Tcp and udp, Computer Network Security


End-to-end delivery application is connection less. The basic function of connectionless service are as given:

It adds extension of LAN abstraction. It has simple addressing and the data is transmitted in packets, each packet with a header. It adds collection of physical networks into a single virtual network.


 Transport function use this connectionless service to give:

  • Connectionless data delivery (UDP)
  • Connection-oriented data delivery (TCP)


Posted Date: 8/1/2012 7:51:53 AM | Location : United States

Related Discussions:- Tcp and udp, Assignment Help, Ask Question on Tcp and udp, Get Answer, Expert's Help, Tcp and udp Discussions

Write discussion on Tcp and udp
Your posts are moderated
Related Questions
Short term Scheduler function , also shown as a dispatcher runs most frequently, and creates the finest-grained decision of which program could run next. This scheduler is called

QUESTION: (a) For the bit stream 010011, sketch the waveforms for each of the code indicated. Assume that the signal level for a space in NRZ-L is positive; the signal level f

Application-Based IDS Application-based IDS (AppIDS) is an advanced version of HIDS. It examines application for abnormal events. The ability to view encrypted data is the uniqu

QUESTION: a) Below is a capture of an Ethernet II frame which has an IPv4 packet and a segment. Provide the source MAC address in hexadecimal; the source IP address, the length

QUESTION (a) Describe the two possible configurations for 3DES (b) What is the main disadvantage of 3DES? (c) Why are most modern symmetric algorithm block ciphers? (d

Question : Wi-Fi protected access (WPA) was specified by the Wi-Fi alliance with the primary aim of enhancing the security of existing 802.11 networks. However, WPA was only a

Proof that the sender forwards the message. It also prohibits the author of the code from falsely denying that he forward the message. This is achieved by record using the exact ti

Explain the architecture of ISDN.....?

Cost Benefit Analysis (CBA) The common approach for information security controls is economic feasibility of implementation. CBA is begun by evaluating the worth of assets which

Evaluations, Assessment, and Maintenance of Risk Controls When the control strategy has been implemented, it should be monitored and measured on an ongoing basis to determine ef