0% found this document useful (0 votes)
18 views10 pages

Computer Network: Course Instructor: Dr. Malik Daler Ali Awan

Uploaded by

Ammar Khaggah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views10 pages

Computer Network: Course Instructor: Dr. Malik Daler Ali Awan

Uploaded by

Ammar Khaggah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 10

Computer Network

User Datagram
Protocol

Course Instructor: Dr. Malik Daler Ali Awan

01/10
• Connection oriented
UPD • Connectionless

02/10
1. TCP/IP is connection oriented communication protocol.
2. I guarantees the reliable communication.
3. Slower than UDP.

03/10
Connection Oriented Communication

A connection-oriented service is a network service that was designed and developed


after the telephone system. A connection-oriented service is used to create an end to
end connection between the sender and the receiver before transmitting the data over
the same or different networks. In connection-oriented service, packets are transmitted
to the receiver in the same order the sender has sent them. It uses a handshake method
that creates a connection between the user and sender for transmitting the data over the
network. Hence it is also known as a reliable network service.

04/10
Connection Oriented Communication

05/10
Continue
• Suppose, a sender wants to send data to the receiver. Then, first, the sender sends a request
packet to a receiver in the form of an SYN packet. After that, the receiver responds to the
sender's request with an (SYN-ACK) signal/packets. That represents the confirmation is
received by the receiver to start the communication between the sender and the receiver.
Now a sender can send the message or data to the receiver.

• Similarly, a receiver can respond or send the data to the sender in the form of packets. After
successfully exchanging or transmitting data, a sender can terminate the connection by
sending a signal to the receiver. In this way, we can say that it is a reliable network service.

06/10
Connectionless Communication

07/10
User Datagram Protocol
• The UDP (User Datagram Protocol) is a connectionless protocol that allows
communication between two or more devices without establishing any connection.
• In this protocol, a sender sends the data packets to the receiver that holds the destination
address. A UDP does not ensure to deliver the data packets to the correct destination,
and it does not generate any acknowledgment about the sender's data. Similarly, it does
not acknowledge the receiver about the data. Hence, it is an unreliable protocol.
• Data may be lost in connectionless communication

08/10
Summary

A connection is similar to a postal system, in which each letter takes along different route paths from
the source to the destination address. Connectionless service is used in the network system to transfer
data from one end to another end without creating any connection. So it does not require establishing
a connection before sending the data from the sender to the receiver. It is not a reliable network
service because it does not guarantee the transfer of data packets to the receiver, and data packets can
be received in any order to the receiver. Therefore we can say that the data packet does not follow a
defined path. In connectionless service, the transmitted data packet is not received by the receiver due
to network congestion, and the data may be lost.

09/10
Thank you!

10/10

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy