User Datagram Protocol
Related Posts:
IP Spoofing Q. What is IP Spoofing and how can it be prevented? Answer:IP spoofing is a mechanism used by attackers to gain unauthorized access to a system. Here, the intruder sends messages to a computer with an IP address indicating … Read More
What are switches? Q. What are switches? Explain the concepts of Layer-3 switches. Answer: It is a device that connects multiple network segments. A switch analyzes the MAC address and then determines where to send the data. So a file addre… Read More
User Datagram Protocol Q. What is the User Datagram Protocol (UDP)? Answer: User datagram protocol allows computer applications to send messages as datagram packets from source to destination on an Internet Protocol, with out using prior co… Read More
Working of RSVP Q. Explain RSVP. How does it work? Answer: Resource Reservation protocol is used to reserve resources across a network. It is used for requesting a specific Quality of Service (QoS) from the network. This is done by carryin… Read More
classes of IP address Q. 1 Explain the classes of IP address Answer: IP addresses are organized into classes. For convenience of humans, IP addresses are expressed in the decimal format. Every number in each class is represented as binary… Read More
0 comments:
Post a Comment