The header of each packet contains information about the destination IP address, transport layer protocol used, remote port number, and more. Hardware firewalls are commonly built into networking equipment (such as routers), and examine each piece of network traffic (known as packets) as they are received and then re-transmitted. To reduce the effect that network traffic can have on a computer's operation, both networking equipment and individual computers may employ filters called firewalls that use a set of rules to allow or block certain unwanted network traffic (based on IP addresses, ports, or applications that are attempting to send the traffic). In this way, network traffic can affect the operation of a system up to the extent that an application allows. If an application on a given computer is accepting data, or "listening" on a given port, then the potential exists for that application to receive network data and do something based on that data. TCP, UDP) allows for up to 65,535 ports that applications can use. In practice, each transport layer protocol (e.g. The IP address of the computer transmitting the data or request is also sent along with a source port number used by the originating application. In order for a piece of network traffic to reach an application on a remote system, it must contain two key pieces of information: an address for the computer(s) that should receive the traffic (this is referred to as an IP address when using the IP protocol), and a destination port number for the application on the remote system(s) that should process the data. Two of the most common transport layer protocols are Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). Another layer, known as the transport layer, is responsible for providing end-to-end communication services for applications. The main network layer protocol used for both local network and Internet communication is known as Internet Protocol (IP). One layer, known as the network layer, is responsible for successfully routing network traffic, and providing error detection and diagnostic capability. On modern computer systems, network communication including web page traffic, file transfers, emails, and more can be logically divided into different layers this is known as the OSI Model.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |