A. Connection-oriented
B. Unreliable
C. Transport layer protocol
D. Low overhead
Explanation: UDP is an unreliable, connectionless transport layer protocol that provides message-based data transmission. TCP is an example of connection-oriented protocols.
A. String of characters
B. String of integers
C. Array of characters with integers
D. Array of zero’s and one’s
Explanation: Using Chargen with UDP on port 19, the server sends a UDP datagram containing a random number of characters every time it receives a datagram from the connecting host. The number of characters is between 0 and 512.
A. Routing and switching
B. Sending and receiving of packets
C. Multiplexing and demultiplexing
D. Demultiplexing and error checking
Explanation: De-multiplexing is the delivering of received segments to the correct application layer processes at the recipients end using UDP. Error checking is done through checksum in UDP.
A. More overload
B. Reliable
C. Low overhead
D. Fast
Explanation: As UDP does not provide assurance of delivery of packet, reliability and other services, the overhead taken to provide these services is reduced in UDP’s operation. Thus, UDP provides low overhead, and higher speed.
A. 161
B. 123
C. 162
D. 124
Explanation: The Network Time Protocol is a clock synchronization network protocol implemented by using UDP port number 123 to send and receive time stamps.
A. 8 bytes
B. 8 bits
C. 16 bytes
D. 124 bytes
Explanation: The fixed size of the UDP packet header is 8 bytes. It contains four two-byte fields: Source port address, Destination port address, Length of packet, and checksum.
A. Ntp
B. Echo
C. Server
D. Client
Explanation: Port numbers from 1025 to 5000 are used as ephemeral port numbers in Windows Operating System. Ephemeral port numbers are short-lived port numbers which can be used for clients in a UDP system where there are temporary clients all the time.
A. .
B. Only data
C. Only checksum
D. Udp header plus data
Explanation: Total length is the 16 bit field which contains the length of UDP header and the data. The maximum value of the Total length field and the maximum size of a UDP datagram is 65,535 bytes (8 byte header + 65,527 bytes of data).
A. Udp length = ip length ? ip header’s length
B. Udp length = UDP length ? UDP header’s length
C. Udp length = ip length + ip header’s length
D. Udp length = UDP length + UDP header’s length
Explanation: A user datagram is encapsulated in an IP datagram. There is a field in the IP header that defines the total length of the IP packet. There is another field in the IP header that defines the length of the header. So if we subtract the length of the IP header that is encapsulated in the IP packet, we get the length of UDP datagram.
A. Udp header
B. Checksum
C. Source port
D. Destination port
Explanation: Checksum field is used to detect errors over the entire user datagram. Though it is not as efficient as CRC which is used in TCP, it gets the job done for the UDP datagram as UDP doesn’t have to ensure the delivery of the packet.