Ports, Computer Networking

Assignment Help:

It is an additional 16-bit number which uniquely identifies the specific service on any given machine on the Internet. Port numbers are 16 bit wide, so each of the computers on the Internet contains a maximum number of 216 or 65,536 ports. The specific application is identified by its unique port number in the similar way that a particular television station has a unique channel number.

Port numbers are divided in three ranges which are following:

  • Well-known ports are those from 0 to 1,023.
  • Registered ports are those from 1,024 to 49,151.
  • Dynamic and private ports are those from 49,152 to 65,535.

Well-known ports, those ranging from 0 to 1,023 are where on the Internet most common services are residing. These ports are controlled & assigned through the Internet Assigned Number Authority (IANA) and on most systems can be utilized only by system (root) processes or through programs executed by privileged users.


Related Discussions:- Ports

What is lrc, What is LRC? In LRC, a block of bits is separated into row...

What is LRC? In LRC, a block of bits is separated into rows and a redundant row of bits is added to the whole block. It can detect burst errors. If two bits in one data unit ar

Summary of special ip addresses, The table below gives a summary of special...

The table below gives a summary of special IP addresses.

What is a java package, What is a Java package and how is it used? A J...

What is a Java package and how is it used? A Java package is a naming context for classes and interfaces. A package is used to make a separate name space for groups of classes

Describe the importance of backups, Question: (a) Describe the importa...

Question: (a) Describe the importance of backups and the use of antivirus software. (b) With the help of an example/ illustration, explain the term encryption and explain

Access-list range for an extended ip access-list, Recognize the access-list...

Recognize the access-list range for an extended IP access-list? Ans) IP extended access-lists use the number range of 100-199.

Transmission robustness and security, Transmission robustness and security ...

Transmission robustness and security Unless properly designed, a wireless LAN might be interference prone and simply eavesdropped. The design of a wireless LAN must allow relia

Security control procedures , a) An Introduction/Overview of Network Securi...

a) An Introduction/Overview of Network Security issues. b) A Risk Assessment  analysis- to include:             Assets                                                         T

Responses - application layer, Responses Responses  are sent  from the...

Responses Responses  are sent  from the  server to the client. A responses is a three  digit code that  may be followed by additional textual information.

Ieee specification for spanning tree protocol, What is the IEEE specificati...

What is the IEEE specification for Spanning Tree Protocol Ans) IEEE 8021.d Spanning Tree Protocol (STP) was developed to stop routing loops in a network. If a router, switch, or

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd