StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

User Datagram Protocol Issues - Essay Example

Cite this document
Summary
The paper "User Datagram Protocol Issues" discusses that UDP is an unreliable protocol used for establishing communication through VoIP. However, VoIP is characterized by several communication problems such as sound quality and performance below the traditional communication system…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.5% of users find it useful
User Datagram Protocol Issues
Read Text Preview

Extract of sample "User Datagram Protocol Issues"

? UDP Protocol Issues The assignment is based on exploring unreliable communication and its impact on applications in terms of complexity and communication. It discusses different issues which are associated with reliability of an application used by User Datagram Protocol (UDP). The assignment provides a detailed understanding on the application and impact of different reliability issues on communication failure. Furthermore, it also defines the actions that can be taken in order to deal with the failures of communication. Introduction In the context of information technology (IT), the words ‘reliable’ and ‘unreliable’ have high prominence. Reliable and unreliable do not denote whether certain IT tools will perform properly or not, rather it denotes whether the IT tools can deliver guaranteed services. A reliable IT system usually sets up connections and accordingly confirms the accurateness of data transmission and integrity of data. Reliable protocols perform effectively in such a medium which has high tendency to errors. In contrast, an unreliable IT system makes no attempt to develop a connection and do not verify the data. It also does not make any endowment for data recovery or loss of data. Unreliable protocols perform effectively on such kind of medium which has low possibility of data loss and low tendency of error rates. In this context, it can be stated that Transmission Control Protocol (TCP) is considered as a usual reliable protocol and User Datagram Protocol (UDP) is an example of unreliable protocol (Zandy & Miller, 2002). Unreliable Communication and Its Impact on Application Complexity Communication channels usually use one of the two types of protocols namely TCP or UDP. In case of TCP i.e. reliable communication, there exists the acknowledgement of received data, while in UDP, no response exists on communication. Thus, in UDP applications, there can be no guarantee for delivery of information or duplication of information. Unreliable communication of UDP minimizes the complexity of applications which help to reduce overhead. UDP applications are usually simpler than TCP applications, as the key objective is to develop a boundary between networking application procedures, operating in higher layers. UDP takes the data, packages it in simplified format, and sends it to the IP address for transmission. This low level of complexity helps to ascertain rapid transmission of information without any delay. Thus, in short, it can be stated that unreliable communication can reduce complexity and increase rapidity of applications (Sinopoli et al., 2004). Issues Related To the Reliability of an Application That Uses UDP There are several applications where UDP is used and one of the most popular applications is Voice over IP (VoIP). Detailed Analysis of the Application VoIP has become one of the newest applications in the internet. Traditionally, voice and signaling data was directed only through dedicated circuit by using standard TCP protocol on physical links such as telephony channel. This exchange of information occurs from both directions at the similar time. In telephony channel, the voice is perceived through microphone and transmitted to the communication channel. However, in VoIP, the voice is electronically encoded through Pulse Code Modulation (PCM) and then directed through internet channel by data packets. Whereas in typical telephony system, voice data are transmitted at a continuous rate, in VoIP, comparatively small data packets are transmitted at a continuous rate. However, the advantage of VoIP over telephony system is that a high-speed network can transport the data packets for different voice channels and also possibly share with other types of data simultaneously (Bu et al., 2006). UDP protocol is used for transmitting voice data on VoIP network. UDP is considered as ‘send and forget’ protocol with no prerequisite for transmitter to recall sent data packets, because it can lead to reaction error (Bu et al., 2006). Reliability Issues of VoIP Reliability is a vital aspect with respect to VoIP applications that use unreliable communication protocol. In VoIP segment, objections regarding consistency of services are prevalent. The first reliability issue is that in VoIP, there is no guarantee that a packet can actually be delivered. Packet loss can occur in VoIP due to jitter buffer, media failure and weak wireless signal quality (Network Instruments, LLC., 2007). The other vital reliability issue is that data packets can take diverse paths through the network and reach out of order. If the VoIP server is overburdened with requests or connections to the network are weakened, data transmission interruptions can reach to the point where users abandon requests before developing connections to the network. Moreover, if the VoIP connections are misconfigured, or the IP link to the VoIP server is impaired, data transmission can remain open long after the users disconnect the network (Network Instruments, LLC., 2007). Reliability With Respect To Modularity, Abstraction, Hierarchy, and Layering Modularity denotes logical partitioning of applications, allowing them to be manageable for the intention of proper operation and maintenance. On the other hand, abstraction is a procedure through which data and program are demarcated with an illustration while hiding the implementation details. Abstraction of an application attempts to minimize details so that the computer operator can concentrate on a few components at a particular time. Abstraction leads to low level of dependence on actual details of software and hardware (Westbay Engineers Limited, 2012). Hierarchy is a model which divides a network into different layers. Every layer provides different services to the servers. Every application uses layering in order to function in complex and diverse situations. Similar to many communication systems, the protocols involved in VoIP follow layered hierarchy system. Breaking the system of VoIP has made the system more manageable and flexible. However, the layering of VoIP makes the system much unreliable. Every layer in VoIP has its own role and does not require detailed understanding of the other layers. For instance, IP data of VoIP can be transported across a range of connection layer systems comprising sequential lines such as PPP and Ethernet. Most parts of the layer are impudent to IP and need not be the identical for first link of VoIP with the final link of VoIP. Thus, it creates a problem with respect to the formation of proper linkages. The layering system of VoIP results in analogue interference which leads to imperfection in the connection (Westbay Engineers Limited, 2012). Reliability-Related Impacts There are a number of impacts of reliability on VoIP application. In this context, it can be stated that VoIP must be prepared to deal with the problem of loss of data packets, call management and quality of calls. All these aspects lead to communication failure in VoIP system. Explanation of the communication failures. The voice communication in VoIP is quite subtle to interruptions and deviations in data package arrival times. Reliable communication requires a steady, trustworthy flow of data packets to provide sound service quality. Loss of Data packets: As described above, loss of data packets is a common reliability issue in VoIP. This communication problem can occur due to overburdened buffer, media failure and poor signal. The VoIP modem is a stand-alone network device and it is vulnerable to problems with respect to power supply, electronic failure, and loss of internet connectivity. In any of the above circumstances, VoIP program can face communication problems through loss of data packets (Network Instruments, LLC., 2007). Call Management Problem: VoIP application also faces problem with respect to call management. Call management is mostly related with network delay, or loss of data packets. In addition, VoIP devices such as IP phones and internet gateways deduct considerable processing time and contribute to overall delays of communication. In two ways communication, usual delay time is about 150 milliseconds and exceeding this delay time limit can create confusion and hamper the communication over VoIP (Network Instruments, LLC., 2007). Quality of Calls: VoIP does not include built-in resiliency. In VoIP data processing, the original data transforms with PCM code which is essentially a complex mathematical process which leads to the compression of data. This compression tends to minimize the quality of calls (Network Instruments, LLC., 2007). Actions for Dealing with Communication Failures It is worth to mention that VoIP can usually perform effectively when every other related component runs well. The following actions can help to deal with the failure of communication in VoIP. Better Devices: Several VoIP applications use desktop applications such as DSL or Cable modem with VoIP port. However, if low performance device is used then the VoIP services will be unable to provide quality communication services. Thus, irrespective of quality of network, in order to get desired communication, there is a need to implement high performance devices. Large Bandwidth: The connection of VoIP is also related with bandwidth. Low level of bandwidth can lead to high level of information congestion and ultimately result in communication failure. Thus, increasing the bandwidth can enhance the possibility of faster communication even in peak time of requests. Although high bandwidth is costly, it can provide acceptable VoIP performance. Monitoring Tools: There are several tools which can deal with the reliability problem of VoIP. For instance, network protocol analyzers provide added VoIP support through offering certified technology solutions. On the other hand, network-monitoring tools can help to deal with quality management problem of VoIP (Network Instruments, LLC., 2007). Conclusion Unreliable communication medium is used for serving real time information flow. Unlike reliable communication, applications such as VoIP which is based on unreliable communication is much simpler, allowing them to provide quick and rapid information transmission through dedicated means. UDP is an unreliable protocol used for establishing communication through VoIP. However, VoIP is characterized by several communication problems such as sound quality and performance below traditional communication system. Although there are certain reliability issues with respect to use of VoIP, it provides several advantages in the forms of portability and rapidity. With proper electronic tools, the reliability issues of VoIP can be dealt with effectively. References Bu, T., Liu, Y., Towsley, D. (2006). On the TCP-friendliness of VoIP traf?c. Polytechnic University, 1-12. Network Instruments, LLC. (2007). Your guide to troubleshooting VoIP. Retrieved from http://www.networkinstruments.com/assets/pdf/white-papers/voip_wp.pdf Sinopoli, B., Schenato, L., Franceschetti, M., Poolla, K., Sastry, S. S. (2004). Optimal control with unreliable communication: the TCP case. University of California. Westbay Engineers Limited. (2012). Layered model. Retrieved from http://www.erlang.com/protocols.html#UDP Zandy, V. C., & Miller, B. P. (2002). Reliable network connections. University of Wisconsin, 23-26. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“UDP protocol issues Research Paper Example | Topics and Well Written Essays - 1500 words”, n.d.)
UDP protocol issues Research Paper Example | Topics and Well Written Essays - 1500 words. Retrieved from https://studentshare.org/information-technology/1487065-udp-protocol-issues
(UDP Protocol Issues Research Paper Example | Topics and Well Written Essays - 1500 Words)
UDP Protocol Issues Research Paper Example | Topics and Well Written Essays - 1500 Words. https://studentshare.org/information-technology/1487065-udp-protocol-issues.
“UDP Protocol Issues Research Paper Example | Topics and Well Written Essays - 1500 Words”, n.d. https://studentshare.org/information-technology/1487065-udp-protocol-issues.
  • Cited: 0 times

CHECK THESE SAMPLES OF User Datagram Protocol Issues

Cryptographic Overhead of IPsec Protocol Suit

Cryptographic overhead of IPsec protocol suit By Author Date Introduction Today, the communication between networks, that are being established, have a strong need of good security mechanisms in order to ensure the security, integrity, confidentiality and authenticity between two hosts or two networks.... hellip; The most common services of IPSec (internet protocol security) implementation are VPN (virtual private networking) services utilized on current networks such as the Internet, can ensure the safe transmission of useful data and information over public infrastructure....
5 Pages (1250 words) Research Paper

Future of Comuper Networking

The current central theme of notion is upon the elaboration of client server communications in which the role of Information Technology writ to a great extent creating the need for the advancement of networking technologies for a better tomorrow. … Today's most important and considerable issue regarding communicational approach refers to the need of protocol enhancement from IP to Ipv6.... The reason we are quickly moving beyond the capabilities of the current protocol has a lot to do with the propagation of wireless devices and new services, as well as the subsequent of massive demand for more addressees....
3 Pages (750 words) Essay

Internetworking Data Communication between Various Systems

ransport Layer consists the protocols like TCP (Transmission Control Protocol) and UDP (user datagram protocol).... It is also a protocol suite that includes several protocols for communication between computers.... pplication Layer consists of certain higher-level protocols like TELNET (for remote login/ to get a virtual remote terminal), FTP (File Transfer protocol), SMTP (Simple Mail Transfer protocol), HTTP (HyperText Transfer protocol), DNS (Domain Name System) protocols, etc....
7 Pages (1750 words) Coursework

Definition and Characteristics of Mobile IP

Moreover, many issues need to be taken into account when deciding on the type of Mobile IP that will be implemented in a specific area.... In this context it has been stated by Mobile IP Overview (2006) that the common problems related with the Mobile IP technology can be classified in the following categories: Indirect routing: Consider that if a mobile node happens to move to the same subnetwork as its correspondent node that wants to send it datagrams, this is what will happen for the datagram to be received by the mobile node, based on the base Mobile IP protocol: the correspondent node will send the datagram to the mobile node's home agent, which may be a half globe away; its home agent will then forward the datagram to its care-of-address, which might just take a half-second to reach if the datagram is sent directly from the correspondent node....
22 Pages (5500 words) Essay

Introduction to Computer Networks TCP/IP

Besides addressing, the most common problems faced by the TCP/IP were routing and connectivity issues.... The paper "Introduction to Computer Networks TCP/IP" analyzes the development of IT technologies with the help of IP (Internet protocol).... Although the protocol was defined before the commercial usage of LAN technologies, the original design has continued to work well through several generations of hardware technologies.... Although the current IP datagram header includes a field that can be used to request a type of service, the protocol did not define a type of service that can be used for real-time delivery of audio and video....
5 Pages (1250 words) Research Paper

Computer Networking and Management

he function of SMI in network management is to identify pieces of information in an SNMP (Simple Network Management protocol).... This essay analyzes that the network manager can get information about any frailer to occur on the network by network management tools.... The network consists of a large number of interconnected nodes....
21 Pages (5250 words) Essay

How Packet Data Travels through the Networks

The paper 'How Packet Data Travels through the Networks' presents the computer system that relies on a set of protocols namely the TCP/IP protocol suite for information exchange, storage, and communication.... A network protocol can be considered as a set of rules.... hellip; It's pointed out that while accessing an X-stream server from a remote location like home, several network and protocol processes take place in the network.... o organize the networking architecture, the network protocols, and the software and hardware that implement these protocols are organized into several layers called protocol stack (Oracle System Administration Guide: IP Services, 2011....
8 Pages (2000 words) Case Study

Transmission Control Protocol and User Datagram Protocol

… The paper "Transmission Control Protocol and user datagram protocol" is a brilliant example of an assignment on logic and programming.... The paper "Transmission Control Protocol and user datagram protocol" is a brilliant example of an assignment on logic and programming.... On the other hand, the user datagram protocol is a protocol for communication but it offers a limited amount of service when data are exchanged between computers that are in a network and make use of Internet Protocol....
6 Pages (1500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us