ALL >> Computers >> View Article
Udp - User Datagram Protocol
User Datagram Protocol (UDP) is a core protocol of the Internet protocol package. Using UDP, programs on networked computers can send small amounts of sometimes known as datagrams to one another. The User Datagram Protocol (UDP) was designed by a MIT alumnus, David P. Reed in 1980.
UDP is a simpler data based connectionless protocol compared to the TCP (Transmission Control Protocol). In connectionless protocols, there is no attempt made to create a dedicated one-to-one connection. Communication is achieved by transmitting information in one direction, from the source to the destination without monitoring if the destination is online, or if it is ready to receive the data. With UDP, data packets cross the network as independent units; as a result, UDP is not at all reliable compared to the TCP. Packets are sent individually and will always be whole when they arrive. Packets have definite limits and no splitting or merging of data occurs. The data may arrive out of order, appear duplicated, or go missing without notice. There is no verifying mechanism to check every packet if it has actually arrived and there is no proper ...
... arrangement of messages, no monitoring connections, etc, which makes UDP faster and more efficient for small amounts of data. Programs often use UDP because dropped packets are preferable to delayed packets. UDP's connectionless nature is very useful for servers that have to answer a large number of small queries. Unlike TCP, UDP can perform packet broadcasts (sending to all clients on the network) and multicasting.
Some programs that use UDP are: the Domain Name System (DNS), streaming media (IPTV, VoIP), and online games.
UDP uses network ports for application-to-application communication. UDP port numbers range between 0 and 65,535. Port 0 is used only for sending data that does not expect a response.
Add Comment
Computers Articles
1. Few Good Insights To Follow With Pc Gaming In Australia!Author: Jack Williams
2. Transform Your Online Store With Australia's Leading Ecommerce Developers
Author: themerchantbuddy
3. How To Choose The Right Technology For Your mobile App?
Author: goodcoders
4. The Rise Of User Centered Web Design
Author: goodcoders
5. Reasons Why Laravel Perfect For Web Development?
Author: goodcoders
6. Ssd Vs Sas Vs Sata Drives: Which Is Better For Your Dedicated Server Hardware?
Author: The CyberTech
7. Raid Servers And Data Protection: Common Myths About Raid Servers
Author: The CyberTech
8. Top 8 Do's And Don’ts When Dealing With A Corrupted Sd Card
Author: The CyberTech
9. Nvme Vs Ssd: What To Choose For Your Storage Solutions?
Author: The CyberTech
10. 8 Common Data Recovery Myths Exposed!
Author: The CyberTech
11. Understanding Ssd Lifespan: Signs, Durability, Data Recovery, And Factors Affecting The Life Of An Ssd
Author: The CyberTech
12. Server Data Recovery Solutions: When Your Raid Server Is Crashed!
Author: The CyberTech
13. Data Recovery Solutions For Undetected Ssd On Bios
Author: The CyberTech
14. Problems Faced By Mobile Phone Users: Green Line Issue, Motherboard Failure, Phone Stuck On Logo And Mobile Data Recovery Possibilities
Author: The CyberTech
15. Ssd Vs Hdd: Weaknesses, Data Recovery Factors And Failure Rates
Author: The CyberTech