In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-04-04 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >
Share
Shulou(Shulou.com)06/01 Report--
The protocols include network layer protocol, transport layer protocol and application layer protocol.
Network layer protocols are used for three-layer network interconnection, transport layer protocols are used for data transmission, and application layer protocols are used for data applications.
IP protocol belongs to the network layer protocol, and the main function of IP is addressing and segmentation. The IP port number range is 0mm 65535.
The port belongs to the four-layer transport layer, and if IP is a house, then the port is the door of this house.
TCP, called Transmission Control Protocol, is a secure and reliable transport layer protocol.
UDP, called user packet protocol, is a simple but unreliable transport layer protocol.
TCP/IP can be understood as a combination of secure and reliable data transmission. IP is used for addressing, while TCP determines the transmission control of data security.
Network layer protocol
Description
IP
Network protocol for addressing and segmentation.
ARP
Address resolution protocol that resolves IP to MAC addresses and works at the network layer.
RARP
Invincible ARP protocol, a feedback mechanism, when there is an IP conflict, it will feedback information to the administrator.
ICMP
Network Control message Protocol, a feedback mechanism that uses PING commands to test network connectivity.
Application layer protocol
Port number
What protocol is used for transmission
Description
SMTP
twenty-five
TCP
Used for sending mail.
POP3
one hundred and ten
TCP
Used for receiving mail, cached locally.
IMAP4
one hundred and forty three
TCP
Used to view email online and cache it on the network.
FTP
twenty-one
TCP
File transfer protocol for file transfer.
TFTP
sixty-nine
UDP
Lightweight file transfer protocol for small file transfer.
DHCP
67,68
UDP
Dynamic host configuration protocol, which is used for hosts to obtain IP dynamically.
DNS
fifty-three
UDP
Domain name system, used to convert an IP into a domain name that is easy for people to remember.
NTP
one hundred and twenty three
UDP
Time server.
SNMP
one hundred and sixty one
UDP
Simple network management protocol, used to manage network systems.
HTTP
eighty
TCP
Hypertext transfer protocol, used to browse WEB websites.
HTTPS
four hundred and forty three
TCP
Encrypted hypertext transfer protocol for more secure browsing of WEB websites.
TELNET
twenty-three
TCP
Used to connect devices remotely.
SSH
twenty-two
TCP
It is more secure to connect devices remotely.
Shared service
four hundred and forty five
TCP
Used for file sharing.
Remote Desktop
3389
TCP
Used for desktop remote.
Note: each application layer protocol corresponds to a port number.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 213
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.