User datagram protocol, Computer Networking

A UDP header does not have Sequence number and Acknowledgement number fields. Is it an advantage or a disadvantage? Explain your answer in detail.

User Datagram Protocol

The unreliable and connectionless transport protocol is known as User Datagram Protocol. It is a lower version of TCP that's why it has far less latency rate than TCP and UDP does not provide Flow control, sequencing and acknowledgement of sending data but it provides error checking facility by using Checksum.

So we can say that as the UDP does not have Sequence number and Acknowledgement number it does not provide reliable service and no surety of sending data as this Sequence number and Acknowledgement number is used to initialize session while sending data from source to destination.   

 

 

Posted Date: 7/10/2012 8:35:26 AM | Location : United States







Related Discussions:- User datagram protocol, Assignment Help, Ask Question on User datagram protocol, Get Answer, Expert's Help, User datagram protocol Discussions

Write discussion on User datagram protocol
Your posts are moderated
Related Questions
Work-Sharing Constructs A work-sharing construct distributes the implementation of the associated region between the members of the team that encounters it. A work-sharing cons

Q. What do you mean by Addressing? Addressing Require to uniquely and universally identify every device to allow global communication Internet address or IP address is us

Question: a) In a wireless network where WEP is enforced as security mechanism, what procedure would the network manager adopt for changing WEP default keys. b) Using Pla

Assuming that TCP Reno is used, consider the following diagram illustrating the behaviour of congestion window, and answer the questions below. a)  What was the value of sl

What is the difference between a JDK and a JVM? JDK is Java Development Kit which is for development purpose and it contains execution environment also. But JVM is purely a


There is a many-to-one relationship among clients and server. Clients always start the dialog by requesting a service. Servers are passively awaiting for requests from clients.

State the methods to keep the attackers at bay Another best methods to keep the attackers at bay is known as network address translator or NAT. The philosophy behind the design

Q. Error Detection-General? Sender transmits every data unit twice Receiver performs bit-by-bit comparison between those two versions of data. Any mismatch would