A computer has many ports. They are a way for software and hardware to connect to the internet. For example: Limewire needs to connect to the internet, it will find an open port to connect. Ports are for the most part safe, but this is how hackers get into a computer.
~matt
2007-12-23 04:26:27
·
answer #1
·
answered by ? 3
·
0⤊
0⤋
A port number is a way to identify a specific process to which an Internet or other network message is to be forwarded when it arrives at a server. For the Transmission Control Protocol and the User Datagram Protocol, a port number is a 16-bit integer that is put in the header appended to a message unit. This port number is passed logically between client and server transport layers and physically between the transport layer and the Internet Protocol layer and forwarded on.
For example, a request from a client (perhaps on behalf of you at your PC) to a server on the Internet may request a file be served from that host's File Transfer Protocol (FTP) server or process. In order to pass your request to the FTP process in the remote server, the Transmission Control Protocol (TCP) software layer in your computer identifies the port number of 21 (which by convention is associated with an FTP request) in the 16-bit port number integer that is appended to your request. At the server, the TCP layer will read the port number of 21 and forward your request to the FTP program at the server.
Some services or processes have conventionally assigned permanent port numbers. These are known as well-known port numbers. In other cases, a port number is assigned temporarily (for the duration of the request and its completion) from a range of assigned port numbers. This is called an ephemeral port number.
2007-12-23 04:33:24
·
answer #2
·
answered by Shakti Barath 2
·
1⤊
0⤋
A computer has many ports. They are a way for software and hardware to connect to the internet. For example: Limewire needs to connect to the internet, it will find an open port to connect. Ports are for the most part safe, but this is how hackers get into a computer.
a firewall block access to all the ports on your computer and asks for your permission when the program wants to access the net. go to www.grc.com to see the ports which are left open in your computer and vulnerable to hjackers.
2007-12-23 04:31:18
·
answer #3
·
answered by Anonymous
·
0⤊
0⤋
"Port" has two meanings, one of which is for hardware, the other of which is for software (networking).
Hardware: A common type of connection is the Small Computer Systems Interface, or SCSI. Pronounce that "scuzzy" and you'll be understood. SCSI is a sub-bus. Your computer's main bus is where you plug in your devices. The SCSI bus acts like a specialized extension of main bus, dedicated to specific types of devices. Usually disks and tape drives, but other types are theoretically possible. Just as a device on the main bus often has an address associated with its device registers, so a device on a SCSI bus has an address.
The SCSI controller has a bus address on the computer. When you send a command to the SCSI controller, you tell it to use port 0 (and that is constant for all SCSI busses.) When you send a command to any other device on the SCSI controller, you use another port from 1 to 7. You can have up to seven devices on that SCSI bus, each with a different port number, or SCSI bus address. There are such things as SCSI bus extenders to get more than 7 devices, but all they really do is extend the possible range of the port number.
Software: In networking, port number is something that is part of the protocols your computer uses to talk to other computers. When you start your computer, it has a network address. When you connect via networking to another computer with a different network address, you now have a link. But more than one program on your computer might wish to connect to more than one program on the other computer. To keep the individual connections "straight" there is another data element besides the network address. It is the "port" number on which a connection is made.
Some ports are standard. For instance, on the machine I run for the government, there is a service called TELNET and another called FTP. These are two different ways to exchange data between two machines. Another common port is the HTTP port used by web servers.
If you want to talk to TELNET, you choose to send to the TELNET port. It sends you back a message that says, "OK, you can talk to me. Let's agree to use this other port number so I can keep my port open for other users." So in effect, TELNET negotiates a port number for you to use. After that, your computer sends to that port number and my computer keeps that session open for you. Other users of TELNET would be given other port numbers.
Then, if it happens that you ALSO wish to use FTP to send a file to my computer, you send to the FTP port. Again, a port negotiation occurs. When you send commands to the port negotiated by TELNET, my machine remembers that and knows it is a TELNET message. When you send to the FTP negotiated port, my machine remembers that and knows it is an FTP message.
In Internet terms, the connections are called "sockets" and you in effect plug a socket with your logical connection. The parts of the protocol that keeps sockets isolated is the combination of internet address and port number.
In effect, both applications are part of an addressing scheme. Howver, the SCSI address can be set by jumpers or switches in the interface hardware, whereas the Internet port number is a software-only concept.
You can find other information on PORT number by looking up SCSI and TCP/IP on Wikipedia.org
2007-12-23 04:48:44
·
answer #4
·
answered by The_Doc_Man 7
·
0⤊
0⤋
Port number is which dock the boat comes in to.
2007-12-23 04:24:31
·
answer #5
·
answered by Anonymous
·
0⤊
0⤋
Locking up like freezing? in any different case it would desire to might desire to do including your skill settings. Like mine is desperate to hibernate after a set time. you will possibly be able to truly have a scourge. Do a scourge test.
2016-12-18 07:16:27
·
answer #6
·
answered by ? 4
·
0⤊
0⤋