Chapter 3
Chapter 3
➢ Internet communication is referred to as the sharing of information, ideas, or simply words over the World
Wide Web, or the Internet.
➢ The world is ever-changing and with the advent of digital technology, it is changing at a very fast pace.
What was once taking a few months to send, now takes seconds.
➢ Today, more than ever, Internet communication has made sure to connect people from two opposite sides
of the earth with no problem at all.
➢ The Internet consists of a worldwide string of connected networks that exchanges through packet
switching using the standardized Internet Protocol Suite (TCP/IP)
➢ We can boil down the wireless communication protocols into the subsequent six standards:
l. Satellite 2. WIFI
3. Radio Frequency (RF) 4. RFID
5.
Bluetooth 6. NFC
In the following paragraphs, we are going to offer a short summary and illustration of every of the internet of
Things communication techniques, their professionals and cons, and their smartphone compatibilities.
1.Satellite: -
➢ Satellite communications change telephone communication from a phone to ensuing
➢ antenna of concerning ten to fifteen miles. they're known as GSM, GPRS, CDMA, GPRS, 2G / GSM, 3G, 4G /
LTE, EDGE et al supported property speed.
➢ In net of Things language, this manner of communication is generally named as "M2M" (Machine-to-Machine)
as a result of it permits devices like a phone to send and receive knowledge through the cell network.
2.WI-FI: -
➢ WIFI may be a wireless native space network (WLAN) that utilize the IEEE 802.11 commonplace though a pair
of 4 GHZ UHF 5 GHZ belief frequencies.
➢ Wireless local (area network WLAN wireless fidelity WiFi local area network) provides net access to devices
that are at intervals that vary about 66ft. from the access point.
➢ Wireless fidelity is beneficial for several IOT connections however such connections generally hook up and
external cloud-server and don’t seem to be directly connected to the smartphone.
3.Oftenness (RF): -
➢ Radio frequency communications are most likely the best sort of between devices. Protocols like ZigBee or
Z-Wave use a low-power RF radio embedded or retrofitted into electronic devices and systems.
➢ Z-Wave's vary is some a hundred foot (30 m). The oftenness band used is particular to its country. as an
example, Europe has Associate in Nursing 868.42 megacycle per second SRD Band, a 900 MHz ism or
908.42 megacycles per the second band (United States), a 916 megacycle per second in Israel, 919.82
megacycle per second in metropolis. 921.42 NIHz within the regions of Australia/New Zealand) and 865.2
MHz in India,
➢ ZigBee is predicated on the IEEE 802.15.4 standard. However, its low power consumption limits
transmission distances to a variety of ten to a hundred.
4.RFID: -
➢ Radio frequency identification (RFID) is the wireless use of electromagnetic fields to spot objects. sometimes
you'd install an active reader, or reading tags that contain data mostly on authentication replies. specialists call
that an active Reader Passive Tag (ARPT) system. Short-range RFID is about 10cm; however, long range will
go up to 200m. What several don't know is that Léon Theremin fabricated the RFID as a spying tool for the
Soviet Union in 1945.
➢ Active tags are called by an Active Reader Tag (ARAT) systems by using an interrogator signal from an
active reader. Bands RFID runs on: 120-150 kHz.
➢ Examples include animal identification, manufactory information collection, road tolls, and building access.
RFID tag is additionally connected to an inventory such that its production and producing progress will be half-
track through the assembly line. As illustration, pharmaceuticals will be half-track through warehouses. It is
believed that very soon the RFID technology could get replaced by near-field communication (NFC) technology
in a smartphone.
5. Bluetooth: -
➢ Bluetooth is a wireless technology standard for exchanging information over short distances. Such
communication can be done by using short-wavelength UHF radio waves within the ISM band from 2.4 to
2.485 GHz. If you check out the frequencies it's really identical as WIFI such that these two technologies
appear terribly similar, but they have totally different uses.
➢ Bluetooth is usually used to transfer audio information with telephones (i.e., with a Bluetooth headset) or
some byte information with hand-held computers (transferring files).
➢ The setup of services between devices has been changed after Bluetooth protocols came into existence.
Bluetooth devices will advertise all of the services they provide. This makes using services easier, as a result
of relative to different communication protocols, it permits larger automation like security, network address
and permission configuration.
6. Near Field Communication (NFC): -
➢ Near-field communication-uses electromagnetic-induction between 2 loop antennas set within every
other's near field, effectively forming an air-core electrical device. It operates inside the globally accessible
and unauthorized radio band of 13.56 MHz on ISO/IEC 18000-3 air interface and at rates starting from 106
kbit/s to 424 kbit/s.
➢ NFC involves an instigator and a target; the instigator actively generates an RF field which will power a
passive target (an unpowered chip referred to as a "tag"). This permits targets of NFC to require easy kind
factors like tags, stickers, key fobs, or battery-les cards. NFC peer-to-peer communication is feasible
provided each device are powered.
1. Speed and time: Through internet communication, time and money are saved. This is because it is much
cheaper and quicker to translate information around. It also become faster and efficient to contact a business
partner or a relative. We can now Communicate with anyone around the world through emails and text messages
instantly. The internet also provided face-to-face communication.
2. Job creation: One major advantage of internet communication is the creation of new exciting jobs. System
analysts, computer programmers, web designers, hardware software developers and many other new
Disadvantage
1. Unemployment: Though the internet has improved many sectors, it has resulted unemployment through
outsourcing, downsizing, and redundancies. For example, a can replace skilled personnel with robots can work
faster and for longer hours.
2. Privacy: Although the internet has made communication easier, quicker and convenient privacy problems
emerged. From email hacking to phone signal interceptions and more people are now troubled about their private
information.
3. Lack of job security: Since technology keeps on changing, job security has become problem. This means that
IT experts need to be continuously learning to keep up with changes if they want to retain their jobs.
Overview of IP
➢ The Internet Protocol (IP) is the method or protocol by which data is sent from one computer to another on
the Internet. Each computer (known as a host) on the Internet has at least one IP address that uniquely
identifies it from all other computers on the Internet.
➢ IP is a connectionless protocol, which means that there is no continuing connection between the end points
that are communicating.
➢ Each packet that travels through the Internet is treated as an independent unit of data without any relation
to any other unit of data.
➢ The main purpose and task of IP is the delivery of datagrams from the source host (source computer) to the
destination host (receiving computer) based on their addresses.
➢ To achieve this, IP includes methods and structures for putting tags (address information, which is part of
metadata) within datagrams. The process of putting these tags on datagrams is called encapsulation.
➢ The Internet Protocol also provides basic instructions for transferring packets between devices. however, it
does not actually establish the connection or define the ordering of the packets transmitted. These aspects
are handled by the Transmission Control Protocol, which works in conjunction with the Internet Protocol
to transfer data between systems on the Internet. For this reason, connections between Internet-connected
systems are often called "TCP/IP" connections.
➢ The most widely used version of IP today is Internet Protocol Version 4 (IPv4). However, IP Version 6
(IPv6) is also beginning to be supported.
➢ IPv6 provides for much longer addresses and therefore for the possibility of in any more Internet users. IPv6
includes the capabilities of 1m 4 and any server that can support IPv6 packets can also support IPv4 packets.
➢ Transmission control protocol (TCP) is a network communication protocol designed to send data packets over the
Internet.
➢ TCP is a transport layer protocol in the OSI layer and is used to create a connection between remote computers
by transporting and ensuring the delivery of messages over supporting nonworks and the Internet.
➢ Transmission Control Protocol is one of the most used protocols in digital network communications and is part of
the Internet protocol suite, commonly known as the TCP/IP suite.
➢ Primarily, TCP ensures end-to-end of data between distinct nodes. TCP works collaboration with Internet
Protocol, which defines the logical location of the remote node, whereas TCP transports and ensures that the data
is delivered to the correct destination.
➢ Before transmitting data, TCP creates a connection between the source and destination node and keeps it live until
the communication is active.
➢ When data is sent over a TCP connection, the protocol divides it into individually numbered packets or "segments.
" Each packet includes a header that defines the source and destination and a data section. Since packets can travel
over the Internet using multiple routes, they may arrive at the destination in a different order than they were sent.
➢ The transmission control protocol reorders the packets in the correct sequence on the receiving end.
➢ TCP also includes error checking, which ensures each packet is delivered as requested, it ensures accurate delivery
of data between system.
➢ TCP is used for transferring most type of data such as webpages and files over the internet.
3. Network Layer:
(a) TCP/IP upper layer protocol stack define the Internet Protocol (IP) for Network LAN.
(b) At this level, the communication is host-to-host.
(c) The unit of communication is called a datagram.
(d) Datagram can travel along different routes. IP does not keep track of the routes an no facility for recording
datagram ones they arrive at their destination.
(e) Communication is logical not physical.
4. Transport Layer:
(a) TCP/IP upper layer protocol stack define the User Datagram Protocol (UDP) and Transmission Control
protocol (TCP) for transport layer.
(b) At this level, the communication is end to end.
(c) The unit of communication is called a segment or a user datagram or a packet.
(d) The transport layer is responsible for delivering the whole message, which is called a segment from A to B.
(e) Communication is logical not physical.
5. Application layer: -
a) TCP/IP upper layer protocol stack define many protocols for application layer provide services such as
electronic mail, file transfer accessing the world wide web and so on.
b) At this level of communication is end to end.
c) The unit of communication is called a message.
d) A message generated at computer A is sent to computer B without being change during the transmission.
e) Communication is logical not physical.
f) All nodes in a network need to have the network layer, only the two end computer need to have the
application layer.
i) Source port: Source Port is 2 Byte long field used to Identify port number of sources.
ii) Destination port: It is 2 Byte long field, used to identify the port
iii) Length: Length is the length of UDP including header and the data. It is 16-bit field.
iv) Checksum: complement sum of the UDP header, pseudo header of information from the data,
padded with zero octets at the end (if-necessary) to make a multiple of two octets.
IP Address
• In the most widely installed level of the Internet Protocol (IP) today, an IP bit number that identifies
each sender or receiver of information that is sent in packets across the internet.
• when we request an HTML page or send e-mail, the Internet Protocol part of includes our IP address in
the message and sends it to the IP address that is looking up the domain name in the Uniform Resource
Locator we requested or in address we're sending a note to. At the other end, the recipient can see the IP
address Web page requestor or the e-mail sender and can respond by sending another message the IP
address it received.
• An IP address has two parts: the identifier of a particular network on the identifier of the particular device
(which can be a server or a workstation) network. On the Internet itself - that is, between the router that
move packets from to another along the route - only the network part of the address is looked at.
• IP is actually versatile. It works over wireless (WiFi, WiMax, 3G, 4G, LTE, IEEE
802.15.4LoWPAN, etc.) similarly as wired (Ethernet, SONET, etc.) communications. wherever
power or distance isn't a difficulty and bigger devices are concerned, primary web access for
10T may possibly be fascinating, however not essential. Heterogeneous islands will have helpful
native computation and native networking with IP property to the solid ground.
• This is often a lot of united read of IOT. Either way, the issue to not worry regarding is whether
or not there'll be enough addresses.
• The IP address is usually expressed as four decimal numbers, each representing separated by periods.
This is sometimes known as the dot address and, more techie dotted quad notation.
The Network Part of the IP Address
l. The Internet is really the interconnection of many individual networks (it's referred to as an internetwork).
So, the Internet Protocol (IP) is basically the set of one network communicating with any other (or
occasionally, for broadcast message other networks).
2. Each network must know its own address on the Internet and that of any other networking which it
communicates. To be part of the Internet, an organization needs an Internd number, which it can request from
the Network Information Center (NIC). This network number is included in any packet sent out of the network
onto the Internet.
• Domain Name System (or Service or Server), an Internet service that translates domain names into IP
addresses. Because domain names are alphabetic, they're easier to remember.
• The Internet however, is really based on IP addresses. Every time we use a domain name, therefore, a
DNS service must translate the name into the corresponding IP address. For example, the domain name
www.exannple.com might translate to 198.105.232.4.
• DNS is like a phone book the Internet. If we know a person's name but don't know their telephone
number, we can simply look it up in a phone book. DNS provides this same service to the Internet.
• The DNS system is, in fact, its own network. If one DNS server doesn't know how to translate a particular
domain name, it asks another one, and so on, until the correct IP address is returned.
Purpose of DNS: -
l. Resolving IP addresses into Domain Names.
2. Provides information about mail exchange with the domain.
3. In Distributed Internet Services such as content delivery networks (CDNs) and cloud computing services.
4. Providing efficient storage and distribution of IP addresses of blacklisted email hosts.
To understand, how DNS work, consider a typical user John who is looking for a website, for example,
www.example.com (which resolves to 198.105.232.4). He launches his browser to visit this site. Then,
a) His browser sends a request to the DNS server about the IP address of, www.example.com
b) The DNS server checks its database to find IP of DeepanshuGahlaut.com. If the DNS server does not know the
IP address, it asks for another DNS server for that IP address.
c) The second DNS server passes the IP to first DNS server that is cached by this server for his future use.
d) The server returns the address to user John.
e) The browser displays the website to John.
f) The process is same for every website we visit and this entire process, from start to finish, takes only
milliseconds to complete.
g) DNS can be considered as a mechanism that resolves IP addresses, query and updates the database, replicated
the information among other servers.
• Static IP address is an IP address that was manually configured for a device, versus one that was assigned via
DHCP server.
• It’s called static because it doesn’t change. It is exact opposite of a dynamic IP address which does change,
• Routers, phones, tablets, desktops, laptops, and any other device that can be configured to have a static IP
address. This might be done through the out IP addresses (like the router) or by manually typing the IP address
into the device itself.
• Static IP addresses are also sometimes referred to as fixed IP addresses.
• How do you get assigned an IP address?
• If you have bought a server-hosting package from an Internet service provider (ISP), you might typically be
given a single IP address.
• But the company itself has been given a block of addresses to assign.
• Historically, these were ranges of different sizes, typically separated into “classes” of 8 bits, 16 bits, or 24 bits:
• Class A — From 0.x.x.x
• Class B — From 128.0.x.x
• Class C — From 192.0.0.x
• The class C ranges had a mere 8 bits (256 addresses) assigned to them, while the class A ranges had many
more addresses and would therefore be given only to the very largest of Internet organizations.
• With the explosion of the number of devices connecting to the Internet we can use Classless Inter-Domain
Routing (CIDR), which allows you to specify exactly how many bits of the address are fixed.
• the class A addresses we mentioned above would be equivalent to 0.0.0.0/8, while a class C might be
208.215.179.0/24.
• In many cases, the system administrator simply assigns server numbers in order.
• He makes a note of the addresses and updates DNS records and so on to point to these addresses.
• We call this kind of address static because once assigned it won’t change again without human intervention.
______________________________________________________________________________________________
• A dynamic IP address is an IP address that is assigned automatically by the system to a device, account or user
when it is connected to the network; that is, it is assigned as needed rather than in advance.
• Dynamic IP addresses are assigned by the dynamic host configuration protocol (DHCP), which is one of the
key protocols in the TCP/IP protocol suite.
• Dynamic IP addresses contrast with static IP addresses, which are assigned manually and semi-permanently to
a device, account or user. With dynamic addressing, a computer, account, etc. will typically have a different IP
address every time it connects to the network.
• The main advantage of dynamically assigning IP addresses is that it allows them to be reused, thereby greatly
increasing the total number of computers and other devices use the Internet or other network.
• Another advantage is enhanced security for individual users because their IP address is different every time
they log into the network. Still benefit is simplification of network administration because the software keeps
track addresses and thus relieves the administrator from the very tedious task of having to manually assign a
unique IP address to every computer as it enters the network.
• How DHCP server assigns IP address to a host?
• DHCPDISCOVER•. When a new node is connected to the network, it DHCPDISCOVER message which
contains the source address as 0.0.0.0 to the network including server. DHCP server on receiving the message,
returns DHCPOFFER message to the requested host which contains the server address and address to the node.
• DHCPOFFER: If there are multiple servers on the network, host receives DHCPOFFER messages. It is up to
the host to select a particular message.
• DHCPREQUEST: The requested host on receiving the offer message, it again broadcast the DHCPREQUEST
message on the network with the address of the server whose message is accepted by the host. The server
which pertains to that server address sent host checks whether the address to be assigned to the node is
available in the data storage.
• DHCPACK: If the address is assigned, it marks the IP address in the storage as unavailable to ensure
consistency. Now, the server sends DHCPACK packet to the requested host contains network information (IP
address, subnet mask, gateway address). In case, address is assigned to another machine meanwhile, then the
server sends the DHCPNAK to the requested host indicating that the IP address is assigned to some other
machine.
• DHCPRELEASE: And finally, If the host wants to move to other network or finished its work, it sends the
DHCPRELEASE packet to the server indicating that to disconnect. Then the server marks the IP address as
available in the storage so that it can be assigned to another machine.
_______________________________________________________________________________________________
BSc IT (Sem V Notes) IOT Asst. Prof.Rawoot Amina O.
IPV6
• The IPv6 addresses are comprised of 128-bits (or 8 groups of 4 hexadecimal digits separated of omitting zeros
to abbreviate the full address.
• An example of IPV6 address may look like 2001 For convenience,
an IPv6 address can be re resented in shorter notation by omitting leading zeros. The example address above
can be also be ire resented as 2001: db8: 12:
• The primary function of IPv6 is to allow for more unique TCP/IP address identifiers to be created, w that we've
run out of the 4.3 billion created with IPv4. This is one of the main reasons why IPv6 s such an important
innovation for the Internet of Things (IOT).
Types of IPv6 Addresses: - IPV6 addresses are broadly classified into three categories:
1. Unicast addresses: A Unicast address acts as an identifier for a single interface. An IPv6
packet sent to a Unicast address is delivered to the interface identified by that address.
2. Multicast addresses: A Multicast address acts as an identifier for a group/set of interfaces
that may belong to the different nodes. An IPv6 packet delivered to a Multicast address is
delivered to the multiple interfaces.
3. Anycast addresses: Anycast addresses act as identifiers for a set of interfaces that may belong
to the different nodes. An IPv6 packet destined for an Anycast address is delivered to one of
the interfaces identified by the address.
• Internet-connected products are becoming increasingly popular, and while IPv4 addresses couldn't meet
the demand for 10T products, 6 gives 10T products a platform to operate on for a very long time.
Why IPv6 Is Important for the Internet of Things: -
1. SECURITY: With billions of new smart products being created every day, security thought in the
back of all 10T engineers’ minds and IPv6 offers better security solutions than its
predecessor, largely due to IPSec.IPV6 also supports more-secure name resolution. The
Secure Neighbor Discover (SEND) protocol is capable of enabling cryptographic
confirmation that a it claims to be at the time of the connection.
2. SCALABILITY: According to a report put out by Gartner, 25 billion "things" will be internet by the
year 2020. That's a pretty incredible estimation, considering report notes that 4.9 billion
devices will be connected in 2015. This purposed increase in growth in only five years
sheds some light on how much growth we can expect to see in the next 10, 20. or even 50 years-
3. CONNECTABILITY: With billions of new 10T devices entering the market each year, connect
ability i.e. allowing network-connected to "speak" to each other—is 'vital. With IPv4, there were
quite a few issues with 10T product; to speak another. Network Address Translation (NAT)
posed one of these major issues was created as a workaround for organizations who needed
multiple people and device to be able to work off of the same IPV4 address.
IPv6 and Powering Devices: -
1 We know that we can regularly charge and maintain a small handful of devices.
2 The requirements for large numbers of devices, however, are very different.
3 The devices should be low power and very reliable, while still being capable of connecting to the Internet.
4 Perhaps to accomplish this, these devices will team together in a mesh network.
9
BSc IT (Sem V Notes) IOT Asst. Prof.Rawoot Amina O.
MAC Address
• MAC Stands for "Media Access Control Address".
• MAC Addresses are unique 48-bits hardware number of a computer, which is embedded into network card
as Network Interface Card) during the time of manufacturing. MAC Address is also known as Physical
Address of a network device.
• This relates to the lowest-level “link layer” of the TCP/IP stack.
• MAC addresses are made up of six groups of two-digit hexadecimal numbers, separated by colons. For
example, an Ethernet card may have a MAC address of 00:0d:83: bl :c0:8e.
• It is used to differentiate different machines on the same physical network so that they can exchange packets.
• When an IP message is routed, it hops from node to node, and when it finally reaches a node which knows
where the physical machine is, that node passes the message to the device associated with that MAC address.
• Most devices, such as our laptop, come with the MAC address burned into their Ethernet chips. Some chips,
such as the Arduino Ethernet's WizNet, don't have a hard-coded MAC address, though. This is for production
reasons: if the chips are mass produced, they are, of course, identical. So, they can't, physically, contain a
distinctive address. The address could be stored in the chip's firmware, but this would then require every
TCP/UDP Ports
• A port is a 1 6-bit number used to identify specific applications and services.
• The Transmission Control Protocol (TCP) uses a set of communication channels called ports to manage
among multiple different applications running on the same physical device.
• Unlike the physical ports on computers like USB ports or Ethernet ports, TCP ports are virtual -
programmable entries numbered between 0 and 65535.
• Most TCP ports are general-purpose channels that can be called into service as needed but otherwise sit idle.
Some lower-numbered ports, however, are dedicated to specific applications.
• Applications that provide a service (such as FTP or and HTTP servers) open a port on the
local computer and listen for connection requests.
• when you send a TCP/IP message over the Internet, you have to send it to the right port.
• AN EXAMPLE: HTTP PORTS:
• If your browser requests an HTTP page, it usually sends that request to port 80.
• The web server is “listening” to that port and therefore replies to it.
• If you send an HTTP message to a different port, one of several things will happen:
• ◾ Nothing is listening to that port, and the machine replies with an “RST” packet (a control sequence
resetting the TCP/IP connection) to complain about this.
• ◾ Nothing is listening to that port, but the firewall lets the request simply hang instead of replying.
10
BSc IT (Sem V Notes) IOT Asst. Prof.Rawoot Amina O.
The client has decided that trying to send a message to that port is a bad idea and refuses to do it. (list of
“restricted ports”.)
• The message arrives at a port that is expecting something other than an HTTP message.
• The server reads the client’s response, decides that it is garbage, and then terminates the connection.
• Ports 0–1023 are “well-known ports”, and only a system process or an administrator can connect to
them.
• Ports 1024–49151 are “registered”, so that common applications can have a usual port number.
• You see custom port numbers if a machine has more than one web server; for example, in development
you might have another server, bound to port 8080:
• http://www.example.com:8080
• The secure (encrypted) HTTPS usually runs on port 443. So these two URLs are equivalent:
• https://www.example.com
• https://www.example.com:443
• OTHER COMMON PORTS
• 22 SSH (Secure Shell)
• 23 Telnet
• 25 SMTP (outbound email)
• 110 POP3 (inbound email)
• 220 IMAP (inbound email)
• Websites that use the standard HTTP protocol transmit and receive data in an un manner. This means it is
possible for someone to spy on the data being transfer between the user and the Web server.
• While this is highly unlikely, it is not a comforting thought that someone might be capturing your credit card
number or other per information that you enter on a website. Therefore, secure websites use the HTTP’s
protocol to encrypt the data being sent back and forth with SSL encryption. If someone capture the data being
transferred via HTTPS, it would be unrecognizable.
• Hypertext Transfer Protocol Secure (HTTPS) is a variant of the standard web protocol (HTTP) that adds a layer
of security on the data in transit through a secure layer (SSL) or transport layer security (TLS) protocol
connection.
• HTTPS enables encrypted communication and secure connection between a remote user the primary web server.
• HTTPS is primarily designed to provide enhanced security layer over the unsecured protocol for sensitive data
and transactions such as billing details, credit card and user login etc. HTTPS encrypts every data packet in
transition using SSL or encryption technique to avoid intermediary hackers and attackers to extract the con the
data; even if the connection is compromised.
• HTTPS is configured and supported by default in most web browsers and initiates a connection automatically if
the accessed web servers requests secure connection• works in collaboration with certificate authorities that
evaluates the security certificate of the accessed website.
HTTP PORTS
• If your browser requests an HTTP page, it usually sends that request to port 80. The web server is
"listening" to that port and therefore replies to it.
• If you send an HTTP message to a different port, one of several things will happen:
12
BSc IT (Sem V Notes) IOT Asst. Prof.Rawoot Amina O.
• Nothing is listening to that port, and the machine replies with an "RST" packet (a control sequence
resetting the TCP/IP connection) to complain about this.
• Nothing is listening to that port, but the firewall lets the request simply hang instead of replying. The
purpose of this (lack of) response is to discourage attackers from trying to find information about the
machine by scanning every port.
• The client has decided that trying to send a message to that port is a bad idea and refuses to do it.
Google Chrome does this for a fairly arbitrary list of "restricted ports".
• The message arrives at a port that is expecting something other than an HTTP message. The server
reads the client's response, decides that it is garbage, and then terminates the connection.
• Ports are "well-known ports", and only a system process or an administrator can connect to then).
• Ports 1024-49151 are "registered", so that common applications can have usual port number.
• The Internet Assigned Numbers Authority (IANA) is responsible for registering the numbers in these
ranges.
• You see Custom port numbers if a machine has more than one web server;
For example, in development you might have another server, bound to port 8080:
http://www.exampIe.com:8080
The secure (encrypted) HTTPS usually runs on port 443. So, these two URL’s are equivalent
https://www.example.com https:
http://www.exampIe.com:443
13