Hello readers, I know many of you might be thinking that I am focusing too much on the theory part without even telling you about a single hack until now and you should because that's natural. But don't worry my dear friends I will soon be coming to that part too. I know many of you are already aware about the basics but there are also people who don't know even a bit of it. I have to think about them too.
Many of you might have heard that if someone does illegal activities on the internet then the cops can easily catch hold of him by tracking him down. But how do they do so. They simply track the Internet Protocol(IP) Address of him, which gives them his exact location and they go to the acquired address and then Boom! So what's this Internet Protocol. That is what we are going to explore today along with some other important protocols and ports(associated with the type of protocol used for communication).
First of all - What is a Port and a Protocol? Well to understand this consider the situation when you call someone using your cell phone. As soon as the other person, whom you are calling picks up your call you can communicate with him. In this situation the cell phones that is the end points allowed you to communicate with each other. Similarly in computer networking a port is an application-specific or process-specific software construct serving as a communications endpoint in a computer's host operating system. The purpose of ports is to uniquely identify different applications or processes running on a single computer and thereby enable them to share a single physical connection to a packet-switched network like the Internet. During the course of communication a system of digital rules is followed, which is called a protocol.
Every service has its own unique port number and associated protocol. For instance the file transfer service used to copy a file from one host to another over a TCP/IP based network uses the File Transfer Protocol(FTP) and runs on port number 21.
Many of you might have heard that if someone does illegal activities on the internet then the cops can easily catch hold of him by tracking him down. But how do they do so. They simply track the Internet Protocol(IP) Address of him, which gives them his exact location and they go to the acquired address and then Boom! So what's this Internet Protocol. That is what we are going to explore today along with some other important protocols and ports(associated with the type of protocol used for communication).
First of all - What is a Port and a Protocol? Well to understand this consider the situation when you call someone using your cell phone. As soon as the other person, whom you are calling picks up your call you can communicate with him. In this situation the cell phones that is the end points allowed you to communicate with each other. Similarly in computer networking a port is an application-specific or process-specific software construct serving as a communications endpoint in a computer's host operating system. The purpose of ports is to uniquely identify different applications or processes running on a single computer and thereby enable them to share a single physical connection to a packet-switched network like the Internet. During the course of communication a system of digital rules is followed, which is called a protocol.
Every service has its own unique port number and associated protocol. For instance the file transfer service used to copy a file from one host to another over a TCP/IP based network uses the File Transfer Protocol(FTP) and runs on port number 21.
Some Common Services along with their Port and Protocol are given in the figure below :
Before saying bye bye let me explain you the two most important protocols that constitute the Internet Protocol Suite. The first one being Transmission Control Protocol(TCP) and the other one Internet Protocol(IP). Therefore the Internet Protocol Suite is also referred to as TCP/IP.
1.TCP or Transmission Control Protocol : It provides the service of exchanging data reliably directly between two network hosts. In particular, TCP provides reliable, ordered delivery of a stream of bytes from a program on one computer to another program on another computer. It is the protocol on which the major Internet applications rely on, such as the World Wide Web(WWW), email, and file transfer.
2.IP or Internet Protocol : It handles addressing and routing messages across one or more networks i.e., it has the task of delivering data from the source host to the destination host solely based on their addresses. It is the primary protocol that establishes the Internet.
With that we come to the end for this post, Be Rocking!!
No comments:
Post a Comment