Welcome to YLOAN.COM
yloan.com » Data Recovery » Understanding User Datagram Protocol
Games Personal-Tech Data Entry registry cruise torrent mac code virus storage uninstaller systems cisco bugs wireless codes maintenance dell update communication trojan atlanta Data Backup Data Storage Data Protection Data Recovery Anti-Virus Windows Linux Software Hardware Mobil-Computing Certification-Tests Computers & Internet Internet

Understanding User Datagram Protocol

So, what is UDP or User Datagram Protocol? UDP is an internet protocol for the transmission of brief messages known as datagram

. The User Datagram Protocol is only one part of a bigger Internet Protocol suite. UDP is used networks designed for TCP. However, UDP is less reliable and you aren't all the time certain you're going to get the info in the proper sequence. David P. Reed formulated user Datagram Protocol in 1980.

To know what UDP is, it is best to first understand what a typical IP network looks like. A typical IP network has 5 layers. The primary layer is the physical layer, which consists of fiber optic, coaxial, or twisted cables. The second layer is the data link layer equivalent to GPRS, Wi-Fi and ISDN. The third layer is the internet or the network layer. The forth layer is where UDP lies and this is the transport layer. The final layer is the application layer and common functions are Telnet, HTTP, and DNS.

To know UDP, it is best to note that with this protocol, there isn't a requirement that the recipient of the info acknowledges that the data has been sent. There aren't any implicit checks on transmission to guarantee datagram integrity and to guarantee the appropriate sequence is maintained. Although the dearth of transmission checks could make you doubt whether UDP is a useful protocol, you need to note that in some applications, velocity is more useful than reliability. With UDP, errors are checked and corrected in the applications and never the network layer. At any time when error correction is required during transmission, the application uses the TCP, or Transmission Control Protocol, or the SCTP, or Stream Control Transmission Protocol. These protocols are designed for this precise reason.

To know UDP, you need to note that the protocol is stateless. That is essential for servers which can be utilized by several clients to answer brief queries. UDP is therefore advantageous over TCP in that it can be used for multicasting or packet broadcasting where information is sent to different clients whereas TCP is simply used between one client and the server. Most of today's network applications similar to VoIP, or Voice over Internet Protocol, DNS or Domain Name System, and TFTP or Trivial File Transfer Protocol use UDP because of this advantage. Since UDP does not have a mechanism that can be utilized to keep away from congestion in a network, there are several solutions which can be used. Probably the most frequent solutions is the Datagram Congestion Control Protocol, or DCCP.


Despite the great speed and the fact that UDP can be utilized by several clients, to understand UDP, you need to know the restrictions of the protocol. The most obvious limitations are the fact that there isn't a avoidance mechanism and the fact that there isn't a congestion control. These are serious limitations and it means the protocol cannot be used where sensitive data is being transmitted. If an individual sends you two messages via UDP, you can't predict the one that can arrive first. To study more concerning the protocol such as how checksum is used to examine errors, the protocol is documented in IETF RFC 768.

by: maxwriter
The Role Of The Addiction Recovery Center Recover Lost Data With The Help Of Data Recovery Technicians Different Types of Hard Drive Failure and Recovery Solutions Recovery from Alcoholism in Connecticut Recovery Toolbox For Rar Represents A Small Utility To Open Corrupt Rar Files Wh Recovery Toolbox For Access Works With Corrupted Databases In Microsoft Acce Try Recovery Toolbox For Illustrator, If You'd Like To Know How To Recover Illus Get Recovery Toolbox For Outlook, If You Need A Reliable Pst Converter Outlo Tummy Tuck: Know About The Recovery Process The Four Phases of Data Center Migration A Smart Choice To Recover Your Lost Data Due To Various Reasons Great Details For Back Surgical Treatment Recovery Fixing Corruption In Ms Visual Foxpro 9.0 Database
print
www.yloan.com guest:  register | login | search IP(3.139.64.39) / Processed in 0.008006 second(s), 7 queries , Gzip enabled , discuz 5.5 through PHP 8.3.9 , debug code: 10 , 3243, 165,
Understanding User Datagram Protocol