Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
A UDP header does not have Sequence number and Acknowledgement number fields. Is it an advantage or a disadvantage? Explain your answer in detail.
User Datagram Protocol
The unreliable and connectionless transport protocol is known as User Datagram Protocol. It is a lower version of TCP that's why it has far less latency rate than TCP and UDP does not provide Flow control, sequencing and acknowledgement of sending data but it provides error checking facility by using Checksum.
So we can say that as the UDP does not have Sequence number and Acknowledgement number it does not provide reliable service and no surety of sending data as this Sequence number and Acknowledgement number is used to initialize session while sending data from source to destination.
Q. What is Session Layer in osi model? Session Layer : Allows two applications to establish, utilize and disconnect a connection between them known as a session. Gives for na
What is EGP (Exterior Gateway Protocol)? It is the protocol the routers in neighboring autonomous systems use to recognize the set of networks that can be reached within or by
The Five steps to data encapsulation (IN ORDER): 1) User information is changed into data. 2) Data is changed into segments. 3) Segments are changed into datagram and pack
What are the value added services Many organisations are demanding higher services (also called value added services) such as faxing, minimal cost call routing, connectivity to
different framing methods
What is route summarization
Q. Why we use numbering frames? Why numbering frames? Stop--and-wait ARQ, 1. Numbering Frames prevents the retaining of duplicate frames.. 2. Numbered acknowled
Explain the technique- Backpressure This technique produces an effect same to backpressure in fluids flowing down a pipe. It includes link-by-link use of flow control in a dire
Categories to access the Intranet Persons who can find access to the Intranet can be put into three categories. 1. Those who can enter the site 2. Those who can access
Give the Description of security tools Software are coming up in which the user can select the kind of security measure required to be taken for encryption. One such example is
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd