Pages

TCP & UDP Attacks:

              TCP & UDP  

• Advanced DoS AttacksTCP Session Attacks; and Network Scanning:


You will learn about the transport layer's operation and how the application layer utilises its services to distinguish between server and client operations in this section.

                                 author(pixcel.com)                   

The two most widely used transport protocols on the Internet are the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP).

Let's think about a crucial aspect of networks before exploring the many services that a transport layer protocol can provide to the application layer.

Networks on computers can be unreliable. This indicates that some packets may get lost while travelling from their source to their destination. Due to network congestion, a temporary loss of connectivity, and other technical problems, a packet may get lost.

                                                             author(pixcel.com)

The transport layer protocol designer must make a decision regarding how to handle these constraints. As an illustration, TCP:

 • Ensures packet delivery. Because of this, TCP is used as the transport protocol      for applications that require a guaranteed delivery.

 • Is also focused on connections. Before sending data, a link must be made.

On the Internet, TCP is the most popular transport protocol. The IP protocol suite, commonly referred to as TCP/IP, is used by the great majority of applications.

Web browsers, FTP clients, and email clients are a few examples of popular TCP-using programmes.

TCP is more complex than UDP, on the other hand:

• It is connectionless; 

• It does not ensure packet delivery.

author(pixcel.com)
Because it offers a higher throughput (number of packets per second), UDP is faster than TCP.In fact, UDP is utilised by multimedia applications that can tolerate packet loss yet require high throughput because it is quicker than TCP.

For example: UDP is used for VoIP and video streaming: applications where you can tolerate a little glitch in the audio or video.


A table comparing TCP and UDP can be found here:-


          TCP                     UDP                 

Lower Throughout       Better Throughout  

Connection-Oriented    Connectionless      

Guarantees dilivery      Does not guarantee

                                         packet dilivery 

author(pixcel.com)

                             

Note:-If You Want To More About  TCP & UDP Attacks??

Then Comment Down!!!  In Next Blog I'll Explain More Details Related TCP & UDP Attacks😊!!!!!!!


**********************************

Happy to see you hereπŸ˜€πŸ˜‡.

**********************************

visit www.javaoneworld.com for more posts.

*********************

No comments:

Post a Comment