TCP / IP :

TCP/IP is an industry-standard protocol suit for Wide Area Networks (WANs) developed in the 1970s and 1980 by the U.S Department of Defense (DoD). TCP/IP ( transmission control protocol / Internet protocol ) is a routable protocal that is suitable for connecting dissimilar system in heterogeneous networks. It is the protocol of the worldwide network known as the Internet.

Your IP Address

How To Work TCP / IP ?

TCP ( Transmission control protocol ) and IP ( Internet protocol ). he Internet Protocol standard dictates the logistics of packets sent out over networks, it tells packets where to go and how to get there. IP has a method that lets any computer on the Internet forward a packet to another computer that is one or more intervals closer to the packet's recipient. You can think of it like workers in a line passing boulders from a quarry to a mining cart.

The Transmission Control Protocol is responsible for ensuring the reliable transmission of data across Internet-connected networks. TCP checks packets for errors and submits requests for re-transmissions if any are found.

Most common TCP/IP protocols :

ProtocolTCP/UDPPort NumberDescription
File Transfer Protocol (FTP)

(RFC 959)
TCP 20 / 21 FTP is one of the most commonly used file transfer protocols on the Internet and within private networks. An FTP server can easily be set up with little networking knowledge and provides the ability to easily relocate files from one system to another. FTP control is handled on TCP port 21 and its data transfer can use TCP port 20 as well as dynamic ports depending on the specific configuration.
Secure Shell (SSH)

(RFC 4250-4256)
TCP 22 SSH is the primary method used to manage network devices securely at the command level. It is typically used as a secure alternative to Telnet which does not support secure connections.
Telnet (RFC 854) TCP 23 Telnet is the primary method used to manage network devices at the command level. Unlike SSH which provides a secure connection, Telnet does not, it simply provides a basic unsecured connection. Many lower level network devices support Telnet and not SSH as it required some additional processing. Caution should be used when connecting to a device using Telnet over a public network as the login credentials will be transmitted in the clear.
Simple Mail Transfer Protocol (SMTP)

(RFC 5321)
TCP 25 SMTP is used for two primary functions, it is used to transfer mail (email) from source to destination between mail servers and it is used by end users to send email to a mail system.
Domain Name System (DNS)

(RFC 1034-1035)
TCP / UDP 53 The DNS is used widely on the public internet and on private networks to translate domain names into IP addresses, typically for network routing. DNS is hieratical with main root servers that contain databases that list the managers of high level Top Level Domains (TLD) (such as .com). These different TLD managers then contain information for the second level domains that are typically used by individual users (for example, cisco.com). A DNS server can also be set up within a private network to private naming services between the hosts of the internal network without being part of the global system.
Dynamic Host Configuration Protocol (DHCP)

(RFC 2131)
UDP 67 / 68 DHCP is used on networks that do not use static IP address assignment (almost all of them). A DHCP server can be set up by an administrator or engineer with a poll of addresses that are available for assignment. When a client device is turned on it can request an IP address from the local DHCP server, if there is an available address in the pool it can be assigned to the device. This assignment is not permanent and expires at a configurable interval; if an address renewal is not requested and the lease expires the address will be put back into the poll for assignment.
Trivial File Transfer Protocol (TFTP)

(RFC 1350)
UDP 69 TFTP offers a method of file transfer without the session establishment requirements that FTP uses. Because TFTP uses UDP instead of TCP it has no way of ensuring the file has been properly transferred, the end device must be able to check the file to ensure proper transfer. TFTP is typically used by devices to upgrade software and firmware; this includes Cisco and other network vendors’ equipment.
Hypertext Transfer Protocol (HTTP)

(RFC 2616)
TCP 80 HTTP is one of the most commonly used protocols on most networks. HTTP is the main protocol that is used by web browsers and is thus used by any client that uses files located on these servers.
Post Office Protocol (POP) version 3

(RFC 1939)
TCP 110 POP version 3 is one of the two main protocols used to retrieve mail from a server. POP was designed to be very simple by allowing a client to retrieve the complete contents of a server mailbox and then deleting the contents from the server.
Network Time Protocol (NTP)

(RFC 5905)
TCP 123 One of the most overlooked protocols is NTP. NTP is used to synchronize the devices on the Internet. Even most modern operating systems support NTP as a basis for keeping an accurate clock. The use of NTP is vital on networking systems as it provides an ability to easily interrelate troubles from one device to another as the clocks are precisely accurate.
NetBIOS

(RFC 1001-1002)
TCP / UDP 137 / 138 / 139 NetBIOS itself is not a protocol but is typically used in combination with IP with the NetBIOS over TCP/IP (NBT) protocol. NBT has long been the central protocol used to interconnect Microsoft Windows machines.
Internet Message Access Protocol (IMAP)

(RFC 3501)
TCP 143 IMAP version3 is the second of the main protocols used to retrieve mail from a server. While POP has wider support, IMAP supports a wider array of remote mailbox operations which can be helpful to users.
Simple Network Management Protocol (SNMP)

(RFC 1901-1908, 3411-3418)
TCP / UDP 161 / 162 SNMP is used by network administrators as a method of network management. SNMP has a number of different abilities including the ability to monitor, configure and control network devices. SNMP traps can also be configured on network devices to notify a central server when specific actions are occurring. Typically, these are configured to be used when an alerting condition is happening. In this situation, the device will send a trap to network management stating that an event has occurred and that the device should be looked at further for a source to the event.
Border Gateway Protocol (BGP)

(RFC 4271)
TCP 179 BGP version 4 is widely used on the public internet and by Internet Service Providers (ISP) to maintain very large routing tables and traffic processing. BGP is one of the few protocols that have been designed to deal with the astronomically large routing tables that must exist on the public Internet.
Lightweight Directory Access Protocol (LDAP)

(RFC 4510)
TCP / UDP 389 LDAP provides a mechanism of accessing and maintaining distributed directory information. LDAP is based on the ITU-T X.500 standard but has been simplified and altered to work over TCP/IP networks.
Hypertext Transfer Protocol over SSL/TLS (HTTPS)

(RFC 2818)
TCP 443 HTTPS is used in conjunction with HTTP to provide the same services but doing it using a secure connection which is provided by either SSL or TLS.
Lightweight Directory Access Protocol over TLS/SSL (LDAPS)

(RFC 4513)
TCP / UDP 636 Just like HTTPS, LDAPS provides the same function as LDAP but over a secure connection which is provided by either SSL or TLS.
FTP over TLS/SSL

(RFC 4217)
TCP 989 / 990 Again, just like the previous two entries, FTP over TLS/SSL uses the FTP protocol which is then secured using either SSL or TLS.

Note: UDP (User Datagram Protocol) is an alternative communication protocol (TCP) used primarily for establishing low-latency and loss-tolerating connection between applications on the Internet.

Domain names with TCP/IP addresses :

The TCP/IP address for a website or web server is typically not easy to remember. To remedy this issue, a domain name is used instead. For example: 216.58.216.164 is one of the IP address for Google and google.com is the domain name.

What is 5G Network? It's time to upgrade your mobile? More About 5G Network

What is 5G Network? It's time to upgrade your mobile? More About 5G Network :

25/02/2020

5G is a next-generation high-speed Mobile network connection, that replaces our 4G LTE network connections. Samsung Galaxy S10 5G, is the first 5G support mobile.

Read More
Domain Name Server (DNS). Generic Domains, Country Domains, Inverse Domains

Domain Name Server (DNS). Generic Domains, Country Domains, Inverse Domains :

22/02/2020

The purpose of DNS (Domain Name Server) is to translate domain names into IP addresses. A service is used for translating domain names into IP addresses.

Read More
How ATM works? Role of ATM in Internetworks and ATM network speed

How does a SIM card work? SIM card History and SIM card size :

21/02/2020

SIM (Full form: Subscriber Identity Module or Subscriber Identification Module) card technology is one of the most popular technologies. The first SIM card was developed in 1991.

Read More
How ATM works? Role of ATM in Internetworks and ATM network speed

How ATM works? Role of ATM in Internetworks and ATM network speed :

21/02/2020

ATM (Asynchronous Transmission Mode) communicates with cells rather than transmitting frames. ATM cells can be encapsulated in other protocols.

Read More
What is File Compression? Lossless Compression and Lossy Compression

What is File Compression? Lossless Compression and Lossy Compression :

20/02/2020

The process of reducing data by applying a compression technique is called compression, and the resulting data is called compressed data. The reverse process is decommission.

Read More
What is CrossFire, CrossfireX or SLI (AMD/ATI/NVDIA)? SLI Works

What is CrossFire, CrossfireX or SLI (AMD/ATI/NVDIA)? SLI Works :

26/01/2019

CrossFire is a high-performance PC gaming graphics platform made possible by the use of multiple graphics cards coupled with a CrossFire enabled motherboard.

Read More
Types Of Networks - LAN, WAN, MAN, VAN etc

Types Of Networks (Short Description) - LAN, WAN, MAN, VAN etc :

25/01/2019

Networking of PCs has been developed for all levels, from local to international, in diverse sectors of society, Example are networks used by government organizations.

Read More
Different Types of Wireless Communication or Transmission

Different Types of Wireless Communication or Transmission :

24/01/2019

In the present days, wireless communication system has become an essential part of various types of wireless, many devices used wireless communication.

Read More
What Is a Firewall and Types of Firewall ( Packet, Application, Proxy, NGFW )

What Is a Firewall and Types of Firewall ( Packet, Application, Proxy, NGFW ) :

22/01/2019

Firewalls are often categorized as either network firewalls or host-based firewall. Firewalls may also be a component of your computer's operating system.

Read More
Encryption and Decryption (Data), Encoding and Decoding

Encryption and Decryption (Data), Encoding and Decoding :

22/01/2019

Encryption is the process of translating plain text data (plaintext) into something that appears to be random and meaningless (ciphertext). Encryption algorithm is difficult.

Read More
What is a Database/DBMS? Some Types of DBMSes with Advantages or Disadvantages

What is a Database/DBMS? Some Types of DBMSes with Advantages or Disadvantages :

21/01/2019

A Database is a collection of related data organized in a way that data can be easily accessed, managed and updated. Database can be software based or hardware based.

Read More
Algorithm and Flowchart, Symbols in Flowcharts and Examples of flowcharts

Algorithm and Flowchart, Symbols in Flowcharts and Examples of flowcharts :

02/12/2018

TCP/IP is an industry-standard protocol suit for Wide Area Networks (WANs) developed in the 1970s and 1980 by the U.S Department of Defense (DoD).

Read More
What is TCP/IP? How To Work TCP/IP ? Most Common TCP/IP protocols

What is TCP/IP? How To Work TCP/IP ? Most Common TCP/IP protocols :

02/12/2018

TCP/IP is an industry-standard protocol suit for Wide Area Networks (WANs) developed in the 1970s and 1980 by the U.S Department of Defense (DoD).

Read More
Programming Language Generations - 1GL, 2GL, 3GL, 4GL, 5GL

Programming Language Generations - 1GL, 2GL, 3GL, 4GL, 5GL :

01/12/2018

A programming language is a set of written symbols that instructs the computer hardware to perform specific tasks. Typically, programming language consists of a vocabulary.

Read More
The OSI Model - Layers, Features, Principles and Merits or Demerits

The OSI Model - Layers, Features, Principles and Merits or Demerits :

24/10/2018

ISO stands for International organization of Standardization. This is called a model for Open System Interconnection (OSI) and is commonly known as OSI model.

Read More
What Is GPU? World First GPU Details and Where Company's use GPUs?

What Is GPU? World First GPU Details and Where Company's use GPUs?

23/10/2018

GPU (Graphics Processing Unit) is an electronic circuit used to speed up the creation of both 2D and 3D images. A GPU can be present on a video card or motherboard.

Read More
Types of Network Topology with Advantages and Disadvantages

Types of Network Topology with Advantages and Disadvantages :

21/10/2018

Network Topology is the schematic description of a network arrangement, connecting various nodes (sender and receiver) through lines of connection.

Read More

Next Update

Loading...

We have two YouTube channels their name is CodeX or NightHawk. CodeX is for programming related videos and NightHawk is for online game streaming so please supporting us and Subscribe to our channels