What is User Datagram Protocol (UDP)? Definition from SearchNetworking (2024)

By

  • Linda Rosencrance
  • George Lawton
  • Chuck Moozakis,Editor at Large

What is User Datagram Protocol (UDP)?

User Datagram Protocol (UDP) is a communications protocol primarily used to establish low-latency and loss-tolerating connections between applications on the internet.

UDP speeds up transmissions because it enables data transfer before the receiving party provides an agreement. As a result, UDP is beneficial in time-sensitive communications, such as voice over IP (VoIP), domain name system (DNS) lookup, and video or audio playback.

UDP is an alternative to TCP. Both UDP and TCP run on top of IP and are sometimes referred to as UDP/IP or TCP/IP. But there are important distinctions between the two. For example, UDP enables process-to-process communication, while TCP supports host-to-host communication.

TCP sends individual packets and is a reliable transport medium. UDP sends messages, called datagrams, and is considered a best-effort mode of communications. This means UDP doesn't guarantee data delivery or offer any special features to retransmit lost or corrupted messages.

UDP provides two services not provided by the IP layer:

  1. Port numbers. Help distinguish different user requests.
  2. Checksum. An optional capability that verifies if data arrived intact.

UDP features

UDP's attributes make it beneficial for use with applications that can tolerate lost data. Features of UDP include the following:

  • Packets can be dropped and received in a different order than they were transmitted, which is suitable for real-time applications where latency might be a concern.
  • Transaction-based protocols, such as DNS or Network Time Protocol, can use UDP for communication.
  • UDP is useful in locations with a large number of clients where real-time error correction isn't necessary, such as gaming, voice or video conferencing, and media streaming.

UDP header composition

UDP uses headers when packaging message data to transfer over network connections. UDP headers contain a set of parameters -- called fields -- defined by the technical specifications of the protocol.

The UDP header has four fields, each of which is 2 bytes. They are the following:

  1. Source port number. The number of the sender.
  2. Destination port number. The number of the port to which the datagram is addressed.
  3. Length. The length in bytes of the UDP header and any encapsulated data.
  4. Checksum. Used in error checking -- IPv6 requires checksums, but they're optional in IPv4.
What is User Datagram Protocol (UDP)? Definition from SearchNetworking (1)

How UDP works

UDP uses IP to get a datagram from one computer to another. UDP gathers data in a UDP packet and adds its own header information to the packet. This data consists of the source and destination ports on which to communicate, the packet length and a checksum. After UDP packets encapsulate in an IP packet, it sends packets off to their destinations.

Unlike TCP, UDP doesn't guarantee the packets will get to the right destinations. This means UDP doesn't connect to the receiving computer directly, which TCP does. Instead, it sends the data out and relies on the devices in between the sending and receiving computers to move the data where it needs to go.

Most applications wait for any replies they expect to receive as a result of packets sent with UDP. If an application doesn't receive a reply within a certain time frame, the application either sends the packet again or stops trying.

UDP uses a simple transmission model that doesn't include handshake dialogues to provide reliability, ordering or data integrity. Consequently, UDP has an unreliable service. Packets might arrive out of order, appear to have duplicates or disappear without warning.

Although this transmission method doesn't guarantee the data will reach its destination, it does have low overhead and is popular for services that don't have to work the first time.

UDP applications

Applications of UDP include the following:

  1. Lossless data transmission.
  2. Gaming, voice and video.
  3. Services that don't need fixed packet transmission.
  4. Multicasting and routing update protocols.
  5. Fast applications.

Lossless data transmission

Applications that require lossless data transmission can make use of UDP. For example, an application that is configured to manage the process of retransmitting lost packets and correctly arrange received packets might use UDP. This approach can help to improve the data transfer rate of large files compared to TCP.

In the Open Systems Interconnection communication model, UDP is in Layer 4, the transport layer. UDP works in conjunction with higher-level protocols to help manage data transmission services, including Trivial File Transfer Protocol, Real Time Streaming Protocol and Simple Network Management Protocol.

Gaming, voice and video

UDP is an ideal protocol for network applications in which perceived latency is critical, such as in gaming, voice and video communications. These examples can suffer some data loss without adversely affecting perceived quality. In some cases, however, forward error correction techniques are used in addition to UDP to improve audio and video quality, despite some loss.

Services that don't need fixed packet transmission

UDP can also be used in applications that depend on the reliable exchange of information but should have their own methods to answer packets. These services are advantageous because they're not bound to fixed patterns to guarantee the completeness and correctness of the data packets sent. Users can decide how and when to respond to incorrect or unsorted information.

Multicasting and routing update protocols

Multicasting can use UDP because it supports packet switching. In addition, some routing update protocols, such as Routing Information Protocol, can also use UDP.

Fast applications

UDP can be used in applications where speed -- rather than reliability -- is critical. For example, it might be prudent to use UDP in an application that sends data from a fast acquisition where it's OK to lose some data points.

TCP vs. UDP

TCP and UDP are part of the TCP/IP protocol suite, which includes a number of protocols that carry out network communications.

TCP has emerged as the dominant protocol used for the bulk of internet connectivity due to its ability to break large data sets into individual packets, check for and resend lost packets, and reassemble packets in the correct sequence. But these additional services come at a cost in terms of additional data overhead and latency.

In contrast, UDP is considered a connectionless protocol because it doesn't require the establishment of a virtual circuit before any data transfer occurs. The communication protocol only sends the packets, which means it has much lower bandwidth overhead and latency. With UDP, packets might take different paths between sender and receiver. As a result, some packets might be lost or received out of order.

What is User Datagram Protocol (UDP)? Definition from SearchNetworking (2)

UDP characteristics include the following:

  • Connectionless.
  • Used for VoIP, video streaming, gaming and live broadcasts.
  • Faster and requires fewer resources.
  • Packets don't necessarily arrive in order.
  • Allows missing packets, which is useful for real-time communications, but the sender doesn't receive an acknowledgement of whether a packet has been received.
  • Better suited for applications that need fast, efficient transmission, such as games.

TCP characteristics include the following:

  • Connection-oriented.
  • The most widely used protocol on the internet.
  • Guarantees that no packets go missing and all sent data arrives to the intended recipient.
  • Sends packets in order so they can be stitched back together easily.
  • Slower and requires more resources.
  • Has a bigger header than UDP.
  • Best suited for apps that need high reliability, and transmission time is relatively less critical.

Editor's note: This definition was reformatted to improve the reader experience.

This was last updated in December 2023

Continue Reading About User Datagram Protocol (UDP)

  • What to know about UDP vulnerabilities and security
  • Common network protocols and their functions explained

Related Terms

What is a personal area network (PAN)?
A personal area network (PAN) is a small network that interconnects technology devices within a limited range of just a few ...Seecompletedefinition
What is a unique identifier (UID)?
A unique identifier (UID) is a numeric or alphanumeric string that is associated with a single entity within a given system.Seecompletedefinition
What is asynchronous?
In general, asynchronous -- from Greek asyn- ('not with/together') and chronos ('time') -- describes objects or events not ...Seecompletedefinition

Dig Deeper on Network infrastructure

  • What is Real-Time Transport Control Protocol (RTCP)?By: RahulAwati
  • Examine a captured packet using WiresharkBy: DamonGarn
  • Port scan attacks: What they are and how to prevent themBy: MichaelCobb
  • Transmission Control Protocol (TCP)By: KinzaYasar
What is User Datagram Protocol (UDP)? Definition from SearchNetworking (2024)
Top Articles
How Smart Is an Akita? Breed Intelligence & Facts – Dogster
Who Are Credit Reports Viewed By? - NerdWallet
English Bulldog Puppies For Sale Under 1000 In Florida
Katie Pavlich Bikini Photos
Gamevault Agent
Pieology Nutrition Calculator Mobile
Hocus Pocus Showtimes Near Harkins Theatres Yuma Palms 14
Hendersonville (Tennessee) – Travel guide at Wikivoyage
Compare the Samsung Galaxy S24 - 256GB - Cobalt Violet vs Apple iPhone 16 Pro - 128GB - Desert Titanium | AT&T
Vardis Olive Garden (Georgioupolis, Kreta) ✈️ inkl. Flug buchen
Craigslist Dog Kennels For Sale
Things To Do In Atlanta Tomorrow Night
Non Sequitur
Crossword Nexus Solver
How To Cut Eelgrass Grounded
Pac Man Deviantart
Alexander Funeral Home Gallatin Obituaries
Energy Healing Conference Utah
Geometry Review Quiz 5 Answer Key
Hobby Stores Near Me Now
Icivics The Electoral Process Answer Key
Allybearloves
Bible Gateway passage: Revelation 3 - New Living Translation
Yisd Home Access Center
Home
Shadbase Get Out Of Jail
Gina Wilson Angle Addition Postulate
Celina Powell Lil Meech Video: A Controversial Encounter Shakes Social Media - Video Reddit Trend
Walmart Pharmacy Near Me Open
Marquette Gas Prices
A Christmas Horse - Alison Senxation
Ou Football Brainiacs
Access a Shared Resource | Computing for Arts + Sciences
Vera Bradley Factory Outlet Sunbury Products
Pixel Combat Unblocked
Movies - EPIC Theatres
Cvs Sport Physicals
Mercedes W204 Belt Diagram
Mia Malkova Bio, Net Worth, Age & More - Magzica
'Conan Exiles' 3.0 Guide: How To Unlock Spells And Sorcery
Teenbeautyfitness
Where Can I Cash A Huntington National Bank Check
Topos De Bolos Engraçados
Sand Castle Parents Guide
Gregory (Five Nights at Freddy's)
Grand Valley State University Library Hours
Holzer Athena Portal
Hello – Cornerstone Chapel
Stoughton Commuter Rail Schedule
Nfsd Web Portal
Selly Medaline
Latest Posts
Article information

Author: Kerri Lueilwitz

Last Updated:

Views: 6532

Rating: 4.7 / 5 (67 voted)

Reviews: 82% of readers found this page helpful

Author information

Name: Kerri Lueilwitz

Birthday: 1992-10-31

Address: Suite 878 3699 Chantelle Roads, Colebury, NC 68599

Phone: +6111989609516

Job: Chief Farming Manager

Hobby: Mycology, Stone skipping, Dowsing, Whittling, Taxidermy, Sand art, Roller skating

Introduction: My name is Kerri Lueilwitz, I am a courageous, gentle, quaint, thankful, outstanding, brave, vast person who loves writing and wants to share my knowledge and understanding with you.