User Datagram Protocol (UDP) is a connectionless transport layer protocol that does not provide reliability, flow control, or error correction. It preserves message boundaries and is used for applications that prioritize speed over accuracy, such as video or voice transmission. UDP uses port numbers to identify sending and receiving applications and includes fields for length, checksum, and source/destination addresses in its header. The checksum covers the header, data, and pseudo-header to detect errors from end to end.
User Datagram Protocol (UDP) is a connectionless transport layer protocol that does not provide reliability, flow control, or error correction. It preserves message boundaries and is used for applications that prioritize speed over accuracy, such as video or voice transmission. UDP uses port numbers to identify sending and receiving applications and includes fields for length, checksum, and source/destination addresses in its header. The checksum covers the header, data, and pseudo-header to detect errors from end to end.
User Datagram Protocol (UDP) is a connectionless transport layer protocol that does not provide reliability, flow control, or error correction. It preserves message boundaries and is used for applications that prioritize speed over accuracy, such as video or voice transmission. UDP uses port numbers to identify sending and receiving applications and includes fields for length, checksum, and source/destination addresses in its header. The checksum covers the header, data, and pseudo-header to detect errors from end to end.
UDP is an unreliable, connectionless protocol for
applications that do not want TCP’s sequencing or flow control and wish to provide their own. It is also widely used for one-shot, client-server-type request-reply queries and applications in which prompt delivery is more important than accurate delivery, such as transmitting speech or video.
TCP/IP Protocol Suite 2
User Datagram Protocol (UDP) RFC0768 is the official specification of UDP UDP is a simple, datagram-oriented, transport- layer protocol that preserves message boundaries. TCP does not make any attempt to preserve application message boundaries It does not provide error correction, sequencing, duplicate elimination, flow control, or congestion control.
TCP/IP Protocol Suite 3
Encapsulation of a UDP datagram in a single IPv4 datagram
TCP/IP Protocol Suite 4
5
UDP header and payload area
TCP/IP Protocol Suite Where, Source port address: It defines the address of the application process that has delivered a message. The source port address is of 16 bits address. Destination port address: It defines the address of the application process that will receive the message. The destination port address is of a 16-bit address. Total length: It defines the total length of the user datagram in bytes. It is a 16-bit field. Checksum: The checksum is a 16-bit field which is used in error detection. TCP/IP Protocol Suite 6 UDP Checksum The UDP checksum is the first end-to-end transport-layer checksum we have encountered It covers the UDP header, the UDP data, and a pseudo-header. It is computed at the initial sender and checked at the final destination.
TCP/IP Protocol Suite 7
UDP Checksum Transport protocols (e.g., TCP, UDP) use checksums to cover their headers and data. With UDP, the checksum is optional (although strongly suggested), while with the others it is mandatory.
When UDP is used with IPv6, computation and
use of the checksum are mandatory because there is no header checksum at the IP layer.