Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
User Datagram Protocol
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
{{short description|Principal protocol used for transmission of datagrams across an IP network}} {{Use dmy dates|date=August 2021}} {{Infobox networking protocol | title = User Datagram Protocol | logo = | logo alt = | image = | image alt = | caption = | is stack = | abbreviation = UDP | purpose = | developer = [[David P. Reed]] | date = 1980 | based on = | influenced = [[QUIC]], [[UDP-Lite]] | osilayer = [[Transport layer]] (4) | ports = | rfcs = {{IETF RFC|768}} | hardware = }} {{IPstack}} In [[computer network]]ing, the '''User Datagram Protocol''' ('''UDP''') is one of the core [[communication protocol]]s of the [[Internet protocol suite]] used to send messages (transported as [[datagram]]s in [[Network packet|packets]]) to other hosts on an [[Internet Protocol]] (IP) network. Within an IP network, UDP does not require prior communication to set up [[communication channel]]s or data paths. UDP is a [[connectionless]] protocol, meaning that messages are sent without negotiating a connection and that UDP does not keep track of what it has sent.<ref>{{Cite book |title=Network Sales and Services Handbook |year=2003 |isbn=9781587050909 |last1=Castelli |first1=Matthew J. |publisher=Cisco Press }}</ref><ref>{{Cite book |title=Windows Command Line: The Personal Trainer for Windows 8.1 Windows Server 2012 and Windows Server 2012 R2 |year=2015 |isbn=9781627164139 |last1=Stanek |first1=William |publisher=Stanek & Associates }}</ref> UDP provides [[checksum]]s for [[data integrity]], and [[port numbers]] for addressing different functions at the source and destination of the datagram. It has no [[Handshake (computing)|handshaking]] dialogues and thus exposes the user's program to any [[Reliability (computer networking)|unreliability]] of the underlying network; there is no guarantee of delivery, ordering, or duplicate protection. If error-correction facilities are needed at the network interface level, an application may instead use [[Transmission Control Protocol]] (TCP) or [[Stream Control Transmission Protocol]] (SCTP) which are designed for this purpose. UDP is suitable for purposes where error checking and correction are either not necessary or are performed in the application; UDP avoids the overhead of such processing in the [[protocol stack]]. Time-sensitive applications often use UDP because dropping packets is preferable to waiting for packets delayed due to [[Retransmission (data networks)|retransmission]], which may not be an option in a [[real-time system]].<ref name="kuroseross"> {{cite book |last1=Kurose |first1=J. F. |last2=Ross |first2=K. W. |year=2010 |title=Computer Networking: A Top-Down Approach |edition=5th |location=Boston, MA |publisher=Pearson Education |isbn=978-0-13-136548-3 }} </ref> The protocol was designed by [[David P. Reed]] in 1980 and formally defined in {{IETF RFC|768}}. ==Attributes== UDP is a simple message-oriented [[transport layer]] protocol that is documented in {{IETF RFC|768|link=no}}. Although UDP provides integrity verification (via [[checksum]]) of the header and payload,<ref name="clark">Clark, M.P. (2003). ''Data Networks IP and the Internet, 1st ed''. West Sussex, England: John Wiley & Sons Ltd.</ref> it provides no guarantees to the [[upper layer protocol]] for message delivery and the UDP layer retains no state of UDP messages once sent. For this reason, UDP sometimes is referred to as ''[[Reliability (computer networking)|Unreliable]] Datagram Protocol''.<ref>{{cite web|author=content@ipv6.com |url=http://ipv6.com/articles/general/User-Datagram-Protocol.htm |title=UDP Protocol Overview |date=15 August 2006 |publisher=Ipv6.com |access-date=17 August 2011}}</ref> If transmission reliability is desired, it must be implemented in the user's application. A number of UDP's attributes make it especially suited for certain applications. * It is ''transaction-oriented'', suitable for simple query-response protocols such as the [[Domain Name System]] or the [[Network Time Protocol]]. * It provides ''[[datagram]]s'', suitable for modeling other protocols such as [[IP tunneling]] or [[remote procedure call]] and the [[Network File System]]. * It is ''simple'', suitable for [[bootstrapping]] or other purposes without a full [[protocol stack]], such as the [[DHCP]] and [[Trivial File Transfer Protocol]]. * It is ''stateless'', suitable for very large numbers of clients, such as in [[streaming media]] applications like [[IPTV]]. * The ''lack of retransmission delays'' makes it suitable for real-time applications such as [[Voice over IP]], [[online games]], and many protocols using [[Real Time Streaming Protocol]]. * Because it supports [[multicast]], it is suitable for broadcast information such as in many kinds of [[service discovery]] and shared information such as [[Precision Time Protocol]] and [[Routing Information Protocol]]. ==Ports== Applications can use [[datagram socket]]s to establish host-to-host communications. An application binds a socket to its endpoint of data transmission, which is a combination of an [[IP address]] and a [[Port (computer networking)|port]]. In this way, UDP provides application [[multiplexing]]. A port is a software structure that is identified by the [[port number]], a 16-bit integer value, allowing for port numbers between 0 and 65535. Port 0 is reserved but is a permissible source port value if the sending process does not expect messages in response. The [[Internet Assigned Numbers Authority]] (IANA) has divided port numbers into three ranges.<ref name="forouzan">Forouzan, B.A. (2000). ''TCP/IP: Protocol Suite, 1st ed''. New Delhi, India: Tata McGraw-Hill Publishing Company Limited.</ref> Port numbers 0 through 1023 are used for common, well-known services. On [[Unix]]-like [[operating system]]s, using one of these ports requires [[superuser]] operating permission. Port numbers 1024 through 49151 are the [[registered port]]s used for IANA-registered services. Ports 49152 through 65535 are dynamic ports that are not officially designated for any specific service and may be used for any purpose. These may also be used as [[ephemeral port]]s, which software running on the host may use to dynamically create communications endpoints as needed.<ref name="forouzan"/> ==UDP datagram structure== A UDP datagram consists of a datagram ''header'' followed by a ''data'' section (the payload data for the application). The UDP datagram header consists of 4 fields, each of which is 2 bytes (16 bits):<ref name="kuroseross" /> {{APHD|start|title=UDP header format{{Ref RFC|768}}}} {{APHD|0|field1=Source Port|bits1=16|background1=lavender|field2=Destination Port|bits2=16}} {{APHD|4|field1=Length|bits1=16|field2=Checksum|bits2=16|background2=lavender}} {{APHD|8|bits1=0|field1=Data|background1=mistyrose}} {{APHD|end}} The use of the ''Checksum'' and ''Source Port'' fields is optional in IPv4 (light purple background in table). In IPv6 only the ''Source Port'' field is optional. If not used, these fields should be set to zero.{{Ref RFC|768}} ;{{APHD|def|name=Source Port|length=16 bits|text=This field identifies the sender's port, when used, and should be assumed to be the port to reply to if needed. If the source host is the client, the port number is likely to be an ephemeral port. If the source host is the server, the port number is likely to be a [[well-known port]] number from 0 to 1023.<ref name="forouzan"/>}} ;{{APHD|def|name=Destination Port|length=16 bits|text=This field identifies the receiver's port and is required. Similar to source port number, if the client is the destination host then the port number will likely be an ephemeral port number and if the destination host is the server then the port number will likely be a well-known port number.<ref name="forouzan"/>}} ;{{APHD|def|name=Length|length=16 bits|text=This field specifies the length in bytes of the UDP datagram (the header fields and Data field) in [[Octet (computing)|octet]]s. The minimum length is 8 bytes, the length of the header. The field size sets a theoretical limit of 65,535 bytes (8-byte header + 65,527 bytes of data) for a UDP datagram. However, the actual limit for the data length, which is imposed by the underlying [[IPv4]] protocol, is 65,507 bytes (65,535 bytes β 8-byte UDP header β 20-byte [[IPv4 header|IP header]]).<ref>{{cite book|last=Stevens |first=W. Richard |year=1994 |title=TCP/IP Illustrated: The protocols |volume=1 |edition=2 |publisher=Addison-Wesley |isbn=978-0-20-163346-7}}</ref> : Using IPv6 [[jumbogram]]s it is possible to have UDP datagrams of size greater than 65,535 bytes. The length field is set to zero if the length of the UDP header plus UDP data is greater than 65,535.{{Ref RFC|2675}}}} ;{{APHD|def|name=[[Internet checksum|Checksum]]|length=16 bits|text=The checksum field may be used for error-checking of the header and data. This field is optional in IPv4, and mandatory in most cases in IPv6.{{Ref RFC|8200}}}} ;{{APHD|def|name=Data|length=Variable|text=The payload of the UDP packet.}} ==Checksum computation== The method used to compute the checksum is defined in {{IETF RFC|768|link=no}}, and efficient calculation is discussed in {{IETF RFC|1071|link=no}}: {{blockquote|Checksum is the 16-bit [[ones' complement]] of the ones' complement sum of a pseudo header of information from the IP header, the UDP header, and the data, padded with zero octets at the end (if necessary) to make a multiple of two octets.{{Ref RFC|768}}}} In other words, all 16-bit words are summed using ones' complement arithmetic. Add the 16-bit values up. On each addition, if a carry-out (17th bit) is produced, swing that 17th carry bit around and add it to the least significant bit of the running total.<ref>{{cite web |url=http://mathforum.org/library/drmath/view/54379.html |title=Compute 16-bit Ones' Complement Sum |author=<!--Staff writer(s); no by-line.--> |date=2002-03-20 |website=mathforum.org |publisher=John |access-date=2014-11-05 |format=[[email]]|archive-url=https://web.archive.org/web/20201117162031/http://mathforum.org/library/drmath/view/54379.html|archive-date=2020-11-17|url-status=dead}}</ref> Finally, the sum is then ones' complemented to yield the value of the UDP checksum field. If the checksum calculation results in the value zero (all 16 bits 0) it should be sent as the ones' complement (all 1s) as a zero-value checksum indicates no checksum has been calculated.<ref name="rfc768"/> In this case, any specific processing is not required at the receiver, because all 0s and all 1s are equal to zero in 1's complement arithmetic. The differences between [[IPv4]] and [[IPv6]] are in the pseudo header used to compute the checksum, and that the checksum is not optional in IPv6.<ref>{{cite IETF |rfc=8200 |title=Internet Protocol, Version 6 (IPv6) Specification |page=27-28}}</ref> Under specific conditions, a UDP application using IPv6 is allowed to use a zero UDP zero-checksum mode with a tunnel protocol.<ref>{{cite IETF |rfc=8085 |title=Internet Protocol, Version 6 (IPv6) Specification |page=23}}</ref> {{anchor|IPv4PH}} ===IPv4 pseudo header=== When UDP runs over IPv4, the checksum is computed using a ''pseudo header'' that contains some of the same information from the real [[IPv4 header]].<ref name="rfc768"/>{{rp|2}} The pseudo header is not the real IPv4 header used to send an IP packet, it is used only for the checksum calculation. UDP checksum computation is optional for IPv4. If a checksum is not used it should be set to the value zero. {{APHD|start|title=UDP pseudo-header for checksum computation (IPv4)}} {{APHD|0|bits1=32|background1=mistyrose|field1=Source Address}} {{APHD|4|bits1=32|background1=mistyrose|field1=Destination Address}} {{APHD|8|bits1=8|bits2=8|bits3=16|background1=mistyrose|background2=mistyrose|background3=mistyrose|field1=Zeroes|field2=Protocol|field3=UDP Length}} {{APHD|12|bits1=16|bits2=16|field1=Source Port|field2=Destination Port}} {{APHD|16|bits1=16|field1=Length|bits2=16|background2=lightpink|field2=Checksum}} {{APHD|20|bits1=0|field1=Data}} {{APHD|end}} The checksum is calculated over the following fields: ;{{APHD|def|name=Source Address|length=32 bits|text=The source address from the IPv4 header.}} ;{{APHD|def|name=Destination Address|length=32 bits|text=The destination address from the IPv4 header.}} ;{{APHD|def|name=Zeroes|length=8 bits|constraint=Zeroes == 0|text=All zeroes.}} ;{{APHD|def|name=Protocol|length=8 bits|text=The [[List of IP protocol numbers|protocol value]] for UDP: 17 (or {{Mono|0x11}}).}} ;{{APHD|def|name=UDP length|length=16 bits|text=The length of the UDP header and data (measured in octets).}} {{anchor|IPv6PH}} ===IPv6 pseudo header=== As IPv6 has larger addresses and a different header layout, the method used to compute the checksum is changed accordingly:{{Ref RFC|8200|rsection=8.1}} {{Blockquote|Any transport or other upper-layer protocol that includes the addresses from the IP header in its checksum computation must be modified for use over IPv6, to include the 128-bit IPv6 addresses instead of 32-bit IPv4 addresses.}} When computing the checksum, again a pseudo header is used that mimics the real [[IPv6 header]]: {{APHD|start|title=UDP pseudo-header for checksum computation (IPv6)}} {{APHD|0|bits1=128|background1=mistyrose|field1=Source address}} {{APHD|16|bits1=128|background1=mistyrose|field1=Destination address}} {{APHD|32|bits1=32|background1=mistyrose|field1=UDP length}} {{APHD|36|bits1=24|bits2=8|background1=mistyrose|background2=mistyrose|background3=mistyrose|field1=Zeroes|value1=0|field2=Next Header|value2=17}} {{APHD|40|bits1=16|bits2=16|field1=Source port|field2=Destination port}} {{APHD|44|bits1=16|field1=Length|bits2=16|background2=lightpink|field2=Checksum}} {{APHD|48|bits1=0|field1=Data}} {{APHD|end}} The checksum is computed over the following fields: ;{{APHD|def|name=Source address|length=128 bits|text=The address in the IPv6 header.}} ;{{APHD|def|name=Destination address|length=128 bits|text= The final destination; if the IPv6 packet does not contain a Routing header, TCP uses the destination address in the IPv6 header, otherwise, at the originating node, it uses the address in the last element of the Routing header, and, at the receiving node, it uses the destination address in the IPv6 header.}} ;{{APHD|def|name=UDP length|length=32 bits|text=The length of the UDP header and data (measured in octets).}} ;{{APHD|def|name=Zeroes|length=24 bits|constraint=Zeroes == 0|text=All zeroes.}} ;{{APHD|def|name=Next Header|length=8 bits|text=The [[transport layer]] protocol value for UDP: {{Mono|17}}.}} ==Reliability and congestion control== Lacking reliability, UDP applications may encounter some packet loss, reordering, errors or duplication. If using UDP, the end-user applications must provide any necessary handshaking such as real-time confirmation that the message has been received. Applications, such as [[TFTP]], may add rudimentary reliability mechanisms into the application layer as needed.<ref name="forouzan"/> If an application requires a high degree of reliability, a protocol such as the [[Transmission Control Protocol]] may be used instead. Most often, UDP applications do not employ reliability mechanisms and may even be hindered by them. [[Streaming media]], real-time multiplayer games and [[voice over IP]] (VoIP) are examples of applications that often use UDP. In these particular applications, loss of packets is not usually a fatal problem. In VoIP, for example, latency and jitter are the primary concerns. The use of TCP would cause jitter if any packets were lost as TCP does not provide subsequent data to the application while it is requesting a re-send of the missing data. ==Applications== Numerous key Internet applications use UDP, including: the [[Domain Name System]] (DNS), the [[Simple Network Management Protocol]] (SNMP), the [[Routing Information Protocol]] (RIP)<ref name="kuroseross"/> and the [[Dynamic Host Configuration Protocol]] (DHCP). Voice and video traffic is generally transmitted using UDP. Real-time video and [[Audio over IP|audio streaming protocols]] are designed to handle occasional lost packets, so only slight degradation in quality occurs, rather than large delays if lost packets were retransmitted. Because both TCP and UDP run over the same network, in the mid-2000s a few businesses found that an increase in UDP traffic from these real-time applications slightly hindered the performance of applications using TCP such as [[point of sale]], [[Accounting software|accounting]], and [[Database management system|database]] systems (when TCP detects packet loss, it will throttle back its data rate usage).<ref>{{cite web |url=http://www.networkperformancedaily.com/2007/08/whiteboard_series_nice_guys_fi.html |title=The impact of UDP on Data Applications |publisher=Networkperformancedaily.com |access-date=17 August 2011 |url-status=dead |archive-url=https://archive.today/20070731124008/http://www.networkperformancedaily.com/2007/08/whiteboard_series_nice_guys_fi.html |archive-date=31 July 2007 }}</ref> Some [[VPN]] systems such as [[OpenVPN]] may use UDP and perform error checking at the application level while implementing reliable connections. [[WireGuard]] uses UDP and performs error checking, but does not provide any reliability guarantees, leaving it for the encapsulated protocols to deal with. [[QUIC]] is a transport protocol built on top of UDP. QUIC provides a reliable and secure connection. [[HTTP/3]] uses QUIC as opposed to earlier versions of [[HTTPS]] which use a combination of [[Transmission Control Protocol|TCP]] and [[Transport Layer Security|TLS]] to ensure reliability and security respectively. This means that HTTP/3 uses a single handshake to set up a connection, rather than having two separate handshakes for TCP and TLS, meaning the overall time to establish a connection is reduced.<ref name="Chromium">{{cite web |title=QUIC, a multiplexed stream transport over UDP |url=https://www.chromium.org/quic |website=chromium.org |access-date=17 February 2021}}</ref> ==Comparison of UDP and TCP== {{See also|Transport layer}} [[Transmission Control Protocol]] is a connection-oriented protocol and requires handshaking to set up end-to-end communications. Once a connection is set up, user data may be sent bi-directionally over the connection. * ''Reliable'' β TCP manages message acknowledgment, retransmission and timeouts. Multiple attempts to deliver the message are made. If data gets lost along the way, data will be re-sent. In TCP, there's either no missing data, or, in case of multiple timeouts, the connection is dropped. * ''Ordered'' β If two messages are sent over a connection in sequence, the first message will reach the receiving application first. When data segments arrive in the wrong order, TCP buffers the out-of-order data until all data can be properly re-ordered and delivered to the application. * ''Heavyweight'' β TCP requires three packets to set up a socket connection before any user data can be sent. TCP handles reliability and [[congestion control]]. * ''Streaming'' β Data is read as a [[byte]] stream, no distinguishing indications are transmitted to signal message (segment) boundaries. User Datagram Protocol is a simpler message-based [[connectionless protocol]]. Connectionless protocols do not set up a dedicated end-to-end connection. Communication is achieved by transmitting information in one direction from source to destination without verifying the readiness or state of the receiver. * ''Unreliable'' β When a UDP message is sent, it cannot be known if it will reach its destination; it could get lost along the way. There is no concept of acknowledgment, retransmission, or timeout. * ''Not ordered'' β If two messages are sent to the same recipient, the order in which they arrive cannot be guaranteed. * ''Lightweight'' β There is no ordering of messages, no tracking connections, etc. It is a very simple transport layer designed on top of IP. * ''Datagrams'' β Packets are sent individually and are checked for integrity on arrival. Packets have definite boundaries which are honored upon receipt; a read operation at the receiver socket will yield an entire message as it was originally sent. * ''No congestion control'' β UDP itself does not avoid congestion. Congestion control measures must be implemented at the application level or in the network. * ''Broadcasts'' β being connectionless, UDP can broadcast - sent packets can be addressed to be receivable by all devices on the subnet. * ''Multicast'' β a multicast mode of operation is supported whereby a single datagram packet can be automatically routed without duplication to a group of subscribers. ==Standards== * {{IETF RFC|768|link=no}} β User Datagram Protocol * {{IETF RFC|2460|link=no}} β Internet Protocol, Version 6 (IPv6) Specification * {{IETF RFC|2675|link=no}} β IPv6 Jumbograms * {{IETF RFC|4113|link=no}} β Management Information Base for the UDP * {{IETF RFC|8085|link=no}} β UDP Usage Guidelines ==See also== {{Div col|colwidth=25em}} * [[Comparison of transport layer protocols]] * [[Datagram Transport Layer Security]] (DTLS) * [[List of TCP and UDP port numbers]] * [[Micro Transport Protocol]] (ΞΌTP) * [[Reliable Data Protocol]] (RDP) * [[Reliable User Datagram Protocol]] (RUDP) * [[UDP-based Data Transfer Protocol]] * [[UDP flood attack]] * [[UDP Helper Address]] * [[UDP hole punching]] * [[UDP-Lite]] β a variant that delivers packets even if they are malformed {{Div col end}} ==References== {{Reflist}} ==External links== {{Wikiversity | User Datagram Protocol}} * [https://www.iana.org/assignments/port-numbers IANA Port Assignments] * [http://condor.depaul.edu/~jkristof/papers/udpscanning.pdf The Trouble with UDP Scanning (PDF)] * [http://www.networksorcery.com/enp/protocol/udp.htm Breakdown of UDP frame] * [http://msdn.microsoft.com/en-us/magazine/cc163648.aspx UDP on MSDN Magazine Sockets and WCF] {{Authority control}} [[Category:Internet protocols]] [[Category:Internet Standards]] [[Category:Transport layer protocols]] [[Category:Computer-related introductions in 1980]]
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)
Pages transcluded onto the current version of this page
(
help
)
:
Template:APHD
(
edit
)
Template:Anchor
(
edit
)
Template:Authority control
(
edit
)
Template:Blockquote
(
edit
)
Template:Cite IETF
(
edit
)
Template:Cite book
(
edit
)
Template:Cite web
(
edit
)
Template:Div col
(
edit
)
Template:Div col end
(
edit
)
Template:IETF RFC
(
edit
)
Template:IPstack
(
edit
)
Template:Infobox networking protocol
(
edit
)
Template:Ref RFC
(
edit
)
Template:Reflist
(
edit
)
Template:Rp
(
edit
)
Template:See also
(
edit
)
Template:Short description
(
edit
)
Template:Use dmy dates
(
edit
)
Template:Wikiversity
(
edit
)