In this protocol, packets are transported over the network without a connection being established and without any acknowledgement that the data packets arrived at the destination.
What will be an ideal response?
UDP
Computer Science & Information Technology
You might also like to view...
The fields and methods that belong in a class are known as the class's __________.
a. body b. definition c. members d. data
Computer Science & Information Technology
What three things can authentication for IPsec be based upon?
What will be an ideal response?
Computer Science & Information Technology