Glossary / T / Transmission control protocol (TCP)

Transmission control protocol (TCP)

Transmission control protocol (TCP) is a fundamental protocol that enables information to travel across the internet. It does so by first establishing a client-server connection, converting data into consistent segments and finally ensuring transmission integrity via acknowledgments with retransmission to correct loss. It also includes built‑in flow and congestion control features to help manage network capacity.

Many popular file transfer protocols depend on TCP. FTP/S, SFTP and HTTPS will all use TCP but add TLS or SSH for encryption. 

TCP works hand-in-hand with the internet protocol (IP), which enables the actual delivery of data to specific addresses on the internet. TCP packages data before transmission and reassembles it into a coherent whole upon receipt. As such, it prioritizes accuracy and reliability over speed.

TCP strengths and weaknesses

TCP was designed to ensure the accuracy and integrity of transmitted data. As such, it devotes significant processing time to acknowledgement of packets between client and server, which can add overhead when round‑trip times or loss rates rise.

Additionally, TCP has several other strengths and weaknesses to be aware of when configuring your file transfers, including:

  • Head‑of‑line blocking that can stall TCP’s flow when a single segment is lost on long, wide networks
  • In‑order delivery that preserves record boundaries in batch datasets, which is helpful for large files
  • Plaintext headers and data that require TLS, SSH or IPSec wrappers to meet security mandates
  • TCP’s congestion window that adapts to traffic swings and protects latency‑sensitive peers
  • TCP’s ubiquitous support across network gear that eases deployment

Core functions and how TCP works

TCP underpins file transfer workflows by turning data into a dependable stream. Its logic lives in the host kernel and tracks each byte so that files arrive intact.

Specifically, TCP works by:

  • Breaking down data into MSS units (also known as data segments) and tagging them for reassembly
  • Concluding the session via a graceful teardown that frees ports and flushes last bytes in flight
  • Ensuring that the dynamic window adjusts the send rate based on round-trip time and loss
  • Establishing a client/server connection via a three-way handshake that sets the sequence number and window size for the data transmission
  • Sending data via IP
  • Using cumulative acknowledgments to confirm receipt and signal missing bytes to maintain accuracy

TCP in relation to other protocols

A number of other transport options outside of TCP can be used to move files or control messages in managed workflows.

These include:

  • QUIC combines TLS and congestion logic in the user space over UDP to give browser transfers a fast start without kernel tweaks
  • SCTP supports multistreaming, so parallel data sets avoid head‑of‑line stalls that still use congestion control
  • SSH encapsulates SFTP inside a single TCP session to reduce port exposure while inheriting TCP reliability
  • TLS wraps FTP to form FTPS, which enables encryption with minimal change to TCP operations
  • UDP omits acknowledgments and sequencing to yield lower latency, but it doesn’t have built‑in recovery

How can you enhance TCP security?

TCP was built for delivery guarantees, not secrecy. As such, its headers remain visible by default, and handshakes can be spoofed or reset to cut a session. IT administrators must layer safeguards over the transport to meet audit targets and keep login data and payloads out of sight.

These safeguards include:

  • Applying TLS to encrypt control and data channels to limit sniffing
  • Blocking unused inbound ports and restricting the source IP to shrink the attack surface
  • Enabling selective acknowledgment and RST rate limiting to blunt spoofed resets
  • Monitoring RTT variance and retransmission spikes to spot hijack or rate attack early
  • Setting tcp_mss and window scaling to end jumbogram evasion and packet size abuse

Combining these controls fortifies high-volume file exchanges while preserving interoperability.

Transmission control protocol (TCP) FAQs

How does the TCP protocol work?

TCP starts with a three‑way handshake that sets data sequence numbers and window sizes for the information that will be transmitted. Each data segment carries both a sequence and acknowledgment value, which lets the receiver confirm the highest contiguous byte received. The sender keeps a sliding window of unacknowledged data and uses timers to spot gaps. A 16‑bit checksum in every header detects bit errors so corrupted segments can be discarded and resent.

During the session, TCP adjusts the window with congestion algorithms such as Reno or Cubic and scales throughput to match available bandwidth. When a segment is lost, the sender retransmits only the missing bytes to keep the stream in order. Once both sides finish sending, a four‑step teardown closes the connection and releases ports and memory for new transfers.

What is TCP best used for?

TCP excels when applications require delivery accuracy or need every byte delivered in the same order they were sent. Transactional systems such as database replication, large file transfers, web browsing and email all rely on TCP’s guaranteed delivery because dropped or out‑of‑order packets would corrupt state or data. The protocol’s built‑in acknowledgments and retransmission logic protect these workflows from loss on congested or long‑haul links.

Secure file transfer sessions benefit from TCP’s flow control and congestion management, which adapt throughput without manual tuning. By pairing TCP with TLS or SSH, organizations gain confidentiality while keeping the same reliable transport. The result is the predictable completion of backups, audit logs and other high‑value payloads even across variable‑quality networks.

Why do people use TCP?

IT administrators choose TCP when an application cannot tolerate lost or reordered bytes. The protocol’s handshake, sequence tracking and selective retransmission give database writes, software updates and streaming backups a consistent end‑to‑end view of the data flow. Because this logic runs in every modern operating system, developers avoid building their own reliability layer and can focus on higher‑level features.

TCP is also favored for its seamless fit with existing network hardware and security stacks. Firewalls and intrusion systems already understand its state model, while TLS and SSH can wrap the stream for confidentiality without changing transport behavior. This broad compatibility shortens deployment time and lets organizations move large or sensitive payloads across varied paths with predictable completion times.

Secure every packet with TLS over TCP

Explore encryption tips to keep file transfers private across public networks.
Blog

How does TCP/IP relate to FTP?

Blog

Does FTP have a future?

Blog

FTP server port management best practices

Blog

Every file transfer protocol: Explained

Start a 25-day free trial

Try Cerberus Enterprise Edition for free

  • 25-Day Free Trial
  • Installs in minutes
  • No credit card required