What are ports in computing and how do they work? (2024)

What are ports in computing and how do they work? (1)

By

  • Gavin Wright

What is a computer port?

A port in computing has three main uses, each as a type of receptacle in networking, computer hardware and software:

  1. A port in networking is a software-defined number associated to a network protocol that receives or transmits communication for a specific service.
  2. A port in computer hardware is a jack or socket that peripheral hardware plugs into.
  3. A port in computer software is when a piece of software has been translated or converted to run on different hardware or operating system (OS) than it was originally designed for.

What is a computer network port?

A port in computer networking is how a computer can use a single physical network connection to handle many incoming and outgoing requests by assigning a port number to each. The numbers go from 0 to 65535, which is a 16-bit number.

Some of these port numbers are specifically defined and always associated with a specific type of service -- for example, File Transfer Protocol (FTP) is always port number 21 and Hypertext Transfer Protocol web traffic is always port 80. These are called well-known ports and go from 0 to 1023.

The numbers from 1024 to 49151 are called registered ports and can be registered with the Internet Assigned Numbers Authority for a specific use. The numbers 49152 to 65535 are unassigned, can be used by any type of service and are called dynamic ports, private ports or ephemeral ports.

As an illustration, think of a port number as a telephone extension in a business telephone system. The company telephone number is like the computer Internet Protocol (IP) address or Uniform Resource Locator (URL). It connects users with the correct company but does not define who they want to talk to in the company. A telephone extension will connect them with the right person in an organization, however, and the port will connect them to the right service on a computer. Dialing extension 0 to speak to an operator is extremely common in all phone systems and is like the well-known ports that always define specific services.

What are ports in computing and how do they work? (2)

A port is always associated with a protocol. Generally, this is with Transmission Control Protocol or User Datagram Protocol for communication, but Internet Control Message Protocol messages use specific ports as well. The port is specified by having the URL or IP address followed by a colon then the port number -- as examples, 10.0.0.1:80 or www.techtarget.com:443. With all internet communication, there is always an associated port, but it may not be shown to the user as it is often implied by the type of communication.

A computer can manage many simultaneous connections on a single inbound port. This is because the local IP address, local port, remote IP address and remote port specify each connection. A listening port is when the computer is actively waiting for inbound requests on that port number, allowing those connections. Port forwarding is when communication to one address on a specific port is then sent, or forwarded, to another computer for processing.

How do network ports affect cybersecurity?

Network ports are a major factor in network security and cybersecurity in general.

Port scanning, for example, tries all ports at an address to see which ones are open and listening. Attackers can use this to find vulnerable services that they can then attack.

Firewalls take the port number into consideration when determining to allow or block communication. They are configured to only allow communication to the specific ports needed for a service and block other unneeded ports so they cannot be exploited.

As an example of ports in use, say a company wants to have a website, email and secure file transfer service on the internet. Its firewall would allow inbound connections to ports 80 and 443 for web traffic, port 25 for inbound email and port 22 for Secure Shell FTP (SFTP). It forwards these ports to the specific servers for each type of service. The firewall will block all other ports.

So, if an employee incorrectly tries to use FTP on port 21 instead of SFTP, it will be blocked. Or, for instance, if an attacker tries to connect to port 3389 for Windows Remote Desktop to gain control of a server, the firewall will block the connection.

What are ports in computing and how do they work? (3)

What is a computer hardware port?

In computer hardware, a port is the jack or receptacle for some other peripheral device to plug into. These are standardized for each purpose.

Some common ports are Universal Serial Bus ports, USB-C ports, Ethernet ports or DisplayPorts. Some older ports no longer in common use are serial ports, parallel ports and mouse/keyboard PS/2 ports. As a general guideline, if the plug receptacle is on a computer, it is called a port; if the receptacle is on a wall, it is called a jack.

What is a computer software port?

In computer software, the verb porting is the process by which software is changed or translated to run on different hardware types or OSes than it was originally programmed for. The result can be called a port of the software.

Examples of this include the following:

  • Microsoft originally programmed Windows 10 to run on X86 processors but is now porting Windows to also run on Arm processors.
  • Microsoft programmed Office to run on Windows OSes, but a port of Office is also available for macOS.
  • Porting games originally designed to run on one video game console to run on another type of console is also common.

This was last updated in July 2021

Continue Reading About port

  • What are port scan attacks and how can they be prevented?
  • What is the difference between a socket and a port?
  • The 5 different types of firewalls explained
  • Navigate different network ports, from physical to virtual
  • How can users detect dangerous open ports in mobile apps?

Related Terms

local area network (LAN)
A local area network (LAN) is a group of computers and peripheral devices that are connected together within a distinct ...Seecompletedefinition
subnet mask
A subnet mask is a 32-bit binary number used in modern network addressing schemes to differentiate between a network's location ...Seecompletedefinition
TCP/IP
TCP/IP stands for Transmission Control Protocol/Internet Protocol and is a suite of communication protocols used to interconnect ...Seecompletedefinition

Dig Deeper on Network infrastructure

  • The differences between inbound and outbound firewall rulesBy: MichaelCobb
  • The history of USB: What you need to knowBy: MadeleineStreets
  • Universal Plug and Play (UPnP)By: GavinWright
  • Examine a captured packet using WiresharkBy: DamonGarn
What are ports in computing and how do they work? (2024)

FAQs

What are ports in computing and how do they work? ›

Ports are either virtual or physical and are used to identify where a network begins and ends. A virtual port is assigned a 16-bit unique number used to identify a connection endpoint and direct data to a specific service or process.

What is a port and how is it used? ›

In computer hardware, a port is the jack or receptacle for some other peripheral device to plug into. These are standardized for each purpose. Some common ports are Universal Serial Bus ports, USB-C ports, Ethernet ports or DisplayPorts.

What is the port answer? ›

A port is a maritime facility comprising one or more wharves or loading areas, where ships load and discharge cargo and passengers. Although usually situated on a sea coast or estuary, ports can also be found far inland, such as Hamburg, Manchester and Duluth; these access the sea via rivers or canals.

What is the use of the computer port answer? ›

A computer port is a hardware piece on a computer where an electrical connector can be plugged to link the device to external devices, such as another computer, a peripheral device or network equipment.

What are 4 example of Computer Ports? ›

A complete guide on 16 types of Computer Ports like PS/2, USB, HDMI, DVI, RJ45, USB Type C, Serial, Parallel, Audio, VGA, DisplayPort.

How do ports work on servers? ›

A host, such as a server, often runs multiple processes or applications such as web and email. Each host maintains a table that maps the port numbers to the processes; when a data packet arrives at a host, the host uses this table to route the packet to the correct process or service.

What is a port in simple terms? ›

1. : a place where ships may ride secure from storms : haven. 2. a. : a harbor town or city where ships may take on or discharge cargo.

How do they do a port? ›

Makes a small incision in the neck area to reach the vein (typically the superior vena cava, jugular vein or subclavian vein). Creates an access point in the vein. Makes a small incision in the chest, arm or abdomen to place the port. Uses that incision to create a pouch under the bottom (subcutaneous) layer of skin.

Why do you need a port? ›

Why Do You Need an Implantable Port? If you're getting chemotherapy for cancer, or other medications, it's easier for the doctor to give you medication or IV fluids through a port. Otherwise, you'd need regular shots or needle sticks in your veins. The port is less painful and lowers your risk of infection, too.

What are the different ports on a computer? ›

Computer ports include audio ports, video ports, networking ports, ports for connecting peripheral devices, USB ports, and more. Modern computers often use USB connections for these purposes, but older systems will have many different kinds of ports.

Why is port called port? ›

This side became known as larboard, or "the loading side." Over time, larboard—too easily confused with starboard—was replaced with port. After all, this was the side that faced the port, allowing supplies to be ported aboard by porters.

What is a data port? ›

What is a data port? A data port is a port for continuous data exchange between RTCs. A data port that sends data to other RTCs is called an OutPort, and a data port which receives from other RTCs is called an InPort. OutPort and InPort together are termed data ports.

Where is the port in a computer? ›

On most desktop computers, most of the USB ports are on the back of the computer case. Generally, you'll want to connect your mouse and keyboard to these ports and keep the front USB ports free so they can be used for digital cameras and other devices.

How do I know which port is which on my computer? ›

Type “Cmd” in the search box. Open “Command Prompt.” Enter the netstat -a command to see your port numbers.

What are the three types of ports? ›

There are different types of ports available: Serial port. Parallel port. USB port.

What is the difference between a port and a protocol? ›

A protocol is a specification for how two devices should exchange data in a way that they can both understand. A port is kind of a numbered 'tag' that helps a computer decide who should receive an incoming piece of data.

What is TCP port 80 used for? ›

Port 80 is the default network port for web servers using HTTP. It operates on the application layer of the TCP/IP networking model and serves as the communication gateway for HTTP requests and responses between client computers and servers.

What is the difference between a socket and a port? ›

A socket uniquely identifies the endpoint of a communication link between two application ports. A port represents an application process on a TCP/IP host, but the port number itself does not indicate the protocol being used: TCP, UDP, or IP.

Top Articles
Ways to Bank | TD Phone Banking
How Our Writing Center Works | Teaching & Learning Centers | University of Washington Tacoma
The Atlanta Constitution from Atlanta, Georgia
Midflorida Overnight Payoff Address
Rabbits Foot Osrs
Z-Track Injection | Definition and Patient Education
Deshret's Spirit
Pollen Count Los Altos
South Bend Tribune Online
Slmd Skincare Appointment
Guardians Of The Galaxy Vol 3 Full Movie 123Movies
123Moviescloud
Nonuclub
Diablo 3 Metascore
Chastity Brainwash
Adam4Adam Discount Codes
How to Create Your Very Own Crossword Puzzle
Pickswise Review 2024: Is Pickswise a Trusted Tipster?
Self-Service ATMs: Accessibility, Limits, & Features
Sef2 Lewis Structure
‘The Boogeyman’ Review: A Minor But Effectively Nerve-Jangling Stephen King Adaptation
R. Kelly Net Worth 2024: The King Of R&B's Rise And Fall
Pirates Of The Caribbean 1 123Movies
Jeff Nippard Push Pull Program Pdf
Disputes over ESPN, Disney and DirecTV go to the heart of TV's existential problems
BJ 이름 찾는다 꼭 도와줘라 | 짤방 | 일베저장소
Apparent assassination attempt | Suspect never had Trump in sight, did not get off shot: Officials
Local Collector Buying Old Motorcycles Z1 KZ900 KZ 900 KZ1000 Kawasaki - wanted - by dealer - sale - craigslist
Afni Collections
Free T33N Leaks
Usa Massage Reviews
R/Mp5
Otis Inmate Locator
Pixel Combat Unblocked
Grove City Craigslist Pets
Star News Mugshots
Haunted Mansion Showtimes Near Cinemark Tinseltown Usa And Imax
Pch Sunken Treasures
Helloid Worthington Login
Blue Beetle Movie Tickets and Showtimes Near Me | Regal
Domina Scarlett Ct
Bella Thorne Bikini Uncensored
Publictributes
Doordash Promo Code Generator
Top 40 Minecraft mods to enhance your gaming experience
Random Animal Hybrid Generator Wheel
60 Days From May 31
Unit 11 Homework 3 Area Of Composite Figures
Server Jobs Near
Meee Ruh
Ihop Deliver
Provincial Freeman (Toronto and Chatham, ON: Mary Ann Shadd Cary (October 9, 1823 – June 5, 1893)), November 3, 1855, p. 1
Latest Posts
Article information

Author: Kimberely Baumbach CPA

Last Updated:

Views: 6426

Rating: 4 / 5 (61 voted)

Reviews: 84% of readers found this page helpful

Author information

Name: Kimberely Baumbach CPA

Birthday: 1996-01-14

Address: 8381 Boyce Course, Imeldachester, ND 74681

Phone: +3571286597580

Job: Product Banking Analyst

Hobby: Cosplaying, Inline skating, Amateur radio, Baton twirling, Mountaineering, Flying, Archery

Introduction: My name is Kimberely Baumbach CPA, I am a gorgeous, bright, charming, encouraging, zealous, lively, good person who loves writing and wants to share my knowledge and understanding with you.