Explain TCP and UDP features in detail and compare, Basic Computer Science

Assignment Help:
Which applications require TCP and why? Also specify which applications require UDP and why?
A4) TCP is also known as connection-oriented: setup required between client and server processes, reliable transport between sending and receiving process, flow control, congestion control, does not provide timing, minimum throughput guarantees, and security.
UDP Connection-less, unreliable data transfer between sending and receiving process, does not provide connection setup, reliability, flow control, congestion control, timing, throughput guarantee, or security— low overhead. Applications that require TCP are: email, Remote terminal access, web, file transfer, whereas UDP is required by: streaming multimedia, internet telephony.

Related Discussions:- Explain TCP and UDP features in detail and compare

Explain the concept of a transition graph, Question 1 Define the concept o...

Question 1 Define the concept of equivalence relation. Give atleast two examples of equivalence relation Question 2 Prove that a graph G is connected if and only if it has a

About flag instructions, They straightforwardly affect the content of the f...

They straightforwardly affect the content of the flags. CLC CLD CLI CMC STC STD STI CLC INSTRUCTION Reason: To uncontaminated the cartage flag. Syntax: CLC This instruction turning

C LANGUAGE, WHAT DO MEAN BY ALGORITHM,HOW CAN ALGORITHM HELP TO WRITE BETTE...

WHAT DO MEAN BY ALGORITHM,HOW CAN ALGORITHM HELP TO WRITE BETTER COMPUTER PROGRAM ,WRITE AN ALGORITHM IN COMPUTER INTEREST

Fuction to delete a record in phone book in c, function to delete a telepho...

function to delete a telephone book record in c programing using struct and objects...?

How to avoid race conditions with critical section?, • The key to preventi...

• The key to preventing problem involving shared storage is get some way to prohibit more than one process from reading and writing the shared data concurrently. That part of the p

Discrete Math, 3. Let f, g: R?R, where g(x) 1 - x + x2 and f (x)=ax + b. I...

3. Let f, g: R?R, where g(x) 1 - x + x2 and f (x)=ax + b. If (g ? f )(x)= 9x2 - 9x + 3, determine a, b.

Perverse software, Perverse software: Perverse software is a program w...

Perverse software: Perverse software is a program which causes hindrances in other programs execution in such a way resulting in modification or complete destruction of data w

Identify the critical races, 1. The standard way for debuggers to plant bre...

1. The standard way for debuggers to plant breakpoints in a program in RAM (whatever the processor instruction set) is to save the breakpointed instruction and replace it by a jump

Nursing care activity module, Nursing Care Activity Module Retrievi...

Nursing Care Activity Module Retrieving of identification data of patient  Assessment of the patient  - Physical - Mental - Personal - Socio-c

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd