SlideShare a Scribd company logo
User Datagram Protocol (UDP)
Learning Outcome
• At the end of this lecture, students will be
able to,
– Explain the format of a UDP packet.
– Identify the services provided by the UDP.
2
• Where UDP is positioned in the TCP/IP
protocol suite?
3
Recall
SCTP TCP UDP
Fig. 1. Transport Layer
User Datagram Protocol (UDP)
4
Characteristics:
• End-to-End: An application sends/receives data to/from
another application.
• Connectionless: Application does not need pre-established
connection before sending data; not need to terminate the
connection when finished.
• Application Identification: Each application assigned
with an Integer number called PROTOCOL PORT
NUMBER.
• Service: UDP Provides unreliable datagram service
– Packets may be lost or delivered out of order.
– No buffering before transmission.(accept and transmit immediately)
User Datagram Protocol (UDP)
5
• Transport-level protocol in addition to TCP
• Supports Network Applications
• Placed directly on the top of the Internet Protocol (IP)
• Main purpose is to outline the network traffic in the form
of datagrams.
• Datagram = first 8 bytes contain header information +
remaining bytes contain data.
Fig. 2. UDP User Datagram
DataHeader
8 bytes
8 to 65535 bytes
UDP Header Format
6
Fig. 3. UDP Datagram Header Format
Source port number Destination port number
Total length Checksum
0 16 31
• Source Port Number - 16 bits port number
• Destination Port Number- 16 bits port number
• Total Length (UDP header + data) - 16 bits count of octets
• Checksum - 16 bits field.
– If 0, then there is no checksum
– If 1, then it is a checksum over a pseudo header + UDP data area
UDP Vs TCP
7
• Performance:
– TCP uses window based flow control scheme.
– TCP’s slow start algorithm reduces throughput.
– TCP has extra overhead per segment.
– UDP sends small, inefficient Datagrams.
• Reliability:
– TCP provides reliable, in-order transfer.
– UDP provides unreliable service.
• Packet loss due to overflows and errors.
• Out-of-order datagrams.
• Multicast and Broadcast:
– Only supported by UDP.
• Data Size:
– UDP datagram limited to 64KB
UDP Multiplexing & Demultiplexing
8
Fig. 4. UDP Demultiplexing
• Sender:
– Multiplexing of UDP
Datagrams.
– UDP datagrams are
received from
multiple application
programs.
– A single sequence of
UDP datagrams is
passed to IP Layer.
• Receiver:
– Demultiplexing of UDP Datagrams.
– A single sequence of UDP datagrams is received from IP Layer.
– UDP datagram received is passed to appropriate application.
PORT 1 PORT 2 PORT 3
IP Layer
UDP Datagram arrives
UDP : Demultiplexing
Based on PORT
Ports used in UDP
9
Port Protocol Description
7 Echo Echoes a received datagram back to the sender
9 Discard Discards any datagram that is received
11 Users Active users
13 Daytime Returns the date and the time
17 Quote Returns the quote of the day
19 Chargen Return a string of characters
56 Domain Domain Name Service(DNS)
67 Bootps Server port to download bootstrap information
68 Bootpc Client port to download bootstrap information
69 TFTP Trivial File transfer protocol
111 RPC Remote Procedure Call
123 NTP Network Time Protocol
161 SNMP Simple Network Management Protocol
Table. 1. Well-Known Ports used in UDP
• The following is a dump of a UDP header in
hexadecimal format.
10
CB84000D001C001C
THINK…
• What is the source port number?
• What is the destination port number?
• What is the total length of the user datagram?
• What is the length of the data?
• Is the packet directed from a client to a server
or vice versa?
• What is the client process?
Solution
• The source port number is the first four hexadecimal digits
(CB84)16 or 52100.
• The destination port number is the second four
hexadecimal digits (000D)16 or 13.
• The third four hexadecimal digits (001C)16 define the
length of the whole UDP packet as 28 bytes.
• The length of the data is the length of the whole packet
minus the length of the header, or 28 – 8 = 20 bytes.
• Since the destination port number is 13 (well-known port),
the packet is from the client to the server.
• The client process is the Daytime (see Table 1).
11
References
• “Computer Networks” by Andrew S.
Tanenbaum 4th edition by Pearson.
12
Thank You
13

More Related Content

What's hot

Instruction Set Architecture: MIPS
Instruction Set Architecture: MIPSInstruction Set Architecture: MIPS
Instruction Set Architecture: MIPS
Prasenjit Dey
 
TCP and UDP
TCP and UDP TCP and UDP
TCP and UDP
Ramesh Giri
 
Data communication and networks by B. Forouzan
Data communication and networks by B. ForouzanData communication and networks by B. Forouzan
Data communication and networks by B. Forouzan
Preethi T G
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
Mukesh Tekwani
 
Digital Transmission
Digital TransmissionDigital Transmission
Digital Transmission
anuragyadav94
 
Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocol
asimnawaz54
 
Transmission Impairment (Attenuation, Distortion, Noise)
Transmission Impairment (Attenuation, Distortion, Noise)Transmission Impairment (Attenuation, Distortion, Noise)
Transmission Impairment (Attenuation, Distortion, Noise)
Noor Nabi
 
Ipv4
Ipv4Ipv4
Multicast Routing Protocols
Multicast Routing ProtocolsMulticast Routing Protocols
Multicast Routing Protocols
Ram Dutt Shukla
 
Ethernet,token ring
Ethernet,token ring Ethernet,token ring
Ethernet,token ring
Hareem Naz
 
TCP- Transmission Control Protocol
TCP-  Transmission Control Protocol TCP-  Transmission Control Protocol
TCP- Transmission Control Protocol
Akhil .B
 
Computer registers
Computer registersComputer registers
Computer registers
DeepikaT13
 
Transport Layer
Transport LayerTransport Layer
Transport Layer
tmavroidis
 
Pipeline hazards in computer Architecture ppt
Pipeline hazards in computer Architecture pptPipeline hazards in computer Architecture ppt
Pipeline hazards in computer Architecture ppt
mali yogesh kumar
 
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...Block coding, error detection (Parity checking, Cyclic redundancy checking (C...
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...
Paulo_Vangui
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
N.Jagadish Kumar
 
Congestion on computer network
Congestion on computer networkCongestion on computer network
Congestion on computer network
Disi Dc
 
IPV4 Frame Format
IPV4 Frame FormatIPV4 Frame Format
IPV4 Frame Format
Aditya Rawat
 
What is Socket?
What is Socket?What is Socket?
What is Socket?
Sardar Kaukaz
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
extraganesh
 

What's hot (20)

Instruction Set Architecture: MIPS
Instruction Set Architecture: MIPSInstruction Set Architecture: MIPS
Instruction Set Architecture: MIPS
 
TCP and UDP
TCP and UDP TCP and UDP
TCP and UDP
 
Data communication and networks by B. Forouzan
Data communication and networks by B. ForouzanData communication and networks by B. Forouzan
Data communication and networks by B. Forouzan
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
 
Digital Transmission
Digital TransmissionDigital Transmission
Digital Transmission
 
Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocol
 
Transmission Impairment (Attenuation, Distortion, Noise)
Transmission Impairment (Attenuation, Distortion, Noise)Transmission Impairment (Attenuation, Distortion, Noise)
Transmission Impairment (Attenuation, Distortion, Noise)
 
Ipv4
Ipv4Ipv4
Ipv4
 
Multicast Routing Protocols
Multicast Routing ProtocolsMulticast Routing Protocols
Multicast Routing Protocols
 
Ethernet,token ring
Ethernet,token ring Ethernet,token ring
Ethernet,token ring
 
TCP- Transmission Control Protocol
TCP-  Transmission Control Protocol TCP-  Transmission Control Protocol
TCP- Transmission Control Protocol
 
Computer registers
Computer registersComputer registers
Computer registers
 
Transport Layer
Transport LayerTransport Layer
Transport Layer
 
Pipeline hazards in computer Architecture ppt
Pipeline hazards in computer Architecture pptPipeline hazards in computer Architecture ppt
Pipeline hazards in computer Architecture ppt
 
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...Block coding, error detection (Parity checking, Cyclic redundancy checking (C...
Block coding, error detection (Parity checking, Cyclic redundancy checking (C...
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
 
Congestion on computer network
Congestion on computer networkCongestion on computer network
Congestion on computer network
 
IPV4 Frame Format
IPV4 Frame FormatIPV4 Frame Format
IPV4 Frame Format
 
What is Socket?
What is Socket?What is Socket?
What is Socket?
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
 

Similar to User Datagram Protocol

Networking essentials lect3
Networking essentials lect3Networking essentials lect3
Networking essentials lect3
Roman Brovko
 
LECTURE-Transport-Layer_lec.ppt
LECTURE-Transport-Layer_lec.pptLECTURE-Transport-Layer_lec.ppt
LECTURE-Transport-Layer_lec.ppt
MonirHossain707319
 
Unit 4-Transport Layer Protocols-3.pptx
Unit 4-Transport Layer Protocols-3.pptxUnit 4-Transport Layer Protocols-3.pptx
Unit 4-Transport Layer Protocols-3.pptx
DESTROYER39
 
Unit 4-Transport Layer Protocols.pptx
Unit 4-Transport Layer Protocols.pptxUnit 4-Transport Layer Protocols.pptx
Unit 4-Transport Layer Protocols.pptx
sarosh32
 
1.1.2 - Concept of Network and TCP_IP Model (2).pptx
1.1.2 - Concept of Network and TCP_IP Model (2).pptx1.1.2 - Concept of Network and TCP_IP Model (2).pptx
1.1.2 - Concept of Network and TCP_IP Model (2).pptx
VINAYTANWAR18
 
Transport layer services
Transport layer servicesTransport layer services
Transport layer services
Melvin Cabatuan
 
Transport layer
Transport layer   Transport layer
Transport layer
AnusuaBasu
 
Computer networks transport layer
Computer networks  transport layerComputer networks  transport layer
Computer networks transport layer
jamunaashok
 
Transport protocols
Transport protocolsTransport protocols
Transport protocols
Online
 
UNit-4 Transport Layer and its protocols.pdf
UNit-4 Transport Layer  and its protocols.pdfUNit-4 Transport Layer  and its protocols.pdf
UNit-4 Transport Layer and its protocols.pdf
ManimegalaM3
 
IPHEADER_IPV4_IPV6_4.pdf
IPHEADER_IPV4_IPV6_4.pdfIPHEADER_IPV4_IPV6_4.pdf
IPHEADER_IPV4_IPV6_4.pdf
AbhishekKumar66407
 
07 coms 525 tcpip - udp
07    coms 525 tcpip - udp07    coms 525 tcpip - udp
07 coms 525 tcpip - udp
Palanivel Kuppusamy
 
Lecture set 7
Lecture set 7Lecture set 7
Lecture set 7
Gopi Saiteja
 
ADDRESSING PADA TCP IP
ADDRESSING PADA TCP IPADDRESSING PADA TCP IP
ADDRESSING PADA TCP IP
Jennifer Daniel
 
Dccp evaluation for sip signaling ict4 m
Dccp evaluation for sip signaling   ict4 m Dccp evaluation for sip signaling   ict4 m
Dccp evaluation for sip signaling ict4 m
Agus Awaludin
 
TCP /IP
TCP /IPTCP /IP
tcp-140613123317-phpapp01.pptx
tcp-140613123317-phpapp01.pptxtcp-140613123317-phpapp01.pptx
tcp-140613123317-phpapp01.pptx
touseeqzulfiqar1
 
TRANSPORT LAYER ppt.pptx
TRANSPORT LAYER ppt.pptxTRANSPORT LAYER ppt.pptx
TRANSPORT LAYER ppt.pptx
utkarshlodhi4
 
Chapter 3 - Transport Layer for VN Students
Chapter 3 - Transport Layer for VN StudentsChapter 3 - Transport Layer for VN Students
Chapter 3 - Transport Layer for VN Students
alberttochiro
 
TCP Vs UDP
TCP Vs UDP TCP Vs UDP
TCP Vs UDP
Ahmed Elnaggar
 

Similar to User Datagram Protocol (20)

Networking essentials lect3
Networking essentials lect3Networking essentials lect3
Networking essentials lect3
 
LECTURE-Transport-Layer_lec.ppt
LECTURE-Transport-Layer_lec.pptLECTURE-Transport-Layer_lec.ppt
LECTURE-Transport-Layer_lec.ppt
 
Unit 4-Transport Layer Protocols-3.pptx
Unit 4-Transport Layer Protocols-3.pptxUnit 4-Transport Layer Protocols-3.pptx
Unit 4-Transport Layer Protocols-3.pptx
 
Unit 4-Transport Layer Protocols.pptx
Unit 4-Transport Layer Protocols.pptxUnit 4-Transport Layer Protocols.pptx
Unit 4-Transport Layer Protocols.pptx
 
1.1.2 - Concept of Network and TCP_IP Model (2).pptx
1.1.2 - Concept of Network and TCP_IP Model (2).pptx1.1.2 - Concept of Network and TCP_IP Model (2).pptx
1.1.2 - Concept of Network and TCP_IP Model (2).pptx
 
Transport layer services
Transport layer servicesTransport layer services
Transport layer services
 
Transport layer
Transport layer   Transport layer
Transport layer
 
Computer networks transport layer
Computer networks  transport layerComputer networks  transport layer
Computer networks transport layer
 
Transport protocols
Transport protocolsTransport protocols
Transport protocols
 
UNit-4 Transport Layer and its protocols.pdf
UNit-4 Transport Layer  and its protocols.pdfUNit-4 Transport Layer  and its protocols.pdf
UNit-4 Transport Layer and its protocols.pdf
 
IPHEADER_IPV4_IPV6_4.pdf
IPHEADER_IPV4_IPV6_4.pdfIPHEADER_IPV4_IPV6_4.pdf
IPHEADER_IPV4_IPV6_4.pdf
 
07 coms 525 tcpip - udp
07    coms 525 tcpip - udp07    coms 525 tcpip - udp
07 coms 525 tcpip - udp
 
Lecture set 7
Lecture set 7Lecture set 7
Lecture set 7
 
ADDRESSING PADA TCP IP
ADDRESSING PADA TCP IPADDRESSING PADA TCP IP
ADDRESSING PADA TCP IP
 
Dccp evaluation for sip signaling ict4 m
Dccp evaluation for sip signaling   ict4 m Dccp evaluation for sip signaling   ict4 m
Dccp evaluation for sip signaling ict4 m
 
TCP /IP
TCP /IPTCP /IP
TCP /IP
 
tcp-140613123317-phpapp01.pptx
tcp-140613123317-phpapp01.pptxtcp-140613123317-phpapp01.pptx
tcp-140613123317-phpapp01.pptx
 
TRANSPORT LAYER ppt.pptx
TRANSPORT LAYER ppt.pptxTRANSPORT LAYER ppt.pptx
TRANSPORT LAYER ppt.pptx
 
Chapter 3 - Transport Layer for VN Students
Chapter 3 - Transport Layer for VN StudentsChapter 3 - Transport Layer for VN Students
Chapter 3 - Transport Layer for VN Students
 
TCP Vs UDP
TCP Vs UDP TCP Vs UDP
TCP Vs UDP
 

Recently uploaded

Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
heavyhaig
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
IJNSA Journal
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
JamalHussainArman
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
jpsjournal1
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
mamunhossenbd75
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
Wearable antenna for antenna applications
Wearable antenna for antenna applicationsWearable antenna for antenna applications
Wearable antenna for antenna applications
Madhumitha Jayaram
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
Divyam548318
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
ihlasbinance2003
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 

Recently uploaded (20)

Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
Wearable antenna for antenna applications
Wearable antenna for antenna applicationsWearable antenna for antenna applications
Wearable antenna for antenna applications
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 

User Datagram Protocol

  • 2. Learning Outcome • At the end of this lecture, students will be able to, – Explain the format of a UDP packet. – Identify the services provided by the UDP. 2
  • 3. • Where UDP is positioned in the TCP/IP protocol suite? 3 Recall SCTP TCP UDP Fig. 1. Transport Layer
  • 4. User Datagram Protocol (UDP) 4 Characteristics: • End-to-End: An application sends/receives data to/from another application. • Connectionless: Application does not need pre-established connection before sending data; not need to terminate the connection when finished. • Application Identification: Each application assigned with an Integer number called PROTOCOL PORT NUMBER. • Service: UDP Provides unreliable datagram service – Packets may be lost or delivered out of order. – No buffering before transmission.(accept and transmit immediately)
  • 5. User Datagram Protocol (UDP) 5 • Transport-level protocol in addition to TCP • Supports Network Applications • Placed directly on the top of the Internet Protocol (IP) • Main purpose is to outline the network traffic in the form of datagrams. • Datagram = first 8 bytes contain header information + remaining bytes contain data. Fig. 2. UDP User Datagram DataHeader 8 bytes 8 to 65535 bytes
  • 6. UDP Header Format 6 Fig. 3. UDP Datagram Header Format Source port number Destination port number Total length Checksum 0 16 31 • Source Port Number - 16 bits port number • Destination Port Number- 16 bits port number • Total Length (UDP header + data) - 16 bits count of octets • Checksum - 16 bits field. – If 0, then there is no checksum – If 1, then it is a checksum over a pseudo header + UDP data area
  • 7. UDP Vs TCP 7 • Performance: – TCP uses window based flow control scheme. – TCP’s slow start algorithm reduces throughput. – TCP has extra overhead per segment. – UDP sends small, inefficient Datagrams. • Reliability: – TCP provides reliable, in-order transfer. – UDP provides unreliable service. • Packet loss due to overflows and errors. • Out-of-order datagrams. • Multicast and Broadcast: – Only supported by UDP. • Data Size: – UDP datagram limited to 64KB
  • 8. UDP Multiplexing & Demultiplexing 8 Fig. 4. UDP Demultiplexing • Sender: – Multiplexing of UDP Datagrams. – UDP datagrams are received from multiple application programs. – A single sequence of UDP datagrams is passed to IP Layer. • Receiver: – Demultiplexing of UDP Datagrams. – A single sequence of UDP datagrams is received from IP Layer. – UDP datagram received is passed to appropriate application. PORT 1 PORT 2 PORT 3 IP Layer UDP Datagram arrives UDP : Demultiplexing Based on PORT
  • 9. Ports used in UDP 9 Port Protocol Description 7 Echo Echoes a received datagram back to the sender 9 Discard Discards any datagram that is received 11 Users Active users 13 Daytime Returns the date and the time 17 Quote Returns the quote of the day 19 Chargen Return a string of characters 56 Domain Domain Name Service(DNS) 67 Bootps Server port to download bootstrap information 68 Bootpc Client port to download bootstrap information 69 TFTP Trivial File transfer protocol 111 RPC Remote Procedure Call 123 NTP Network Time Protocol 161 SNMP Simple Network Management Protocol Table. 1. Well-Known Ports used in UDP
  • 10. • The following is a dump of a UDP header in hexadecimal format. 10 CB84000D001C001C THINK… • What is the source port number? • What is the destination port number? • What is the total length of the user datagram? • What is the length of the data? • Is the packet directed from a client to a server or vice versa? • What is the client process?
  • 11. Solution • The source port number is the first four hexadecimal digits (CB84)16 or 52100. • The destination port number is the second four hexadecimal digits (000D)16 or 13. • The third four hexadecimal digits (001C)16 define the length of the whole UDP packet as 28 bytes. • The length of the data is the length of the whole packet minus the length of the header, or 28 – 8 = 20 bytes. • Since the destination port number is 13 (well-known port), the packet is from the client to the server. • The client process is the Daytime (see Table 1). 11
  • 12. References • “Computer Networks” by Andrew S. Tanenbaum 4th edition by Pearson. 12