Copyright (c) 2026 MindMesh Academy. All rights reserved. This content is proprietary and may not be reproduced or distributed without permission.
2.4.2. IP Protocol Types and Traffic Patterns
IP Protocol Types:
| Protocol | Function | Use Case |
|---|---|---|
| ICMP | Error messages, diagnostics | ping, traceroute |
| TCP | Reliable, connection-oriented | Web, email, file transfer |
| UDP | Fast, connectionless | DNS queries, VoIP, streaming |
| GRE | Tunnel encapsulation | Site-to-site tunnels |
| IPSec | Encrypted tunnels | VPNs |
IPSec Components:
- AH (Authentication Header): Integrity and authentication, but no encryption
- ESP (Encapsulating Security Payload): Encryption + integrity + authentication
- IKE (Internet Key Exchange): Negotiates security parameters (phase 1 = authentication, phase 2 = encryption keys)
Traffic Types:
| Type | Description | Example |
|---|---|---|
| Unicast | One sender to one receiver | Web browsing, email |
| Broadcast | One sender to all devices on subnet | DHCP discover, ARP requests |
| Multicast | One sender to subscribed receivers | Video streaming, OSPF routing updates |
| Anycast | One sender to nearest of multiple receivers | DNS root servers, CDN nodes |
Written byAlvin Varughese
Founder•15 professional certifications