All Episodes

January 5, 2024 • 28 mins

Send us a text

Ring in the New Year with an intellectual upgrade as we promise to guide you through the labyrinth of TCP and UDP protocols that are the lifeblood of our networking communications. Gear up to grasp the essential knowledge that will not only prep you for your CompTIA A+ exams but also amplify your understanding of the digital world. You'll learn to differentiate between the meticulous nature of TCP, with its insistence on a reliable connection, and the sprightly UDP, which favors speed over precision, perfect for your gaming and streaming pleasures.

Join me, Professor JRod, on this enlightening journey where we dissect the critical elements of flow and congestion control, ensuring your data doesn't just travel but arrives with finesse, be it through web browsing or file transfers. We'll reveal how the delicate dance of data packets is choreographed using the sliding window mechanism and congestion control strategies, helping you appreciate the robustness of networking. And for the tech enthusiasts, we'll unravel the mysteries of well-known TCP and UDP ports and their pivotal role in securing and managing our online activities. Tune in and become the networking connoisseur you were destined to be!

Support the show

If you want to help me with my research please e-mail me.
Professorjrod@gmail.com

If you want to join my question/answer zoom class e-mail me at
Professorjrod@gmail.com

Art By Sarah/Desmond
Music by Joakim Karud
Little chacha Productions

Juan Rodriguez can be reached at
TikTok @ProfessorJrod
ProfessorJRod@gmail.com
@Prof_JRod
Instagram ProfessorJRod

Mark as Played
Transcript

Episode Transcript

Available transcripts are automatically generated. Complete accuracy is not guaranteed.
Speaker 1 (00:28):
And welcome to technology.
Tap on, professor Jayrod.
In this episode we're going totalk about TCP versus UDP.
Let's get into it.
All right, guys?

(01:08):
Welcome.
For those of you who don't knowwho I am, my name is Professor
Jayrod and I do CompTIA podcaston how to, how, strategies for
the exam questions and topicsthat are under various A plus
network plus, security plusexams.
I'm now on tiktok.

(01:29):
Please, if you are a tiktok fan, go on tiktok.
Look for me, professor Jayrod.
I'm there.
I post like one question a daythat we can go over in the
strategies on how to answer thatparticular question.
So, if you want, look for me,search for me, professor Jayrod,
as J R O D and hit the likebutton.

(01:52):
Follow me on tiktok.
Watch the videos.
I put a couple of them upalready on CompTIA questions.
So it should be, you know,let's see if we can get that
that side of social media active.
And also, I want to wisheveryone a happy New Year.
It's happy New Year, guys.
It's the New Year's 2024.
I think it's now, it's the time, that you guys have decided

(02:15):
that yes, I'm going to take theplunge, I'm going to go and take
my CompTIA A plus exams andhopefully listening to these
podcasts would motivate you andhelp you take the CompTIA A plus
exams.
And if you do email me,professor Jayrod that's J R O D
at gmailcom Tell me that youpassed, tell me that you, you

(02:36):
know you took the and pass, andyou know if I helped you, you
can tell me that too.
I love receiving emails frompeople telling me that they
passed the CompTIA exams.
So this topic today we're goingto talk about TCP and UDP,
that's transmission controlprotocol and user data grant
protocol, which are both on thetransport layer of the OSI model

(02:58):
, that's layer four, and theyhave some key differences in
terms of their features andtheir behaviors and are kind of
like want to go over some ofthem.
So first we're going to talkabout connection oriented and
connection less.
The terms connection orientedand connection list refers to
two different fundamentalcommunication models used in

(03:21):
computer networking,particularly in the context of
transport layer protocols likeTCP and UDP.
So TCP is connection oriented.
So connection orientedcommunications involves the
establishment of a dedicatedlogical connection between the
sender and the receiver beforethe actual data transfer begins.

(03:42):
Right, and the characteristicsof these are reliability, which
ensures reliable and ordereddelivery of data.
Acknowledgements.
Uses acknowledgement to confirmthe receipt of the data.
And then error handling, whichperforms error checking and
retransmission of lost orcorrupted packets.
Also does flow control, whichimplements flow control

(04:05):
mechanisms to regulate the flowof data.
So, for example, that, as youmay or may not know, tcp
establishes a three wayhandshake and once the three way
handshake is completed, avirtual circuit is established
where it provides a reliable bystream communications.
So an example of this will beapplications that guaranteed

(04:27):
delivery and order datatransfers, such as transferring
files when you web browsing andparticularly email right when
you need to be very, veryreliable with email.
And then connection list, whichis route UDP.
Connection list communicationdoes not involve the prior
establishment of a dedicatedconnection before data

(04:48):
transmission.
There's no three way handshakeand characteristics, no
connection setup.
Data set without prior setup oracknowledgement, no reliable
guarantees.
Does not guarantee the deliveryor ordering of packets and low
overhead generally has loweroverhead due to the lack of can
connection setup and theacknowledgement process.

(05:10):
And if you look at someliterature on TCP, udp, you'll
see that the amount of data thatis in each one is vastly
different.
So an example of this is, again, like I said, udp sends data
without establishing aconnection does not provide
reliability features likeacknowledgement or transmission

(05:32):
and an example of this is isreal time application where low
latency is critical, such asstreaming media, online gaming
and VoIP right, they're justgonna send you the data, send
you the data, send you the datayou know.
They don't care if you areready for it or not, they're
just gonna just keep sending youthe data.

(05:52):
Situations where some data lossis acceptable and the emphasis
is on speed rather thanreliability.
That sounds like Netflix, right?
Or YouTube.
They just send you the data,send you the data, send you the
data.
Right.
Sometimes you may be watching aYouTube video and it kind of
skips.
That's UDP doing that.
So let's compare the both thepros and cons.

(06:15):
Connection oriented the pro isreliable and ordered data
transfer, error checking andcorrection and then flow control
for congestion management.
The cons is higher overhead dueto connection setup and
acknowledgement.
Connection less the pro islower overhead, faster
transmission, suitable forreal-time applications, and the

(06:35):
con is no reliability guaranteesand no error checking or
correction.
The choice between theconnection oriented and
connectionless communicationsdepend on the specific
requirement of the application.
Connection oriented protocolslike TCP are suitable for
applications that prioritizereliability, when connectionless

(06:58):
protocols like UDP, areappropriate for scenarios with
low latency and speed, are morecritical than guaranteed of
guaranteed delivery.
Next we're gonna talk aboutreliability as far as TCP is
concerned.
Reliability in TCP connectionoriented.

(07:18):
Tcp is connection orientedprotocol.
Reliable delivery ensuresreliable and ordered date
delivery of data.
Acknowledgment usesacknowledgement to confirm
successful with our receptionreceipt of data retransmission.
If the segment is lost or iscorrupt, tcp would retransmit it

(07:40):
sequence numbers, employeesequence numbers, to order to
receive data at the destination.
As error checking, tcp includeserror checking mechanism and if
errors are detected, thereceiver request trans
retransmission.
Flow control implements fullcontrol to prevent overwhelming
the receiver with too much data.

(08:01):
So an example of this will befile transfer, web, web browsing
again, email applications withaccurate and order data delivery
is crucial.
So you ever downloadingsomething and it says eight
hours.
You know to download this isfour hours and it says 20
minutes.
That's part of TCP.
That's TCP doing that.

(08:21):
Reliability in UDPconnectionless UDP is a
connectionless protocol.
It's no reliability guaranteesright doesn't doesn't guarantee
reliable delivery and there's noacknowledgement of data being
received ever handling.
Udp does not perform errorchecking or retransmission.
Any error detection andcorrection must be handled by

(08:44):
the application layer and it haslow overhead because of its
connectionless and the lack ofreliability.
Udp generally has loweroverhead compared to TCP.
Again, an example is streamingmedia, online gaming, when some
data loss is acceptable and lowlatency is more critical than
guaranteed delivery.
To summarize, this sectionprovides.

(09:07):
Tcp provides reliable and orderdelivery of data suitable for
applications with data integrityand order are critical.
And then your higher overheaddue to connection setup,
acknowledgement and errorchecking.
Udp does not guaranteedReliability or ordering of data
suitable for real-timeapplications where low latency

(09:28):
is more critical thanreliability and lower overhead
due to is connected list Dataloss.
I'm sorry, connection wasnature.
Next, with going on to the TCP,tcp, udp header size.
So TCP header is more extensivecompared to UDP, containing

(09:50):
several fields necessary forreliable and ordered data.
The size of a TCP header theminimum TCP header size is 20
bytes.
Additional options, such asmaximum segment size, window
scale, timestamps, can increasethe size of the header.
The maximum size of a TCPheader, including options, is 60
bytes.
Field.

(10:12):
It has source and destination,port numbers, sequence and
acknowledgement numbers, headerlength, flags, windows size for
flow control, check, some forerror detection, urgent pointer
and other options like howvariable length.
Udp header size is simpler andmore compact than the TCP header

(10:33):
Containing the essentialinformation for connection list
communication size is you cansee, I'm gonna tell you, you can
see there's a big difference.
The UDP header is a fixed sizeof eight bytes Field, source and
destination, port numbers,length field indicating the
length of the UDP header, anddata checks, some for error
detection, which is optional,and it can be set to zero for no

(10:57):
checks on.
So again to compare both TCPlarger header size, especially
when additional options areincluded.
More feature rich header tosupport reliability and
connection orientedcommunication.
Udp smaller, fixed header aminimal information suitable for
connection and low overheadcommunications.

(11:21):
Next we're gonna talk about flowcontrol in TCP.
Udp Flow controls a mechanismused to manage the rate of data
transmission between a senderand a receiver.
It ensures that the sender doesnot overwhelm the receiver with
data, preventing potentialpacket loss and ensuring smooth
communications.

(11:42):
So for TCP and TCP, flowcontrol is implemented using a
sliding window mechanism.
The receiver advertisesavailable buffer size to the
sender using the window sizefield in the TCP header.
The sender then adjuststransmission rate based on the
advertised window size to avoidoverlawing the receiver.

(12:03):
What's the purpose of this?
It prevents the sender fromtransmitting data at a faster
rate than the receiver canprocess.
Congestion control is amechanism used to prevent
network congestion, which occurswhen a demand for network
resources exceeds the availablecapacity.

(12:25):
It aims to avoid packet lossand ensure fair sharing of
network resources amongcompeting users.
So TCP congestion control.
Tcp uses various algorithms todetect and respond to congestion
, such as slow start, congestionavoidance and fast retransmit,
fast recovery algorithms.

(12:45):
These algorithms adjust thesending rate dynamically based
on network conditions, reducingcongestion and preventing
network collapse.
The purpose of all this is toavoid network congestion by
adjusting the transmission ratebased on perceived network
connections.
This is why you see it when youfirst start downloading
something, it's had a differentspeed when you end it.

(13:11):
Comparison primary scope isprimarily concerned with
communication between a specificsender and receiver.
Implementation involvesadjusting the rate of data
transmission based on thereceiver's buffer space, and the
goal is to ensure effective andreliable communication between
individual senders and receivers.

(13:31):
The control is the scopeconcerns the entire network and
multiple communicating entities.
Implementation involves theadjusting the transmission rate
based on network conditions toprevent congestions, and the
goal is to maintain overallnetwork stability with fairness,
preventing congestions relatedissues.

(13:52):
Tcp incorporates both flowcontrol and congestion control
mechanism.
Flow control is essential formanaging the rate between
individual sender, receiverparts providers.
Congestion controls helpprevent network wide congestions
and ensure fair utilization.
Flow control use case for filetransfers.

(14:17):
When large files aretransferred between a sender and
the receiver, flow controlensures that the sender does not
overwhelm the receiver's buffer, preventing potential loss when
you are web browsing and webcommunication.
Flow control helps manage therate of data transfer between a
web server and a client,ensuring loading of web pages

(14:39):
without overloading the client.
Email communications flowcontrol is important in email
communications to prevent thesender from transmitting emails
faster than the email client canprocess and display them, and
in streaming media and streamingapplications, such as video
streaming or online musicservice.
Flow control helps regulate thedelivery of data to ensure a

(15:03):
seedless and uninterrupted userexperience.
Congestion control some examplesof that internet traffic
management.
In the broader contents of theinternet, congestion control
mechanism prevent networkcongestions by adjusting the
transmission rate of multipleconnections, ensuring fair share

(15:23):
are available bandwidth Datacenter communications within
data centers.
When numerous servers anddevices communicate, congestion
control is vital to preventbottlenecks and ensure efficient
data transfer.
Voip voice over internetprotocol in real time
communication applications likeVoIP, congestion control helps

(15:45):
maintain low latency andprevents voIP quality the
degradation by avoiding anetwork congestion.
Online gaming online gamingapplication use congestion
congestion congestion congestioncontrol to ensure a smooth
gaming experience by preventinglags and delays caused by

(16:07):
network congestion and cloudcomputing and a cloud computing
environment with multiple usersand applications share resources
.
Congestion control preventsperformance issues and ensure
fair resource allocation Inscenarios where reliability and
order data delivery areessential, for example, file

(16:29):
transfer, web browsing, email.
Tcp flow control ensures thatdata is transmitted at a
manageable rate.
Tcp TCP's congestion controlhelps maintain network stability
and fairness in diverse andnetwork and dynamic network
environments.

(16:50):
We have the well known portsthat are used in TCP, udp.
As we know, ports arestandardized port numbers
assigned to specific service bythe internet assigned numbers
authority.
These ports are commonly usedfor well known services, making
them easier for networkadministrators and users to
identify and manage differentnetwork traffic.

(17:14):
Here are some examples of somewell known corresponding ports
and their services.
Well, first one we gonna talkabout, we're gonna mention, is
port 2021, which you should knowit before I answer it, before I
say right, ports 2021 is what?
Ftp, file transfer protocol?
And now, is that UDP or TCP?

(17:34):
Guys, what do you think it isTCP.
It is TCP.
Next, port 22.
And port 22 is what?
Ftp, file transfer protocol.
Thank you, what is it?
What is it?
That is correct?
It is secure a shell.
And now, is that TCP or UDP?
What do you think, guys?
It is TCP.

(17:58):
Next we have port number 23.
What's port number 23, guys?
All of these are?
You know, the ones are gonna bean 8 plus, that were plus a
security plus, so know them.
Port number 23 is telnet andthat is TCP.
Next is port number 25.

(18:19):
Anybody can tell me what port25 is?
Those in the back, what do youthink?
It is SMTP and it is TCP.
Next is port number of 53.
And is that?
What is 53 for number 53?
What is that?

(18:39):
That is domain name service.
And now, what protocols theyuse?
This one actually uses both.
This one actually uses both TCPand UDP, and then one day we'll
talk about DNS and then, wellwe'll, we'll get it into a

(18:59):
little bit of a deep diver onthat.
Next we have port 80.
Everybody should know this one,right?
This is the easiest one.
This should be like the firstone that you learned.
And it is Http, right,hypertext transfer protocol.
Now, is that UDP or TCP.
What do you think it is?
Tcp?
Port number 110.

(19:23):
Port number 110 what do youthink that is, guys?
What do you think that is From?
Give you the answer, take aguess.
Port number 110 is pop 3 postoffice protocol, and that
protocol uses TCP.
Next, port number 143 143 guys,what's 143?
143 is HTTPS, right, http,secure, and that uses TCP.

(19:52):
Port number 161 and 162 whichwhat protocol is that?
Anybody know?
This one is a little harder.
It is SNMP, simple networkmanagement protocol, and that
uses UDP.

(20:13):
Next is port number 389 389 guys.
What port number is 389?
Anybody know?
Goes in the back, yell it outoh, port number 389 is LDAP,
lightweight directory accessprotocol, and that uses TCP.

(20:34):
Then we have port 514, port 514this is a tough one.
Port 514 Anybody know what thatone is for?
514?
That is Cislog, right,protocols are UDP and TCP.

(20:54):
Next we have port number 636.
Anybody know what that is 636?
No, it's LDAP S, ldap over SSL.
And then again, that also usesTCP.
And the last one is port numberat 993 993.

(21:19):
Guys, you guys know what thatis.
993 993 is IMAP over SSL, andthat also uses TCP.
These well-known portsfacilitate the standardization
of network services Allowingdevices and applications to
communicate with each otherusing established port

(21:40):
assignments.
While these ports areassociated with specific
services, it is important tonote that applications can
sometimes use non-standard portsor dynamically assigned ports
for communication.
All right, we got some moreports.
Port 67 this one you shoulddefinitely know port, especially
if you took my class right.

(22:00):
Port number 67 what is that?
It is DHCP, dynamic hostconfiguration protocol.
I and is that TCP or UDP?
Yeah, that's UDP, you wouldthink is TCP.
No, but it's, it's UDP.
So I'm yeah, I'm sure some ofyou are shocked.

(22:23):
Port number 69.
Port number 69 anybody outthere know what port number 69
is?
No, port number 69 is transferfiles, I'm sorry, trivia file
transfer protocol.
It uses UDP also.

(22:44):
Next, this is the easiest portnumber that you could remember
in your life.
If you ever get this wrong onthe test, shame on you, because
this is the easiest port numberto remember.
Port one, two, three.
What's the?
What's the name?
What's the service?
What's the name of port numberone, two, three.
That's an easy one.
That's like a gimme, guys.
If you don't know that one, youknow you need to go back to

(23:08):
your notes.
That's network time protocol,network time protocol and it's
easy to remember, right, becauseit's time.
We know one, two, three time,right, very easy to remember.
Then we have the last one isport number 514, which we, which
is syslog, and that's also.
That's both UDP and TCP, alongwith SNMP.

(23:31):
That's also both.
So please know why these portsare commonly associated with
specific services using usingUDP.
Some applications may usenon-standard ports or
dynamically assigned ports forUDP communication.
Additionally, some services,such as DNS, uses both when UDP

(23:51):
typically being used forlightweight queries and
responses.
So, alright, so hopefully thatwas a good, that was a good
topic, right, udp, tcp not a lotof people know that and it's a
very, very, very important partof IT and it's, you know, it's
part of the OSI model, it'slayer four of the lowest of the

(24:14):
OSI model, has to do with the,the transport layer, and it.
It has in its packet the portnumber that it's assigned to it.
So it's, it's a very importantthe Topic that that we need to
understand in in in IT and youknow computers and CompTIA and a

(24:35):
plus, not it.
Now, I doubt very much you'regonna talk about that at work,
about TCP and UDP, but you mayneed as you go along in your
career Right now.
You're gonna have to go throughthe process of going along in
your career, right, because youknow there's this TCP Flooding
right that they do.
So you may know you may need toknow about TCP, right.

(24:58):
This is not the most glamoroustopic and you might say, wow,
this is.
You know this is a little biton the boring side and it is,
but you know they're, they willattack, right, they would do
that attack where with thethree-way handshake doesn't get
completed, only the two-way.
It only stops at the secondhandshake and it just, and then
it just keeps doing it and thenthe third handshake never

(25:19):
completes and then your systemis it's done after a while once.
They do it a bunch of times.
So it's an important aspect ofAll by T, though it may not be,
you know, anybody's favoritething, or it might be a little
bit boring, or even afterlistening to these podcast, you
may still not understand what itdoes, what it means.
But this is just a, you know,just to tip your toe, toe in the

(25:43):
water kind of thing and and seeif, if you can at least start
to familiarize yourself with TCPUDP, because it's, you know,
it's very important.
The example that I like to givein class, if anybody ever taken
any of my classes is.
I like to have one studentStand at one end of the

(26:03):
classroom and I'm on the otherend and I have a bunch of
markers in my hand and then Istart tossing them to the
student on the other side.
But I first I say hey, are youready?
And then they say yes.
And then I toss them the firstone and they say hey, are you
ready?
And they say yes, and I tossthem the second one.
They say hey, are you ready?
They say yes, and I toss themand I continue tossing them.
Then I grab the markers back westill in the same position and

(26:26):
then I start tossing the markersat the person.
If he drops it, I don't care,I'm not waiting for him to pick
it up to throw the other marker,I'm just gonna throw the.
I do it underhand, of course,right not to get hurt.
And then I just keep throwingthe markers and after a while he
stops Catching them right.
That's how TCP and UEP works.
That's how that's the examplethat I like to show my students

(26:49):
like a visual example.
May not be the best example,but it's a fun example and it
gets a lot of laughs in theclassroom, so I'll take it.
I'll take it if it's gonna makemy students laugh, I'm all
there for it.
All right, that's gonna put abow on this episode.
Thank you for listening andremember to follow me on tiktok.

(27:14):
I'm on tiktok.
Just search for professor J rodJROD and you would find me.
Take a look at some of thevideos that I put up there.
Hit the like button, please,and follow me.
I'm trying to get enoughfollowers for I can do a live
stream and we can do a wholebunch of questions live.
Appreciate it and until nexttime.
This is this has been a littletouch of productions Art by

(27:48):
Sarah music by joking.
If you want to reach me, youcan email me, professor J rod.
That's Uh J R O D I gmailcom.
I'm also an Instagram atprofessor J rod and I'm on
tiktok.
Search for me, professor J rod.
Advertise With Us

Popular Podcasts

Crime Junkie

Crime Junkie

Does hearing about a true crime case always leave you scouring the internet for the truth behind the story? Dive into your next mystery with Crime Junkie. Every Monday, join your host Ashley Flowers as she unravels all the details of infamous and underreported true crime cases with her best friend Brit Prawat. From cold cases to missing persons and heroes in our community who seek justice, Crime Junkie is your destination for theories and stories you won’t hear anywhere else. Whether you're a seasoned true crime enthusiast or new to the genre, you'll find yourself on the edge of your seat awaiting a new episode every Monday. If you can never get enough true crime... Congratulations, you’ve found your people. Follow to join a community of Crime Junkies! Crime Junkie is presented by audiochuck Media Company.

24/7 News: The Latest

24/7 News: The Latest

The latest news in 4 minutes updated every hour, every day.

Stuff You Should Know

Stuff You Should Know

If you've ever wanted to know about champagne, satanism, the Stonewall Uprising, chaos theory, LSD, El Nino, true crime and Rosa Parks, then look no further. Josh and Chuck have you covered.

Music, radio and podcasts, all free. Listen online or download the iHeart App.

Connect

© 2025 iHeartMedia, Inc.