TCP and UDP - Ingles

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

TCP And UDP

What is the IP protocol?


IP stands for Internet Protocol and its main function is to organize the flow of
internet traffic. The IP protocol is the one that determines the way in which the data
will be broadcast by a device through datagrams. Each of these datagrams
presents necessary information about the type of encoding of the data sent, its
fragmentation, the source address and the destination address, among others. It is
from the organizing role of the IP protocol that we can understand the transmission
roles of the TCP and UDP protocols.

What is TCP and UDP?


TCP and UDP are two different data transmission protocols, but complementary to
each other, essential for communications over the Internet, since these two
protocols are located in the transport layer of the TCP/IP model, and it is the first
layer where source and destination communicate directly, since the lower layers
(network layer and medium access layer) do not perform this function

TCP protocol
The TCP protocol responds to the acronym
Transfer Control Protocol and is the most
common because it is a 'connection-oriented'
transport protocol. This means that the TCP
protocol is designed not only to transmit
certain information between one device and
another, but also to verify the correct
reception of the information transmitted between one device and another, or, in
other words, it is a protocol for handle end-to-end connections.

Main features
Because TCP serves a large number of application layer protocols, it is critical that
the data (segments) arrive correctly at the recipient, without errors, and in order. If
in the transmission of the segments, they are corrupted or lost, the TCP protocol
automatically initiates the retransmission, without the intervention of the application
layer. In this way, it is guaranteed that the data reaches the recipient without
errors, since this protocol is responsible for solving any type of problem.
TCP has a complex error control mechanism, a sliding window technique is used
so that all segments arrive correctly
UDP Protocol
The UDP protocol responds to the acronym
User Diagram Protocol and works in a similar
way to the TCP protocol, but it is not a
connection-oriented transport protocol. This
means that the UDP protocol does not verify
the reception of the data transmitted between
one device and another. For this reason, it is
articulated at a lower layer level than the TCP
protocol, so the data reception verification system must be implemented at higher
layers.

Main features
The UDP protocol allows the sending of datagrams without the need to previously
establish a connection.
This protocol does not provide any type of flow control, if one device is faster than
another and sends information, it is very possible that information will be lost
because the slower one will collapse, and we will have to resend the information.
An important detail is that datagram forwarding management is performed by the
transport layer.
UDP does not provide any type of congestion control either, if there is congestion
in the network, packets could be lost, and, logically, it will not be in charge of
resending them as it does with TCP. Therefore, since UDP does not have
congestion control, flow control or error control, it could be said that UDP is an
unreliable protocol.
TCP UDP
Reliability More low
high
Speed More low High

Transfer Method Packets are sent in a Packets are sent in a


sequence stream

Error detection and Yes Nope


correction

Congestion control Yes Nope

Acknowledgment of Yes Just the checksum


receipt
Reliability
TCP must recover data that is damaged, lost, duplicated, or misdelivered over the
Internet. TCP achieves this reliability by assigning a sequence number to each
octet it transmits and requiring an acknowledgment (ACK) from the receiving TCP.
If the ACK is not received within the timeout interval, the data is retransmitted. The
TCP retransmission timeout value is determined dynamically for each connection,
based on the round trip time. At the recipient, the sequence numbers are used to
correctly order segments that may be received out of order and to eliminate
duplicates. Damage is handled by adding a checksum to each transmitted
segment, checking it at the recipient, and discarding damaged segments.

You might also like