Can this internet still benefit from services of udp or tcp

Assignment Help Basic Computer Science
Reference no: EM131307503

1. UDP is a message-oriented protocol. TCP is a byte-oriented protocol. If an application needs to protect the boundaries of its message, which protocol should be used, UDP or TCP?

2. Assume a private internet, which uses point-to-point communication between the hosts and needs no routing, has totally eliminated the use of the network layer. Can this internet still benefit from the services of UDP or TCP? In other words, can user datagrams or segments be encapsulated in the Ethernet frames?

Reference no: EM131307503

Questions Cloud

Examines the relationship between the quality of breakfast : Each of the following studies examines the relationship between the quality of breakfast and academic performance for third-grade children.
What is the server supposed to do in this case : Assume a client sends a SYN segment to a server. When the server checks the well-known port number, it finds that no process defined by the port number is running. What is the server supposed to do in this case?
How mcdonalds should handle information regular food items : Describe differences in how McDonald's should handle information and planning for (1) regular food items, (2) nonfood items like wrappers or napkins, and promotional or one-time items like Happy Meal toys.
Academic performance and breakfast quality : Describe how a third variable, such as family income or parents' educational level, might explain the relationship between academic performance and breakfast quality.
Can this internet still benefit from services of udp or tcp : UDP is a message-oriented protocol. TCP is a byte-oriented protocol. If an application needs to protect the boundaries of its message, which protocol should be used, UDP or TCP?
What pattern would indicate a negative relationship : In a scatter plot, what pattern of points would indicate a positive relationship between variables?- What pattern would indicate a negative relationship?
Read the article and give your reviews : In your replies, extend the discussion by analyzing and building upon your classmates' ideas. Assertions must be supported by references in current APA format. Use first person and single-spaced formatting and indent new paragraphs. Your threads a..
A correlational study to evaluate the relationship : The following list contains several variables that differentiate college students.- Describe how you would do a correlational study to evaluate the relationship.-
Does any segment carry the maximum segment size : Does any segment carry the maximum segment size? Is Nagler's algorithm really effective here? Why?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Java program that asks the user

Write a Java program that asks the user to input a positive integer n first, then create an array of size n. Fill n random integers between 5 and 555, inclusively, into the created array.

  Data structures in an oop program

Suppose you created a video project that has two data structures-an array of strings and a ListView control. You used the Sort() method of the array class to put the film names in ascending order. Then the program populated lstNames with the order..

  Good at solving social problems

Watch the video Michael Porter: Why business can be good at solving social problems. Post 1) what you garnered from the video 2) what social problem you feel business can solve at home or abroad and how this could be accomplished. 200 words minim..

  Discuss the advantages and disadvantages of outsourcing it

Discuss the advantages and disadvantages of outsourcing IT.

  Prepare a research paper on hardware software

Prepare a research paper on following topics Hardware, Software, Firmware, Ethernet Card Slot, Flash memory card reader, Motherboard, System fan connector

  Computer will ever be developed which can think like human

Do you think a computer will ever be developed which can think like human? Write down the ethical implications of creating such a computer?

  Would this help the attacker

Suppose that furthermore the attacker could reset the clock on the server host, perhaps using the Network Time Protocol. Show how an attacker could now authenticate itself to the server without knowing CHK (although it could not decrypt SK).

  The current administration key cybersecurity policy

Prepare your paper in Word format and submit it through your Assignments Folder. The citations and the reference list in the paper should be formatted in accordance with APA 6th edition guidelines.

  How does new media differ from traditional media

How does new media differ from traditional media? What are the advantages and disadvantages of each? Consider at least one type from each group and discuss those types specifically.

  Write a program that asks user to input grade of student

Write a program that asks the user to input the grade of the student. If the grade is equal or greater than 60, the program prints the word "pass", otherwise it prints the word "fail".

  Components in a database management systems

Describe the main components in a Database management systems (DBMS)

  Improve the profitability of credit sales

You have been asked to assess the expected financial impact of each of the following proposals to improve the profitability of credit sales made by your company. Each proposal is independent of the other. Answer all questions. Showing your work..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd