Download ppt

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Computer network wikipedia , lookup

Airborne Networking wikipedia , lookup

Wake-on-LAN wikipedia , lookup

SIP extensions for the IP Multimedia Subsystem wikipedia , lookup

IEEE 1355 wikipedia , lookup

Deep packet inspection wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

UniPro protocol stack wikipedia , lookup

Routing in delay-tolerant networking wikipedia , lookup

Internet protocol suite wikipedia , lookup

Transcript
Lecture powerpoints from the recommended textbook are by Lami Kaya, [email protected].
Lecture powerpoints are © 2009 Pearson Education Inc.
Their content has sometimes been edited by Andy Brooks.
NET0183 Networks and Communications
Lecture 23
UDP: a transport layer protocol
8/25/2009
NET0183 Networks and Communications
by Dr Andy Brooks
1
The recommended textbook is Computer Networks and Internets by Douglas E. Comer
http://www.coursesmart.com/0136066992/?a=1773944
www.pearson-books.com/student (for additional discounts and offers)
8/25/2009
NET0183 Networks and Communications
by Dr Andy Brooks
2
...just another protocol stack diagram
http://skogberg.eu/ia/img/protocolStack.png
DHCP is an application layer protocol.
Two important protocols in the
transport layer are TCP and UDP.
TCP Transmission Control Protocol
UDP User Datagram Protocol
3
25.1 Introduction
• UDP is one of the two major transport-layer
protocols used in the Internet, the other being TCP.
• UDP is the only connectionless transport service.
• UDP is less compelx than TCP.
“The device at one end of the communication transmits data to
the other, without first ensuring that the recipient is available
and ready to receive the data. The device sending a message
simply sends it addressed to the intended recipient.”
Connectionless protocol @ Wikipedia 14. mars 2010
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.
4
25.2 Transport Protocols and End-to-End
Communication
• IP cannot distinguish among multiple application programs
running on a given host.
– If a user runs an email application and a web browser at the same time
or runs multiple copies of a given application, they must be able to
communicate independently.
• From IP's point of view, the source and destination fields in a
datagram identify a host.
– IP does not contain additional bits to identify an application on the host.
– We say that IP treats a computer as an endpoint of communication.
• Transport-layer protocols are known as end-to-end protocols.
– A transport protocol allows an application to be an endpoint of
communication.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.
5
25.3 The User Datagram Protocol
• Best-effort Delivery
– UDP offers the same best-effort delivery semantics as IP.
• UDP allows an application:
• to send to many other applications
• receive from many other applications
• or communicate with exactly one other application
• Operating System independent
– UDP provides a means of identifying application programs that does
not depend on identifiers used by the local OS.
• port numbers
• UDP is sometimes characterized as a thin protocol layer.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.
6
25.4 The Connectionless Paradigm
• UDP uses a connectionless communication paradigm.
– An application using UDP does not need to pre-establish
communication before sending data.
• Are you ready to receive a message?
• You receive flyers in the post at home from companies that never contacted
you beforehand to ask if you are ready to receive the flyer.
– An application using UDP can generate and send data at any time.
– An application using UDP can delay an arbitrarily long time between
the transmission of two messages.
• UDP does not maintain state.
• Companies do not know if their flyers are delivered.
• Companies do not know if their flyers are read.
• UDP does not use control messages.
– Communication consists only of the data messages themselves.
• UDP has extremely low overhead.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.
7
25.5 Message-Oriented Interface
• IP datagram size forms an absolute limit on the size.
• If an application sends extremely small UDP messages,
the ratio of header octets to data octets will be large.
– hhhhhhhhhhhhhhhhhhhhhhhhhhhhhd (representation only)
– inefficient use of the network
• If an application sends extremely large UDP messages,
datagrams will be larger than the network MTU, and will
be fragmented by IP.
– 1500 & 1500 & 1500 & 1500 & 1500 (representation only)
– inefficient use of the network
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.
8
25.6 UDP Communication Semantics
• UDP uses IP for all delivery.
• UDP provides best-effort delivery semantics as IP.
• This means messages can be:
–
–
–
–
–
Lost
Duplicated
Delayed
Delivered out-of-order
Corrupted
• UDP's best-effort delivery semantics have important
consequences for applications.
– An application must either be immune to the problems or the
programmer must take additional steps to detect and correct
problems. (e.g. what does DHCP software do at client and server?)
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.
9
25.6 UDP Communication Semantics
• As an example of an application that can tolerate packet
errors, consider an audio transmission.
– If the sender places a small amount of audio in each message, the
loss of a single packet produces a small gap in the playback which
can be tolerated by the person listening.
• Obviously problems arise if too many packets are lost.
– “Th_ __gnal is bre_king u_.”
• At the opposite extreme, consider an on-line shopping
application.
– Such applications do not use UDP because packet errors can have
serious consequences.
• e.g. message duplication might result in two orders being placed
• e.g. an incorrect amount might be charged to a credit card
• Would you run a hospital information system using UDP?
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.
10
25.7 Modes of Interaction and Broadcast Delivery
• UDP allows four styles of interaction:
–
–
–
–
1-to-1
1-to-many
Many-to-1
Many-to-many
• A 1-to-many interaction can be achieved as follows.
– UDP allows an application to transmit the message via IP
multicast or broadcast rather than require an application
to repeatedly send the same message to many
recipients.
• e.g. using IP's limited broadcast address 255.255.255.255
A limited broadcast does not reach every node on
the Internet, only the nodes on the local network.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.
11
25.8 Endpoint Identification with Protocol Port Numbers
• UDP defines an abstract set of identifiers called protocol
port numbers that are independent of the OS.
• UDP must provide a mapping between protocol port
numbers and the program identifiers that the OS uses.
– Operating Systems use the terms: process identifiers, job names,
task identifiers,...
• All computers running UDP recognize the standard protocol
port numbers, independent of the OS.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.
12
http://www.fatpipe.org/~mjb/Drawings/
13
25.10 The UDP Checksum and the
Pseudo Header
• UDP header contains a 16-bit field named UDP checksum.
(optional)
– A sender can either choose to compute a checksum or set all bits of
the checksum field to zero.
• When a message arrives at the destination, UDP software
only verifies the checksum if the value is nonzero.
• UDP uses a ones-complement checksum.
– if the computed checksum has a value of zero, a sender uses the allones form of zero
• To verify that messages reach the correct destination (host)
without incurring the overhead of additional header fields for
IP addresses, UDP extends the checksum.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.
14
25.10 The UDP Checksum and the
Pseudo Header
• UDP software includes a pseudo header that contains
source, destination, and type (PROTOCOL) fields from the
IP datagram and a UDP datagram length.
– The sender computes a checksum as if the UDP header contained
extra fields.
• To verify a checksum, a receiver must obtain the UDP
length, and the source, destination, and type fields from the
IP datagram.
– The receiver appends them to the UDP message before verifying the
checksum.
• Figure 25.2 illustrates fields in the pseudo header.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.
15
25.10 The UDP Checksum and the
Pseudo Header
Figure 25.2 Illustration of the pseudo header used to calculate the UDP checksum.
PROTO -> PROTOCOL
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.
16
25.11 UDP Encapsulation
• Each UDP datagram is encapsulated in an IP datagram for
transmission across the Internet.
• Figure 25.3 (below) illustrates the encapsulation.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.
17
Some applications that use UDP
• Real-time audio and video streaming protocols use
UDP because they can handle occasional lost packets.
– e.g. RTP (Real-time Transport Protocol)
• DNS (Domain Name System)
– provides the IP address of a domain name
• DHCP (Dynamic Host Configuration Protocol)
– allocates an IP address to a host
• RIP (Routing Information Protocol)
– “The routing algorithm used in RIP, the Bellman-Ford
algorithm, was first deployed in a computer network in
1967, as the initial routing algorithm of the ARPANET.”
Routing Information Protocol @ Wikipedia 15/3/10
8/25/2009
NET0183 Networks and Communications
by Dr Andy Brooks
18
...just another protocol stack diagram
http://i.techrepublic.com.com/blogs/ip-encap.png
Data Link Layer
(OSI Model)
Physical Layer
(OSI Model)
8/25/2009
NET0183 Networks and Communications
by Dr Andy Brooks
19
... how many protocols do you know?
8/25/2009
http://en.wikipedia.org/wiki/Internet_Protocol_Suite
NET0183 Networks and Communications
by Dr Andy Brooks
20