FMUSER Wirless Transmit Video And Audio More Easier !
es.fmuser.org
it.fmuser.org
fr.fmuser.org
de.fmuser.org
af.fmuser.org ->Afrikaans
sq.fmuser.org ->Albanian
ar.fmuser.org ->Arabic
hy.fmuser.org ->Armenian
az.fmuser.org ->Azerbaijani
eu.fmuser.org ->Basque
be.fmuser.org ->Belarusian
bg.fmuser.org ->Bulgarian
ca.fmuser.org ->Catalan
zh-CN.fmuser.org ->Chinese (Simplified)
zh-TW.fmuser.org ->Chinese (Traditional)
hr.fmuser.org ->Croatian
cs.fmuser.org ->Czech
da.fmuser.org ->Danish
nl.fmuser.org ->Dutch
et.fmuser.org ->Estonian
tl.fmuser.org ->Filipino
fi.fmuser.org ->Finnish
fr.fmuser.org ->French
gl.fmuser.org ->Galician
ka.fmuser.org ->Georgian
de.fmuser.org ->German
el.fmuser.org ->Greek
ht.fmuser.org ->Haitian Creole
iw.fmuser.org ->Hebrew
hi.fmuser.org ->Hindi
hu.fmuser.org ->Hungarian
is.fmuser.org ->Icelandic
id.fmuser.org ->Indonesian
ga.fmuser.org ->Irish
it.fmuser.org ->Italian
ja.fmuser.org ->Japanese
ko.fmuser.org ->Korean
lv.fmuser.org ->Latvian
lt.fmuser.org ->Lithuanian
mk.fmuser.org ->Macedonian
ms.fmuser.org ->Malay
mt.fmuser.org ->Maltese
no.fmuser.org ->Norwegian
fa.fmuser.org ->Persian
pl.fmuser.org ->Polish
pt.fmuser.org ->Portuguese
ro.fmuser.org ->Romanian
ru.fmuser.org ->Russian
sr.fmuser.org ->Serbian
sk.fmuser.org ->Slovak
sl.fmuser.org ->Slovenian
es.fmuser.org ->Spanish
sw.fmuser.org ->Swahili
sv.fmuser.org ->Swedish
th.fmuser.org ->Thai
tr.fmuser.org ->Turkish
uk.fmuser.org ->Ukrainian
ur.fmuser.org ->Urdu
vi.fmuser.org ->Vietnamese
cy.fmuser.org ->Welsh
yi.fmuser.org ->Yiddish
UDP is the abbreviation of User Datagram Protocol. The Chinese name is User Datagram Protocol. It is a connectionless transport layer protocol in the OSI reference model and provides transaction-oriented simple and unreliable information transmission services. It is the official specification of IETF RFC 768 which is UDP.
UDP protocol is the abbreviation of English UserDatagramProtocol, that is, user datagram protocol, which is mainly used to support network applications that need to transmit data between computers. Numerous client/server network applications including network video conferencing systems need to use the UDP protocol. The UDP protocol has been used for many years since its inception. Although its initial brilliance has been obscured by some similar protocols, even today, UDP is still a very practical and feasible network transport layer protocol.
Like the well-known TCP (Transmission Control Protocol) protocol, the UDP protocol is directly on top of the IP (Internet Protocol) protocol. According to the OSI (Open System Interconnection) reference model, UDP and TCP are both transport layer protocols.
The main function of the UDP protocol is to compress network data traffic into the form of datagrams. A typical datagram is a transmission unit of binary data. The first 8 bytes of each datagram are used to contain header information, and the remaining bytes are used to contain specific transmission data.
1. UDP header
The UDP header consists of 4 fields, each of which occupies 2 bytes, as follows:
1) Source port number
2) Target port number
3) Datagram length
4) Check value
The UDP protocol uses port numbers to reserve their own data transmission channels for different applications. UDP and TCP protocols use this mechanism to support multiple applications sending and receiving data at the same time. The data sender (can be client or server) sends UDP datagrams through the source port, and the data receiver receives the data through the destination port. Some network applications can only use static ports that are reserved or registered for them in advance; while other network applications can use unregistered dynamic ports. Because the UDP header uses two bytes to store the port number, the valid range of the port number is from 0 to 65535. Generally speaking, port numbers greater than 49151 represent dynamic ports.
The length of a datagram refers to the total number of bytes including the header and the data part. Because the length of the header is fixed, this field is mainly used to calculate the variable-length data part (also known as the data load). The maximum length of the datagram varies depending on the operating environment. Theoretically, the maximum length of a datagram including the header is 65535 bytes. However, some practical applications often limit the size of the datagram, sometimes reducing it to 8192 bytes.
The UDP protocol uses the check value in the header to ensure data security. The check value is first calculated by a special algorithm at the data sender, and needs to be recalculated after being transmitted to the receiver. If a datagram is tampered with by a third party during transmission or is damaged due to line noise or other reasons, the sender and receiver's check calculation value will not match, so the UDP protocol can detect whether there is an error. This is different from the TCP protocol, which requires a check value.
2. UDPvs.TCP
The main difference between UDP and TCP protocol is how to achieve reliable transmission of information. The TCP protocol contains a special delivery guarantee mechanism. When the data receiver receives the information from the sender, it will automatically send a confirmation message to the sender; the sender will continue to transmit other information only after receiving the confirmation message. Otherwise, it will wait until the confirmation message is received.
Unlike TCP, the UDP protocol does not provide a guarantee mechanism for data transmission. If the datagram is lost during the transmission from the sender to the receiver, the protocol itself cannot make any detections or prompts. Therefore, people usually call the UDP protocol an unreliable transmission protocol.
Compared with the TCP protocol, another difference of the UDP protocol is how to receive multiple datagrams that are unexpected. Unlike TCP, UDP does not guarantee the order of sending and receiving data. For example, an application on the client sends the following 4 datagrams to the server
D1
D22
D333
D4444
However, UDP may submit the received data to the server application in the following order:
D333
D1
D4444
D22
In fact, this disorder of UDP protocol basically rarely occurs, and usually only occurs when the network is very congested.
3. Application of UDP protocol
Some readers may ask, since UDP is an unreliable network protocol, what value or necessity is there? In fact, it is not. In some cases, the UDP protocol may become very useful. Because UDP has a speed advantage that TCP cannot match. Although various security functions are implanted in the TCP protocol, a large amount of system overhead will be occupied in the actual execution process, which will undoubtedly seriously affect the speed. On the other hand, UDP eliminates the reliable transmission mechanism of information and transfers functions such as security and sorting to upper-layer applications to complete, which greatly reduces the execution time and ensures the speed.
The earliest specification of the UDP protocol is RFC768, which was released in 1980. Although it has been a long time, the UDP protocol continues to play a role in mainstream applications. Many applications, including video teleconferencing systems, have proved the value of the UDP protocol. Because these applications pay more attention to actual performance than reliability, some reliability (for example, meeting quality) can often be sacrificed in order to obtain better use effects (for example, a higher frame refresh rate). This is the trade-off between UDP and TCP. According to different environments and characteristics, both transmission protocols will play a more important role in the future network world.
UDP protocol uses port numbers to reserve their own data transmission channels for different applications. UDP and TCP protocols use this mechanism to support multiple applications sending and receiving data at the same time. The data sender (can be client or server) sends UDP datagrams through the source port, and the data receiver receives the data through the destination port. Some network applications can only use static ports that are reserved or registered for them in advance; while other network applications can use unregistered dynamic ports. Because the UDP header uses two bytes to store the port number, the valid range of the port number is from 0 to 65535. Generally speaking, port numbers greater than 49151 represent dynamic ports.
The length of a datagram refers to the total number of bytes including the header and the data part. Because the length of the header is fixed, this field is mainly used to calculate the variable-length data part (also known as the data load). The maximum length of the datagram varies depending on the operating environment. Theoretically, the maximum length of a datagram including the header is 65535 bytes. However, some practical applications often limit the size of the datagram, sometimes reducing it to 8192 bytes.
UDP protocol uses the check value in the header to ensure data security. The check value is first calculated by a special algorithm at the data sender, and needs to be recalculated after being transmitted to the receiver. If a datagram is tampered with by a third party during transmission or is damaged due to line noise or other reasons, the sender and receiver's check calculation value will not match, so the UDP protocol can detect whether there is an error. This is different from the TCP protocol, which requires a check value.
Many link layer protocols provide error checking, including the popular Ethernet protocol. You may wonder why UDP also provides checksums. The reason is that the protocols below the link layer may not provide error detection in some channels between the source and the terminal. Although UDP provides error detection, when an error is detected, UDP does not perform error correction. It simply throws away the damaged message segment or provides warning information to the application.
4. Several features of UDP protocol
(1) UDP is a connectionless protocol. The source and terminal do not establish a connection before transmitting data. When it wants to transmit, it simply grabs the data from the application and throws it on the network as quickly as possible. On the sending end, the speed of UDP transmission of data is only limited by the speed at which the application generates data, the capacity of the computer, and the transmission bandwidth; on the receiving end, UDP puts each message segment in the queue, and the application removes it from the queue every time Read a message segment.
(2) Since the data transmission does not establish a connection, there is no need to maintain the connection status, including the receiving and sending status, so a server can transmit the same message to multiple clients at the same time.
(3) The header of the UDP packet is very short, only 8 bytes, which is very small compared to the 20-byte packet of TCP.
(4) Throughput is not regulated by the congestion control algorithm, but is only limited by the data rate of the application software, the transmission bandwidth, and the performance of the source and terminal hosts.
(5) UDP uses best effort delivery, that is, reliable delivery is not guaranteed, so the host does not need to maintain a complicated link state table (there are many parameters).
(6) UDP is message-oriented. The UDP of the sender delivers the message delivered by the application program down to the IP layer after adding the header. It neither splits nor merges, but preserves the boundaries of these messages. Therefore, the application needs to select the appropriate message size.
Although UDP is an unreliable protocol, it is an ideal protocol for distributing information. For example, reporting the stock market on the screen, displaying aviation information on the screen, and so on. UDP is also used in routing information protocol RIP (Routing Information Protocol) to modify the routing table. In these applications, if a message is lost, another new message will replace it after a few seconds. UDP is widely used in multimedia applications. For example, the RealAudio software developed by Progressive Networks is a software that transmits pre-recorded or live music to the client in real time on the Internet. The software uses RealAudio audio-on-demand. The protocol protocol is a protocol that runs on UDP, and most Internet telephony software products also run on UDP.
UDP = uridine diphosphate, a pyrimidine nucleotide, composed of bases, uracil and ribose, is mainly used as a raw material for RNA synthesis (transcription). In addition, UDP is also a product of DTP energy consumption. Its function is similar to ADP, but it is less common than ADP. Participate in the synthesis of microbial peptidoglycans.
|
Enter email to get a surprise
es.fmuser.org
it.fmuser.org
fr.fmuser.org
de.fmuser.org
af.fmuser.org ->Afrikaans
sq.fmuser.org ->Albanian
ar.fmuser.org ->Arabic
hy.fmuser.org ->Armenian
az.fmuser.org ->Azerbaijani
eu.fmuser.org ->Basque
be.fmuser.org ->Belarusian
bg.fmuser.org ->Bulgarian
ca.fmuser.org ->Catalan
zh-CN.fmuser.org ->Chinese (Simplified)
zh-TW.fmuser.org ->Chinese (Traditional)
hr.fmuser.org ->Croatian
cs.fmuser.org ->Czech
da.fmuser.org ->Danish
nl.fmuser.org ->Dutch
et.fmuser.org ->Estonian
tl.fmuser.org ->Filipino
fi.fmuser.org ->Finnish
fr.fmuser.org ->French
gl.fmuser.org ->Galician
ka.fmuser.org ->Georgian
de.fmuser.org ->German
el.fmuser.org ->Greek
ht.fmuser.org ->Haitian Creole
iw.fmuser.org ->Hebrew
hi.fmuser.org ->Hindi
hu.fmuser.org ->Hungarian
is.fmuser.org ->Icelandic
id.fmuser.org ->Indonesian
ga.fmuser.org ->Irish
it.fmuser.org ->Italian
ja.fmuser.org ->Japanese
ko.fmuser.org ->Korean
lv.fmuser.org ->Latvian
lt.fmuser.org ->Lithuanian
mk.fmuser.org ->Macedonian
ms.fmuser.org ->Malay
mt.fmuser.org ->Maltese
no.fmuser.org ->Norwegian
fa.fmuser.org ->Persian
pl.fmuser.org ->Polish
pt.fmuser.org ->Portuguese
ro.fmuser.org ->Romanian
ru.fmuser.org ->Russian
sr.fmuser.org ->Serbian
sk.fmuser.org ->Slovak
sl.fmuser.org ->Slovenian
es.fmuser.org ->Spanish
sw.fmuser.org ->Swahili
sv.fmuser.org ->Swedish
th.fmuser.org ->Thai
tr.fmuser.org ->Turkish
uk.fmuser.org ->Ukrainian
ur.fmuser.org ->Urdu
vi.fmuser.org ->Vietnamese
cy.fmuser.org ->Welsh
yi.fmuser.org ->Yiddish
FMUSER Wirless Transmit Video And Audio More Easier !
Contact
Address:
No.305 Room HuiLan Building No.273 Huanpu Road Guangzhou China 510620
Categories
Newsletter