Skip to main content

How to maintain IP Ports and it's working in detail.

                              IP Ports


This article describes ports, how they are used, and how they work.


Ports were developed so that network devices and computers could accept data from multiple sources over the same IP address. Here is a simple example. Your TV service is the Internet, and the ports are your channels. You have many forms of entertainment, news, and information available through many different channels. Lets say 9xM is channel 85 on your TV. The same is true for web servers that run on port 80. Every port has a special purpose just as each channel serves a different television program. While you only have 1 cable TV subscription, you can still receive multiple channels.

Two main types of ports: TCP and UDP. TCP stands for Transmission Control Protocol. UDP stands for User Data Protocol. Some programs on your computer will use TCP ports to communication and other may use UDP. It is important to know the difference between how the two operation. See TCP vs. UDP for an illustrated example.

There are 65,535 TCP and UDP ports available to transmit data with. Ports 0-1023 are reserved for common use. These ports are assigned by the IANA (Internet Assigned Numbering Authority). This means, that every port from 0-1023 will be the same on every system. For example, let's say a server in New York is using port 80, and so is a server Texas. Because port 80 falls in the range of reserved ports, we know both servers are using port 80 for HTTP connections. Viewing a list of known ports can help you determine which type of connections are present on your machine.
Computer or network devices often "listen" on certain ports. For example, a server running web, FTP, and Telnet services will listen on a port for each. Port 80 for web, 21 for FTP, and 23 for telnet. The act of listening simply means the machine is waiting for another device to connect to it. See the illustration below:



Notice that the server is listening for 3 ports over a single IP address (192.168.0.15). It is possible for multiple devices to connect to a single port. Meaning, a telnet server may accept over 100 simultaneous connections to port 23. Once a connection is established it is know as a "session."

Comments

Popular posts from this blog

About Basic Networking Topology

           Basic Networking Topology This article describes common topologies used for networking. These are a very basic examples, and large networks often use a combination of two or more topologies. Introduction The term "topology" is used to describe the infrastructure of a network. It is a basic map or scheme of how the network is constructed. Viewing the topology of a network is a lot like looking at the map of city. You can see the central points or landmarks. Popular points of the cities are usually surrounded by a dense population of residents. The same is true for computer networks. The popular points (usually servers) are surrounded by residents (client machines) that connect to the server. If you read a networking book about topology, they will probably cover the physical types of topologies like star, ring, bus, and mesh. While these were all commonly used topologies at one point in time, star...

How to hack anyone System in seconds and Create viruses

G et some knowledge about virus... What is Virus ?  A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. All computer viruses are man-made. A simple virus that can make a copy of itself over and over again is relatively easy to produce. Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt. An even more dangerous type of virus is one capable of transmitting itself across networks and bypassing security systems   Create Virus on Notepad : It is very easy to create a virus on notepad   H ow to open notepad follow these steps 1. P ush win + R then new window will open then type notepad and click on OK . After that notepad will open then type or paste these command and make a virus.   1 -> Virus Creation Tricks 1 Just open the Notepad and type the paste the following Code. set ws=createobje...

How to Block Unwanted Websites Using HOSTS FILE and hack HOST file

Block or Redirect Unwanted Websites Using HOSTS File The hosts file is one of the interesting and useful feature of both Windows and Linux operating systems that provides many handy options in addressing network nodes. For instance, you can use the hosts file to block annoying ads, pop-ups, banners, porn sites, or even redirect one website to another . In this post I will show you how to play around with the hosts file to accomplish some of the above mentioned jobs.  Let's take some knowledge about host file. What is a hosts File? The hosts file is just like any other computer file that is used by the operating system to map hostnames and domain names on to their corresponding IP addresses . In other words, when you type “google.com” on your browser’s address bar, your computer will look for the hosts file to see if it contains the corresponding IP address for the domain name you typed (google.com). In case if no entry is present i...