Vocera Platform IP Ports |
A list of networking terms related to IP ports and usage sorted in alphabetical order.
A bidirectional network connection is a connection on which a source and destination can transmit and receive data and not both at the same time.
The destination port number is the number for the communication associated with the destination application or process on the remote host. The source and destination port numbers are available in the header of each segment or datagram. The datagram is delivered to the process identified by the destination port number.
For example, port 80 refers to HTTP or web service. The client specifies port 80 for the server to know that the request is for web services.
The dynamic ports numbers are in the range between 49152 and 65535. These ports cannot be registered through IANA or by any other means. This port range is used for private or customized services, for temporary purposes, and for automatic allocation of ephemeral ports. The dynamic ports are also known as private ports.
See Port Number
Exchange Web Services (EWS)
It is a protocol introduced by Microsoft for Exchange that was intended for desktop email clients such as Microsoft Outlook. It is a cross-platform API that enables applications to access mailbox items such as email messages, meetings, and contacts from Exchange Online, Exchange Online as part of Office 365, or on-premises versions of Exchange starting with Exchange Server 2007.
See Network Protocol
Hypertext Transfer Protocol (HTTP)
It is an application protocol for distributed, collaborative, hypermedia information systems that allows users to communicate data on the World Wide Web.
As a request-response protocol, HTTP gives users a way to interact with web resources such as HTML files by transmitting hypertext messages between clients and servers. HTTP clients generally use Transmission Control Protocol (TCP) connections to communicate with servers.
See Network Protocol
Internet Assigned Numbers Authority (IANA)
The IANA is a standards body that is responsible for global coordination of the Internet Protocol addressing systems, as well as the Autonomous System Numbers used for routing Internet traffic. Currently, it is a function of ICANN.
Internet Corporation for Assigned Names and Numbers (ICANN)
As the operator of Internet Assigned Numbers Authority (IANA) functions, ICANN allocates IP address blocks to the Regional Internet Registries (RIRs). The RIRs allocate smaller IP address blocks to ISPs and other network operators.
Internet Message Access Protocol (IMAP)
It is a standard protocol to access email on a remote server from a local client. It uses the underlying transport layer protocols to establish host-to-host communication services for applications. It is used to send and receive emails through a remote mail server. IMAP is cross-platform and used to synchronize your email across all devices. The well-known port address for IMAP is 143.
See Network Protocol
An IP address (Internet Protocol address) is an identifier for a computer or device on a TCP/IP network. It is used to identify devices connected to a network. There are currently two different versions of IP addresses in use—IPv4 and IPv6.
Networks using the TCP/IP protocol route messages based on the IP address of the destination.
See Public IP Address and Private IP Address
It is a standard set of rules that governs the communications between computers on a network. Network protocols incorporate all the processes requirement and constraints of initiating and accomplishing communication between computers, routers, servers, and other network enabled devices.
Post office Protocol (POP)
POP3 is designed for receiving incoming E-mails.
See Network Protocol
The port numbers are in the range between 1 and 65535. The Internet Assigned Numbers Authority (IANA) assigns port numbers. See Port Number Registry.
A port is an endpoint to a logical connection. A computer-to-computer connection needs a port number to identify what type of port it is. Administrators need to keep the ports open on firewalls and routers to allow the associated protocol into or out of the network. For example, an administrator keeps the port 80 open in order to allow HTTP traffic.
Example: 10.0.0.0 through 10.255.255.255
Example: 172.31.255.255
16-bit block: Begins with 192.168.
Example: 192.168.255.255
The Public IP Addresses are assigned to hosts that need network layer access outside the enterprise.
See IP Address
The registered ports are assigned by IANA and on most systems can be used by ordinary user processes or programs executed by ordinary users. The registered ports numbers are also known as user ports and in the range between 1024 and 49151.
Registered ports are temporary ports, usually used by clients, and varies each time a service is used. The port is then abandoned and can be used by other services.
See Port Number
Real-Time Transport Protocol (RTP)
RTP is used to deliver streaming audio and video media over the internet, thereby enabling the Voice Over Internet Protocol (VoIP). RTP is generally used with a signaling protocol, such as SIP, which sets up connections across the network. RTP applications can use the Transmission Control Protocol (TCP), but most use the User Datagram protocol (UDP) instead because UDP allows for faster delivery of data.
While RTP allows for real-time data transfer, RTCP provides out-of-band statistics and control information for any given RTP session. It does not actually transport any media data, but rather helps with quality control.
See Network Protocol
Session Initiation Protocol (SIP)
It is a signaling protocol that enables the Voice Over Internet Protocol (VoIP) by defining the messages sent between endpoints and managing the actual elements of a call. SIP supports voice calls, video conferencing, instant messaging, and media distribution.
SIP is just one method of deploying VoIP; its primary benefit is the fact that it provides a direct connection between private or local telephone systems (private branch exchanges, or PBX) and the public telephone network. This way, individuals and businesses do not need a legacy telephone line to connect. Other VoIP deployment methods include the Real-time Transport Protocol (RTP), Real-time Transport Control Protocol (RTCP), and Session Description Protocol (SDP).
See Network Protocol
Simple Mail Transfer Protocol (SMTP)
SMTP is used to send and receive email. It is sometimes paired with IMAP or POP3 (for example, by a user-level application), which handles the retrieval of messages, while SMTP primarily sends messages to a server for forwarding.
SMTP can both send and receive mail, but it is bad at queuing incoming messages, hence the common delegation to other protocols. Proprietary systems like Gmail have their own mail transfer protocols when using their own servers, but they still use good old SMTP to email beyond that.
See Network Protocol
The source and destination ports are placed within the segment. The segments are then encapsulated within an IP packet. The IP packet contains the IP address of the source and destination. The combination of the source and destination IP addresses and the source and destination port numbers is known as a socket. During the lifespan of the socket, the port number on the source and destination will not change.
The socket is used to identify the server and service being requested by the client. Everyday thousands of hosts communicate with millions of different servers. Those communications are identified by the sockets.
It is the combination of the transport layer port number, and the network layer IP address of the host, that uniquely identifies an application process running on an individual host device. This combination is called a socket. A socket pair, consisting of the source and destination IP addresses and port numbers, is also unique and identifies the specific conversation between the two hosts.
The source port number is the number for the communication associated with the originating application or process on the local host. The source and destination port numbers are available in the header of each segment or datagram. The datagram is delivered to the process identified by the source port number.
The source port number is randomly generated by the sender to identify a conversation between two applications or processes. Multiple conversations can occur simultaneously; an application or process can send multiple HTTP service requests to a web server at the same time. The conversations are separated and tracked based on the source port numbers.
Transmission Control Protocol (TCP)
The TCP/IP is the suite of communications protocols that are highly reliable and used to connect hosts in the network. TCP works with the Internet Protocol and guarantees the delivery of data packets and duplicate protection.The transport layer is concerned with efficient and reliable transportation of the data packets from one network to another. The transport layer protocols establish end-to-end communication between the source and destination hosts. These protocols verify that the packets arrive in sequence without errors and swap acknowledgements of data reception or lost packets.
The data packets sent over a network are re-assembled into the proper order at the receiving end. A message goes back to the originating network to resend data packets or to confirm reception of all the packets. At the transport layer level, TCP and UDP are the two protocols used. TCP, paired with IP, is by far the most popular protocol.
User Datagram Protocol (UDP)
It is a stateless and lightweight transport protocol. The pieces of communication in UDP are called datagrams. These datagrams are sent by the transport layer protocol. Neither the client nor the server is obligated to keep track of the state of the communication session.
The user datagram protocol is transaction-oriented. It does not guarantee the delivery and duplicate protection like TCP.
See Network Protocol
A source can transmit data to one or more destinations, but the destinations cannot transmit data back to the source because it is unable to receive. The Inbound and Outbound directions denote the direction of the traffic moving between networks. However, it is relative to whichever network you are referencing to.
Virtual Router Redundancy Protocol (VRRP)
This protocol specifies an election protocol that dynamically assigns responsibility for one or more virtual routers to the VRRP routers on a LAN. It allows several routers on a multiple access link to utilize the same virtual IP address. The advantage gained from using VRRP is a higher availability default path without requiring configuration of dynamic routing or router discovery protocols on every end-host.
The protocol number assigned by the IANA for VRRP is 112 (decimal).
The well-known ports are assigned by IANA and cover the range of port numbers between 0 and 1023. On many systems, they can only be used by system (or root) processes or by programs executed by privileged users. The well-known ports are also known as system ports.
The well-known ports are the Internet services that have been assigned a specific port. For instance, SMTP is assigned port 25. Servers listen on the network for requests at the well-known ports.
See Port Number