Tcp and udp, Computer Network Security

TCP and UDP

End-to-end delivery application is connection less. The basic function of connectionless service are as given:

It adds extension of LAN abstraction. It has simple addressing and the data is transmitted in packets, each packet with a header. It adds collection of physical networks into a single virtual network.

 

 Transport function use this connectionless service to give:

  • Connectionless data delivery (UDP)
  • Connection-oriented data delivery (TCP)

 

Posted Date: 8/1/2012 7:51:53 AM | Location : United States







Related Discussions:- Tcp and udp, Assignment Help, Ask Question on Tcp and udp, Get Answer, Expert's Help, Tcp and udp Discussions

Write discussion on Tcp and udp
Your posts are moderated
Related Questions
Question a) From the capture below: Give the datagram source IP address, upper layer protocol, Total length in decimal and header checksum in hexadecimal; the segment source po

Data Classification and Management Corporate and military organizations use a several of classification schemes. Information owners are responsible for classifying information a

PARITY BIT: A parity bit is an extra bit transmitted with data item select to give the resulting bit odd or even parity. For example an even parity data packet 10100001 has p

Question 1:  Describe the functioning of cloud computing. Question 2: Discuss on "Platform as a Service". Question 3: Discuss the steps involved in effective co

define .

Example 3: Logic bombs In the year 2000, Timothy Lloyd was found responsible of causing $10 million and $12 million of damage to Omega Engineering, an American company specializ

Attacker's Motives behind the Cyber Attack Before adapting the necessary measures to deal with the problem, understanding and evaluating the blogger's psyche and his motivation

Question: (a) What is the main security vulnerability of IPv4? (b) Which protocol can be used for secure remote login? (c) Distinguish between the transport and tunnel

Problem: (a) What is a firewall and which are its most important tasks? (b) What is the difference between default deny and default permit? Which advantages and disadvanta

Question: a) Name a method to allow a person to send a confidential email to another person, without risks of a third-party reading the email. Describe briefly the operations