0% found this document useful (0 votes)
38 views11 pages

Acn Udp

Shantanu Pote submitted a micro-project on advanced computer networks to fulfill requirements for a diploma in computer technology. The project was supervised by Mr. N. J. Ambekar and discusses the User Datagram Protocol (UDP) which is a connectionless transport layer protocol that provides low-latency data transmission for applications like online gaming. UDP headers are simpler than TCP headers but do not ensure delivery or order of packets.

Uploaded by

poteshantanu1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
38 views11 pages

Acn Udp

Shantanu Pote submitted a micro-project on advanced computer networks to fulfill requirements for a diploma in computer technology. The project was supervised by Mr. N. J. Ambekar and discusses the User Datagram Protocol (UDP) which is a connectionless transport layer protocol that provides low-latency data transmission for applications like online gaming. UDP headers are simpler than TCP headers but do not ensure delivery or order of packets.

Uploaded by

poteshantanu1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

MICRO-PROJECT

ON
ADVANCED COMPUTER NETWORK

Submitted for partial fulfillment of the requirement for


Diploma in Computer Technology

2023-2024

Submitted By

SHANTANU POTE
Under the Guidance of

Mr. N. J. Ambekar
Department of Computer Technology

Priyadarshini Polytechnic, Nagpur-16


2023-2024
CERTIFICATE

This is certified that Shantanu Pote student of 5th semester Computer


Technology, during academic year 2023-2024 has submitted the bonafide
record of the project work entitled .

” ADVANCED COMPUTER NETWORK”


This is a result of work carried out by him under my supervision and Guidance,
in partial fulfillment for the award of
“Diploma in Computer Technology”
Offered by Board of Technical Education, Mumbai (M/S)

Mr. N. J. Ambekar
Guide
Department of Computer Technology

Mrs. P. S. Alur
Prof. M.B.Deokate
Head
Principal
Department of Computer Technology
Priyadarshini Polytechnic, Nagpur
Priyadarshini Polytechnic, Nagpur

Department of Computer Technology,


Priyadarshini Polytechnic, Nagpur -16
ACKNOWLEDGMENT

We have great pleasure to express our most sincere regards and deep sense of

gratitude to our Guide Mr. N. J. AMBEKAR for his valuable guidance for completing this

project work.

We are very much thankful to our Mr. N. J. AMBEKAR and other staff member

of the Department of Computer Technology for their valuable suggestion and helping

attitude.

We are also intended to our Principal Prof.M.B.Deokate for encouraging us for time

to time. This acknowledgement would be incomplete without giving thanks to our friends

for their help through out course of this project work without which this dissertation could

not be success.

Name of Projectee:

Shantanu pote
User Datagram Protocol (UDP)

User Datagram Protocol (UDP) is a Transport Layer protocol.


UDP is a part of the Internet Protocol suite, referred to as
UDP/IP suite. Unlike TCP, it is an unreliable and
connectionless protocol. So, there is no need to establish a
connection prior to data transfer. The UDP helps to establish
low-latency and loss-tolerating connections establish over
the network.The UDP enables process to process
communication.

Though Transmission Control Protocol (TCP) is the dominant


transport layer protocol used with most of the Internet
services; provides assured delivery, reliability, and much more
but all these services cost us additional overhead and latency.
Here, UDP comes into the picture. For real-time services like
computer gaming, voice or video communication, live
conferences; we need UDP. Since high performance is
needed, UDP permits packets to be dropped instead of
processing delayed packets. There is no error checking in
UDP, so it also saves bandwidth.
User Datagram Protocol (UDP) is more efficient in terms of
both latency and bandwidth.

UDP also provides a different port number to distinguish


different user requests and also provides the checksum
capability to verify whether the complete data has arrived or
not; the IP layer does not provide these two services.
UDP Header
UDP header is an 8-bytes fixed and simple header, while for
TCP it may vary from 20 bytes to 60 bytes. The first 8 Bytes
contains all necessary header information and the remaining
part consist of data. UDP port number fields are each 16 bits
long, therefore the range for port numbers is defined from 0
to 65535; port number 0 is reserved. Port numbers help to
distinguish different user requests or processes .

1. Source Port: Source Port is a 2 Byte long field used to identify the port
number of the source.
2. Destination Port: It is a 2 Byte long field, used to identify the port of the
destined packet.
3. Length: Length is the length of UDP including the header and the data.
It is a 16-bits field.
4. Checksum: Checksum is 2 Bytes long field. It is the 16-bit one’s
complement of the one’s complement sum of the UDP header, the
pseudo-header of information from the IP header, and the data, padded
with zero octets at the end (if necessary) to make a multiple of two
octets.
Features of UDP protocol
The following are the features of the UDP protocol:

• Connectionless Service: UDP provides connectionless service. In UDP each


packet is independent from other packetssent by the same application.

• Lack of Congestion Control: UDP does not provide congestion control and it
does not create additional traffic in an error prone network.

• Lack of Error Control: UDP does not provide error control. So UDP provides
unreliable service.

• Transaction-oriented: UDP is transaction-oriented, suitable for simple


query-response protocols such as the Domain Name System (DNS).

• Datagram: UDP provides datagrams, suitable for modeling other

protocols such as IP tUnne1ing or Remote Procedure Call (RPC) and

the Network File System (NFS). An UDP datagram is used in Network

File System (NFS), DNS, SNMP, TFTP etc.

• Simple: UDP is a simple, datagram-oriented, transport-layer

protocol. UDP is simple, suitable for bootstrapping or other purposes

without a full protocol stack, such as the DHCP and Trivial File

Transfer Protocol (TFTP).

• stateless: UDP is stateless, suitable for very large numbers of clients,

such as in streaming media applications such as IPTV.

• Lack of Retransmission Delays: The lack of retransmission delays


makes UDP suitable for realtime applications such as Voice over IP,
online games, and many protocols using Real Time Streaming Protocol.
• Support Multicast: Because it supports multicast, it is suitable for broadcast
information such as in many kinds of service discovery and shared information
such as Precision Time Protocol (PTP) and Routing Information Protocol (RIP).
• Faster in Data Transfer: UDP is a lightweight protocol for faster and simpler

data transmissions.
• Queuing: UDP is simple and suitable for query based communications.

The Queues are associated with the ports in UDP.

• Low Overhead: UDP is designed to provide application processes with

the ability to transfer data with a minimal overhead.

• Port: UDP uses that the concept of port, which allows to distinguish the
different applications running on a machine. Besides the datagram and its data,
a UDP message contains a source port number and destination port number.

• No Acknowledgment/Not Reliable: In UDP data are transmitted with no

acknowledgment of whether it is received or not. UDP is thus not as reliable

as TCP. UDP does not guarantee ordered delivery of data.

UDP Services
• Process to Process Communication

• Connectionless Services

• Flow Control

• Error Control

• Multiplexing and Demultiplexing

• Encapsulation and Decapsulation

• Queuing

• Congestion Control
Applications of UDP
• Used for simple request-response communication when the size of data is
less and hence there is lesser concern about flow and error control.
• It is a suitable protocol for multicasting as UDP supports packet
switching.
• UDP is used for some routing update protocols like RIP(Routing
Information Protocol).
• Normally used for real-time applications which can not tolerate
uneven delays between sections of a received message.
• Following implementations uses UDP as a transport layer protocol:

o NTP (Network Time Protocol)


o DNS (Domain Name Service)
o BOOTP, DHCP.
o NNP (Network News Protocol)
o Quote of the day protocol
o TFTP, RTSP, RIP.

• The application layer can do some of the tasks through UDP-


o Trace Route
o Record Route
o Timestamp

• UDP takes a datagram from Network Layer, attaches its header, and
sends it to the user. So, it works fast

• Actually, UDP is a null protocol if you remove the checksum field.


o Reduce the requirement of computer resources.
o When using the Multicast or Broadcast to transfer.
o The transmission of Real-time packets, mainly in multimedia
applications.

• DHCP (Dynamic Host Configuration Protocol) uses UDP to


dynamically assign IP addresses to devices on a network. DHCP
messages are typically small, and the delay caused by packet loss or
retransmission is generally not critical for this application.
Advantages of UDP:
1. Speed: UDP is faster than TCP because it does not have the
overhead of establishing a connection and ensuring reliable
data delivery.

2. Lower latency: Since there is no connection establishment, there


is lower latency and faster response time.

3. Simplicity: UDP has a simpler protocol design than TCP, making


it easier to implement and manage.

4. Broadcast support: UDP supports broadcasting to multiple


recipients, making it useful for applications such as video
streaming and online gaming.

Disadvantages of UDP:
1. No reliability: UDP does not guarantee delivery of packets or
order of delivery, which can lead to missing or duplicate data.

2. No congestion control: UDP does not have congestion control,


which means that it can send packets at a rate that can cause
network congestion.

3. No flow control: UDP does not have flow control, which means
that it can overwhelm the receiver with packets that it cannot
handle.

4. Vulnerable to attacks: UDP is vulnerable to denial-of-service


attacks, where an attacker can flood a network with UDP packets,
overwhelming the network and causing it to crash.
UDP PSEUDO HEADER
• The purpose of using a pseudo-header is to verify that the UDP
packet has reached its correct destination.

• The correct destination consist of a specific machine and a specific


protocol port number within that machine

UDP pseudo header details:

• The UDP header itself specify only protocol port number.thus , to


verify the destination UDP on the sending machine computes a
checksum that covers the destination IP address as well as the
UDP packet.

• At the ultimate destination, UDP software verifies the checksum


using the destination IP address obtained from the header of the IP
packet that carried the UDP message.

• If the checksum agrees, then it must be true that the packet has
reached the intended destination host as well as the correct
protocol port within that host.
Difference Between UDP and TCP

You might also like