Common Network Ports and Network Protocols
Setting up Network Services - Internet Plumbing
Here are the common ports and network protocols that Network Engineers use.
What is a network protocol?
Protocols are like a set of rules that computers use to communicate with each other over a network. It's like having a common language so that different devices can understand each other.
Here are some protocols:
File Transfer Protocol (FTP): It helps you transfer files between computers. It's like sending files from one computer to another.
Secure Shell (SSH): This protocol is used to securely connect to a remote computer over a network. It's like having a secret tunnel to access and control another computer.
Secure File Transfer Protocol (SFTP): Similar to FTP, but with added security. It's used to transfer files securely between computers.
Telnet: Telnet allows you to remotely access another computer and control it. It's like using a computer through a virtual window.
Simple Mail Transfer Protocol (SMTP): It's the protocol used to send emails from one computer to another. It's like putting a letter in an envelope and sending it to someone.
Domain Name System (DNS): DNS helps convert human-friendly website names (like www.example.com) into computer-friendly IP addresses (like 192.168.1.1). It's like a phonebook that translates names into phone numbers.
Dynamic Host Configuration Protocol (DHCP): This protocol assigns IP addresses automatically to devices on a network. It's like a network assistant that gives each device its own unique address.
Trivial File Transfer Protocol (TFTP): Similar to FTP but with fewer features. It's often used for basic file transfers, like updating firmware on network devices.
What is a network port?
Ports are like specific doors on a computer that allow different types of information to go in and out.
Here are some common ports:
Port 20/21: Used by FTP for transferring files.
Port 22: Used by SSH and SFTP for secure remote access and file transfer.
Port 23: Used by Telnet for remote computer access.
Port 25: Used by SMTP for sending emails.
Port 53: Used by DNS for translating domain names to IP addresses.
Port 67/68: Used by DHCP for assigning IP addresses.
Port 69: Used by TFTP for basic file transfers.
Port 80: Used by HTTP for web browsing.
Port 110: Used by POP3 for receiving emails.
Port 123: Used by NTP for time synchronization.
Port 143: Used by IMAP for receiving emails.
Port 161/162: Used by SNMP for network management.
Port 389: Used by LDAP for accessing directory services.
Port 443: Used by HTTPS for secure web browsing.
Port 445: Used by SMB for file and printer sharing.
Port 514: Used by Syslog for logging network events.
Each port is like a different entrance for specific types of network traffic.
What is an IP Protocol Type?
IP protocol types are different ways of sending and receiving data over the internet.
Here are a few examples:
Internet Control Message Protocol (ICMP): It's used for error messages and network troubleshooting.
TCP: It's a reliable and connection-oriented protocol used for transmitting data in a way that ensures it's delivered correctly.
UDP: It's a faster but less reliable and connectionless protocol used for tasks like streaming media or online gaming.
Generic Routing Encapsulation (GRE): It's used to create secure connections between networks over the internet.
Internet Protocol Security (IPSec): It's a set of protocols for securing IP communications, providing encryption and authentication.
Authentication Header (AH) /Encapsulating Security Payload (ESP): These are components of IPSec that provide additional security features, such as authentication and encryption, to protect data during transmission.
Connectionless vs. Connection-oriented: Connectionless and connection-oriented are two different ways of establishing communication between devices:
Connectionless: In connectionless communication, data packets are sent independently without establishing a dedicated connection beforehand. Each packet is treated separately and can take different routes to reach the destination. UDP is an example of a connectionless protocol. It's like sending individual letters without a specific order or guarantee that they will all arrive.
Connection-oriented: In connection-oriented communication, a dedicated connection is established between two devices before data transmission begins. The connection is maintained throughout the communication session, ensuring reliability and sequencing of data packets. TCP is an example of a connection-oriented protocol. It's like making a phone call where you establish a connection, have a conversation, and make sure the other person hears everything you say.
By understanding these concepts, you can have a basic understanding of how different devices communicate over a network and how data is transferred securely.

