Describe the various characteristics of udp protocol, Computer Engineering

Assignment Help:

Describe the various characteristics of UDP protocol.

The characteristics of the UDP are as follows:

  • End to end: UDP is transport protocols that can distinguish between multiple application programs running on a specified computer.
  • Connectionless:

A connectionless paradigm is follow by UDP.

  • Message Oriented:

An application which uses UDP sends and receives individual messages.

  • Best Effort:

UDP gives application similar best effort delivery semantics as IP.

  • Arbitrary interaction:

UDP permits an application to send to many other applications, receive from several other applications, or communicate along with exactly one another application.

  • Operating system independent:

UDP gives a mean of identifying application programs which does not depend upon Identifiers used through the local operating system.


Related Discussions:- Describe the various characteristics of udp protocol

Explain the techniques used for protection of user files, Explain the techn...

Explain the techniques used for protection of user files. This is easier to protect against accidental than malicious misuse. Protection of user files implies that file owne

Why we need the need of parallel computation, THE NEED OF PARALLEL COMPUTAT...

THE NEED OF PARALLEL COMPUTATION   With the growth of computer science, computational pace of the processors has also increased many a times. Though, there are definite constr

Differentiate between the message and method in c++, Message in C++ : *...

Message in C++ : * Objects converse by sending messages to each other. * A message is sent to invoke a method in C++.   Method in C++: * Gives response to a message

What does a lock object involve, What does a lock object involve? The t...

What does a lock object involve? The tables. The lock argument.

Determine about the stack organization, Stack Organization The CPU of t...

Stack Organization The CPU of the most computers comprises of stack or called as last-in-first-out (LIFO) list in which information is stored in such a manner that item stored

Dataflow computing, Dataflow Computing A different to the von Neumann m...

Dataflow Computing A different to the von Neumann model of computation is the dataflow computation model. In a dataflow model, control is fixed to the flow of data. The order o

Interpeter, diifference between pure and impure interpeter

diifference between pure and impure interpeter

What is the relation between response time and throughput, The Throughput g...

The Throughput graph represents the amount of data in bytes that the Vusers received from the server in a second. When we evaluate this with the transaction response time, we will

What is smtp, SMTP is a Protocol used for transferring message among en...

SMTP is a Protocol used for transferring message among end user & Mail Server.

Which of the memory is volatile memory, Which of the memory is volatile mem...

Which of the memory is volatile memory ? Ans. A volatile memory is RAM. Term Volatile memory implies the contents of the RAM get erased as soon as the power goes off.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd