আমার পঠিত ব্লগ সমুহ

শুক্রবার, ২২ জুন, ২০১২

Data Link Layer



The data link layer provides the upper layers access to the network media. It is responsible for controlling access to the media, encapsulating packets into appropriately sized frames for the media used, physical addressing, the exchange of frames between nodes on the local network, and error detection.Overview
Media Access Control
Layer 2, Local Area Network Technologies
and their Media Access Control Characteristics

Ethernet
Wireless Ethernet
Token Ring
FDDI
Contention Based
(first come first serve)
Deterministic
Control Based
Collisions
No Collisions
Send anytime
(non-deterministic)
Wait for your turn
(deterministic)
Physical Star Topology
Logical Multi-Access
or Bus Topology
Token Ring = Physical Star, Logical Ring Topology
FDDI = Physical Dual Ring, Logical Ring
efficient use of bandwidth
(send anytime)
Inefficient use of bandwidth
(you have to wait your turn)
CSMA/CD (ethernet)
CSMA/CA (wireless ethernet)

Token Passing

Control Based Access - Controlled access means that devices or nodes take turns in sequence. It is deterministic in that there is scheduled access of the medium. If one device is putting data on the network then no other device can. Well ordered and predictable throughput, can be an inefficient use of bandwidth, as a device has to wait it's turn.
Contention Based Access - Contention based access is also called non-deterministic. This means that the devices on the network don't need to take turns using shared media. However, to avoid total chaos, a Carrier Sense Multiple Access (CSMA) process is used to make sure the media is not in use before a device begins to transmit. Though devices attempt to make sure the media is not busy, data collisions still occur with contention based access. Also, as more nodes are added to the network, the probability of collisions increases.
CSMA-CD (Carrier Sense Multi-Access with Collision Detection) is a media access method in which an ethernet host detects if a signal is being transmitted. If no signal is detected on the wire, then the host will transmit. There does exist the possibility that two or more hosts may sense the absence of a signal and transmit at the same time. If this happens, there is a collision of signals.
CSMA-CA (Carrier Sense Multi-Access with Collision Avoidance) stands for Collision Sense Multiple Access with Collision Avoidance. This is used for wireless media access control. It uses a send and reply like the TCP three way hand shake, in this way it reserves the right to send before sending. After each message is sent the hosts associated to the wireless access point run a randomization algorithm which sets a random priority on who gets to send next. That along with many control fields help to mitigate some of the interferences and other radio related wireless problems.

Network Topologies
Physical Topology versus Logical Topology - The physical topology is the arrangement of devices (nodes) and how they are physically connected to the network.
The logical topology is the way data is transferred from one device (node) to another regardless of how the devices are physically connected. It is also related to how each host sees other hosts on the network and how each host accesses the media. A network's logical topology is not necessarily the same as its physical topology. For instance, in an Ethernet network, computers are often connected to a switch or hub forming a physical star topology, but logically the way the data travels is a bus or multi-access topology. In a Token Ring network, computers are connected to a MAU multistation access unit, forming a physical star, but logically information travels clockwise from host to host in a ring topology. In FDDI, the physical topology is a dual ring (expensive) and logically it is also a ring. For additional information see: http://en.wikipedia.org/wiki/Network_topology
Topologies
Star
Bus or Multi-Access
Ring or Dual Ring
Point-to-Point
Mesh
Full Mesh
Point to Point Topology - directly connects two nodes. All frames are placed on the media by one node and taken off by the other. It can be both a physical and logical topology. Physically it is two nodes directly connected. Logically it is two nodes virtually connected directly, but passing through a network. It does not include the other devices in separate locations, that the data travels through. In this way it forms a virtual circuit between the two nodes. A virtual Circuit is a logical connection between two nodes and end users do not notice the intermedate devices.
Multi Access Topology - means that the nodes are communicating on the same shared media. Only one node can use the media at a time, and every node sees every frame on the medium. Of course, only the node to which the frame is addressed actually processes the frame. When sharing media, CSMA/CD and token passing are used to reduce collisions.
Ring Topology - In a physical ring topology each device is connected to two neighboring devices creating a physical ring almost like a physical bus. In a logical ring topology each node receives a frame in turn, and if the frame is not addressed to that node, it passes it on. In a Token Ring network, a node cannot send data on the network unless it has the token, the token is then passed to the next node and so on in a logical ring. For more information see:http://en.wikipedia.org/wiki/Ring_network

Data Link Layer Sub Layers 
LLC - Logical Link Control sub layer - Helps interface with the upper layers meaning the Network layer. Logical Link Control (LLC) places information in the frame that identifies which Network layer protocol is being used. This information allows multiple Layer 3 protocols, such as IP, IPX, Apple Talk, and DECNet, to utilize the different types of local media and interfaces, like Ethernet, Token Ring, different WAN serial protocols and interfaces such as PPP, HDLC, etc. .
MAC - Media Access Control sub layer - Media Access Control provides data link layer addressing with source and destination MAC addresses. These addresses are 48 bit physical addresses, usually written in hexadecimal format and burned into the NIC. Media Access Control is also responsible for marking the beginning and the ending of a frame with a start-of-frame and an end-of-frame delimiter. For more information see: http://en.wikipedia.org/wiki/Media_Access_Control 

Layer 2 Frames
Layer 2 frame characteristics are similar to other layers. There is a header, the data payload, and the trailer. The specifics of the frame differ in regards to the type of frame in question. There are LAN layer 2 technology frames (Ethernet, Token Ring) and WAN layer 2 technology frames (PPP, HDLC). One of the main differences is that ethernet frames have source and destination MAC addresses in their frame headers and serial technologies like PPP and HDLC do not.

 

Application Layer


The Application Layer is the layer closest to the end user. When you are using a program that is going to send something or contact someone over the internet you are using a network application that operates at the Application Layer. Each program/application that sends data over a network is identified by a particular protocol, at Layer 4 this protocol is associated with a port number. For example a web browser like Internet Explorer requests and receives pages from web servers its protocol is HTTP the hyper text transfer protocol and its correlative port number is port 80.

The applications that we use at Layer 7, the Application Layer are web browsers (HTTP) like Internet Explorer, a file transfer programs (FTP) like Filezilla, email clients (SMTP) like Microsoft Outlook Express and all flavors of Instant Messaging programs and P2P applications. There are also processes that run in the background that run at Layer 7, like DHCP which automates the process of requesting and receiving an IP address from a DHCP server. If you want to see these protocols in action all you need to do is use Wireshark. For instance, if we use the example of DHCP we learn that initiating DHCP involves a DHCP client talking to a DHCP server. The process is: 1. Client sends a DHCP DISCOVER 2. Server responds with a DHCP OFFER 3. Client sends a DHCP REQUEST 4. Server responds with a DHCP ACKnowledgement You can see the process of a client obtaining an IP address with DHCP in Wireshark (see video tutorial below).

This is a diagram of the OSI and TCP/IP Models and how they correspond to PDUs, Protocols and Devices  

This is a visual diagram of the process data goes through when sent over a network in a layered architecture

Transport Layer


Transport Layer

Print

The transport layer of both the OSI and TCP/IP models is very important. At this layer the data being prepared to be sent over the internet is broken into pieces called segments.
Overview 
The PDU or protocol data unit at this layer is called a segment. Their are two main protocols that function at this layer TCP and UDP. TCP or transmission control protocol is a very reliable and connection oriented protocol. TCP is characterized as being reliable because of the fact that it will only send data once a three way handshake has first been established, it uses sequence numbers to track all segments and it also uses system of syns and acks (acknowledgments), and it will not send new data until an acknowledgement has been received for data already sent. If the acknowledgement is not received it will resend data. UDP or user datagram protocol on the other hand is not reliable, it is a best effort delivery system, a connectionless protocol, that does not require an established connection with another computer before sending data. UDP's advantage is the fact that its header fields or control information is a lot smaller than TCP's so there is a lot less to process and as a result it is a faster  but less reliable protocol.

TCP 
UDP 
segmentssequence numbers,acknowledgements, many header
fields, lots of overhead
datagrams- no sequence numbering, few header fields,little overhead = fast

reliability -due to sequence numbering, and resending of data if no acknowledgement is received
unreliable - sends all data regardless of whether or not it was received
connection oriented - Three way handshake receiving computer prior to sending data
connectionless -  no handshake to establish connection
source and destination port numbers in the header
source and destination port numbers in the header
 
flow control - dynamically change the windows size to not overwhelm the receiver with data 
no flow control 
Here is a short list of some of the most useful port numbers. You should memorize these ports.
 Port Number
Protocol 
80
HTTP 
23 
Telnet 
20,21 
FTP 
22 
SSH 
25 
SMTP 
53 
DNS 
110 
POP 

Well Known Ports 
0 - 1023 
Registered Ports
1024 - 49151 
Dynamic Ports
49152 - 65535

List of TCP and UDP port numbers


List of TCP and UDP port numbers


This is a list of Internet socket port numbers used by protocols of the Transport Layer of the Internet Protocol Suite for the establishment 
of host-to-host communications.
Originally, these port numbers were used by the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP), but are
 used also for the Stream Control Transmission Protocol(SCTP), and the Datagram Congestion Control Protocol (DCCP). SCTP and
DCCP services usually use a port number that matches the service of the corresponding TCP or UDP implementation if they exist. The
 Internet Assigned Numbers Authority (IANA) is responsible for maintaining the official assignments of port numbers for specific uses.[1]
 However, many unofficial uses of both well-known and registered port numbers occur in practice.


The port numbers are divided into three ranges: the well-known ports, the registered ports, and the dynamic or private ports. The well-known ports are those from 0 through 1023. Examples include:

UseDescriptionColor
OfficialPort is registered with IANA for the applicationwhite
UnofficialPort is not registered with IANA for the application  blue
Multiple useMultiple applications are known to use this port.yellow
Table legend 
Well-known ports

The port numbers in the range from 0 to 1023 are the well-known ports. They are used by system processes that provide widely-used 
types of network services. On Unix-like operating systems, a process must execute with superuser privileges to be able to bind a network
 socket to an IP address using one of the well-known ports.
PortTCPUDPDescriptionStatus
0UDPReservedOfficial
1TCPUDPTCP Port Service Multiplexer (TCPMUX)Official
2TCPUDPCompressNET[2] Management Utility[3]Official
3TCPUDPCompressNET[2] Compression Process[4]Official
4TCPUDPUnassignedOfficial
5TCPUDPRemote Job EntryOfficial
7TCPUDPEcho ProtocolOfficial
8TCPUDPUnassignedOfficial
9TCPUDPDiscard ProtocolOfficial
10TCPUDPUnassignedOfficial
11TCPUDPActive Users (systat service)[5][6]Official
12TCPUDPUnassignedOfficial
13TCPUDPDaytime Protocol (RFC 867)Official
14TCPUDPUnassignedOfficial
15TCPUDPPreviously netstat service[5]Unofficial
16TCPUDPUnassignedOfficial
17TCPUDPQuote of the DayOfficial
18TCPUDPMessage Send ProtocolOfficial
19TCPUDPCharacter Generator Protocol (CHARGEN)Official
20TCPFTP—data transferOfficial
21TCPFTP—control (command)Official
22TCPSecure Shell (SSH)—used for secure logins, file transfers (scpsftp) and port forwardingOfficial
23TCPTelnet protocol—unencrypted text communicationsOfficial
24TCPUDPPriv-mail : any private mail system.Official
25TCPSimple Mail Transfer Protocol (SMTP)—used for e-mail routing between mail serversOfficial
26TCPUDPUnassignedOfficial
27TCPUDPNSW User System FEOfficial
29TCPUDPMSG ICPOfficial
33TCPUDPDisplay Support ProtocolOfficial
35TCPUDPAny private printer server protocolOfficial
37TCPUDPTIME protocolOfficial
39TCPUDPResource Location Protocol[7] (RLP)—used for determining the location of higher level services from hosts on a networkOfficial
40TCPUDPUnassignedOfficial
42TCPUDPARPA Host Name Server ProtocolOfficial
42TCPUDPWindows Internet Name ServiceUnofficial
43TCPWHOIS protocolOfficial
47TCPUDPNI FTP[7]Official
49TCPUDPTACACS Login Host protocolOfficial
50TCPUDPRemote Mail Checking Protocol[8]Official
51TCPUDPIMP Logical Address MaintenanceOfficial
52TCPUDPXNS (Xerox Network Systems) Time ProtocolOfficial
53TCPUDPDomain Name System (DNS)Official
54TCPUDPXNS (Xerox Network Systems) ClearinghouseOfficial
55TCPUDPISI Graphics Language (ISI-GL)Official
56TCPUDPXNS (Xerox Network Systems) AuthenticationOfficial
56TCPUDPRoute Access Protocol (RAP)[9]Unofficial
57TCPMail Transfer Protocol (RFC 780)Official
58TCPUDPXNS (Xerox Network Systems) MailOfficial
67UDPBootstrap Protocol (BOOTP) Server; also used by Dynamic Host Configuration Protocol (DHCP)Official
68UDPBootstrap Protocol (BOOTP) Client; also used by Dynamic Host Configuration Protocol (DHCP)Official
69UDPTrivial File Transfer Protocol (TFTP)Official
70TCPGopher protocolOfficial
71TCPNETRJS protocolOfficial
72TCPNETRJS protocolOfficial
73TCPNETRJS protocolOfficial
74TCPNETRJS protocolOfficial
79TCPFinger protocolOfficial
80TCPHypertext Transfer Protocol (HTTP)Official[10]
81TCPTorparkOnion routingUnofficial
82UDPTorpark—ControlUnofficial
88TCPUDPKerberos—authentication systemOfficial
90TCPUDPdnsix (DoD Network Security for Information Exchange) Securit Attribute Token MapOfficial
90TCPUDPPointCast (dotcom)Unofficial
99TCPWIP Message protocolUnofficial
101TCPNIC host nameOfficial
102TCPISO-TSAP (Transport Service Access Point) Class 0 protocol[11]Official
104TCPUDPACR/NEMA Digital Imaging and Communications in MedicineOfficial
105TCPUDPCCSO Nameserver Protocol (Qi/Ph)Official
107TCPRemote TELNET Service[12] protocolOfficial
108TCPUDPSNA Gateway Access Server [1]Official
109TCPPost Office Protocol v2 (POP2)Official
110TCPPost Office Protocol v3 (POP3)Official
111TCPUDPONC RPC (SunRPC)Official
113TCPident—Authentication Service/Identification Protocol,[13] used by IRC servers to identify usersOfficial
113UDPAuthentication Service[13] (auth)Official
115TCPSimple File Transfer Protocol (SFTP)Official
117TCPUUCP Path ServiceOfficial
118TCPUDPSQL (Structured Query Language) ServicesOfficial
119TCPNetwork News Transfer Protocol (NNTP)—retrieval of newsgroup messagesOfficial
123UDPNetwork Time Protocol (NTP)—used for time synchronizationOfficial
135TCPUDPDCE endpoint resolutionOfficial
135TCPUDPMicrosoft EPMAP (End Point Mapper), also known as DCE/RPC Locator service,[14] used to remotely manage services including DHCP serverDNSserver and WINS. Also used by DCOMUnofficial
137TCPUDPNetBIOS NetBIOS Name ServiceOfficial
138TCPUDPNetBIOS NetBIOS Datagram ServiceOfficial
139TCPUDPNetBIOS NetBIOS Session ServiceOfficial
143TCPInternet Message Access Protocol (IMAP)—management of email messagesOfficial
152TCPUDPBackground File Transfer Program (BFTP)[15]Official
153TCPUDPSGMP, Simple Gateway Monitoring ProtocolOfficial
156TCPUDPSQL ServiceOfficial
158TCPUDPDMSP, Distributed Mail Service Protocol[16]Unofficial
161UDPSimple Network Management Protocol (SNMP)Official
162TCPUDPSimple Network Management Protocol Trap (SNMPTRAP)[17]Official
170TCPPrint-srv, Network PostScriptOfficial
175TCPVMNET (IBM z/VM, z/OS & z/VSE - Network Job Entry(NJE))Official
177TCPUDPX Display Manager Control Protocol (XDMCP)Official
179TCPBGP (Border Gateway Protocol)Official
194TCPUDPInternet Relay Chat (IRC)Official
199TCPUDPSMUXSNMP Unix MultiplexerOfficial
201TCPUDPAppleTalk Routing MaintenanceOfficial
209TCPUDPThe Quick Mail Transfer ProtocolOfficial
210TCPUDPANSI Z39.50Official
213TCPUDPInternetwork Packet Exchange (IPX)Official
218TCPUDPMessage posting protocol (MPP)Official
220TCPUDPInternet Message Access Protocol (IMAP), version 3Official
259TCPUDPESRO, Efficient Short Remote OperationsOfficial
264TCPUDPBGMP, Border Gateway Multicast ProtocolOfficial
280TCPUDPhttp-mgmtOfficial
308TCPNovastor Online BackupOfficial
311TCPMac OS X Server Admin (officially AppleShare IP Web administration)Official
318TCPUDPPKIX TSP, Time Stamp ProtocolOfficial
319UDPPrecision time protocol event messagesOfficial
320UDPPrecision time protocol general messagesOfficial
350TCPUDPMATIP-Type A, Mapping of Airline Traffic over Internet ProtocolOfficial
351TCPUDPMATIP-Type B, Mapping of Airline Traffic over Internet ProtocolOfficial
366TCPUDPODMR, On-Demand Mail RelayOfficial
369TCPUDPRpc2portmapOfficial
370TCPcodaauth2—Coda authentication serverOfficial
370UDPcodaauth2—Coda authentication serverOfficial
370UDPsecurecast1—Outgoing packets to NAI's servers [18][dead link]Unofficial
371TCPUDPClearCase albdOfficial
383TCPUDPHP data alarm managerOfficial
384TCPUDPA Remote Network Server SystemOfficial
387TCPUDPAURP, AppleTalk Update-based Routing Protocol[19]Official
389TCPUDPLightweight Directory Access Protocol (LDAP)Official
401TCPUDPUPS Uninterruptible Power SupplyOfficial
427TCPUDPService Location Protocol (SLP)Official
443TCPHTTPS (Hypertext Transfer Protocol over SSL/TLS)Official
444TCPUDPSNPP, Simple Network Paging Protocol (RFC 1568)Official
445TCPMicrosoft-DS Active Directory, Windows sharesOfficial
445TCPMicrosoft-DS SMB file sharingOfficial
464TCPUDPKerberos Change/Set passwordOfficial
465TCPURL Rendesvous Directory for SSM (Cisco protocol)Official
475TCPUDPtcpnethaspsrv (Aladdin Knowledge Systems Hasp services, TCP/IP version)Official
497TCPDantz RetrospectOfficial
500UDPInternet Security Association and Key Management Protocol (ISAKMP)Official
502TCPUDPModbus, ProtocolUnofficial
504TCPUDPCitadel—multiservice protocol for dedicated clients for the Citadel groupware systemOfficial
512TCPRexec, Remote Process ExecutionOfficial
512UDPcomsat, together with biffOfficial
513TCPrloginOfficial
513UDPWho[20]Official
514TCPShell—used to execute non-interactive commands on a remote system (Remote Shell, rsh, remsh)Official
514UDPSyslog—used for system loggingOfficial
515TCPLine Printer Daemon—print serviceOfficial
517UDPTalkOfficial
518UDPNTalkOfficial
520TCPefs, extended file name serverOfficial
520UDPRouting Information Protocol (RIP)Official
524TCPUDPNetWare Core Protocol (NCP) is used for a variety things such as access to primary NetWare server resources, Time Synchronization, etc.Official
525UDPTimed, TimeserverOfficial
530TCPUDPRPCOfficial
531TCPUDPAOL Instant MessengerUnofficial
532TCPnetnewsOfficial
533UDPnetwall, For Emergency BroadcastsOfficial
540TCPUUCP (Unix-to-Unix Copy Protocol)Official
542TCPUDPcommerce (Commerce Applications)Official
543TCPklogin, Kerberos loginOfficial
544TCPkshell, Kerberos Remote shellOfficial
545TCPOSIsoft PI (VMS), OSISoft PI Server Client AccessUnofficial
546TCPUDPDHCPv6 clientOfficial
547TCPUDPDHCPv6 serverOfficial
548TCPApple Filing Protocol (AFP) over TCPOfficial
550TCPUDPnew-rwho, new-who[20]Official
554TCPUDPReal Time Streaming Protocol (RTSP)Official
556TCPRemotefs, RFS, rfs_serverOfficial
560UDPrmonitor, Remote MonitorOfficial
561UDPmonitorOfficial
563TCPUDPNNTP protocol over TLS/SSL (NNTPS)Official
587TCPe-mail message submission[21] (SMTP)Official
591TCPFileMaker 6.0 (and later) Web Sharing (HTTP Alternate, also see port 80)Official
593TCPUDPHTTP RPC Ep Map, Remote procedure call over Hypertext Transfer Protocol, often used by Distributed Component Object Model services and Microsoft Exchange ServerOfficial
604TCPTUNNEL profile,[22] a protocol for BEEP peers to form an application layer tunnelOfficial
623UDPASF Remote Management and Control Protocol (ASF-RMCP)Official
631TCPUDPInternet Printing Protocol (IPP)Official
631TCPUDPCommon Unix Printing System (CUPS)Unofficial
635TCPUDPRLZ DBaseOfficial
636TCPUDPLightweight Directory Access Protocol over TLS/SSL (LDAPS)Official
639TCPUDPMSDP, Multicast Source Discovery ProtocolOfficial
641TCPUDPSupportSoft Nexus Remote Command (control/listening): A proxy gateway connecting remote control trafficOfficial
646TCPUDPLDP, Label Distribution Protocol, a routing protocol used in MPLS networksOfficial
647TCPDHCP Failover protocol[23]Official
648TCPRRP (Registry Registrar Protocol)[24]Official
651TCPUDPIEEE-MMSOfficial
653TCPUDPSupportSoft Nexus Remote Command (data): A proxy gateway connecting remote control trafficOfficial
654TCPMedia Management System (MMS) Media Management Protocol (MMP)[25]Official
657TCPUDPIBM RMC (Remote monitoring and Control) protocol, used by System p5 AIX Integrated Virtualization Manager (IVM)[26] and Hardware Management Console to connect managed logical partitions (LPAR) to enable dynamic partition reconfigurationOfficial
660TCPMac OS X Server administrationOfficial
666UDPDoom, first online first-person shooterOfficial
666TCPairserv-ngaircrack-ng's server for remote-controlling wireless devicesUnofficial
674TCPACAP (Application Configuration Access Protocol)Official
691TCPMS Exchange RoutingOfficial
694TCPUDPLinux-HA High availability HeartbeatOfficial
695TCPIEEE-MMS-SSL (IEEE Media Management System over SSL)[27]Official
698UDPOLSR (Optimized Link State Routing)Official
700TCPEPP (Extensible Provisioning Protocol), a protocol for communication between domain name registries and registrars (RFC 5734)Official
701TCPLMP (Link Management Protocol (Internet)),[28] a protocol that runs between a pair of nodes and is used to manage traffic engineering (TE) linksOfficial
702TCPIRIS[29][30] (Internet Registry Information Service) over BEEP (Blocks Extensible Exchange Protocol)[31] (RFC 3983)Official
706TCPSecure Internet Live Conferencing (SILC)Official
711TCPCisco Tag Distribution Protocol[32][33][34]—being replaced by the MPLS Label Distribution Protocol[35]Official
712TCPTopology Broadcast based on Reverse-Path Forwarding routing protocol (TBRPF) (RFC 3684)Official
749TCPUDPKerberos (protocol) administrationOfficial
750UDPkerberos-iv, Kerberos version IVOfficial
751TCPUDPkerberos_master, Kerberos authenticationUnofficial
752UDPpasswd_server, Kerberos Password (kpasswd) serverUnofficial
753TCPReverse Routing Header (rrh)[36]Official
753UDPReverse Routing Header (rrh)Official
753UDPuserreg_server, Kerberos userreg serverUnofficial
754TCPtell sendOfficial
754TCPkrb5_prop, Kerberos v5 slave propagationUnofficial
754UDPtell sendOfficial
760TCPUDPkrbupdate [kreg], Kerberos registrationUnofficial
782TCPConserver serial-console management serverUnofficial
783TCPSpamAssassin spamd daemonUnofficial
808TCPMicrosoft Net.TCP Port Sharing ServiceOfficial
829TCPCertificate Management Protocol[37]Unofficial
843TCPAdobe Flash[38]Official
847TCPDHCP Failover protocolOfficial
848TCPUDPGroup Domain Of Interpretation (GDOI) protocolOfficial
860TCPiSCSI (RFC 3720)Official
873TCPrsync file synchronisation protocolOfficial USA only
888TCPcddbp, CD DataBase (CDDB) protocol (CDDBP)Unofficial
897TCPUDPBrocade SMI-S RPCUnofficial
898TCPUDPBrocade SMI-S RPC SSLUnofficial
901TCPSamba Web Administration Tool (SWAT)Unofficial
901TCPVMware Virtual Infrastructure Client (UDP from server being managed to management console)Unofficial
901UDPVMware Virtual Infrastructure Client (UDP from server being managed to management console)Unofficial
902TCPideafarm-doorOfficial
902TCPVMware Server Console (TCP from management console to server being Managed)Unofficial
902UDPideafarm-doorOfficial
902UDPVMware Server Console (UDP from server being managed to management console)Unofficial
903TCPVMware Remote Console [39]Unofficial
904TCPVMware Server Alternate (if 902 is in use, i.e. SUSE linux)Unofficial
911TCPNetwork Console on Acid (NCA)—local tty redirection over OpenSSHUnofficial
944UDPNetwork File System (protocol) ServiceUnofficial
953TCPUDPDomain Name System (DNS) RNDC ServiceUnofficial
973UDPNetwork File System (protocol) over IPv6 ServiceUnofficial
981TCPSofaWare Technologies Remote HTTPS management for firewall devices running embedded Check Point FireWall-1 softwareUnofficial
989TCPUDPFTPS Protocol (data): FTP over TLS/SSLOfficial
990TCPUDPFTPS Protocol (control): FTP over TLS/SSLOfficial
991TCPUDPNAS (Netnews Administration System)[40]Official
992TCPUDPTELNET protocol over TLS/SSLOfficial
993TCPInternet Message Access Protocol over SSL (IMAPS)Official
995TCPPost Office Protocol 3 over TLS/SSL (POP3S)Official
999TCPScimoreDB Database SystemUnofficial
1002TCPOpsware agent (aka cogbot)Unofficial
1023TCPUDPReserved[1]Official