 6 The Communication System Finalterm Slides
Lecture 6  The Communication System Finalterm SlidesLecture 6  The Communication System Finalterm Slides
Lecture 6 The Communication System Finalterm Slides
 

Recently uploaded

Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
Kamal Acharya
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
Kamal Acharya
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
Kamal Acharya
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
ShahidSultan24
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
ssuser9bd3ba
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
Kamal Acharya
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
Kamal Acharya
 

Recently uploaded (20)

Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
 

Chap 11 udp

  • 1. CChhaapptteerr 1111 UUsseerr DDaattaaggrraamm PPrroottooccooll Objectives Upon completion you will be able to: • Be able to explain process-to-process communication • Know the format of a UDP user datagram • Be able to calculate a UDP checksum • Understand the operation of UDP • Know when it is appropriate to use UDP • Understand the modules in a UDP package TCP/IP Protocol Suite 1
  • 2. Figure 11.1 Position of UDP in the TCP/IP protocol suite TCP/IP Protocol Suite 2
  • 3. 11.1 PROCESS-TO-PROCESS COMMUNICATION Before we examine UDP, we must first uunnddeerrssttaanndd hhoosstt--ttoo--hhoosstt ccoommmmuunniiccaattiioonn aanndd pprroocceessss--ttoo--pprroocceessss ccoommmmuunniiccaattiioonn aanndd tthhee ddiiffffeerreennccee bbeettwweeeenn tthheemm.. TThhee ttooppiiccss ddiissccuusssseedd iinn tthhiiss sseeccttiioonn iinncclluuddee:: PPoorrtt NNuummbbeerrss SSoocckkeett AAddddrreesssseess TCP/IP Protocol Suite 3
  • 4. Figure 11.2 UDP versus IP TCP/IP Protocol Suite 4
  • 5. Figure 11.3 Port numbers TCP/IP Protocol Suite 5
  • 6. Figure 11.4 IP addresses versus port numbers TCP/IP Protocol Suite 6
  • 7. Figure 11.5 ICANN ranges TCP/IP Protocol Suite 7
  • 8. NNoottee:: The well-known port numbers are less than 1024. TCP/IP Protocol Suite 8
  • 9. TTaabbllee 1111..11 WWeellll--kknnoowwnn ppoorrttss uusseedd wwiitthh UUDDPP TCP/IP Protocol Suite 9
  • 10. ExamplE 1 In UNIX, the well-known ports are stored in a file called /etc/services. Each line in this file gives the name of the server and the well-known port number. We can use the grep utility to extract the line corresponding to the desired application. The following shows the port for TFTP. Note TFTP can use port 69 on either UDP or TCP. $ grep tftp /etc/services tftp 69/tcp tftp 69/udp See Next Slide TCP/IP Protocol Suite 10
  • 11. ExamplE 1 (ContinuEd) SNMP uses two port numbers (161 and 162), each for a different purpose, as we will see in Chapter 21. $ grep snmp /etc/services snmp 161/tcp #Simple Net Mgmt Proto snmp 161/udp #Simple Net Mgmt Proto snmptrap 162/udp #Traps for SNMP TCP/IP Protocol Suite 11
  • 12. Figure 11.6 Socket address TCP/IP Protocol Suite 12
  • 13. 11.2 USER DATAGRAM UDP packets are called user datagrams and have aa ffiixxeedd--ssiizzee hheeaaddeerr ooff 88 bbyytteess.. TCP/IP Protocol Suite 13
  • 14. Figure 11.7 User datagram format TCP/IP Protocol Suite 14
  • 15. NNoottee:: UDP length = IP length − IP header’s length TCP/IP Protocol Suite 15
  • 16. 11.3 CHECKSUM UDP checksum calculation is different from tthhee oonnee ffoorr IIPP aanndd IICCMMPP.. HHeerree tthhee cchheecckkssuumm iinncclluuddeess tthhrreeee sseeccttiioonnss:: aa ppsseeuuddoohheeaaddeerr,, tthhee UUDDPP hheeaaddeerr,, aanndd tthhee ddaattaa ccoommiinngg ffrroomm tthhee aapppplliiccaattiioonn llaayyeerr.. TThhee ttooppiiccss ddiissccuusssseedd iinn tthhiiss sseeccttiioonn iinncclluuddee:: CChheecckkssuumm CCaallccuullaattiioonn aatt SSeennddeerr CChheecckkssuumm CCaallccuullaattiioonn aatt RReecceeiivveerr OOppttiioonnaall UUssee ooff tthhee CChheecckkssuumm TCP/IP Protocol Suite 16
  • 17. Figure 11.8 Pseudoheader for checksum calculation TCP/IP Protocol Suite 17
  • 18. Figure 11.9 Checksum calculation of a simple UDP user datagram TCP/IP Protocol Suite 18
  • 19. 11.4 UDP OPERATION UDP uses concepts common to the transport layer. TThheessee ccoonncceeppttss wwiillll bbee ddiissccuusssseedd hheerree bbrriieeffllyy,, aanndd tthheenn eexxppaannddeedd iinn tthhee nneexxtt cchhaapptteerr oonn tthhee TTCCPP pprroottooccooll.. TThhee ttooppiiccss ddiissccuusssseedd iinn tthhiiss sseeccttiioonn iinncclluuddee:: CCoonnnneeccttiioonnlleessss SSeerrvviicceess FFllooww aanndd EErrrroorr CCoonnttrrooll EEnnccaappssuullaattiioonn aanndd DDeeccaappssuullaattiioonn QQuueeuuiinngg MMuullttiipplleexxiinngg aanndd DDeemmuullttiipplleexxiinngg TCP/IP Protocol Suite 19
  • 20. Figure 11.10 Encapsulation and decapsulation TCP/IP Protocol Suite 20
  • 21. Figure 11.11 Queues in UDP TCP/IP Protocol Suite 21
  • 22. Figure 11.12 Multiplexing and demultiplexing TCP/IP Protocol Suite 22
  • 23. 11.5 USE OF UDP We discuss some uses of the UDP pprroottooccooll iinn tthhiiss sseeccttiioonn.. TCP/IP Protocol Suite 23
  • 24. 11.6 UDP PACKAGE To show how UDP handles the sending and receiving ooff UUDDPP ppaacckkeettss,, wwee pprreesseenntt aa ssiimmppllee vveerrssiioonn ooff tthhee UUDDPP ppaacckkaaggee.. TThhee UUDDPP ppaacckkaaggee iinnvvoollvveess ffiivvee ccoommppoonneennttss:: aa ccoonnttrrooll--bblloocckk ttaabbllee,, iinnppuutt qquueeuueess,, aa ccoonnttrrooll--bblloocckk mmoodduullee,, aann iinnppuutt mmoodduullee,, aanndd aann oouuttppuutt mmoodduullee.. TThhee ttooppiiccss ddiissccuusssseedd iinn tthhiiss sseeccttiioonn iinncclluuddee:: CCoonnttrrooll--BBlloocckk TTaabbllee IInnppuutt QQuueeuueess CCoonnttrrooll--BBlloocckk MMoodduullee IInnppuutt MMoodduullee OOuuttppuutt MMoodduullee TCP/IP Protocol Suite 24
  • 25. Figure 11.13 UDP design TCP/IP Protocol Suite 25
  • 26. TTaabbllee 1111..22 TThhee ccoonnttrrooll--bblloocckk ttaabbllee aatt tthhee bbeeggiinnnniinngg ooff eexxaammpplleess TCP/IP Protocol Suite 26
  • 27. ExamplE 2 The first activity is the arrival of a user datagram with destination port number 52,012. The input module searches for this port number and finds it. Queue number 38 has been assigned to this port, which means that the port has been previously used. The input module sends the data to queue 38. The control-block table does not change. TCP/IP Protocol Suite 27
  • 28. ExamplE 3 After a few seconds, a process starts. It asks the operating system for a port number and is granted port number 52,014. Now the process sends its ID (4,978) and the port number to the control-block module to create an entry in the table. The module takes the first FREE entry and inserts the information received. The module does not allocate a queue at this moment because no user datagrams have arrived for this destination (see Table 11.3). See Next Slide TCP/IP Protocol Suite 28
  • 29. TTaabbllee 1111..33 CCoonnttrrooll--bblloocckk ttaabbllee aafftteerr EExxaammppllee 33 TCP/IP Protocol Suite 29
  • 30. ExamplE 4 A user datagram now arrives for port 52,011. The input module checks the table and finds that no queue has been allocated for this destination since this is the first time a user datagram has arrived for this destination. The module creates a queue and gives it a number (43). See Table 11.4. See Next Slide TCP/IP Protocol Suite 30
  • 31. TTaabbllee 1111..44 CCoonnttrrooll--bblloocckk aafftteerr EExxaammppllee 44 TCP/IP Protocol Suite 31
  • 32. ExamplE 5 After a few seconds, a user datagram arrives for port 52,222. The input module checks the table and cannot find an entry for this destination. The user datagram is dropped and a request is made to ICMP to send an “unreachable port” message to the source. TCP/IP Protocol Suite 32