Which Of The Following Are Secure Protocols, Ports, Services, Or Applications?
40 Network Protocol Names And Port Numbers With Their Transport Protocols And Meanings tabulated by Precious Ocansey (HND, Network Engineer).
Before going straight to the table.
Firstly, what are Network Protocols?
Network protocols are the languages and rules used during communication in a estimator network. There are ii major transport protocols namely;
TCP and UDP
TCPwhich stands for "Manual Control Protocol", is a suite of communication protocols used to interconnect network devices on a local network or a public network like the internet. TCP is known as "connection-oriented" protocols equally it ensures each data package is delivered every bit requested. Therefore, TCP is used for transferring most types of data such as webpages and files over the Internet.
UDP which stands for "User Datagram Protocol" is part of the TCP/IP suite of protocols used for data transferring. UDP is a known as a "connectionless-oriented" protocol, meaning it doesn't acknowledge that the packets being sent have been received. For this reason, the UDP protocol is typically used for streaming media. While you might see skips in video or hear some fuzz in audio clips, UDP manual prevents the playback from stopping completely.
Furthermore, TCP too includes congenital-in error checking means TCP has more than overhead and is therefore slower than UDP, information technology ensures authentic commitment of data between systems. Therefore TCP is used for transferring nigh types of data such as webpages and files over the local network or Internet. UDP is ideal for media streaming which does not crave all packets to exist delivered.
Port Numbers: They are the unique identifiers given to all protocol numbers so they can exist accessed hands.
Below is as written by Precious Ocansey. The 40 Network Protocols, their port numbers and their transport protocols
PROTOCOLS (SERVICE NAMES) | PORTS NUMBERS | TRANSPORT PROTOCOLS | MEANINGS |
ane.File Transfer Protocol (FTP) | twenty and 21 | TCP | It is a protocol that carries data guarantees that data will be delivered properly. |
2.Secure Shell (SSH) | 22 | TCP and UDP | It is a cryptographic network protocol used to secure information advice. |
3.Telnet | 23 | TCP | Information technology is the used for remote management protocol for managing network devices. |
4.Elementary Mail Transfer Protocol (SMTP) | 25 | TCP | Information technology is a advice protocol which is used to transmit email messages over the internet to the destination server. |
5.Domian Name System (DNS) | 53 | TCP and UDP | It is used in the performance of one elementary task of converting IP address To domain names that everyone can easily understand. |
6.Trivial File Transfer Protocol (TFTP) | 69 | UDP | TFTP is typically used by devices to upgrade software and firmware and that include cisco. |
7.Hyper Text Transfer Protocol (HTTP) | lxxx | TCP | It is a kind of protocol used to define how data is transmitted and formatted and likewise used by world wide web as a channel for advice. |
viii.Dynamic Host Configuration Protocol (DHCP) | 67 and 68 | UDP | Information technology is a kind of service used in the client and server model. |
nine.Post Part Protocol 3 (POP3) | 110 | TCP | It is a protocol used by email customer to retrieve electronic mail from the servers. |
10.Network News Transport Protocol (NNTP) | 119 | TCP | nntp is an awarding protocol used for transporting USENET news articles between news servers and the end user client. |
eleven.Network Time Protocol (NTP) | 123 | UDP | It is the synchronization of time between network devices in the network. |
12.NetBIOS | 135 and 139 | TCP and UDP | NetBIOS itself is not a protocol but is typically used in combination with IP with the NetBIOS over TCP/IP protocol. |
13.Simple Network Management Protocol (SNMP) | 161 and 162 | TCP and UDP | Information technology has the power to monitor, configure and control network devices. |
14.Lightweight Directory Access Protocol | 389 | TCP and UDP | LDAP provides a mechanism of accessing and maintaining distributed directory information. |
15.Transport Layer Security (TLS) | 443 | TCP | Information technology is a protocol of a secured socket layer that uses asymmetric keys to transfer information over a network. |
16.Real-Time Ship Protocol. (RTP) | 1023 TO 65535 | UDP | Information technology is used for delivering audio and video data over an IP network. |
17.Hyper Text Transfer Protocol Secure. (HTTPS) | 443 | TCP | It renders authentication and encryption that provides secure advice with the use of secure socket layer. |
18.Net Message Access Protocol. (IMAP4) | 143 | TCP and UDP | It is an application layer protocol and an cyberspace standards for electronic mail retrieval. |
19.Address Resolution Protocol (ARP) | 3389 | TCP | It is used to resolve the network layer address into the link address. |
20.Border Gateway Protocol (BGP) | 179 | TCP | Information technology is used to maintain very large routing tables and traffic processing. |
21.Net Relay Chat (IRC) | 194 | UDP | Information technology is an awarding layer protocol that facilitate communication in the grade of text. |
22.Session Initiation Protocol. (SLP) | TCP and UDP | It is used to establish, modify, and terminate multimedia advice session such as VoIP. | |
23.Session Description Protocol.(SDP) | TCP | It describes the content of multimedia advice. | |
24.Remote Desktop Protocol. (RDP) | 3389 | TCP | It provides a user with a graphical interface to connect to another computer over a network connectedness. |
25.Server Message Block (SMB) | TCP | Information technology is an application layer protocol that helps in accessing network resources, such as shared files and printers. | |
26.Secure File Transfer Protocol (SFTP) | 22 | TCP and UDP | It uses the SSH protocol to access and transfer file over the network. |
27.Internet Group Management Protocol (IGMP) | ii | TCP | It is a advice protocol used past hosts and next routers on IPv4 network to establish multicast group membership. |
28.Route Access Protocol (RAP) | 38 | TCP | |
29.Resource Location Protocol (RLP) | 39 | TCP | It is used for determining the location of college level service from host on a network. |
30.Host Name Server Protocol (HNSP) | 42 | TCP | |
31.Internet Control Letters Protocol (ICMP) | 1 | PING | It is used by a ping utility to check the reachability the device in a network. |
32.Remote Directory Admission Protocol (RDAS) | TCP | It is used retrieves information about domain names from a fundamental registry. | |
33.Lightweight Presentation Protocol (LPP) | TCP and UDP | It is describe an approach for providing stream lined support of OSI awarding services on elevation of TCP/IP –based network for some constrained environment. | |
34.Remote Procedure Telephone call Protocol (RPC) | TCP and UDP | Information technology is a protocol for requesting a service from a programme location in a remote computer through a network. | |
35.Network Accost Translation (NAT) | 3022 | TCP and UDP | It is the method by which IP addresses are mapped from one group to some other, transparent to finish users. |
36.Microsoft Active Directory Protocol (MADP) | 445 | TCP | it is used by Microsoft server operating systems for customer/server access and file and printer sharing. |
37.Calender Access Protocol (CAP) | 1026 | TCP | It is used past Novell GroupWise for its agenda access protocol and likewise used by windows job scheduler. |
38. Layer Two Tunneling Protocol.(L2TP) | 1701 | TCP | Information technology is used to connect two private business organisation network together over an internet connection to create a virtual network. |
39.Point To Point Tunneling Protocol (PPTP) | 1732 | TCP | A tunneling and encryption standard is used to connect two individual business network together over an cyberspace connexion to create a virtual network. |
40.Remote Process Phone call (RPC) | 135 | TCP | It holds information regarding which ports and IP addresses the services are currently running . |
Which Of The Following Are Secure Protocols, Ports, Services, Or Applications?,
Source: https://vincenttechblog.com/40-network-protocols-with-port-numbers-transport-protocols-and-meanings/
Posted by: williamsletly1959.blogspot.com
0 Response to "Which Of The Following Are Secure Protocols, Ports, Services, Or Applications?"
Post a Comment