CompTIA Network Plus

πŸ”€ IP Protocols – TCP/IP, UDP, IPSec, IPMC

Deep dive into the key IP-based protocols including TCP, UDP, IP Multicast, and IPSec with its modes and components.

3 min read

🌐 IP Protocols – TCP/IP, UDP, IPMC, and IPSec

Internet communication relies on a group of protocols that define how data travels across networks. This guide explores core IP-based protocols including TCP/IP, UDP, IP Multicast (IPMC), and IPSec for secure communication.


πŸ“¦ TCP/IP Stack Overview

The TCP/IP model is a simplified version of the OSI model with 4 layers:

LayerProtocols / Functions
ApplicationHTTP, FTP, DNS, SMTP, SSH, etc.
TransportTCP, UDP
InternetIP, ICMP, IGMP
Network AccessEthernet, Wi-Fi, PPP

πŸ”€ TCP vs UDP

βœ… TCP (Transmission Control Protocol)

  • Connection-oriented
  • Reliable delivery
  • 3-way handshake
  • Use cases: HTTP, SSH, FTP, Email

⚑ UDP (User Datagram Protocol)

  • Connectionless
  • Fast but unreliable
  • Use cases: DNS, VoIP, Video Streaming, Gaming

πŸ” Quick Comparison

FeatureTCPUDP
ConnectionYesNo
ReliabilityGuaranteed deliveryNo guarantees
OverheadHighLow
SpeedSlowerFaster

πŸ“’ IPMC – IP Multicast

IP Multicast (IPMC) allows a single sender to deliver data to multiple receivers simultaneously using a group address.

  • Uses Class D IPs: 224.0.0.0 – 239.255.255.255
  • Efficient for streaming, IPTV, online conferencing
  • Common Protocols:
    • IGMP (Internet Group Management Protocol) – Used by hosts to join/leave multicast groups
    • PIM (Protocol Independent Multicast) – Used by routers to manage multicast traffic

πŸ” IPSec – Internet Protocol Security

IPSec is a suite of protocols for securing IP communications at the Network Layer (Layer 3). It offers encryption, integrity, and authentication.


πŸ”§ Modes of IPSec

ModeDescription
Tunnel ModeEntire IP packet is encrypted and encapsulated in a new IP header (used between gateways)
Transport ModeOnly the payload (not the header) is encrypted (used between end devices)

πŸ” IPSec Protocols

βœ… AH – Authentication Header

  • Provides authentication and integrity
  • No encryption (data is not hidden)

βœ… ESP – Encapsulating Security Payload

  • Provides encryption, authentication, and integrity
  • Supports both Tunnel and Transport modes

πŸ” IKE – Internet Key Exchange

IKE (v1/v2) is used for establishing Security Associations (SAs) between two endpoints.

Key Phases:

  1. Phase 1: Establishes a secure IKE SA (authentication + encryption)
  2. Phase 2: Negotiates IPSec SAs (AH or ESP parameters)

πŸ›‘οΈ Security Associations (SAs)

  • A Security Association (SA) defines the encryption and authentication methods between two peers.
  • Each direction (inbound/outbound) has its own SA.
  • Identified by:
    • SPI (Security Parameter Index)
    • Destination IP
    • Protocol (AH or ESP)

πŸ“˜ Summary Table

ProtocolLayerPurposeCommon Use Cases
TCP4Reliable, connection-basedWeb, email, file transfer
UDP4Fast, connectionlessDNS, VoIP, video/gaming
IPMC3One-to-many communicationIPTV, streaming, conferencing
IPSec3Secure IP communicationVPNs, secure tunnels
AH3Integrity and authenticationData origin authentication
ESP3Encryption + authenticationVPN encryption
IKEβ€”SA negotiationIPSec VPN setup

🧠 Pro Tip: IPSec works at the IP level, making it transparent to applicationsβ€”ideal for VPNs and site-to-site tunnels.