Ports, Computer Networking

Assignment Help:

It is an additional 16-bit number which uniquely identifies the specific service on any given machine on the Internet. Port numbers are 16 bit wide, so each of the computers on the Internet contains a maximum number of 216 or 65,536 ports. The specific application is identified by its unique port number in the similar way that a particular television station has a unique channel number.

Port numbers are divided in three ranges which are following:

  • Well-known ports are those from 0 to 1,023.
  • Registered ports are those from 1,024 to 49,151.
  • Dynamic and private ports are those from 49,152 to 65,535.

Well-known ports, those ranging from 0 to 1,023 are where on the Internet most common services are residing. These ports are controlled & assigned through the Internet Assigned Number Authority (IANA) and on most systems can be utilized only by system (root) processes or through programs executed by privileged users.


Related Discussions:- Ports

How is it different than bootp or rarp, Bootp protocol normally use it in d...

Bootp protocol normally use it in dhcp protocol, it is configured manually in order to give ip add or there relvent host. Rarp is a work just opposite of Arp. Rarp stand for rev

What is the routing algorithm used by rip and igrp, Distance vector-based r...

Distance vector-based routing algorithms (also called as Bellman-Ford algorithms) pass periodic copies of a routing table from router to router. Regular updates among routers commu

Requests types in distributed enrollment protocol , Control Commands: The ...

Control Commands: The STAT command is used as a way for the client to confirm that the server is still responding properly. The server must simply send a positive command res

Show the rs232 logic waveform, Q. Show the RS232 Logic Waveform ? RS-2...

Q. Show the RS232 Logic Waveform ? RS-232 Interface Three most important wires for the Serial interface Transmit - Pin 2 Receive - Pin 3 Ground - Pin

Describe the importance of backups, Question: (a) Describe the importa...

Question: (a) Describe the importance of backups and the use of antivirus software. (b) With the help of an example/ illustration, explain the term encryption and explain

Show the importance of security, Q. Show the Importance of Security? Th...

Q. Show the Importance of Security? The Internet presents enormous business opportunities. The Internet is open to public, vulnerable to various attacks. One of the major

Determine the concept of placing antenna on hieght, Determine the concept o...

Determine the concept of placing antenna on hieght First, starting deployment simply placed cells in regions where there was high density of vehicle or human population. Once t

What are super servers, These are fully-loaded machines which consists of m...

These are fully-loaded machines which consists of multiprocessors, high-speed disk arrays for interview I/O and fault tolerant features.

Dns cache poisoning, DNS cache poisoning The DNA cache poisoning gener...

DNS cache poisoning The DNA cache poisoning generally refers to the process of maintaining or developing the false information, in the cache of DNS server. This process refers

State the disadvantages of adaptive routing process, State the Disadvantage...

State the Disadvantages of adaptive routing process  (1) The routing decision is more difficult; thus, the processing burden on network nodes enhances. (2) In most cases, ad

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd