Nibbles & Bits


by | June 22, 2022


Getting computers to talk to each other is a crucial element to productivity. The days of yore brought us “sneakernet” and set the stage for the internet technology stack that we know and tolerate today. The reliability of inter and intra-system communication hit many milestones over the years. Initially, bandwidth was the primary bottleneck for applications and communications (2400 baud anyone?) so as interfaces and compute horsepower increased, the applications had no problem finding ways to use up the bandwidth as soon as it was provisioned.

One of the important mechanisms that enable communication is the Internet protocol suite. Both TCP and UDP belong to the transport layer that transfers data to applications and insulates them from unwanted interference. While both protocols have the concept of ports, they work in very different ways.

The TCP protocol provides a highly reliable, ordered, and error-checked delivery of byte streams between two applications. It is the most common networking protocol used online and establishes a connection by using a three-way handshake.

Packet handshakes in action.

TCP is used when all data must stay intact when transmitting and receiving between devices. As a result, the TCP protocol has a relatively high overhead and is harder to implement. It also requires more advanced hardware and system services while not supporting broadcast communication. TCP protocol can be compared to a conversation between two people. Since both people need to communicate with each other to establish a connection and transmit data.

The UDP protocol is connectionless. It provides minimal data integrity by calculating and comparing checksums but exposes the user to all other network events including lost, duplicate, and out-of-order messages. The simplicity of this protocol makes it suitable where speed rather than integrity and error correction is preferred. This includes real-time applications, video streaming, and multiplayer games. It works well with boot loaders and serves as a basis for the TFTP protocol. The UDP protocol can be compared to a person speaking outside with a megaphone. Most people in the surrounding area who are listening to the speaker will be able to hear just about everything being communicated, however, there’s a possibility that some people may not be listening or hear anything at all. This is because the UDP protocol does not guarantee that all data will be successfully transmitted.

These protocols serve different purposes, but some key differences to remember are that a TCP protocol is connection-oriented, provides error checking, and because of this, is heavy-weight. While a UDP protocol is connectionless, has a faster speed, and is lightweight. So whether a reliable connection for tasks such as sending an email or streaming a live video is needed, there’s a suitable protocol for that.

“We decided to move our rather complex IP address and DHCP management process to ProVision and it has worked out great for us!! The team at 6connect were very flexible and went above and beyond to accommodate our requirements and helped to make the migration as smooth and hitch free as possible. Kudos to the team @ 6connect!”

Premkumar Subramaniam
Head of R&D

“We are excited to be partnering with 6connect to leverage their technology and talent. We particularly admire their long-standing IPv6 contributions and their ability to service and support customers in this area, some who are the largest service provider in the world. The 6connect executive leadership team and technical team are great to work with and we look forward to many partnered projects to help customers address their Cloud, IoT and Security needs with IPv6. Automation, workflow and orchestration are critical to the success of most of these projects and 6connect is well positioned to help our mutual customers in those areas.”

Ed Horley
Co-Founder & CEO

“Enterprises can struggle managing purposefully segmented DDI architectures with any agility. Our partnership with 6connect empowers customers with complex infrastructures to move faster to service the business while consolidating visibility and control over their estate.”

Andrew Wertkin
Chief Strategy Officer,

“6connect’s approach to automation addresses quite a few challenges with physical and virtual networks – how to improve the agility of your current network infrastructure without sacrificing reliability and adoption of future network technologies.”

Pär Lange
Investment Director

“A customer is looking for an integrated solution from a single vendor for both IPAM and DNS. Through the 6connect reseller program, Secure64 is able to offer the most secure DNS solutions married to a unique combination of IPAM and resource provisioning that customers want. It’s a marriage made in heaven.”

Mark Beckett
VP of Marketing

“A huge benefit of working with the 6connect team is that they devoted a lot of resources to get our products integrated so we had the turnkey solution that we could take to market. It was very easy to work with their team to get product integrated and successfully launched.”

Mark Beckett
VP of Marketing

You have IPv6!

You’re on IPv4.

Explore ProVision Suite

Resource Controller



DHCP Controller

Peering Controller


Talk to one of our Engineers