Skip to main content Accessibility help
×
Hostname: page-component-8448b6f56d-sxzjt Total loading time: 0 Render date: 2024-04-24T08:17:31.869Z Has data issue: false hasContentIssue false

5 - UDP and its applications

Published online by Cambridge University Press:  05 June 2012

Shivendra S. Panwar
Affiliation:
Polytechnic University, New York
Shiwen Mao
Affiliation:
Polytechnic University, New York
Jeong-dong Ryoo
Affiliation:
Electronics and Telecommunications Research Unit, South Korea
Yihan Li
Affiliation:
Polytechnic University, New York
Get access

Summary

The principle, called the end-to-end argument, suggests that functions placed at low levels of a system may be redundant or of little value when compared with the cost of providing them at that low level.

J. H. Saltzer, D. P. Reed and D. D. Clark

Objectives

  • Study sock as a traffic generator, in terms of its features and command line options.

  • Study the User Datagram Protocol.

  • IP fragmentation.

  • MTU and path MTU discovery.

  • UDP applications, using the Trivial File Transfer Protocol as an example.

  • Compare UDP with TCP, using TFTP and the File Transfer Protocol.

The User Datagram Protocol

Since the Internet protocol suite is often referred to as TCP/IP, UDP, it may seem, suffers from being considered the “less important” transport protocol. This perception is changing rapidly as realtime services, such as Voice over IP (VoIP), which use UDP become an important part of the Internet landscape. This emerging UDP application will be further explored in Chapter 7.

UDP provides a means of multiplexing and demultiplexing for user processes, usingUDP port numbers. It extends the host-to-host delivery service of IP to the application-to-application level. There is no other transport control mechanism provided by UDP, except a checksum which protects the UDP header (see Fig. 0.14), UDP data, and several IP header fields.

Type
Chapter
Information
TCP/IP Essentials
A Lab-Based Approach
, pp. 100 - 110
Publisher: Cambridge University Press
Print publication year: 2004

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×