Sie sind auf Seite 1von 39

VEL TECH MULTI TECH Dr.RANGARAJAN Dr.

SAKUNTHALA ENGINEERING COLLEGE


(AN ISO 9001-2000 CERTIFIED INSTITUTION) (OWNED BY VEL TRUST 1997) (APPROVED BY AICTE & AFFILIATED TO ANNA UNIVERSITY) N0.62, AVADI-VEL TECH ROAD, CHENNAI- 600 062

GE 2321-COMMUNICATION SKILLS LAB

NAME: REGISTER NO: ROLL NO: BRANCH: YEAR: SEMESTER:

VEL TECH MULTI TECH Dr.RANGARAJAN Dr.SAKUNTHALA ENGINEERING COLLEGE (AN ISO 9001-2000 CERTIFIED INSTITUTION) (OWNED BY VEL TRUST 1997) N0.62, AVADI-VEL TECH ROAD, CHENNAI- 600 062

CERTIFICATE Name : Year: University Register No: Semester: Branch: BE (EEE) College Roll No. :

Certified that this is the bonafide record of work done by the above student in the COMMUNICATION SKILLS LAB GE 2321during the academic year 2009 2010. _____________________________ Signature of Head of the Department _____________________ Signature of Lab Incharge

Submitted for the University Practical Examination held on ... at VEL TECH MULTI TECH Dr.RANGARAJAN Dr.SAKUNTHALA ENGINEERING
COLLEGE, N0.62,AVADI-VEL TECH ROAD,CHENNAI- 600 062.

Signature of Examiners: Internal: External:..

Date:..

INDEX

EX.NO
1

DATE

TOPIC
Letter Writing

PAGE NO

SIGNATURE

(a)

Formal Letter

(b)

Informal Letter

Report Writing

(a)

Book/Event report

(b)

Project Report

Resume Writing

Non-Technical Presentation

Technical Presentation

Reading Comprehension

Listening Comprehension

INTRODUCTION: Letter writing is an art. Even though letters have transformed into e-mails and SMS, the art still remains, only the medium has changed. Letters can be broadly classified into 1. FORMAL LETTERS and 2. INFORMAL LETTERS. ELEMENTS OF A GOOD LETTER The most important element of writing a good letter is your ability to identify and write to your audience. If you are addressing your letter to the department of human resources, avoid using highly technical terms that only engineers would understand, even if your letter is addressed to an engineering company, chances are that the personnel in human resources does not have an engineering background. The next element is that you make sure your present your objective in a clear and concise manner. Don't be vague about your objective, most people will not have the patience to sit there and guess at the meaning of your letter or the time to read a long-winded letter, just get to the point without going into unnecessary details. Another important element to remember is to remain professional. Even if you are writing a complaint letter, remain polite and courteous, simply state the problem(s) along with any other relevant information and be sure to avoid threats and slander. FORMAL LETTER: As the name suggests, formal letters include business letters, official letters, applications, complaints, letter to editors, letters written to people whom we want to convey certain important information. INFORMAL LETTER: On the other hand, informal letters include personal letters, letters that are written to our friends and family. While formal letters follow certain format, one can be flexible while writing informal letters. Nonetheless, letter writing is a skill that needs to be honed over time with practice The whole format of the letter should be to the left side of the page. No commas in the From, To, or salutation or signing off. Punctuation marks to be observed in the content of the letter. No indenting required i.e., there is no need to leave space to indicate the beginning of a paragraph. A little space between paragraphs is to be maintained.

FORMAT OF FORMAL LETTER


Return Address Line 1 1 Return Address Line 2 Date (Month Day, Year) 2 Mr./Mrs./Ms./Dr. Full name of recipient. 3 Title/Position of Recipient. Company Name Address Line 1 Address Line 2 Dear Ms./Mrs./Mr. Last Name: 4 Subject: Title of Subject 5 Body Paragraph 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ...................................................................... ........................... Body Paragraph 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ...................................................................... ........................... Body Paragraph 3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ...................................................................... ...........................6 Closing (Sincerely...), 7 Signature 8 Your Name (Printed) 9 Your Title Enclosures (2) 10 Typist Initials. 11

Ex.no:1(a) Date:

FORMAL LETTER

Topic: Write an application letter for the job of marketing manager giving all necessary details including qualification. From Arnika.A.V. Thennangudi Thanjavur 24.6.2011 To The Manager HRD JRC Pvt. Ltd. New Delhi Dear sir, Sub: Recruitment of marketing manager- reg. With reference to your advertisement in Deccan Chronicle dated 3rd June 2011 I wish to submit my candidature for consideration of the same as per detail given in suceeding paras. I am aged 24 years and possess MBA degree in marketing from Anna University which I obtained in the year 2007. Thereafter, I have worked as marketing executive in PNC Pvt. Ltd. at Bangalore for 2 years dealing in the same field. I possess excellent communication skill and power to motivate as a leader to achieve the targets laid down by the management. I am enclosing my detailed resume/CV for consideration. Yours truly A.V.Arnika.

FORMAT OF INFORMAL LETTER

Dear Name of Recipient, 3

Return Address Line 1 1 Return Address Line 2 Date (Month Day, Year) 2

Body Paragraph 1.................................................................... ...................................................................... .............. Body Paragraph 2.................................................................... ...................................................................... .............. Body Paragraph 3.................................................................... ...................................................................... ..............4

Closing (Sincerely...), 5 Signature 6

Ex.no:1(b) Date: Topic:

INFORMAL LETTER

Write a letter to your friend wishing him good luck on his travel. Thennangudi Thanjaur. 24.6.2011.

Hello Muthu, I received your letter yesterday, I am happy to hear that you are going to visit Ooty with your family. I am sure you will have a fabulous time and I am bit jealous. May be we can go together sometime. Please travel safely and take care of yourself. Dont forget to take photos, I would like to see all of them. I will expect detailed explanation when you get back. Have fun!

Regards, A.V.Arnika.

INTRODUCTION:
Formal report writing in professional, technical and business contexts has evolved certain conventions regarding format, style, referencing and other characteristics. These will vary in detail between organisations, so the information given below should be treated as general guidelines which hold good in the absence of any more specific `house styles'. The format will depend upon the type and purpose of the report, its intended readers, and the conventions of presentation and layout prescribed by the organisation in which you are operating. In general, there are two broad types of format which are differentiated by whether the summary and/or recommendations are placed after the main body of the report, or are placed earlier, before the main body. The eventual format chosen might be a combination or a condensed version of these two formats.

A format where the findings/recommendations follow the main body


Cover sheet Title page Abstract Table of contents Introduction The body of the report Conclusion (and recommendations if applicable) References / Bibliography Glossary (if needed) Appendices

TITLE PAGE

title writer organisation date person/group who commissioned the report

TABLE OF CONTENTS

accurate, clear layout section numbering system and indentation complete page numbers list of illustrations if applicable

ABSTRACT

appropriate length complete summary of key information informative, not descriptive, in form impersonal tone connected prose

INTRODUCTION

relating topic to wider field necessary background information purpose of report scope of report explanation of arrangement of report sections

BODY FORMAT

main headings indicating equal level of importance all subheadings relating to section heading choice of levels indicating hierarchy of importance hierarchy of importance shown by careful and consistent use of features such as capitals, different fonts, underlining, bold, italics indenting numbering/letter system space between sections to enhance readability and layout when using charts, statistics and illustrations check for suitability, captions, reference in text and positioning acknowledgement of all sources, including material referred to indirectly, direct quotations, copied diagrams, tables, statistics ensure a systematic link between references in the text and the reference list and bibliography

EXPRESSION

correct own words concise clear to intended reader formal and factual

CONTENT

logical development of ideas from one section to another, and within each section citing evidence relevant objective specific

CONCLUSION(S)

arising out of the facts convincing a substantial basis for the recommendations

RECOMMENDATIONS (if applicable)


based on the conclusions practical specific well organised, with the most important first

LIST OF REFERENCES

sources in the text listed by the Harvard system

BIBLIOGRAPHY

texts consulted but not referred to directly in the report

GLOSSARY (if included)

arranged alphabetically

APPENDIX (appendices)

placed at end of a report if included arranged in the order referred to in the report

Ex.no:2 (a) Date:

Report Writing

Topic: BOOK-REPORT ON WINGS OF FIRE

Abdul Kalam , the man with many names. He is most trusted man in India according to survey , He is also known as missile man of India , He is at times addressed as people's president. The simple man who is symbol of India which its founder dreamt of. The man who would be cherished long after he is gone , the man whom India loves. His autobiography 'The wings of fire' is an inspiring read which takes you to journey of this great man's life. It feels one with pride , with joy , with hope , with dream . His struggles , his success , his failures , his triumph and most importantly his keep going attitude making journey towards feets not achieved before. His book covers his journey from his childhood to his padmabhushan. The book does not cover his presidency days and was published before he became president of India. The beginning chapter of book is full of Indians . Abdul Kalam stayed in rameshvaram which is famous for its shiv temple. The famous temple was minutes journey from abdul kalam's home and was muslim dominated area. Another example of Indians .Abdul Kalam use to sell newspapers to help his brother , was good friend of priest of temple and his father was respectable man whom people use to turn for advice. Abdul Kalam writes about his schooling , his future brother in law's influence on him , his teachers in initial chapters .He also writes about his financial challenge during his college era and how his sister bails him out. The further chapters are synonyms of young independent India exploring new avenues and trying to excel in it. Vikram

sarabhai's immense contribution is establishment of space research center and opening up new feet for coming scientist generation to triumph , Abdul Kalam's efforts in association with other scientist would make ordinary Indian understand the zeal , the effort of human soul in making India , a well respected country in space science. This book is also about great Indian dream. Dream which our founding fathers had and dream which Abdul Kalam made reality. Dream that you may be Hindu or Muslim , rich or poor you can become what you dreamt of . Not many people do believe in that. In country which is divided by religion , caste , region . In country which has corrupted system where money and contact works , Abdul Kalam is perfect example of great Indian dream. This book is about Indians , about collective goals , about collective triumphs and about taking pride in being Indian.

Ex.no:2 (b) Date:

PROJECT REPORT

Topic: RESOURCE ALLOCATION SYSTEM

ABSTRACT :
This project emphasizes upon introducing the memory management concept using Kerberos in the client server network (intranet). Server does not have any control over the resources after the client has gained access to the resources .So there may be chance for improper usage of the resources. Kerberos is a computer network authentication protocol which allows individuals communicating over an insecure network to prove their identity and ensures the integrity of data. In this project, Kerberos has been implemented to provide authentication and memory management service. This project concentrates on providing access to authorized users as well as managing the use of resource by the client in a user-friendly manner . The simulator at the client monitors each and every operation of the client .If the client exceeds the allocated memory, he can send request to the server stating a valid reason . The Administrator at the server validates the client request and may decide to extend the memory or deny the request. The Memory status option of the simulator enables the client to view his current usage statistics.

TABLE OF CONTENTS:

SERIAL NO 1 2 3 4 5 6 7

CONTENT INTRODUCTION BODY OF THE REPORT CONCLUSION APPENDIX BIBLIOGRAPHY GLOSSARY REFERENCE

PAGE NO

INTRODUCTION:
Kerberos is a practical authentication service tool.

Kerberos Requirements: a. Security: opponents should not be able to gain access. b. Reliability (availability): Kerberos server or its substitute should be available all the time. c. Scalability: system should be able to support large amount of users. d. Transparency: Users should see the system as a username/password system.
Socket core concept is vitally used which is one of the end-point of a two-way communication link between two programs running on the network. Socket classes are used to represent the connection between a client program and a server program. The java.net package provides two classes--Socket and Server Socket--that implement the client side of the connection and the server side of the connection. For a Socket connection normally, a server runs on a specific computer and has a socket that is bound to a specific port number. The server just waits, listening to the socket for a client to make a connection request. On the client-side: The client knows the hostname of the machine on which the server is running and the port number to which the server is connected. To make a connection request, the client tries to rendezvous with the server on the server's machine and port.

BODY OF THE REPORT :


In the existing system, the server can allocate the resource and monitor the client activities but cannot control the clients` usage of resources .Hence the client can misuse the allocated resources. Also there is no intimation about allocated memory and the amount used either to the server or client. Here the server does not have any control over the resources after the client has gained access to the resources .So there may be chance for improper usage of the resources. In Intranet the memory management has not been introduced

due to the complexity involved in authentication of users and implementation in granting the privileges .Hence this project emphasizes upon introducing the memory management concept in intranet to the authenticated users. To overcome the difficulties of the existing system this proposed project-Memory Allocation at the Client Using Kerberos introduces the authentication and memory management service in the intranet .the prime motive is the memory management that efficiently maintain the memory resources particularly in a network campus and to provide suitable authentication to the clients. The project is designed to work in large network areas and administer the memory usage from the server side. The user is first allowed to register himself at the client side. The Server authenticates indirectly every client who login to the network .Also for each system, the administrator allocates startup-memory thereby overcoming the misuse of memory resource by the client. This project concentrates on providing access to authorized users as well as managing the use of resource by the client in a user-friendly manner .The simulator at the client monitors each and every operation of the client .If the client exceeds the allocated memory, he can send request to the server stating a valid reason .The Administrator at the server validates the client request and may decide to extend the memory or deny the request. The Memory status option of the simulator enables the client to view his current usage statistics

SYSTEM SPECIFICATION :
SOFTWARE CONFIGURATION:OPERATING SYSTEM : WINDOWS XP PLATFORM : VISUAL STUDIO .NET 2005 LANGUAGES : JAVA.NET

HARDWARE CONFIGURATION:SYSTEM HARD DISK MONITOR MOUSE RAM KEYBOARD : : : : : : Pentium IV 160 GB 15 VGA colour monitor Logitech. 512 MB 110 keys enhanced.

CONCLUSION :
It is concluded that the application works well and satisfy the end users. The application is tested very well and errors are properly debugged. The application is simultaneously accessed from more than one system. Simultaneous login from more than one place is tested. Further enhancements can be made to the application, so that the application functions very attractive and useful manner than the present one. The speed of the transactions become more enough now.

APPENDIX :

1. 2. 3. 4.

Server-Admin Module. Authentication Module. Client-Server Communication Module. Resource Usage Statistics Module.

BIBLIOGRAPHY :
1. Microsoft Visual Basic.NET Programmers Cook Book: MACDONALD 2. Grey Buczek, .NET developers guide 2002, Prentice-Hall India. 3. Benolt Marchal, VB.NET by example 2003 TataMcGraw- Hill. 4. System Analysis & Design Alenis Leon. 5. An Integral approach to software engineering Pankaj Jalole. -MATTHEW

REFERENCES :
BOOKS: 1)Alistair McMonnies, object-oriented programming in Visual Basic.NET, Pearson Education, and ISBN:81-297-0649-0. First Indian Reprint 2004. 2)Jittery R.Shapiro, The Complete Reference Visual Basic.NET Edition 2002, Tata McGraw-Hill, Publishing Company Limited, New Delhi. 3)Robert K.Schneider, Jettey R.Garbus, Optimizing SQL Server, Second Edition, Pearson Education Asia, ISBN:981-4035-20-3 WEBSITES: http://www.microsoft.com/dotnet/visual basic http://www.dotnetheaven.com, http://www.w3schools.com

Exp no: 3 Date:

Topic: Write job application letter for the post of senior engineer. COVER LETTER A.V.Arnika Thennangudi Thanjavur. 21st July 2011. The Manager, Human resourse department, Wipro, Chennai-21. Respected Sir, SUB Application for the post of Senior Engineer - reg In response to your advertisement in Times Now dated 15th July 2011. I offer myself as one of the candidates for the post of a senior engineer in your concern. I finished my M.tech an year ago and have been working as a assistant engineer for the last two years. As working condition here are not good, I wish to switch over to a better job. If I get an opportunity to join your esteemed concern, I shall leave no stone unturned to prove myself worthy of my selection. Herewith Im enclosing my certificates and resume. I hope you will pay adequate attention to my request. Yours sincerely, A.V.Arnika RESUME Name : A.V.Arnika Address:Thennangudi Thanjavur Mobile:9941780453 email-id:arnikaa15@gmail.com

OBJECTIVE : To pursue a challenging role as a senior engineer where I can utilize my knowledge for the organizations growth and to be associated with a progressive organization which can provide me with a dynamic work sphere to extract my inherent skills as a Professional in the current industry.

ACADEMIC QUALIFICATION : ACADEMIC QUALIFICATIONS Degree University/Board Year of passing Percentage M.Tech Anna university 2006 89% B.E Anna university 2004 90% H.S.C State Board 2000 88%

A.S.L.C

Anglo-Indian

1998

89%

TECHNICAL SKILLS : SKILLS TECHNICAL SKILLS Programming Languages Back End Tools Front End Tools Applications Operating Systems C, C++, JAVA MS Access Visual Basic Maya DOS, Windows,Linux,Ubunta

PERSONAL SKILLS Problem solving ability and deal with people diplomatically. Effective communication and positive thinking.

OTHER QUALIFICATION : Completed One-week Industrial Training to HVF Training Institute,Avadi Completed Training in MTJT(JAVA) AREA OF INTEREST : C, C++, OOPS Concept,JAVA WORKSHOP ATTENDED: Workshop based on Embedded System. Workshop based on Soft Skills. TRAINING UNDERGONE: Six months (mini project) training in Heavy Vehicle Factory ACHIEVEMENTS: I won a cash award in national level speech competition. Organised a cultural event during academics.

EXPERIENCE: One year experience as a project lead in TCS.


Two years experience as assistant engineer in TATA Motors

PERSONAL DETAILS:
Name Fathers Name Date of Birth Gender Nationality Religion Languages Known Permanent address Contact no : A.V.Arnika : A.Vedhamoorthy : 15.01.1992 : FEMALE : INDIAN : HINDU : ENGLISH, TAMIL, : Thennangudi Thanjavur. : 9941780453

Ex.no:4 Date:

Non-Technical Presentation

Topic:INTERPERSONAL SKILLS INTERPERSONAL SKILLS: Interpersonal skills are the skills that a person uses to interact with other people. Interpersonal skills are sometimes also referred to as people skills or communication skills. The skills used by a person to properly interact with others. interpersonal comes from Latin, prefix inter-,meaning between, and the world persona, meaning person. The term interpersonal skills is used often in business contexts to refer as an employees ability to get along with others. To measure the persons ability to operate within business organizations through social communication and interactions. Interpersonal skills include everything from communication and listening skills to attitude and deportment.

LIST OF INTERPERSONAL SKILLS: 1. Look:People give us a wealth of information as we engage in an interpersonal encounter. Looking for all the information requires skill. Eyes, hair, facial expressions, dress, and body language give us important information about an individual. Developing the skills to consistently look for this information is valuable as you enter the communication process. 2. Listen:It seems simple, but few of us do it well. Listening skills provide critical information. Hearing an individual's message completely is critical. Missing one small piece may change your perception of the message completely. As we listen to the message, we are offered even more information about an individual. Voice inflections, tone, and volume provide additional information required for effective interpersonal communication. 3. Ask:Asking open ended questions must be on this list of skills. Utilizing every opportunity to extract even more information about an individual helps you identify potential value quickly. The more efficient you become at extracting information, the less time it takes you to effectivelycommunicate and identify potential value in a relationship. Utilizing this skill creates efficiency in your interpersonal experiences. 4. Learn:Developing the first three skills creates the need for another. Effectively looking, listening, and asking will generate a large amount of information in a short period of time. Processing the information quickly and learning efficiently from it is not easy. Learning skills allow you to use all of the information available to you. 5. Understand:Once the information gathered is processed and learned. That information must be applied to the individual you are engaged with. Generating a complete understanding of the individual will create a more efficient interpersonal

process. Understanding the individual's mood, emotional state, feelings, and demeanor will allow you to present your message effectively to the individual's current state. Think of it as using the list of skills above to create a "snap shot" if the individual during your interpersonal experience. 6. Acknowledge:Understanding the individual is critical to acknowledge their needs. Acknowledging a person's needs are an important part of the interpersonal communication process. It is also necessary to develop successful interpersonal relationships. We all have needs; using your skills to acknowledge other's needs make you more effective in your interpersonal experiences. 7. Identify:Identifying value is critical to your interpersonal experiences. Once the information is gathered, processed, and needs acknowledged, you can begin to see where you can provide value. You can also now see if there is opportunity for the individual to bring value to you. Using your skills to identify value allows you to maneuver through the communication process effectively as you know what is valuable to you and to the individual engaged with. It also enables you to see the potential opportunity in relationships. 8. Commit:Commitment is an important interpersonal skill. Utilizing your interpersonal skills requires time and effort. Only by making a commitment to effective interpersonal communication will you achieve results. An individual may have many relationships. Only by committing to develop your interpersonal relations will you receive the value you have identified. Commitment is value to all of us. When you give it, you will receive value from your interpersonal experiences. 9. Contribute:To receive value, you must contribute. Successful relationships are mutually beneficial. Identifying potential value allows you to spend your time and efforts in the relationships you feel will bring the most value. Only by contributing value to your relationships will you see long termsuccess. Relationships quickly dissipate if only one party is contributing. Thecommunication process will quickly break down if all individuals are not actively contributing to the process. 10. Follow Up:Seems simple, but this is hard to find. The ability to actually do what you say you are going to do a valuable skill. If you say it, do it! It seems so simple, but it is extremely hard to find these days. Something so simple that builds so much trust in a relationship. Following up adds value to the communication process. If an individual trusts you, they will listen to you as they know you will do what you are communicating.

WAYS FOR IMPROVING INTERPERSONAL SKILLS Smile. Few people want to be around someone who is always down in the dumps. Do your best to be friendly and upbeat with your coworkers. Maintain a positive, cheerful,attitude about work and about life. Smile often. The positive energy you radiate will draw others to you.

Be appreciative. Find one positive thing about everyone you work with and let them hear it. Be generous with praise and kind words of encouragement. Say thank you when someone helps you. Make colleagues feel welcome when they call or stop by your office. If you let others know that they are appreciated, theyll want to give you their best. Pay attention to others. Observe whats going on in other peoples lives. Acknowledge their happy milestones, and express concern and sympathy for difficult situations such as an illness or death. Make eye contact and address people by their first names. Ask others for their opinions. Practice active listening. To actively listen is to demonstrate that you intend to hear and understand anothers point of view. It means restating, in your own words, what the other person has said. In this way, you know that you understood their meaning and they know that your responses are more than lip service. Your coworkers will appreciate knowing that you really do listen to what they have to say. Bring people together. Create an environment that encourages others to work together. Treat everyone equally, and don't play favorites. Avoid talking about others behind their backs. Follow up on other people's suggestions or requests. When you make a statement or announcement, check to see that you have been understood. If folks see you as someone solid and fair, they will grow to trust you. Resolve conflicts. Take a step beyond simply bringing people together, and become someone who resolves conflicts when they arise. Learn how to be an effective mediator. If coworkers bicker over personal or professional disagreements, arrange to sit down with both parties and help sort out their differences. By taking on such a leadership role, you will garner respect and admiration from those around you. Communicate clearly. Pay close attention to both what you say and how you say it. A clear and effective communicator avoids misunderstandings with coworkers, collegues, and associates. Verbal eloquence projects an image of intelligence and maturity, no matter what your age. If you tend to blurt out anything that comes to mind, people wont put much weight on your words or opinions. Humor them. Dont be afraid to be funny or clever. Most people are drawn to a person that can make them laugh. Use your sense of humor as an effective tool to lower barriers and gain peoples affection. See it from their side. Empathy means being able to put yourself in someone elses shoes and understand how they feel. Try to view situations and responses from another persons perspective. This can be accomplished through staying in touch with your own emotions; those who are cut off from their own feelings are often unable to empathize with others. Don't complain. There is nothing worse than a chronic complainer or whiner. If you simply have to vent about something, save it for your diary. If you must verbalize your grievances, vent to your personal friends and family, and keep it short. Spare those around you, or else youll get a bad reputation.

Ex.no:5 Date:

Technical Presentation

Topic:USER DATAGRAM PROTOCOL: USER DATAGRAM PROTOCOL: The User Datagram Protocol (UDP) is one of the core members of the Internet Protocol Suite, the set of network protocols used for the Internet. With UDP, computer applications can send messages, in this case referred to as datagrams, to other hosts on an Internet Protocol (IP) network without requiring prior communications to set up special transmission channels or data paths. The protocol was designed by David P. Reed in 1980 and formally defined in RFC 768. UDP uses a simple transmission model without implicit handshaking dialogues for providing reliability, ordering, or data integrity. Thus, UDP provides an unreliable service and datagrams may arrive out of order, appear duplicated, or go missing without notice. UDP assumes that error checking and correction is either not necessary or performed in the application, avoiding the overhead of such processing at the network interface level. Time-sensitive applications often use UDP because dropping packets is preferable to waiting for delayed packets, which may not be an option in a real-time system.If error correction facilities are needed at the network interface level, an application may use the Transmission Control Protocol (TCP) or Stream Control Transmission Protocol (SCTP) which are designed for this purpose. UDP's stateless nature is also useful for servers answering small queries from huge numbers of clients. Unlike TCP, UDP supports packet broadcast (sending to all on local network) and multicasting (send to all subscribers). Common network applications that use UDP include: the Domain Name System (DNS),streaming media applications such as IPTV, Voice over IP (VoIP), Trivial File Transfer Protocol (TFTP), IP tunneling protocols and many online games. UDP applications use datagram sockets to establish host-to-host communications. An application binds a socket to its endpoint of data transmission, which is a combination of an IP address and a service port. A port is a software structure that is identified by the port number, a 16 bit integer value, allowing for port numbers between 0 and 65535. Port 0 is reserved, but is a permissible source port value if the sending process does not expect messages in response. The Internet Assigned Numbers Authority has divided port numbers into three ranges. Port numbers 0 through 1023 are used for common, well-known services. On Unixlike operating systems, using one of these ports requires superuser operating permission. Port numbers 1024 through 49151 are the registered ports used for IANAregistered services. Ports 49152 through 65535 are dynamic ports that are not officially designated for any specific service, and can be used for any purpose. They are also used as ephemeral ports, from which software running on the host may randomly choose a port in order to define itself.In effect, they are used as temporary ports primarily by clients when communicating with servers.UDP provides no guarantees to the upper layer protocol for message delivery and the UDP protocol layer retains no state of UDP messages once sent. For this reason, UDP is sometimes

The UDP header consists of 4 fields, each of which is 2 bytes (16 bits). The use of two of those is optional in IPv4 (pink background in table). In IPv6 only the source port is optional (see below). Source port number This field identifies the sender's port when meaningful and should be assumed to be the port to reply to if needed. If not used, then it should be zero. If the source host is the client, the port number is likely to be an ephemeral port number. If the source host is the server, the port number is likely to be a well-known port number. Destination port number This field identifies the receiver's port and is required. Similar to source port number, if the client is the destination host then the port number will likely be an ephemeral port number and if the destination host is the server then the port number will likely be a well-known port number. Length A field that specifies the length in bytes of the entire datagram: header and data. The minimum length is 8 bytes since that's the length of the header. The field size sets a theoretical limit of 65,535 bytes (8 byte header + 65,527 bytes of data) for a UDP datagram. The practical limit for the data length which is imposed by the underlying IPv4 protocol is 65,507 bytes (65,535 8 byte UDP header 20 byte IP header). Checksum The checksum field is used for error-checking of the header and data. If no checksum is generated by the transmitter, the field uses the value all-zeros. This field is not optional for IPv6. Reliability and congestion control solutions Lacking reliability, UDP applications must generally be willing to accept some loss, errors or duplication. Some applications such as TFTP may add rudimentary reliability mechanisms into the application layer as needed. Most often, UDP applications do not employ reliability mechanisms and may even be hindered by them. Streaming media, real-time multiplayer games and voice over IP (VoIP) are examples of applications that often use UDP. In these particular applications loss of packets are not usually a fatal problem. If an application requires a high degree of reliability, a protocol such as the Transmission Control Protocol or erasure codes may be used instead. Potentially more seriously, unlike TCP, UDP based applications don't necessarily have good congestion avoidance and control mechanisms. Congestion insensitive UDP applications that consume a large fraction of available bandwidth could endanger the stability of the internet, as they frequently give a bandwidth load that is inelastic. Network-based mechanisms have been proposed to minimize potential congestion collapse effects of uncontrolled, high rate UDP traffic loads. Network-based elements such as routers using packet queuing and dropping techniques are often the only tool available to slow down excessive UDP traffic. The Datagram Congestion Control Protocol (DCCP) is being designed as a partial solution to this potential problem by adding end host TCP-friendly congestion control behavior to high-rate UDP streams such as streaming media.

Applications Numerous key Internet applications use UDP, including: the Domain Name System (DNS), where queries must be fast and only consist of a single request followed by a single reply packet, the Simple Network Management Protocol (SNMP), the Routing Information Protocol (RIP)and the Dynamic Host Configuration Protocol (DHCP). Voice and video traffic is generally transmitted using UDP. Real-time video and audio streaming protocols are designed to handle occasional lost packets, so only slight degradation in quality occurs, rather than large delays if lost packets were retransmitted. Because both TCP and UDP run over the same network, many businesses are finding that a recent increase in UDP traffic from these real-time applications is hindering the performance of applications using TCP, such as point of sale, accounting, and database systems. When TCP detects packet loss, it will throttle back its data rate usage. Since both real-time and business applications are important to businesses, developing quality of service solutions is seen as crucial by some.

Comparison of UDP and TCP Transmission Control Protocol is a connection-oriented protocol, which means that it requires handshaking to set up end-to-end communications. Once a connection is set up user data may be sent bi-directionally over the connection.

Reliable TCP manages message acknowledgment, retransmission and timeout. Multiple attempts to deliver the message are made. If it gets lost along the way, the server will re-request the lost part. In TCP, there's either no missing data, or, in case of multiple timeouts, the connection is dropped. Ordered if two messages are sent over a connection in sequence, the first message will reach the receiving application first. When data segments arrive in the wrong order, TCP buffers the out-of-order data until all data can be properly re-ordered and delivered to the application. Heavyweight TCP requires three packets to set up a socket connection, before any user data can be sent. TCP handles reliability and congestion control. Streaming Data is read as a byte stream, no distinguishing indications are transmitted to signal message (segment) boundaries. UDP is a simpler message-based connectionless protocol. Connectionless protocols do not set up a dedicated end-to-end connection. Communication is chieved by transmitting information in one direction from source to destination without verifying the readiness or state of the receiver. Unreliable When a message is sent, it cannot be known if it will reach its destination; it could get lost along the way. There is no concept of acknowledgment, retransmission or timeout. Not ordered If two messages are sent to the same recipient, the order in which they arrive cannot be predicted. Lightweight There is no ordering of messages, no tracking connections, etc. It is a small transport layer designed on top of IP. Datagrams Packets are sent individually and are checked for integrity only if they arrive. Packets have definite boundaries which are honored uporeceipt,

EXNO:8 DATE:

COMMON ERRORS IN ENGLISH

1. I ride the bus every morning. My sister never (ride) the bus. Ans: I ride the bus every morning. My sister never rides the bus. 2.This old watch keeps perfect time. I (keep) it on a silver chain. Ans: This old watch keeps perfect time. I keep it on a silver chain. 3.Veronica seldom visits her mother. In fact, she never wants to (visit) anyone. Ans Veronica seldom visits her mother. In fact, she never wants to visit anyone. 4.Your excuse sounds familiar. It (sound) like the one you gave last week. Ans Your excuse sounds familiar. It sounds like the one you gave last week. 5.Both Charlie and Hurley enjoy music. Charlie also (enjoy) playing guitar. Ans Both Charlie and Hurley enjoy music. Charlie alsoenjoys playing guitar. 6.Edna lives by herself next door. Simon and Peter (live) downstairs. Ans Edna lives by herself next door. Simon and Peterlive downstairs. 7.I refuse to apologize to Leonard. He (refuse) to speak to me. Ans I refuse to apologize to Leonard. He refuses to speak to me. 8.Gus and Merdine sing in the church choir. Unfortunately, they (sing) out of key. Ans Gus and Merdine sing in the church choir. Unfortunately, they sing out of key. 9.This machine sorts the mail. It (sort) envelopes according to size and weight. Ans This machine sorts the mail. It sorts envelopes according to size and weight. 10.The BP station closes at midnight. The other stations never (close). Ans The BP station closes at midnight. The other stations never close.

Das könnte Ihnen auch gefallen