SlideShare a Scribd company logo
1 of 17
 TCP and UDP are used to connect two devices over the
Internet or other networks.
 However, to give data packages an entrance to the PC
or server at the other end of the connection, the
“doors” have to be open.
 These openings into the system are called ports.
 For both protocols, there are some known and
important ports which you need to know when
developing web apps.

 when you send a TCP/IP message over the Internet,
you have to send it to the right port. TCP ports, unlike
entrances ,are referred to by numbers (from 0 to
65535).
 When communicating via the Internet, the two
protocols TCP and UDP establish the connection,
compile data packages again after transfer, and then
hand them over to the programs addressed on the
recipient’s device.
 For this handover to work, the operating system must
create entrances and open them for the transfer.
 Every entrance has a specific code number. After
the transfer, the receiving system knows where the
data has to be delivered based on the port number.
 The data package always includes two port numbers:
the sender’s and the recipient’s.
 Ports have consecutive numbers – from 0 to 65536.
 Some of these code numbers are standardized,
which means they are assigned to specific
applications.
 Ports 0–1023 are “well-known ports”, and only a system
process or an administrator can connect to them.
 Ports 1024–49151 are “registered”, so that common
applications can have a usual port number.
 However, most services are able to bind any port
number in this range.
 The Internet Assigned Numbers Authority (IANA) is
responsible for registering the numbers in these
ranges.
OTHER COMMON PORTS
 Even if you will rarely need a complete catalogue of all port numbers
for services, you can rapidly start to memorize port numbers for the
common services that you use daily. For example, you will very likely
come across the following ports regularly:
 80 HTTP
 8080 HTTP (for testing servers)
 443 HTTPS
 22 SSH (Secure Shell)
 23 Telnet
 25 SMTP (outbound email)
 110 POP3 (inbound email)
 220 IMAP (inbound email)

APPLICATION LAYER PROTOCOLS
 We have seen examples of protocols at the different
layers of the TCP/IP stack, from the low-level
communication across wired Ethernet, the low-level
IP communication, and the TCP transport layer.
 Now we come to the highest layer of the stack, the
application layer. This is the layer you are most likely
to interact with while prototyping an Internet of
Things project.
 A protocol is a set of rules for communication between
computers. It includes rules about how to initiate the
conversation and what format the messages should be
in.
 It determines what inputs are understood and what
output is transmitted.
 It also specifies how the messages are sent and
authenticated and how to handle (and maybe correct)
errors caused by transmission.
 some application layer protocols, starting with
HTTP
 HTTP
 The Internet is much more than just “the web”, but
inevitably web services carried over HTTP hold a large
part of our attention when looking at the Internet of
Things.
 HTTP is, at its core, a simple protocol. The client
requests a resource by sending a command to a URL,
with some headers.
 We use the current version of HTTP, 1.1, in these
examples. Let’s try to get a simple document
 at http://book.roomofthings.com/hello.txt. You can
see the result if you open the URL in your web browser.
 But let’s look at what the browser is actually sending to the
server to do this.The basic structure of the request would
look like this:
 GET /hello.txt HTTP/1.1
 Host: book.roomofthings.com
 Notice how the message is written in plain text, in a
human-readable way (this might sound obvious, but not all
protocols are; the messages could be encoded into bytes in
a binary protocol, for example).
 We specified the GET method because we’re simply getting
the page. We then tell the server which resource we want
(/hello.txt) and what version of the protocol we’re using.
HTTPS: ENCRYPTED HTTP
 We have seen how the request and response are
created in a simple text format. If someone
eavesdropped your connection (easy to do with tools
such as Wireshark if you have access to the network at
either end), that person can easily read the
conversation.
 In fact, it isn’t the format of the protocol that is the
problem: even if the conversation happened in binary,
an attacker could write a tool to translate the format
into something readable.
 Rather, the problem is that the conversation isn’t
encrypted. The HTTPS protocol is actually just a mix-
up of plain old HTTP over the Secure Socket Layer
(SSL) protocol.
 An HTTPS server listens to a different port (usually
443) and on connection sets up a secure, encrypted
connection with the client . When that’s established,
both sides just speak HTTP to each other as before!
 This means that a network snooper can find out only
the IP address and port number of the request
(because both of these are public information in the
envelope of the underlying TCP message, there’s no
way around that).
 After that, all it can see is that packets of data are
being sent in a request and packets are returned for
the response.

More Related Content

What's hot

IoT Cloud architecture
IoT Cloud architectureIoT Cloud architecture
IoT Cloud architectureMachinePulse
 
Transport Layer Numericals
Transport Layer NumericalsTransport Layer Numericals
Transport Layer NumericalsManisha Keim
 
IOT and Characteristics of IOT
IOT and  Characteristics of IOTIOT and  Characteristics of IOT
IOT and Characteristics of IOTAmberSinghal1
 
M2M - Machine to Machine Technology
M2M - Machine to Machine TechnologyM2M - Machine to Machine Technology
M2M - Machine to Machine TechnologySamip jain
 
IOT and its communication models and protocols.pdf
IOT and its communication models and protocols.pdfIOT and its communication models and protocols.pdf
IOT and its communication models and protocols.pdfMD.ANISUR RAHMAN
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applicationsPasquale Puzio
 
Moving to Manufacture_Internet of Things (Part 02)
Moving to Manufacture_Internet of Things (Part 02)Moving to Manufacture_Internet of Things (Part 02)
Moving to Manufacture_Internet of Things (Part 02)alengadan
 
IOT PROTOCOLS.pptx
IOT PROTOCOLS.pptxIOT PROTOCOLS.pptx
IOT PROTOCOLS.pptxDRREC
 
Internet of Things, TYBSC IT, Semester 5, Unit II
Internet of Things, TYBSC IT, Semester 5, Unit IIInternet of Things, TYBSC IT, Semester 5, Unit II
Internet of Things, TYBSC IT, Semester 5, Unit IIArti Parab Academics
 
Ethics_Internet of Things
Ethics_Internet of ThingsEthics_Internet of Things
Ethics_Internet of Thingsalengadan
 
Network address translation
Network address translationNetwork address translation
Network address translationVarsha Honde
 
IOT - Design Principles of Connected Devices
IOT - Design Principles of Connected DevicesIOT - Design Principles of Connected Devices
IOT - Design Principles of Connected DevicesDevyani Vasistha
 
20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging Technologies20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging TechnologiesSeminar Links
 
TCP- Transmission Control Protocol
TCP-  Transmission Control Protocol TCP-  Transmission Control Protocol
TCP- Transmission Control Protocol Akhil .B
 
User Datagram protocol For Msc CS
User Datagram protocol For Msc CSUser Datagram protocol For Msc CS
User Datagram protocol For Msc CSThanveen
 
Business Models_Internet of Things (Part 02)
Business Models_Internet of Things (Part 02)Business Models_Internet of Things (Part 02)
Business Models_Internet of Things (Part 02)alengadan
 

What's hot (20)

IoT Cloud architecture
IoT Cloud architectureIoT Cloud architecture
IoT Cloud architecture
 
Transport Layer Numericals
Transport Layer NumericalsTransport Layer Numericals
Transport Layer Numericals
 
IoT sensor devices
IoT sensor devicesIoT sensor devices
IoT sensor devices
 
IOT and Characteristics of IOT
IOT and  Characteristics of IOTIOT and  Characteristics of IOT
IOT and Characteristics of IOT
 
M2M - Machine to Machine Technology
M2M - Machine to Machine TechnologyM2M - Machine to Machine Technology
M2M - Machine to Machine Technology
 
IOT and its communication models and protocols.pdf
IOT and its communication models and protocols.pdfIOT and its communication models and protocols.pdf
IOT and its communication models and protocols.pdf
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applications
 
Moving to Manufacture_Internet of Things (Part 02)
Moving to Manufacture_Internet of Things (Part 02)Moving to Manufacture_Internet of Things (Part 02)
Moving to Manufacture_Internet of Things (Part 02)
 
IOT PROTOCOLS.pptx
IOT PROTOCOLS.pptxIOT PROTOCOLS.pptx
IOT PROTOCOLS.pptx
 
Internet of Things, TYBSC IT, Semester 5, Unit II
Internet of Things, TYBSC IT, Semester 5, Unit IIInternet of Things, TYBSC IT, Semester 5, Unit II
Internet of Things, TYBSC IT, Semester 5, Unit II
 
Ipv4 and Ipv6
Ipv4 and Ipv6Ipv4 and Ipv6
Ipv4 and Ipv6
 
Ethics_Internet of Things
Ethics_Internet of ThingsEthics_Internet of Things
Ethics_Internet of Things
 
Network address translation
Network address translationNetwork address translation
Network address translation
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
IOT - Design Principles of Connected Devices
IOT - Design Principles of Connected DevicesIOT - Design Principles of Connected Devices
IOT - Design Principles of Connected Devices
 
20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging Technologies20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging Technologies
 
TCP- Transmission Control Protocol
TCP-  Transmission Control Protocol TCP-  Transmission Control Protocol
TCP- Transmission Control Protocol
 
User Datagram protocol For Msc CS
User Datagram protocol For Msc CSUser Datagram protocol For Msc CS
User Datagram protocol For Msc CS
 
Business Models_Internet of Things (Part 02)
Business Models_Internet of Things (Part 02)Business Models_Internet of Things (Part 02)
Business Models_Internet of Things (Part 02)
 
E mail protocols
E mail protocolsE mail protocols
E mail protocols
 

Similar to Important Ports and Protocols for IoT Development

How does internet works
How does internet worksHow does internet works
How does internet worksRamonNavarro46
 
Protocols in computer network
Protocols in computer network   Protocols in computer network
Protocols in computer network priya sehgal
 
Internetbasics
InternetbasicsInternetbasics
Internetbasicspatinijava
 
Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptxkebeAman
 
Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptxazmerawAnna1
 
network protocol | Networking by Nitasha Chaturvedi
network protocol | Networking by Nitasha Chaturvedinetwork protocol | Networking by Nitasha Chaturvedi
network protocol | Networking by Nitasha Chaturvedinitashach22
 
Networking-basics
Networking-basicsNetworking-basics
Networking-basicsRaj Alam
 
HNS L III UC2 Installing and Managing Network Protocols .pdf
HNS L III UC2 Installing and Managing Network Protocols .pdfHNS L III UC2 Installing and Managing Network Protocols .pdf
HNS L III UC2 Installing and Managing Network Protocols .pdfAbenetAsmellash
 
How Internet Works
How Internet WorksHow Internet Works
How Internet Workssumit kumar
 
Published on IST 554 (httpsonline.ist.psu.eduist554).docx
Published on IST 554 (httpsonline.ist.psu.eduist554).docxPublished on IST 554 (httpsonline.ist.psu.eduist554).docx
Published on IST 554 (httpsonline.ist.psu.eduist554).docxamrit47
 
Ajp notes-chapter-04
Ajp notes-chapter-04Ajp notes-chapter-04
Ajp notes-chapter-04Ankit Dubey
 
Network protocols
Network protocolsNetwork protocols
Network protocolsAbiud Orina
 

Similar to Important Ports and Protocols for IoT Development (20)

How does internet works
How does internet worksHow does internet works
How does internet works
 
Protocols in computer network
Protocols in computer network   Protocols in computer network
Protocols in computer network
 
Tcp Udp Notes
Tcp Udp NotesTcp Udp Notes
Tcp Udp Notes
 
Internetbasics
InternetbasicsInternetbasics
Internetbasics
 
Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptx
 
Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptx
 
network protocol | Networking by Nitasha Chaturvedi
network protocol | Networking by Nitasha Chaturvedinetwork protocol | Networking by Nitasha Chaturvedi
network protocol | Networking by Nitasha Chaturvedi
 
Networking infrastructure
Networking infrastructureNetworking infrastructure
Networking infrastructure
 
Networking-basics
Networking-basicsNetworking-basics
Networking-basics
 
internet protocol
internet protocolinternet protocol
internet protocol
 
HNS L III UC2 Installing and Managing Network Protocols .pdf
HNS L III UC2 Installing and Managing Network Protocols .pdfHNS L III UC2 Installing and Managing Network Protocols .pdf
HNS L III UC2 Installing and Managing Network Protocols .pdf
 
Application Layer
Application LayerApplication Layer
Application Layer
 
How Internet Works
How Internet WorksHow Internet Works
How Internet Works
 
Http Vs Https .
Http Vs Https . Http Vs Https .
Http Vs Https .
 
Published on IST 554 (httpsonline.ist.psu.eduist554).docx
Published on IST 554 (httpsonline.ist.psu.eduist554).docxPublished on IST 554 (httpsonline.ist.psu.eduist554).docx
Published on IST 554 (httpsonline.ist.psu.eduist554).docx
 
Ajp notes-chapter-04
Ajp notes-chapter-04Ajp notes-chapter-04
Ajp notes-chapter-04
 
An Introduction to HTTP
An Introduction to HTTPAn Introduction to HTTP
An Introduction to HTTP
 
Basic to advance protocols
Basic to advance protocolsBasic to advance protocols
Basic to advance protocols
 
application layer
application layerapplication layer
application layer
 
Network protocols
Network protocolsNetwork protocols
Network protocols
 

Recently uploaded

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 

Recently uploaded (20)

Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 

Important Ports and Protocols for IoT Development

  • 1.
  • 2.  TCP and UDP are used to connect two devices over the Internet or other networks.  However, to give data packages an entrance to the PC or server at the other end of the connection, the “doors” have to be open.  These openings into the system are called ports.  For both protocols, there are some known and important ports which you need to know when developing web apps. 
  • 3.  when you send a TCP/IP message over the Internet, you have to send it to the right port. TCP ports, unlike entrances ,are referred to by numbers (from 0 to 65535).  When communicating via the Internet, the two protocols TCP and UDP establish the connection, compile data packages again after transfer, and then hand them over to the programs addressed on the recipient’s device.
  • 4.  For this handover to work, the operating system must create entrances and open them for the transfer.  Every entrance has a specific code number. After the transfer, the receiving system knows where the data has to be delivered based on the port number.  The data package always includes two port numbers: the sender’s and the recipient’s.
  • 5.  Ports have consecutive numbers – from 0 to 65536.  Some of these code numbers are standardized, which means they are assigned to specific applications.  Ports 0–1023 are “well-known ports”, and only a system process or an administrator can connect to them.
  • 6.  Ports 1024–49151 are “registered”, so that common applications can have a usual port number.  However, most services are able to bind any port number in this range.  The Internet Assigned Numbers Authority (IANA) is responsible for registering the numbers in these ranges.
  • 7. OTHER COMMON PORTS  Even if you will rarely need a complete catalogue of all port numbers for services, you can rapidly start to memorize port numbers for the common services that you use daily. For example, you will very likely come across the following ports regularly:  80 HTTP  8080 HTTP (for testing servers)  443 HTTPS  22 SSH (Secure Shell)  23 Telnet  25 SMTP (outbound email)  110 POP3 (inbound email)  220 IMAP (inbound email) 
  • 8. APPLICATION LAYER PROTOCOLS  We have seen examples of protocols at the different layers of the TCP/IP stack, from the low-level communication across wired Ethernet, the low-level IP communication, and the TCP transport layer.  Now we come to the highest layer of the stack, the application layer. This is the layer you are most likely to interact with while prototyping an Internet of Things project.
  • 9.
  • 10.  A protocol is a set of rules for communication between computers. It includes rules about how to initiate the conversation and what format the messages should be in.  It determines what inputs are understood and what output is transmitted.  It also specifies how the messages are sent and authenticated and how to handle (and maybe correct) errors caused by transmission.
  • 11.  some application layer protocols, starting with HTTP  HTTP  The Internet is much more than just “the web”, but inevitably web services carried over HTTP hold a large part of our attention when looking at the Internet of Things.  HTTP is, at its core, a simple protocol. The client requests a resource by sending a command to a URL, with some headers.
  • 12.  We use the current version of HTTP, 1.1, in these examples. Let’s try to get a simple document  at http://book.roomofthings.com/hello.txt. You can see the result if you open the URL in your web browser.
  • 13.
  • 14.  But let’s look at what the browser is actually sending to the server to do this.The basic structure of the request would look like this:  GET /hello.txt HTTP/1.1  Host: book.roomofthings.com  Notice how the message is written in plain text, in a human-readable way (this might sound obvious, but not all protocols are; the messages could be encoded into bytes in a binary protocol, for example).  We specified the GET method because we’re simply getting the page. We then tell the server which resource we want (/hello.txt) and what version of the protocol we’re using.
  • 15. HTTPS: ENCRYPTED HTTP  We have seen how the request and response are created in a simple text format. If someone eavesdropped your connection (easy to do with tools such as Wireshark if you have access to the network at either end), that person can easily read the conversation.  In fact, it isn’t the format of the protocol that is the problem: even if the conversation happened in binary, an attacker could write a tool to translate the format into something readable.
  • 16.  Rather, the problem is that the conversation isn’t encrypted. The HTTPS protocol is actually just a mix- up of plain old HTTP over the Secure Socket Layer (SSL) protocol.  An HTTPS server listens to a different port (usually 443) and on connection sets up a secure, encrypted connection with the client . When that’s established, both sides just speak HTTP to each other as before!
  • 17.  This means that a network snooper can find out only the IP address and port number of the request (because both of these are public information in the envelope of the underlying TCP message, there’s no way around that).  After that, all it can see is that packets of data are being sent in a request and packets are returned for the response.