Udp communication semantics, Computer Network Security

 

UDP COMMUNICATION SEMANTICS:

 UDP needs IP for all delivery, that is, similar best effort delivery as IP. To use UDP, an application have to either be immune to the causes or programmer must take additional steps to check and correct problems.

EXAMPLES:

  • Audio transmission
  • On-line shopping application

 

Posted Date: 8/1/2012 9:44:44 AM | Location : United States







Related Discussions:- Udp communication semantics, Assignment Help, Ask Question on Udp communication semantics, Get Answer, Expert's Help, Udp communication semantics Discussions

Write discussion on Udp communication semantics
Your posts are moderated
Related Questions
QUESTION (a) Hashing and salting is commonly used as password storage techniques for most applications. Describe how hashing and salting enable secure storage of password (b

In Star topology all computers are connected using a central device known as hub. Star networks are one of the most general computer network topologies. In its simplest way, a

Hybrid Cryptography Systems This makes use of different cryptography systems. Except digital certificates, pure asymmetric key encryption is not used extensively. Asymmetric enc

What do you understand by the term encryption? Also describe the public key cryptography Encryption: Encryption is a method of converting plain text into cipher text. Using thi

An injunction to 'think ethically' about a situation is not helpful. Perhaps if one has a background in moral philosophy this would work, but usually both students and IT professio

what are the participant of marketing channal?

ADDRESS MASKS To identify receiver, network apply address mask to receiver address and calculate to network address in routing table. It can use Boolean 'and' to calculate the

Question: (a) What are the various options to mitigate risks in an Information Security Management System (ISMS)? For each option specify an instance where it can be used.

NEED FOR SECURITY Primary mission of information security to ensure that the systems and contents stay the same If no threats, could focus on improving the systems, resulting in

For simplicity, each character is regarded as one data packet, which means that the data in each packet should have the max length of only 1 byte. Your own packet header (not th