1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anastaziya [24]
3 years ago
8

What is a message called that is delivered by TCP? What is a message called that is delivered by UDP? At which layer do the two

protocols work?
Computers and Technology
1 answer:
Mrrafil [7]3 years ago
5 0

Answer:

  • Transmission Control Protocol is a Transport Layer protocol.  
  • This protocol is connection oriented which means that a connection is set up before the data packets are transmitted between the source and destination host which is a very reliable way of data transmission.
  • The connection is established between the source and the destination, after this the data is transmitted between them and lastly the connection is ended or terminated after the data transmission.
  • The packet or a messages that is delivered by TCP is called segment.
  • Basically TCP divides the data into small parts or chunks which are called segments.
  • The segment has a header and data section.
  • The segment header is further divided into the following parts.
  • Source port (sending port), destination port (receiving port), sequence number which is allocated to the first byte in the segment so that if the segments at the destination are sent out of order then it will help to rearrange these segments, Acknowledgement Number is number that the acknowledgement number sender expects to receive, header length, control flags which are used to control connection set up, connection termination and flow control, window size that a sender is ready to receive, Checksum field enables error control, Urgent pointer which is used to refer to data that is urgently needed to reach the receiving phase as soon as possible.  
  • User Datagram Protocol (UDP) is a Transport Layer protocol and a part of Internet Protocol suite.
  • This protocol is connection-less which means there  is no need to establish a connection between source host and destination host prior to the transmission of data which is an unreliable data transmission way.
  • The message in UDP is called datagram .
  • Unlike TCP segments there is no need to consider the order in which datagrams are sent or received.
  • Datagram has a header part which contains routing information a data section which shows the data to be transmitted.
  • Header has source port, destination port, checksum and length fields.
  • TCP and UDP protocols work in Transport Layer.
  • This layer is responsible for end to end delivery of data between source and destination hosts.
  • It ensures reliable data transmission and manages flow control and also ensures that packets reach in the right order in which they were sent.
You might be interested in
Select the correct answer.
nadya68 [22]

The customer retention strategy is providing real-time communication.

<h3>What is customer retention strategy?</h3>

Customer retention strategies are the processes and initiatives put in place by businesses to maintain and retain their customers. The aim here is to ensure customers both old and new are retained.

In customer retention strategy, emphasis are placed on how to gain customer loyalty and improve customer lifetime value to the business.

Hence, the customer retention strategy is providing real-time communication.

Learn more about customer retention strategy here : brainly.com/question/25648326

8 0
3 years ago
Engineers and scientists redesign a prototype if it does not work correctly true or false and why
Rasek [7]
True they would not start to use a product if it would not work
Hope this helps please mark this as brainliest answer
4 0
4 years ago
Read 2 more answers
Which of the following postfix expressions corresponds to the given infix expression?
Ivan

Answer:

C) 1 4 2 / + 1 + 2 + 3 * 2 /

Explanation:

Infix, Postfix and Prefix are 3 different ways of writing expressions which differ in relative placement of operator and operands.

In Infix , operator lies between the operands whereas in postfix operator is written after its operands.

For example: 1 + 2 is infix while 1 2 + is the corresponding postfix expression.

Converting the given infix expression (1 + 4 / 2 + 1 + 2) * 3 / 2 to postfix:

Let (1 + 4 / 2 + 1 + 2) be represented by x.

Converting x to postfix:

(1 + 4 / 2 + 1 + 2)  =>  1 4 2 / + 1 + 2 +       ------------------------- (1)

So the overall infix expression becomes:

x * 3 / 2

Converting it to postfix:

x 3 * 2 /

Replacing the value of x from (1)

1 4 2 / + 1 + 2 + 3 * 2 /

4 0
3 years ago
Normal view
Amiraneli [1.4K]
Normal View is the place where creating and editing occurs slide panel. This is where you can write or edit kind of information or images you wanted to show in your power point presentation. 
3 0
3 years ago
Read 2 more answers
How does an operating system manage peripheral devices?
azamat

Answer:

Device management controls peripheral devices by sending them commands in their proprietary machine language. The software routine that deals with each device is called a "driver," and the OS requires drivers for each of the peripherals attached to the computer.

Explanation:

4 0
3 years ago
Other questions:
  • The ____ operator eliminates duplicate values in the results of a query.
    11·1 answer
  • Systems thinking includes consideration of all of the following EXCEPT
    9·1 answer
  • The width of a strand of fiber is 19.2 micrometers. if 1500 strands are adhered side by side, how wide would the resulting fabri
    9·1 answer
  • The company that you work for has recently had a security breech. During the recover and assessment, it was discovered that the
    5·1 answer
  • The website of an international human rights organization stores a large database of information and provides search functionali
    15·1 answer
  • Select the correct answer.
    5·1 answer
  • Question 13(Multiple Choice Worth 5 points)
    6·1 answer
  • A good look of a web page depends upon?​
    8·1 answer
  • Who is your favorite XC2 character, and why?
    15·1 answer
  • confidentiality ensures that only those with the rights and privileges to access information are able to do so.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!