Which protocol should be used udp or tcp

Assignment Help Basic Computer Science
Reference no: EM131308544

1. UDP is a message-oriented protocol. TCP is a byte-oriented protocol. If an application needs to protect the boundaries of its message, which protocol should be used, UDP or TCP?

2. Assume a private internet, which uses point-to-point communication between the hosts and needs no routing, has totally eliminated the use of the network layer. Can this internet still benefit from the services of UDP or TCP? In other words, can user datagrams or segments be encapsulated in the Ethernet frames?

Reference no: EM131308544

Questions Cloud

Explain why both parties might be liable : L203:Assume that all of the plaintiffs listed in Question 2 above sue both of the defendants in Question 3 above. Also assume the jury finds that both parties are responsible and awards a large judgment to the plaintiffs. If the court does not spe..
What was the amount of the costs incurred by the firm : ACE, Inc. incurred depreciation expenses of $21,900 last year. The sales were $811,400 and the addition to retained earnings was $14,680. The firm paid interest of $9,700 and dividends of $10,100. The tax rate was 40 percent. What was the amount of t..
How can the computer find which transport layer is involved : Some of the application programs can use the services of two transport-layer protocols (UDP or TCP). When a packet arrives at the destination, how can the computer find which transport layer is involved?
What is average investment in accounts receivable : ABC’s credit terms are 1/6, net 35. Based on experience, 33 percent of all customers take the discount. ABC has annual credit sales of $177,457. What is the average investment in accounts receivable as shown on the balance sheet?
Which protocol should be used udp or tcp : UDP is a message-oriented protocol. TCP is a byte-oriented protocol. If an application needs to protect the boundaries of its message, which protocol should be used, UDP or TCP?
What are key variables for evaluating credit policy changes : What are the key variables for evaluating credit policy changes, according to credit managers? Are managers able to estimate the values for these variables adequately? Compare and contrast the incremental profit and NPV approaches to evaluating credi..
First transaction and then after the second transaction : The Western Pipe Company has the following capital section in its balance sheet. Its stock is currently selling for $6 per share. The firm intends to first declare a 15 percent stock dividend and then pay a 5 cent cash dividend (which is also caused ..
Why we need 4 segments for connection termination in tcp : In TCP, some segment types can be used only for control; they cannot be used to carry data at the same time. Can you define some of these segments?
Advantages and disadvantages of advertising public relations : Part A  what are the advantages and disadvantages of advertising public relations personal selling and sales promotions from the perspective of a small independent retailer?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Waiting list exists for right to purchase season tickets

Philadelphia Flyers games are frequently sold out, and a waiting list exists for the right to purchase season tickets. What would be the welfare effects of a $1 tax on tickets? Explain

  How much time does it take to find the solution

sequential search of the tree is performed using the standard depth-first search (DFS) algorithm (Section 11.2.1), how much time does it take to find the solution if traversing each arc of the tree takes one unit of time?

  List the levels of transformation and name for each level

The levels of transformation in Figure 1.6 are often referred to as levels of abstraction. Is that a reasonable characterization? If yes, give an example. If no, why not?

  The commonly used password management protocol

Analyze one of the commonly used password management protocol  what is the weakness of this protocol?

  Assignment on computer memory hacking

Describe what hacking of memory or hacking of RAM means. Examine the common tools that hackers use to hack into memory of computing devices. Detail two (2) real-life examples of such tools in action.

  How much longer it takes to byte-swap integers

Using both your own htonl and (if little-endian hardware is available) the standard library version, run appropriate experiments to determine how much longer it takes to byte-swap integers versus merely copying them.

  Why does the label control that contains your name print

why does the label control that contains your name print above the page number?

  Determine the required surface area of steam condensation

Water enters at 0.5 kg/s and 15°C and exits the exchanger at 48°C. Determine the required surface area and the rate of steam condensation.

  What are the arguments for and against brainstorming

What are the arguments for and against brainstorming? If you were Joseph Keith, would you vote for or against the continuation of the brainstorming sessions?

  Alternative ways to model section

Distinguishes one section from another for the same course but does not uniquely identify a section. How did you model SECTION? Why did you chose this way versus alternative ways to model SECTION?

  Seven step and four step sdlc models

Compare and contrast seven step and four step SDLC models?

  Write a c program to use the rti to time-multiplex

Set up the interrupt vectors for the enhanced capture timer Ch1, enhanced capture timer Ch0, RTI, and IRQ to work with the CodeWarrior IDE by modifying the vectors.c file given in Example 6.5.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd