List two advantages of using UDP over TCP.

1 Answer

Answer :

Advantages of using UDP over TCP : 1) UDP is connection less and unreliable transport layer protocol. i.e. It does not require to maintain a connection. 2) UDP is transaction oriented and suitable for simple query response protocols. 3) UDP is faster since it does not require acknowledgment. 4) Useful when time sensitivity is more important

Related questions

Description : Compare TCP and UDP

Last Answer : Characteristics TCP UDP Connection TCP is connection oriented Protocol UDP is connection less Protocol  Reliability It provides reliable delivery of messages It provides unreliable delivery of ... FTP, Telnet, SMTP, DNS, HTTP, POP DNS, BOOTP, DHCP, TFTP, RIP

Description : Explain how TCP connections are established using the 3 way handshake. What happens when 2 hosts simultaneously try to establish a connection?

Last Answer : If 2 host Simultaneously try to establish connection: Simultaneous Open: * It's possible for two applications to send a SYN to each other to start a TCP connection, although the possibility is small, ... . * The CLOSING state takes the place of FIN-WAIT-2 or CLOSEWAIT in a common scenario.

Description : Explain the TCP connection establishment using a three way handshake mechanism.

Last Answer : Connection Establishment TCP uses a Three way handshaking mechanism to establish a connection between client and server machines. The three steps in three way handshaking mechanism are as follows.  SYN: ... This is just an ACK segment. It guarantees the completion of three way handshaking.

Description : Explain TCP connection management with the help of TCP connection management finite state machine.

Last Answer : To keep track of all the different events happening during connection establishment, connection termination, and data transfer, TCP is specified as the Finite State Machine -FSM TCP ... , a server transitions through a solid line or a client transitions through a dotted line.

Description : State the use of 6 flags in TCP header.

Last Answer : There are 6, 1-bit control bits that control connection establishment, termination, abortion, flow control etc.. 1) URG: Urgent pointer If this bit field is set the receiving TCP should ... 6) FIN: No more data from sender. If this bit is set then it terminates the connection.

Description : Suppose you are browsing the world wide web using a web browser and trying to access the web servers. What is the underlying protocol and port number that are being used? a. UDP, 80 b. TCP, 80 c. TCP, 25 d. UDP, 25

Last Answer : b. TCP, 80

Description : Two of the protocols that can be carried in the Protocol field of an IP packet are? * TCP * UDP * FTP * TFTP

Last Answer : Correct answer: A & B The following are the fields in an IP segment, their length, and their definitions: VERS (Version number - 16 bits) HLEN (Number of 32-bit words in the header - 4 bits) Type ... (32 bits) IP Options (network testing, debugging, security and others - 4 bits) Data (4 bits).

Description : What do you mean by TCP and UDP?

Last Answer : TCP stands for Transfer control protocol and UDP stands for User Datagrams protocol and TCP is a connection-oriented protocol and UDP is a Connectionless protocol.

Description : IGMP isa companion to the ______protocol. A) UDP B) TCP C) ICM D) noneof the above

Last Answer : noneof the above

Description : Which of the following TCP/IP protocolallows an application program on one machine to senda datagram to anapplicationprogram onanother machine? A. UDP B. VMTP C. X.25 D. SMTP E. None of the above

Last Answer : UDP

Description : Which of the transport layer protocols is connectionless? A) UDP B) TCP C) FTP D) Nvt

Last Answer : A) UDP

Description : Generally TCP is reliable and UDP is not reliable. DNS which has to be reliable uses UDP because a. UDP is slower b. DNS servers has to keep connections c. DNS requests are generally very small and fit well within UDP segments d. None of these

Last Answer : c. DNS requests are generally very small and fit well within UDP segments

Description : Which of the following transport layer protocols is used to support electronic mail? a. SMTP b. IP c. TCP d. UDP

Last Answer : c. TCP

Description : The transport layer protocols used for real time multimedia, file transfer, DNS and email, respectively are: a. TCP, UDP, UDP and TCP b. UDP, TCP, TCP and UDP c. UDP, TCP, UDP and TCP d. TCP, UDP, TCP and UDP

Last Answer : c. UDP, TCP, UDP and TCP

Description : _________ does not provide reliable end to end communication. a. TCP b. UDP c. Both TCP and UDP d. Neither TCP nor UDP

Last Answer : b. UDP

Description : TCP and UDP are called ________ a. Application protocols b. Session protocols c. Transport protocols d. Network protocols

Last Answer : c. Transport protocols

Description : Which of the following are transport layer protocols used in networking? a. TCP and FTP b. UDP and HTTP c. TCP and UDP d. HTTP and FTP

Last Answer : c. TCP and UDP

Description : Which of the following are transport layer protocols used in networking? a. TCP and FTP b. UDP and HTTP c. TCP and UDP d. HTTP and FTP

Last Answer : c. TCP and UDP

Description : Which protocol does HTTP (Hyper Text Transfer Protocol) - use for transferring web pages at the Transport layer a. IP b. UDP c. TCP d. ARP

Last Answer : c. TCP

Description : Which protocol does switch use at the layer 2 for finding MAC address? a. ICMP b. UDP c. ARP d. TCP

Last Answer : c. ARP

Description : Which processes does TCP, but not UDP, use? a. Windowing b. Acknowledgements c. Both a and b d. Destination Port

Last Answer : c. Both a and b

Description : State weather the following statement is true or false for Stream Control Transmission Protocol (SCTP). 1). SCTP uses only few known ports in the TCP space. 2).SCTP is a new transport protocol at the same layer as TCP and ... , 3. false C. 1. false, 2. false, 3. false D. 1.false, 2. true, 3. true

Last Answer : D. 1.false, 2. true, 3. true

Description : The Post Office Protocol is an ………... protocol with both client (sender/receiver) and …………...functions A. electronic mail, server (storage) B. three layer , server C. UDP, transfer D. TCP, server

Last Answer : A. electronic mail, server (storage)

Description : A ________ is a 16-bit number used by the host-to-host protocol to identify to which higher- level protocol or application program (process) it must deliver incoming messages A. connection B. UDP C. port D. TCP

Last Answer : C. port

Description : TCP and UDP are called ________ A. Application protocols B. Session protocols C. Transport protocols D. Network protocols

Last Answer : C. Transport protocols

Description : Which of the following are used as transport layer protocols in networking? A. TCP and FTP B. UDP and HTTP C. TCP and UDP D. HTTP and FTP

Last Answer : C. TCP and UDP

Description : Which of the following are transport layer protocols used in networking? a) TCP and FTP b) UDP and HTTP c) TCP and UDP d) HTTP and FTP

Last Answer : c) TCP and UDP

Description : Explain UDP & TCP.

Last Answer : Source port address ∙ Destination port address ∙ Total length ∙ Checksum Transmission Control Protocol(TCP) ∙ Source port address ∙ Destination port address ∙ Sequence number ∙ Acknowledgement ... ∙ Control ∙ Window size ∙ Check sum ∙ Urgent pointer ∙ Options and padding

Description : Which processes does TCP, but not UDP, use?Source Port - 16 bits, Destination Port - 16 bits, Length - 16 Bits, Checksum - 16 bits, Data * Destination Port - 16 bits, Source Port - 16 bits, Length - ... * Source Port - 8 bits, Destination Port - 8 bits, Length -8 Bits, Checksum - 8 bits, Data

Last Answer : Correct answer: A The UDP format for a segment is as follows: Source Port 16 bits Destination Port 16 bits Length 16 bits Checksum 16 bits Data xx bits

Description : Which protocol carries messages such as destination Unreachable, Time Exceeded, Parameter Problem, Source Quench, Redirect, Echo, Echo Reply, Timestamp, Information Request, Information Reply, Address Request, and Address Reply? * ICMP * UDP * TCP * TFTP

Last Answer : Correct answer: A ICMP (Internet Control Message Protocol) is a network layer internet protocol described in RFC # 792. ICMP reports IP packet information such as destination Unreachable, Time ... Echo Reply, Timestamp, Information Request, Information Reply, Address Request, and Address Reply.

Description : In packet-filtering router, the following information can be external from the packet header. i) Source IP address ii) Destination IP address iii) TCP/UDP source port iv) ICMP message type v) TCP/UDP destination port A) i, ii, ... iv and v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : D) All i, ii, iii, iv and v

Description : In packet-filtering router, the following information can be external from the packet header. i) Source IP address ii) Destination IP address iii) TCP/UDP source port iv) ICMP message type v) TCP/UDP destination port A) i, ii ... and v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : D) All i, ii, iii, iv and v

Description : Which of the transport layer protocols is connectionless? A) UDP B) TCP C) FTP D) Nvt

Last Answer : A) UDP

Description : Which is a link layer protocol? a) ARP b) TCP c) UDP d) HTTP

Last Answer : b) TCP

Description : Which transport layer protocols is used by DHCP? a. RSVP b. TCP c. DCCP d. UDP

Last Answer : d. UDP

Description : Which transport layer protocols is used by DHCP:- a. RSVP b.TCP c. DCCP d. UDP

Last Answer : d. UDP

Description : Port no.(6346,6347) Gnutella service having which protocols ….. a. TCP b. UDP c. TCP, UDP d. NONE

Last Answer : c. TCP, UDP

Description : . As an ethical hacker, you should scan all ________ UDP and TCP port on each network host that’s found by your scanner. a. 65535 b. 65353 c. 65333 d. 65555

Last Answer : a. 65535

Description :  TCP and UDP are called? A. Application protocols B. Session protocols C. Transport protocols D. Network protocols

Last Answer : C. Transport protocols  

Description : Which protocol is used to link all the devices in the IoT? A. TCP/IP B. Network C. UDP D. HTTP

Last Answer : A. TCP/IP 

Description : ______________ is useful for time-sensitive application that have very small data units to exchange and do not want the overhead of connection setup. A. TCP B. UDP C. Transport layer D. None of the above.

Last Answer : B. UDP 

Description : State the four advantages of IPv6.

Last Answer : Advantages of IPv6: * Larger address space. * Better header format. * New options for additional functionalities. * Allowance for extension. * Support for more security. * ... Simplified Network configuration * Support for new services * Support for Security * Auto configuration

Description : Explain about standard and non standard protocols at the application layer.

Last Answer : HTTP The Hypertext Transfer Protocol (HTTP) is a Application layer protocol used mainly to access data on the World Wide Web. HTTP uses the services of TCP on well-known port 80. FTP ... starts with the client when the user needs to download e-mail from the mailbox on the mail server.

Description : Describe the HTTP response message format.

Last Answer : Status Line  Status line shows status for the response it indicates response status using a code as well as a status phrase. The status-Line begins with a protocol version, then status code and status phrase. ... fields Body It contains actual content. This part is optional. OR

Description : Describe the RIP message format.

Last Answer : RIP(Routing Information Protocol) message format * RIP is routing protocol based on Distance Vector Routing algorithm which is an intradomain (interior) routing protocol used inside an autonomous ... 32-bit field defines the hop count from the advertising router to the destination network

Description : Construct a diagram to show the application of cookies in a scenario in which the server uses cookies for advertisement.

Last Answer : Use of Cookies for advertisements:  A cookie is also used by advertising agencies. An advertising agency can place banner ads on some main website that is often visited by users. The advertising agency supplies only ... the user is sent and stored in the file, which are used by the server. 

Description : Explain the working of TELNET.

Last Answer : TELNET: TELNET is an abbreviation for TErminaLNETwork. It is the standard TCP/IP protocol for virtual terminal service. TELNET Working: * TELNET is a client-server application that allows a user ... the characters to the appropriate application program.  Fig. Working of TELNET 

Description : Explain different transition method of IPv4 to IPv6.

Last Answer : Three Transition from IPv4 to IPv6 strategies are 1. Dual Stack 2. Tunnelling 3. Header Translation  1. DUAL STACK  In this kind of strategy a station has a dual stack of protocols run IPv4 and ... of the IPv6 packet is converted to an IPv4 header see figure. Fig. Header Translation

Description : Explain difference between distance vector and link state routing. 

Last Answer : Distance Vector Routing Link State Routing Routing tables are updated by exchanging information with the neighbours.  Complete topology is distributed to every router to update a routing table. ... Harder to configure Count to infinity problem No count to infinity problem

Description : Explain working of WWW.

Last Answer : The Web is a repository of information in which the documents, called web pages, are distributed all over the world and related documents are linked together. The WWW today is a distributed client- ... the web server. Each time a request arrives, the corresponding document is sent to the client.