Why do we need UDP protocol?

Why do we need UDP protocol?

Every programmer should know TCP and UDP protocols. UDP is the User Datagram Protocol, which belongs to the transport layer in the OSI model. It is a connectionless protocol, which means that there is no connection between the previous message and the next message at the protocol layer, and it provides a simple unreliable transmission service.

That is to say, UDP is unreliable. If you want to make the data reliable, you need to do error correction and error detection at the service layer. For example: TFTP.

Then some students may ask, since it is unreliable, why not just use the IP protocol? Why go to so much trouble to add a protocol UDP?

In fact, one of the most important reasons is that there is no concept of port in the IP protocol. It only stipulates the communication between two hosts, and does not solve the communication between applications on different hosts. If multiple applications on a host need to communicate, the IP protocol cannot distinguish which application the data belongs to.

It can be understood that a port is a communication channel. Of course, UDP adds some functions based on the IP protocol, so let's summarize:

  • UDP is connectionless, so the overhead of sending and receiving is much smaller.
  • UDP does not guarantee reliable data delivery, but only tries its best. Therefore, there is no need to maintain complex connection relationships.
  • UDP is message-oriented, adding a data header at the application layer and directly giving it to the IP layer.
  • UDP has no congestion control
  • UDP supports multicast.
  • The UDP header is small, indicating that more data is transmitted

The following figure shows the relationship between UDP and the upper and lower layers:

What does the UDP header look like?

First look at the following picture:

As can be seen from the figure, the UDP header consists of four parts:

  • The 16-bit source port and destination port are used to mark the sending and receiving application processes. Because UDP does not require a response, the source port is optional. If the source port is not used, it is set to zero. When the transport layer receives a UDP datagram from the IP layer, it passes the UDP datagram through the corresponding port according to the destination port in the header and submits it to the ultimate destination - the application. If the receiving UDP finds that the destination port number in the received message is incorrect, it will discard the message and send a "port unreachable" error message to the sender through the Internet Control Protocol ICMP. ICMP application Traceroute is to let the sent UDP user datagram deliberately use an illegal UDP port, and as a result, ICMP returns a "port unreachable" error message, thus achieving the purpose of the test.
  • Following the destination port is a fixed-length message length field in bytes, which is used to specify the length of the UDP datagram including the data portion. The minimum length is 8 bytes.
  • The remaining 16 bits of the header are used to check the header and data together. This part is optional, but this function is generally used in practical applications.
  • The checksums of UDP and TCP cover both their headers and data, while the checksum of the IP header only covers the IP header.

How to use UDP and socket together

As we enter the transport layer, we can also call the API in the operating system to build a socket. Socket is a programming interface provided by the operating system, which is used to represent a network communication. The application uses the socket to call the module that handles the network protocol in the system kernel, and these kernel modules are responsible for the implementation of the specific network protocol.

In this way, we can let the kernel receive the details of the network protocol, and we only need to provide the content to be transmitted. The kernel will help us control the format and further encapsulate it to the bottom layer. Therefore, in actual applications, we do not need to know how to form a UDP packet, but only need to provide relevant information (such as IP address, port number, and information to be transmitted). The operating system kernel will form a qualified UDP packet (as well as the lower layer packets and frames) based on the relevant information we provide before transmission. See the figure below.

UDP usage scenarios

  • It requires few resources, is used in an intranet with good network conditions, or is not sensitive to packet loss. For example, the DHCP protocol is based on UDP. Generally, IP addresses are obtained through intranet requests, and it is okay if the IP address cannot be obtained at once. For example, RTP and TFTP based on UDP, it is not a big problem to lose a frame of data. For example, some device discovery protocols, etc.
  • It does not require one-to-one communication to establish a connection, but can be broadcast. DHCP is a form of broadcast. VXLAN also requires multicast, which is also based on the UDP protocol.
  • It requires fast processing speed and low latency, and can tolerate a small amount of packet loss, but it also requires not to back down and to move forward even when the network is congested.
  • QUIC is a communication protocol proposed by Google based on improved UDP. Its purpose is to reduce the latency of network communication and provide a better user interaction experience.

Conclusion

UDP is not as complex as TCP, but it is an indispensable protocol in the network system. You need to master this protocol proficiently.

<<:  IBM acquires Red Hat. Will it be its rival, Google or Huawei? Let's wait and see.

>>:  The decline in operators' ability to generate revenue will affect the rapid deployment of 5G

Blog    

Recommend

Learn the history of HTTP in 6 minutes

[[386748]] HTTP/0.9HTTP/0.9 was proposed in 1991 ...

China Unicom makes first HD call on 5G SA network

2019 is the first year of 5G commercial deploymen...

What is edge computing and how will it impact businesses?

The process of transferring data remotely involve...

SD-WAN is about to dominate edge networks

Network transmission is like playing a team battl...

2017 Prediction: SD-WAN will drive the development of IoT

IoT drives SD-WAN adoption The Internet of Things...

SD-WAN: 10 essential considerations organizations need to weigh

SD-WAN is one of the hottest new network technolo...

Outlook for domestic 5G development in 2021 (I): Current status

The development of 5G has now become another hot ...

Why do you need a managed switch?

When dealing with complex network environments, i...

The Importance of PoE in Surveillance and Remote Security Systems

Many devices on the network today, such as IP cam...