1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
miss Akunina [59]
3 years ago
13

We have seen that Internet TCP sockets treat the data being sent as a byte stream but UDP sockets recognize message boundaries.

What are one advantage and one disadvantage of byte-oriented API versus having the API explicitly recognize and preserve application-defined message boundaries
Computers and Technology
1 answer:
vichka [17]3 years ago
6 0

Answer:

One advantage of <u>byte-oriented APIs</u> is that all byte of the data sent by the API is retrieved but for <u>APIs with application-defined message boundaries</u>, some bytes of data could be lost in the streaming process.

One disadvantage of <u>byte-oriented APIs</u> is the time it takes to resend a byte increases its propagation delay, while the is an advantage of the <u>APIs with application-defined message boundaries</u> as it does not have to resend any lost bytes of data, making it faster.

Explanation:

Note that byte-oriented APIs uses the TCP socket which resends lost bytes of data and application-defined message boundaries APIs uses the UDP protocol to send data but does not resend if lost.

You might be interested in
_____________________________________________________is a pre-designed format to help users with the creation of a document, lik
Naily [24]
C template......................................
8 0
3 years ago
A Cisco Catalyst switch has been added to support the use of multiple VLANs as part of an enterprise network. The network techni
Ostrovityanka [42]

Answer:

The technician should delete the startup configuration and the "vlan.dat" file residing in the flash memory of the newly added switch and lastly, he should reboot the switch.

Explanation:

In this scenario, a Cisco Catalyst switch has been added to support the use of multiple virtual local area networks (VLANs) as part of an enterprise network. The network technician finds it necessary to clear all virtual local area network (VLAN) information from the switch in order to incorporate a new network design. To accomplish this task successfully, the technician should delete the startup configuration and the "vlan.dat" file residing in the flash memory of the newly added switch and lastly, he should reboot the switch. The VLAN informations are stored in a file with the name "vlan.dat" residing in the flash memory of the switch.

However, in order to delete the startup configuration he would be required to login as an administrator, so as to have all privileges.

<em>Also, the essence of deleting the startup configuration and the "vlan.dat" is to avoid any conflict in the network. </em>

8 0
3 years ago
List 5 differences between monitors and printers​
Alinara [238K]
Monitor is a display for a computer system.
monitor is the primary memorable device.
a printer is a device that builds one static image and captures it permanently on a suitable medium.
a printer cannot project information unlike a monitor.
a monitor is mainly used for commands.
4 0
3 years ago
Need help ASPA!!!!!!!!!
professor190 [17]
Answer is D the internet
7 0
4 years ago
Read 2 more answers
How to make the heart symbol in photoshop
sveta [45]
Click the font drop-down box in the tool settings bar. Select "Arial." 6. Press "Alt-3" using your keyboard number pad's "3" key to insert the heart symbol<span>.</span>
3 0
4 years ago
Read 2 more answers
Other questions:
  • Food is shipped thousands of miles throughout our country using various types of transportation such as trucks, planes, and boat
    10·1 answer
  • What nondestructive testing method requires little or no part preparation, is used to detect surface or near-surface defects in
    7·1 answer
  • Scavenging is a form of fraud in which the perpetrator uses a computer program to search for key terms in a database and then st
    14·1 answer
  • A key physical design element is the ____, which describes how users interact with a computer system
    11·1 answer
  • Do you think I could create a working animatronic like the one from five nights at freddys
    12·2 answers
  • You are system administrator with hundreds of host workstations to manage and maintain. You need to enable hosts on your network
    14·1 answer
  • ______ is a customer-facing CRM application.<br><br> FAQ<br><br> Search<br><br> SFA<br><br> E-mail
    6·1 answer
  • Choose all that apply.
    11·1 answer
  • Generally speaking, what is a “best practice"?
    13·1 answer
  • Read the following scenario. How might Sarah correct successfully complete her task?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!