The software company have the requirement of sent massive volumes of data and there is a confusion for selection of the TCP or the UDP protocol for sending the data packets in the network. For the selection of the protocol for sending the data packets in the network the following functionality of both the protocol is analyzed.
Functionality |
TCP |
UDP |
Reliability |
The data reaches the destination address as the same sequences as sent from the senders end and the data packets remains intact |
There is less possibility that the data packets would reach the destination address as the same sequences sent from the senders end. |
Ordering |
The data packets are rearranged when sent to the receiver |
The data packets are sent independently and the sequence does not managed on the application layer of the OSI model. |
Connection |
It is a connection oriented protocol |
It is a connection less protocol |
Transfer Methodology |
The messages in the TCP protocol are sent in stream of bytes and |
The data packets are sent individually and the integrity are checked on receiving of the data packets. |
After the analysis of the protocol it has been found that for long distance communication where there are multiple paths available for the data packets to reach the destination address the TCP protocol can be used because the using the UDP protocol the data packets may get lost and thus cause corruption of the data.
Advantages of TCP protocol-
Disadvantage of TCP protocol-
Advantage of UDP protocol-
Disadvantage of UDP protocol-
The SMTP protocol is used for sending and receiving email over the network and the messages can be sent in queues using the SMTP protocol. The POP3 and the IMAP protocols are used with the SMTP protocol for proper working and saving the messages in the mailbox server and download them when needed. A program is used by the SMTP protocol for operating over the internet and a specific port address is used for transferring the mail. The SMTP protocol is used for the outgoing of the email through the mail server and POP3/IMAP is used for configuring the incoming server and receive the email from another client.
The three services that are used for the configuration of the email server and controlling the exploitation of the application protocol. A mail process model is required to be implemented and a mail submission agent is required to be used and the SMTP protocol can be implemented using the TCP port 587 for allowing the transmission of the emails over the network. Configuration of the server with the SMTP and the mail agent process is required to be used for local processing and configuration is required to be done on a single machine.
The message passing is used for sending messages using different communication channels and different communication protocols. The messages can be sent using synchronous and asynchronous techniques and encapsulation is required to be enabled making the system more efficient. The store v forward model can also be implemented for configuration of the email server and delivering and storing the emails from the email server. Multipurpose Internet mail Extension can also be used for setting the characters and enabling the multimedia contents to be attached using the emails. The DNS server is also required to be configured and enabling the message transfer agents to communicate with the message delivery agents.
The TCP protocol RFC4022 is also termed as TCP-MIB and it is based on SNMP and new features and it contains the extension of the MIB-2 tcp group. The connection table are defined using the protocol and it is used by the IPv4 connections and the connection state can be identified using the connection. The local address, local port and the remaddress can be fetched using the protocol and the object identifier is used for the implementation in the current framework of the network. The mib file is read and the tree is fetched using the command and loaded into the system. The IP forwarding rules can be set using the protocol and the resource hosts can be included for analysis of the load of the network.
The transition rules can be set and for disabling the creation of the rows and thus reducing the risk of confliction of the data. The password policy and the account lock policy is required to be setup. The data link layer consists of the different protocols and the methodology for interconnecting the nodes connected in the network and ARP protocol is used for the resolution of the address of the nodes connected in the network. The networking layer is used for transportation of the data packets across the network using the transport layer. The transport layer is used for handling the flow of data and increase the reliability of the network. The TCP and the UDP protocol works on the transport layer and the SMPTP protocol works on the application layer of the network.
The following figures is used for demonstration of the exchange of the data packets over time using the data flow graph in wire shark. The TCP protocol and division of the segments for identification of the data content, sequence number and the acknowledgement number required for transfer of data packets in the network. The acknowledgement is send to the destination address and then received for establishing the connection. The connection used is the TCP and is connection oriented. The sequence 1 and acknowledgement 1 is used for sending request sequence 1 and acknowledgement 2 is used for receiving data packets. The sequence 2 acknowledgement 2 is used for sending the final acknowledgement and establishment of the connection. The following figure is used for demonstration of the establishment of the connection between the google.com.
Exchange of the data packets over time (Timers are set correctly)
The layers of the OSI layer in which the DNS protocol works is the application layer and it can be used for the identification of the address and the services used by the network protocols using a directory service. Wireshark network protocol analyzer can be used for the tracing DNS file and filtering specific DNS transaction and identification of the response time. The performance of the DNS server can be analyzed using the packet captured and the abnormal behavior of the DNS can be identified. When the URL google.com is typed in the address bar of the web browser the webpage loads and appears in the web browser and if it takes more time to load the webpage it may occur due to poor response of thee DNS server and it can be verified using the packet capture file. The .pcap file can be filtered using the dns and only the dns packets can be seen for understanding the behavior and the problem.
The netflow is used for monitoring the traffic flow in a network and the IOP address of the network traffic can be collected using the protocol. The flow caching, data analyzer and the flow collector are the three components that builds the netflow. The netflow packets can be utilized for finding the source and the destination address of the data packets send over the network and the interface number of the input and the output packets. The TCP_Flag and the ToS can also be found along with the time stamp and the total bytes of flow in the network. The flow collector is utilized for collection, storage and filtering of the data. The history of the information flow in the network can be obtained from it. The data analyzer is utilized for presentation of the data for different purposes.
References
Badonnel, R., Koch, R., Pras, A., Drašar, M. and Stiller, B. eds., 2016. Management and Security in the Age of Hyperconnectivity: 10th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2016, Munich, Germany, June 20-23, 2016, Proceedings (Vol. 9701). Springer.
Batalla, J.M. and Krawiec, P., 2014. Conception of ID layer performance at the network level for Internet of Things. Personal and Ubiquitous Computing, 18(2), pp.465-480.
Cruz, R., Nunes, M., Xia, J., Huang, R., Taveira, J. and Lingli, D., 2016. Peer-to-Peer Streaming Tracker Protocol (PPSTP) (No. RFC 7846).
Duke, M., Blanton, E., Zimmermann, A., Braden, R. and Eddy, W., 2015. A roadmap for transmission control protocol (TCP) specification documents.
Fenner, B., 2017. The IPv6-Specific MIB Modules Are Obsolete (No. RFC 8096).
Hoque, N., Bhuyan, M.H., Baishya, R.C., Bhattacharyya, D.K. and Kalita, J.K., 2014. Network attacks: Taxonomy, tools and systems. Journal of Network and Computer Applications, 40, pp.307-324.
Huh, J.H. and Seo, K., 2016. Design and test bed experiments of server operation system using virtualization technology. Human-centric Computing and Information Sciences, 6(1), p.1.
Malik, M.H., Aydin, M., Shah, Z. and Hussain, S., 2014, June. Stochastic model of TCP and UDP traffic in IEEE 802.11 b/g. In Industrial Electronics and Applications (ICIEA), 2014 IEEE 9th Conference on (pp. 2170-2175). IEEE.
Sanders, C., 2017. Practical packet analysis: Using Wireshark to solve real-world network problems. No Starch Press.
Singh, S.K., Duvvuru, R. and Singh, J.P., 2014. Performance impact of TCP and UDP on the Mobility Models and Routing Protocols in MANET. In Intelligent Computing, Networking, and Informatics (pp. 895-901). Springer, New Delhi.
Welzl, M., Islam, S., Hiorth, K. and You, J., 2016. TCP in UDP. Internet Engineering Task Force, Internet-Draft draft-welzl-irtf-iccrgtcp-in-udp-00.
Wu, K.Y. and Wu, T.C., Trend Micro Incorporated, 2016. Network application classification for network traffic management. U.S. Patent 9,253,068.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order form