Skip to content
  • Features

    Protect

    FiveM Server DDoS Protection

    Let us drive your revenue forward

    Minecraft Server DDoS Protection

    Make your Game Servers load faster

    Anycast Proxy

    Performance and beyond

    Page Rules

    Advanced page rule system

    Load Balancing

    Scale websites reliability

    Edge Compute

    Vietnam

    Unleash Vietnam's Potential, deploy like local

    Web Application Firewall​

    Corporate-level WAF system

    DDoS Protection

    Prevent and detect all attacks

    SSL/TLS

    SSL certificates for all platforms

    Build Your Own Software

    With protected, integrated suite

    Make Money

    Multi-level Affiliate Program

    Become a Lectron Associate and get true profit sharing. It's FREE to sign up!

  • Locations
  • Pricing
  • Merchandise
  • Documentation
  • Blog
Dashboard

Getting Started

  • How to Configure SRV Record Correctly
  • What is Lectron?
  • Getting started
  • Why is this called Armor?
  • How to use the Dashboard
  • Locations
  • Features
  • FAQ
  • Billings
  • how to report high ping to lectron?

Troubleshooting

  • What is Wireshark
  • Diagnosing Network Issues with MTR
  • Understanding IPv4 and IPv6
  • What are SSL, TLS, HTTP and HTTPS?
  • Ping and TraceRoute (tracert) commands
  • High Latency and General Lag
  • Edge TLS
  • Understanding FTP (File Transfer Protocol)
  • Understanding Network Address Translation (NAT)

Beginner's Guide

  • Proxy Protocol
  • What is UDP Protocol ?
  • What is TCP Protocol?
  • How to Configure SRV Record Correctly
  • What is the internet?
  • What is a Firewall?
  • TCP vs. UDP Comparison
  • Protected: What is a port?
  • What is a DDoS attack?
  • What is a server?
  • What is a proxy server?
  • How a DNS Server (Domain Name System) works

Start Crafting

  • Minecraft
  • Basic Commands
  • Craft Rules
  • How to play Minecraft – The Basic
  • How to Start
  • Understanding Hyperthreading in a Minecraft server

Brand

  • Mission
  • Personality
  • Promise
  • Values

Foundations

  • Accessibility
  • Color
  • Grid
  • Iconography
  • Illustrations
  • Logos
  • Typography
  • Images & Videos

Content

  • Inclusive language
  • Language and grammar
  • Messaging guidelines
  • Vocabulary
  • Voice and tone principles
  • Writing style

Components

  • Avatar
  • Avatar group
  • Badge
  • Banner
  • Breadcrumbs
  • Button
  • Checkbox
  • Code
  • Dropdown menu
  • Flag
  • Inline dialog
  • Inline message
  • Logo
  • Lozenge
  • Modal dialog
  • Pagination
  • Progress indicator
  • Progress tracker
  • Radio
  • Section message
  • Select
  • Spinner
  • Tabs
  • Tag
  • Text field
  • Toggle
  • Tooltip

Patterns

  • Benefits modal
  • First impressions
  • Forms
  • Inline edit
  • Messages
  • Page header
  • Spotlight

Resources

  • Color palettes
  • Design principles
  • Figma library
  • Fonts
  • Illustration library
  • Logo library
  • Protected: Presentation kit
  • Sketch library
  • Templates

Attack Types

  • Common Security Threats
  • DDoS through DNS Requests
  • Denial of Service explained
  • SYN Flood
  • TCP Half-Open
  • UDP Flood
  • DNS Reflection Attack
  • Ping of Death ICMP Attack
  • Slowloris Attack
  • Vulnerability Attack
  • Phishing Attacks

To Vietnam

  • OVH Singapore to FPT Vietnam
  • Vultr Singapore to FPT Vietnam
  • Hivelocity Hong Kong to Vietnam

Traceroute To India

  • FPT Hanoi to Tata India
  • Hivelocity New York City to Tata India
  • FPT Hanoi to Digital Ocean India

To Hong Kong

  • VNPT Ho Chi Minh City to Lectron Hong Kong
  • VNPT Hanoi to Leaseweb Hong Kong
  • Viettel Ho Chi Minh City to Lectron Hong Kong
  • Viettel Hanoi to Leaseweb Hong Kong
  • FPT Hanoi to Leaseweb Hong Kong

To Singapore

  • FPT Hanoi to Vultr Singapore
  • Hivelocity New York City to Vultr Singapore

To Lectron

  • Leaseweb Hong Kong to Lectron

FiveM Protection Setup

  • How to add Lectron proxy in server.cfg?
  • How to config FiveM Proxy in Lectron Dashboard?
  • How to Configure SRV Record Correctly
  • How to setup a free FiveM SRV record with Lectron (Domain / Subdomain)
  • Whitelist Lectron IP addresses to your FiveM server firewall
  • Use Lectron Dashboard to remote proxy your FiveM server
  • Protecting a Windows Server using a GRE Tunnel
  • Setup GRE Tunnel on Ubuntu 20 Linux Server

DDoS Attack

  • what is DDoS attack?
  • Overview of DDoS attack.
  • Characteristics of DDoS attack
  • Protective Measures

Tunnel Setup

  • Tunnel Setup for Windows Server with 1 public IP (beta)
  • Tunnel Setup for Ubuntu 20.04 or higher
  • Tunnel Setup on Ubuntu with interfaces file

SRV Load Balancing

  • How to Configure SRV Record Correctly
  • How to setup a free FiveM SRV record with Lectron (Domain / Subdomain)

Setup DNS for Minecraft Proxy

  • How to Configure SRV Record Correctly

Firewall

  • what is Firewall?

About Load Balancer

  • What is Load Balancer?
  • Load Balancer algorithm
  • Load Balancer components

About FiveM

  • Console commands
  • Installation
  • What is FiveM?

Teamspeak 3 Protection Setup

  • HOW TO PROTECT YOUR TEAMSPEAK 3?

SA-MP

  • How to connect your samp ip to domain?

Minecraft Proxy Setup

  • How to setup Bungeecord Minecraft Proxy?
  • How to setup Spigot Minecraft in Lectron Dashboard?

Proxy Server

  • What is proxy Server?
  • Types of Proxy Server

FiveM DNS config

  • Cloudflare DNS config for FiveM
  • Godaddy DNS config for FiveM
  • Google Domain DNS config for FiveM
  • Porkbun DNS config for FiveM

Minecraft DNS config

  • Cloudflare DNS config for Minecraft
  • Godaddy DNS config for Minecraft
  • Google domains DNS config for Minecraft
  • Porkbun DNS config for Minecraft

Basics of HTTP

  • What is HTTP?
  • What is the purpose of HTTP?
  • How does HTTP work?

Basics of HTTPS

  • What is HTTPS?
  • What is the purpose of HTTPS?
  • How does HTTPS work?
  • Home
  • Docs
  • Beginner's Guide
  • What is TCP Protocol?

What is TCP Protocol?

TCP stands for Transmission Control Protocol, a communications standard that enables application programs and computing devices to exchange messages over a network. It is designed to send packets across the internet and ensure the successful delivery of data and messages over networks.

TCP is one of the basic standards that define the rules of the internet and is included within the standards defined by the Internet Engineering Task Force (IETF). It is one of the most commonly used protocols within digital network communications and ensures end-to-end data delivery.

TCP organizes data so that it can be transmitted between a server and a client. It guarantees the integrity of the data being communicated over a network. Before it transmits data, TCP establishes a connection between a source and its destination, which it ensures remains alive until communication begins. It then breaks large amounts of data into smaller packets, while ensuring data integrity is in place throughout the process.

As a result, high-level protocols that need to transmit data all use TCP Protocol.  Examples include peer-to-peer sharing methods like File Transfer Protocol (FTP), Secure Shell (SSH), and Telnet. It is also used to send and receive email through Internet Message Access Protocol (IMAP), Post Office Protocol (POP), and Simple Mail Transfer Protocol (SMTP), and for web access through the Hypertext Transfer Protocol (HTTP).

An alternative to TCP is the User Datagram Protocol (UDP), which is used to establish low-latency connections between applications and decrease transmissions time. TCP can be an expensive network tool as it includes absent or corrupted packets and protects data delivery with controls like acknowledgments, connection startup, and flow control. 

UDP does not provide error connection or packet sequencing nor does it signal a destination before it delivers data, which makes it less reliable but less expensive. As such, it is a good option for time-sensitive situations, such as Domain Name System (DNS) lookup, Voice over Internet Protocol (VoIP), and streaming media.

How do you feel about this documentation?
Share This Article :
  • Facebook
  • Twitter
  • LinkedIn
  • Pinterest
Still stuck? How can we help?

How can we help?

Updated on December 8, 2021
What is UDP Protocol ?How to Configure SRV Record Correctly

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Metaverse Anti DDoS

Get ready to launch your metaverse to the cosmic guard with Lectron!

Start now →
Discord
Follow Lectron
Facebook Twitter Instagram Linkedin Youtube
Follow Viet York, founder of Lectron
Facebook Twitter Instagram Linkedin Medium Github Twitch
Features
  • Data Center Locations
  • Anycast Proxy
  • DDoS Protection
  • Load Balancing
  • Game Protection
  • Game Acceleration
  • Vietnam
  • Free SSL/TLS
Comparisons
  • Full Comparison Chart
Developers
  • Documentation
Community
  • Facebook
  • Twitter
  • Instagram
  • Discord
  • Facebook Group
Articles
  • Proxy DDoS Protection
Company
  • About Us
  • Careers
  • Our People
  • Success Stories
  • Enterprise
  • Contact Us
Legal
  • Terms
  • Privacy
  • DMCA
Trustpilot
Copyright © 2019-2021 Lectron, Inc. All Rights Reserved