![Phân tích tư tưởng của nhân dân qua đoạn thơ: Những người vợ nhớ chồng… Những cuộc đời đã hóa sông núi ta trong Đất nước của Nguyễn Khoa Điềm](https://timtailieu.net/upload/document/136415/phan-tich-tu-tuong-cua-nhan-dan-qua-doan-tho-039-039-nhung-nguoi-vo-nho-chong-nhung-cuoc-doi-da-hoa-song-nui-ta-039-039-trong-dat-nuoc-cua-nguyen-khoa-136415.jpg)
User Datagram Protocol (UDP)
Số trang: 3
Loại file: pdf
Dung lượng: 36.86 KB
Lượt xem: 9
Lượt tải: 0
Xem trước 2 trang đầu tiên của tài liệu này:
Thông tin tài liệu:
User Datagram Protocol (UDP) UDP is the polar opposite of TCP. Whereas TCP is connection oriented, reliable, and relatively complex, UDP is a connectionless, unreliable
Nội dung trích xuất từ tài liệu:
User Datagram Protocol (UDP)User Datagram Protocol (UDP)UDP is the polar opposite of TCP. Whereas TCP is connection oriented, reliable, andrelatively complex, UDP is a connectionless, unreliable, and a relatively simple protocol.The initial response might be to ask, Why use an unreliable protocol? To understandthis, you need to have the proper perspective of what we mean by unreliable.Unreliable does not mean that it will not work or that the data will not get delivered.Indeed, when using unreliable protocols such as UDP, it is generally a safe bet that thedata will be successfully delivered. Why? Because most networks today are designed toeliminate things such as latency and packet loss, thus ensuring that data gets deliveredregardless of what protocol is used. Consequently, UDP was developed in large part toprovide a simple, low-overhead method of delivering data across the network. Yes, UDPmessages can be lost, duplicated, or sent out of order, but in most cases on mostnetworks, they will not be.The reason that UDP is low overhead is because two UDP hosts do not establish a sessionprior to transmitting data, and they do not periodically check to verify that the data wasreceived as is done with TCP. This makes UDP an excellent choice for the transmissionof small bursts of data or the transmission of data that handles reliability at theapplication layer. Some common applications that make use of this are things such asDNS, TFTP, and SNMP. Like TCP, UDP uses port numbers to identify the higher-layerapplication or protocol from which the data came and for which it is destined. These portnumbers are assigned and maintained by IANA, which provides a full list of registeredport numbers at http://www.iana.org/assignments/port-numbers.NoteRFC 0768 defines UDP.UDP Message StructureBecause of the simplicity of the design of UDP, the UDP segment structure is muchsimpler than the TCP segment structure. The UDP message contains two components: theUDP header and the UDP data. The UDP header is merely 8 bytes in length, againproviding less overhead and thus more space for data than TCP (with its 20-byte header).UDP Datagram HeaderAs shown in Figure 3-10, the UDP header is pretty simple and straightforward,containing the minimum required amount of information to allow for the delivery of data. Figure 3-10. UDP Header Structure [View full size image]The UDP header contains two 32-bit words with the following fields and meanings: • Source Port (16 bits) This field represents the source protocol or application. This allows the source to know which application the data belongs to so that responses can be delivered to the appropriate source application. In most cases, the source port is a random high-level port number (>1024) generated by the application. • Destination Port (16 bits) This field represents the destination protocol or application on the target host. This allows the destination to properly route the data to the appropriate higher-layer application or protocol. In most cases, the destination port is a defined (and in some cases well known) port number that is associated with the protocol or application in question. • Length (16 bits) This field represents the length of the datagram in bytes, including the header and the data, and therefore has a minimum value of 8 (the length of the header). • Checksum (16 bits) This field is optional and if used represents a simple method to allow the destination to know that the full datagram was received. If not used, the value is 0.Bad UDPUDP is such a simple protocol that there is not a whole lot that can be done with theprotocol itself to account for bad UDP traffic. UDP is particularly effective as a sourceof bad traffic because it is connectionless. Therefore, it is a great candidate forspoofing. Malicious users can generate traffic as a different host, and because UDP isconnectionless and responses are not expected, they do not really care that the targetedhost is sending the responses to the wrong host.UDP is also a great candidate for flooding a network, in particular by flooding thenetwork with malformed data or with UDP packets that contain no data whatsoever. Oneof the more effective methods of doing this is to flood the broadcast address of a networkwith UDP traffic, forcing all hosts to have to deal with and potentially respond to thetraffic, thus creating an exponential amount of traffic from a single malicious datagram.These processes are referred to as denial-of-service (DoS) attacks.
Nội dung trích xuất từ tài liệu:
User Datagram Protocol (UDP)User Datagram Protocol (UDP)UDP is the polar opposite of TCP. Whereas TCP is connection oriented, reliable, andrelatively complex, UDP is a connectionless, unreliable, and a relatively simple protocol.The initial response might be to ask, Why use an unreliable protocol? To understandthis, you need to have the proper perspective of what we mean by unreliable.Unreliable does not mean that it will not work or that the data will not get delivered.Indeed, when using unreliable protocols such as UDP, it is generally a safe bet that thedata will be successfully delivered. Why? Because most networks today are designed toeliminate things such as latency and packet loss, thus ensuring that data gets deliveredregardless of what protocol is used. Consequently, UDP was developed in large part toprovide a simple, low-overhead method of delivering data across the network. Yes, UDPmessages can be lost, duplicated, or sent out of order, but in most cases on mostnetworks, they will not be.The reason that UDP is low overhead is because two UDP hosts do not establish a sessionprior to transmitting data, and they do not periodically check to verify that the data wasreceived as is done with TCP. This makes UDP an excellent choice for the transmissionof small bursts of data or the transmission of data that handles reliability at theapplication layer. Some common applications that make use of this are things such asDNS, TFTP, and SNMP. Like TCP, UDP uses port numbers to identify the higher-layerapplication or protocol from which the data came and for which it is destined. These portnumbers are assigned and maintained by IANA, which provides a full list of registeredport numbers at http://www.iana.org/assignments/port-numbers.NoteRFC 0768 defines UDP.UDP Message StructureBecause of the simplicity of the design of UDP, the UDP segment structure is muchsimpler than the TCP segment structure. The UDP message contains two components: theUDP header and the UDP data. The UDP header is merely 8 bytes in length, againproviding less overhead and thus more space for data than TCP (with its 20-byte header).UDP Datagram HeaderAs shown in Figure 3-10, the UDP header is pretty simple and straightforward,containing the minimum required amount of information to allow for the delivery of data. Figure 3-10. UDP Header Structure [View full size image]The UDP header contains two 32-bit words with the following fields and meanings: • Source Port (16 bits) This field represents the source protocol or application. This allows the source to know which application the data belongs to so that responses can be delivered to the appropriate source application. In most cases, the source port is a random high-level port number (>1024) generated by the application. • Destination Port (16 bits) This field represents the destination protocol or application on the target host. This allows the destination to properly route the data to the appropriate higher-layer application or protocol. In most cases, the destination port is a defined (and in some cases well known) port number that is associated with the protocol or application in question. • Length (16 bits) This field represents the length of the datagram in bytes, including the header and the data, and therefore has a minimum value of 8 (the length of the header). • Checksum (16 bits) This field is optional and if used represents a simple method to allow the destination to know that the full datagram was received. If not used, the value is 0.Bad UDPUDP is such a simple protocol that there is not a whole lot that can be done with theprotocol itself to account for bad UDP traffic. UDP is particularly effective as a sourceof bad traffic because it is connectionless. Therefore, it is a great candidate forspoofing. Malicious users can generate traffic as a different host, and because UDP isconnectionless and responses are not expected, they do not really care that the targetedhost is sending the responses to the wrong host.UDP is also a great candidate for flooding a network, in particular by flooding thenetwork with malformed data or with UDP packets that contain no data whatsoever. Oneof the more effective methods of doing this is to flood the broadcast address of a networkwith UDP traffic, forcing all hosts to have to deal with and potentially respond to thetraffic, thus creating an exponential amount of traffic from a single malicious datagram.These processes are referred to as denial-of-service (DoS) attacks.
Tìm kiếm theo từ khóa liên quan:
công nghệ thông tin an ninh bảo mật fire wall tường lửa Fire wall fundamentals User Datagram Protocol (UDP)Tài liệu liên quan:
-
52 trang 442 1 0
-
Top 10 mẹo 'đơn giản nhưng hữu ích' trong nhiếp ảnh
11 trang 332 0 0 -
74 trang 310 0 0
-
96 trang 307 0 0
-
Báo cáo thực tập thực tế: Nghiên cứu và xây dựng website bằng Wordpress
24 trang 299 0 0 -
Đồ án tốt nghiệp: Xây dựng ứng dụng di động android quản lý khách hàng cắt tóc
81 trang 293 0 0 -
Tài liệu dạy học môn Tin học trong chương trình đào tạo trình độ cao đẳng
348 trang 291 1 0 -
EBay - Internet và câu chuyện thần kỳ: Phần 1
143 trang 279 0 0 -
Tài liệu hướng dẫn sử dụng thư điện tử tài nguyên và môi trường
72 trang 275 0 0 -
64 trang 272 0 0