Udp communication semantics, Computer Network Security

 

UDP COMMUNICATION SEMANTICS:

 UDP needs IP for all delivery, that is, similar best effort delivery as IP. To use UDP, an application have to either be immune to the causes or programmer must take additional steps to check and correct problems.

EXAMPLES:

  • Audio transmission
  • On-line shopping application

 

Posted Date: 8/1/2012 9:44:44 AM | Location : United States







Related Discussions:- Udp communication semantics, Assignment Help, Ask Question on Udp communication semantics, Get Answer, Expert's Help, Udp communication semantics Discussions

Write discussion on Udp communication semantics
Your posts are moderated
Related Questions
Question 1: (a) With the help of a diagram show the basic structure of a computer system. (b) Explain as fully as you can each of the parts mentioned above. (c) What are

Question: (a) What do you understand by the term "integrity"? (b) Which type of attack denies authorized users access to network resources? (c) You have discovered tha

PACKET SNIFFERS A packet network protocol analyzer is a network tool which collects copies of packets from network and analyzes them. It can give network administrator with valu


Network Virtual Terminal It is a set of principles describing a very simple virtual terminal interaction. The NVT is needed in the start of a Telnet session. Communication wit

You are designing a Demilitarized zone for a large corporation. Using design best practice, and the information that you have learned so far, propose a design that will provide the

#questioAn elliptic curve y^2=x^3+ax+b(mod29) includes points P=(7, 15) and Q=(16, 13) a)Determine the equation of the crve b) Determine all values of x for which there is no point

how can i start thesis? Please mention so of examples?

(a) Draw the waveform for an asynchronous transmission with the given specifications: 8 data bits with value 11010001 (LSB listed first here), one parity bit (even), one star

Question: a) Give two reasons why the building-block approach is favoured to the traditional network design approach. b) With reference to network monitoring parameters, dis