Of the following characteristics, which apply to UDP?
Connection-oriented
Connectionless
Error checking
Low overhead
Best-effort delivery
Answers were Sorted based on User's Feedback
Answer / jitendera sinha
Connectionless
Lightweight - No ordering of messages, no tracking connections, etc. It's just fire and forget! This means it's a lot quicker, and the network card / OS have to do very little work to translate the data back from the packet
Is This Answer Correct ? | 2 Yes | 1 No |
Answer / pachicoo
Comparison of UDP and TCP (Transport Layer)
Transmission Control Protocol is a connection-oriented
protocol, which means that it requires handshaking to set
up end-to-end communications. Once a connection is set up
user data may be sent bi-directionally over the connection.
Reliable – TCP manages message acknowledgment,
retransmission and timeout. Many attempts to reliably
deliver the message are made. If it gets lost along the
way, the server will re-request the lost part. In TCP,
there's either no missing data, or, in case of multiple
timeouts, the connection is dropped.
Ordered – if two messages are sent over a connection in
sequence, the first message will reach the receiving
application first. When data segments arrive in the wrong
order, TCP buffers the out-of-order data until all data can
be properly re-ordered and delivered to the application.
Heavyweight – TCP requires three packets to set up a socket
connection, before any user data can be sent. TCP handles
reliability and congestion control.
Streaming – Data is read as a byte stream, no
distinguishing indications are transmitted to signal
message (segment) boundaries.
UDP is a simpler message-based connectionless protocol.
Connectionless protocols do not set up a dedicated end-to-
end connection. Communication is achieved by transmitting
information in one direction from source to destination
without verifying the readiness or state of the receiver.
Unreliable – When a message is sent, it cannot be known if
it will reach its destination; it could get lost along the
way. There is no concept of acknowledgment, retransmission
and timeout.
Not ordered – If two messages are sent to the same
recipient, the order in which they arrive cannot be
predicted.
Lightweight – There is no ordering of messages, no tracking
connections, etc. It is a small transport layer designed on
top of IP.
Datagrams – Packets are sent individually and are checked
for integrity only if they arrive. Packets have definite
boundaries which are honored upon receipt, meaning a read
operation at the receiver socket will yield an entire
message as it was originally sent.
Is This Answer Correct ? | 0 Yes | 0 No |
Which statement about the Committed Information Rate (CIP) is true? A. It is the rate in bits per second at which the Frame Relay switch agrees to transfer data B. It is the clock speed (pod speed) of the connection (local loop) to the Frame Relay cloud C. It is the maximum number of bits that switch can transferduring any Committed Rate Measurement Interval D. It is a signaling standard between the 3PE device and FP switch. It is responsible for managing the connection and maintaining status between the devices.
Novell NetWare has an Ethernet frame type called Ethernet_II. What is the matching Cisco command line keyword for this encapsulation method? A.) dix B.) sap C.) arpa D.) gns E.) snap F.) novell-ether
tell me our traditional ip routing is what A--conectless b----conection orented c-----pacekt switching d------ckt switching slect any two this is the question which i forgot to incoprate next-questions
please name some routed protocol.
What is ISR or NonISR router? Difference between ISR or NonISR router?
What is the IP extended access list range? A.) 1000-1099 B.) 100-199 C.) 1-99 D.) 101-200
Identify the 3 Internet layer IP protocols? A.) NetBios B.) IPX C.) ARP D.) IP E.) RARP
Identify the access-list range for an extended IP access-list? A.) 800 - 899 B.) 1 - 99 C.) 1000 - 1099 D.) 100 - 199
What is the name of distance vector algorithm?
An optional parameter on an IPX access is the 'LOG' parameter. This records access-list violations when a packet matches. What else does the 'LOG' option do? A.) Records the number of times that a packet matches the list. B.) Return a message to user who is denied access the by list. C.) Notifies an SNMP Agent. D.) Saves the log to NVRAM. E.) Send an SNMP Trap.
What is Cisco's default encapsulation method on serial interfaces? A.) ANSI B.) Cisco C.) Q933a D.) HDLC
How is private ip different from public ip?