Warning:
JavaScript is turned OFF. None of the links on this page will work until it is reactivated.
If you need help turning JavaScript On, click here.
The Concept Map you are trying to access has information related to:
User Datagram (mouse over info) UDP Checksum... Optional Field contain 16-bits, Makes UDP smaller and more efficient but introduces an error if IP malfunctions and delivers a UDP message to an incorrect location... Cannot use header fields to determine that an error occurred, All computers running UDP are able to recognize the standard protocol port numbers, independent of the underlying operating system depending on the addresses and protocol ports... Determines the type of communication, If extremely small messages are sent, resulting datagram will have a large ratio of header octets to data octets if the message is extremely large... Resulting datagram will be larger than network MTU will allow and it will have to be fragmented, Protocol port numbers Field UDP Destination Port... Contains the port number of the application to which the message is being sent, Protocol Port Numbers (mouse over info) each computer must provide a mapping between protocol port numbers and program identifiers used by the OS... All computers running UDP are able to recognize the standard protocol port numbers, independent of the underlying operating system, many to many is.. one computer communicate with many computers, many to many is.. many computer communicate with one computer, many to many is.. many computers communicate with many computers, many to many is.. one computer communicate with one other, User Datagram Protocol (UDP) is less complex and easiest to understand... However it does not provide typical services expected from applications..., Protocol port numbers Field UDP Source Port... Contains the port number of the sending application, Protocol port numbers Field UDP Message Length... Specifies the total size of the UDP message, measured in octets, 1 to many is.. one computer communicate with many computers, 1 to many is.. many computer communicate with one computer, 1 to many is.. many computers communicate with many computers, 1 to many is.. one computer communicate with one other, Into packets for transmission and does not combine messages for delivery (mouse over info) it has several consequences though... (mouse over info) If extremely small messages are sent, resulting datagram will have a large ratio of header octets to data octets, Into packets for transmission and does not combine messages for delivery (mouse over info) it has several consequences though... (mouse over info) Each UDP message must fit into a single IP datagram, Optional Field contain 16-bits although UDP header does not contain any identification of the sender... It assumes the IP source and destination address are contained in the IP datagram that carries UDP, Fields in the datagram header that identify the endpoints of communiation refer to computers, not to applicatoins on those computers from IP's point of view... Source and destination address fields in a datagram identify a host computer... an address does not contain additional bits to identify an application program on the host, 1 to 1 is.. one computer communicate with many computers, 1 to 1 is.. many computer communicate with one computer, 1 to 1 is.. many computers communicate with many computers, 1 to 1 is.. one computer communicate with one other, Best-effort (mouse over info) because UDP offers the same best-effort delivery semantics as IP... Messages can be lost, duplicated or bits can be corrupted in transit. (mouse over info), Message-oriented (mouse over info) it does not divide messages... Into packets for transmission and does not combine messages for delivery (mouse over info), UDP cannot use the same mechanism as the operating system instead it defines an abstract set of identifiers called... Protocol Port Numbers (mouse over info), Receiver must obtain the source destination and type fields from the IP datagram and append them to the UDP message before verifying the checksum UDP uses IP for delivery... UDP is similiar to ICMP in that it is encapsulated, Determines the type of communication in order to engage in 1 - 1 communication Application specifies the local port number remote IP address and remote protocol port sender, Determines the type of communication in order to engage in many to 1... Application specifies the local port number, but informs UDP that the remote endpoint can be any system, UDP software includes Pseudo Header (mouse over info) to verify a checksum... Receiver must obtain the source destination and type fields from the IP datagram and append them to the UDP message before verifying the checksum, Stem from IP lacking the ability to distinguish among multiple application programs running on the same computer IP is incapable of running multiple applications... Fields in the datagram header that identify the endpoints of communiation refer to computers, not to applicatoins on those computers, many computer communicate with one computer although 1 to many can be achieved... Arranging to send an individual copy of a message to each recipient allows the exchange to be efficient, User Datagram (mouse over info) first two fields contain... Protocol port numbers, Cannot use header fields to determine that an error occurred when computing the checksum... UDP software includes Pseudo Header (mouse over info), Connectionless (mouse over info) an application using UDP does not need to... Preestablish communication before sending data, nor does the application need to terminate communication when it is dones, It assumes the IP source and destination address are contained in the IP datagram that carries UDP omitting the source and destination IP addresses... Makes UDP smaller and more efficient but introduces an error, Preestablish communication before sending data, nor does the application need to terminate communication when it is dones UDP also allows for... Application to delay for an arbitrary long time between the transmission of two messages (mouse over info), Source and destination address fields in a datagram identify a host computer... an address does not contain additional bits to identify an application program on the host one that allows End-point communication... End-To-End protocol or Transport Protocol (mouse over info), Resulting datagram will be larger than network MTU will allow and it will have to be fragmented allowing messages to be large produces Less efficiency because large messages cause fragmentation, However it does not provide typical services expected from applications... can be characterized as... Operating System Independent (mouse over info), However it does not provide typical services expected from applications... can be characterized as... End-to-End (mouse over info), However it does not provide typical services expected from applications... can be characterized as... Message-oriented (mouse over info), However it does not provide typical services expected from applications... can be characterized as... Best-effort (mouse over info), However it does not provide typical services expected from applications... can be characterized as... Arbitrary interaction (mouse over info), However it does not provide typical services expected from applications... can be characterized as... Connectionless (mouse over info), Chapter 24 the need for End-To-End protocols.. Stem from IP lacking the ability to distinguish among multiple application programs running on the same computer, Stem from IP lacking the ability to distinguish among multiple application programs running on the same computer because each application runs as a separate process... Or thread of execution, many computers communicate with many computers although 1 to many can be achieved... Arranging to send an individual copy of a message to each recipient allows the exchange to be efficient, many to 1 is.. one computer communicate with many computers, many to 1 is.. many computer communicate with one computer, many to 1 is.. many computers communicate with many computers, many to 1 is.. one computer communicate with one other, one computer communicate with many computers although 1 to many can be achieved... Arranging to send an individual copy of a message to each recipient allows the exchange to be efficient, Arranging to send an individual copy of a message to each recipient allows the exchange to be efficient instead of repeatedly sending a message to multiple recipients... An application is able to transmit the message via IP multicast or broadcast (mouse over info), End-to-End (mouse over info) to identify an application program as an endpoint... UDP cannot use the same mechanism as the operating system, Arbitrary interaction (mouse over info) allows for four style of interaction... 1 to 1, Arbitrary interaction (mouse over info) allows for four style of interaction... many to many, Arbitrary interaction (mouse over info) allows for four style of interaction... 1 to many, Arbitrary interaction (mouse over info) allows for four style of interaction... many to 1, Determines the type of communication each UDP message is called... User Datagram (mouse over info), one computer communicate with one other although 1 to many can be achieved... Arranging to send an individual copy of a message to each recipient allows the exchange to be efficient, Source and destination address fields in a datagram identify a host computer... an address does not contain additional bits to identify an application program on the host TCP/IP contains two transport protocols... User Datagram Protocol (UDP), Source and destination address fields in a datagram identify a host computer... an address does not contain additional bits to identify an application program on the host TCP/IP contains two transport protocols... Transmission Control Protocol (TCP)