TCP and UDP Differences Case Study 2022

Verified

Added on  2022/09/26

|11
|2638
|21
AI Summary
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: YOUR NAME AND STUDENT NUMBER 1
Title: TCP, UDP, and DNS
Author Name:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Your Name and student number 2
Statement of Authorship
I, STUDENT NAME, STUDENT NUMBER certify that this material is my original work. No
other person's work has been used without due acknowledgment. I have not made my work
available to anyone else.
Document Page
Your Name and student number 3
Introduction
A computer never understands human language. So if we want to open a website in a browser we
type in English which is a human language. So how the computer does loads it if it doesn't
understand the human language. This happens with the help of DNS. All the websites have their
unique IP addresses. As we want to search for a website the DNS looks for its IP address in the
data as well as loads the IP address of that particular website. User Datagram Protocol (UDP) is
an alternate communication protocol for Transmission Control Protocol (TCP) that is used
primarily to establish low-delay as well as loss-tolerance connections between applications on
the Internet.
Document Page
Your Name and student number 4
Section 1 TCP and UDP
Definition and Purpose of TCP and UDP
In computer networks, there are two types of Internet Protocol (IP); they are TCP (Transmission
Control Protocol) as well as UDP (User Datagram Protocol). Both are used to transfer data
among networks. TCP is connection-oriented as well as UDP is connectionless. Both the
protocols are important as either one of them become appropriate depending on the
circumstances. TCP is slow as well as congestion prone because of a lot of back as well as forth
traffic but reliable as well as on the other hand UDP is fast but unreliable. So where we need
speed as well as less of error checking we will go for UDP (broadcasting as well as online
games) whereas we will go for TCP if we need error checking as well as flow control (critical
applications where data loss or errors are very damaging) (Bukohwo M., 2016).
Technical description of how it works and what it is used for
TCP / IP for IP Version 4 (IPv4) is a suite of network protocols that allows Microsoft Windows
users to communicate with other computers over the Internet. It interacts with Windows name
services such as DNS as well as primarily security technologies such as IPSec. This can help to
ensure that IP packets between machines are successfully forwarded as well as safe.
There is not any special case like in the same building or in separate. TCP/IP protocol works the
same for both scenarios. Now let's check what it does actually?
TCP/IP is a connectionless protocol; here no acknowledgment is needed to the sender that is why
it is called unreliable communication. It gives end to end connection. TCP/IP carries the
information from one process running on a computer to another process running on any other
computer in any network.
UDP remains for User Datagram Protocol. UDP gives a questionable bundle conveyance
framework based on the IP convention. Similarly, as with IP, every bundle is an individual, as
well as is dealt with independently. Along these lines, the measurement of information that can
be sent over UDP parcel is limited to the sum that can be included in a single IP bundle.
Therefore, the UDP parcel can contain up to 65507 bytes (this is an estimate of the 65535-byte
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Your Name and student number 5
IP bundle, which reduces the estimate of the 20-byte base IP header as well as the estimate of the
8-byte UDP header).
Source - (Rajkumar & Swaminathan, 2015)
The UDP bundle can operate on-demand or in some way. There is no previous or next bundle
information for any packages. The sender doesn't recognize the package, so the sender doesn't
know that the sending did. UDP has no stream control mechanism—it is possible to get a parcel
faster than it is used. This type of communication is called connectionless because the bundles
are not related to each other, as well as because they are not in a state (Rajkumar &
Swaminathan, 2015).
Technical Limitation
1. Since the OS has completed all the work, if the OS has a bug, you will face a variety of
problems, not just downloading from the Internet, but also surfing issues.
2. TCP is not available for multicast as well as broadcast connections.
3. No UDP certification. The bundle or packet may not be carried, carried twice, or not
carried in time.
Document Page
Your Name and student number 6
4. The information must be physically divided into parcels (Silva & Alves, 2014).
Security and privacy concerns
TCP provides a wide range of error checking mechanisms. This is to provide flow control as well
as data acknowledgment. UDP has only a basic error checking mechanism using checksums.
Historical vs. Current Use
1. The historical, as well as current uses are the same, as well as the working conditions are
the same for both protocols.
2. UDP provides reliability, ordering, or data integrity using a simple transmission model
that does not contain an implicit handshake dialog. As a result, UDP services are
unreliable, as well as packets may not arrive in order, appear to be duplicated, or
disappear without warning.
3. Although this method does not guarantee that the data being sent will even reach the
destination, it is common for services that have very low overhead as well as do not need
to function from the beginning ("What is the difference between UDP and TCP internet
protocols? - nixCraft", 2020).
Section 2 DNS
Definition and Purpose of DNS
The full format of DNS is DOMAIN NAME SYSTEM. The Domain Name System converts a
human-readable domain name to a valid machine-readable IP address.
Example - www.google.com is converted to 173.194.39.78
The Domain Name System (DNS) is a naming database in which Internet domain names are
placed as well as converted to Internet Protocol (IP) addresses. The Domain Name System
maps the name that users use to locate their Web site to the IP address that computers use to
locate their Web site. This makes it very complex as well as difficult for users to remember all
the IP addresses of different websites. This is why you use it because there are unlimited
websites, which are required by the size of the Internet (Bradshaw & DeNardis, 2019).
Technical description of how it works and what it is used for
DNS operations include seven steps:
Document Page
Your Name and student number 7
1. Request Information enter the hostname first. Initially, the PC looks for the
neighborhood DNS reserve that stores the data that the PC as of late recovered. On the
off chance that the necessary data isn't discovered, run the DNS inquiry
2. Contact a recursive DNS server — if the data isn't put away locally, the PC contacts the
ISP's recursive DNS server. The recursive server has its store just as the catch procedure
closes.
3. Contact the root name server - The recursive server doesn't have data to speak with the
root name server. A name server is a PC that responds to area name questions, for
example, IP addresses.
4. Question the TLD name server - The root name server peruses the initial segment of the
solicitation from option to left (www.google.com) just as sends the inquiry to the top-
level area (TLD). The name server for .com. These servers don't have the vital data,
however, you can peruse legitimately to the servers that have the data.
5. Contact a trusted DNS server — The TLD name server checks the following piece of the
solicitation (www.google.com) just as sends an inquiry to the name server liable for this
specific area. These confided in name servers are liable for knowing all data about a
specific space put away in the DNS record. There are various kinds of records, each
containing various sorts of data. Right now, we need to realize the IP address of
www.dyndns.com just as solicitation a location record (A) from a confided in the name
server (Qin, Xiao, Wang, Jin & Kuzmanovic, 2014).
6. Retrieve records - The recursive server recovers records from www.google.com just as
stores them in the neighborhood reserve. On the off chance that another person demands
a google.com have a record, the recursive server as of now has an answer, just as you
don't have to run the query procedure once more. Sooner or later, the recursive server
must demand another duplicate of the record to guarantee that the data isn't stale.
7. Receive an answer
8. A recursive server with an answer restores an A record to the PC. The PC stores the
record, peruses the IP address from the record, just as passes this data to the program.
The program then not just opens an association with the Web server, yet additionally gets
the Web webpage.
9. The whole procedure is finished from first to rearward in only a couple of milliseconds.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Your Name and student number 8
Source - (Bradshaw & DeNardis, 2019)
It is utilized to give names to all IP addresses. DNS deciphers Internet spaces just as hostnames
to IP addresses (just as the other way around). You can change over the names of the areas that
you enter in the Address bar of your Web program to the IP locations of the Web servers that
have those locales. Huge organizations use DNS to deal with their organization, while home
systems use DNS to get to the Internet, they don't utilize it to deal with the names of their home
PCs (Qin, Xiao, Wang, Jin & Kuzmanovic, 2014).
Technical Limitation
The technical limitations of DNS are:
1. However, like everything else in the world, DNS systems have several disadvantages,
including security-related ones. For example, it could be one of the famous "DNS
attacks". The attacker replaces the actual DNS address with an incorrect address to
Document Page
Your Name and student number 9
deceive the user as well as direct the user to a malicious user without notifying the user.
A very malicious address, such as taking over bank details or other sensitive data.
2. Also, other types of fraud mislead the user, such as creating a domain that is very similar
to the actual domain (for example, replacing the letter "l" with the number "1"). Try to
guide you to a harmful website (Tian & Wang, 2014).
Security and privacy concerns
Various security vulnerabilities as well as threats that affect the Domain Name System (DNS):
DNS is an integral part of the Internet as well as it is important to understand. This is known as
one of the most important Internet services that exist. Let's look at some of the vulnerabilities:
1. Typosquatting:
This is a problem when registering a new domain name that is similar to an existing popular
brand. This is a serious risk of keeping a company's secrets secret, as well as can cause security
problems. Not only can you go in the wrong direction, but it can also cause web traffic.
2. Domain hijacks:
This type of attack is a change in the DNS server as well as domain register, as well as you can
manipulate the domain registrar to change the original server to a new destination. If DNS is
hijacked, malicious activity can occur on the DNS server.
3. DNS flood attack:
This is a DNS attack. The main theme of this Distributed Denial of Service (DDOS) is to
overload the server. This means that there is no more service available because of overload.
Cannot stack or precede a request.
4. Cache positioning:
This is a daily attack. This is also known as DNS spoofing. An attacker exploits system
vulnerability by inserting malicious data into the DNS resolver cache. This can cause the victim
to be redirected to another server.
Document Page
Your Name and student number 10
5. NXDOMAIN Attack:
In many cases, this includes a huge number of remote DNS clients that target non-existing
domains, as well as overflowing the servers of the DNS authority. This causes DNS recursion.
6. DNS tunnels:
This is a cyber attack method that encodes data from other programs or protocols in DNS queries
as well as responses.
7. Distributed Reflection Denial (DRDOS):
The main goal is not only to overload the network with requests that consume large numbers of
packets as well as bandwidth, but also to rely on hardware (Tian & Wang, 2014).
Historical vs. Current Use
The historic, as well as current use of DNS, is the same. It is used to converts human-readable
domain names into a valid machine-readable IP address.
Conclusion
If the IP of the website is not in the local cache of the DNS resolver only then it will be
proceeding for the whole process as well as in the last will also store the IP of in the Cache for
the next time.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Your Name and student number 11
References
Bradshaw, S., & DeNardis, L. (2019). Privacy by Infrastructure: The Unresolved Case of the
Domain Name System. Policy & Internet, 11(1), 16-36. doi: 10.1002/poi3.195
Bukohwo M., E. (2016). QoS performance analysis of bit rate video streaming in next generation
networks using TCP, UDP and a TCP+UDP hybrid. South African Journal Of
Information And Communication, (18), 0. doi: 10.23962/10539/21759
Qin, Z., Xiao, C., Wang, Q., Jin, Y., & Kuzmanovic, A. (2014). A CDN-based Domain Name
System. Computer Communications, 45, 11-20. doi: 10.1016/j.comcom.2014.03.021
Rajkumar, K., & Swaminathan, P. (2015). Combining TCP and UDP for Secure Data
Transfer. Indian Journal Of Science And Technology, 8(S9), 285. doi:
10.17485/ijst/2015/v8is9/65569
Silva, P., & Alves, N. (2014). IPERF tool: generation and evaluation of TCP and UDP data
traffic. Notas Técnicas, 4(2), 1-13. doi: 10.7437/nt2236-7640/2014.02.003
Tian, H., & Wang, H. (2014). Deployment and Exploration of Domain Name System Based on
IPv6. Applied Mechanics And Materials, 668-669, 1247-1252. doi:
10.4028/www.scientific.net/amm.668-669.1247
What is the difference between UDP and TCP internet protocols? - nixCraft. (2020). Retrieved
14 April 2020, from https://www.cyberciti.biz/faq/key-differences-between-tcp-and-udp-
protocols/
chevron_up_icon
1 out of 11
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]