User datagram protocol synonyms

Category:
Part of speech:
An Internet transport layer protocol that is defined in STD 6, RFC 768. The UDP is a connectionless protocol, meaning that no connection back to the sender is required. Though it is a very fast protocol, it is unreliable. An Internet transport layer protocol that is defined in STD 6, RFC 768. The UDP is a connectionless protocol, meaning that no connection back to the sender is required. Though it is a very fast protocol, it is unreliable. A variety of well-established services rely on communication through UDP. The Simple Network Management Protocol (SNMP) sends its alarms through UDP, the Routing Information Protocol (RIP) exchanges routing information through UDP, and the Domain Name Service (DNS) transports its simple request with UDP. UDP is perfectly suited for malicious activity and hiding the identity of the attacker through IP address spoofing because it is connectionless. As shown in Figure 21-1, the UDP header confirms the simplicity (and elegance) of this protocol. Though it contains only source and destination ports, the same rules apply for source and destination ports for UDP as for TCP. The source ports typically are randomly generated. If traffic analysis therefore finds them to be identical, a packet-crafting tool can be suspected to have generated these packets for some possibly malicious activity. Destination ports are either well known or reserved, but they can also have malicious activity hiding behind an innocent-looking communication. The length of the packet is contained in the UDP length field, and a checksum ensures a level of integrity of the data. QUT Division of Technology, Information and Learning Support. Network Glossary. [Online, July 17, 2003.] QUT Division of Technology, Information and Learning Support Website. http://www.its.qut.edu.au/network/glossary.jsp.
0
0
The specific internet consisting of a global network of computers that communicate using Internet Protocol (IP) and that use Border Gateway Protocol (BGP) to identify the best paths to route those communications.
0
0
An Internet transport layer protocol that is defined in STD 6, RFC 768. The UDP is a connectionless protocol, meaning that no connection back to the sender is required. Though it is a very fast protocol, it is unreliable. An Internet transport layer protocol that is defined in STD 6, RFC 768. The UDP is a connectionless protocol, meaning that no connection back to the sender is required. Though it is a very fast protocol, it is unreliable. A variety of well-established services rely on communication through UDP. The Simple Network Management Protocol (SNMP) sends its alarms through UDP, the Routing Information Protocol (RIP) exchanges routing information through UDP, and the Domain Name Service (DNS) transports its simple request with UDP. UDP is perfectly suited for malicious activity and hiding the identity of the attacker through IP address spoofing because it is connectionless. As shown in Figure 21-1, the UDP header confirms the simplicity (and elegance) of this protocol. Though it contains only source and destination ports, the same rules apply for source and destination ports for UDP as for TCP. The source ports typically are randomly generated. If traffic analysis therefore finds them to be identical, a packet-crafting tool can be suspected to have generated these packets for some possibly malicious activity. Destination ports are either well known or reserved, but they can also have malicious activity hiding behind an innocent-looking communication. The length of the packet is contained in the UDP length field, and a checksum ensures a level of integrity of the data. QUT Division of Technology, Information and Learning Support. Network Glossary. [Online, July 17, 2003.] QUT Division of Technology, Information and Learning Support Website. http://www.its.qut.edu.au/network/glossary.jsp.
0
0
An Internet transport layer protocol that is defined in STD 6, RFC 768. The UDP is a connectionless protocol, meaning that no connection back to the sender is required. Though it is a very fast protocol, it is unreliable. An Internet transport layer protocol that is defined in STD 6, RFC 768. The UDP is a connectionless protocol, meaning that no connection back to the sender is required. Though it is a very fast protocol, it is unreliable. A variety of well-established services rely on communication through UDP. The Simple Network Management Protocol (SNMP) sends its alarms through UDP, the Routing Information Protocol (RIP) exchanges routing information through UDP, and the Domain Name Service (DNS) transports its simple request with UDP. UDP is perfectly suited for malicious activity and hiding the identity of the attacker through IP address spoofing because it is connectionless. As shown in Figure 21-1, the UDP header confirms the simplicity (and elegance) of this protocol. Though it contains only source and destination ports, the same rules apply for source and destination ports for UDP as for TCP. The source ports typically are randomly generated. If traffic analysis therefore finds them to be identical, a packet-crafting tool can be suspected to have generated these packets for some possibly malicious activity. Destination ports are either well known or reserved, but they can also have malicious activity hiding behind an innocent-looking communication. The length of the packet is contained in the UDP length field, and a checksum ensures a level of integrity of the data. QUT Division of Technology, Information and Learning Support. Network Glossary. [Online, July 17, 2003.] QUT Division of Technology, Information and Learning Support Website. http://www.its.qut.edu.au/network/glossary.jsp.
0
0
An Internet transport layer protocol that is defined in STD 6, RFC 768. The UDP is a connectionless protocol, meaning that no connection back to the sender is required. Though it is a very fast protocol, it is unreliable. An Internet transport layer protocol that is defined in STD 6, RFC 768. The UDP is a connectionless protocol, meaning that no connection back to the sender is required. Though it is a very fast protocol, it is unreliable. A variety of well-established services rely on communication through UDP. The Simple Network Management Protocol (SNMP) sends its alarms through UDP, the Routing Information Protocol (RIP) exchanges routing information through UDP, and the Domain Name Service (DNS) transports its simple request with UDP. UDP is perfectly suited for malicious activity and hiding the identity of the attacker through IP address spoofing because it is connectionless. As shown in Figure 21-1, the UDP header confirms the simplicity (and elegance) of this protocol. Though it contains only source and destination ports, the same rules apply for source and destination ports for UDP as for TCP. The source ports typically are randomly generated. If traffic analysis therefore finds them to be identical, a packet-crafting tool can be suspected to have generated these packets for some possibly malicious activity. Destination ports are either well known or reserved, but they can also have malicious activity hiding behind an innocent-looking communication. The length of the packet is contained in the UDP length field, and a checksum ensures a level of integrity of the data. QUT Division of Technology, Information and Learning Support. Network Glossary. [Online, July 17, 2003.] QUT Division of Technology, Information and Learning Support Website. http://www.its.qut.edu.au/network/glossary.jsp.
0
0
Present participle of spoof.
0
0
Find another word for user datagram protocol. In this page you can discover 6 synonyms, antonyms, idiomatic expressions, and related words for user datagram protocol, like: domain name service (dns), internet, port and port numbers, routing information protocol (rip), simple network management protocol (smtp) and spoofing.