answersLogoWhite

0

Due to UDP's unreliability and the amount of traffic on the network, more errors would likely occur and traffic levels would increase, resulting in slower response time

User Avatar

Wiki User

15y ago

What else can I help you with?

Related Questions

What would be the effect on your overtaxed network if you reprogrammed all client and server application layer protocols to use udp rather than tcp?

Due to UDP's unreliability and the amount of traffic on the network, more errors would likely occur and traffic levels would increase, resulting in slower response time.


What would be the effect on your overtaxed network if you reporgrammed all client and server appliation lyaer protocols to use UDP rather than TCP?

That would render most protocols useless. TCP provides the reliability that is required for many applications.


It is difficult to generalize about protocols because they vary so greatly in purpose but what properties do application protocols display?

The Application layer uses protocols that are implemented within applications and services. While applications provide people with a way to create messages and Application layer services establish an interface to the network, protocols provide the rules and formats that govern how data is treated.


What network application establishes standards for the electronic exchange of data?

To be in a network and communicate we need to follow a set of rules and procedures . These set of rules and procedures are called protocols. So to exchange information these protocols should be followed.


What function do protocols perform in network communication?

protocols used for network device.


What are routed protocols?

Routed protocols are the best paths in a network along which to send network traffic.


What are the major application of the internet?

There are three major application areas of the internet, application protocols, Internet infrastructure, and building blocks. Each of these are used to create email, web security, virtual worlds, resource manipulation, and network storage.


Why does an application have more control of what data is sent in a segment?

An application has no control over the size of a data segment in a network packet. An application would not know what the segment size would be, because that information is in the OSI layers and not really retrievable for the application, nor should the application care.The OSI layers are responsible for taking care of transporting, routing, and other network tasks for a message coming from an application. The application and the network protocols are independent of each other.Networks negociate segment sizes (MTU) during connections, outside of what the application would see.


What does the term network-aware application mean and List a few examples?

Some end user applications are "Network Aware" , meaning they implement the application layer protocols and are able to communicate directly with the lower layers of the protocol stack. Email clients and web browsers are examples of these applications.


What does the term network aware application mean and List a few examples?

Some end user applications are "Network Aware" , meaning they implement the application layer protocols and are able to communicate directly with the lower layers of the protocol stack. email clients and Web Browsers are examples of these applications.


Write the protocols of seven layers?

1. Physical 2. Data link 3. Network 4. Transport 5. Session 6. Presentation 7. Application


Is ipv6 compatible with ipv4?

IPv4 and IPv6 are two different protocols . The two protocols are not compatible with each other. But they can exist in a same network together.No, those are two different protocols. However, they can co-exist in the same network (this is known as "dual stack").No, those are two different protocols. However, they can co-exist in the same network (this is known as "dual stack").No, those are two different protocols. However, they can co-exist in the same network (this is known as "dual stack").No, those are two different protocols. However, they can co-exist in the same network (this is known as "dual stack").