Tcp and udp, Computer Network Security

TCP and UDP

End-to-end delivery application is connection less. The basic function of connectionless service are as given:

It adds extension of LAN abstraction. It has simple addressing and the data is transmitted in packets, each packet with a header. It adds collection of physical networks into a single virtual network.

 

 Transport function use this connectionless service to give:

  • Connectionless data delivery (UDP)
  • Connection-oriented data delivery (TCP)

 

Posted Date: 8/1/2012 7:51:53 AM | Location : United States







Related Discussions:- Tcp and udp, Assignment Help, Ask Question on Tcp and udp, Get Answer, Expert's Help, Tcp and udp Discussions

Write discussion on Tcp and udp
Your posts are moderated
Related Questions
Consider the following case study: In order to avoid criticisms of their existing manned road-toll payment system on its private road, WS-Pass has decided to adopt an automated

TCP-RELIABLE TRANSPORT SERVICE INTRODUCTION:  TCP is the major transport protocol architecture in the TCP/IP suite. It uses unreliable datagram function offered by IP whe

The Security Systems Development Life Cycle (SecSDLC) The same phases which is used in traditional SDLC can be adapted to support specialized implementation of IS project,At its

how can i start thesis? Please mention so of examples?

Question 1 a) Explain how CSMA/CD works. b) Describe the term "exponential back-off". c) Describe the differences between "circuit switching" and "packet switching". d) Th

IPV6 DATAGRAM FORMAT It is given in the figure below:

Short term Scheduler function , also shown as a dispatcher runs most frequently, and creates the finest-grained decision of which program could run next. This scheduler is called

Consider a computer system with three users: Alice, Bob and Cindy. Alice owns the file alicerc, and Bob and Cindy can read it. Cindy can read and write the file bobrc, which Bob ow

You are provided with 3000 sample keystrokes for 5 users mentioned above. You can find this data using the ‘Lab 2 User Data' link in the ‘Lab 2' folder on Blackboard. Please note t

Question : Wi-Fi protected access (WPA) was specified by the Wi-Fi alliance with the primary aim of enhancing the security of existing 802.11 networks. However, WPA was only a