Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
CCNA Exploration 4.docx
Скачиваний:
18
Добавлен:
24.11.2018
Размер:
144.57 Кб
Скачать

4.4.3 Udp Server Processes and Requests Page 1:

Like TCP-based applications, UDP-based server applications are assigned Well Known or Registered port numbers. When these applications or processes are running, they will accept the data matched with the assigned port number. When UDP receives a datagram destined for one of these ports, it forwards the application data to the appropriate application based on its port number.

4.4.3 - UDP Server Processes and Requests The diagram depicts a UDP server listening for requests from two client PC's that are connected.  Server application examples:  - Client DNS requests are received on port 53.  - Client RADIUS requests are received on port 1812.  Client requests to servers have well-known port numbers as the destination port. 

4.4.4 Udp Client Processes Page 1:

As with TCP, client/server communication is initiated by a client application that is requesting data from a server process. The UDP client process randomly selects a port number from the dynamic range of port numbers and uses this as the source port for the conversation. The destination port will usually be the Well Known or Registered port number assigned to the server process.

Randomized source port numbers also help with security. If there is a predictable pattern for destination port selection, an intruder can more easily simulate access to a client by attempting to connect to the port number most likely to be open.

Because there is no session to be created with UDP, as soon as the data is ready to be sent and the ports identified, UDP can form the datagram and pass it to the Network layer to be addressed and sent on the network.

Remember, once a client has chosen the source and destination ports, the same pair of ports is used in the header of all datagrams used in the transaction. For the data returning to the client from the server, the source and destination port numbers in the datagram header are reversed.

4.4.4 - UDP Client Processes The diagram depicts two clients, Client 1 and Client 2, sending UDP requests to a server. The clients send requests to the server using well-known port numbers as the destination ports. The server responds to both clients using well-known port numbers as the source ports.  Client 1 DNS request  Source Port: 49152  Destination Port: 53  Server DNS response to Client 1 request  Source Port: 53  Destination Port: 49152  Client 2 RADIUS request  Source Port: 51152  Destination Port: 1812  Server RADIUS response to Client 2 request  Source Port: 1812  Destination Port: 51152

Page 2:

In this activity, how DNS uses UDP is examined.

Click the Packet Tracer icon to launch the Packet Tracer activity.

4.4.4 - UDP Client Processes Link to Packet Tracer Exploration: UDP Operation  In this activity, you examine how DNS uses UDP.

4.5 Lab Activities

4.5.1 Observing tcp and udp using Netstat Page 1:

In this lab, you will examine the netstat (network statistics utility) command on a host computer, and adjust netstat output options to analyze and understand TCP/IP Transport layer protocol status.

Click the Lab icon to see more details.

4.5.1 - Observing TCP and UDP Using Netstat Link to Hands-on Lab: Observing TCP and UDP Using Netstat  In this lab, you examine the netstat command, the network statistics utility, on a host computer, and adjust netstat output options to analyze and understand TCP/IP Transport Layer protocol status. 

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]