Why UDP protocol is used?

1 Answer

Answer :

UDP is user datagram protocol.

It is connectionless protocol because data is sent without establishing a connection between

sender and receiver before sending the data.

UDP is unreliable because data is delivered without acknowledgement.

UDP does not perform Auto retransmission.

UDP does not use flow control.

UDP has high transmission speed

Related questions

Description : Suppose you are browsing the world wide web using a web browser and trying to access the web servers. What is the underlying protocol and port number that are being used? a. UDP, 80 b. TCP, 80 c. TCP, 25 d. UDP, 25

Last Answer : b. TCP, 80

Description : Which one of the following uses UDP as the transport protocol? a. HTTP b. Telnet c. DNS d. SMTP

Last Answer : c. DNS

Description : Which one of the following is a version of UDP with congestion control? a. datagram congestion control protocol b. stream control transmission protocol c. structured stream transport d. user congestion control protocol

Last Answer : a. datagram congestion control protocol

Description : User datagram protocol is called connectionless because _____________ a. all UDP packets are treated independently by transport layer b. it sends data as a stream of related packets c. it is received in the same order as sent order d. it sends data very quickly

Last Answer : a. all UDP packets are treated independently by transport layer

Description : Which one of the following is a version of UDP with congestion control? a. datagram congestion control protocol b. stream control transmission protocol c. structured stream transport d. user congestion control protocol

Last Answer : a. datagram congestion control protocol

Description : User datagram protocol is called connectionless because _____________ a. all UDP packets are treated independently by transport layer b. it sends data as a stream of related packets c. it is received ... order d. it sends data very quickly Answer: Option(a) 4. Transmission control protocol ____

Last Answer : a. all UDP packets are treated independently by transport layer

Description : Which protocol does HTTP (Hyper Text Transfer Protocol) - use for transferring web pages at the Transport layer a. IP b. UDP c. TCP d. ARP

Last Answer : c. TCP

Description : Which protocol does switch use at the layer 2 for finding MAC address? a. ICMP b. UDP c. ARP d. TCP

Last Answer : c. ARP

Description : State weather the following statement is true or false for Stream Control Transmission Protocol (SCTP). 1). SCTP uses only few known ports in the TCP space. 2).SCTP is a new transport protocol at the same layer as TCP and ... , 3. false C. 1. false, 2. false, 3. false D. 1.false, 2. true, 3. true

Last Answer : D. 1.false, 2. true, 3. true

Description : The Post Office Protocol is an ………... protocol with both client (sender/receiver) and …………...functions A. electronic mail, server (storage) B. three layer , server C. UDP, transfer D. TCP, server

Last Answer : A. electronic mail, server (storage)

Description : A ________ is a 16-bit number used by the host-to-host protocol to identify to which higher- level protocol or application program (process) it must deliver incoming messages A. connection B. UDP C. port D. TCP

Last Answer : C. port

Description : Which is not a application layer protocol? A. HTTP B. SMTP C. FTP D. UDP

Last Answer : D. UDP

Description : User datagram protocol is called connectionless because _____________ A. all UDP packets are treated independently by transport layer B. it sends data as a stream of related packets C. it is received in the same order as sent order D. it sends data very quickly

Last Answer : A. all UDP packets are treated independently by transport layer

Description : User datagram protocol is called connectionless because _____________ a) all UDP packets are treated independently by transport layer b) it sends data as a stream of related packets c) it is received in the same order as sent order d) it sends data very quickly

Last Answer : all UDP packets are treated independently by transport layer

Description : UDP stands for: a) User Datagram Protocol b) User Defined Protocol c) Un - Dispatched Protocol d) None of These

Last Answer : a) User Datagram Protocol

Description : Two of the protocols that can be carried in the Protocol field of an IP packet are? * TCP * UDP * FTP * TFTP

Last Answer : Correct answer: A & B The following are the fields in an IP segment, their length, and their definitions: VERS (Version number - 16 bits) HLEN (Number of 32-bit words in the header - 4 bits) Type ... (32 bits) IP Options (network testing, debugging, security and others - 4 bits) Data (4 bits).

Description : Which protocol carries messages such as destination Unreachable, Time Exceeded, Parameter Problem, Source Quench, Redirect, Echo, Echo Reply, Timestamp, Information Request, Information Reply, Address Request, and Address Reply? * ICMP * UDP * TCP * TFTP

Last Answer : Correct answer: A ICMP (Internet Control Message Protocol) is a network layer internet protocol described in RFC # 792. ICMP reports IP packet information such as destination Unreachable, Time ... Echo Reply, Timestamp, Information Request, Information Reply, Address Request, and Address Reply.

Description : Which is a link layer protocol? a) ARP b) TCP c) UDP d) HTTP

Last Answer : b) TCP

Description : What is the full form of UDP a. Union Development Program b. User Data Program c. User Datagram Protocol d. Unified Datagram Provider

Last Answer : c. User Datagram Protocol

Description : What is the full form of UDP a. Union Development Program b. User Data Program c. User Datagram Protocol d. Unified Datagram Provider

Last Answer : c. User Datagram Protocol

Description : Which protocol is used to link all the devices in the IoT? A. TCP/IP B. Network C. UDP D. HTTP

Last Answer : A. TCP/IP 

Description : UDP is a (1) connection oriented protocol (2) connectionless protocol (3) userdefined protocol (4) security protocol 

Last Answer : connectionless protocol

Description : Name the different TCP/IP Protocols. Explain the working of FTP.

Last Answer : TCP/IP Protocols: 1. DNS (Domain Naming System) 2. HTTP(Hypertext Transfer Protocol) 3. Telnet 4. FTP (File Transfer Protocol), 5. TFTP (Trivial File Transfer Protocol), 6. SNMP (Simple ... TCP ports: port 21 is used for the control connection and port 20 is used for the data connection.

Description : Define IP Addressing. List IP Address classes with their range.

Last Answer : IP address: It is a unique logical address specified in the TCP/IP used to identify the host in a computer network. It can be a 32 bit address (IPv4) or a 128 bit address (IPv6). The IPv4 address include ... 1110 Class E: Class E is reserved for future use and its starting bits are 1111 

Description : List any two problems of PC with its troubleshooting. 

Last Answer : 1. Problem: System is dead  Troubleshooting: a. Check for proper 230V ac supply using multimeter. b. Check if the power supply cable fits properly or not. Change if necessary. c. Check for ... . d. Check if the correct partition is set active for booting. If not select the correct partition 

Description : Write preventive maintenance procedure of (i) Keyboard (ii) Hard disk

Last Answer : Preventive maintenance procedure of Keyboard: * Handle the keyboard gently and carefully. * Press the keys gently without applying force and do not rest hands on the keyboards. * Do not spill ... HDD at least once a year and reinstall all the software to maintain disk efficiency and speed.

Description : List fours characteristics of display and define them.

Last Answer : Characteristics of display: 1. Dot pitch: It is the distance between each group (t6riad) of red, blue and green phosphors. A smaller dot pitch helps produce sharper and clearer image 2. Resolution: ... time: Time taken by throughput of a pixel to fully react to a change in its brightness. 

Description : List classification of network on basis of geographical area. State the benefits of networks.

Last Answer : Computer Networks are classified based on the geographical area into * Local Area Network * Metropolitan Area Network * Wide Area Network * Campus Area Network (CAN) * Personal Area ... hence the cost of installation, maintenance reduces and also makes it easier to manage these applications.

Description : Describe the different modes of fibre optic cable with neat diagram. Compare fibre optic cable with UTP cable.

Last Answer : STEP-INDEX MULTIMODE FIBER has a large core, up to 100 microns in diameter. As a result, some of the light rays that make up the digital pulse may travel a direct route, whereas others ... optic cables. Fiber is more expensive than copper due to the light emitting equipment and cost.

Description : Describe the need and importance of subnet masking. Give an example of subnet mask.

Last Answer : Subnet mask is a 32 bits long address used to distinguish between network address and host address in IP address. Subnet mask is always used with IP address. Subnet mask has ... In binary notation  IP address 11000000.10101000.00000001.00001010  Subnet mask 11111111.11111111.11111111.00000000

Description : Describe various factors considered for passive maintenance.

Last Answer : 1. Static Electricity: Static electricity or ESD can cause numerous problems within a system. The problems usually appear during the winter months when humidity is low or in extremely dry climates ... . The power-supply fan carries airborne particles through your system, and they collect inside. 

Description : State any two problems related to hard disk with their symptoms. Discuss preventive maintenance for hard disk.

Last Answer : 1. System is not booting from Hard disk drive. 2. Disk performance is low. 3. System displays No fixed disk present Error message on the monitor. 4. Scan disk incorrectly ... Defragmenter can be found by right clicking the drive in Windows Explorer and selecting Properties, then Tools.

Description : Compare CRT and LCD display. 

Last Answer : CRT LCD CRT monitors require about 100 W for 19 display. LCD monitors require 45 W for 19 display. CRT's are heavier than LCD. LCD monitors are lighter and thinner They are ... is possible. CRT displays text is not good as LCD. LCD displays text better than CRTs.

Description : Describe the function and operation of firewall with neat diagram.

Last Answer : A firewall is a part of computer system or network that is designed to block unauthorized access while permitting authorized communications.  2. It is a device or set of devices configured to ... i. Packet filter ii. Proxy server iii. Circuit-level Gateway iv. Application Gateway

Description : Define MAN. Give any two differences between LAN and WAN.

Last Answer : Short for Metropolitan Area Network, a data network designed for a town or city. In terms of geographic breadth, MANs are larger than local-area networks (LANs), but smaller than wide-area networks ... such as the telephone system. They can also be connected through leased lines or satellites.

Description : State any four characteristics of LCD monitor.

Last Answer : Characteristics of LCD Monitor 1. Pixels: This refers to an individual dot on the screen. All graphics displayed on the screen are composed of hundreds or thousands of these graphic dots or pixels or pet. ... takes for a pixel to go from black to peak intensity white and then back to black again.

Description : Describe the importance of preventive maintenance.

Last Answer : Importance of Preventive Maintenance Preventive maintenance is one of the most ignored aspects of PC ownership, most people seem to think that the PC doesn't need preventive maintenance, and so ... time, and preventive maintenance will help to improve the speed of your system in these respects.

Description : List any two features of PCI-Xpress. Give two differences between PCI-X & PCI-Xpress. 

Last Answer : Features: 1. High performance 2. I/O Simplification, It utilizes individual buses for each of the devices connected to it instead of a shared one like what PCI uses. 3. PCI-Xpress uses a serial interface ... of a single lane. It is backward compatible. It is not backward compatible

Description : Explain importance characteristics of fiber optic cable.

Last Answer : 1. Fiber optic cabling can provide extremely high bandwidths in the range from 100 mbps to 2 gigabits because light has a much higher frequency than electricity. 2. The number of nodes which a fiber ... to twisted pair and co-axial. 6. The installation of fiber optic cables is difficult and tedious.

Description : Give function of the following TCP/IP protocols. i. ARP ii. FTP 

Last Answer : i. ARP ARP:(Address resolution protocol)  Networking H/W demands that a datagram contain the physical address of the intended recipient. If problem Address Resolution protocol (ARP) was developed. ARP ... . FTP uses port 21 for the control connection and port 20 for the data connection. 

Description : Explain the working principle of Firewall.

Last Answer : 1. A firewall is a part of computer system or network that is designed to block unauthorized access while permitting authorized communications. 2. It is a device or set of devices configured to permit, ... Packet filter ii. Proxy server iii. Circuit-level Gateway iv. Application Gateway

Description : Explain how preventive maintenance of CD ROM drive is carried out.

Last Answer : 1. Cleaning of the head: use head cleaning diskettes for purposes. 2. Disk drive heads can also be manually cleaned using alcohol and foam swab rapped in a lint free material with immense care. ... off the interior of the drive. 6. Use the silicon lubricant ion whatever items that need lubrication.

Description : Define the following power problems. i. Blackout ii. Surge iii. Spike

Last Answer : i. Blackout: It is the complete loss of electrical power where voltage and current drop to a very low value (typically zero). They are caused due to physical interruption in the local ... . Spikes: It is a large over voltage condition that occurs over short duration of few microseconds. 

Description : Explain the recording process of CDROM drive.

Last Answer : The CD-ROM drive reads the data on the CD and sends the information to the interface connector (expansion board) attached to the computer motherboard. The information then travels to the CPU ... the detector is the digital signal that will be amplified and then processed into an audio signal. 

Description : What is network topology? List their types with meaning. 

Last Answer : The topology of a network is the geometric representation of the relationship of all the links and linking devices (usually called nodes) to one another. List: 1. Mesh topology 2. Bus topology ... 6. Hybrid Topology: a combination of two or more different topologies makes for a hybrid topology.

Description : Explain how preventive maintenance of Laser printer is performed.

Last Answer : Since printer is partly mechanical, it requires more maintenance. 1. Clean the exterior of printer using soft cloth with mild organic solvent. 2. Do not place printer near heat generating machines ... The mechanics of different printers vary with their types. So consult their manual for their PM.

Description : Explain the different classes of IP addressing.

Last Answer : Class A Addressing: 1. First byte specifies the network portion. 2. Remaining bytes specify the host portion. 3. The highest order bit of the network byte is always 0. 4. Network values of ... E addressing. This format begins with 1110 that show a it is reversed for the future use.

Description : Draw and explain the block diagram of SMPS.

Last Answer : SMPS used in a PC has five sections AC input section Receives unregulated input AC supply from mains. This signal is filtered using line filter and given to full wave rectifier for ... circuits shut off the output section of the SMPS, thereby avoiding damage due to over current flow.

Description : Give function of each layer of OSI reference model.

Last Answer : OSI model (open system interconnection) model was developed by ISO (international standard organization)  Function of OSI model: i. It provides way to understand how internetwork operates. ... virtual terminal file transfer access and management mail services and directory services

Description : Explain what you understand by data encapsulation.

Last Answer : Each layer in the layered architecture provides service to the layers which are directly above and below it. The outgoing information will travel down through the layers to the lowest layer. While ... to each packet obtained from layer 3 and pass it to layer 1 for physical transmission.