SlideShare a Scribd company logo
Common
networking
protocols II.
Page 2
Instructor, PACE-IT Program – Edmonds Community College
Areas of Expertise Industry Certifications
 PC Hardware
 Network Administration
 IT Project Management
 Network Design
 User Training
 IT Troubleshooting
Qualifications Summary
Education
 M.B.A., IT Management, Western Governor’s University
 B.S., IT Security, Western Governor’s University
Entrepreneur, executive leader, and proven manger
with 10+ years of experience turning complex issues
into efficient and effective solutions.
Strengths include developing and mentoring diverse
workforces, improving processes, analyzing
business needs and creating the solutions
required— with a focus on technology.
Page 3
PACE-IT.
– The difference between ports and
protocols.
– Common ports and protocols.
Page 4
Common networking protocols II.
Page 5
Common networking protocols II.
– Ports.
» A method of specifying what protocol or service to access.
• Protocols and services use default ports so they are easy to
locate.
» There are 65,536 ports available to be used for communication,
but port 0 is reserved. So, in actuality, only ports 1 to 65,535
are available.
• The first 1024 ports are specifically assigned and are called
well known ports.
• www.iana.org/assignments/port-numbers.
» They can also be thought of as phone number extensions.
• The IP address is the main number you are trying to reach.
• The port is the is the extension (service or protocol) you want
to access.
– Protocols.
» Protocols can be thought of as the language that the two
applications on either side of the connection agree to speak.
» Protocols translate requests into services.
» Most protocols use pre-defined ports, but some protocols must
be user configured.
Page 6
Ports are not protocols and
protocols are not ports.
Even though the two are closely associated, they
are not the same. Ports are used to request
(access) services or applications. Protocols are the
services or applications that are being requested.
When a requestor seeks to connect to a specific
port, the requestor is dynamically assigned a port
number to “listen to” for the response. This also
allows computers to have many concurrent
connections.
Common networking protocols II.
Page 7
Common networking protocols II.
Page 8
Common networking protocols II.
– FTP (File Transfer Protocol).
» A standard protocol for transferring files between computing
systems; requires user authentication.
• Assigned to port 20 and to port 21 (mostly uses port 20).
– Trivial File Transfer Protocol (TFTP).
» Transfers files between servers and clients; no user
authentication required.
• Assigned to port 69.
– SNMP (Simple Network Management
Protocol).
» A protocol used to monitor and manage local area networks.
• Assigned to port 161.
Page 9
Common networking protocols II.
– Telnet.
» A protocol used for remote access to systems; it is unsecure. It
is a bidirectional terminal service.
• Assigned to port 23.
– SSH (Secure Shell)
» A protocol used to encrypt data traffic on a network; it can be
used in place of Telnet to provide a secure bidirectional
terminal connection.
• Assigned to port 22.
– DNS (Domain Name System).
» The protocol used to map computer names to their IP
addresses (e.g., www.google.com to 74.125.28.104).
• Assigned to port 53.
Page 10
Common networking protocols II.
– DHCP (Dynamic Host Configuration
Protocol).
» The protocol used within networks to automatically configure
computers with the correct IP configurations (e.g., IP address,
subnet mask, default gateway, and DNS server location).
• Requests are assigned to port 67.
• Responses are assigned port 68.
– RDP (Remote Desktop Protocol).
» Used in Microsoft networks by Remote Desktop Connection
and Remote Assistance to make remote connections.
• Assigned to port 3389.
– SMB (Server Message Block).
» A protocol used to transfer files over a network; the process is
transparent to the user. SMB can be configured to run over
NetBIOS on ports 137-139.
• Assigned to port 445.
Page 11
Common networking protocols II.
Ports are a method of specifying what protocol or service a requestor is
seeking access to. They can be thought of as being the specific location of
that protocol or service. Protocols translate the request into a specific
service. Of the possible 65,536 ports, 1024 ports are well known (clearly
defined as to their purpose). Most protocols are automatically assigned to
ports; however, some must have their ports configured by the user.
Topic
The difference between ports
and protocols.
Summary
Common ports and protocols include: FTP (20 and 21), TFTP (69), SNMP
(161), Telnet (23), SSH (22), DNS (53), DHCP (69 and 68), RDP (3389),
and SMB (445).
Common ports and protocols.
Page 12
THANK YOU!
This workforce solution was 100 percent funded by a $3 million grant awarded by the
U.S. Department of Labor's Employment and Training Administration. The solution was
created by the grantee and does not necessarily reflect the official position of the U.S.
Department of Labor. The Department of Labor makes no guarantees, warranties, or
assurances of any kind, express or implied, with respect to such information, including
any information on linked sites and including, but not limited to, accuracy of the
information or its completeness, timeliness, usefulness, adequacy, continued availability
or ownership. Funded by the Department of Labor, Employment and Training
Administration, Grant #TC-23745-12-60-A-53.
PACE-IT is an equal opportunity employer/program and auxiliary aids and services are
available upon request to individuals with disabilities. For those that are hearing
impaired, a video phone is available at the Services for Students with Disabilities (SSD)
office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call
425.354.3113 on a video phone for more information about the PACE-IT program. For
any additional special accommodations needed, call the SSD office at 425.640.1814.
Edmonds Community College does not discriminate on the basis of race; color; religion;
national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran
status; or genetic information in its programs and activities.

More Related Content

PPTX
PACE-IT: Common Networking Potocols (part 1)
PPTX
Pace IT - Common Ports and Protocols
PPTX
PACE-IT: Introduction to Wireless Standards
PPTX
PACE-IT: Introduction to IPv4 (part 2) - N10 006
PPTX
Pace IT - Introduction to the Transport Layer
PPTX
PACE-IT: Introduction to Wired Network Standards
PPTX
PACE-IT: The OSI Networking Reference Model
PPTX
Pace IT - Setting Up a SOHO Network
PACE-IT: Common Networking Potocols (part 1)
Pace IT - Common Ports and Protocols
PACE-IT: Introduction to Wireless Standards
PACE-IT: Introduction to IPv4 (part 2) - N10 006
Pace IT - Introduction to the Transport Layer
PACE-IT: Introduction to Wired Network Standards
PACE-IT: The OSI Networking Reference Model
Pace IT - Setting Up a SOHO Network

What's hot (20)

PPTX
PACE-IT: DHCP in the Network - N10 006
PPTX
PACE-IT: WAN Technologies (part 1) - N10 006
PPT
WAN Design Project
PPTX
Pace IT - Introduction to IPv6
PPTX
PACE-IT: Network Cabling (part 2) - N10 006
PPTX
Pace IT Coax and Fiber
PPTX
PACE-IT: Introduction_to Routing Concepts (part 2) - N10 006
PPTX
PACE-IT: Introduction to Routing Protocols - N10 006
PPTX
PACE-IT: Basic Elements of Unified Communications - N10 006
PPT
Introduction to Computer Networks Lecture slides ppt
PPTX
PACE-IT: Wan Technologies (part 3) - N10-006
PPTX
CN_lec 1_Introduction
PPTX
PACE-IT: WAN Technologies (part 2) - N10 006
PPTX
PACE-IT: The Transport Layer Plus ICMP
PPTX
PACE-IT: Basic Network Concepts (part 1)
PPT
Chapter2
PPTX
PACE-IT: Network Cabling (part 3) - N10 006
PPTX
PACE-IT: Network Cabling (part 1) - N10 006
PPTX
PACE-IT: Basic Network Concepts (part 3)
PPT
Ch01 ce
PACE-IT: DHCP in the Network - N10 006
PACE-IT: WAN Technologies (part 1) - N10 006
WAN Design Project
Pace IT - Introduction to IPv6
PACE-IT: Network Cabling (part 2) - N10 006
Pace IT Coax and Fiber
PACE-IT: Introduction_to Routing Concepts (part 2) - N10 006
PACE-IT: Introduction to Routing Protocols - N10 006
PACE-IT: Basic Elements of Unified Communications - N10 006
Introduction to Computer Networks Lecture slides ppt
PACE-IT: Wan Technologies (part 3) - N10-006
CN_lec 1_Introduction
PACE-IT: WAN Technologies (part 2) - N10 006
PACE-IT: The Transport Layer Plus ICMP
PACE-IT: Basic Network Concepts (part 1)
Chapter2
PACE-IT: Network Cabling (part 3) - N10 006
PACE-IT: Network Cabling (part 1) - N10 006
PACE-IT: Basic Network Concepts (part 3)
Ch01 ce
Ad

Viewers also liked (10)

PPTX
Network protocol
PPT
Networking Chapter 15
PPT
Networking Concepts Lesson 06 - Protocols - Eric Vanderburg
PDF
Networking Protocols for Internet of Things
PPT
Network protocol
PPTX
Protocols
PPTX
Internet Protocols
PPTX
Networking Standards And Protocols
PPT
NETWORK PROTOCOL
PDF
Network protocols
Network protocol
Networking Chapter 15
Networking Concepts Lesson 06 - Protocols - Eric Vanderburg
Networking Protocols for Internet of Things
Network protocol
Protocols
Internet Protocols
Networking Standards And Protocols
NETWORK PROTOCOL
Network protocols
Ad

Similar to PACE-IT: Common Networking Protocols (part 2) (20)

PPTX
Pace IT - Common Ports and Protocols
PPTX
PACE-IT, Security+1.4: Common Network Protocols (part 2)
PPTX
PACE-IT, Security+1.4: Common Network Protocols (part 3)
PPTX
PACE-IT: Networking Services and Applications (part 2) - N10 006
PDF
Cybersecurity controlling ports and network devices
PPTX
Pace IT - Client Networking (Part 3)
PDF
Aplication and Transport layer- a practical approach
DOCX
Ports and protocols
PPTX
PACE-IT: Networking Services and Applications (part 1) - N10 006
PPTX
Chapter04
PPTX
this is a power point presentation on chat application
PPTX
A Deep Dive in the World of IT Networking (Part 2)
PDF
Assessing Network Readiness
PPTX
INT_Ch17.pptx
DOC
76924356 synopsis-network
PPTX
install and manage network protocols.pptx
PDF
installandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdf
PPTX
ITN_Module_17.pptx
PDF
17 - Building small network.pdf
PPTX
M1-C17-Armando una red.pptx
Pace IT - Common Ports and Protocols
PACE-IT, Security+1.4: Common Network Protocols (part 2)
PACE-IT, Security+1.4: Common Network Protocols (part 3)
PACE-IT: Networking Services and Applications (part 2) - N10 006
Cybersecurity controlling ports and network devices
Pace IT - Client Networking (Part 3)
Aplication and Transport layer- a practical approach
Ports and protocols
PACE-IT: Networking Services and Applications (part 1) - N10 006
Chapter04
this is a power point presentation on chat application
A Deep Dive in the World of IT Networking (Part 2)
Assessing Network Readiness
INT_Ch17.pptx
76924356 synopsis-network
install and manage network protocols.pptx
installandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdf
ITN_Module_17.pptx
17 - Building small network.pdf
M1-C17-Armando una red.pptx

More from Pace IT at Edmonds Community College (20)

PPTX
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PPTX
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PPTX
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PPTX
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PPTX
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PPTX
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PPTX
PACE-IT, Security + 5.3: Security Controls for Account Management
PPTX
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PPTX
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PPTX
PACE-IT, Security + 5.1: Summary of Authentication Services
PPTX
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PPTX
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PPTX
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PPTX
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PPTX
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PPTX
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PPTX
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PPTX
PACE-IT, Security+3.6: Security Enhancement Techniques
PPTX
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PPTX
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)

Recently uploaded (20)

PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
Institutional Correction lecture only . . .
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
Pre independence Education in Inndia.pdf
PPTX
GDM (1) (1).pptx small presentation for students
PPTX
Cell Structure & Organelles in detailed.
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
master seminar digital applications in india
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
STATICS OF THE RIGID BODIES Hibbelers.pdf
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Institutional Correction lecture only . . .
FourierSeries-QuestionsWithAnswers(Part-A).pdf
2.FourierTransform-ShortQuestionswithAnswers.pdf
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPH.pptx obstetrics and gynecology in nursing
VCE English Exam - Section C Student Revision Booklet
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
human mycosis Human fungal infections are called human mycosis..pptx
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Pre independence Education in Inndia.pdf
GDM (1) (1).pptx small presentation for students
Cell Structure & Organelles in detailed.
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Anesthesia in Laparoscopic Surgery in India
master seminar digital applications in india
Final Presentation General Medicine 03-08-2024.pptx
Pharmacology of Heart Failure /Pharmacotherapy of CHF

PACE-IT: Common Networking Protocols (part 2)

  • 2. Page 2 Instructor, PACE-IT Program – Edmonds Community College Areas of Expertise Industry Certifications  PC Hardware  Network Administration  IT Project Management  Network Design  User Training  IT Troubleshooting Qualifications Summary Education  M.B.A., IT Management, Western Governor’s University  B.S., IT Security, Western Governor’s University Entrepreneur, executive leader, and proven manger with 10+ years of experience turning complex issues into efficient and effective solutions. Strengths include developing and mentoring diverse workforces, improving processes, analyzing business needs and creating the solutions required— with a focus on technology.
  • 3. Page 3 PACE-IT. – The difference between ports and protocols. – Common ports and protocols.
  • 4. Page 4 Common networking protocols II.
  • 5. Page 5 Common networking protocols II. – Ports. » A method of specifying what protocol or service to access. • Protocols and services use default ports so they are easy to locate. » There are 65,536 ports available to be used for communication, but port 0 is reserved. So, in actuality, only ports 1 to 65,535 are available. • The first 1024 ports are specifically assigned and are called well known ports. • www.iana.org/assignments/port-numbers. » They can also be thought of as phone number extensions. • The IP address is the main number you are trying to reach. • The port is the is the extension (service or protocol) you want to access. – Protocols. » Protocols can be thought of as the language that the two applications on either side of the connection agree to speak. » Protocols translate requests into services. » Most protocols use pre-defined ports, but some protocols must be user configured.
  • 6. Page 6 Ports are not protocols and protocols are not ports. Even though the two are closely associated, they are not the same. Ports are used to request (access) services or applications. Protocols are the services or applications that are being requested. When a requestor seeks to connect to a specific port, the requestor is dynamically assigned a port number to “listen to” for the response. This also allows computers to have many concurrent connections. Common networking protocols II.
  • 7. Page 7 Common networking protocols II.
  • 8. Page 8 Common networking protocols II. – FTP (File Transfer Protocol). » A standard protocol for transferring files between computing systems; requires user authentication. • Assigned to port 20 and to port 21 (mostly uses port 20). – Trivial File Transfer Protocol (TFTP). » Transfers files between servers and clients; no user authentication required. • Assigned to port 69. – SNMP (Simple Network Management Protocol). » A protocol used to monitor and manage local area networks. • Assigned to port 161.
  • 9. Page 9 Common networking protocols II. – Telnet. » A protocol used for remote access to systems; it is unsecure. It is a bidirectional terminal service. • Assigned to port 23. – SSH (Secure Shell) » A protocol used to encrypt data traffic on a network; it can be used in place of Telnet to provide a secure bidirectional terminal connection. • Assigned to port 22. – DNS (Domain Name System). » The protocol used to map computer names to their IP addresses (e.g., www.google.com to 74.125.28.104). • Assigned to port 53.
  • 10. Page 10 Common networking protocols II. – DHCP (Dynamic Host Configuration Protocol). » The protocol used within networks to automatically configure computers with the correct IP configurations (e.g., IP address, subnet mask, default gateway, and DNS server location). • Requests are assigned to port 67. • Responses are assigned port 68. – RDP (Remote Desktop Protocol). » Used in Microsoft networks by Remote Desktop Connection and Remote Assistance to make remote connections. • Assigned to port 3389. – SMB (Server Message Block). » A protocol used to transfer files over a network; the process is transparent to the user. SMB can be configured to run over NetBIOS on ports 137-139. • Assigned to port 445.
  • 11. Page 11 Common networking protocols II. Ports are a method of specifying what protocol or service a requestor is seeking access to. They can be thought of as being the specific location of that protocol or service. Protocols translate the request into a specific service. Of the possible 65,536 ports, 1024 ports are well known (clearly defined as to their purpose). Most protocols are automatically assigned to ports; however, some must have their ports configured by the user. Topic The difference between ports and protocols. Summary Common ports and protocols include: FTP (20 and 21), TFTP (69), SNMP (161), Telnet (23), SSH (22), DNS (53), DHCP (69 and 68), RDP (3389), and SMB (445). Common ports and protocols.
  • 13. This workforce solution was 100 percent funded by a $3 million grant awarded by the U.S. Department of Labor's Employment and Training Administration. The solution was created by the grantee and does not necessarily reflect the official position of the U.S. Department of Labor. The Department of Labor makes no guarantees, warranties, or assurances of any kind, express or implied, with respect to such information, including any information on linked sites and including, but not limited to, accuracy of the information or its completeness, timeliness, usefulness, adequacy, continued availability or ownership. Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53. PACE-IT is an equal opportunity employer/program and auxiliary aids and services are available upon request to individuals with disabilities. For those that are hearing impaired, a video phone is available at the Services for Students with Disabilities (SSD) office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call 425.354.3113 on a video phone for more information about the PACE-IT program. For any additional special accommodations needed, call the SSD office at 425.640.1814. Edmonds Community College does not discriminate on the basis of race; color; religion; national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran status; or genetic information in its programs and activities.