Skip to main content

How to maintain IP Ports and it's working in detail.

                              IP Ports


This article describes ports, how they are used, and how they work.


Ports were developed so that network devices and computers could accept data from multiple sources over the same IP address. Here is a simple example. Your TV service is the Internet, and the ports are your channels. You have many forms of entertainment, news, and information available through many different channels. Lets say 9xM is channel 85 on your TV. The same is true for web servers that run on port 80. Every port has a special purpose just as each channel serves a different television program. While you only have 1 cable TV subscription, you can still receive multiple channels.

Two main types of ports: TCP and UDP. TCP stands for Transmission Control Protocol. UDP stands for User Data Protocol. Some programs on your computer will use TCP ports to communication and other may use UDP. It is important to know the difference between how the two operation. See TCP vs. UDP for an illustrated example.

There are 65,535 TCP and UDP ports available to transmit data with. Ports 0-1023 are reserved for common use. These ports are assigned by the IANA (Internet Assigned Numbering Authority). This means, that every port from 0-1023 will be the same on every system. For example, let's say a server in New York is using port 80, and so is a server Texas. Because port 80 falls in the range of reserved ports, we know both servers are using port 80 for HTTP connections. Viewing a list of known ports can help you determine which type of connections are present on your machine.
Computer or network devices often "listen" on certain ports. For example, a server running web, FTP, and Telnet services will listen on a port for each. Port 80 for web, 21 for FTP, and 23 for telnet. The act of listening simply means the machine is waiting for another device to connect to it. See the illustration below:



Notice that the server is listening for 3 ports over a single IP address (192.168.0.15). It is possible for multiple devices to connect to a single port. Meaning, a telnet server may accept over 100 simultaneous connections to port 23. Once a connection is established it is know as a "session."

Comments

Popular posts from this blog

About Basic Networking Topology

           Basic Networking Topology This article describes common topologies used for networking. These are a very basic examples, and large networks often use a combination of two or more topologies. Introduction The term "topology" is used to describe the infrastructure of a network. It is a basic map or scheme of how the network is constructed. Viewing the topology of a network is a lot like looking at the map of city. You can see the central points or landmarks. Popular points of the cities are usually surrounded by a dense population of residents. The same is true for computer networks. The popular points (usually servers) are surrounded by residents (client machines) that connect to the server. If you read a networking book about topology, they will probably cover the physical types of topologies like star, ring, bus, and mesh. While these were all commonly used topologies at one point in time, star...

Check Your Mother Board Model Number ,Serial Number, Version, And Many More.

How to Check Your Motherboard Model Number on Your Windows PC Whether you need to update drivers, want to check hardware compatibility, or you’re just curious , it’s way easier to check your motherboard model number with these simple tricks than it is to crack open your computer case to check the board itself . Read on as we show you how to check your motherboard model number from the comfort of your keyboard. Why Do I Want To Do This? There are a variety of situations where knowing your motherboard’s model number is important: upgrading your drivers, buying new hardware (you’ll need the proper expansion slots for card-based upgrades and the right memory DIMMS for memory upgrades, etc.), and checking the capabilities of your board if you’re considering upgrading the entire thing.  First Way (SIMPLEST WAY):- In this way there is only two step :- Step 1:- Go to Run(By Pressing Win+R) . Step 2:- Type dxdiag in Run and hit enter . ...

How to Block Unwanted Websites Using HOSTS FILE and hack HOST file

Block or Redirect Unwanted Websites Using HOSTS File The hosts file is one of the interesting and useful feature of both Windows and Linux operating systems that provides many handy options in addressing network nodes. For instance, you can use the hosts file to block annoying ads, pop-ups, banners, porn sites, or even redirect one website to another . In this post I will show you how to play around with the hosts file to accomplish some of the above mentioned jobs.  Let's take some knowledge about host file. What is a hosts File? The hosts file is just like any other computer file that is used by the operating system to map hostnames and domain names on to their corresponding IP addresses . In other words, when you type “google.com” on your browser’s address bar, your computer will look for the hosts file to see if it contains the corresponding IP address for the domain name you typed (google.com). In case if no entry is present i...