0% found this document useful (0 votes)
10 views5 pages

Tcp vs Udp Explained

TCP (Transmission Control Protocol) is a connection-oriented protocol that ensures reliable, ordered data delivery with error checking, while UDP (User Datagram Protocol) is a connectionless protocol that offers faster data transmission without guarantees of delivery or order. TCP is commonly used for web browsing, emails, and file transfers, whereas UDP is utilized for video streaming, online gaming, and VoIP calls. In cybersecurity, TCP traffic is easier to analyze, while UDP traffic poses challenges due to its untracked nature.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views5 pages

Tcp vs Udp Explained

TCP (Transmission Control Protocol) is a connection-oriented protocol that ensures reliable, ordered data delivery with error checking, while UDP (User Datagram Protocol) is a connectionless protocol that offers faster data transmission without guarantees of delivery or order. TCP is commonly used for web browsing, emails, and file transfers, whereas UDP is utilized for video streaming, online gaming, and VoIP calls. In cybersecurity, TCP traffic is easier to analyze, while UDP traffic poses challenges due to its untracked nature.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

DAY 3/30

( Part of my 30-Day Networking series )

TCP AND UDP


EXPLAINED

BY HARSH KADU
What is TCP and UDP?

TCP and UDP are two of the most important protocols in networking.
Both belong to the Transport Layer (Layer 4) of the OSI model and are responsible for
transferring data between systems.

But they work in very different ways.

1. TCP (Transmission Control Protocol)

What It Is:

TCP is a connection-oriented protocol, meaning it establishes a connection before


transferring data and ensures that all packets arrive accurately and in order.

Key Features:

• Reliable: Guarantees delivery of data.

• Ordered: Ensures packets arrive in the correct sequence.

• Error Checking: Retransmits lost or corrupted packets.

• Flow Control: Manages the rate of data flow.

• Connection Setup: Uses a 3-way handshake to start communication.

3-Way Handshake (Simplified):

1. Client sends SYN (synchronize)

2. Server responds with SYN-ACK

3. Client replies with ACK → Connection Established

Example Use Cases:

• Web Browsing (HTTP/HTTPS)

• Emails (SMTP, IMAP)

• File Transfers (FTP)

• Remote Access (SSH)

Real-World Analogy:

TCP is like sending a registered courier package:


You track the parcel, get confirmation, and are notified if it fails to arrive.

BY HARSH KADU
2. UDP (User Datagram Protocol)

What It Is:

UDP is a connectionless protocol. It just sends data—no setup, no tracking, and no error
checking.

Key Features:

• Faster than TCP

• No Guarantee of delivery

• No Order — packets may arrive out of sequence

• No Connection Setup

• Low Overhead

Example Use Cases:

• Video Streaming (YouTube, Netflix)

• Online Gaming

• VoIP Calls (Skype, Zoom)

• DNS Queries

Real-World Analogy:

UDP is like sending a postcard:


You drop it in the mailbox and hope it gets delivered — no confirmation or tracking.

BY HARSH KADU
TCP vs UDP: Quick Comparison Table

Feature TCP UDP

Type Connection-oriented Connectionless

Reliability High (acknowledgements, retransmits) Low (no delivery guarantee)

Speed Slower (more overhead) Faster (minimal overhead)

Order of Data Guaranteed Not guaranteed

Error Checking Yes Yes (but no correction)

Use Cases Emails, Web, SSH Streaming, Gaming, VoIP

In a Cybersecurity Context (For SOC Analysts)

• TCP traffic is easier to analyze and track due to its structured communication.

• UDP traffic is harder to monitor and more often used in DDoS attacks, malware
communications, and data exfiltration due to its stealthy, untracked nature.

BY HARSH KADU
Stay Tuned For My Next Post…

BY HARSH KADU

You might also like