Of the following characteristics, which apply to UDP?
Answers were Sorted based on User's Feedback
Answer / jitendera sinha
Lightweight - No ordering of messages, no tracking connections, etc. It's just fire and forget! This means it's a lot quicker, and the network card / OS have to do very little work to translate the data back from the packet
|Is This Answer Correct ?||2 Yes||1 No|
Answer / pachicoo
Comparison of UDP and TCP (Transport Layer)
Transmission Control Protocol is a connection-oriented
protocol, which means that it requires handshaking to set
up end-to-end communications. Once a connection is set up
user data may be sent bi-directionally over the connection.
Reliable – TCP manages message acknowledgment,
retransmission and timeout. Many attempts to reliably
deliver the message are made. If it gets lost along the
way, the server will re-request the lost part. In TCP,
there's either no missing data, or, in case of multiple
timeouts, the connection is dropped.
Ordered – if two messages are sent over a connection in
sequence, the first message will reach the receiving
application first. When data segments arrive in the wrong
order, TCP buffers the out-of-order data until all data can
be properly re-ordered and delivered to the application.
Heavyweight – TCP requires three packets to set up a socket
connection, before any user data can be sent. TCP handles
reliability and congestion control.
Streaming – Data is read as a byte stream, no
distinguishing indications are transmitted to signal
message (segment) boundaries.
UDP is a simpler message-based connectionless protocol.
Connectionless protocols do not set up a dedicated end-to-
end connection. Communication is achieved by transmitting
information in one direction from source to destination
without verifying the readiness or state of the receiver.
Unreliable – When a message is sent, it cannot be known if
it will reach its destination; it could get lost along the
way. There is no concept of acknowledgment, retransmission
Not ordered – If two messages are sent to the same
recipient, the order in which they arrive cannot be
Lightweight – There is no ordering of messages, no tracking
connections, etc. It is a small transport layer designed on
top of IP.
Datagrams – Packets are sent individually and are checked
for integrity only if they arrive. Packets have definite
boundaries which are honored upon receipt, meaning a read
operation at the receiver socket will yield an entire
message as it was originally sent.
|Is This Answer Correct ?||0 Yes||0 No|
Answer / s.m.feroz ahmed
|Is This Answer Correct ?||0 Yes||0 No|
Answer / n.s.k.reddy
|Is This Answer Correct ?||1 Yes||2 No|
Answer / shushanta
|Is This Answer Correct ?||0 Yes||1 No|
what is difference between hub and router.....
How many ports are present in a router?
Explain the difference between bus topology and hub?
Can yo define LNS
What are the disadvantages of symmetric algorithms?
Which of the following statements are true? A.) Store and forward switching creates variable latency through the switch B.) Cut through switching creates variables latency through the switch C.) Cut through switching works at wire speed D.) Store and forward switching works at wire speed
3. What does a bridge use to segment a network? A. IP Addresses B. Broadcasts C. Application data D. Media Access Control addresses
Which of the following protocols are used for logical network addressing? A.) IP B.) TCP C.) ARP D.) ICMP E.) RARP F.) BootP
Identify the correct pair of Novell Ethernet encapsulation and Cisco terminology? A.) Ethernet II, Snap B.) Ethernet 802.3, Novell-Ether C.) Ethernet SNAP, Arpa D.) Ethernet 802.2, Snap
which is following route will be used to froword data in a situation where a routing table tables contains static ,RIP,IGRP routes destined to the same network with each set to its default administrative distance
What are 10base2, 10base5 and 10baset ethernet lans?
what is firwall and how to work right now my company having a cisco firwall ASA 5505.So please how to block some site on that which form user not able to access site and basic firwall config and why are we using firwall please jittendra explain it.can u send me doc of firwall in my gmail id - email@example.com