Briefly discuss four limitations of UDP.

What will be an ideal response?


No reliability mechanisms: Datagrams are not sequenced and are not acknowledged. Most applications or services that use UDP supply their own reliability mechanisms, or track timeout values for datagrams, and retransmit when a datagram's timeout counter expires.
No delivery guarantees: Datagrams are sent without any promise of delivery, so, again, the Application layer must provide tracking and retransmission mechanisms.
No connection handling: Each datagram is an independent message that the sender transmits without UDP providing any way to establish, manage, or close a connection between sender and receiver.
Identifies Application layer protocol conveyed: As noted previously, the UDP header includes fields that identify port addresses, also known as port numbers, for sending and receiving Application layer services or processes.
Checksum for entire message carried in UDP header:As packaged, each UDP header may optionally include a checksum value that can be recalculated upon delivery, and compared to the value as sent. It's up to the Application layer service or protocol to act on this information - UDP does nothing more than provide this data, and does not require that a checksum be calculated, per se.
No buffering services:UDP doesn't manage where incoming data resides in memory before delivery, or where outgoing data resides before transmission. All memory management for data in motion must be handled at the Application layer for services that use UDP; it sees strictly one datagram at a time.
No segmentation: UDP provides no services to break up arbitrarily large messages into discrete, labeled chunks for transmission, or to reassemble sequences of labeled chunks upon reception. UDP only sends and receives datagrams; the Application layer protocol or service must handle segmentation and reassembly, as required.

Computer Science & Information Technology

You might also like to view...

Which of the following lines would be the prototype for an overloaded cast operator function that converts an object of user-defined type Time into a double?

a. Time::operator double() const; b. Time::static_cast double() const; c. Time::operator_cast(double) const; d. Time::double() const;

Computer Science & Information Technology

Which of the following statements is true?

a) Twitter searches can be fine-tuned using Twitter’s search operators, but these can result in lengthy search strings that are time consuming and cumbersome to enter. b) In the Twitter searches app we built, your favorite searches are saved using Windows Azure Table Storage. c) If you use the Azure Storage Emulator rather than an actual Windows Azure account, your saved searches will be available on any computer running the app. d) Parts a) and b) only.

Computer Science & Information Technology

What key should be pressed as soon as the computer boots in order to enter Safe Mode?

A. F5 B. F8 C. Del D. ESC

Computer Science & Information Technology

System testing is often done by independent testers who are not involved in developing program code.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology