Skip to main content

How to maintain IP Ports and it's working in detail.

                              IP Ports


This article describes ports, how they are used, and how they work.


Ports were developed so that network devices and computers could accept data from multiple sources over the same IP address. Here is a simple example. Your TV service is the Internet, and the ports are your channels. You have many forms of entertainment, news, and information available through many different channels. Lets say 9xM is channel 85 on your TV. The same is true for web servers that run on port 80. Every port has a special purpose just as each channel serves a different television program. While you only have 1 cable TV subscription, you can still receive multiple channels.

Two main types of ports: TCP and UDP. TCP stands for Transmission Control Protocol. UDP stands for User Data Protocol. Some programs on your computer will use TCP ports to communication and other may use UDP. It is important to know the difference between how the two operation. See TCP vs. UDP for an illustrated example.

There are 65,535 TCP and UDP ports available to transmit data with. Ports 0-1023 are reserved for common use. These ports are assigned by the IANA (Internet Assigned Numbering Authority). This means, that every port from 0-1023 will be the same on every system. For example, let's say a server in New York is using port 80, and so is a server Texas. Because port 80 falls in the range of reserved ports, we know both servers are using port 80 for HTTP connections. Viewing a list of known ports can help you determine which type of connections are present on your machine.
Computer or network devices often "listen" on certain ports. For example, a server running web, FTP, and Telnet services will listen on a port for each. Port 80 for web, 21 for FTP, and 23 for telnet. The act of listening simply means the machine is waiting for another device to connect to it. See the illustration below:



Notice that the server is listening for 3 ports over a single IP address (192.168.0.15). It is possible for multiple devices to connect to a single port. Meaning, a telnet server may accept over 100 simultaneous connections to port 23. Once a connection is established it is know as a "session."

Comments

Popular posts from this blog

About Basic Networking Topology

           Basic Networking Topology This article describes common topologies used for networking. These are a very basic examples, and large networks often use a combination of two or more topologies. Introduction The term "topology" is used to describe the infrastructure of a network. It is a basic map or scheme of how the network is constructed. Viewing the topology of a network is a lot like looking at the map of city. You can see the central points or landmarks. Popular points of the cities are usually surrounded by a dense population of residents. The same is true for computer networks. The popular points (usually servers) are surrounded by residents (client machines) that connect to the server. If you read a networking book about topology, they will probably cover the physical types of topologies like star, ring, bus, and mesh. While these were all commonly used topologies at one point in time, star...

How to hack mozilla firefox brower with in seconds and increase the speed 3X.

Amazing Mozilla Firefox Tips and Tricks To Improving Your Browsing Experience The use of Mozilla Browser is very common browser now a days. Today I  am share some very useful tricks.  Here are some simple tricks which I gathered from different website .    1. THIS IS  SIMPLE TRICK IN MOZILLA FIREFOX WHERE YOU CAN INCREASE YOUR SPEED ITS JUST 3 STEPS FOLLOW THE INSTRUCTION : Step 1:- Type “about:config” into the address bar(URL Bar) of Mozilla firebox and then press enter . And find some code .   Step 2:- Now Alter(changes) the entries as follows:     Set “network.http.pipelining” to “true” then   Set “network.http.proxy.pipelining” to “true”    set “network.http.pipelining.maxrequests” to some number like 29 or 30. This means it will make 29 or 30 requests at once. Step 3:- In the last step right-click anywhere and select New-> Integer . Name it “nglayout....

How to hack anyone System in seconds and Create viruses

G et some knowledge about virus... What is Virus ?  A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. All computer viruses are man-made. A simple virus that can make a copy of itself over and over again is relatively easy to produce. Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt. An even more dangerous type of virus is one capable of transmitting itself across networks and bypassing security systems   Create Virus on Notepad : It is very easy to create a virus on notepad   H ow to open notepad follow these steps 1. P ush win + R then new window will open then type notepad and click on OK . After that notepad will open then type or paste these command and make a virus.   1 -> Virus Creation Tricks 1 Just open the Notepad and type the paste the following Code. set ws=createobje...