TCP is used for organizing data in a way that ensures the secure transmission between the server and client. It guarantees the integrity of data sent over the network, regardless of the amount. For this reason, it is used to transmit data from other higher-level protocols that require all transmitted data to arrive.
How does TCP work? TCP provides communication between an application program and the Internet Protocol (they are frequently written as TCP/IP.) An application does not need to required packet fragmentation on the transmission medium or other mechanisms for sending data in order to be sent via TCP.
Hence TCP is used in Text Communication due to its reliable transmission, error control, and in order receiving of the data. Example : Whatsapp, Instagram, Google Chat,iMessage. TCP is used in File transfer when we cannot tolerate the loss of data and receiving the data incorrect order is of utmost importance.
Transmission Control Protocol/Internet Protocol
TCP/IP, in full Transmission Control Protocol/Internet Protocol, standard Internet communications protocols that allow digital computers to communicate over long distances.
How do TCP and IP differ? TCP and IP are two separate computer network protocols. IP is the part that obtains the address to which data is sent. TCP is responsible for data delivery once that IP address has been found.
TCP manages the data stream, whereas HTTP describes what the data in the stream contains. TCP operates as a three-way communication protocol, while HTTP is a single-way protocol.
HTTP establishes data link communication only but TCP establishes session connection. HTTP is useful for transfer of smaller documents like webpages, on the other hand, TCP is useful to setup connection for data transfer. HTTP is faster in comparison to TCP, which is slower.
TCP/IP is a set of data communications mechanisms, embodied in software, that let you use the Internet and countless other private networks. Each mechanism—also known as a protocol—is designed to perform a specific function.
The SCI protocol uses only HTTPS to secure for the credentials passed in each request. By default, these two protocols are on their standard port number of 80 for HTTP and 443 for HTTPS.
Port 110 is used by the POP3 protocol for unencrypted access to electronic mail. The port is intended for end-users to connect to a mail server to retrieve messages.
UDP port 7
Firewall rules for ICMP (TCP/UDP port 7)
Port numbers are sometimes seen in web or other uniform resource locators (URLs). By default, HTTP uses port 80 and HTTPS uses port 443, but a URL like http://www.example.com:8080/path/ specifies that the web browser connects instead to port 8080 of the HTTP server.
The most common well-known port is 80, which identifies HTTP traffic for a Web server (see port 80).
FTP is an unusual service in that it utilizes two ports, a 'data' port and a 'command' port (also known as the control port). Traditionally these are port 21 for the command port and port 20 for the data port.
Localhost is the default name used to establish a connection with a computer. The IP address is usually 127.0. 0.1. This is done by using a loopback address network. Port 80 is the common standard port for HTTP.
|Port Number||Service||Brief Description of Use|
|49151||Reserved||Reserved for future use|
A server is a computer program or device that provides a service to another computer program and its user, also known as the client. In a data center, the physical computer that a server program runs on is also frequently referred to as a server.
UDP port 67
DHCP is a network protocol to used to configure IP networks. A DHCP server listens to UDP port 67 and dynamically assigns IP addresses and other network parameters to DHCP clients. These clients will listen for responses on UDP port 68.
The default port for Telnet client connections is 23; to change this default, enter a port number between 1024 and 32,767.
DORA is the process that is used by DHCP. DORA helps in providing an IP address to hosts or client machines. DORA is the process that follows some steps between the server and client. It gets the IP address from the centralized server.
Ports 88 and 464 are the standard ports for Kerberos authentication. These ports are configurable. Port 464 is only required for password change operations. Ports 88 and 464 can use either the TCP or UDP protocol depending on the packet size and your Kerberos configuration, see Section 2.2.