21. ICMP hole punching, UDP hole punching and TCP hole punching respectively use User Datagram and Transmission Control Protocols . 22. That's because the basic building block for the Net is something called TCP-IP, or Transmission Control Protocol -Internet Protocol. 23. Other protocols, notably the Transmission Control Protocol ( TCP ), can notice the data loss and initiate error recovery. 24. When reliability is mandatory, the Transmission Control Protocol ( TCP ) may be used, but induces extra networking overhead. 25. Historically, TLS has been used primarily with reliable transport protocols such as the Transmission Control Protocol ( TCP ). 26. Its definition presumes an underlying and reliable transport layer protocol, and Transmission Control Protocol ( TCP ) is commonly used. 27. The Transmission Control Protocol -Internet Protocol is the set of standards that lets any Internet message be read by any computer. 28. EIGRP does not operate using the Transmission Control Protocol ( TCP ) or the User Datagram Protocol ( UDP ). 29. It allows for flow-based semantics like in Transmission Control Protocol ( TCP ), but does not provide reliable in-order delivery. 30. Another 2003 book reported that RDT was also seen carried over Transmission Control Protocol ( TCP ), as a fall-back mechanism.