In this protocol, packets are transported over the network without a connection being established and without any acknowledgement that the data packets arrived at the destination.

What will be an ideal response?

UDP

Computer Science & Information Technology

You might also like to view...

The fields and methods that belong in a class are known as the class's __________.

a. body b. definition c. members d. data

Computer Science & Information Technology

What three things can authentication for IPsec be based upon?

What will be an ideal response?

Computer Science & Information Technology