TCP versus UDP
TCP versus UDP

TCP versus UDP

TCP versus UDP

OSI Reference Model is the first lesson of Cisco CCNA 200-301. There are seven different layers in OSI Model. Teh fourth one, Trasport Layer is one of the important layers of OSI Model. In transport layers, there are various protocols. Three important transport layer protocols are given below:

? UDP (User Datagram Protocol)

? TCP (Transmission Control Protocol)?

? SCTP (Stream Control Transmission Protocol)

?

Here, we will focus on two of protocols, UDP and TCP. We will compare TCP vs UDP and we will learn the key characteristics of these protocols. Below, you can find a tablo that shows the summary of these characteristics.?

________________________________________

Comparison of TCP and UDP

First of all TCP is more secure than UDP. But SCTP is also more secure than TCP. There are different security alternatives for UDP also. But in general, we can say that SCTP is the most secured one, TCP is secure but UDP is not secure transport protocol.?

?

If we compare TCP versus UDP about connection, TCP is a connection-oriented protocol while UDP is connectionless protocol. If an applicaiton is using TCP, a TCP session must be established with three-way handshake. There is no handshake mechanims for UDP.?

?

About speed, when we compare UDP and TCP, UDP is faster protocol than TCP. So, in real time streaming or for voice traffic, UDP is prefered instead of TCP.?

?

When you send a packet with TCP, it is a guaranteed transfer. This means that, you packet will be received from the other end. If it do not receive it, TCP mechanism send this packet again. But there is no such a mechanism in UDP. So, TCP is used for critical applications but UDP is preferred by the applicaitons that tolarate packet loss.?

?

There is no packet reordering mechanims and flow control mechanism in UDP. But TCP provices these key services. And there is no ACK mechanism in UDP. BUt TCP has ACK mechanism.?

?

In TCP there is an advanced error checking, but in UDP there is a basic error checking mechanism.?

?

Both TCP and UDP has headers but TCP has longer header. A UDP header is 8 bytes long while TCP header is 20 bytes long.?

?

Different applications uses these protocols by default. For example, DNS, FTP, HTTPS use TCP ports, while DHCP, SNMP, TFTP use UDP ports.?

________________________________________

Last Word

Here, we have compared TCP and UDP protocols. We have explained the key features of these transport layer protocols of OSI Reference Model.?

________________________________________

For More, You Can Also Visit www.ipcisco.com

#tcp #udp #ccna #cisconetworking #networking #osimodel

Stanley Russel

??? Engineer & Manufacturer ?? | Internet Bonding routers to Video Servers | Network equipment production | ISP Independent IP address provider | Customized Packet level Encryption & Security ?? | On-premises Cloud ?

1 年

Very interesting post! The distinctions between TCP and UDP are often overlooked, but it's clear that you understand the importance of the differences in how they operate. It's worth noting that TCP is a connection-oriented protocol, while UDP is connectionless. This means that TCP requires a connection to be established before data is sent, and UDP can send data without a connection being established. Additionally, TCP has error recovery and retransmission abilities, while UDP does not. It's fascinating how these protocols are used in so many different ways. You talked about the importance of TCP and UDP in your post. In what scenarios would you recommend using one protocol versus the other, especially in cases where there is a need for reliable data transmissions?

回复
Tilo Schneider

Sicher digitalisieren - Für Menschen und Unternehmen

1 年

TCP is not secure, it is just as insecure as UDP. I'm sure what you really mean is that TCP is "reliable".

要查看或添加评论,请登录

Gokhan Kosem的更多文章

  • A Critical Linux Command! passwd

    A Critical Linux Command! passwd

    Authentication is very important in Linux. There are different users in a Linux system.

  • ????r A?m?? ?novasyon ?rnekleri!

    ????r A?m?? ?novasyon ?rnekleri!

    ?novasyon nedir konusunda ?nceki yaz?lar?m?zda de?inmi?tik. ?novasyon k?saca bir cihaz?, bir servisi, bir süreci veya…

  • Radius vs Diameter

    Radius vs Diameter

    In this article, we will focus Radius vs Diameter and we will learn the details of the key properties of these AAA…

    3 条评论
  • Linux Cheat Sheet

    Linux Cheat Sheet

    Basic Linux Commands There are thousands of commands in Linux. But some of these Linux commands are used very often.

  • INTERNET ACCESS TECHNOLOGIES

    INTERNET ACCESS TECHNOLOGIES

    To access Internet, there are different alternatives of different Service Providers. Here, we will focus on these…

  • Comparison of Ansible | Puppet | Chef

    Comparison of Ansible | Puppet | Chef

    Network Automation is one of the most important focuses of Network World. To be one step further, it is very important…

  • Cisco SD-Access

    Cisco SD-Access

    Software-Defined Access (SDA) is a new LAN Architecture that uses SDN with physical network devices. It is the last…

    1 条评论
  • Size ?lham Verecek 25 Giri?imci Filmi

    Size ?lham Verecek 25 Giri?imci Filmi

    Giri?imcilik i?in en ?nemli noktalardan ikisi ilham ve motivasyon. Her giri?imciye ilham veren, motivasyonunu artt?ran…

  • Most Used Cyber Attacks..!

    Most Used Cyber Attacks..!

    There are various Network Attacks and various ways to prevent yourself from the attackers. In this lesson we will focus…

社区洞察