Of the following characteristics, which apply to UDP?
Connection-oriented
Connectionless
Error checking
Low overhead
Best-effort delivery
Answers were Sorted based on User's Feedback
Answer / jitendera sinha
Connectionless
Lightweight - No ordering of messages, no tracking connections, etc. It's just fire and forget! This means it's a lot quicker, and the network card / OS have to do very little work to translate the data back from the packet
| Is This Answer Correct ? | 2 Yes | 1 No |
Answer / pachicoo
Comparison of UDP and TCP (Transport Layer)
Transmission Control Protocol is a connection-oriented
protocol, which means that it requires handshaking to set
up end-to-end communications. Once a connection is set up
user data may be sent bi-directionally over the connection.
Reliable – TCP manages message acknowledgment,
retransmission and timeout. Many attempts to reliably
deliver the message are made. If it gets lost along the
way, the server will re-request the lost part. In TCP,
there's either no missing data, or, in case of multiple
timeouts, the connection is dropped.
Ordered – if two messages are sent over a connection in
sequence, the first message will reach the receiving
application first. When data segments arrive in the wrong
order, TCP buffers the out-of-order data until all data can
be properly re-ordered and delivered to the application.
Heavyweight – TCP requires three packets to set up a socket
connection, before any user data can be sent. TCP handles
reliability and congestion control.
Streaming – Data is read as a byte stream, no
distinguishing indications are transmitted to signal
message (segment) boundaries.
UDP is a simpler message-based connectionless protocol.
Connectionless protocols do not set up a dedicated end-to-
end connection. Communication is achieved by transmitting
information in one direction from source to destination
without verifying the readiness or state of the receiver.
Unreliable – When a message is sent, it cannot be known if
it will reach its destination; it could get lost along the
way. There is no concept of acknowledgment, retransmission
and timeout.
Not ordered – If two messages are sent to the same
recipient, the order in which they arrive cannot be
predicted.
Lightweight – There is no ordering of messages, no tracking
connections, etc. It is a small transport layer designed on
top of IP.
Datagrams – Packets are sent individually and are checked
for integrity only if they arrive. Packets have definite
boundaries which are honored upon receipt, meaning a read
operation at the receiver socket will yield an entire
message as it was originally sent.
| Is This Answer Correct ? | 0 Yes | 0 No |
what is farme realy.and on which layer it work
In eigrp metric parameters which 2 options are enable by default?
Does a bridge divide a network into smaller sections?
As a system administrator, you want to debug igrp but are worried that the "debug IP igrp transaction" command will flood the console. What is the command that you should use? A. debug IP igrp event B. debug IP igrp-events C. debug IP igrp summary D. debug IP igrp events
Identify 3 characteristics of ISDN? A.) Transports voice and data B.) Transports voice only C.) Support both BRI and PRI D.) Runs over existing phone lines E.) Same as X.25
Identify the command to configure the IP address 172.16.100.5 255.255.255.0? A.) Router(config-if)# ip address 172.16.100.5 255.255.255.0 B.) Router(config)# ip address 172.16.100.5 C.) Router# ip address 172.16.100.5 255.255.255.0 D.) Router(config)# ip address 172.16.100.5 255.255.255.0
what is quota management?
Identify 3 methods used to prevent routing loops? A.) Split horizon B.) Holddown timers C.) Poison reverse D.) SPF algorithm E.) LSP's
Cisco routers can secure the enable password with a one-way hash algorithm. What command would encrypt the enable password with the strong encryption method? A.) enable encrypt john B.) password john C.) enable secret john D.) enable password john E.) secret john F.) enable password 5 john
. Which command sequence will allow only traffic from network 185.64.0.0 to enter interface s0? A. access-list 25 permit 185.64.0.0 255.255.0.0 int s0 ; ip access-list 25 out B. access-list 25 permit 185.64.0.0 255.255.0.0 int s0 ; ip access-group 25 out C. access-list 25 permit 185.64.0.0 0.0.255.255 int s0 ; ip access-list 25 in D. access-list 25 permit 185.64.0.0 0.0.255.255 int s0 ; ip access-group 25 in
Write an access list line which will deny node 20.0.2.1 to anywhere on your network using DNS via UDP. Don't worry about the other access list lines.
How signalling can be explained in D channel of ISDN?