Tcp and udp, Computer Network Security

TCP and UDP

End-to-end delivery application is connection less. The basic function of connectionless service are as given:

It adds extension of LAN abstraction. It has simple addressing and the data is transmitted in packets, each packet with a header. It adds collection of physical networks into a single virtual network.

 

 Transport function use this connectionless service to give:

  • Connectionless data delivery (UDP)
  • Connection-oriented data delivery (TCP)

 

Posted Date: 8/1/2012 7:51:53 AM | Location : United States







Related Discussions:- Tcp and udp, Assignment Help, Ask Question on Tcp and udp, Get Answer, Expert's Help, Tcp and udp Discussions

Write discussion on Tcp and udp
Your posts are moderated
Related Questions
Types of IDSs and Detection Methods IDSs operate as network based, host based, or application based systems and focused on protecting network information assets. All the IDSs us

Digital Signatures Digital Signatures are encrypted messages which can be proven mathematically to be authentic. These are created in response to rising requirement to verify in

Question 1: (a) Define Artificial Intelligence. (b) Briefly describe the categories for the definition of Artificial Intelligence. (c) Identify the four basic types of

Question (a) Name 3 popular electronic mail access protocols? (b) i. What is DNS? ii. Briefly, describe what it does and how it works? iii. Why does DNS use a dist

In 10 or more pages, address the following topics (be sure to use diagrams as well as references). 1) Define broadband and baseband transmission technology. 2) Describe broadban

Question (a) A CRC is constructed to generate a 4-bit FCS for an 11-bit message. The divisor polynomial is X 4 + X 3 + 1 (i) Encode the data bit sequence 00111011001 using po

There are various benefits related with providing the security. They are given below,  (i)  Confidentiality/ Privacy (ii)  Integrity  (iii) Availability (iv)Authenticatio

Network can be distinguished by shape. According to which there are three most popular methodologies, which are shown as follows; Star Ring Bus

Question: (a) What is the use of digital certificate? (b) What is meant by a hierarchical trust model in a Public Key Infrastructure? How does the Pretty Good Privacy (PG

UDP ENCAPSULATION As given in the figure below, UDP packet is included in IP datagram and the IP datagram is then attached in the Frame.