Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

3. Protocols and ports

2025-04-04 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

The protocols include network layer protocol, transport layer protocol and application layer protocol.

Network layer protocols are used for three-layer network interconnection, transport layer protocols are used for data transmission, and application layer protocols are used for data applications.

IP protocol belongs to the network layer protocol, and the main function of IP is addressing and segmentation. The IP port number range is 0mm 65535.

The port belongs to the four-layer transport layer, and if IP is a house, then the port is the door of this house.

TCP, called Transmission Control Protocol, is a secure and reliable transport layer protocol.

UDP, called user packet protocol, is a simple but unreliable transport layer protocol.

TCP/IP can be understood as a combination of secure and reliable data transmission. IP is used for addressing, while TCP determines the transmission control of data security.

Network layer protocol

Description

IP

Network protocol for addressing and segmentation.

ARP

Address resolution protocol that resolves IP to MAC addresses and works at the network layer.

RARP

Invincible ARP protocol, a feedback mechanism, when there is an IP conflict, it will feedback information to the administrator.

ICMP

Network Control message Protocol, a feedback mechanism that uses PING commands to test network connectivity.

Application layer protocol

Port number

What protocol is used for transmission

Description

SMTP

twenty-five

TCP

Used for sending mail.

POP3

one hundred and ten

TCP

Used for receiving mail, cached locally.

IMAP4

one hundred and forty three

TCP

Used to view email online and cache it on the network.

FTP

twenty-one

TCP

File transfer protocol for file transfer.

TFTP

sixty-nine

UDP

Lightweight file transfer protocol for small file transfer.

DHCP

67,68

UDP

Dynamic host configuration protocol, which is used for hosts to obtain IP dynamically.

DNS

fifty-three

UDP

Domain name system, used to convert an IP into a domain name that is easy for people to remember.

NTP

one hundred and twenty three

UDP

Time server.

SNMP

one hundred and sixty one

UDP

Simple network management protocol, used to manage network systems.

HTTP

eighty

TCP

Hypertext transfer protocol, used to browse WEB websites.

HTTPS

four hundred and forty three

TCP

Encrypted hypertext transfer protocol for more secure browsing of WEB websites.

TELNET

twenty-three

TCP

Used to connect devices remotely.

SSH

twenty-two

TCP

It is more secure to connect devices remotely.

Shared service

four hundred and forty five

TCP

Used for file sharing.

Remote Desktop

3389

TCP

Used for desktop remote.

Note: each application layer protocol corresponds to a port number.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 213

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report