Tcp and udp, Computer Network Security

TCP and UDP

End-to-end delivery application is connection less. The basic function of connectionless service are as given:

It adds extension of LAN abstraction. It has simple addressing and the data is transmitted in packets, each packet with a header. It adds collection of physical networks into a single virtual network.

 

 Transport function use this connectionless service to give:

  • Connectionless data delivery (UDP)
  • Connection-oriented data delivery (TCP)

 

Posted Date: 8/1/2012 7:51:53 AM | Location : United States







Related Discussions:- Tcp and udp, Assignment Help, Ask Question on Tcp and udp, Get Answer, Expert's Help, Tcp and udp Discussions

Write discussion on Tcp and udp
Your posts are moderated
Related Questions
Risk Management Discussion Points Organizations should define level of risk it can live with Risk appetite: it defines quantity and nature of risk which organizations are wil

PACKET SNIFFERS A packet network protocol analyzer is a network tool which collects copies of packets from network and analyzes them. It can give network administrator with valu

Maximum Transmission Unit  (MTU) Each hardware method specification adds the definition of the maximum size of the frame data area, which is known the Maximum Transmission Uni

You are hired as a consultant to help design a digital library in which books are scanned and stored digitally and made available to users of the World Wide Web. Assume that the li

INTRODUCTION TO RISK MANAGEMENT Risk management is the procedure of identifying and controlling risks facing an organization. Risk management is the discipline which is employed

QUESTION (In this question, you will need to use the ISO 27001:2005 and ISO 27002:2005 standards) For each of the situations below, comment on the following: 1. Mention

RING TOPOLOGY In this topology of network the devices are connected to each other in packed loop. In this network first computer passes data packet to the second and then seco

(a) (i) If m = p·q·r where p, q, and r are prime numbers, what is Φ(m)? (ii) Therefore, Determine Φ(440). (b) Describe the following terms as used in cryptography: (i)

Ask You have been asked by a new client to assist in setting up a new computer for her coffee shop. She has just purchased the newest Apple computer from an online site. Should wou

Students were asked about search engine they used.90 of them said they used google chrome,70 used Internet Explorer,40 used Mozilla Firefox,30 used Google Chrome and Internet Explo