top of page
Search
Writer's pictureQuantumx

Top ten computer Ports you should know about....!

Updated: Mar 28, 2023



MDNS

Multicast Domain Name System

· Designed to handle multiple names for machines on local networks without needing to register them on Domain Network Servers (DNS)

ICMPv6

Internet Control Message Protocol (ICMP)

· Control messages are sent to hosts and network devices using the Internet Control Message Protocol (ICMP). Network devices such as routers and others keep an eye on the network's performance. These devices can use ICMP to transmit a message when an error occurs.

SSDP

Simple Service Discovery Protocol (SSDP)


· The SSDP protocol is use to discover Plug & Play devices, with uPnP (Universal Plug and Play).

· SSDP uses unicast and multicast address (239.255. 255.250).

· SSDP is HTTP like protocol and work with NOTIFY and M-SEARCH methods.

· SSDP can be used over IPv4 and IPv6.

ARP

Address Resolution Protocol (ARP)

· It is a layer 2 protocol used to map MAC addresses to IP addresses. All hosts on a network are located by their IP address, but NICs do not have IP addresses, they have MAC addresses. ARP is the protocol used to associate the IP address to a MAC address.

· is used to dynamically discover the mapping between a layer 3 (protocol) and a layer 2 (hardware) address. A typical use is the mapping of an IP address (e.g., 192.168. 0.10) to the underlying Ethernet address (e.g., 01:02:03:04:05:06).


QUIC

QUIC (Quick UDP Internet Connections)

· QUIC is a new transport protocol for the internet, developed by Google. It is meant to solve a number of transport-layer and application-layer problems of modern web applications, while requiring little or no change from application writers.

· A UDP-based protocol called QUIC performs transport and session layer tasks. Compared to conventional TCP-based connections, it considerably boosts performance.

TLSv1.2

Transport Layer Security (TLS)

· TLS provides security in the communication between two hosts. It provides integrity, authentication and confidentiality, and it I commonly used in web browsers, but can also be used with any protocol that uses TCP as the transport layer.

· Accordingly, TLS 1.2 is more secure than the previous cryptographic protocols such as SSL 2.0, SSL 3.0, TLS 1.0, and TLS 1.1.


SSH File Transfer Protocol (SFTP)


· The SSH File Transfer Protocol (SFTP) also known as secure FTP is used to secure the connection when a file is sent remotely from one system to another. It uses public-key encryption to secure communication over the Internet as well as facilitate strong user authentication. The Internet Engineering Task Force (IETF) developed this protocol in 2006 to provide security to the shell protocols.

Secure Shell (SSH)

· Secure Shell (SSH) is a network protocol that uses cryptography in order to secure network services over unsecured networks. Many applications like the execution of a comment remotely, access to a remote computer can be secured with SSH.

Ethernet 802.3 (IEEE 802.3

· The Ethernet 802.3 protocol defines the physical layer in wired networking models, as well as the medium access control (MAC) sub-layer of the data link layer.

Ethernet IEEE 802.11 protocol

· Another widely used protocol is IEEE 802.11, which specifies the physical layer and media access control (MAC) protocols for implementing wireless local area network (WLAN). This protocol, which is a wireless computer networking standard, enables communication between laptops and cellphones without the need for a connection.

File Transfer Protocol (FTP)

· The File Transfer Protocol (FTP) is a standard network protocol provided by TCP/IP, and it is used to transfer files from one server to another. It is responsible for the reliably and efficient transfer of files.


Hypertext Transfer Protocol (HTTP)

· The Hypertext Transfer Protocol (HTTP) is the foundation of the World Wide Web (WWW) and is used to load web pages using hypertext links. HTTP is an application layer protocol, which allows the user to see a user-friendly interface designed to transfer information between networked devices. It is the protocol helping applications to communicate with the users.

Dynamic Host Configuration Protocol (DHCP)

· This protocol works on IP networks, assigning IP addresses to devices and hosts connected to the network. It also allows them to communicate with each other efficiently.

Spanning Tree Protocol (STP)


· This protocol, as defined by IEEE 802.1d, prevents loops on LAN. The STP handles problems pertaining to networks using bridges. It processes network changes and failures and removes superfluous links. All of the network's links are watched over by the STP. It uses the spanning-tree algorithm to discover any redundant links or problems with the links (STA).

· The STA dismantles the unnecessary links and constructs a topology out of the existing network. The STP runs the STA again after a new link is introduced to the existing network to make sure the new link is not redundant.

User Datagram Protocol (UDP)


· (UDP) is a transport layer protocol used for communication through internet networks for time-sensitive transmissions. It sends messages without the initiation of a connection, which makes the data transfer real quick.

· UDP is a connectionless and unreliable protocol. Unlike TCP, there is no mechanism in UDP for packet recovery in case of packet loss. Also, it doesn’t have any error checking process. But in terms of latency and bandwidth, UDP is more efficient than TCP.

Transmission Control Protocol (TCP)


· The Transmission Control Protocol (TCP) is a standard that defines how to establish and maintain a network connection through which application programs can exchange data. It is used on the top of IP to provide reliable transmission of packets.

· TCP is a connection-oriented reliable protocol. Two devices need to establish a connection before start using TCP and sending the data. It also provides an acknowledgment to the sender device regarding the status of the data being sent. So in case, the sender receives a negative acknowledgment, it resends the data:





6 views0 comments

Comments


Post: Blog2_Post
bottom of page