Describe the various characteristics of udp protocol, Computer Engineering

Assignment Help:

Describe the various characteristics of UDP protocol.

The characteristics of the UDP are as follows:

  • End to end: UDP is transport protocols that can distinguish between multiple application programs running on a specified computer.
  • Connectionless:

A connectionless paradigm is follow by UDP.

  • Message Oriented:

An application which uses UDP sends and receives individual messages.

  • Best Effort:

UDP gives application similar best effort delivery semantics as IP.

  • Arbitrary interaction:

UDP permits an application to send to many other applications, receive from several other applications, or communicate along with exactly one another application.

  • Operating system independent:

UDP gives a mean of identifying application programs which does not depend upon Identifiers used through the local operating system.


Related Discussions:- Describe the various characteristics of udp protocol

How many number of flip flops contained in IC 7490, The number of flip flop...

The number of flip flops contained in IC 7490 is ? Ans. 2 flip flops contained in IC 7490.

Explain the violating basic security principles, Explain the violating basi...

Explain the violating basic security principles There are drawbacks to permitting users to access the Intranet as well as not permitting them. A simple consideration such as a

Define polling, Define Polling. A Polling process is used to recognize...

Define Polling. A Polling process is used to recognize the highest priority source by software means. In this process there is one common branch address for all interrupts.

Explain the message passing interface, Q. Explain the Message Passing Inter...

Q. Explain the Message Passing Interface? The Message Passing Interface (MPI) is a universal benchmark for providing communication among multiple simultaneous processes on a di

Conversion of decimal number to binary number, Conversion of Decimal Number...

Conversion of Decimal Number to Binary Number: For converting a decimal number to binary integer part and fractional part are handled separately. Let's describe it with help of

What is canonical and standard forms, Q.What is Canonical and Standard Form...

Q.What is Canonical and Standard Forms? An algebraic expression can express in two forms: i) Sum of Products   (SOP) for example (A . B¯) + (A¯ . B¯)            ii) Produ

What are the limitations of mobile devices, What are the limitations of mob...

What are the limitations of mobile devices? For mobile devices we require both PC-integrated applications and specialized mobile services quite than repurposed website content.

Cutoff search - artificial intelligence, Cutoff Search : To require a ...

Cutoff Search : To require a mini and max search in a game on stage situation is, in which all we have is just do that programme our agent to look at the intact that search tr

List the major components of the keyboard, List the major components of the...

List the major components of the keyboard/Display interface. a. Keyboard section b. CPU interface section c. Display section d. Scan section

Mac address helps in which access control, MAC address helps in (A)  m...

MAC address helps in (A)  multimedia access control. (B)  media access control. (C)  mobile access control. (D) master access point control Ans: MAC addr

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd