1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dedylja [7]
3 years ago
8

The IP protocol (and UDP) are called "connectionless" and "unreliable." Describe what those two words mean in the context of dat

a communications?
Computers and Technology
1 answer:
igor_vitrenko [27]3 years ago
6 0

Answer:

Explanation:

In data communications, a protocol is <em>connectionless </em>if it describes communication between two devices in a network without first establishing or verifying establishment of some link (connection) between the two devices. In a connectionless protocol, data are exchanged between processes or devices without a prior check of whether the processes are ready to transmit data or not. In this type of protocol, there's no verification put in place to remember if these processes were or are in communication. Connectionless protocols are also called stateless protocols. Because connectionless protocol cannot be relied upon due to its lack of delivery-assurance policy, it is sometimes referred to as <em>unreliable protocol</em>. In other words, delivery of data packets is not guaranteed. An example of a connectionless protocol is the UDP (User Datagram Protocol).

However, if the protocol defines some checks to ascertain that there is first a connection between two communicating processes before beginning transmission, then, the protocol is <em>connection-oriented. </em>An example of this is the TCP (Transmission Control Protocol). Connection-oriented protocols are reliable since they ensure connection be made between processes before transmitting data packets.

A typical application of a connectionless/unreliable protocol is in the streaming of real time videos or voice communication where packets of data could be dropped and not resent.

An example of the connection-oriented/reliable protocol is analogous to making a telephone call where data packets (voice messages) are not sent until the receiver on the other end makes a connection.

You might be interested in
____ map a set of alphanumeric characters and special symbols to a sequence of numeric values that a computer can process.
Neporo4naja [7]
The answer is : coding schemes
4 0
3 years ago
What is the current record holder for the fastest car in the world? What is the top speed of it? 100 points to whoever gets it c
olchik [2.2K]
It’s 257 mph

Hope this helps !!!!!
7 0
2 years ago
Read 2 more answers
Write a Python program to balance a checkbook. The main function needs to get the initial balance, the amounts of deposits, and
Irina18 [472]

Answer:

def deposit(deposit_amount, balance):

   balance += deposit_amount

   return balance;

def process_check(check_amount, balance):

   balance -= check_amount

   return balance;

balance = float(input("Enter the initial balance: "))

transaction = input("Choose transaction method - D to deposit, C to process check, Q to quit: ")

while transaction != 'Q':

   if transaction == 'D':

       deposit_amount = float(input("Enter amount to be deposited: "))

       balance = deposit(deposit_amount, balance)

       print("Current balance is: " + str(balance))

   elif transaction == 'C':

       check_amount = float(input("Enter amount to process check: "))

       if balance >= check_amount:

           balance = process_check(check_amount, balance)

           print("Current balance is: " + str(balance))

       else:

           print("Not enough money!")

   else:

       print("Invalid input!")

   transaction = input("Choose transaction method - D to deposit, C to process the check, Q to quit: ")

print("Your final balance is: " + str(balance))

Explanation:

- Create functions to handle deposits and checks

- Ask the user for the initial balance and transaction to be made

- Initialize a while loop iterates until the user enter Q

- Ask the deposit amount or check amount depending on the transaction chosen

- Calculate and print the current balance for each transaction

- Print the final balance

5 0
3 years ago
What windows user interface can show you the programs that are currently active?
kirill115 [55]
Task manager
.............................
8 0
3 years ago
VLSI is the process of creating an integrated circuit (IC) by combing thousands of transistors into a single chip. There are two
malfutka [58]

Answer:

An FPGA is a field programmable gate array. It could be "programmed" to do certain task, but don't mistake it with a microprocessor. When programming an FPGA, you're actually changing it's physical structure, the logic gates inside the FPGA, to do the task for you. Therefore, unlike a microprocessor which has to run through a series of command, an FPGA could be rewired to run at a much faster and more efficient rate.

FPGA is good for testbenching and are budget friendly since they can be reprogrammed over and over again in case you messed up. However, they can be quite big and bulky, so they are not suitable for mass production.

ASIC in the other hand can be compact to a small size. ASIC are pretty much the IC chips that you use, like your Intel CPU or LM7000 series chips. However, the process of making them that small is irreversible, so if you messed up, you gotta throw away the whole batch. This make them expensive to make, but their small size and production process allows them to be made in bulk.

Both FPGA and ASIC are good for power consumption and speed because you're actually designing their physical circuit layout, so if your design is efficient then the product will be efficient in both speed and power as well.

In Summary, you design and test your circuit using an FPGA first. Then you send that design to a production company and they will use that design to mass produce it as a small chip.

7 0
3 years ago
Other questions:
  • I need help please?!!!
    15·1 answer
  • What are some consequences of internet addiction​
    9·1 answer
  • What should a career plan include?
    7·1 answer
  • What is a flash player?
    9·2 answers
  • 20 Points!! Please hurry!!
    9·1 answer
  • Source view shows your website_____ A) exactly as it would appear when published B) approximately as it would appear when publis
    8·2 answers
  • The program processes the command line arguments. The arguments indicate which signals to catch:________. A. The program emits a
    10·1 answer
  • Which of the following commands should you use to determine whether there are any shared resources on a Windows computer with th
    15·2 answers
  • The insert options button lists formatting options. true or false.
    11·1 answer
  • To provide for unobtrusive validation, you can install the ____________________ package for unobtrusive validation.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!