adplus-dvertising
frame-decoration

Question

UDP uses _______ to handle incoming user datagrams that go to different processes on the same host.

a.

flow control

b.

multiplexing

c.

demultiplexing

d.

none of the above

Posted under Networking

Answer: (c).demultiplexing

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. UDP uses _______ to handle incoming user datagrams that go to different processes on the same host.

Similar Questions

Discover Related MCQs

Q. TCP is a __________protocol.

Q. TCP allows the sending process to deliver data as a _______of bytes and allows the receiving process to obtain data as a _________ of bytes.

Q. Because the sending and the receiving processes may not write or read data at the same speed, TCP ________.

Q. TCP groups a number of bytes together into a packet called a ___________.

Q. TCP is a ___________ protocol.

Q. TCP is a(n) _______ transport protocol.

Q. TCP uses _________________ to check the safe and sound arrival of data.

Q. The bytes of data being transferred in each connection are numbered by TCP. The numbering starts with a __________________.

Q. TCP assigns a sequence number to each segment that is being sent. The sequence number for each segment is the number of the _______ byte carried in that segment.

Q. Communication in TCP is ___________.

Q. The value of the acknowledgment field in a segment defines the number of the ______byte a party expects to receive.

Q. The acknowledgment number is ________.

Q. The value of the window size is determined by _________.

Q. The inclusion of the checksum in the TCP segment is ________.

Q. A TCP segment is encapsulated in __________.

Q. Connection establishment in TCP is called __________ handshaking.

Q. A SYN segment cannot carry data; it consumes _____ sequence number(s).

Q. A SYN + ACK segment cannot carry data; it consumes _____ sequence number(s).

Q. An ACK segment, if carrying no data, consumes ______ sequence number(s).

Q. The connection establishment procedure in TCP is susceptible to a serious security problem called the _________ attack.