preview

An Analysis Of A Network Protocol : Project Analysis

Decent Essays

Our project focuses on the analysis of a network protocol and how it works. The network layer Oliveir Bonaventure explains as "providing a connection-less service. It identifies each (interface of a) host by using an IP address. "[4] Mainly this layer passes information between layers and provides a way to address them. The main goal to enable hosts to send packets of information containing up to 64 KB. An issue arises when information doesn't deliver to the correct destination. This issue is because there is no actual guarantee of the delivery. Also, the detection of errors isn't a guarantee during the transmission process. There is a common analogy for the network layer. "It's like a worldwide postal service providing an addressing and …show more content…

The first of these is the source port which is 16 bits of information that identifies the source of the data. Compared to the source port, the destination port also holds 16 bits of information. The only difference is the destination port holds information about the data's destination. These two ports are what are responsible for building the pathway for the data. Following these is the length parameter which defines how large the UDP packet is going to be. It stores a max of 16 bits but also has a min of 8 bits. In IPv6 if the size is greater than a 16 bit max the length is to be set to 0, this process is a jumbogram. In IPv4 the checksum value is optional, which means in the case there's no checksum value, that value is set to 0 as well as all the bits are set to 0. [3] IPv6 the checksum is mandatory. "The checksum is the 16-bit one's complement of the one's complement sum of a pseudo header of information from the IP header, the UDP header, and the data. This header is padded with zero octets at the end (if necessary) to make a multiple of two octets” [5]. IPV6's checksum has a modification in the calculation due to the increase in the header size.

To show UDP is a simple protocol, compare it to its brother TCP. When compared, UDP has less functionality and overhead which results in decreased reliability.

ADD IN PICTURE HERE FROM [6]

A DoS attack is the most common but also the most recognizable by the public user. There are many different types of attacks that

Get Access