Hamid Salamat on LinkedIn: #hamid_salamat #tcpip #networking #protocols | 15 comments (2024)

Hamid Salamat

𝑫𝒂𝒕𝒂 π‘ͺ𝒆𝒏𝒕𝒆𝒓 π‘΅π’†π’•π’˜π’π’“π’Œ π‘«π’†π’”π’Šπ’ˆπ’π’†π’“ | Cisco Network | Microsoft | Cybersecurity | Cloud Computing and Data Center Infrastructure Engineer

  • Report this post

Speed Demon vs. Organized Archivist: Choosing the Right Protocol for Your DataEver wondered how data travels smoothly across the internet?It all comes down to protocols like TCP, UDP, and SCTP! Let's break it down:🌟 TCP (Transmission Control Protocol): The reliable workhorse.- Ensures data arrives complete and in order, like a careful package delivery person.- Uses a state transition diagram to manage connections, making it more complex but perfect for tasks like file transfers. 🌟 UDP (User Datagram Protocol): The speedy but carefree adventurer. - Prioritizes speed over order and error-checking, ideal for real-time applications like video streaming.- Doesn't have a state transition diagram because it focuses on sending data packets independently. 🌟 SCTP (Stream Control Transmission Protocol): The multi-talented athlete. - Combines reliability with the ability to handle multiple data streams within a single connection.- More complex state transition diagram due to its advanced features, making it suitable for web browsing and file transfer with different data types. ️Choosing the right protocol is like picking the perfect tool for the job! ⁉ Have you ever encountered a situation where choosing the right protocol made a significant difference?#hamid_salamat #TCPIP #networking #protocols

  • Hamid Salamat on LinkedIn: #hamid_salamat #tcpip #networking #protocols | 15 comments (2)

39

15 Comments

Like Comment

Hamid Salamat

𝑫𝒂𝒕𝒂 π‘ͺ𝒆𝒏𝒕𝒆𝒓 π‘΅π’†π’•π’˜π’π’“π’Œ π‘«π’†π’”π’Šπ’ˆπ’π’†π’“ | Cisco Network | Microsoft | Cybersecurity | Cloud Computing and Data Center Infrastructure Engineer

1w

  • Report this comment

TCP/IP state transition diagramThe TCP/IP state transition diagram outlines the possible states a TCP connection can take, as well as the events and actions that cause transitions between them. These states include CLOSED, where no connection exists; LISTEN, where a server waits for incoming connection requests; SYN-SENT, where a client sends a connection request to a server; SYN-RECEIVED, where a server receives a connection request from a client; ESTABLISHED, where data can be exchanged; FIN-WAIT-1, where one host initiates termination of a connection; FIN-WAIT-2, where one host receives an acknowledgment for its FIN segment; CLOSE-WAIT, where one host receives a FIN segment from the other host; CLOSING, where both hosts send FIN segments and wait for acknowledgments; LAST-ACK, where one host sends the final acknowledgment for a FIN segment and waits for an acknowledgment from the other host; TIME-WAIT, where one host waits for a period of time after sending the final acknowledgment to ensure that the other host received it; and CLOSED, the final state in which the connection is terminated.

Like Reply

1Reaction

Hamid Salamat

𝑫𝒂𝒕𝒂 π‘ͺ𝒆𝒏𝒕𝒆𝒓 π‘΅π’†π’•π’˜π’π’“π’Œ π‘«π’†π’”π’Šπ’ˆπ’π’†π’“ | Cisco Network | Microsoft | Cybersecurity | Cloud Computing and Data Center Infrastructure Engineer

1w

  • Report this comment

UDP state transition diagramThe User Datagram Protocol (UDP) is another transport layer protocol in TCP/IP, but it is different from TCP in that it does not provide reliability, ordering, or error-checking. UDP is a connectionless protocol, which means that it does not establish, maintain, or terminate connections between endpoints. UDP simply sends and receives datagrams, which are packets of data with a source and destination address. Therefore, UDP does not have a state transition diagram, as it does not have any states or transitions. UDP is suitable for applications that require fast and efficient data transmission, but can tolerate some data loss or disorder, such as video streaming, voice over IP, or online gaming.

Like Reply

1Reaction

Hamid Salamat

𝑫𝒂𝒕𝒂 π‘ͺ𝒆𝒏𝒕𝒆𝒓 π‘΅π’†π’•π’˜π’π’“π’Œ π‘«π’†π’”π’Šπ’ˆπ’π’†π’“ | Cisco Network | Microsoft | Cybersecurity | Cloud Computing and Data Center Infrastructure Engineer

1w

  • Report this comment

SCTP state transition diagramThe Stream Control Transmission Protocol (SCTP) is another transport layer protocol in TCP/IP, but it differs from both TCP and UDP in that it provides multiple streams of data within a single connection. SCTP is a connection-oriented protocol, which establishes, maintains, and terminates connections between endpoints. It uses a state transition diagram to illustrate how it manages connections and is more complex than TCP's, involving multiple streams, associations, and chunks. These states are CLOSED, COOKIE-WAIT, COOKIE-ECHOED, ESTABLISHED, SHUTDOWN-PENDING, SHUTDOWN-SENT, SHUTDOWN-RECEIVED, SHUTDOWN-ACK-SENT and CLOSED. This protocol is suitable for applications that require reliable and ordered delivery of data but also need to support multiple streams of data with different characteristics like web browsing, email, or file transfer.

Like Reply

1Reaction

Cedric Lee🧬(DNA Storyteller)

🎯 Helping people & businesses unlock potential through their unique DNA | 2x Community Top Voice | Startup Founder | Bio-hacker

1w

  • Report this comment

Loved your analogies, Hamid Salamat! Ever thought about how these protocols would fare in outer space communications? πŸš€ TCP might struggle with Mars' delay and disruption patterns. Meanwhile, UDP could shine for real-time data from rovers, despite its drawbacks. It's like picking your travel buddy for a Mars mission - you need someone who can handle the unexpected without losing their cool. Haha

Like Reply

1Reaction 2Reactions

WinSavvy

1w

  • Report this comment

Choosing the right protocol is like selecting the right tool from your toolboxβ€”essential for smooth data transmission! I've had experiences where opting for TCP ensured my files arrived intact and in order, just like I intended. However, UDP's speed was a game-changer for real-time applications like video streaming, where every second counts! It's all about matching the protocol to the task at hand for optimal results.

Like Reply

1Reaction 2Reactions

Chris Notley

1w

  • Report this comment

Nice post Hamid, I like the simple descriptions 😎I’ve seen an example of the opposite, where some engineers tried (badly) to make UDP a kind of pseudo-TCP. Funnily enough they didn’t do a great job πŸ˜‰

Like Reply

1Reaction 2Reactions

Pezhman Zamani

Contracts & Claim Manager | Investment Opportunities Advisor | Management Consulting

1w

  • Report this comment

Thanks for sharing these information

Like Reply

2Reactions 3Reactions

Zayn S.

Turning ideas into digital platforms and experiences, Relentlessly.🦚 World's first Zilli (2B)Chasing Web5, XR, VR, AR, BR & MR πŸ₯½Platform Architect πŸͺ„Startup Genie βœ¨πŸ‰ Connect to Grow πŸ“ˆ Design | Disrupt

1w

  • Report this comment

Nice. Let's connect 🌼

Like Reply

1Reaction 2Reactions

See more comments

To view or add a comment, sign in

More Relevant Posts

  • Dhivya shree

    Attended Sns Dr rajalakshmi college of arts and science

    • Report this post

    #snsinstitutions #snsdesignthinkers #snsdesignthinking User datagram protocalUser Datagram Protocol (UDP) is a Transport Layer protocol. UDP is a part of the Internet Protocol suite, referred to as UDP/IP suite. Unlike TCP, it is an unreliable and connectionless protocol. So, there is no need to establish a connection prior to data transfer. The UDP helps to establish low-latency and loss-tolerating connections establish over the network.The UDP enables process to process communication.Source Port: Source Port is a 2 Byte long field used to identify the port number of the source.Destination Port: It is a 2 Byte long field, used to identify the port of the destined packet.Length: Length is the length of UDP including the header and the data. It is a 16-bits field.Checksum: Checksum is 2 Bytes long field.

    • Hamid Salamat on LinkedIn: #hamid_salamat #tcpip #networking #protocols | 15 comments (15)
    Like Comment

    To view or add a comment, sign in

  • IT Equipment Coordinator | Aspiring IT learner and GRC protector | Wish to be asset to an organization utilizing techincal and soft skills

    • Report this post

    Out of all the Network layers Transport Layer is my favorite with TCP and UDP #networkprotocols. Some of the notes from my class #computernetworking TCP(Transmission Control Protocol) is full-featured protocol as it provides reliability, flow control and ensures that all of the data arrives at the destinationUDP(User Datagram Protocol) is a conncetionless protocol as it does not provide reliability or flow controlThanks to my teacher Sergio Calderon always being so helpful and reliable to the class like TCP protocol🀝

    7

    Like Comment

    To view or add a comment, sign in

  • Tkxel

    160,039 followers

    • Report this post

    Lost in the web of protocols? Our Upskill session was all about learning how to navigate the web of protocols.πŸš€Key Insights:-The layers of common protocols – HTTP, TCP/IP, and beyond .-Demystify the symbiotic relationship between protocols and connectivity.-Acquire a nuanced understanding of optimising protocol usage.Be a problem-solver with Upskill!🌟#protocols #tkxelupskill #learntogrow #learntosucceed #upskillforfuture #upskill #tkxel

    80

    2 Comments

    Like Comment

    To view or add a comment, sign in

  • CyberCureME - Cyber Security Marketplace

    7,906 followers

    • Report this post

    Electrolink FM/DAB/TV Transmitter Pre-Auth MPFS Image Remote Code Execution: Electrolink FM/DAB/TV Transmitter allows access to an unprotected endpoint that allows an MPFS File System binary image upload without authentication. The MPFS2 file system module provides a light-weight read-only file system that can be stored in external EEPROM, external serial Flash, or internal Flash program memory. This file system serves as the basis for the HTTP2 web server module, but is also used by the SNMP module and is available to other applications that require basic read-only storage capabilities. This can be exploited to overwrite the flash program memory that holds the web server's main interfaces and execute arbitrary code.

    Electrolink FM/DAB/TV Transmitter Pre-Auth MPFS Image Remote Code Execution packetstormsecurity.com
    Like Comment

    To view or add a comment, sign in

  • Reda Cherkaoui

    Blockchain Developer | Full stack | JS | Solidity

    • Report this post

    🚦 TCP and UDP: Traffic Directors in the Digital World! 🌐Transport Layer (Layer 4).TCP (Transmission Control Protocol):Think of TCP as a meticulous postman. When your computer wants to send a message or data, TCP ensures it reaches the destination intact and in the correct order.It's like sending a letter and making sure the recipient gets all the pages and reads them in order.UDP (User Datagram Protocol):Now, UDP is more like a speedy courier. It delivers messages quickly but might not guarantee they arrive perfectly. It's great for things like live video streaming where a slight delay is okay.It's like sending postcardsβ€”quick and efficient, but not always ensuring every detail.🀝 Three-Way Handshake: The Digital Greeting! 🀝"Hey, You There?" (SYN): Your device says to the other, "Can we talk?" This is the SYN (Synchronize) message."Yeah, I'm Here!" (SYN+ACK): The other device responds, "Sure, let's talk!" This is SYN+ACK (Synchronize-Acknowledge)."Let's Chat!" (ACK): Your device confirms, "Great, let's start talking!" This is ACK (Acknowledge).It's like a polite digital handshake before a conversation begins. TCP uses this to establish a reliable connection, making sure both devices are ready to exchange information.In summary, TCP and UDP are like different types of mail services, and the Three-Way Handshake is the digital introduction before they start sharing information! πŸ“¬πŸŒ

    Like Comment

    To view or add a comment, sign in

  • Muhammad Ishaq

    Network Administrator in Dev Sky

    • Report this post

    UDP (User Datagram Protocol) is known for being faster and more up-to-date, yet many systems still rely on TCP (Transmission Control Protocol) to download batches of information. Users will need to take a look at their specific IP needs to make an informed decision about which protocol is best for them.#communication #internet

    • Hamid Salamat on LinkedIn: #hamid_salamat #tcpip #networking #protocols | 15 comments (26)
    Like Comment

    To view or add a comment, sign in

  • Summayah Ganiyu

    Bsc Chemistry || JavaScript

    • Report this post

    User datagram protocol (UDP) is one of the communication protocols of the Internet protocol suite used to send messages to other hosts on an Internet Protocol network. Within an IP network, UDP does not require prior communication to set up communication channels or data paths. UDP, is a communication protocol used across the Internet for especially time-sensitive transmissions such as video playback or DNS lookups. Messages uses this protocol need to be verified it's working perfectly because it's not a yes or no protocol. #careerdemy Careerdemy Archibong Edet

    6

    Like Comment

    To view or add a comment, sign in

  • Celine Okoye

    Technical Support Engineer| Data Engineer

    • Report this post

    Network Services: The Router and NAT.A router inspects the contents of an IP datagram, decrement the TTL(Time To Live) by one, recalculate the Checksum and forward the rest of the data at the network layer without touching it.NAT(Network Address Translation), the router rewrites the source IP address.#networkinfrastructure #computernetworking #computerscience #osimodel #technicalsupport

    2

    Like Comment

    To view or add a comment, sign in

  • Viraj Adiga

    Software Engineer | Problem Solver | Hackerrank 6 stars | Backend engineer | Python | Django | Java | Spring boot | System Architecture | Kubernetes | Docker | Cloud engineer | Microservices

    • Report this post

    In my last few posts, I have talked about how TCP manages lost segments and retransmission using sequence numbers and acknowledge numbers. What if segments are received in correct order, but are corrupted. How does TCP know what segments are corrupt and need to be discarded?Checksum comes to rescue here. When TCP layer of sender wants to send a TCP segment, it calculates something called checksum using the same segment's headers and data and attaches it to the same segment as a header, then transmits it. At the receiver end, TCP uses same algorithm as the sender to recalculate the checksum again. Two checksums, one computed by the receiver, another sent by the sender as TCP header are compared. If they match, it proves that the segment sent is valid and not corrupted, if not, the receiver discards the segment without sending acknowledgement to the sender. Sender triggers a retransmission if acknowledgement is not received within a precalculated time and the segment is retransmitted. All these things make TCP a robust protocol and that the data is delivered in a reliable way.#computernetworks #computernetworking #computerscience #problemsolving #tcp #tcpip #http #learningeveryday

    12

    Like Comment

    To view or add a comment, sign in

  • Bhaskar Debnath

    Work in Network Domain| Still learning.

    • Report this post

    NAT Virtual Interface.ip nat inside or ip nat outside = ip nat enable. "Ip nat enable" this command is used to enable NAT on an interface. This command automatic figures out whether the interface is inside or outside based on the source IP addresses of packets.From IOS version 12.3(14)T, Cisco has introduced a new feature called NAT Virtual Interface.NVI removes the requirements to configure an interface as either NAT inside or NAT outside.In this lab using NAT Overload:Use the command "ip nat source list {} interface {} overload" without specifying the inside or outside tag and enable the nat to the interfaces using the command "ip nat enable".To check NVI statistics and translations use these commands.show ip nat nvi translationsshow ip nat nvi statisticsNote:Nvi interface is used ONLY when the β€˜ip nat enable’ is enabled.Stateful Network Address Translation (SNAT) is not supported.ip nat enable cannot translate local router traffic.

    51

    Like Comment

    To view or add a comment, sign in

Hamid Salamat on LinkedIn: #hamid_salamat #tcpip #networking #protocols | 15 comments (35)

Hamid Salamat on LinkedIn: #hamid_salamat #tcpip #networking #protocols | 15 comments (36)

1,387 followers

  • 61 Posts

View Profile

Follow

Explore topics

  • Sales
  • Marketing
  • Business Administration
  • HR Management
  • Content Management
  • Engineering
  • Soft Skills
  • See All
Hamid Salamat on LinkedIn: #hamid_salamat #tcpip #networking #protocols | 15 comments (2024)

References

Top Articles
Latest Posts
Article information

Author: Ray Christiansen

Last Updated:

Views: 6633

Rating: 4.9 / 5 (69 voted)

Reviews: 92% of readers found this page helpful

Author information

Name: Ray Christiansen

Birthday: 1998-05-04

Address: Apt. 814 34339 Sauer Islands, Hirtheville, GA 02446-8771

Phone: +337636892828

Job: Lead Hospitality Designer

Hobby: Urban exploration, Tai chi, Lockpicking, Fashion, Gunsmithing, Pottery, Geocaching

Introduction: My name is Ray Christiansen, I am a fair, good, cute, gentle, vast, glamorous, excited person who loves writing and wants to share my knowledge and understanding with you.