Time
13 hours 57 minutes
Difficulty
Beginner
CEU/CPE
14

Video Transcription

00:01
Hello and welcome back. Dicey Need one interconnecting Cisco networking devices. Part one.
00:06
This is absolute 153 The user data here and politico or Judy P I am trending their own. I'll be your instructor for this course.
00:13
Last video one over the transmission control protocol are TCP bit about how it establishes connections, terminates on
00:20
Sameh recovery techniques and a bit about flow control using one doing
00:24
it was this episode will be covering UDP and how it transfer data from one host to another.
00:31
So learning objectives for this room going over common UDP applications
00:35
the differences in TCP UDP and why we would ever use u v p
00:43
So quick Pre assessment here, what is a benefit of UDP over TCP So you think about what TCP does.
00:50
You can hopefully figure this out. Otherwise just pause a video and give it a shot.
00:58
All right, hopefully got the less data overhead.
01:03
Remember,
01:06
the TCBY is has a recovery.
01:10
Ew! DP is not You'll learn here soon
01:12
and you need P is the connection was protocol, which
01:15
isn't I mean, it is a benefit. So if you get if you yes, you guessed I'd give it to you. But the biggest benefit of it is there's less data overhead on it. The header is smaller,
01:26
so it's uncommon. UDP applications. As we said before D N s is TCP and UDP. The actual NS look up portion, like we did in one of the earlier labs,
01:37
is the UDP portion.
01:38
Then D h e p is utopias Well port 69 t f t p
01:45
which is the trivial FTP.
01:47
It is based on UDP as well and NTP or the network time protocol off port 123
01:53
Did you see the headers
01:55
are a bit different service,
01:57
so the door isn't t c p and u T P
02:00
So T c p is connection or in America has a three way handshake. It has reliability built in windowing and reordering of the data. So you remember where it lost packet 2000 or sequence 2000 and you know, as for it and pulled it back and said, OK, already have, you know, sequence 3000. So it kind of reordered it all
02:20
because of how it came in
02:22
and I remember windowing is you know, I could say OK, I can allow 3000 bikes and then
02:27
next, chicken, like kicking a lot 4000
02:30
more or less, depending on what it needs.
02:32
So you D P is actually connection list. It doesn't have the three way handshake like T. C. Pete does.
02:38
But the nice thing is because it doesn't have reliability or error checking or any of that is, there's less overhead is less processing.
02:47
So the way that the packets come in, that's how they come in. And that's how they're processed. So you can see the headers are quite a bit different, but isn't the flags? There's not a
02:57
There's no sequin, an acknowledgment monomers. You're looking a sore sport destination port. Check some length and data
03:04
smush smush mar where they both use multiplexing. So they both look att, the common porous. And they both used the on a new sports in the whole side.
03:14
So why would we ever used to his duty? P. So they're very tolerant of loss,
03:17
right? The applications that uses air tolerant so avoid the voice over I P can sustain some loss you're looking at, You know, if you lose 20 milliseconds of audio,
03:29
it's not a huge deal. That's not too big of a deal. You know, if you're streaming of a movie
03:34
and you lose 20 milliseconds, 30 milliseconds, this is not a huge deal compared to
03:40
you know, if you had had TCP Now, if you were
03:44
doing a file transfer over FTP,
03:46
then it could be very important to make sure that
03:51
all the data gets there.
03:52
You know, the biggest thing is the eight, but header of UDP versus the 20 Blade header, which might not seem like a lot. It's for a minuscule, but you gotta figure every segment or packet is gonna have
04:03
that header.
04:05
So some of applications actually have that air checking built in so they don't need to utilize that TCP air checking so
04:14
they can, you know, they receive the data at the application layer and say, OK, we're missing this portion of it, you know, can you resend this
04:21
or they could just have a retrial request? It was a response back from a query like D n s will do sometimes.
04:30
And finally, under the post assessment here,
04:33
what protocol does D. N s use?
04:38
Give me a few seconds posit.
04:42
All right, Hopefully you got this one. It is both the TCP and UDP. Remember these own transfers for servers as TCP in the host DNA. So I P request is the UDP,
04:55
and next we're gonna hit module to INA, preventing basic Ethernet. Lance, Here's where I will actually break out the labs, start using some switches a little bit.
05:03
So make sure that you have Gina's three or package tracer or your actual home lab built already, and we actually do have a genius. Three course on cyber here now. So if you guys want some help setting it up, go check that out.
05:19
Otherwise, if you have questions, you need hope. Or you have looking for us of icing the one information Shoot me a message.
05:27
Otherwise, thank you for washing this lesson and look forward to teaching for the remainder. Of course. Thank you.

Up Next

CCNA ICND1

This course will enable students to understand virtualization and cloud services, and network programmability related to LAN, access and core segments.

Instructed By

Instructor Profile Image
Trenton Darrow
Network Engineer at NCI Information Systems, Inc
Instructor