Professional Documents
Culture Documents
Answer: Layered structure of hardware and software that supports the exchange of data between
systems as well as a distributed application e.g., email or file transfer.
• Each protocol provides a set of rules.
Tasks of communications are broken up into modules
— Each module (or layer) can have its own protocol
In very general terms, communications can be said to involve three components: applications,
computers, and networks.
• For example, file transfer could use three modules (or layers)
— File transfer application
— Communications service module
— Network access module
• The stack of protocols is called “Protocol Stack”
— Or Protocol Architecture
Key Elements of a Protocol
• Syntax
– Creates a data block format understood by all
• Semantics
– Control information for coordinating and error handling
• Timing
– Synchronizes timing for functions such as speed matching and sequencing.
1. Source Port : Source Port is 2 Byte long field used to identify port number of source.
2. Destination Port : It is 2 Byte long field, used to identify the port of destined packet.
3. Length : Length is the length of UDP including header and the data. It is 16-bits field.
4. Checksum : Checksum is 2 Bytes long field. It is the 16-bit one’s complement of the one’s
complement sum of the UDP header, pseudo header of information from the IP header and
the data, padded with zero octets at the end (if necessary) to make a multiple of two octets.