SlideShare a Scribd company logo
2
Most read
9
Most read
18
Most read
PORTS AND PROTOCOLS
TCP & PORT NO 6
 TRANSMISSSION CONTROL PROTOCOL
 Transmission control protocol (TCP) is a network
communication protocol designed to send data
packets over the Internet.
 It is connection oriented
 It as acknowledgement
 It has three handshake method
 It is reliable
 Slow data transformation
UDP & PORT NO 17
 USER DATAGRAM PROTOCOL
 UDP uses a simple connectionless
communication model with a minimum of protocol
mechanism.
 It as NO acknowledgement
 Unreliable
 fast data transformation
FTP & PORT NO 20/21
 File Transfer Protocol
 It used for the transfer of files between a client and
server on a computer network.
 FTP is often secured with SSL/TLS (FTPS) or
replaced with SSH File Transfer Protocol
SSH & PORT NO 22
 Secure Shell (SSH)
 By using it we can access with a console in secure
in SSH
 SSH was designed as a replacement for Telnet and
for unsecured plain text
TELNET & PORT NO 23
 Telnet provided access remote host to a command-
line interface of the system
 Telnet is unencrypt it send plain text over the
network, so it is vulnerable.
 SSH was designed as a replacement for Telnet
SMTP & & PORT NO 25
 Simple Mail Transfer Protocol
 It is used to transfer mail (email) from source to
destination between mail servers and it is used by
end users to send email to a mail system.
 SMTP uses port 25, but SSL/TLS encrypted SMTP
uses port 465
DNS & PORT NO 53
 Domain Name System
 DNS is used widely on the public internet and on
private networks to translate domain names into IP
addresses, typically for network routing.
 For example, the domain
name www.example.com translates to the
addresses 93.184.216.34 (IPv4) and
2606:2800:220:1:248:1893:25c8:1946 (IPv6).
DHCP & PORT NO 67/68
 Dynamic Host Configuration Protocol
 DHCP server can manage UDP/IP settings for
devices on a network, by automatically or
dynamically assigning IP addresses to the devices.
 The DHCP employs a connectionless service
model, using the User Datagram Protocol (UDP).
UDP port number 67 is the destination port of a
server, and UDP port number 68 is used by the
client.
HTTP & PORT NO 80
 Hypertext Transfer Protocol (HTTP)
 HTTP is the main protocol that is used by web
browsers and used by any client that uses files
located on these servers.
POP3 & PORT NO 110
 Post Office Protocol (POP) version 3
 POP was designed to be very simple by allowing a
client to retrieve the complete contents of a server
mailbox and then deleting the contents from the
server.
 POP3 uses port 110, but SSL/TLS encrypted POP
uses port 995.
NTP & PORT NO 123
 Network Time Protocol
 It is a networking protocol for clock synchronization
between computer systems over packet-switched.
 NTP uses UDP/IP packets for data transfer
because of the fast connection setup and response
times.
IMAP & PORT NO 143
 Internet Message Access Protocol
 IMAP version3 is the second of the main protocols
used to retrieve mail from a server.
 IMAP uses port 143, but SSL/TLS
encrypted IMAP uses port 993.
SNMP & PORT NO 161/162
 Simple Network Management Protocol
 SNMP is used by network administrators including
the ability to monitor, configure and control network
devices
HTTPS & PORT NO 443
 Hypertext Transfer Protocol Secure (HTTPS)
 It is an extension of the Hypertext Transfer
Protocol (HTTP) for secure communication over
a computer network.
 The protocol is therefore also often referred to
as HTTP over TLS or HTTP over SSL.
SMB & PORT NO 445
 Server Message Block
 It mainly used for shared information
like files, printers, and serial ports and
miscellaneous communications in a network.
RDP & PORT NO 3389
 Remote Desktop Protocol
 It user with a graphical interface to connect to
another computer over a network connection
 The user employs RDP client software for this
purpose, while the other computer must run RDP
server software
 SQL Server & PORT NO 1433
 Nessus scanner & PORT NO 8834
 ArcSight ESM & PORT NO 8443
 proxy Server & PORT NO 8080

More Related Content

DOCX
Ports and protocols
PPTX
MAC & IP addresses
PPT
PPT
Ports & sockets
PPT
IP NETWORKING AND IP SUBNET MASKING
PPT
Ip Addressing
PPT
TCP/IP Basics
PPTX
Network protocols
Ports and protocols
MAC & IP addresses
Ports & sockets
IP NETWORKING AND IP SUBNET MASKING
Ip Addressing
TCP/IP Basics
Network protocols

What's hot (20)

PDF
Introduction to TCP/IP
PPTX
CCNA PPT
PPTX
IP addressing seminar ppt
PPTX
Virtual private network, vpn presentation
PPSX
PPTX
IP Address
PDF
MAC Address – All you Need to Know About it
PPTX
Introduction to Network Applications & Network Services
PPTX
IP classes
PPTX
IPv4 Addressing
PPT
Networking Fundamentals
PPTX
Ccna PPT
PPTX
Data communication and network Chapter -1
PPT
Active directory
PPTX
Classes of ip addresses
PPTX
Application layer protocols
PPTX
Network address translation
PPT
CCNA presentation.
PPT
Introduction to TCP/IP
CCNA PPT
IP addressing seminar ppt
Virtual private network, vpn presentation
IP Address
MAC Address – All you Need to Know About it
Introduction to Network Applications & Network Services
IP classes
IPv4 Addressing
Networking Fundamentals
Ccna PPT
Data communication and network Chapter -1
Active directory
Classes of ip addresses
Application layer protocols
Network address translation
CCNA presentation.
Ad

Similar to Ports and protocols (20)

PPTX
Basic to advance protocols
PPTX
Ports and services
PPTX
20 common port numbers and their purposes
DOCX
Protocols in computer network
PPS
Protocol
PDF
Networking:) Based on Ethical Hacking And Cyber Security
PPTX
Remote Login and File Transfer Protocols
PDF
6 networking
PPT
Tcpip services and applications
PPTX
Common ports
PPTX
network protocol | Networking by Nitasha Chaturvedi
PPTX
PACE-IT, Security+1.4: Common Network Protocols (part 2)
PPT
The Internet protocol suite, commonly known as TCP/IP, is a framework for org...
PPT
PPTX
Chp2 Application layer.pptxdata communication and networking
PPTX
Wireshark Tool Presentation by SCIT Null student chapter
PPT
07 - TCP_IP and the DoD Model.ppt
PPTX
20 common ports
PPT
tcp ip protocols.ppt
Basic to advance protocols
Ports and services
20 common port numbers and their purposes
Protocols in computer network
Protocol
Networking:) Based on Ethical Hacking And Cyber Security
Remote Login and File Transfer Protocols
6 networking
Tcpip services and applications
Common ports
network protocol | Networking by Nitasha Chaturvedi
PACE-IT, Security+1.4: Common Network Protocols (part 2)
The Internet protocol suite, commonly known as TCP/IP, is a framework for org...
Chp2 Application layer.pptxdata communication and networking
Wireshark Tool Presentation by SCIT Null student chapter
07 - TCP_IP and the DoD Model.ppt
20 common ports
tcp ip protocols.ppt
Ad

Recently uploaded (20)

PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PDF
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
PPTX
ManageIQ - Sprint 268 Review - Slide Deck
PDF
Digital Strategies for Manufacturing Companies
PDF
PTS Company Brochure 2025 (1).pdf.......
PPTX
VVF-Customer-Presentation2025-Ver1.9.pptx
PDF
System and Network Administraation Chapter 3
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PDF
Softaken Excel to vCard Converter Software.pdf
PPTX
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
PPTX
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
PDF
System and Network Administration Chapter 2
PDF
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
PDF
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
PDF
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PDF
AI in Product Development-omnex systems
PPTX
CHAPTER 2 - PM Management and IT Context
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PDF
Which alternative to Crystal Reports is best for small or large businesses.pdf
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
ManageIQ - Sprint 268 Review - Slide Deck
Digital Strategies for Manufacturing Companies
PTS Company Brochure 2025 (1).pdf.......
VVF-Customer-Presentation2025-Ver1.9.pptx
System and Network Administraation Chapter 3
Wondershare Filmora 15 Crack With Activation Key [2025
Softaken Excel to vCard Converter Software.pdf
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
System and Network Administration Chapter 2
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
AI in Product Development-omnex systems
CHAPTER 2 - PM Management and IT Context
Adobe Illustrator 28.6 Crack My Vision of Vector Design
Which alternative to Crystal Reports is best for small or large businesses.pdf

Ports and protocols

  • 2. TCP & PORT NO 6  TRANSMISSSION CONTROL PROTOCOL  Transmission control protocol (TCP) is a network communication protocol designed to send data packets over the Internet.  It is connection oriented  It as acknowledgement  It has three handshake method  It is reliable  Slow data transformation
  • 3. UDP & PORT NO 17  USER DATAGRAM PROTOCOL  UDP uses a simple connectionless communication model with a minimum of protocol mechanism.  It as NO acknowledgement  Unreliable  fast data transformation
  • 4. FTP & PORT NO 20/21  File Transfer Protocol  It used for the transfer of files between a client and server on a computer network.  FTP is often secured with SSL/TLS (FTPS) or replaced with SSH File Transfer Protocol
  • 5. SSH & PORT NO 22  Secure Shell (SSH)  By using it we can access with a console in secure in SSH  SSH was designed as a replacement for Telnet and for unsecured plain text
  • 6. TELNET & PORT NO 23  Telnet provided access remote host to a command- line interface of the system  Telnet is unencrypt it send plain text over the network, so it is vulnerable.  SSH was designed as a replacement for Telnet
  • 7. SMTP & & PORT NO 25  Simple Mail Transfer Protocol  It is used to transfer mail (email) from source to destination between mail servers and it is used by end users to send email to a mail system.  SMTP uses port 25, but SSL/TLS encrypted SMTP uses port 465
  • 8. DNS & PORT NO 53  Domain Name System  DNS is used widely on the public internet and on private networks to translate domain names into IP addresses, typically for network routing.  For example, the domain name www.example.com translates to the addresses 93.184.216.34 (IPv4) and 2606:2800:220:1:248:1893:25c8:1946 (IPv6).
  • 9. DHCP & PORT NO 67/68  Dynamic Host Configuration Protocol  DHCP server can manage UDP/IP settings for devices on a network, by automatically or dynamically assigning IP addresses to the devices.  The DHCP employs a connectionless service model, using the User Datagram Protocol (UDP). UDP port number 67 is the destination port of a server, and UDP port number 68 is used by the client.
  • 10. HTTP & PORT NO 80  Hypertext Transfer Protocol (HTTP)  HTTP is the main protocol that is used by web browsers and used by any client that uses files located on these servers.
  • 11. POP3 & PORT NO 110  Post Office Protocol (POP) version 3  POP was designed to be very simple by allowing a client to retrieve the complete contents of a server mailbox and then deleting the contents from the server.  POP3 uses port 110, but SSL/TLS encrypted POP uses port 995.
  • 12. NTP & PORT NO 123  Network Time Protocol  It is a networking protocol for clock synchronization between computer systems over packet-switched.  NTP uses UDP/IP packets for data transfer because of the fast connection setup and response times.
  • 13. IMAP & PORT NO 143  Internet Message Access Protocol  IMAP version3 is the second of the main protocols used to retrieve mail from a server.  IMAP uses port 143, but SSL/TLS encrypted IMAP uses port 993.
  • 14. SNMP & PORT NO 161/162  Simple Network Management Protocol  SNMP is used by network administrators including the ability to monitor, configure and control network devices
  • 15. HTTPS & PORT NO 443  Hypertext Transfer Protocol Secure (HTTPS)  It is an extension of the Hypertext Transfer Protocol (HTTP) for secure communication over a computer network.  The protocol is therefore also often referred to as HTTP over TLS or HTTP over SSL.
  • 16. SMB & PORT NO 445  Server Message Block  It mainly used for shared information like files, printers, and serial ports and miscellaneous communications in a network.
  • 17. RDP & PORT NO 3389  Remote Desktop Protocol  It user with a graphical interface to connect to another computer over a network connection  The user employs RDP client software for this purpose, while the other computer must run RDP server software
  • 18.  SQL Server & PORT NO 1433  Nessus scanner & PORT NO 8834  ArcSight ESM & PORT NO 8443  proxy Server & PORT NO 8080