CCNA

1. Cisco Network Support Certifications 2. Networking Terms 3. INTRODUCTION TO NETWORKING 4. TYPES OF NETWORK 5. The Development of the Internet 6. NETWORK ARCHITECTURE 7. TOPOLOGY 8. BUS TOPOLOGY 9. RING TOPOLOGY 10. STAR TOPOLOGY 11. MESH TOPOLOGY 12. HYBRID TOPOLOGY 13. Speed of Networking device 14. NETWORK DEVICES 15. Exploring Wireless Network 16. REPEATERS 17. HUB 18. SWITCH 19. BRIDGE 20. ROUTERS 21. TRANSMISSION Telecommunication 22. Difference between Full Duplex, Half Duplex and Simplex 23. IP-ADDRESSING and IPV4 24. IPv4 address classes 25. IPV6 [ Internet Protocol Version 6 ] 26. SPEED OF VARIOUS DEVICES 27. Network Security 28. Some basic suggestion and steps to prevent Attacks and Network security 29. OSI model 30. UPPER and LOWER Layer 31. Application Layer (Layer 7) 32. Presentation Layer (Layer 6) 33. Session Layer (Layer 5) 34. Transport Layer (Layer 4) 35. Network Layer (Layer 3) 36. Data Link Layer 2 37. Physical Layer 1 38. TCP/IP The DoD Model 39. ROUTED PROTOCOL 40. Ports and Application 41. Important Application, Protocol and Port Number 42. Router Function 43. Types of Routing Protocols 44. STARTING ROUTER 45. CISCO IOS 46. Logging in to the Router 47. CISCO Router IOS commands List 48. Setting time and date of router 49. Router configuration commands 50. Optimizing Switch and Router 51. Understanding Router Terms 52. ROUTER SECURITY 53. Configuring CISCO SWITCH Security Policy 54. IMPLEMENTING STATIC ROUTING 55. UNDERSTANDING THE NEED FOR NAT 56. WAN Connections 57. Access List [ACL] 58. VLAN [Virtual Local Area Network] 59. SPANNING TREE :- BROADCAST STORM 60. Lab 1 Setting up a Serial Interface 61. Lab 2 : IP Addressing 62. Lab 3 Static Routes 63. Lab 4 Default Routes 64. Lab 5 RIP Routes 65. Lab 6 IGRP Routes 66. Lab 7 EIGRP Routes 67. Lab 8 OSPF Routes 68. Lab 9 CHAP and RIP 69. Lab 10 Standard Access-Lists with RIP 70. Lab 11 Extended Access-Lists with RIP 71. Lab 12 Static NAT 72. Lab 13 Many to One NAT 73. Lab 14 NAT Pool 74. Lab 15 ( 2950 Trunk ) 75. Lab 16 ( 2950 Trunk Dynamic ) 76. Lab 17 (2950 VLANs) 77. Lab 18 ( 2950 Deleting VLANs ) 78. Lab 19 ( 2950 VTP ) 79. Lab 20 ( 2950 VTP w/ client ) 80. Lab 21 ( 2950 Telnet )
Pr.Pg Next Pg

Ports and Application tutorials

  • Two protocols functions at the Host to Host (TRANSPORT) layer: TCP and UDP

  • When an application wants to establish communication with an application on a remote host, it creates a TCP or UDP socket.

  • It is not necessary to configure application to use specific Ports, however you should know following when you configure Firewall inbound and outbound rules.

TCP and UDP Protocol Working

 

TCP

UDP

Stands for Transmission Control Protocol

Stands for User Datagram Protocol

TCP takes large blocks of information from an application and breaks them into segment. It numbers and sequences each segment so that the destination TCP can put those segments back into the order. After these segments are sent, it waits for an acknowledgement. It resends anything that is not received.

UDP does not sequence the segment and does not care in which order the segments arrive at the destination. After it sends the segment it forgets about it and do not acknowledge it.

 

It is connection oriented

Because does not contact the destination before delivering information to it, it is considered as connectionless protocol.

It is Reliable & Accurate

It is fast but unreliable.

As it checks for error, it is complicated and costly in terms of network overhead.

It is simple and does not increase network overhead.

 

 

Port Numbers

  • Port numbers are assigned by the IANA (Internet Assigned Numbers Authority).

  • In all there are 65,536 ports. Port receives number from 0 to 65,535.

  • Numbers 0 to 1,023 are considered Well-known ports.

  • Numbers 1,024 to 49,151 are Registered Ports.

  • Number 49,152 to 65,535 are Private vendor assigned and are dynamic.


 

Pr.Pg border                                              Next Pg